
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Mitigating Iris-Based Replay Attacks
Joseph Shelton, Kaushik Roy, Brian O’Connor, et al.
International Journal of Machine Learning and Computing (2014) Vol. 4, Iss. 3, pp. 204-209
Open Access | Times Cited: 21
Joseph Shelton, Kaushik Roy, Brian O’Connor, et al.
International Journal of Machine Learning and Computing (2014) Vol. 4, Iss. 3, pp. 204-209
Open Access | Times Cited: 21
Showing 21 citing articles:
Synthesizing Iris Images Using RaSGAN With Application in Presentation Attack Detection
Shivangi Yadav, Cunjian Chen, Arun Ross
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019), pp. 2422-2430
Closed Access | Times Cited: 41
Shivangi Yadav, Cunjian Chen, Arun Ross
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019), pp. 2422-2430
Closed Access | Times Cited: 41
Palm Print Authentication on a Cloud Platform
Joseph Shelton, Christopher Rice, Jasmeet Singh, et al.
(2018), pp. 1-6
Closed Access | Times Cited: 32
Joseph Shelton, Christopher Rice, Jasmeet Singh, et al.
(2018), pp. 1-6
Closed Access | Times Cited: 32
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes
Yongdong Wu, Jian Weng, Zhengxia Wang, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 2, pp. 1744-1755
Closed Access | Times Cited: 17
Yongdong Wu, Jian Weng, Zhengxia Wang, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 2, pp. 1744-1755
Closed Access | Times Cited: 17
Privacy and biometrics for smart healthcare systems: attacks, and techniques
Alec Wells, Aminu K. Bello
Information Security Journal A Global Perspective (2023) Vol. 33, Iss. 3, pp. 307-331
Open Access | Times Cited: 7
Alec Wells, Aminu K. Bello
Information Security Journal A Global Perspective (2023) Vol. 33, Iss. 3, pp. 307-331
Open Access | Times Cited: 7
A survey of attacks on iris biometric systems
Richa Gupta, Priti Sehgal
International Journal of Biometrics (2016) Vol. 8, Iss. 2, pp. 145-145
Closed Access | Times Cited: 18
Richa Gupta, Priti Sehgal
International Journal of Biometrics (2016) Vol. 8, Iss. 2, pp. 145-145
Closed Access | Times Cited: 18
Non-deterministic approach to allay replay attack on iris biometric
Richa Gupta, Priti Sehgal
Pattern Analysis and Applications (2018) Vol. 22, Iss. 2, pp. 717-729
Closed Access | Times Cited: 10
Richa Gupta, Priti Sehgal
Pattern Analysis and Applications (2018) Vol. 22, Iss. 2, pp. 717-729
Closed Access | Times Cited: 10
PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response
Long Huang, Chen Wang
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 1034-1048
Closed Access | Times Cited: 6
Long Huang, Chen Wang
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 1034-1048
Closed Access | Times Cited: 6
Federated protocol for biometric authentication and access control
William Nick, Joseph Shelton, Cory Sabol, et al.
2017 Computing Conference (2017), pp. 854-862
Closed Access | Times Cited: 7
William Nick, Joseph Shelton, Cory Sabol, et al.
2017 Computing Conference (2017), pp. 854-862
Closed Access | Times Cited: 7
HsIrisNet: Histogram Based Iris Recognition to Allay Replay and Template Attack Using Deep Learning Perspective
Richa Gupta, Priti Sehgal
Pattern Recognition and Image Analysis (2020) Vol. 30, Iss. 4, pp. 786-794
Closed Access | Times Cited: 5
Richa Gupta, Priti Sehgal
Pattern Recognition and Image Analysis (2020) Vol. 30, Iss. 4, pp. 786-794
Closed Access | Times Cited: 5
A Complete End-to-End System for Iris Recognition to Mitigate Replay and Template Attack
Richa Gupta, Priti Sehgal
Advances in intelligent systems and computing (2019), pp. 571-582
Closed Access | Times Cited: 4
Richa Gupta, Priti Sehgal
Advances in intelligent systems and computing (2019), pp. 571-582
Closed Access | Times Cited: 4
A comparison of genetic based extraction methods for periocular recognition
John Jenkins, Joseph Shelton, Kaushik Roy
(2016)
Closed Access | Times Cited: 3
John Jenkins, Joseph Shelton, Kaushik Roy
(2016)
Closed Access | Times Cited: 3
Behaviors Speak More: Achieving User Authentication Leveraging Facial Activities via mmWave Sensing
Chenxu Jiang, Sihan Yu, Jingjing Fu, et al.
