
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing
Xiaoguang Tu, Zheng Ma, Jian Zhao, et al.
ACM Transactions on Intelligent Systems and Technology (2020) Vol. 11, Iss. 5, pp. 1-19
Open Access | Times Cited: 74
Xiaoguang Tu, Zheng Ma, Jian Zhao, et al.
ACM Transactions on Intelligent Systems and Technology (2020) Vol. 11, Iss. 5, pp. 1-19
Open Access | Times Cited: 74
Showing 1-25 of 74 citing articles:
Learning Meta Pattern for Face Anti-Spoofing
Rizhao Cai, Zhi Li, Renjie Wan, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 1201-1213
Open Access | Times Cited: 64
Rizhao Cai, Zhi Li, Renjie Wan, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 1201-1213
Open Access | Times Cited: 64
Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System
Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 357-372
Closed Access | Times Cited: 61
Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 357-372
Closed Access | Times Cited: 61
Cross-regional oil palm tree counting and detection via a multi-level attention domain adaptation network
Juepeng Zheng, Haohuan Fu, Weijia Li, et al.
ISPRS Journal of Photogrammetry and Remote Sensing (2020) Vol. 167, pp. 154-177
Open Access | Times Cited: 64
Juepeng Zheng, Haohuan Fu, Weijia Li, et al.
ISPRS Journal of Photogrammetry and Remote Sensing (2020) Vol. 167, pp. 154-177
Open Access | Times Cited: 64
Joint Face Image Restoration and Frontalization for Recognition
Xiaoguang Tu, Jian Zhao, Qiankun Liu, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2021) Vol. 32, Iss. 3, pp. 1285-1298
Open Access | Times Cited: 53
Xiaoguang Tu, Jian Zhao, Qiankun Liu, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2021) Vol. 32, Iss. 3, pp. 1285-1298
Open Access | Times Cited: 53
Progressive Transfer Learning for Face Anti-Spoofing
Ruijie Quan, Yu Wu, Xin Yu, et al.
IEEE Transactions on Image Processing (2021) Vol. 30, pp. 3946-3955
Closed Access | Times Cited: 52
Ruijie Quan, Yu Wu, Xin Yu, et al.
IEEE Transactions on Image Processing (2021) Vol. 30, pp. 3946-3955
Closed Access | Times Cited: 52
Face Liveness Detection Using Artificial Intelligence Techniques: A Systematic Literature Review and Future Directions
Smita Khairnar, Shilpa Gite, Ketan Kotecha, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 37-37
Open Access | Times Cited: 17
Smita Khairnar, Shilpa Gite, Ketan Kotecha, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 37-37
Open Access | Times Cited: 17
Domain Agnostic Feature Learning for Image and Video Based Face Anti-spoofing
Suman Saha, Wenhao Xu, Menelaos Kanakis, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2020), pp. 3490-3499
Open Access | Times Cited: 39
Suman Saha, Wenhao Xu, Menelaos Kanakis, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2020), pp. 3490-3499
Open Access | Times Cited: 39
Camera Invariant Feature Learning for Generalized Face Anti-Spoofing
Baoliang Chen, Wenhan Yang, Haoliang Li, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2477-2492
Open Access | Times Cited: 38
Baoliang Chen, Wenhan Yang, Haoliang Li, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2477-2492
Open Access | Times Cited: 38
One-Class Knowledge Distillation for Face Presentation Attack Detection
Zhi Li, Rizhao Cai, Haoliang Li, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2137-2150
Open Access | Times Cited: 26
Zhi Li, Rizhao Cai, Haoliang Li, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2137-2150
Open Access | Times Cited: 26
Person-Specific Face Spoofing Detection Based on a Siamese Network
Mingtao Pei, Bin Yan, Huiling Hao, et al.
Pattern Recognition (2022) Vol. 135, pp. 109148-109148
Closed Access | Times Cited: 26
Mingtao Pei, Bin Yan, Huiling Hao, et al.
Pattern Recognition (2022) Vol. 135, pp. 109148-109148
Closed Access | Times Cited: 26
Adversarial Learning Domain-Invariant Conditional Features for Robust Face Anti-spoofing
Fangling Jiang, Qi Li, Pengcheng Liu, et al.
International Journal of Computer Vision (2023) Vol. 131, Iss. 7, pp. 1680-1703
Closed Access | Times Cited: 15
Fangling Jiang, Qi Li, Pengcheng Liu, et al.
