default search action
Xiaotian Wu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j72]Xiaotian Wu, Wenju Hou, Ziqi Zhao, Lan Huang, Nan Sheng, Qixing Yang, Shuangquan Zhang, Yan Wang:
MMGAT: a graph attention network framework for ATAC-seq motifs finding. BMC Bioinform. 25(1): 158 (2024) - [j71]Xiaotian Wu, Xinjie Feng:
Size Invariant Visual Cryptography Schemes With Evolving Threshold Access Structures. IEEE Trans. Multim. 26: 1488-1503 (2024) - [j70]Zhao-Rong Lai, Cheng Li, Xiaotian Wu, Quanlong Guan, Liangda Fang:
Multitrend Conditional Value at Risk for Portfolio Optimization. IEEE Trans. Neural Networks Learn. Syst. 35(2): 1545-1558 (2024) - [j69]Ching-Nung Yang, Xiaotian Wu, Min-Jung Chung:
Enhancement of Information Carrying and Decoding for Visual Cryptography with Error Correction. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 23:1-23:24 (2024) - [c24]Yan Wang, Xiaotian Wu, Haoming Da, Shuangquan Zhang:
MMF-ATAC: A User-friendly Web Server for Multiple Motifs Finding on ATAC-seq Data. BIC 2024 - [c23]Zhao-Rong Lai, Xiaotian Wu, Liangda Fang, Ziliang Chen:
A De-singularity Subgradient Approach for the Extended Weber Location Problem. IJCAI 2024: 4370-4379 - [i3]Zhao-Rong Lai, Xiaotian Wu, Liangda Fang, Ziliang Chen:
A De-singularity Subgradient Approach for the Extended Weber Location Problem. CoRR abs/2405.06965 (2024) - 2023
- [j68]Xiaotian Wu, Ching-Nung Yang, Hong-Wu Cai, Yanxiao Liu:
A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding. J. Inf. Secur. Appl. 75: 103520 (2023) - [j67]Ching-Nung Yang, Cheng-En Zheng, Ming-Chan Lu, Xiaotian Wu:
Secret image sharing by using multi-prime modular arithmetic. Signal Process. 205: 108882 (2023) - [j66]Xiaotian Wu, Na An, Zishuo Xu:
Sharing Multiple Secrets in XOR-Based Visual Cryptography by Non-Monotonic Threshold Property. IEEE Trans. Circuits Syst. Video Technol. 33(1): 88-103 (2023) - [j65]Xiaotian Wu, Zishuo Xu, Wei Qi Yan:
Sharing Visual Secrets Among Multiple Groups With Enhanced Performance. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6503-6518 (2023) - [j64]Xiaotian Wu, Jia Fang, Wei Qi Yan:
Contrast Optimization for Size Invariant Visual Cryptography Scheme. IEEE Trans. Image Process. 32: 2174-2189 (2023) - [j63]Guisong Yang, Xiaotian Wu, Yanglin Zhang, Xingyu He, Sukai Wang, Yunhuai Liu:
Revisiting Path Planning Problem Towards Participant Executing Time Optimization in Mobile Crowd Sensing. IEEE Trans. Netw. Sci. Eng. 10(3): 1599-1611 (2023) - [j62]Xiaotian Wu, Peng Yao:
Boolean-based Two-in-One Secret Image Sharing by Adaptive Pixel Grouping. ACM Trans. Multim. Comput. Commun. Appl. 19(1): 14:1-14:23 (2023) - [c22]Suju Meng, Xiqing Dai, Tengfei Cui, Xiaotian Wu, Yong Xue:
Drought-Induced Variations in the Phenology of the Alpine Grasslands in the Qinghai Lake Basin. IGARSS 2023: 3276-3279 - [c21]Xiaotian Wu, Xiaolu Ling, Yimeng Zhang, Yong Xue:
Impact of Lake on The Hydrological Variables Based on The Global Land Data Assimilation System (GLDAS) Products. IGARSS 2023: 3738-3741 - 2022
