
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications
Shawn C. Eastwood, Vlad P. Shmerko, Svetlana Yanushkevich, et al.
IEEE Transactions on Human-Machine Systems (2015) Vol. 46, Iss. 2, pp. 231-242
Closed Access | Times Cited: 42
Shawn C. Eastwood, Vlad P. Shmerko, Svetlana Yanushkevich, et al.
IEEE Transactions on Human-Machine Systems (2015) Vol. 46, Iss. 2, pp. 231-242
Closed Access | Times Cited: 42
Showing 1-25 of 42 citing articles:
Biometric iris recognition using radial basis function neural network
M.R. Dua, Rashmi Gupta, Manju Khari, et al.
Soft Computing (2019) Vol. 23, Iss. 22, pp. 11801-11815
Closed Access | Times Cited: 64
M.R. Dua, Rashmi Gupta, Manju Khari, et al.
Soft Computing (2019) Vol. 23, Iss. 22, pp. 11801-11815
Closed Access | Times Cited: 64
Social Behavioral Information Fusion in Multimodal Biometrics
Madeena Sultana, Padma Polash Paul, Marina L. Gavrilova
IEEE Transactions on Systems Man and Cybernetics Systems (2017) Vol. 48, Iss. 12, pp. 2176-2187
Closed Access | Times Cited: 46
Madeena Sultana, Padma Polash Paul, Marina L. Gavrilova
IEEE Transactions on Systems Man and Cybernetics Systems (2017) Vol. 48, Iss. 12, pp. 2176-2187
Closed Access | Times Cited: 46
Spoof Detection for Finger-Vein Recognition System Using NIR Camera
Dat Tien Nguyen, Hyo Sik Yoon, Tuyen Danh Pham, et al.
Sensors (2017) Vol. 17, Iss. 10, pp. 2261-2261
Open Access | Times Cited: 43
Dat Tien Nguyen, Hyo Sik Yoon, Tuyen Danh Pham, et al.
Sensors (2017) Vol. 17, Iss. 10, pp. 2261-2261
Open Access | Times Cited: 43
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms
Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Computers & Security (2019) Vol. 83, pp. 122-139
Open Access | Times Cited: 42
Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Computers & Security (2019) Vol. 83, pp. 122-139
Open Access | Times Cited: 42
User Recognition From Social Behavior in Computer-Mediated Social Context
Madeena Sultana, Padma Polash Paul, Marina L. Gavrilova
IEEE Transactions on Human-Machine Systems (2017) Vol. 47, Iss. 3, pp. 356-367
Closed Access | Times Cited: 40
Madeena Sultana, Padma Polash Paul, Marina L. Gavrilova
IEEE Transactions on Human-Machine Systems (2017) Vol. 47, Iss. 3, pp. 356-367
Closed Access | Times Cited: 40
ABCD Analysis of Voice Biometric System in Banking
Amjad Hassan Khan M. K., P. S. Aithal
International Journal of Management Technology and Social Sciences (2024), pp. 1-17
Open Access | Times Cited: 3
Amjad Hassan Khan M. K., P. S. Aithal
International Journal of Management Technology and Social Sciences (2024), pp. 1-17
Open Access | Times Cited: 3
Biometrics in the Cloud: Challenges and Research Opportunities
Aniello Castiglione, Kim‐Kwang Raymond Choo, Michele Nappi, et al.
IEEE Cloud Computing (2017) Vol. 4, Iss. 4, pp. 12-17
Closed Access | Times Cited: 31
Aniello Castiglione, Kim‐Kwang Raymond Choo, Michele Nappi, et al.
IEEE Cloud Computing (2017) Vol. 4, Iss. 4, pp. 12-17
Closed Access | Times Cited: 31
A multi-agent based enhancement for multimodal biometric system at border control
Susara S Thenuwara, Chinthaka Premachandra, Hiroharu Kawanaka
Array (2022) Vol. 14, pp. 100171-100171
Open Access | Times Cited: 13
Susara S Thenuwara, Chinthaka Premachandra, Hiroharu Kawanaka
Array (2022) Vol. 14, pp. 100171-100171
Open Access | Times Cited: 13
Voice Biometric Identity Authentication System Based on Android Smart Phone
Xinman Zhang, Qi Xiong, Yixuan Dai, et al.
