
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Face Liveness Detection Using a Flash Against 2D Spoofing Attack
Patrick P. K. Chan, Weiwen Liu, Danni Chen, et al.
IEEE Transactions on Information Forensics and Security (2017) Vol. 13, Iss. 2, pp. 521-534
Closed Access | Times Cited: 72
Patrick P. K. Chan, Weiwen Liu, Danni Chen, et al.
IEEE Transactions on Information Forensics and Security (2017) Vol. 13, Iss. 2, pp. 521-534
Closed Access | Times Cited: 72
Showing 1-25 of 72 citing articles:
Learning Generalized Deep Feature Representation for Face Anti-Spoofing
Haoliang Li, Peisong He, Shiqi Wang, et al.
IEEE Transactions on Information Forensics and Security (2018) Vol. 13, Iss. 10, pp. 2639-2652
Closed Access | Times Cited: 180
Haoliang Li, Peisong He, Shiqi Wang, et al.
IEEE Transactions on Information Forensics and Security (2018) Vol. 13, Iss. 10, pp. 2639-2652
Closed Access | Times Cited: 180
ECG Biometric Authentication: A Comparative Analysis
Mohit Ingale, Renato Cordeiro, Siddartha Thentu, et al.
IEEE Access (2020) Vol. 8, pp. 117853-117866
Open Access | Times Cited: 90
Mohit Ingale, Renato Cordeiro, Siddartha Thentu, et al.
IEEE Access (2020) Vol. 8, pp. 117853-117866
Open Access | Times Cited: 90
A Deep Learning Technique for Biometric Authentication Using ECG Beat Template Matching
Allam Jaya Prakash, Kiran Kumar Patro, Saunak Samantray, et al.
Information (2023) Vol. 14, Iss. 2, pp. 65-65
Open Access | Times Cited: 26
Allam Jaya Prakash, Kiran Kumar Patro, Saunak Samantray, et al.
Information (2023) Vol. 14, Iss. 2, pp. 65-65
Open Access | Times Cited: 26
A survey on face presentation attack detection mechanisms: hitherto and future perspectives
Deepika Sharma, Arvind Selwal
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1527-1577
Open Access | Times Cited: 16
Deepika Sharma, Arvind Selwal
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1527-1577
Open Access | Times Cited: 16
Camera Invariant Feature Learning for Generalized Face Anti-Spoofing
Baoliang Chen, Wenhan Yang, Haoliang Li, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2477-2492
Open Access | Times Cited: 38
Baoliang Chen, Wenhan Yang, Haoliang Li, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2477-2492
Open Access | Times Cited: 38
Face anti-spoofing detection based on multi-scale image quality assessment
Herng-Hua Chang, Chun-Hsiao Yeh
Image and Vision Computing (2022) Vol. 121, pp. 104428-104428
Closed Access | Times Cited: 23
Herng-Hua Chang, Chun-Hsiao Yeh
Image and Vision Computing (2022) Vol. 121, pp. 104428-104428
Closed Access | Times Cited: 23
Lightweight face recognition-based portable attendance system with liveness detection
Nico Surantha, Boy Sugijakko
Internet of Things (2024) Vol. 25, pp. 101089-101089
Open Access | Times Cited: 5
Nico Surantha, Boy Sugijakko
Internet of Things (2024) Vol. 25, pp. 101089-101089
Open Access | Times Cited: 5
Data-Fusion-Based Two-Stage Cascade Framework for Multimodality Face Anti-Spoofing
Weihua Liu, Xiao-Kang Wei, Tao Lei, et al.
IEEE Transactions on Cognitive and Developmental Systems (2021) Vol. 14, Iss. 2, pp. 672-683
Open Access | Times Cited: 30
Weihua Liu, Xiao-Kang Wei, Tao Lei, et al.
IEEE Transactions on Cognitive and Developmental Systems (2021) Vol. 14, Iss. 2, pp. 672-683
Open Access | Times Cited: 30
Mathematical Background and Algorithms of a Collection of Android Apps for a Google Play Store Page
Roland Szabó
Applied Sciences (2025) Vol. 15, Iss. 8, pp. 4431-4431
Open Access
Roland Szabó
Applied Sciences (2025) Vol. 15, Iss. 8, pp. 4431-4431
Open Access
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning
Fei Peng, Le Qin, Min Long
Journal of Visual Communication and Image Representation (2019) Vol. 66, pp. 102746-102746
Closed Access | Times Cited: 34
Fei Peng, Le Qin, Min Long
Journal of Visual Communication and Image Representation (2019) Vol. 66, pp. 102746-102746
Closed Access | Times Cited: 34
Optimizing Deep CNN Architectures for Face Liveness Detection
Ranjana Koshy, Ausif Mahmood
Entropy (2019) Vol. 21, Iss. 4, pp. 423-423
Open Access | Times Cited: 32
Ranjana Koshy, Ausif Mahmood
Entropy (2019) Vol. 21, Iss. 4, pp. 423-423
Open Access | Times Cited: 32
Detection of Spoofing Medium Contours for Face Anti-Spoofing
Xun Zhu, Sheng Li, Xinpeng Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2019) Vol. 31, Iss. 5, pp. 2039-2045
Closed Access | Times Cited: 26
Xun Zhu, Sheng Li, Xinpeng Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2019) Vol. 31, Iss. 5, pp. 2039-2045
Closed Access | Times Cited: 26
Face anti-spoofing with generated near-infrared images
Fangling Jiang, Pengcheng Liu, Xiaohu Shao, et al.
