OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detection of Face Morphing Attacks Based on PRNU Analysis
Ulrich Scherhag, Luca Debiasi, Christian Rathgeb, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2019) Vol. 1, Iss. 4, pp. 302-317
Open Access | Times Cited: 106

Showing 1-25 of 106 citing articles:

Deep learning for deepfakes creation and detection: A survey
Thanh Thi Nguyen, Quoc Viet Hung Nguyen, Dung T. Nguyen, et al.
Computer Vision and Image Understanding (2022) Vol. 223, pp. 103525-103525
Open Access | Times Cited: 226

Analysis Survey on Deepfake detection and Recognition with Convolutional Neural Networks
Saadaldeen Rashid Ahmed, Emrullah Sonuç, Mohammed Rashid Ahmed, et al.
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2022), pp. 1-7
Open Access | Times Cited: 126

DeepFake Detection for Human Face Images and Videos: A Survey
Asad Malik, Minoru Kuribayashi, Sani M. Abdullahi, et al.
IEEE Access (2022) Vol. 10, pp. 18757-18775
Open Access | Times Cited: 103

Deepfakes Generation and Detection: A Short Survey
Zahid Akhtar
Journal of Imaging (2023) Vol. 9, Iss. 1, pp. 18-18
Open Access | Times Cited: 51

Deep Face Representations for Differential Morphing Attack Detection
Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 15, pp. 3625-3639
Open Access | Times Cited: 107

Face Morphing Attack Generation and Detection: A Comprehensive Survey
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, et al.
IEEE Transactions on Technology and Society (2021) Vol. 2, Iss. 3, pp. 128-145
Open Access | Times Cited: 97

Biometrics: Trust, But Verify
Anil K. Jain, Debayan Deb, Joshua J. Engelsma
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 4, Iss. 3, pp. 303-323
Open Access | Times Cited: 78

Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking
Kiran Raja, Matteo Ferrara, Annalisa Franco, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 4336-4351
Open Access | Times Cited: 73

Face morphing detection in the presence of printing/scanning and heterogeneous image sources
Matteo Ferrara, Annalisa Franco, Davide Maltoni
IET Biometrics (2021) Vol. 10, Iss. 3, pp. 290-303
Open Access | Times Cited: 65

Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors
Naser Damer, Cesar Augusto Fontanillo Lopez, Meiling Fang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2022), pp. 1605-1616
Open Access | Times Cited: 39

Unmasking deepfakes: A systematic review of deepfake detection and generation techniques using artificial intelligence
Fakhar Abbas, Araz Taeihagh
Expert Systems with Applications (2024) Vol. 252, pp. 124260-124260
Open Access | Times Cited: 11

Leveraging Diffusion for Strong and High Quality Face Morphing Attacks
Zander Blasingame, Chen Liu
IEEE Transactions on Biometrics Behavior and Identity Science (2024) Vol. 6, Iss. 1, pp. 118-131
Closed Access | Times Cited: 8

Deep Learning for Deepfakes Creation and Detection: A Survey
Thanh Thi Nguyen, Minh Chau Nguyen, Dung T. Nguyen, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 69

[Retracted] Comparative Analysis of Deepfake Image Detection Method Using Convolutional Neural Network
Hasin Shahed Shad, Md. Mashfiq Rizvee, Nishat Tasnim Roza, et al.
Computational Intelligence and Neuroscience (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 54

Are GAN-based morphs threatening face recognition?
Eklavya Sarkar, Pavel Korshunov, Laurent Colbois, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2022), pp. 2959-2963
Open Access | Times Cited: 31

PRNU‐based detection of facial retouching
Christian Rathgeb, Angelika Botaljov, Fabian Stockhardt, et al.
IET Biometrics (2020) Vol. 9, Iss. 4, pp. 154-164
Open Access | Times Cited: 49

Detecting Morphed Face Attacks Using Residual Noise from Deep Multi-scale Context Aggregation Network
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, et al.
(2020), pp. 269-278
Open Access | Times Cited: 42

PRNU-based Deepfake Detection
Florian Lugstein, Simon Baier, Gregor Bachinger, et al.
(2021)
Closed Access | Times Cited: 34

Image forgery detection: comprehensive review of digital forensics approaches
Satyendra Singh, Rajesh Kumar
Journal of Computational Social Science (2024) Vol. 7, Iss. 1, pp. 877-915
Closed Access | Times Cited: 5

Detection of Morphed Face Images Using Discriminative Wavelet Sub-bands
Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, et al.
(2021)
Open Access | Times Cited: 32

Learning Forgery Region-Aware and ID-Independent Features for Face Manipulation Detection
Changtao Miao, Qi Chu, Weihai Li, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 4, Iss. 1, pp. 71-84
Closed Access | Times Cited: 32

Differential Morph Face Detection using Discriminative Wavelet Sub-bands
Baaria Chaudhary, Poorya Aghdaie, Sobhan Soleymani, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2021), pp. 1425-1434
Open Access | Times Cited: 27

Attention Aware Wavelet-based Detection of Morphed Face Images
Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, et al.
(2021)
Open Access | Times Cited: 27

Biometrics in Border Control
David Ortega del Campo, Alberto Pedro Raez Liria, Enrique Cabello
(2025), pp. 257-259
Closed Access

Effectiveness of Residual Noise Based Methods for Single Image Based Morphing Attack Detection: A Comparative Study
Sushrut Patwardhan, Sushma Venkatesh, Raghavendra Ramachandra
Lecture notes in computer science (2025), pp. 315-329
Closed Access

Page 1 - Next Page

Scroll to top