
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Knowledge-driven Biometric Authentication in Virtual Reality
Florian Mathis, Hassan Ismail Fawaz, Mohamed Khamis
(2020)
Open Access | Times Cited: 53
Florian Mathis, Hassan Ismail Fawaz, Mohamed Khamis
(2020)
Open Access | Times Cited: 53
Showing 1-25 of 53 citing articles:
Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing
Florian Mathis, John Williamson, Kami Vaniea, et al.
ACM Transactions on Computer-Human Interaction (2021) Vol. 28, Iss. 1, pp. 1-44
Open Access | Times Cited: 65
Florian Mathis, John Williamson, Kami Vaniea, et al.
ACM Transactions on Computer-Human Interaction (2021) Vol. 28, Iss. 1, pp. 1-44
Open Access | Times Cited: 65
Understanding User Identification in Virtual Reality Through Behavioral Biometrics and the Effect of Body Normalization
Jonathan Liebers, Mark Abdelaziz, Lukas Mecke, et al.
(2021)
Closed Access | Times Cited: 62
Jonathan Liebers, Mark Abdelaziz, Lukas Mecke, et al.
(2021)
Closed Access | Times Cited: 62
SoK: Authentication in Augmented and Virtual Reality
Sophie Stephenson, Bijeeta Pal, Stephen Fan, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 267-284
Closed Access | Times Cited: 45
Sophie Stephenson, Bijeeta Pal, Stephen Fan, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 267-284
Closed Access | Times Cited: 45
SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response
Huadi Zhu, Mingyan Xiao, Demoria Sherman, et al.
(2023)
Open Access | Times Cited: 17
Huadi Zhu, Mingyan Xiao, Demoria Sherman, et al.
(2023)
Open Access | Times Cited: 17
Using Siamese Neural Networks to Perform Cross-System Behavioral Authentication in Virtual Reality
Robert Miller, Natasha Kholgade Banerjee, Sean Banerjee
(2021), pp. 140-149
Closed Access | Times Cited: 37
Robert Miller, Natasha Kholgade Banerjee, Sean Banerjee
(2021), pp. 140-149
Closed Access | Times Cited: 37
VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets
Abdullah Al Arafat, Zhishan Guo, Amro Awad
(2021)
Closed Access | Times Cited: 35
Abdullah Al Arafat, Zhishan Guo, Amro Awad
(2021)
Closed Access | Times Cited: 35
Application of Biometric System to Enhance the Security in Virtual World
Vivek Veeraiah, Krishan Kumar, P. Lalitha Kumari, et al.
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (2022), pp. 719-723
Closed Access | Times Cited: 27
Vivek Veeraiah, Krishan Kumar, P. Lalitha Kumari, et al.
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (2022), pp. 719-723
Closed Access | Times Cited: 27
Combining Real-World Constraints on User Behavior with Deep Neural Networks for Virtual Reality (VR) Biometrics
Robert Miller, Natasha Kholgade Banerjee, Sean Banerjee
2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (2022), pp. 409-418
Closed Access | Times Cited: 23
Robert Miller, Natasha Kholgade Banerjee, Sean Banerjee
2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (2022), pp. 409-418
Closed Access | Times Cited: 23
Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards
Yi Wu, Cong Shi, Tianfang Zhang, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 3382-3398
Closed Access | Times Cited: 14
Yi Wu, Cong Shi, Tianfang Zhang, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 3382-3398
Closed Access | Times Cited: 14
BlinKey
Huadi Zhu, Wenqiang Jin, Mingyan Xiao, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2020) Vol. 4, Iss. 4, pp. 1-29
Open Access | Times Cited: 37
Huadi Zhu, Wenqiang Jin, Mingyan Xiao, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2020) Vol. 4, Iss. 4, pp. 1-29
Open Access | Times Cited: 37
Adaptive human-computer interaction for industry 5.0: A novel concept, with comprehensive review and empirical validation
Rania Hamdani, Inès Chihi
Computers in Industry (2025) Vol. 168, pp. 104268-104268
Open Access
Rania Hamdani, Inès Chihi
Computers in Industry (2025) Vol. 168, pp. 104268-104268
Open Access
CoordAuth: Hands-Free Two-Factor Authentication in Virtual Reality Leveraging Head-Eye Coordination
Sheng Zhao, Jun Zhu, Shuning Zhang, et al.
(2025), pp. 738-748
Closed Access
Sheng Zhao, Jun Zhu, Shuning Zhang, et al.
(2025), pp. 738-748
Closed Access
Temporal Effects in Motion Behavior for Virtual Reality (VR) Biometrics
Robert Miller, Natasha Kholgade Banerjee, Sean Banerjee
2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (2022), pp. 563-572
Closed Access | Times Cited: 16
Robert Miller, Natasha Kholgade Banerjee, Sean Banerjee
2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (2022), pp. 563-572
Closed Access | Times Cited: 16
CueVR: Studying the Usability of Cue-based Authentication for Virtual Reality
Yomna Abdelrahman, Florian Mathis, Pascal Knierim, et al.