- [j61]Shuangquan Zhang, Lili Yang, Xiaotian Wu, Nan Sheng, Yuan Fu, Anjun Ma, Yan Wang:
MMGraph: a multiple motif predictor based on graph neural network and coexisting probability for ATAC-seq data. Bioinform. 38(19): 4636-4638 (2022) - [j60]Xiaotian Wu, Xuliang Zhang:
Towards cheat-preventing in block-based progressive visual cryptography for general access structures. Inf. Sci. 583: 73-98 (2022) - [j59]Xiang Chen, Xing Wang, Hubiao Zhang, Yu-Heng Xu, Chen You, Xiaotian Wu:
Interval TOPSIS with a novel interval number comprehensive weight for threat evaluation on uncertain information. J. Intell. Fuzzy Syst. 42(4): 4241-4257 (2022) - [j58]Ching-Nung Yang, Xiaotian Wu, Min-Jung Chung, Xuliang Zhang:
AMBTC-based secret image sharing by simple modular arithmetic. J. Vis. Commun. Image Represent. 84: 103482 (2022) - [j57]Xiaotian Wu, Zhonglin Luo:
Block-based progressive visual cryptography scheme with uniform progressive recovery and consistent background. J. Vis. Commun. Image Represent. 88: 103631 (2022) - [j56]Xinglong Sun, Guangliang Han, Lihong Guo, Hang Yang, Xiaotian Wu, Qingqing Li:
Two-stage aware attentional Siamese network for visual tracking. Pattern Recognit. 124: 108502 (2022) - [j55]Qifen Yang, Ziyang Li, Gang Han, Wanyi Gao, Shuhua Zhu, Xiaotian Wu, Yuhui Deng:
An improvement of spectral clustering algorithm based on fast diffusion search for natural neighbor and affinity propagation. J. Supercomput. 78(12): 14597-14625 (2022) - [j54]Qifen Yang, Ziyang Li, Gang Han, Wanyi Gao, Shuhua Zhu, Xiaotian Wu, Yuhui Deng:
Correction to: An improvement of spectral clustering algorithm based on fast diffusion search for natural neighbor and affinity propagation. J. Supercomput. 78(14): 16619-16620 (2022) - [c20]Yuan Shi, Yajie Lou, Iroha Shirai, Xiaotian Wu, Joseph A. Paydarfar, Ryan J. Halter:
Surgical navigation system for image-guided transoral robotic surgery: a proof of concept. Medical Imaging: Image-Guided Procedures 2022 - 2021
- [j53]Huiyuan Luo, Guangliang Han, Xiaotian Wu, Peixun Liu, Hang Yang, Xin Zhang:
Cascaded hourglass feature fusing network for saliency detection. Neurocomputing 428: 206-217 (2021) - [j52]Huiyuan Luo, Guangliang Han, Xiaotian Wu, Peixun Liu, Hang Yang, Xin Zhang:
LF3Net: Leader-follower feature fusing network for fast saliency detection. Neurocomputing 449: 24-37 (2021) - [j51]Ching-Nung Yang, Xiaotian Wu, Hsuan-Yu Lin, Cheonshik Kim:
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation. J. Inf. Secur. Appl. 61: 102910 (2021) - [j50]Xiaotian Wu, Jiongcheng Li, Guanxing Zhou, Bo Lü, Qingqing Li, Hang Yang:
RRG-GAN Restoring Network for Simple Lens Imaging System. Sensors 21(10): 3317 (2021) - [j49]Xiaotian Wu, Ching-Nung Yang, Jian-Ming Li:
Secure image secret sharing over distributed cloud network. Signal Process. 178: 107768 (2021) - [j48]Xiaotian Wu, Peng Yao, Na An:
Extended XOR-based visual cryptography schemes by integer linear program. Signal Process. 186: 108122 (2021) - [c19]Yuan Shi, Xiaotian Wu, Joseph A. Paydarfar, Ryan J. Halter:
Imaging-compatible oral retractor system for use in image-guided transoral robotic surgery. Medical Imaging: Image-Guided Procedures 2021 - 2020
- [j47]Shaoli Wang, Xiao Wang, Xiaotian Wu:
Bifurcation Analysis for a Food Chain Model with Nonmonotonic Nutrition Conversion Rate of Predator to Top Predator. Int. J. Bifurc. Chaos 30(8): 2050113:1-2050113:19 (2020) - [j46]Xiaotian Wu, Ching-Nung Yang, Yi-Yun Yang:
A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy. J. Inf. Secur. Appl. 51: 102452 (2020) - [j45]Zhao-Rong Lai, Liming Tan, Xiaotian Wu, Liangda Fang:
Loss Control with Rank-one Covariance Estimate for Short-term Portfolio Optimization. J. Mach. Learn. Res. 21: 97:1-97:37 (2020) - [j44]Xiaotian Wu, Ching-Nung Yang:
Probabilistic color visual cryptography schemes for black and white secret images. J. Vis. Commun. Image Represent. 70: 102793 (2020) - [j43]Xiaotian Wu, Ching-Nung Yang, Yen-Wei Liu:
High capacity partial reversible data hiding by hamming code. Multim. Tools Appl. 79(31-32): 23425-23444 (2020) - [j42]Xiaotian Wu, Ching-Nung Yang, Yi-Yun Yang:
Sharing and hiding a secret image in color palette images with authentication. Multim. Tools Appl. 79(35-36): 25657-25677 (2020) - [j41]Xiaotian Wu, Ching-Nung Yang, Yen-Wei Liu:
A general framework for partial reversible data hiding using hamming code. Signal Process. 175: 107657 (2020) - [j40]Aravind S. Ponukumati, Xiaotian Wu, Peter W. Kahng, Joseph Skinner, Joseph A. Paydarfar, Ryan J. Halter:
A System for Characterizing Intraoperative Force Distribution During Operative Laryngoscopy. IEEE Trans. Biomed. Eng. 67(9): 2616-2627 (2020) - [j39]Ethan K. Murphy, Xiaotian Wu, Alicia C. Everitt, Ryan J. Halter:
Phantom Studies of Fused-Data TREIT Using Only Biopsy-Probe Electrodes. IEEE Trans. Medical Imaging 39(11): 3367-3378 (2020) - [j38]Zhao-Rong Lai, Pei-Yi Yang, Liangda Fang, Xiaotian Wu:
Reweighted Price Relative Tracking System for Automatic Portfolio Optimization. IEEE Trans. Syst. Man Cybern. Syst. 50(11): 4349-4361 (2020) - [c18]Xiaotian Wu, C. Antonio Sánchez, John E. Lloyd, Heather Borgard, Sidney S. Fels, Joseph A. Paydarfar, Ryan J. Halter:
Estimating tongue deformation during laryngoscopy using hybrid FEM-multibody model and intraoperative tracking: a cadaver pilot study. Medical Imaging: Image-Guided Procedures 2020: 113151E - [c17]Michael Sramek, Yuan Shi, Erick Quintanilla, Xiaotian Wu, Aravind S. Ponukumati, David A. Pastel, Ryan J. Halter, Joseph A. Paydarfar:
Development of a novel tumor phantom model for head and neck squamous cell carcinoma and its applications. Medical Imaging: Image-Guided Procedures 2020: 113152X - [i2]Jie Liu, Xiaotian Wu, Kai Zhang, Bing Liu, Renyi Bao, Xiao Chen, Yiran Cai, Yiming Shen, Xinjun He, Jun Yan, Weixing Ji:
Computational Performance of a Germline Variant Calling Pipeline for Next Generation Sequencing. CoRR abs/2004.00991 (2020) - [i1]Hang Yang, Xiaotian Wu, Xinglong Sun:
Select Good Regions for Deblurring based on Convolutional Neural Networks. CoRR abs/2008.05065 (2020)
2010 – 2019
- 2019
