
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
Kashif Shaheed, Piotr Szczuko, Munish Kumar, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107569-107569
Closed Access | Times Cited: 26
Kashif Shaheed, Piotr Szczuko, Munish Kumar, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107569-107569
Closed Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions
Abdul Ahad, Zheng Jiangbina, Mohammad Tahir, et al.
Internet of Things (2024) Vol. 25, pp. 101068-101068
Closed Access | Times Cited: 36
Abdul Ahad, Zheng Jiangbina, Mohammad Tahir, et al.
Internet of Things (2024) Vol. 25, pp. 101068-101068
Closed Access | Times Cited: 36
AI-powered biometrics for Internet of Things security: A review and future vision
Ali Ismail Awad, Aiswarya Babu, Ezedin Barka, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103748-103748
Closed Access | Times Cited: 31
Ali Ismail Awad, Aiswarya Babu, Ezedin Barka, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103748-103748
Closed Access | Times Cited: 31
Interpretability of fingerprint presentation attack detection systems: a look at the “representativeness” of samples against never-seen-before attacks
Simone Carta, Roberto Casula, Giulia Orrù, et al.
Machine Vision and Applications (2025) Vol. 36, Iss. 2
Open Access | Times Cited: 1
Simone Carta, Roberto Casula, Giulia Orrù, et al.
Machine Vision and Applications (2025) Vol. 36, Iss. 2
Open Access | Times Cited: 1
LUTBIO: A Comprehensive multimodal biometric database targeting middle-aged and elderly populations for enhanced identity authentication
Rui Yang, Qiuyu Zhang, Lingtao Meng, et al.
Information Fusion (2025), pp. 102945-102945
Closed Access
Rui Yang, Qiuyu Zhang, Lingtao Meng, et al.
Information Fusion (2025), pp. 102945-102945
Closed Access
Spoofing Attacks Utilizing a More Realistic Contactless Palm Vein Correction Algorithm
Jianbin Wang, Dacan Luo, R. H. Chen, et al.
Lecture notes in computer science (2025), pp. 89-99
Closed Access
Jianbin Wang, Dacan Luo, R. H. Chen, et al.
Lecture notes in computer science (2025), pp. 89-99
Closed Access
Dimensionality Reduction in Multicepstral Features for Voice Spoofing Detection: Case Studies with Singular Value Decomposition, Genetic Algorithm, and Auto-Encoder
Rodrigo Colnago Contreras, Amanda Fonseca Campanharo, Monique Simplicio Viana, et al.
Lecture notes in computer science (2025), pp. 227-244
Closed Access
Rodrigo Colnago Contreras, Amanda Fonseca Campanharo, Monique Simplicio Viana, et al.
Lecture notes in computer science (2025), pp. 227-244
Closed Access
Exploring possibilistic fingerprint image quality analysis: a soft computing approach for biometric database management
Sonda Ammar Bouhamed
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Sonda Ammar Bouhamed
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Oceanic biometric recognition algorithm based on generalized zero shot learning
Hao Tang, Dekai Li, Ahsan Ahmed Nizamani, et al.
Elsevier eBooks (2025), pp. 249-262
Closed Access
Hao Tang, Dekai Li, Ahsan Ahmed Nizamani, et al.
Elsevier eBooks (2025), pp. 249-262
Closed Access
A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms
K. Saranya, A. Valarmathi
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
K. Saranya, A. Valarmathi
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A Robust Behavioral Biometrics Framework for Smartphone Authentication via Hybrid Machine Learning and TOPSIS
Moceheb Lazam Shuwandy, Qutaiba Alasad, Maytham M. Hammood, et al.
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 20-20
Open Access
Moceheb Lazam Shuwandy, Qutaiba Alasad, Maytham M. Hammood, et al.
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 20-20
Open Access
A Comprehensive Risk Analysis Method for Adversarial Attacks on Biometric Authentication Systems
S. H. Park, Soo-Hyun Lee, Min Young Lim, et al.
IEEE Access (2024) Vol. 12, pp. 116693-116710
Open Access | Times Cited: 2
S. H. Park, Soo-Hyun Lee, Min Young Lim, et al.
IEEE Access (2024) Vol. 12, pp. 116693-116710
Open Access | Times Cited: 2
Efficient face anti-spoofing via head-aware transformer based knowledge distillation with 5 MB model parameters
Jun Zhang, Yunfei Zhang, Feixue Shao, et al.
Applied Soft Computing (2024) Vol. 166, pp. 112237-112237
Closed Access | Times Cited: 2
Jun Zhang, Yunfei Zhang, Feixue Shao, et al.
