
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions
A. Nait-Ali, Mohammed Ridouani, Fatima Salahdine, et al.
Computers (2023) Vol. 12, Iss. 10, pp. 216-216
Open Access | Times Cited: 36
A. Nait-Ali, Mohammed Ridouani, Fatima Salahdine, et al.
Computers (2023) Vol. 12, Iss. 10, pp. 216-216
Open Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 20
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 20
Deepfake video detection: challenges and opportunities
Achhardeep Kaur, Azadeh Noori Hoshyar, Vidya Saikrishna, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Closed Access | Times Cited: 17
Achhardeep Kaur, Azadeh Noori Hoshyar, Vidya Saikrishna, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Closed Access | Times Cited: 17
Navigating the Dual Nature of Deepfakes: Ethical, Legal, and Technological Perspectives on Generative Artificial Intelligence AI) Technology
International Journal of Scientific Research and Modern Technology. (2024) Vol. 3, Iss. 10, pp. 19-38
Open Access | Times Cited: 10
International Journal of Scientific Research and Modern Technology. (2024) Vol. 3, Iss. 10, pp. 19-38
Open Access | Times Cited: 10
Video and Audio Deepfake Datasets and Open Issues in Deepfake Technology: Being Ahead of the Curve
Zahid Akhtar, Thanvi Lahari Pendyala, Virinchi Sai Athmakuri
Forensic Sciences (2024) Vol. 4, Iss. 3, pp. 289-377
Open Access | Times Cited: 8
Zahid Akhtar, Thanvi Lahari Pendyala, Virinchi Sai Athmakuri
Forensic Sciences (2024) Vol. 4, Iss. 3, pp. 289-377
Open Access | Times Cited: 8
The Road Ahead: Emerging Trends, Unresolved Issues, and Concluding Remarks in Generative AI—A Comprehensive Review
S. Balasubramaniam, Vanajaroselin Chirchi, Seifedine Kadry, et al.
International Journal of Intelligent Systems (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 6
S. Balasubramaniam, Vanajaroselin Chirchi, Seifedine Kadry, et al.
International Journal of Intelligent Systems (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 6
Generative Artificial Intelligence and the Evolving Challenge of Deepfake Detection: A Systematic Analysis
Reza Babaei, Samuel Cheng, Rui Duan, et al.
Journal of Sensor and Actuator Networks (2025) Vol. 14, Iss. 1, pp. 17-17
Open Access
Reza Babaei, Samuel Cheng, Rui Duan, et al.
Journal of Sensor and Actuator Networks (2025) Vol. 14, Iss. 1, pp. 17-17
Open Access
Using Deep Learning to Identify Deepfakes Created Using Generative Adversarial Networks
Jhanvi Jheelan, Sameerchand Pudaruth
Computers (2025) Vol. 14, Iss. 2, pp. 60-60
Open Access
Jhanvi Jheelan, Sameerchand Pudaruth
Computers (2025) Vol. 14, Iss. 2, pp. 60-60
Open Access
Deepfake Attacks Detection and Mitigation for Strengthening Cybersecurity: A Comparative Assessment
Anant Wairagade
(2025)
Closed Access
Anant Wairagade
(2025)
Closed Access
Navigating the Metaverse: A Study on Cyber Security Implications
Parakum Amaranga Pathirana
Lecture notes in networks and systems (2025), pp. 421-434
Closed Access
Parakum Amaranga Pathirana
Lecture notes in networks and systems (2025), pp. 421-434
Closed Access
Deepfake Video Detection: A Novel Approach via NLP-Based Classification
Patchraphon Bunluesakdikul, Waranya Mahanan, Prompong Sugunnasil, et al.
International Journal of Computational Intelligence and Applications (2025)
Closed Access
Patchraphon Bunluesakdikul, Waranya Mahanan, Prompong Sugunnasil, et al.
International Journal of Computational Intelligence and Applications (2025)
Closed Access
Novel Deep Learning-Based Facial Forgery Detection for Effective Biometric Recognition
Han‐Soo Kim
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3613-3613
Open Access
Han‐Soo Kim
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3613-3613
Open Access
Video deepfake detection using a hybrid CNN-LSTM-Transformer model for identity verification
Georgios Petmezas, Vazgken Vanian, Konstantinos Konstantoudakis, et al.
Multimedia Tools and Applications (2025)
Open Access
Georgios Petmezas, Vazgken Vanian, Konstantinos Konstantoudakis, et al.