International Journal of Computer Vision (2023) Vol. 131, Iss. 7, pp. 1680-1703
Closed Access | Times Cited: 15
LBP and CNN feature fusion for face anti-spoofing
Ravi Pratap Singh, Ratnakar Dash, Ramesh Kumar Mohapatra
Pattern Analysis and Applications (2023) Vol. 26, Iss. 2, pp. 773-782
Closed Access | Times Cited: 13
Ravi Pratap Singh, Ratnakar Dash, Ramesh Kumar Mohapatra
Pattern Analysis and Applications (2023) Vol. 26, Iss. 2, pp. 773-782
Closed Access | Times Cited: 13
Face anti-spoofing via jointly modeling local texture and constructed depth
Lei Li, Zhihao Yao, Shanshan Gao, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108345-108345
Closed Access | Times Cited: 5
Lei Li, Zhihao Yao, Shanshan Gao, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108345-108345
Closed Access | Times Cited: 5
Task-Specific Importance-Awareness Matters: On Targeted Attacks against Object Detection
Xuxiang Sun, Gong Cheng, Hongda Li, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2024) Vol. 34, Iss. 11, pp. 11619-11629
Closed Access | Times Cited: 5
Xuxiang Sun, Gong Cheng, Hongda Li, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2024) Vol. 34, Iss. 11, pp. 11619-11629
Closed Access | Times Cited: 5
Deep transfer across domains for face antispoofing
Xiaoguang Tu, Hengsheng Zhang, Mei Xie, et al.
Journal of Electronic Imaging (2019) Vol. 28, Iss. 04, pp. 1-1
Open Access | Times Cited: 38
Xiaoguang Tu, Hengsheng Zhang, Mei Xie, et al.
Journal of Electronic Imaging (2019) Vol. 28, Iss. 04, pp. 1-1
Open Access | Times Cited: 38
From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing
Yahang Wang, Xiaoning Song, Tianyang Xu, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 4280-4290
Open Access | Times Cited: 31
Yahang Wang, Xiaoning Song, Tianyang Xu, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 4280-4290
Open Access | Times Cited: 31
Multi-domain Learning for Updating Face Anti-spoofing Models
Xiao Guo, Yaojie Liu, Anil K. Jain, et al.
Lecture notes in computer science (2022), pp. 230-249
Open Access | Times Cited: 19
Xiao Guo, Yaojie Liu, Anil K. Jain, et al.
Lecture notes in computer science (2022), pp. 230-249
Open Access | Times Cited: 19
Face spoofing detection based on multi-scale color inversion dual-stream convolutional neural network
Xin Shu, Xiaojie Li, Xin Zuo, et al.
Expert Systems with Applications (2023) Vol. 224, pp. 119988-119988
Closed Access | Times Cited: 11
Xin Shu, Xiaojie Li, Xin Zuo, et al.
Expert Systems with Applications (2023) Vol. 224, pp. 119988-119988
Closed Access | Times Cited: 11
A Novel Deep Learning Architecture With Image Diffusion for Robust Face Presentation Attack Detection
Madini O. Alassafi, Muhammad Sohail Ibrahim, Imran Naseem, et al.
IEEE Access (2023) Vol. 11, pp. 59204-59216
Open Access | Times Cited: 11
Madini O. Alassafi, Muhammad Sohail Ibrahim, Imran Naseem, et al.
IEEE Access (2023) Vol. 11, pp. 59204-59216
Open Access | Times Cited: 11
A novel texture descriptor using machine learning for face anti-spoofing detection
Mohamed A. El-Rashidy, Amira E. Enab, Salah Elagooz, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Mohamed A. El-Rashidy, Amira E. Enab, Salah Elagooz, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Improving the transferability of adversarial examples through semantic-mixup inputs
Fubao Gan, Yan Wo
Knowledge-Based Systems (2025), pp. 113325-113325
Closed Access
Fubao Gan, Yan Wo
Knowledge-Based Systems (2025), pp. 113325-113325
Closed Access
A two stream face anti-spoofing framework using multi-level deep features and ELBP features
Aashania Antil, Chhavi Dhiman
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1361-1376
Closed Access | Times Cited: 9
Aashania Antil, Chhavi Dhiman
Multimedia Systems (2023) Vol. 29, Iss. 3, pp. 1361-1376
Closed Access | Times Cited: 9
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping
Yunming Zhang, Dengpan Ye, Caiyun Xie, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4628-4641
Open Access | Times Cited: 3
Yunming Zhang, Dengpan Ye, Caiyun Xie, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4628-4641
Open Access | Times Cited: 3
FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing
Tong Qiao, WU Jia-sheng, Ning Zheng, et al.
IEEE Transactions on Multimedia (2022) Vol. 25, pp. 7350-7363
Closed Access | Times Cited: 15
Tong Qiao, WU Jia-sheng, Ning Zheng, et al.
IEEE Transactions on Multimedia (2022) Vol. 25, pp. 7350-7363
Closed Access | Times Cited: 15
Enhancing Transferability of Adversarial Examples through Mixed-Frequency Inputs
Yaguan Qian, Kecheng Chen, Bin Wang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7633-7645
Closed Access | Times Cited: 2
Yaguan Qian, Kecheng Chen, Bin Wang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7633-7645
Closed Access | Times Cited: 2