OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou, Qing Guo, Yihao Huang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023), pp. 12271-12280
Open Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models
Yihao Huang, Felix Juefei-Xu, Qing Guo, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 19, pp. 21169-21178
Open Access | Times Cited: 6

Light the Night: A Multi-Condition Diffusion Framework for Unpaired Low-Light Enhancement in Autonomous Driving
Jinlong Li, Baolu Li, Zhengzhong Tu, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024) Vol. 35, pp. 15205-15215
Closed Access | Times Cited: 5

Exploring Autonomous Methods for Deepfake Detection: A Detailed Survey on Techniques and Evaluation
Reshma Sunil, Parita Mer, Anjali Diwan, et al.
Heliyon (2025), pp. e42273-e42273
Open Access

JailGuard : A Universal Detection Framework for Prompt-based Attacks on LLM Systems
Xiaoyu Zhang, Cen Zhang, Tianlin Li, et al.
ACM Transactions on Software Engineering and Methodology (2025)
Closed Access

Generating Higher-Quality Anti-Forensics DeepFakes with Adversarial Sharpening Mask
Bing Fan, Feng Ding, Guopu Zhu, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access

Investigating the Transferability and Robustness of Adversarial Attacks Between Standard and Dilated CNN Architectures
Sachin Sharma, Jiho Noh, Michail S. Alexiou
Lecture notes on data engineering and communications technologies (2025), pp. 113-126
Closed Access

Dodging DeepFake Detection via Implicit Spatial-Domain Notch Filtering
Yihao Huang, Felix Juefei-Xu, Qing Guo, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 34, Iss. 8, pp. 6949-6962
Open Access | Times Cited: 9

Adversarially Robust Deepfake Detection via Adversarial Feature Similarity Learning
Sarwar Shah Khan, Jun-Cheng Chen, Wen‐Hung Liao, et al.
Lecture notes in computer science (2024), pp. 503-516
Closed Access | Times Cited: 3

A systematic literature review on deepfake detection techniques
Vishal Sharma, Rakesh Kumar Garg, Quentin Caudron
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3

Towards Multimodal Disinformation Detection by Vision-language Knowledge Interaction
Qilei Li, Mingliang Gao, Guisheng Zhang, et al.
Information Fusion (2023) Vol. 102, pp. 102037-102037
Closed Access | Times Cited: 8

TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution
Mengjie Wu, Jingui Ma, Run Wang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 18, pp. 19965-19973
Open Access | Times Cited: 1

Fine-grained Open-set Deepfake Detection via Unsupervised Domain Adaptation
Xinye Zhou, Hu Han, Shiguang Shan, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7536-7547
Closed Access | Times Cited: 1

Breaking Data Silos: Cross-Domain Learning for Multi-Agent Perception from Independent Private Sources
Jinlong Li, Baolu Li, Xinyu Liu, et al.
(2024), pp. 18414-18420
Open Access | Times Cited: 1

AdvGPS: Adversarial GPS for Multi-Agent Perception Attack
Jinlong Li, Baolu Li, Xinyu Liu, et al.
(2024), pp. 18421-18427
Open Access | Times Cited: 1

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape
Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 91-109
Closed Access | Times Cited: 1

StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model
Ziyin Zhou, Ke Sun, Zhongxi Chen, et al.
(2024), pp. 3627-3636
Closed Access | Times Cited: 1

PolyGlotFake: A Novel Multilingual and Multimodal DeepFake Dataset
Yang Hou, Haitao Fu, Chunkai Chen, et al.
Lecture notes in computer science (2024), pp. 180-193
Closed Access | Times Cited: 1

AdvShadow: Evading DeepFake Detection via Adversarial Shadow Attack
Jiatong Liu, Mingcheng Zhang, Jianpeng Ke, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4640-4644
Closed Access

Evading DeepFake Detectors via Conditional Diffusion Models
W. Wang, Fangjun Huang
(2024) Vol. 27, pp. 159-164
Closed Access

Inspector for Face Forgery Detection: Defending against Adversarial Attacks from Coarse to Fine
Ruiyang Xia, Dawei Zhou, Decheng Liu, et al.
IEEE Transactions on Image Processing (2024) Vol. 33, pp. 4432-4443
Closed Access

Countering Personalized Text-to-Image Generation with Influence Watermarks
Hanwen Liu, Zhicheng Sun, Yadong Mu
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 12257-12267
Closed Access

Adversarial Magnification to Deceive Deepfake Detection Through Super Resolution
Davide Alessandro Coccomini, Roberto Caldelli, Giuseppe Amato, et al.
Communications in computer and information science (2024), pp. 491-501
Closed Access

Page 1 - Next Page

Scroll to top