
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Evading DeepFake Detectors via Adversarial Statistical Consistency
Yang Hou, Qing Guo, Yihao Huang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023), pp. 12271-12280
Open Access | Times Cited: 26
Yang Hou, Qing Guo, Yihao Huang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023), pp. 12271-12280
Open Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models
Yihao Huang, Felix Juefei-Xu, Qing Guo, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 19, pp. 21169-21178
Open Access | Times Cited: 6
Yihao Huang, Felix Juefei-Xu, Qing Guo, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 19, pp. 21169-21178
Open Access | Times Cited: 6
Dungeons & Deepfakes: Using scenario-based role-play to study journalists' behavior towards using AI-based verification tools for video content
Saniat Javid Sohrawardi, Yen-Chin Wu, Andrea Hickerson, et al.
(2024), pp. 1-17
Open Access | Times Cited: 5
Saniat Javid Sohrawardi, Yen-Chin Wu, Andrea Hickerson, et al.
(2024), pp. 1-17
Open Access | Times Cited: 5
Light the Night: A Multi-Condition Diffusion Framework for Unpaired Low-Light Enhancement in Autonomous Driving
Jinlong Li, Baolu Li, Zhengzhong Tu, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024) Vol. 35, pp. 15205-15215
Closed Access | Times Cited: 5
Jinlong Li, Baolu Li, Zhengzhong Tu, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024) Vol. 35, pp. 15205-15215
Closed Access | Times Cited: 5
Exploring Autonomous Methods for Deepfake Detection: A Detailed Survey on Techniques and Evaluation
Reshma Sunil, Parita Mer, Anjali Diwan, et al.
Heliyon (2025), pp. e42273-e42273
Open Access
Reshma Sunil, Parita Mer, Anjali Diwan, et al.
Heliyon (2025), pp. e42273-e42273
Open Access
Xiaoyu Zhang, Cen Zhang, Tianlin Li, et al.
ACM Transactions on Software Engineering and Methodology (2025)
Closed Access
Generating Higher-Quality Anti-Forensics DeepFakes with Adversarial Sharpening Mask
Bing Fan, Feng Ding, Guopu Zhu, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
Bing Fan, Feng Ding, Guopu Zhu, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
Investigating the Transferability and Robustness of Adversarial Attacks Between Standard and Dilated CNN Architectures
Sachin Sharma, Jiho Noh, Michail S. Alexiou
Lecture notes on data engineering and communications technologies (2025), pp. 113-126
Closed Access
Sachin Sharma, Jiho Noh, Michail S. Alexiou
Lecture notes on data engineering and communications technologies (2025), pp. 113-126
Closed Access
Dodging DeepFake Detection via Implicit Spatial-Domain Notch Filtering
Yihao Huang, Felix Juefei-Xu, Qing Guo, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 34, Iss. 8, pp. 6949-6962
Open Access | Times Cited: 9
Yihao Huang, Felix Juefei-Xu, Qing Guo, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 34, Iss. 8, pp. 6949-6962
Open Access | Times Cited: 9
Adversarially Robust Deepfake Detection via Adversarial Feature Similarity Learning
Sarwar Shah Khan, Jun-Cheng Chen, Wen‐Hung Liao, et al.
Lecture notes in computer science (2024), pp. 503-516
Closed Access | Times Cited: 3
Sarwar Shah Khan, Jun-Cheng Chen, Wen‐Hung Liao, et al.
Lecture notes in computer science (2024), pp. 503-516
Closed Access | Times Cited: 3
A systematic literature review on deepfake detection techniques
Vishal Sharma, Rakesh Kumar Garg, Quentin Caudron
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Vishal Sharma, Rakesh Kumar Garg, Quentin Caudron
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Towards Multimodal Disinformation Detection by Vision-language Knowledge Interaction
Qilei Li, Mingliang Gao, Guisheng Zhang, et al.
Information Fusion (2023) Vol. 102, pp. 102037-102037
Closed Access | Times Cited: 8
Qilei Li, Mingliang Gao, Guisheng Zhang, et al.
