
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities
Jia Wen Seow, Mei Kuan Lim, Raphaël C.‐W. Phan, et al.
Neurocomputing (2022) Vol. 513, pp. 351-371
Closed Access | Times Cited: 72
Jia Wen Seow, Mei Kuan Lim, Raphaël C.‐W. Phan, et al.
Neurocomputing (2022) Vol. 513, pp. 351-371
Closed Access | Times Cited: 72
Showing 1-25 of 72 citing articles:
Typology of Risks of Generative Text-to-Image Models
Charlotte Bird, Eddie L. Ungless, Atoosa Kasirzadeh
(2023), pp. 396-410
Open Access | Times Cited: 51
Charlotte Bird, Eddie L. Ungless, Atoosa Kasirzadeh
(2023), pp. 396-410
Open Access | Times Cited: 51
A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models
Arash Heidari, Nima Jafari Navimipour, Hasan Dağ, et al.
Cognitive Computation (2024) Vol. 16, Iss. 3, pp. 1073-1091
Open Access | Times Cited: 43
Arash Heidari, Nima Jafari Navimipour, Hasan Dağ, et al.
Cognitive Computation (2024) Vol. 16, Iss. 3, pp. 1073-1091
Open Access | Times Cited: 43
Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions
A. Nait-Ali, Mohammed Ridouani, Fatima Salahdine, et al.
Computers (2023) Vol. 12, Iss. 10, pp. 216-216
Open Access | Times Cited: 36
A. Nait-Ali, Mohammed Ridouani, Fatima Salahdine, et al.
Computers (2023) Vol. 12, Iss. 10, pp. 216-216
Open Access | Times Cited: 36
A Review of Deep Learning-based Approaches for Deepfake Content Detection
Leandro A. Passos, Danilo Jodas, Kelton Augusto Pontara da Costa, et al.
Authorea (Authorea) (2023)
Open Access | Times Cited: 25
Leandro A. Passos, Danilo Jodas, Kelton Augusto Pontara da Costa, et al.
Authorea (Authorea) (2023)
Open Access | Times Cited: 25
A review of deep learning‐based approaches for deepfake content detection
Leandro A. Passos, Danilo Samuel Jodas, Kelton Augusto Pontara da Costa, et al.
Expert Systems (2024) Vol. 41, Iss. 8
Open Access | Times Cited: 15
Leandro A. Passos, Danilo Samuel Jodas, Kelton Augusto Pontara da Costa, et al.
Expert Systems (2024) Vol. 41, Iss. 8
Open Access | Times Cited: 15
Unmasking deepfakes: A systematic review of deepfake detection and generation techniques using artificial intelligence
Fakhar Abbas, Araz Taeihagh
Expert Systems with Applications (2024) Vol. 252, pp. 124260-124260
Open Access | Times Cited: 13
Fakhar Abbas, Araz Taeihagh
Expert Systems with Applications (2024) Vol. 252, pp. 124260-124260
Open Access | Times Cited: 13
Navigating the Dual Nature of Deepfakes: Ethical, Legal, and Technological Perspectives on Generative Artificial Intelligence AI) Technology
International Journal of Scientific Research and Modern Technology. (2024) Vol. 3, Iss. 10, pp. 19-38
Open Access | Times Cited: 10
International Journal of Scientific Research and Modern Technology. (2024) Vol. 3, Iss. 10, pp. 19-38
Open Access | Times Cited: 10
Deepfake Detection using Integrate-backward-integrate Logic Optimization Algorithm with CNN
R. Uma Maheshwari, B. Paulchamy, Arun Meyyazhagan, et al.
International Journal of Electrical and Electronics Research (2024) Vol. 12, Iss. 2, pp. 696-710
Open Access | Times Cited: 9
R. Uma Maheshwari, B. Paulchamy, Arun Meyyazhagan, et al.
International Journal of Electrical and Electronics Research (2024) Vol. 12, Iss. 2, pp. 696-710
Open Access | Times Cited: 9
Network Security Management in Heterogeneous Networks
Tao Zhang, Xiangyun Tang, Jiacheng Wang, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 568-568
Open Access | Times Cited: 1
Tao Zhang, Xiangyun Tang, Jiacheng Wang, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 568-568
Open Access | Times Cited: 1
Advances in DeepFake detection algorithms: Exploring fusion techniques in single and multi-modal approach
Ashish Kumar, Divya Singh, Rachna Jain, et al.
Information Fusion (2025), pp. 102993-102993
Closed Access | Times Cited: 1
Ashish Kumar, Divya Singh, Rachna Jain, et al.