Multimedia Tools and Applications (2025)
Open Access
Preserving Voice Message Integrity: Strategies Against AI Cloning
Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios
Lecture notes in networks and systems (2025), pp. 443-452
Closed Access
Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios
Lecture notes in networks and systems (2025), pp. 443-452
Closed Access
Deepfake video detection methods, approaches, and challenges
Mubarak Alrashoud
Alexandria Engineering Journal (2025) Vol. 125, pp. 265-277
Closed Access
Mubarak Alrashoud
Alexandria Engineering Journal (2025) Vol. 125, pp. 265-277
Closed Access
Digital Narratives and AI in Modern Media: A Systematic Literature Review
Kartini Harahap, Muhtar, Sari Sakarina, et al.
Studies in systems, decision and control (2025), pp. 197-205
Closed Access
Kartini Harahap, Muhtar, Sari Sakarina, et al.
Studies in systems, decision and control (2025), pp. 197-205
Closed Access
Neural Network Ensemble Method for Deepfake Classification Using Golden Frame Selection
Khrystyna Lipianina-Honcharenko, Nazar Melnyk, Andriy Ivasechko, et al.
Big Data and Cognitive Computing (2025) Vol. 9, Iss. 4, pp. 109-109
Open Access
Khrystyna Lipianina-Honcharenko, Nazar Melnyk, Andriy Ivasechko, et al.
Big Data and Cognitive Computing (2025) Vol. 9, Iss. 4, pp. 109-109
Open Access
A survey on multimedia-enabled deepfake detection: state-of-the-art tools and techniques, emerging trends, current challenges & limitations, and future directions
Abdullah Ayub Khan, Asif Ali Laghari, A. K. M. Sarwar Inam, et al.
Deleted Journal (2025) Vol. 28, Iss. 1
Open Access
Abdullah Ayub Khan, Asif Ali Laghari, A. K. M. Sarwar Inam, et al.
Deleted Journal (2025) Vol. 28, Iss. 1
Open Access
Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments
K. Pedersen, Lauritz Pepke, Tobias Stærmose, et al.
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 18-18
Open Access
K. Pedersen, Lauritz Pepke, Tobias Stærmose, et al.
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 2, pp. 18-18
Open Access
A feature selection-aided deep learning based deepfake video detection method
Sk Mohiuddin, Ayush Roy, Saptarshi Pani, et al.
Multimedia Tools and Applications (2025)
Closed Access
Sk Mohiuddin, Ayush Roy, Saptarshi Pani, et al.
Multimedia Tools and Applications (2025)
Closed Access
DEEPFAKE DYSTOPIA: NAVIGATING THE LANDSCAPE OF THREATS AND SAFEGUARDS IN MULTIMEDIA CONTENT
International Journal Of Trendy Research In Engineering And Technology (2024) Vol. 08, Iss. 01, pp. 01-07
Open Access | Times Cited: 2
International Journal Of Trendy Research In Engineering And Technology (2024) Vol. 08, Iss. 01, pp. 01-07
Open Access | Times Cited: 2
SLM-DFS: A systematic literature map of deepfake spread on social media
El‐Sayed Atlam, Malik Almaliki, Ghada Elmarhomy, et al.
Alexandria Engineering Journal (2024) Vol. 111, pp. 446-455
Open Access | Times Cited: 2
El‐Sayed Atlam, Malik Almaliki, Ghada Elmarhomy, et al.
Alexandria Engineering Journal (2024) Vol. 111, pp. 446-455
Open Access | Times Cited: 2
Ethical and Privacy Challenges of Generative AI
U. Chandrasekhar, Bala Venkateswarlu Isunuri
Studies in computational intelligence (2024), pp. 219-244
Closed Access | Times Cited: 2
U. Chandrasekhar, Bala Venkateswarlu Isunuri
Studies in computational intelligence (2024), pp. 219-244
Closed Access | Times Cited: 2
Guardian AI: Synthetic Media Forensics through Multimodal Fusion and Advanced Machine Learning
K Karthikeyan, R Swetha, S Deepanraj, et al.
(2024), pp. 226-232
Closed Access | Times Cited: 1
K Karthikeyan, R Swetha, S Deepanraj, et al.
(2024), pp. 226-232
Closed Access | Times Cited: 1
The Application of AI in Drug Discovery
Ihtiram Raza Khan, Veena Grover, Iram Fatima, et al.
Advances in healthcare information systems and administration book series (2024), pp. 181-198
Closed Access | Times Cited: 1
Ihtiram Raza Khan, Veena Grover, Iram Fatima, et al.
Advances in healthcare information systems and administration book series (2024), pp. 181-198
Closed Access | Times Cited: 1
Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection
Tae Hoon Kim, Moez Krichen, Meznah A. Alamro, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 3369-3384
Closed Access | Times Cited: 1
Tae Hoon Kim, Moez Krichen, Meznah A. Alamro, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 3369-3384
Closed Access | Times Cited: 1