(2024), pp. 169-183
Open Access
Chenxu Jiang, Sihan Yu, Jingjing Fu, et al.
(2024), pp. 169-183
Open Access
One-time password for biometric systems: disposable feature templates
John Jenkins, Joseph Shelton, Kaushik Roy
SoutheastCon (2017), pp. 1-4
Closed Access | Times Cited: 3
John Jenkins, Joseph Shelton, Kaushik Roy
SoutheastCon (2017), pp. 1-4
Closed Access | Times Cited: 3
Palm Print Identification and Verification Using a Genetic-Based Feature Extraction Technique
Joseph Shelton, John Jenkins, Kaushik Roy
Lecture notes in computer science (2016), pp. 63-68
Closed Access | Times Cited: 2
Joseph Shelton, John Jenkins, Kaushik Roy
Lecture notes in computer science (2016), pp. 63-68
Closed Access | Times Cited: 2
A federated protocol for active authentication
William Nick, Alaysia Murphy, Cory Sabol, et al.
SoutheastCon (2017), pp. 1-2
Closed Access | Times Cited: 2
William Nick, Alaysia Murphy, Cory Sabol, et al.
SoutheastCon (2017), pp. 1-2
Closed Access | Times Cited: 2
A Non-deterministic Approach to Mitigate Replay Attack and Database Attack Simultaneously on Iris Recognition System
Richa Gupta, Priti Sehgal
Lecture notes in computer science (2018), pp. 239-250
Closed Access | Times Cited: 2
Richa Gupta, Priti Sehgal
Lecture notes in computer science (2018), pp. 239-250
Closed Access | Times Cited: 2
Micro Genetic and Evolutionary Feature Extraction: An Exploratory Data Analysis Approach for Multispectral Iris Recognition
Pablo Arias, Joseph Shelton, Kaushik Roy, et al.
Lecture notes in computer science (2015), pp. 178-185
Closed Access | Times Cited: 1
Pablo Arias, Joseph Shelton, Kaushik Roy, et al.
Lecture notes in computer science (2015), pp. 178-185
Closed Access | Times Cited: 1
Iris Recognition Using Selective Feature Set in Frequency Domain Using Deep Learning Perspective: FrDIrisNet
Richa Gupta, Priti Sehgal
Algorithms for intelligent systems (2021), pp. 249-259
Closed Access | Times Cited: 1
Richa Gupta, Priti Sehgal
Algorithms for intelligent systems (2021), pp. 249-259
Closed Access | Times Cited: 1
Multispectral Recognition Using Genetic and Evolutionary Feature Extraction.
Pablo Arias, Joseph Shelton, Kaushik Roy, et al.
MAICS (2015), pp. 19-24
Closed Access
Pablo Arias, Joseph Shelton, Kaushik Roy, et al.
MAICS (2015), pp. 19-24
Closed Access
A Secure Iris Biometric Recognition System
Richa Gupta, Priti Sehgal
Advances in information security, privacy, and ethics book series (2019), pp. 95-115
Closed Access
Richa Gupta, Priti Sehgal
Advances in information security, privacy, and ethics book series (2019), pp. 95-115
Closed Access
An Improved Authentication Scheme for Wireless Sensor Network Using User Biometrics
N. Ambika
Advances in information security, privacy, and ethics book series (2021), pp. 220-234
Closed Access
N. Ambika
Advances in information security, privacy, and ethics book series (2021), pp. 220-234
Closed Access