OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

FedForgery: Generalized Face Forgery Detection With Residual Federated Learning
Decheng Liu, Zhan Dang, Chunlei Peng, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4272-4284
Open Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

Deepfake Detection Using Spatiotemporal Transformer
Bachir Kaddar, Sid Ahmed Fezza, Zahid Akhtar, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024) Vol. 20, Iss. 11, pp. 1-21
Open Access | Times Cited: 11

A review on deepfake generation and detection: bibliometric analysis
Anukriti Kaushal, Sanjay Kumar, Rajeev Kumar
Multimedia Tools and Applications (2024) Vol. 83, Iss. 40, pp. 87579-87619
Closed Access | Times Cited: 8

Hierarchical Forgery Classifier on Multi-Modality Face Forgery Clues
Decheng Liu, Zeyang Zheng, Chunlei Peng, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 2894-2905
Open Access | Times Cited: 14

Face anti-spoofing via jointly modeling local texture and constructed depth
Lei Li, Zhihao Yao, Shanshan Gao, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108345-108345
Closed Access | Times Cited: 5

3D data augmentation and dual-branch model for robust face forgery detection
Chao Zhou, Frederick W. B. Li, Chao Song, et al.
Graphical Models (2025) Vol. 138, pp. 101255-101255
Open Access

Robust face forgery detection integrating local texture and global texture information
Rongrong Gong, Ruiyi He, Dengyong Zhang, et al.
EURASIP Journal on Information Security (2025) Vol. 2025, Iss. 1
Open Access

Revisiting face forgery detection towards generalization
Chunlei Peng, Tao Chen, Decheng Liu, et al.
Neural Networks (2025) Vol. 187, pp. 107310-107310
Closed Access

Leveraging facial landmarks improves generalization ability for deepfake detection
Qi Gao, Baopeng Zhang, Jianghao Wu, et al.
Pattern Recognition (2025), pp. 111528-111528
Closed Access

DeepFake video detection: Insights into model generalisation — A Systematic review
Ramcharan Ramanaharan, Deepani B. Guruge, Johnson I. Agbinya
Data and Information Management (2025), pp. 100099-100099
Open Access

Deepfake detection with domain generalization and mask-guided supervision
Jicheng Li, Yongjian Hu, Beibei Liu, et al.
Pattern Recognition (2025), pp. 111622-111622
Closed Access

Golden ratio based deep fake video detection system with fusion of capsule networks
S. Dinçer, Güzin Ulutaş, Beste Üstübioğlu, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109234-109234
Closed Access | Times Cited: 3

On the effectiveness of handcrafted features for deepfake video detection
Bachir Kaddar, Sid Ahmed Fezza, Wassim Hamidouche, et al.
Journal of Electronic Imaging (2023) Vol. 32, Iss. 05
Closed Access | Times Cited: 7

Exploring varying color spaces through representative forgery learning to improve deepfake detection
Muhammad Ahmad Amin, Yongjian Hu, Yu Guan, et al.
Digital Signal Processing (2024) Vol. 147, pp. 104426-104426
Closed Access | Times Cited: 2

Federated finger vein presentation attack detection for various clients
Hengyu Mu, Jian Guo, Xingli Liu, et al.
IET Computer Vision (2024) Vol. 18, Iss. 7, pp. 935-949
Open Access | Times Cited: 2

Federated learning for biometric recognition: a survey
Jian Guo, Hengyu Mu, Xingli Liu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 8
Open Access | Times Cited: 2

FDML: Feature Disentangling and Multi-view Learning for face forgery detection
Miaomiao Yu, Hongying Li, Jiaxin Yang, et al.
Neurocomputing (2023) Vol. 572, pp. 127192-127192
Closed Access | Times Cited: 4

RFCSC: Communication efficient reinforcement federated learning with dynamic client selection and adaptive gradient compression
Zhenhui Pan, Yawen Li, Zeli Guan, et al.
Neurocomputing (2024), pp. 128672-128672
Closed Access | Times Cited: 1

Unified Frequency-Assisted Transformer Framework for Detecting and Grounding Multi-modal Manipulation
Huan Liu, Zichang Tan, Qiang Chen, et al.
International Journal of Computer Vision (2024)
Closed Access | Times Cited: 1

A novel multi-modal Federated Learning based thermal-aware job scheduling framework
Rameesha Rehman, Saif Ur Rehman Malik, Sumaira Qureshi, et al.
Computer Networks (2024), pp. 110879-110879
Closed Access | Times Cited: 1

Data augmentation with attention framework for robust deepfake detection
Sardor Mamarasulov, Lianggangxu Chen, Changgu Chen, et al.
The Visual Computer (2024)
Closed Access | Times Cited: 1

A Triple Complementary Stream Network based on forgery feature enhancement and coupling for universal face forgery localization
Haoyu Wang, Xu Sun, Yuying Sun, et al.
Computers & Graphics (2024), pp. 104153-104153
Closed Access | Times Cited: 1

An attention-erasing stripe pyramid network for face forgery detection
Zhenwu Hu, Qianyue Duan, PeiYu Zhang, et al.
Signal Image and Video Processing (2023) Vol. 17, Iss. 8, pp. 4123-4131
Open Access | Times Cited: 2

A high-fidelity face swapping algorithm based on mutual information-guided feature decoupling
Song Xiao, Zhiguo Liu, Jian Gao, et al.
The Visual Computer (2024) Vol. 40, Iss. 12, pp. 8957-8972
Closed Access

Research on video face forgery detection model based on multiple feature fusion network
Wenyan Hou, Jingtao Sun, Huanqi Liu, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 5, pp. 4131-4144
Closed Access

Towards Transferable Attack via Adversarial Diffusion in Face Recognition
Cong Hu, Yuanbo Li, Zhenhua Feng, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 5506-5519
Closed Access

Page 1 - Next Page

Scroll to top