
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
Sara Kokal, Mounika Vanamala, Rushit Dave
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 227-258
Open Access | Times Cited: 16
Sara Kokal, Mounika Vanamala, Rushit Dave
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 227-258
Open Access | Times Cited: 16
Showing 16 citing articles:
Implicit Identity Authentication Method Based on User Posture Perception
Bo Hu, Tang Shi-gang, Fangzheng Huang, et al.
Electronics (2025) Vol. 14, Iss. 5, pp. 835-835
Open Access
Bo Hu, Tang Shi-gang, Fangzheng Huang, et al.
Electronics (2025) Vol. 14, Iss. 5, pp. 835-835
Open Access
Mobile Biometrics: Innovations, Challenges, and Emerging Trends
Attaullah Buriro, Flaminia L. Luccio
Lecture notes on data engineering and communications technologies (2025), pp. 170-180
Closed Access
Attaullah Buriro, Flaminia L. Luccio
Lecture notes on data engineering and communications technologies (2025), pp. 170-180
Closed Access
Biometric Systems: A Comprehensive Review
Rebin Abdulkareem Hamaamin
BASRA JOURNAL OF SCIENCE (2024) Vol. 42, Iss. 1
Open Access | Times Cited: 1
Rebin Abdulkareem Hamaamin
BASRA JOURNAL OF SCIENCE (2024) Vol. 42, Iss. 1
Open Access | Times Cited: 1
Advancements and challenges in fingerprint presentation attack detection: a systematic literature review
Divine Senanu Ametefe, Suzi Seroja Sarnin, Darmawaty Mohd Ali, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Divine Senanu Ametefe, Suzi Seroja Sarnin, Darmawaty Mohd Ali, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1
Recent Advancements in the Field of Deepfake Detection
Natalie Krueger, Mounika Vanamala, Rushit Dave
International Journal of Computer Science and Information Technology (2023) Vol. 15, Iss. 4, pp. 01-11
Open Access | Times Cited: 2
Natalie Krueger, Mounika Vanamala, Rushit Dave
International Journal of Computer Science and Information Technology (2023) Vol. 15, Iss. 4, pp. 01-11
Open Access | Times Cited: 2
Research on hybrid transformer-based autoencoders for user biometric verification
Mariia Havrylovych, Valeriy Danylov
System research and information technologies (2023), Iss. 3, pp. 42-53
Open Access | Times Cited: 1
Mariia Havrylovych, Valeriy Danylov
System research and information technologies (2023), Iss. 3, pp. 42-53
Open Access | Times Cited: 1
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Rushit Dave, Marcho Handoko, Rashid Ali, et al.
International Journal of Computer Science and Information Technology (2024) Vol. 16, Iss. 1, pp. 29-44
Open Access
Rushit Dave, Marcho Handoko, Rashid Ali, et al.
International Journal of Computer Science and Information Technology (2024) Vol. 16, Iss. 1, pp. 29-44
Open Access
Analysis of Gait Motion Sensor Mobile Authentication with Machine Learning
Sara Kokal, Mounika Vanamala, Rushit Dave
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access
Sara Kokal, Mounika Vanamala, Rushit Dave
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access
Using Behavioural Biometrics and Machine Learning in Smart Gadgets for Continuous User Authentication Purposes
S Deepthi, Mamatha Balachandra, K. V. Prema, et al.
Journal of Machine and Computing (2024), pp. 616-626
Open Access
S Deepthi, Mamatha Balachandra, K. V. Prema, et al.
Journal of Machine and Computing (2024), pp. 616-626
Open Access
User identification and authentication in browser environments via machine learning
Anton Uymin
E3S Web of Conferences (2024) Vol. 549, pp. 08019-08019
Open Access
Anton Uymin
E3S Web of Conferences (2024) Vol. 549, pp. 08019-08019
Open Access
Secure and Efficient Data Fusion in IoT Systems Using Homomorphic Encryption and Machine Learning
Himanshu Rai Goyal, Ammar Hameed Shnain, Krishna Kant Dixit, et al.
(2024), pp. 1634-1639
Closed Access
Himanshu Rai Goyal, Ammar Hameed Shnain, Krishna Kant Dixit, et al.
(2024), pp. 1634-1639
Closed Access
Deep Learning Application in Continuous Authentication
Mariia Havrylovych, Valeriy Danylov
Lecture notes in electrical engineering (2024), pp. 644-667
Closed Access
Mariia Havrylovych, Valeriy Danylov
Lecture notes in electrical engineering (2024), pp. 644-667
Closed Access
Normalizing flow-based latent space mapping for implicit pattern authentication on mobile devices
Jaehyuk Heo, Jeongseob Kim, Euisuk Chung, et al.
Applied Soft Computing (2024) Vol. 169, pp. 112469-112469
Closed Access
Jaehyuk Heo, Jeongseob Kim, Euisuk Chung, et al.
Applied Soft Computing (2024) Vol. 169, pp. 112469-112469
Closed Access
Natalie Krueger, Mounika Vanamala, Rushit Dave
International Journal of Computer Science and Information Technology (2023) Vol. 15, Iss. 4
Open Access
Sean Loesch, Ryan Hrastich, Herbert Jordan, et al.
International Journal of Computer Science and Information Technology (2023) Vol. 15, Iss. 5
Open Access
Secure Arcade: A Gamified Defense Against Cyber Attacks
Sean Loesch, Ryan Hrastich, Herbert Jordan, et al.
International Journal of Computer Science and Information Technology (2023) Vol. 15, Iss. 5, pp. 01-17
Open Access
Sean Loesch, Ryan Hrastich, Herbert Jordan, et al.
International Journal of Computer Science and Information Technology (2023) Vol. 15, Iss. 5, pp. 01-17
Open Access