(2018), pp. 1440-1444
Closed Access | Times Cited: 20
Xinman Zhang, Qi Xiong, Yixuan Dai, et al.
(2018), pp. 1440-1444
Closed Access | Times Cited: 20
Palm Vein Biometric Authentication Using Convolutional Neural Networks
Samer Chantaf, Alaa Hilal, Rola El-Saleh
Smart innovation, systems and technologies (2019), pp. 352-363
Closed Access | Times Cited: 17
Samer Chantaf, Alaa Hilal, Rola El-Saleh
Smart innovation, systems and technologies (2019), pp. 352-363
Closed Access | Times Cited: 17
Electrocardiogram signals-based user authentication systems using soft computing techniques
Mehdi Hosseinzadeh, Bay Vo, Marwan Yassin Ghafour, et al.
Artificial Intelligence Review (2020) Vol. 54, Iss. 1, pp. 667-709
Closed Access | Times Cited: 15
Mehdi Hosseinzadeh, Bay Vo, Marwan Yassin Ghafour, et al.
Artificial Intelligence Review (2020) Vol. 54, Iss. 1, pp. 667-709
Closed Access | Times Cited: 15
Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications
Silvio Barra, Kim‐Kwang Raymond Choo, Michele Nappi, et al.
IEEE Cloud Computing (2018) Vol. 5, Iss. 4, pp. 33-37
Open Access | Times Cited: 16
Silvio Barra, Kim‐Kwang Raymond Choo, Michele Nappi, et al.
IEEE Cloud Computing (2018) Vol. 5, Iss. 4, pp. 33-37
Open Access | Times Cited: 16
Mass Evidence Accumulation and Traveler Risk Scoring Engine in e-Border Infrastructure
Kenneth Lai, Shawn C. Eastwood, Warren Adam Shier, et al.
IEEE Transactions on Intelligent Transportation Systems (2017) Vol. 19, Iss. 10, pp. 3271-3281
Closed Access | Times Cited: 15
Kenneth Lai, Shawn C. Eastwood, Warren Adam Shier, et al.
IEEE Transactions on Intelligent Transportation Systems (2017) Vol. 19, Iss. 10, pp. 3271-3281
Closed Access | Times Cited: 15
A Silent Password Recognition Framework Based on Lip Analysis
Mohamed Ezz, Ayman Mohamed Mostafa, Abdurrahman A. Nasr
IEEE Access (2020) Vol. 8, pp. 55354-55371
Open Access | Times Cited: 13
Mohamed Ezz, Ayman Mohamed Mostafa, Abdurrahman A. Nasr
IEEE Access (2020) Vol. 8, pp. 55354-55371
Open Access | Times Cited: 13
Bridging the Gap Between Forensics and Biometric-Enabled Watchlists for e-Borders
Kenneth Lai, Svetlana Yanushkevich, Vlad P. Shmerko, et al.
IEEE Computational Intelligence Magazine (2017) Vol. 12, Iss. 1, pp. 16-28
Closed Access | Times Cited: 14
Kenneth Lai, Svetlana Yanushkevich, Vlad P. Shmerko, et al.
IEEE Computational Intelligence Magazine (2017) Vol. 12, Iss. 1, pp. 16-28
Closed Access | Times Cited: 14
State of the art and perspectives on traditional and emerging biometrics: A survey
Issa Traoré, Mohammed Mujib Alshahrani, Mohammad S. Obaidat
Security and Privacy (2018) Vol. 1, Iss. 6
Open Access | Times Cited: 14
Issa Traoré, Mohammed Mujib Alshahrani, Mohammad S. Obaidat
Security and Privacy (2018) Vol. 1, Iss. 6
Open Access | Times Cited: 14
Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening
Svetlana Yanushkevich, Kelly W. Sundberg, Nathan W. Twyman, et al.
