
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Confronting a Variety of Finger Vein Recognition Algorithms With Wax Presentation Attack Artefacts
Johannes Schuiki, Bernhard Prommegger, Andreas Uhl
(2021)
Closed Access | Times Cited: 14
Johannes Schuiki, Bernhard Prommegger, Andreas Uhl
(2021)
Closed Access | Times Cited: 14
Showing 14 citing articles:
Finger-vein presentation attack detection using depthwise separable convolution neural network
Kashif Shaheed, Aihua Mao, Imran Qureshi, et al.
Expert Systems with Applications (2022) Vol. 198, pp. 116786-116786
Closed Access | Times Cited: 31
Kashif Shaheed, Aihua Mao, Imran Qureshi, et al.
Expert Systems with Applications (2022) Vol. 198, pp. 116786-116786
Closed Access | Times Cited: 31
Spoofing Attacks Utilizing a More Realistic Contactless Palm Vein Correction Algorithm
Jianbin Wang, Dacan Luo, R. H. Chen, et al.
Lecture notes in computer science (2025), pp. 89-99
Closed Access
Jianbin Wang, Dacan Luo, R. H. Chen, et al.
Lecture notes in computer science (2025), pp. 89-99
Closed Access
Attack Detection for Finger and Palm Vein Biometrics by Fusion of Multiple Recognition Algorithms
Johannes Schuiki, Michael Linortner, Georg Wimmer, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2022) Vol. 4, Iss. 4, pp. 544-555
Open Access | Times Cited: 13
Johannes Schuiki, Michael Linortner, Georg Wimmer, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2022) Vol. 4, Iss. 4, pp. 544-555
Open Access | Times Cited: 13
Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks
Pavel V. Mizinov, Н.С. Коннова, М. А. Басараб, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 3, pp. 383-396
Closed Access | Times Cited: 7
Pavel V. Mizinov, Н.С. Коннова, М. А. Басараб, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 3, pp. 383-396
Closed Access | Times Cited: 7
Extensive Threat Analysis of Vein Attack Databases and Attack Detection by Fusion of Comparison Scores
Johannes Schuiki, Michael Linortner, Georg Wimmer, et al.
Advances in computer vision and pattern recognition (2023), pp. 467-487
Open Access | Times Cited: 5
Johannes Schuiki, Michael Linortner, Georg Wimmer, et al.
Advances in computer vision and pattern recognition (2023), pp. 467-487
Open Access | Times Cited: 5
Finger Vein Spoof GANs: Can We Supersede the Production of Presentation Attack Artefacts?
Andreas Vorderleitner, Jutta Hämmerle-Uhl, Andreas Uhl
Lecture notes in computer science (2024), pp. 109-124
Closed Access | Times Cited: 1
Andreas Vorderleitner, Jutta Hämmerle-Uhl, Andreas Uhl
Lecture notes in computer science (2024), pp. 109-124
Closed Access | Times Cited: 1
Finger Vein Presentation Attack Detection Method Using a Hybridized Gray-Level Co-Occurrence Matrix Feature with Light-Gradient Boosting Machine Model
Kashif Shaheed, Piotr Szczuko, Inam Ullah, et al.
Proceedings of the International Conference on Information Systems Development (2024)
Closed Access | Times Cited: 1
Kashif Shaheed, Piotr Szczuko, Inam Ullah, et al.
Proceedings of the International Conference on Information Systems Development (2024)
Closed Access | Times Cited: 1
Estimation of Fractal Dimension and Detection of Fake Finger-Vein Images for Finger-Vein Recognition
Seung Gu Kim, Jin Seong Hong, Jung Soo Kim, et al.
Fractal and Fractional (2024) Vol. 8, Iss. 11, pp. 646-646
Open Access | Times Cited: 1
Seung Gu Kim, Jin Seong Hong, Jung Soo Kim, et al.
Fractal and Fractional (2024) Vol. 8, Iss. 11, pp. 646-646
Open Access | Times Cited: 1
Vulnerability Assessment and Presentation Attack Detection Using a Set of Distinct Finger Vein Recognition Algorithms
Johannes Schuiki, Georg Wimmer, Andreas Uhl
(2021)
Closed Access | Times Cited: 6
Johannes Schuiki, Georg Wimmer, Andreas Uhl
(2021)
Closed Access | Times Cited: 6
Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts
Andreas Vorderleitner, Jutta Hämmerle-Uhl, Andreas Uhl
(2023), pp. 133-138
Open Access | Times Cited: 2
Andreas Vorderleitner, Jutta Hämmerle-Uhl, Andreas Uhl
(2023), pp. 133-138
Open Access | Times Cited: 2
Difficulties in Using Synthetic Data for Presentation Attack Detection in Finger Vein Recognition: The Role of Model Fingerprints
M.S. Langer, Michael Hafner, Stefan Findenig, et al.
(2024), pp. 1-10
Closed Access
M.S. Langer, Michael Hafner, Stefan Findenig, et al.
(2024), pp. 1-10
Closed Access
Feasibility of Morphing-Attacks in Vascular Biometrics
Altan K. Aydemir, Jutta Hämmerle-Uhl, Andreas Uhl
(2021), pp. 1-7
Closed Access | Times Cited: 3
Altan K. Aydemir, Jutta Hämmerle-Uhl, Andreas Uhl
(2021), pp. 1-7
Closed Access | Times Cited: 3
Simulation Of Biometric System Performance Under Spoofing Attack
Н.С. Коннова, Pavel V. Mizinov
2022 International Conference on Information, Control, and Communication Technologies (ICCT) (2022), pp. 1-4
Closed Access | Times Cited: 1
Н.С. Коннова, Pavel V. Mizinov
2022 International Conference on Information, Control, and Communication Technologies (ICCT) (2022), pp. 1-4
Closed Access | Times Cited: 1
Exploring the Potential of NIR Reflective and NIR Absorptive Materials in the Manufacture of Attack Tools for Biometric Systems
Pavel V. Mizinov, Н.С. Коннова, M. O. Sharikova
(2023), pp. 1-6
Closed Access
Pavel V. Mizinov, Н.С. Коннова, M. O. Sharikova
(2023), pp. 1-6
Closed Access