Information Fusion (2023) Vol. 102, pp. 102037-102037
Closed Access | Times Cited: 8
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution
Mengjie Wu, Jingui Ma, Run Wang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 18, pp. 19965-19973
Open Access | Times Cited: 1
Mengjie Wu, Jingui Ma, Run Wang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 18, pp. 19965-19973
Open Access | Times Cited: 1
Fine-grained Open-set Deepfake Detection via Unsupervised Domain Adaptation
Xinye Zhou, Hu Han, Shiguang Shan, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7536-7547
Closed Access | Times Cited: 1
Xinye Zhou, Hu Han, Shiguang Shan, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7536-7547
Closed Access | Times Cited: 1
Breaking Data Silos: Cross-Domain Learning for Multi-Agent Perception from Independent Private Sources
Jinlong Li, Baolu Li, Xinyu Liu, et al.
(2024), pp. 18414-18420
Open Access | Times Cited: 1
Jinlong Li, Baolu Li, Xinyu Liu, et al.
(2024), pp. 18414-18420
Open Access | Times Cited: 1
AdvGPS: Adversarial GPS for Multi-Agent Perception Attack
Jinlong Li, Baolu Li, Xinyu Liu, et al.
(2024), pp. 18421-18427
Open Access | Times Cited: 1
Jinlong Li, Baolu Li, Xinyu Liu, et al.
(2024), pp. 18421-18427
Open Access | Times Cited: 1
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape
Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 91-109
Closed Access | Times Cited: 1
Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 91-109
Closed Access | Times Cited: 1
StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model
Ziyin Zhou, Ke Sun, Zhongxi Chen, et al.
(2024), pp. 3627-3636
Closed Access | Times Cited: 1
Ziyin Zhou, Ke Sun, Zhongxi Chen, et al.
(2024), pp. 3627-3636
Closed Access | Times Cited: 1
PolyGlotFake: A Novel Multilingual and Multimodal DeepFake Dataset
Yang Hou, Haitao Fu, Chunkai Chen, et al.
Lecture notes in computer science (2024), pp. 180-193
Closed Access | Times Cited: 1
Yang Hou, Haitao Fu, Chunkai Chen, et al.
Lecture notes in computer science (2024), pp. 180-193
Closed Access | Times Cited: 1
AdvShadow: Evading DeepFake Detection via Adversarial Shadow Attack
Jiatong Liu, Mingcheng Zhang, Jianpeng Ke, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4640-4644
Closed Access
Jiatong Liu, Mingcheng Zhang, Jianpeng Ke, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4640-4644
Closed Access
Exploring the Landscape of Compressed Deepfakes: Generation, Dataset and Detection
Muhammad Zubaır, Saqib Hakak
(2024)
Closed Access
Muhammad Zubaır, Saqib Hakak
(2024)
Closed Access
Evading DeepFake Detectors via Conditional Diffusion Models
W. Wang, Fangjun Huang
(2024) Vol. 27, pp. 159-164
Closed Access
W. Wang, Fangjun Huang
(2024) Vol. 27, pp. 159-164
Closed Access
Inspector for Face Forgery Detection: Defending against Adversarial Attacks from Coarse to Fine
Ruiyang Xia, Dawei Zhou, Decheng Liu, et al.
IEEE Transactions on Image Processing (2024) Vol. 33, pp. 4432-4443
Closed Access
Ruiyang Xia, Dawei Zhou, Decheng Liu, et al.
IEEE Transactions on Image Processing (2024) Vol. 33, pp. 4432-4443
Closed Access
Countering Personalized Text-to-Image Generation with Influence Watermarks
Hanwen Liu, Zhicheng Sun, Yadong Mu
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 12257-12267
Closed Access
Hanwen Liu, Zhicheng Sun, Yadong Mu
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 12257-12267
Closed Access
Robust Deepfake Detection by Addressing Generalization and Trustworthiness Challenges: A Short Survey
Ping Liu, Qiqi Tao, Joey Tianyi Zhou
(2024), pp. 3-11
Closed Access
Ping Liu, Qiqi Tao, Joey Tianyi Zhou
(2024), pp. 3-11
Closed Access
Adversarial Magnification to Deceive Deepfake Detection Through Super Resolution
Davide Alessandro Coccomini, Roberto Caldelli, Giuseppe Amato, et al.
Communications in computer and information science (2024), pp. 491-501
Closed Access
Davide Alessandro Coccomini, Roberto Caldelli, Giuseppe Amato, et al.
Communications in computer and information science (2024), pp. 491-501
Closed Access