OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Recognizing Disguised Faces in the Wild
Maneet Singh, Richa Singh, Mayank Vatsa, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 1, Iss. 2, pp. 97-108
Open Access | Times Cited: 59

Showing 1-25 of 59 citing articles:

Deep face recognition: A survey
Mei Wang, Weihong Deng
Neurocomputing (2020) Vol. 429, pp. 215-244
Open Access | Times Cited: 748

A survey of face recognition techniques under occlusion
Dan Zeng, Raymond Veldhuis, Luuk Spreeuwers
IET Biometrics (2021) Vol. 10, Iss. 6, pp. 581-606
Open Access | Times Cited: 125

Generalized Zero-Shot Learning via Over-Complete Distribution
Rohit Keshari, Richa Singh, Mayank Vatsa
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020), pp. 13297-13305
Open Access | Times Cited: 111

Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition
Gaurav Goswami, Akshay Agarwal, Nalini Ratha, et al.
International Journal of Computer Vision (2019) Vol. 127, Iss. 6-7, pp. 719-742
Closed Access | Times Cited: 110

Masked Face Recognition Using Convolutional Neural Network
Md. Sabbir Ejaz, Md. Rabiul Islam
(2019)
Closed Access | Times Cited: 90

Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks
Guillaume Heusch, Anjith George, David Geissbühler, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2020) Vol. 2, Iss. 4, pp. 399-409
Open Access | Times Cited: 87

A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
Mayank Kumar Rusia, Dushyant Kumar Singh
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1669-1748
Open Access | Times Cited: 41

On the Robustness of Face Recognition Algorithms Against Attacks and Bias
Richa Singh, Akshay Agarwal, Maneet Singh, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2020) Vol. 34, Iss. 09, pp. 13583-13589
Open Access | Times Cited: 67

Dual Directed Capsule Network for Very Low Resolution Image Recognition
Maneet Singh, Shruti Nagpal, Richa Singh, et al.
2021 IEEE/CVF International Conference on Computer Vision (ICCV) (2019), pp. 340-349
Open Access | Times Cited: 56

An automated and efficient convolutional architecture for disguise-invariant face recognition using noise-based data augmentation and deep transfer learning
Muhammad Junaid Khan, Muhammad Jaleed Khan, Adil Masood Siddiqui, et al.
The Visual Computer (2021) Vol. 38, Iss. 2, pp. 509-523
Closed Access | Times Cited: 39

A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods
Faseela Abdullakutty, Eyad Elyan, Pamela Johnston
Information Fusion (2021) Vol. 75, pp. 55-69
Open Access | Times Cited: 36

Biometric template attacks and recent protection mechanisms: A survey
Sani M. Abdullahi, Shuifa Sun, Beng Wang, et al.
Information Fusion (2023) Vol. 103, pp. 102144-102144
Open Access | Times Cited: 13

Face Recognition in Unconstrained Images Using Deep Learning Model for Forensics
H. T. Chethana, Trisiladevi C. Nagavi, P. Mahesha, et al.
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access

CONCEAL FACE MASK RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS
P. Nagaraj, V. Muneeswaran, K. Muthamil Sudar, et al.
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2021), pp. 1787-1793
Closed Access | Times Cited: 28

A two stream face anti-spoofing framework using multi-level deep features and ELBP features
Aashania Antil, Chhavi Dhiman
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1361-1376
Closed Access | Times Cited: 9

A Survey in Presentation Attack and Presentation Attack Detection
Anas Husseis, Judith Liu‐Jimenez, Ines Goicoechea-Telleria, et al.
(2019) Vol. 1, pp. 1-13
Open Access | Times Cited: 23

Makeup Presentation Attacks: Review and Detection Performance Benchmark
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23

ArcFace for Disguised Face Recognition
Jiankang Deng, Stefanos Zafeririou
(2019), pp. 485-493
Closed Access | Times Cited: 22

Disguised Faces in the Wild 2019
Maneet Singh, Mohit Chawla, Richa Singh, et al.
(2019)
Closed Access | Times Cited: 20

Masked Face Recognition with Identification Association
Hong Qi, Zhongyuan Wang, Zheng He, et al.
(2020), pp. 731-735
Closed Access | Times Cited: 17

Adapting VET Education to Labor Market Needs with Focus on Artificial Intelligence and Computer Vision
Žiga Emeršič, Gregor Hrastnik, Nataša Meh Peer, et al.
(2023), pp. 77-86
Open Access | Times Cited: 5

Classifying Genuine Face images from Disguised Face Images
Junyaup Kim, Siho Han, Simon S. Woo
2021 IEEE International Conference on Big Data (Big Data) (2019)
Closed Access | Times Cited: 15

Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
Le Qin, Fei Peng, Min Long, et al.
ACM Transactions on Privacy and Security (2021) Vol. 25, Iss. 1, pp. 1-28
Open Access | Times Cited: 11

Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential
Fei Peng, Le Qin, Min Long, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024) Vol. 20, Iss. 7, pp. 1-28
Closed Access | Times Cited: 1

Generalized Zero-Shot Learning Via Over-Complete Distribution
Rohit Keshari, Richa Singh, Mayank Vatsa
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 11

Page 1 - Next Page

Scroll to top