
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors
Cong Wu, Kun He, Jing Chen, et al.
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 19, Iss. 6, pp. 4002-4018
Closed Access | Times Cited: 18
Cong Wu, Kun He, Jing Chen, et al.
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 19, Iss. 6, pp. 4002-4018
Closed Access | Times Cited: 18
Showing 18 citing articles:
Rethinking Membership Inference Attacks Against Transfer Learning
Cong Wu, Jing Chen, Qianru Fang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6441-6454
Closed Access | Times Cited: 17
Cong Wu, Jing Chen, Qianru Fang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6441-6454
Closed Access | Times Cited: 17
It's All in the Touch: Authenticating Users with HOST Gestures on Multi-Touch Screen Devices
Cong Wu, Hangcheng Cao, Guowen Xu, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 10, pp. 10016-10030
Closed Access | Times Cited: 15
Cong Wu, Hangcheng Cao, Guowen Xu, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 10, pp. 10016-10030
Closed Access | Times Cited: 15
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph
Ruichao Liang, Jing Chen, Cong Wu, et al.
ACM Transactions on Software Engineering and Methodology (2024)
Closed Access | Times Cited: 11
Ruichao Liang, Jing Chen, Cong Wu, et al.
ACM Transactions on Software Engineering and Methodology (2024)
Closed Access | Times Cited: 11
EchoHand
Cong Wu, Jing Chen, Kun He, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 2931-2945
Closed Access | Times Cited: 22
Cong Wu, Jing Chen, Kun He, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 2931-2945
Closed Access | Times Cited: 22
Enhancing Fingerprint Authentication: A Systematic Review of Liveness Detection Methods Against Presentation Attacks
Divine Senanu Ametefe, Suzi Seroja Sarnin, Darmawaty Mohd Ali, et al.
Journal of The Institution of Engineers (India) Series B (2024) Vol. 105, Iss. 5, pp. 1451-1467
Closed Access | Times Cited: 4
Divine Senanu Ametefe, Suzi Seroja Sarnin, Darmawaty Mohd Ali, et al.
Journal of The Institution of Engineers (India) Series B (2024) Vol. 105, Iss. 5, pp. 1451-1467
Closed Access | Times Cited: 4
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
Xinzhong Su, Youyun Xu
Sensors (2025) Vol. 25, Iss. 1, pp. 212-212
Open Access
Xinzhong Su, Youyun Xu
Sensors (2025) Vol. 25, Iss. 1, pp. 212-212
Open Access
Efficient Data Communication in SIoT: Hybrid Channel Attention Recurrent Transformer‐Based Adaptive Marine Predator Algorithm for Reduced Energy Consumption
Sekar Sellappan, S. Ravikumar, Surendran Subbaraj, et al.
International Journal of Communication Systems (2025) Vol. 38, Iss. 5
Open Access
Sekar Sellappan, S. Ravikumar, Surendran Subbaraj, et al.
International Journal of Communication Systems (2025) Vol. 38, Iss. 5
Open Access
The Self-Detection Method of the Puppet Attack in Biometric Fingerprinting
Guyue Li, Yiyun Ma, Wenhao Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18824-18838
Closed Access | Times Cited: 2
Guyue Li, Yiyun Ma, Wenhao Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18824-18838
Closed Access | Times Cited: 2
Advancements and challenges in fingerprint presentation attack detection: a systematic literature review
Divine Senanu Ametefe, Suzi Seroja Sarnin, Darmawaty Mohd Ali, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Divine Senanu Ametefe, Suzi Seroja Sarnin, Darmawaty Mohd Ali, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks
Wenhao Wang, Guyue Li, Zhiming Chu, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 6, pp. 8250-8264
Open Access
Wenhao Wang, Guyue Li, Zhiming Chu, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 6, pp. 8250-8264
Open Access
A Survey on Mobile Digital Forensic: Taxonomy, Tools, and Challenges
Bhavini Patel, Palvinder Singh Mann
Security and Privacy (2024)
Closed Access
Bhavini Patel, Palvinder Singh Mann
Security and Privacy (2024)
Closed Access
Enhancing few-shot lifelong learning through fusion of cross-domain knowledge
Yaoyue Zheng, Xuetao Zhang, Zhiqiang Tian, et al.
Information Fusion (2024) Vol. 115, pp. 102730-102730
Closed Access
Yaoyue Zheng, Xuetao Zhang, Zhiqiang Tian, et al.
Information Fusion (2024) Vol. 115, pp. 102730-102730
Closed Access
An Innovative Method for Improving the Performance of UAV‐SM‐NOMA for 6G Networks Over Generalized Fading Channels
Mounika Neelam, Anuradha Sundru
International Journal of Communication Systems (2024)
Closed Access
Mounika Neelam, Anuradha Sundru
International Journal of Communication Systems (2024)
Closed Access
Optimized Graph Sample and Aggregate‐Attention Network‐Based High Gain Meta Surface Antenna Design for IoT Application
Penki Rohit, Amlan Datta, M. Satyanarayana
International Journal of Communication Systems (2024)
Closed Access
Penki Rohit, Amlan Datta, M. Satyanarayana
International Journal of Communication Systems (2024)
Closed Access
HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response
Zhixiang He, Jing Chen, Cong Wu, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2024) Vol. 8, Iss. 4, pp. 1-27
Closed Access
Zhixiang He, Jing Chen, Cong Wu, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2024) Vol. 8, Iss. 4, pp. 1-27
Closed Access
Unmanned-Aerial-Vehicle-Assisted Secure Free Space Optical Transmission in Internet of Things: Intelligent Strategy for Optimal Fairness
Fang Xu, Mingda Dong
Sensors (2024) Vol. 24, Iss. 24, pp. 8070-8070
Open Access
Fang Xu, Mingda Dong
Sensors (2024) Vol. 24, Iss. 24, pp. 8070-8070
Open Access
Resource Allocation in 5G NR Networks via Hybrid Lyrebird‐Red Panda Optimization Model
Jyoti, Amandeep Noliya, Dharmender Kumar
International Journal of Communication Systems (2024) Vol. 38, Iss. 3
Closed Access
Jyoti, Amandeep Noliya, Dharmender Kumar
International Journal of Communication Systems (2024) Vol. 38, Iss. 3
Closed Access
User Authentication on Earable Devices Via Bone-Conducted Occlusion Sounds
Yadong Xie, Fan Li, Yue Wu, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 3704-3718
Closed Access | Times Cited: 1
Yadong Xie, Fan Li, Yue Wu, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 3704-3718
Closed Access | Times Cited: 1