Multimedia Tools and Applications (2020) Vol. 79, Iss. 29-30, pp. 21299-21323
Closed Access | Times Cited: 24
Fangling Jiang, Pengcheng Liu, Xiaohu Shao, et al.
Multimedia Tools and Applications (2020) Vol. 79, Iss. 29-30, pp. 21299-21323
Closed Access | Times Cited: 24
Crafting A Panoptic Face Presentation Attack Detector
Suril Mehta, Anannya Uberoi, Akshay Agarwal, et al.
(2019), pp. 1-6
Closed Access | Times Cited: 24
Suril Mehta, Anannya Uberoi, Akshay Agarwal, et al.
(2019), pp. 1-6
Closed Access | Times Cited: 24
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection
Fei Peng, Le Qin, Min Long
(2018), pp. 1-9
Closed Access | Times Cited: 22
Fei Peng, Le Qin, Min Long
(2018), pp. 1-9
Closed Access | Times Cited: 22
Enhancing deep discriminative feature maps via perturbation for face presentation attack detection
Yasar Abbas Ur Rehman, Lai-Man Po, Jukka Komulainen
Image and Vision Computing (2019) Vol. 94, pp. 103858-103858
Closed Access | Times Cited: 22
Yasar Abbas Ur Rehman, Lai-Man Po, Jukka Komulainen
Image and Vision Computing (2019) Vol. 94, pp. 103858-103858
Closed Access | Times Cited: 22
Texture and quality analysis for face spoofing detection
Neenu Daniel, A. Anitha
Computers & Electrical Engineering (2021) Vol. 94, pp. 107293-107293
Closed Access | Times Cited: 17
Neenu Daniel, A. Anitha
Computers & Electrical Engineering (2021) Vol. 94, pp. 107293-107293
Closed Access | Times Cited: 17
Face Liveness Detection Based on Perceptual Image Quality Assessment Features with Multi-scale Analysis
Chun-Hsiao Yeh, Herng-Hua Chang
(2018), pp. 49-56
Closed Access | Times Cited: 20
Chun-Hsiao Yeh, Herng-Hua Chang
(2018), pp. 49-56
Closed Access | Times Cited: 20
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
Ghazel Albakri, Sharifa Alghowinem
Sensors (2019) Vol. 19, Iss. 8, pp. 1928-1928
Open Access | Times Cited: 19
Ghazel Albakri, Sharifa Alghowinem
Sensors (2019) Vol. 19, Iss. 8, pp. 1928-1928
Open Access | Times Cited: 19
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours
Jinyin Chen, Haibin Zheng, Ruoxi Chen, et al.
Computers & Security (2020) Vol. 96, pp. 101916-101916
Closed Access | Times Cited: 17
Jinyin Chen, Haibin Zheng, Ruoxi Chen, et al.
Computers & Security (2020) Vol. 96, pp. 101916-101916
Closed Access | Times Cited: 17
Transfer learning based countermeasure against label flipping poisoning attack
Patrick P. K. Chan, Fengzhi Luo, Zitong Chen, et al.
Information Sciences (2020) Vol. 548, pp. 450-460
Closed Access | Times Cited: 17
Patrick P. K. Chan, Fengzhi Luo, Zitong Chen, et al.
Information Sciences (2020) Vol. 548, pp. 450-460
Closed Access | Times Cited: 17
Enhanced Deep Learning Architectures for Face Liveness Detection for Static and Video Sequences
Ranjana Koshy, Ausif Mahmood
Entropy (2020) Vol. 22, Iss. 10, pp. 1186-1186
Open Access | Times Cited: 17
Ranjana Koshy, Ausif Mahmood
Entropy (2020) Vol. 22, Iss. 10, pp. 1186-1186
Open Access | Times Cited: 17
DeBNet: Multilayer Deep Network for Liveness Detection in Face Recognition System
Shilpa Garg, Sumit Mittal, Pardeep Kumar, et al.
(2020), pp. 1136-1141
Closed Access | Times Cited: 16
Shilpa Garg, Sumit Mittal, Pardeep Kumar, et al.
(2020), pp. 1136-1141
Closed Access | Times Cited: 16
Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning
Bingyao Yu, Jiwen Lu, Xiu Li, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 17, pp. 413-427
Closed Access | Times Cited: 15
Bingyao Yu, Jiwen Lu, Xiu Li, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 17, pp. 413-427
Closed Access | Times Cited: 15
The future of biometrics technology: from face recognition to related applications
Hitoshi Imaoka, Hiroshi Hashimoto, Koichi Takahashi, et al.
APSIPA Transactions on Signal and Information Processing (2021) Vol. 10, Iss. 1
Open Access | Times Cited: 14
Hitoshi Imaoka, Hiroshi Hashimoto, Koichi Takahashi, et al.
APSIPA Transactions on Signal and Information Processing (2021) Vol. 10, Iss. 1
Open Access | Times Cited: 14