
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Face Representations for Differential Morphing Attack Detection
Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 15, pp. 3625-3639
Open Access | Times Cited: 107
Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 15, pp. 3625-3639
Open Access | Times Cited: 107
Showing 1-25 of 107 citing articles:
Deepfakes and beyond: A Survey of face manipulation and fake detection
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
Information Fusion (2020) Vol. 64, pp. 131-148
Open Access | Times Cited: 741
Rubén Tolosana, Rubén Vera-Rodríguez, Julián Fiérrez, et al.
Information Fusion (2020) Vol. 64, pp. 131-148
Open Access | Times Cited: 741
Face Morphing Attack Generation and Detection: A Comprehensive Survey
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, et al.
IEEE Transactions on Technology and Society (2021) Vol. 2, Iss. 3, pp. 128-145
Open Access | Times Cited: 97
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, et al.
IEEE Transactions on Technology and Society (2021) Vol. 2, Iss. 3, pp. 128-145
Open Access | Times Cited: 97
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking
Kiran Raja, Matteo Ferrara, Annalisa Franco, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 4336-4351
Open Access | Times Cited: 73
Kiran Raja, Matteo Ferrara, Annalisa Franco, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 4336-4351
Open Access | Times Cited: 73
Face morphing detection in the presence of printing/scanning and heterogeneous image sources
Matteo Ferrara, Annalisa Franco, Davide Maltoni
IET Biometrics (2021) Vol. 10, Iss. 3, pp. 290-303
Open Access | Times Cited: 65
Matteo Ferrara, Annalisa Franco, Davide Maltoni
IET Biometrics (2021) Vol. 10, Iss. 3, pp. 290-303
Open Access | Times Cited: 65
Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors
Naser Damer, Cesar Augusto Fontanillo Lopez, Meiling Fang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2022), pp. 1605-1616
Open Access | Times Cited: 39
Naser Damer, Cesar Augusto Fontanillo Lopez, Meiling Fang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2022), pp. 1605-1616
Open Access | Times Cited: 39
FedForgery: Generalized Face Forgery Detection With Residual Federated Learning
Decheng Liu, Zhan Dang, Chunlei Peng, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4272-4284
Open Access | Times Cited: 31
Decheng Liu, Zhan Dang, Chunlei Peng, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4272-4284
Open Access | Times Cited: 31
Leveraging Diffusion for Strong and High Quality Face Morphing Attacks
Zander Blasingame, Chen Liu
IEEE Transactions on Biometrics Behavior and Identity Science (2024) Vol. 6, Iss. 1, pp. 118-131
Closed Access | Times Cited: 8
Zander Blasingame, Chen Liu
IEEE Transactions on Biometrics Behavior and Identity Science (2024) Vol. 6, Iss. 1, pp. 118-131
Closed Access | Times Cited: 8
Are GAN-based morphs threatening face recognition?
Eklavya Sarkar, Pavel Korshunov, Laurent Colbois, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2022), pp. 2959-2963
Open Access | Times Cited: 31
Eklavya Sarkar, Pavel Korshunov, Laurent Colbois, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2022), pp. 2959-2963
Open Access | Times Cited: 31
Face Recognition Vendor Test (FRVT) part 4:
Mei Ngan, Patrick Grother, Kayee Hanaoka, et al.
(2020)
Open Access | Times Cited: 42
Mei Ngan, Patrick Grother, Kayee Hanaoka, et al.
(2020)
Open Access | Times Cited: 42
Mutual Information Maximization on Disentangled Representations for Differential Morph Detection
Sobhan Soleymani, Ali Dabouei, Fariborz Taherkhani, et al.
(2021), pp. 1730-1740
Open Access | Times Cited: 33
Sobhan Soleymani, Ali Dabouei, Fariborz Taherkhani, et al.
(2021), pp. 1730-1740
Open Access | Times Cited: 33
PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection
Naser Damer, Noémie Spiller, Meiling Fang, et al.
Lecture notes in computer science (2021), pp. 291-304
Closed Access | Times Cited: 33
Naser Damer, Noémie Spiller, Meiling Fang, et al.
Lecture notes in computer science (2021), pp. 291-304
Closed Access | Times Cited: 33
SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data
Marco Huber, Fadi Boutros, Anh Thi Luu, et al.
(2022), pp. 1-10
Open Access | Times Cited: 25
Marco Huber, Fadi Boutros, Anh Thi Luu, et al.
(2022), pp. 1-10
Open Access | Times Cited: 25
Improving Accomplice Detection in the Morphing Attack
Nicolò Di Domenico, Guido Borghi, Annalisa Franco, et al.
Deleted Journal (2025)
Closed Access
Nicolò Di Domenico, Guido Borghi, Annalisa Franco, et al.