Applied Soft Computing (2024) Vol. 166, pp. 112237-112237
Closed Access | Times Cited: 2
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology
Oussama Mounnan, Larbi Boubchir, Otman Manad, et al.
Computer Standards & Interfaces (2024), pp. 103929-103929
Closed Access | Times Cited: 2
Oussama Mounnan, Larbi Boubchir, Otman Manad, et al.
Computer Standards & Interfaces (2024), pp. 103929-103929
Closed Access | Times Cited: 2
Biometric Systems: A Comprehensive Review
Rebin Abdulkareem Hamaamin
BASRA JOURNAL OF SCIENCE (2024) Vol. 42, Iss. 1
Open Access | Times Cited: 1
Rebin Abdulkareem Hamaamin
BASRA JOURNAL OF SCIENCE (2024) Vol. 42, Iss. 1
Open Access | Times Cited: 1
A deep learning-driven fingerprint verification model for enhancing exam integrity in Moroccan higher education
Siham Essahraui, Ibrahim Ouahbi, Khalid El Makkaoui, et al.
Information Security Journal A Global Perspective (2024), pp. 1-13
Closed Access | Times Cited: 1
Siham Essahraui, Ibrahim Ouahbi, Khalid El Makkaoui, et al.
Information Security Journal A Global Perspective (2024), pp. 1-13
Closed Access | Times Cited: 1
Enhanced Security Paradigms: Converging IoT and Biometrics for Advanced Locker Protection
Muhammad Zulfiqar, Ijaz Younis
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33811-33819
Closed Access | Times Cited: 1
Muhammad Zulfiqar, Ijaz Younis
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33811-33819
Closed Access | Times Cited: 1
Extending the theory of information poverty to deepfake technology
Walter Matli
International Journal of Information Management Data Insights (2024) Vol. 4, Iss. 2, pp. 100286-100286
Open Access | Times Cited: 1
Walter Matli
International Journal of Information Management Data Insights (2024) Vol. 4, Iss. 2, pp. 100286-100286
Open Access | Times Cited: 1
Deep learning techniques for hand vein biometrics: A comprehensive review
Mustapha Hemis, Hamza Kheddar, Sami Bourouis, et al.
Information Fusion (2024), pp. 102716-102716
Closed Access | Times Cited: 1
Mustapha Hemis, Hamza Kheddar, Sami Bourouis, et al.
Information Fusion (2024), pp. 102716-102716
Closed Access | Times Cited: 1
Vision transformer for contactless fingerprint classification
Pooja Kaplesh, Aastha Gupta, Divya Bansal, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Pooja Kaplesh, Aastha Gupta, Divya Bansal, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Advancements and challenges in fingerprint presentation attack detection: a systematic literature review
Divine Senanu Ametefe, Suzi Seroja Sarnin, Darmawaty Mohd Ali, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Divine Senanu Ametefe, Suzi Seroja Sarnin, Darmawaty Mohd Ali, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Inspired Detection Model For Clustering Based Surveillance System: A Non-Conventional Review
Anil Kumar Gupta, Rupak Sharma, Rudra Pratap Ojha
(2024) Vol. 10, pp. 369-375
Closed Access
Anil Kumar Gupta, Rupak Sharma, Rudra Pratap Ojha
(2024) Vol. 10, pp. 369-375
Closed Access
Design and Analysis of Image Forgery Detection System Using Deep Learning
Indu Sharma, Anuj Kumar, Manika Manwal
(2024), pp. 1519-1524
Closed Access
Indu Sharma, Anuj Kumar, Manika Manwal
(2024), pp. 1519-1524
Closed Access
Data Guardians
Ahmet Okan Arik, Büşra Özdenizci
Advances in information security, privacy, and ethics book series (2024), pp. 102-123
Closed Access
Ahmet Okan Arik, Büşra Özdenizci
Advances in information security, privacy, and ethics book series (2024), pp. 102-123
Closed Access
Evaluating Feature Selection Techniques with Deep Learning Approach in Cancer Diagnosis
Nirmal Saraswat, Prashant Kumar, Jyoti Joshi, et al.
(2024), pp. 930-935
Closed Access
Nirmal Saraswat, Prashant Kumar, Jyoti Joshi, et al.
(2024), pp. 930-935
Closed Access
Resource-constrained edge-based deep learning for real-time person-identification using foot-pad
Dong Hyuk Heo, Sung Ho Park, Soon Ju Kang
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109290-109290
Open Access
Dong Hyuk Heo, Sung Ho Park, Soon Ju Kang
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109290-109290
Open Access