- [j37]Peter W. Kahng, Xiaotian Wu, Nithya P. Ramesh, David A. Pastel, Ryan J. Halter, Joseph A. Paydarfar:
Improving target localization during trans-oral surgery with use of intraoperative imaging. Int. J. Comput. Assist. Radiol. Surg. 14(5): 885-893 (2019) - [j36]Xiaotian Wu, Ching-Nung Yang:
Partial reversible AMBTC-based secret image sharing with steganography. Digit. Signal Process. 93: 22-33 (2019) - [j35]Xiaotian Wu, Shiqi Mao, Yachen Ying, Christopher J. Krueger, Antony K. Chen:
Progress and Challenges for Live-cell Imaging of Genomic Loci Using CRISPR-based Platforms. Genom. Proteom. Bioinform. 17(2): 119-128 (2019) - [j34]Xiaotian Wu, Dong Chen, Ching-Nung Yang, Yi-Yun Yang:
A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image. J. Vis. Commun. Image Represent. 59: 550-562 (2019) - [j33]Xiaotian Wu, Ching-Nung Yang:
A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. J. Vis. Commun. Image Represent. 61: 74-84 (2019) - [j32]Songhua He, Xiaotian Wu:
Research of a Radar Imaging Algorithm Based on High Pulse Repetition Random Frequency Hopping Synthetic Wideband Waveform. Sensors 19(24): 5424 (2019) - [j31]Bing Chen, Xiaotian Wu, Wei Lu, Honglin Ren:
Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism. Signal Process. 164: 48-57 (2019) - [j30]Xiaotian Wu, Zhao-Rong Lai:
Random grid based color visual cryptography scheme for black and white secret images with general access structures. Signal Process. Image Commun. 75: 100-110 (2019) - [j29]Xiaotian Wu, Ching-Nung Yang:
Invertible secret image sharing with steganography and authentication for AMBTC compressed images. Signal Process. Image Commun. 78: 437-447 (2019) - [c16]Xiaotian Wu, Yizhuo Wang:
Margin Constraint for Low-Shot Learning. ACPR (2) 2019: 3-14 - [c15]Xiaotian Wu, C. Antonio Sánchez, Peter W. Kahng, Christiaan A. Rees, Aravind S. Ponukumati, Eric A. Eisen, David A. Pastel, Heather Borgard, John E. Lloyd, Sidney S. Fels, Joseph A. Paydarfar, Ryan J. Halter:
Multi-modal Framework for Image-guided Trans-oral Surgery with Intraoperative Imaging and Deformation Modeling. EMBC 2019: 6975-6978 - [c14]Yonghong Yu, Qiang Wang, Li Zhang, Can Wang, Sifan Wu, Boyu Qi, Xiaotian Wu:
Integrating Social Circles and Network Representation Learning for Item Recommendation. IJCNN 2019: 1-8 - 2018
- [j28]Zhao-Rong Lai, Pei-Yi Yang, Xiaotian Wu, Liangda Fang:
A kernel-based trend pattern tracking system for portfolio optimization. Data Min. Knowl. Discov. 32(6): 1708-1734 (2018) - [j27]Ling Li, John Hartigan, Peter Peduzzi, Peter Guarino, Alexander T. Beed, Xiaotian Wu, Michael Wininger:
Clustering of Directions Improves Goodness of Fit in Kinematic Data Collected in the Transverse Plane During Robot-Assisted Rehabilitation of Stroke Patients. Frontiers Robotics AI 5: 57 (2018) - [j26]Zhuoqian Liang, Bingwen Feng, Xuba Xu, Xiaotian Wu, Tao Yang:
Geometrically Invariant Image Watermarking Using Histogram Adjustment. Int. J. Digit. Crime Forensics 10(1): 54-66 (2018) - [j25]Wei Qi Yan, Xiaotian Wu, Feng Liu:
Progressive Scrambling for Social Media. Int. J. Digit. Crime Forensics 10(2): 56-73 (2018) - [j24]Zhao-Rong Lai, Pei-Yi Yang, Liangda Fang, Xiaotian Wu:
Short-term Sparse Portfolio Optimization Based on Alternating Direction Method of Multipliers. J. Mach. Learn. Res. 19: 63:1-63:28 (2018) - [j23]Bing Chen, Xiaotian Wu, Yun-Shan Wei:
Reversible data hiding in encrypted images with private-key homomorphism and public-key homomorphism. J. Vis. Commun. Image Represent. 57: 272-282 (2018) - [j22]Pei-Yi Yang, Zhao-Rong Lai, Xiaotian Wu, Liangda Fang:
Trend representation based log-density regularization system for portfolio optimization. Pattern Recognit. 76: 14-24 (2018) - [j21]Xiaotian Wu, Jian Weng, WeiQi Yan:
Adopting secret sharing for reversible data hiding in encrypted images. Signal Process. 143: 269-281 (2018) - [j20]Xiaotian Wu, Ching-Nung Yang, Yi Ting Zhuang, Shen-Chieh Hsu:
Improving recovered image quality in secret image sharing by simple modular arithmetic. Signal Process. Image Commun. 66: 42-49 (2018) - [c13]Xiaotian Wu, Joseph A. Paydarfar, Ryan J. Halter:
Intraoperative deformation during laryngoscopy of irradiated and non-irradiated patients. Medical Imaging: Image-Guided Procedures 2018: 105761I - 2017
- [j19]Zhao Ma, Xiaotian Wu, Christopher J. Krueger, Antony K. Chen:
Engineering Novel Molecular Beacon Constructs to Study Intracellular RNA Dynamics and Localization. Genom. Proteom. Bioinform. 15(5): 279-286 (2017) - [j18]Guangyu Wang, Xiaotian Wu, WeiQi Yan:
The State-of-the-Art Technology of Currency Identification: A Comparative Study. Int. J. Digit. Crime Forensics 9(3): 58-72 (2017) - [j17]Ching-Nung Yang, Xiaotian Wu, Yung-Chien Chou, Zhangjie Fu:
Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options. J. Vis. Commun. Image Represent. 48: 182-194 (2017) - [j16]Angela Cheng, Dongmei Chen, Katherine Woodstock, Nicholas H. Ogden, Xiaotian Wu, Jianhong Wu:
Analyzing the Potential Risk of Climate Change on Lyme Disease in Eastern Ontario, Canada Using Time Series Remotely Sensed Temperature Data and Tick Population Modelling. Remote. Sens. 9(6): 609 (2017) - [c12]Honglin Zhou, Xiaotian Wu, Tongzhen Dai, Wenjing Xiao:
Control of parallel-connected grid-side converters of a wind turbine with real-time ethernet. IECON 2017: 2413-2418 - 2016
- [j15]Xiaotian Wu, Bing Chen, Jian Weng:
Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. J. Vis. Commun. Image Represent. 41: 58-64 (2016) - [c11]Xiaotian Wu, Zhuoqian Liang, Bing Chen, Tong Liu:
On Improving Homomorphic Encryption-Based Reversible Data Hiding. ICCCS (1) 2016: 28-38 - 2015
- [j14]Hang Yang, Guosheng Hu, Yuqing Wang, Xiaotian Wu:
Low-rank approach for image nonblind deconvolution with variance estimation. J. Electronic Imaging 24(6): 063013 (2015) - [j13]Duanhao Ou, Wei Sun, Xiaotian Wu:
Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process. 108: 604-621 (2015) - [c10]Ryan J. Halter, Xiaotian Wu, Alex Hartov, John D. Seigne, Shadab Khan:
A multimodal imaging framework for enhanced robot-assisted partial nephrectomy guidance. Medical Imaging: Image-Guided Procedures 2015: 94151E - [c9]Xiaotian Wu, Kyoung-Yeon Kim, Guoyin Wang, Yoo-Sung Kim:
Fast Human Detection Using Deformable Part Model at the Selected Candidate Detection Positions. RSKT 2015: 502-512 - 2014
- [j12]Xiaotian Wu, Wei Sun:
Improved tagged visual cryptography by random grids. Signal Process. 97: 64-82 (2014) - [j11]Xiaotian Wu, Wei Sun:
High-capacity reversible data hiding in encrypted images by prediction error. Signal Process. 104: 387-400 (2014) - [j10]Xiaotian Wu, Wei Sun:
Extended Capabilities for XOR-Based Visual Cryptography. IEEE Trans. Inf. Forensics Secur. 9(10): 1592-1605 (2014) - 2013
- [j9]Xiaotian Wu, Wei Sun:
Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl. Soft Comput. 13(2): 1170-1182 (2013) - [j8]Xiaotian Wu, Wei Sun:
Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform. J. Syst. Softw. 86(4): 1068-1088 (2013) - [j7]Xiaotian Wu, Wei Sun:
Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J. Vis. Commun. Image Represent. 24(1): 48-62 (2013) - [j6]Xiaotian Wu, Tong Liu, Wei Sun:
Improving the visual quality of random grid-based visual secret sharing via error diffusion. J. Vis. Commun. Image Represent. 24(5): 552-566 (2013) - [j5]Xiaotian Wu, Wei Sun:
Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93(5): 977-995 (2013) - [j4]Xiaotian Wu, Wei Sun:
Generalized Random Grid and Its Applications in Visual Cryptography. IEEE Trans. Inf. Forensics Secur. 8(9): 1541-1553 (2013) - [c8]Xiaotian Wu, Duanhao Ou, Lu Dai, Wei Sun:
XOR-based meaningful visual secret sharing by generalized random grids. IH&MMSec 2013: 181-190 - [c7]Duanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun:
Improved Tagged Visual Cryptograms by Using Random Grids. IWDW 2013: 79-94 - [c6]Duanhao Ou, Xiaotian Wu, Lu Dai, Wei Sun:
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion. IWDW 2013: 123-138 - 2012
- [j3]Xiaotian Wu, Wei Sun:
Visual secret sharing for general access structures by random grids. IET Inf. Secur. 6(4): 299-309 (2012) - [j2]Xiaotian Wu, Wei Sun:
Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85(5): 1119-1134 (2012) - [j1]Xiaotian Wu, Duanhao Ou, Qiming Liang, Wei Sun:
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J. Syst. Softw. 85(8): 1852-1863 (2012) - 2010
- [c5]Rudolf Fleischer, Xiaotian Wu:
Edge Clique Partition of K 4-Free and Planar Graphs. CGGA 2010: 84-95 - [c4]Xiaotian Wu, Wei Sun:
Data Hiding in Block Truncation Coding. CIS 2010: 406-410 - [c3]Yaqi Chu, Xiaotian Wu, Tong Liu, Jun Liu:
A basis-background subtraction method using non-negative matrix factorization. ICDIP 2010: 75461A
2000 – 2009
- 2005
- [c2]Xiuyan Meng, Zhiliang Wang, Guojiang Wang, Lin Shi, Xiaotian Wu:
The Research of a Teaching Assistant System Based on Artificial Psychology. ACII 2005: 614-621 - 2004
- [c1]Bin Xu, Xiaoping Xin, Zhihao Qin, Zhongchao Shi, Haiqi Liu, Zhongxin Chen, Guixia Yang, Wenbin Wu, Youqi Chen, Xiaotian Wu:
Remote sensing monitoring on dynamic status of grassland productivity and animal loading balance in Northern China. IGARSS 2004: 2306-2309
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint