
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Dynamic Difference Learning With Spatio–Temporal Correlation for Deepfake Video Detection
Qilin Yin, Wei Lu, Bin Li, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4046-4058
Closed Access | Times Cited: 31
Qilin Yin, Wei Lu, Bin Li, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4046-4058
Closed Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
Where Deepfakes Gaze at? Spatial-Temporal Gaze Inconsistency Analysis for Video Face Forgery Detection
Chunlei Peng, Zimin Miao, Decheng Liu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4507-4517
Closed Access | Times Cited: 8
Chunlei Peng, Zimin Miao, Decheng Liu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4507-4517
Closed Access | Times Cited: 8
DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios
Zuomin Qu, Zuping Xi, Wei Lu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3943-3957
Closed Access | Times Cited: 6
Zuomin Qu, Zuping Xi, Wei Lu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3943-3957
Closed Access | Times Cited: 6
Self-Supervised Graph Transformer for Deepfake Detection
Aminollah Khormali, J.S. Yuan
IEEE Access (2024) Vol. 12, pp. 58114-58127
Open Access | Times Cited: 5
Aminollah Khormali, J.S. Yuan
IEEE Access (2024) Vol. 12, pp. 58114-58127
Open Access | Times Cited: 5
Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation
Xianguo Wu, Xuan Sun, Jiaxin Huang, et al.
Lecture notes in computer science (2025), pp. 74-88
Closed Access
Xianguo Wu, Xuan Sun, Jiaxin Huang, et al.
Lecture notes in computer science (2025), pp. 74-88
Closed Access
FSBI: Deepfake detection with frequency enhanced self-blended images
Ahmed Abul Hasanaath, Hamzah Luqman, RAED FAROUQ KATIB, et al.
Image and Vision Computing (2025), pp. 105418-105418
Closed Access
Ahmed Abul Hasanaath, Hamzah Luqman, RAED FAROUQ KATIB, et al.
Image and Vision Computing (2025), pp. 105418-105418
Closed Access
Exploring Autonomous Methods for Deepfake Detection: A Detailed Survey on Techniques and Evaluation
Reshma Sunil, Parita Mer, Anjali Diwan, et al.
Heliyon (2025), pp. e42273-e42273
Open Access
Reshma Sunil, Parita Mer, Anjali Diwan, et al.
Heliyon (2025), pp. e42273-e42273
Open Access
CapST: Leveraging Capsule Networks and Temporal Attention for Accurate Model Attribution in Deep-fake Videos
W. Haj Ahmad, Yan-Tsung Peng, Yuan-Hao Chang, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
W. Haj Ahmad, Yan-Tsung Peng, Yuan-Hao Chang, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
GANK: Dynamic Geometric and Appearance Features for Efficient and Robust Detection of Face Forgery
Zekun Sun, Na Ruan
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
Zekun Sun, Na Ruan
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
NPVForensics: Learning VA correlations in non-critical phoneme-viseme regions for deepfake detection
Yu Chen, Yu Yang, Rongrong Ni, et al.
Image and Vision Computing (2025), pp. 105461-105461
Closed Access
Yu Chen, Yu Yang, Rongrong Ni, et al.
Image and Vision Computing (2025), pp. 105461-105461
Closed Access
Revisiting face forgery detection towards generalization
Chunlei Peng, Tao Chen, Decheng Liu, et al.
Neural Networks (2025) Vol. 187, pp. 107310-107310
Closed Access
Chunlei Peng, Tao Chen, Decheng Liu, et al.
Neural Networks (2025) Vol. 187, pp. 107310-107310
Closed Access
A GAN-based anti-forensics method by modifying the quantization table in JPEG header file
Hao Wang, Xin Cheng, Hao Wu, et al.
Journal of Visual Communication and Image Representation (2025), pp. 104462-104462
Closed Access
Hao Wang, Xin Cheng, Hao Wu, et al.
Journal of Visual Communication and Image Representation (2025), pp. 104462-104462
Closed Access
A systematic literature review on deepfake detection techniques
Vishal Sharma, Rakesh Kumar Garg, Quentin Caudron
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Vishal Sharma, Rakesh Kumar Garg, Quentin Caudron
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis
R. Chakraborty, Ruchira Naskar
Computer Science Review (2024) Vol. 54, pp. 100677-100677
Closed Access | Times Cited: 2
R. Chakraborty, Ruchira Naskar
Computer Science Review (2024) Vol. 54, pp. 100677-100677
Closed Access | Times Cited: 2
Two-stage deep learning-based video image recognition of early fires in heritage buildings
Shenyuan Gao, Guozhong Huang, Xiaolong Chen, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107598-107598
Closed Access | Times Cited: 5
Shenyuan Gao, Guozhong Huang, Xiaolong Chen, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107598-107598
Closed Access | Times Cited: 5
Analyzing temporal coherence for deepfake video detection
Muhammad Ahmad Amin, Yongjian Hu, Jiankun Hu
Electronic Research Archive (2024) Vol. 32, Iss. 4, pp. 2621-2641
Open Access | Times Cited: 1
Muhammad Ahmad Amin, Yongjian Hu, Jiankun Hu
Electronic Research Archive (2024) Vol. 32, Iss. 4, pp. 2621-2641
Open Access | Times Cited: 1
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization
Weinan Guan, Wei Wang, Jing Dong, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 5345-5356
Closed Access | Times Cited: 1
Weinan Guan, Wei Wang, Jing Dong, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 5345-5356
Closed Access | Times Cited: 1
A Spatio- Temporl Deepfake Video Detection Method Based on TimeSformer-CNN
Zhengxuan Chen, Shuo Wang, Deyang Yan, et al.
(2024) Vol. 12, pp. 1-6
Closed Access | Times Cited: 1
Zhengxuan Chen, Shuo Wang, Deyang Yan, et al.
(2024) Vol. 12, pp. 1-6
Closed Access | Times Cited: 1
Advancements and Challenges in Deepfake Video Detection: A Comprehensive Review
Deepti Gupta, B. C. JAIN, Arun Sharma
Lecture notes in networks and systems (2024), pp. 353-369
Closed Access | Times Cited: 1
Deepti Gupta, B. C. JAIN, Arun Sharma
Lecture notes in networks and systems (2024), pp. 353-369
Closed Access | Times Cited: 1
Artifact feature purification for cross-domain detection of AI-generated images
Zheling Meng, Bo Peng, Jing Dong, et al.
Computer Vision and Image Understanding (2024) Vol. 247, pp. 104078-104078
Open Access | Times Cited: 1
Zheling Meng, Bo Peng, Jing Dong, et al.
Computer Vision and Image Understanding (2024) Vol. 247, pp. 104078-104078
Open Access | Times Cited: 1
Face Omron Ring: Proactive defense against face forgery with identity awareness
Yunshu Dai, Jianwei Fei, Fangjun Huang, et al.
Neural Networks (2024) Vol. 180, pp. 106639-106639
Closed Access | Times Cited: 1
Yunshu Dai, Jianwei Fei, Fangjun Huang, et al.
Neural Networks (2024) Vol. 180, pp. 106639-106639
Closed Access | Times Cited: 1
Mining Generalized Multi-timescale Inconsistency for Detecting Deepfake Videos
Yang Yu, Rongrong Ni, Siyuan Yang, et al.
International Journal of Computer Vision (2024)
Closed Access | Times Cited: 1
Yang Yu, Rongrong Ni, Siyuan Yang, et al.
International Journal of Computer Vision (2024)
Closed Access | Times Cited: 1
Autonomous Detection and Evaluation of Deepfakes: A Comprehensive Study
Reshma Sunil, Parita Mer, Anjali Diwan
(2023), pp. 35-40
Closed Access | Times Cited: 2
Reshma Sunil, Parita Mer, Anjali Diwan
(2023), pp. 35-40
Closed Access | Times Cited: 2
Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs
Qilin Yin, Wei Lu, Xiaochun Cao, et al.
International Journal of Computer Vision (2024) Vol. 132, Iss. 11, pp. 5255-5269
Closed Access
Qilin Yin, Wei Lu, Xiaochun Cao, et al.
International Journal of Computer Vision (2024) Vol. 132, Iss. 11, pp. 5255-5269
Closed Access
Deepfake Video Detection and Classification Through Dynamic Spatio- Temporal Inconsistency Analysis
Ayush Bajpai, Ritu Garg
Learning and analytics in intelligent systems (2024), pp. 360-371
Closed Access
Ayush Bajpai, Ritu Garg
Learning and analytics in intelligent systems (2024), pp. 360-371
Closed Access
IDGuard: Robust, General, Identity-Centric POI Proactive Defense Against Face Editing Abuse
Yunshu Dai, Jianwei Fei, Fangjun Huang
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024) Vol. 1, pp. 11934-11943
Closed Access
Yunshu Dai, Jianwei Fei, Fangjun Huang
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024) Vol. 1, pp. 11934-11943
Closed Access