Information Fusion (2025), pp. 102993-102993
Closed Access | Times Cited: 1
Is it really unreal? A two-theory approach on the impact of deepfakes technology on the protection motivation of consumers
Dhanya Pramod, Kanchan Patil, S. Vijayakumar Bharathi
Cogent Business & Management (2025) Vol. 12, Iss. 1
Open Access | Times Cited: 1
Dhanya Pramod, Kanchan Patil, S. Vijayakumar Bharathi
Cogent Business & Management (2025) Vol. 12, Iss. 1
Open Access | Times Cited: 1
Fact or fake? The search for truth in an infodemic of disinformation, misinformation, and malinformation with deepfake and fake news
Weng Marc Lim
Journal of Strategic Marketing (2023), pp. 1-37
Open Access | Times Cited: 22
Weng Marc Lim
Journal of Strategic Marketing (2023), pp. 1-37
Open Access | Times Cited: 22
A comprehensive survey of multimodal fake news detection techniques: advances, challenges, and opportunities
Shivani Tufchi, Ashima Yadav, Tanveer Ahmed
International Journal of Multimedia Information Retrieval (2023) Vol. 12, Iss. 2
Closed Access | Times Cited: 19
Shivani Tufchi, Ashima Yadav, Tanveer Ahmed
International Journal of Multimedia Information Retrieval (2023) Vol. 12, Iss. 2
Closed Access | Times Cited: 19
Video and Audio Deepfake Datasets and Open Issues in Deepfake Technology: Being Ahead of the Curve
Zahid Akhtar, Thanvi Lahari Pendyala, Virinchi Sai Athmakuri
Forensic Sciences (2024) Vol. 4, Iss. 3, pp. 289-377
Open Access | Times Cited: 8
Zahid Akhtar, Thanvi Lahari Pendyala, Virinchi Sai Athmakuri
Forensic Sciences (2024) Vol. 4, Iss. 3, pp. 289-377
Open Access | Times Cited: 8
Post-mortem information management: exploring contextual factors in appropriate personal data access after death
Jack Holt, Jan David Smeddinck, James Nicholson, et al.
Human-Computer Interaction (2024), pp. 1-36
Open Access | Times Cited: 5
Jack Holt, Jan David Smeddinck, James Nicholson, et al.
Human-Computer Interaction (2024), pp. 1-36
Open Access | Times Cited: 5
Deepfake: definitions, performance metrics and standards, datasets, and a meta-review
Enes Altuncu, Virginia N. L. Franqueira, Shujun Li
Frontiers in Big Data (2024) Vol. 7
Open Access | Times Cited: 5
Enes Altuncu, Virginia N. L. Franqueira, Shujun Li
Frontiers in Big Data (2024) Vol. 7
Open Access | Times Cited: 5
Semantic and style based multiple reference learning for artistic and general image aesthetic assessment
Tengfei Shi, Chenglizhao Chen, Xuan Li, et al.
Neurocomputing (2024) Vol. 582, pp. 127434-127434
Closed Access | Times Cited: 4
Tengfei Shi, Chenglizhao Chen, Xuan Li, et al.
Neurocomputing (2024) Vol. 582, pp. 127434-127434
Closed Access | Times Cited: 4
Criminal Liability of Artificial Intelligence-Generated Deepfakes in India
Shambhu Prasad Chakrabarty, Shrabana Chattopadhyay
Lecture notes in networks and systems (2025), pp. 233-250
Closed Access
Shambhu Prasad Chakrabarty, Shrabana Chattopadhyay
Lecture notes in networks and systems (2025), pp. 233-250
Closed Access
Exploring the Nexus of Deepfakes and VFX Technology: Unveiling Insights, Challenges, and Innovations
Prashant Vats, Ajay Kumar Phogat, Surabhi Shanker, et al.
Lecture notes in electrical engineering (2025), pp. 393-403
Closed Access
Prashant Vats, Ajay Kumar Phogat, Surabhi Shanker, et al.
Lecture notes in electrical engineering (2025), pp. 393-403
Closed Access
A spatio-frequency cross fusion model for deepfake detection and segmentation
Junshuai Zheng, Yichao Zhou, Ning Zhang, et al.
Neurocomputing (2025), pp. 129683-129683
Closed Access
Junshuai Zheng, Yichao Zhou, Ning Zhang, et al.
Neurocomputing (2025), pp. 129683-129683
Closed Access
Deep Fakes and Political Attitudes: An Analysis of Confirmation Bias and Cognitive Dissonance Using Neurophysiological Measurements
Jörg Ebner, Bernhard Lutz, Dirk Neumann
Lecture notes in information systems and organisation (2025), pp. 299-311
Closed Access
Jörg Ebner, Bernhard Lutz, Dirk Neumann
Lecture notes in information systems and organisation (2025), pp. 299-311
Closed Access
Dual residual learning of frequency fingerprints in detecting synthesized biomedical imagery
Misaj Sharafudeen, S. S. Vinod Chandra
Applied Soft Computing (2025) Vol. 173, pp. 112930-112930
Closed Access
Misaj Sharafudeen, S. S. Vinod Chandra
Applied Soft Computing (2025) Vol. 173, pp. 112930-112930
Closed Access
Deepfake Insects? Deciding How to Respond to a New Threat to Taxonomy
Grant D. De Jong, Bob Fischer
American Entomologist (2025) Vol. 71, Iss. 1, pp. 20-22
Closed Access
Grant D. De Jong, Bob Fischer
American Entomologist (2025) Vol. 71, Iss. 1, pp. 20-22
Closed Access
ReenactFaces: A Specialized Dataset for Reenactment-Based Deepfake Detection
Vazgken Vanian, Georgios Petmezas, Konstantinos Konstantoudakis, et al.
Lecture notes on data engineering and communications technologies (2025), pp. 385-394
Closed Access
Vazgken Vanian, Georgios Petmezas, Konstantinos Konstantoudakis, et al.
Lecture notes on data engineering and communications technologies (2025), pp. 385-394
Closed Access
Identifying individual differences in deepfake discernment: the effects of cognitive disposition and visual literacy
X.Y. Jin, Guoyan Wang, Zhuoyue Zhang, et al.
Information Communication & Society (2025), pp. 1-20
Closed Access
X.Y. Jin, Guoyan Wang, Zhuoyue Zhang, et al.
Information Communication & Society (2025), pp. 1-20
Closed Access