(2022)
Open Access | Times Cited: 16
Yomna Abdelrahman, Florian Mathis, Pascal Knierim, et al.
(2022)
Open Access | Times Cited: 16
Who is Alyx? A new behavioral biometric dataset for user identification in XR
Christian Räck, Tamara Fernando, Murat Yalcin, et al.
Frontiers in Virtual Reality (2023) Vol. 4
Open Access | Times Cited: 10
Christian Räck, Tamara Fernando, Murat Yalcin, et al.
Frontiers in Virtual Reality (2023) Vol. 4
Open Access | Times Cited: 10
User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review
Ioanna Anastasaki, George Drosatos, George Pavlidis, et al.
Information (2023) Vol. 14, Iss. 10, pp. 538-538
Open Access | Times Cited: 9
Ioanna Anastasaki, George Drosatos, George Pavlidis, et al.
Information (2023) Vol. 14, Iss. 10, pp. 538-538
Open Access | Times Cited: 9
A Literature Review on Virtual Reality Authentication
John M. Jones, Reyhan Duezguen, Peter Mayer, et al.
IFIP advances in information and communication technology (2021), pp. 189-198
Closed Access | Times Cited: 22
John M. Jones, Reyhan Duezguen, Peter Mayer, et al.
IFIP advances in information and communication technology (2021), pp. 189-198
Closed Access | Times Cited: 22
Identifying Virtual Reality Users Across Domain-Specific Tasks: A Systematic Investigation of Tracked Features for Assembly
Alec G. Moore, D. Tiffany, Nicholas Ruozzi, et al.
(2023), pp. 396-404
Closed Access | Times Cited: 7
Alec G. Moore, D. Tiffany, Nicholas Ruozzi, et al.
(2023), pp. 396-404
Closed Access | Times Cited: 7
Recent Trends of Authentication Methods in Extended Reality: A Survey
Louisa Hallal, Jason Rhinelander, Ramesh Venkat
Applied System Innovation (2024) Vol. 7, Iss. 3, pp. 45-45
Open Access | Times Cited: 2
Louisa Hallal, Jason Rhinelander, Ramesh Venkat
Applied System Innovation (2024) Vol. 7, Iss. 3, pp. 45-45
Open Access | Times Cited: 2
An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse
Zhenyong Zhang, Kedi Yang, Youliang Tian, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6393-6408
Closed Access | Times Cited: 2
Zhenyong Zhang, Kedi Yang, Youliang Tian, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6393-6408
Closed Access | Times Cited: 2
Security and privacy in virtual reality: a literature survey
Alberto Giaretta
Virtual Reality (2024) Vol. 29, Iss. 1
Open Access | Times Cited: 2
Alberto Giaretta
Virtual Reality (2024) Vol. 29, Iss. 1
Open Access | Times Cited: 2
New Observations on Zipf’s Law in Passwords
Zhenduo Hou, Ding Wang
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 517-532
Closed Access | Times Cited: 9
Zhenduo Hou, Ding Wang
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 517-532
Closed Access | Times Cited: 9
Biometric as Secure Authentication for Virtual Reality Environment: A Systematic Literature Review
Chandra Hermawan Heruatmadja, Meyliana Meyliana, Achmad Nizar Hidayanto, et al.
2022 International Conference for Advancement in Technology (ICONAT) (2023), pp. 1-7
Closed Access | Times Cited: 5
Chandra Hermawan Heruatmadja, Meyliana Meyliana, Achmad Nizar Hidayanto, et al.
2022 International Conference for Advancement in Technology (ICONAT) (2023), pp. 1-7
Closed Access | Times Cited: 5
The Threat of the Digital Human in the Metaverse: Security and Privacy
Mona Soliman, Ashraf Darwish, Aboul Ella Hassanien
Studies in big data (2023), pp. 247-265
Closed Access | Times Cited: 5
Mona Soliman, Ashraf Darwish, Aboul Ella Hassanien
Studies in big data (2023), pp. 247-265
Closed Access | Times Cited: 5
PassWalk: Spatial Authentication Leveraging Lateral Shift and Gaze on Mobile Headsets
Abhishek Kumar, Lik‐Hang Lee, Jagmohan Chauhan, et al.
Proceedings of the 30th ACM International Conference on Multimedia (2022), pp. 952-960
Closed Access | Times Cited: 8
Abhishek Kumar, Lik‐Hang Lee, Jagmohan Chauhan, et al.
Proceedings of the 30th ACM International Conference on Multimedia (2022), pp. 952-960
Closed Access | Times Cited: 8