Computers & Security (2019) Vol. 85, pp. 372-385
Open Access | Times Cited: 13
Svetlana Yanushkevich, Kelly W. Sundberg, Nathan W. Twyman, et al.
Computers & Security (2019) Vol. 85, pp. 372-385
Open Access | Times Cited: 13
Biometrics in human-machine interaction
Warren Adam Shier, Svetlana Yanushkevich
(2015) Vol. 14, pp. 305-313
Closed Access | Times Cited: 10
Warren Adam Shier, Svetlana Yanushkevich
(2015) Vol. 14, pp. 305-313
Closed Access | Times Cited: 10
Understanding and taxonomy of uncertainty in modeling, simulation, and risk profiling for border control automation
Svetlana Yanushkevich, Shawn C. Eastwood, Martin Drahanský, et al.
The Journal of Defense Modeling and Simulation Applications Methodology Technology (2016) Vol. 15, Iss. 1, pp. 95-109
Closed Access | Times Cited: 10
Svetlana Yanushkevich, Shawn C. Eastwood, Martin Drahanský, et al.
The Journal of Defense Modeling and Simulation Applications Methodology Technology (2016) Vol. 15, Iss. 1, pp. 95-109
Closed Access | Times Cited: 10
Human Skeleton Data Augmentation for Person Identification over Deep Neural Network
Beom Kwon, Sanghoon Lee
Applied Sciences (2020) Vol. 10, Iss. 14, pp. 4849-4849
Open Access | Times Cited: 9
Beom Kwon, Sanghoon Lee
Applied Sciences (2020) Vol. 10, Iss. 14, pp. 4849-4849
Open Access | Times Cited: 9
Biometric‐enabled watchlists technology
Kenneth Lai, Ondřej Kanich, Michal Dvořák, et al.
IET Biometrics (2017) Vol. 7, Iss. 2, pp. 163-172
Closed Access | Times Cited: 9
Kenneth Lai, Ondřej Kanich, Michal Dvořák, et al.
IET Biometrics (2017) Vol. 7, Iss. 2, pp. 163-172
Closed Access | Times Cited: 9
Post-Pandemic Follow-Up Audit of Security Checkpoints
Kenneth Lai, Leonardo Queiroz, Vlad P. Shmerko, et al.
IEEE Access (2023) Vol. 11, pp. 7599-7616
Open Access | Times Cited: 3
Kenneth Lai, Leonardo Queiroz, Vlad P. Shmerko, et al.
IEEE Access (2023) Vol. 11, pp. 7599-7616
Open Access | Times Cited: 3
Cognitive Identity Management: Risks, Trust and Decisions using Heterogeneous Sources
Svetlana Yanushkevich, W.G.J. Howells, Keeley Crockett, et al.
(2019), pp. 33-42
Open Access | Times Cited: 8
Svetlana Yanushkevich, W.G.J. Howells, Keeley Crockett, et al.
(2019), pp. 33-42
Open Access | Times Cited: 8
Risk Assessment in Authentication Machines
Shawn C. Eastwood, Svetlana Yanushkevich
Studies in computational intelligence (2015), pp. 391-420
Closed Access | Times Cited: 7
Shawn C. Eastwood, Svetlana Yanushkevich
Studies in computational intelligence (2015), pp. 391-420
Closed Access | Times Cited: 7
Taxonomy and Modeling of Impersonation in e-Border Authentication
Svetlana Yanushkevich, Steven Samoil, Vlad P. Shmerko, et al.
(2015) Vol. 1, pp. 38-43
Closed Access | Times Cited: 5
Svetlana Yanushkevich, Steven Samoil, Vlad P. Shmerko, et al.
(2015) Vol. 1, pp. 38-43
Closed Access | Times Cited: 5