Deleted Journal (2025)
Closed Access
Border Control Morphing Attack Detection with a Convolutional Neural Network De-morphing Approach
David Ortega-delCampo, Cristina Conde, Daniel Palacios‐Alonso, et al.
IEEE Access (2020), pp. 1-1
Open Access | Times Cited: 37
David Ortega-delCampo, Cristina Conde, Daniel Palacios‐Alonso, et al.
IEEE Access (2020), pp. 1-1
Open Access | Times Cited: 37
Differential Morph Face Detection using Discriminative Wavelet Sub-bands
Baaria Chaudhary, Poorya Aghdaie, Sobhan Soleymani, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2021), pp. 1425-1434
Open Access | Times Cited: 27
Baaria Chaudhary, Poorya Aghdaie, Sobhan Soleymani, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2021), pp. 1425-1434
Open Access | Times Cited: 27
Face Boundary Formulation for Harmonic Models: Face Image Resembling
Hung‐Tsai Huang, Zi‐Cai Li, Yimin Wei, et al.
Journal of Imaging (2025) Vol. 11, Iss. 1, pp. 14-14
Open Access
Hung‐Tsai Huang, Zi‐Cai Li, Yimin Wei, et al.
Journal of Imaging (2025) Vol. 11, Iss. 1, pp. 14-14
Open Access
Single-morphing attack detection using few-shot learning and triplet-loss
Juan Tapia, Daniel Schulz, Christoph Busch
Neurocomputing (2025), pp. 130033-130033
Closed Access
Juan Tapia, Daniel Schulz, Christoph Busch
Neurocomputing (2025), pp. 130033-130033
Closed Access
A Double Siamese Framework for Differential Morphing Attack Detection
Guido Borghi, Emanuele Pancisi, Matteo Ferrara, et al.
Sensors (2021) Vol. 21, Iss. 10, pp. 3466-3466
Open Access | Times Cited: 23
Guido Borghi, Emanuele Pancisi, Matteo Ferrara, et al.
Sensors (2021) Vol. 21, Iss. 10, pp. 3466-3466
Open Access | Times Cited: 23
Generation and Detection of Face Morphing Attacks
Muhammad Hamza, Samabia Tehsin, Hanen Karamti, et al.
IEEE Access (2022) Vol. 10, pp. 72557-72576
Open Access | Times Cited: 18
Muhammad Hamza, Samabia Tehsin, Hanen Karamti, et al.
IEEE Access (2022) Vol. 10, pp. 72557-72576
Open Access | Times Cited: 18
MorDeephy: Face Morphing Detection via Fused Classification
Iurii Medvedev, Farhad Shadmand, Nuno Gonçalves
(2023), pp. 193-204
Open Access | Times Cited: 9
Iurii Medvedev, Farhad Shadmand, Nuno Gonçalves
(2023), pp. 193-204
Open Access | Times Cited: 9
Towards minimizing efforts for Morphing Attacks—Deep embeddings for morphing pair selection and improved Morphing Attack Detection
Roman Kessler, Kiran B. Raja, Juan Tapia, et al.
PLoS ONE (2024) Vol. 19, Iss. 5, pp. e0304610-e0304610
Open Access | Times Cited: 3
Roman Kessler, Kiran B. Raja, Juan Tapia, et al.
PLoS ONE (2024) Vol. 19, Iss. 5, pp. e0304610-e0304610
Open Access | Times Cited: 3
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation
Le Qin, Fei Peng, Sushma Venkatesh, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2020) Vol. 3, Iss. 1, pp. 72-88
Closed Access | Times Cited: 27
Le Qin, Fei Peng, Sushma Venkatesh, et al.
IEEE Transactions on Biometrics Behavior and Identity Science (2020) Vol. 3, Iss. 1, pp. 72-88
Closed Access | Times Cited: 27
Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision
Le Qin, Fei Peng, Min Long
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 3649-3662
Closed Access | Times Cited: 14
Le Qin, Fei Peng, Min Long
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 3649-3662
Closed Access | Times Cited: 14
Makeup Presentation Attacks: Review and Detection Performance Benchmark
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23
Christian Rathgeb, Pawel Drozdowski, Christoph Busch
IEEE Access (2020) Vol. 8, pp. 224958-224973
Open Access | Times Cited: 23
Differential Morphed Face Detection Using Deep Siamese Networks
Sobhan Soleymani, Baaria Chaudhary, Ali Dabouei, et al.
Lecture notes in computer science (2021), pp. 560-572
Closed Access | Times Cited: 20
Sobhan Soleymani, Baaria Chaudhary, Ali Dabouei, et al.
Lecture notes in computer science (2021), pp. 560-572
Closed Access | Times Cited: 20