OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Exploring Frequency Adversarial Attacks for Face Forgery Detection
Shuai Jia, Chao Ma, Taiping Yao, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2022)
Open Access | Times Cited: 50

Showing 1-25 of 50 citing articles:

Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou, Qing Guo, Yihao Huang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023), pp. 12271-12280
Open Access | Times Cited: 26

Frequency-aware Feature Fusion for Dense Image Prediction
Linwei Chen, Ying Fu, Lin Gu, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2024) Vol. 46, Iss. 12, pp. 10763-10780
Open Access | Times Cited: 7

DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios
Zuomin Qu, Zuping Xi, Wei Lu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3943-3957
Closed Access | Times Cited: 6

Imperceptible Adversarial Attack via Invertible Neural Networks
Zihan Chen, Ziyue Wang, Junjie Huang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 1, pp. 414-424
Open Access | Times Cited: 15

Generalization of Forgery Detection With Meta Deepfake Detection Model
Van-Nhan Tran, Seong-Geun Kwon, Suk‐Hwan Lee, et al.
IEEE Access (2022) Vol. 11, pp. 535-546
Open Access | Times Cited: 19

Improving model generalization by on-manifold adversarial augmentation in the frequency domain
Chang Liu, Wenzhao Xiang, Yuan He, et al.
Journal of Visual Communication and Image Representation (2025), pp. 104437-104437
Closed Access

FD-GAN: Generalizable and Robust Forgery Detection via Generative Adversarial Networks
Nanqing Xu, Weiwei Feng, Tianzhu Zhang, et al.
International Journal of Computer Vision (2024) Vol. 132, Iss. 12, pp. 5801-5819
Closed Access | Times Cited: 3

Visual Embedding Augmentation in Fourier Domain for Deep Metric Learning
Zheng Wang, Zhenwei Gao, Guoqing Wang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 10, pp. 5538-5548
Closed Access | Times Cited: 9

Federated finger vein presentation attack detection for various clients
Hengyu Mu, Jian Guo, Xingli Liu, et al.
IET Computer Vision (2024) Vol. 18, Iss. 7, pp. 935-949
Open Access | Times Cited: 2

A Comprehensive Risk Analysis Method for Adversarial Attacks on Biometric Authentication Systems
S. H. Park, Soo-Hyun Lee, Min Young Lim, et al.
IEEE Access (2024) Vol. 12, pp. 116693-116710
Open Access | Times Cited: 2

Frequency-aware GAN for Adversarial Manipulation Generation
Peifei Zhu, Genki Osada, Hirokatsu Kataoka, et al.
2021 IEEE/CVF International Conference on Computer Vision (ICCV) (2023), pp. 4292-4301
Closed Access | Times Cited: 5

Vulnerable point detection and repair against adversarial attacks for convolutional neural networks
Jie Gao, Zhaoqiang Xia, Jing Dai, et al.
International Journal of Machine Learning and Cybernetics (2023) Vol. 14, Iss. 12, pp. 4163-4192
Closed Access | Times Cited: 4

Discrepancy-Guided Reconstruction Learning for Image Forgery Detection
Zenan Shi, Haipeng Chen, Long Chen, et al.
(2023), pp. 1387-1395
Open Access | Times Cited: 4

Adversarial Attacks on Scene Graph Generation
Mengnan Zhao, Lihe Zhang, Wei Wang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3210-3225
Closed Access | Times Cited: 1

TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution
Mengjie Wu, Jingui Ma, Run Wang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 18, pp. 19965-19973
Open Access | Times Cited: 1

Meta Invariance Defense Towards Generalizable Robustness to Unknown Adversarial Attacks
Lei Zhang, Yuhang Zhou, Yi Yang, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2024) Vol. 46, Iss. 10, pp. 6669-6687
Open Access | Times Cited: 1

Artifact feature purification for cross-domain detection of AI-generated images
Zheling Meng, Bo Peng, Jing Dong, et al.
Computer Vision and Image Understanding (2024) Vol. 247, pp. 104078-104078
Open Access | Times Cited: 1

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape
Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 91-109
Closed Access | Times Cited: 1

StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model
Ziyin Zhou, Ke Sun, Zhongxi Chen, et al.
(2024), pp. 3627-3636
Closed Access | Times Cited: 1

PolyGlotFake: A Novel Multilingual and Multimodal DeepFake Dataset
Yang Hou, Haitao Fu, Chunkai Chen, et al.
Lecture notes in computer science (2024), pp. 180-193
Closed Access | Times Cited: 1

Improving Adversarial Transferability via Frequency-based Stationary Point Search
Zhiyu Zhu, Huaming Chen, Jiayu Zhang, et al.
(2023), pp. 3626-3635
Closed Access | Times Cited: 3

Learning to Distill Global Representation for Sparse-View CT
Zilong Li, Chenglong Ma, Jie Chen, et al.
2021 IEEE/CVF International Conference on Computer Vision (ICCV) (2023) Vol. 33, pp. 21139-21150
Open Access | Times Cited: 3

An attention-erasing stripe pyramid network for face forgery detection
Zhenwu Hu, Qianyue Duan, PeiYu Zhang, et al.
Signal Image and Video Processing (2023) Vol. 17, Iss. 8, pp. 4123-4131
Open Access | Times Cited: 2

Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack
Rui Zhang, Hui Xia, Zi Kang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25625-25636
Closed Access

Frequency-constrained transferable adversarial attack on image manipulation detection and localization
Yijia Zeng, Chi‐Man Pun
The Visual Computer (2024) Vol. 40, Iss. 7, pp. 4817-4828
Closed Access

Page 1 - Next Page

Scroll to top