default search action
Guozhu Meng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Qintao Shen, Guozhu Meng, Kai Chen:
Revealing the exploitability of heap overflow through PoC analysis. Cybersecur. 7(1): 47 (2024) - [c43]Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma:
DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models. AAAI 2024: 21850-21858 - [c42]Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen:
Demystifying RCE Vulnerabilities in LLM-Integrated Apps. CCS 2024: 1716-1730 - [c41]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning. NDSS 2024 - [c40]Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen:
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction. USENIX Security Symposium 2024 - [i25]Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen:
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction. CoRR abs/2402.18104 (2024) - [i24]Mingfei Cheng, Yuan Zhou, Xiaofei Xie, Junjie Wang, Guozhu Meng, Kairui Yang:
Evaluating Decision Optimality of Autonomous Driving via Metamorphic Testing. CoRR abs/2402.18393 (2024) - [i23]Yuling Cai, Fan Xiang, Guozhu Meng, Yinzhi Cao, Kai Chen:
AuthNet: Neural Network with Integrated Authentication Logic. CoRR abs/2405.15426 (2024) - [i22]Jiachen Zhou, Mingsi Wang, Tianlin Li, Guozhu Meng, Kai Chen:
Dormant: Defending against Pose-driven Human Image Animation. CoRR abs/2409.14424 (2024) - [i21]Xiangping Chen, Xing Hu, Yuan Huang, He Jiang, Weixing Ji, Yanjie Jiang, Yanyan Jiang, Bo Liu, Hui Liu, Xiaochen Li, Xiaoli Lian, Guozhu Meng, Xin Peng, Hailong Sun, Lin Shi, Bo Wang, Chong Wang, Jiayi Wang, Tiantian Wang, Jifeng Xuan, Xin Xia, Yibiao Yang, Yixin Yang, Li Zhang, Yuming Zhou, Lu Zhang:
Deep Learning-based Software Engineering: Progress, Challenges, and Opportunities. CoRR abs/2410.13110 (2024) - [i20]Mingsi Wang, Jiachen Zhou, Tianlin Li, Guozhu Meng, Kai Chen:
A Survey on Physical Adversarial Attacks against Face Recognition Systems. CoRR abs/2410.16317 (2024) - 2023
- [j14]Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen:
SkillSim: voice apps similarity detection. Cybersecur. 6(1): 13 (2023) - [j13]Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma:
Are our clone detectors good enough? An empirical study of code effects by obfuscation. Cybersecur. 6(1): 14 (2023) - [j12]Shangqing Liu, Xiaofei Xie, Jing Kai Siow, Lei Ma, Guozhu Meng, Yang Liu:
GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search. IEEE Trans. Software Eng. 49(4): 2839-2855 (2023) - [c39]Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. CCS 2023: 431-445 - [c38]Weihao Huang, Chaoyang Lin, Qiucun Yan, Lu Xiang, Zhiyu Zhang, Guozhu Meng, Kai Chen:
FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code Localization. CSCWD 2023: 947-952 - [c37]Shangqing Liu, Bozhi Wu, Xiaofei Xie, Guozhu Meng, Yang Liu:
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning. ICSE 2023: 2476-2487 - [c36]Tianlin Li, Zhiming Li, Anran Li, Mengnan Du, Aishan Liu, Qing Guo, Guozhu Meng, Yang Liu:
Fairness via Group Contribution Matching. IJCAI 2023: 436-445 - [c35]Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv:
Aliasing Backdoor Attacks on Pre-trained Models. USENIX Security Symposium 2023: 2707-2724 - [c34]Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, Lu Xiang, Chunyang Chen:
Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities. USENIX Security Symposium 2023: 7393-7410 - [i19]Shangqing Liu, Bozhi Wu, Xiaofei Xie, Guozhu Meng, Yang Liu:
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning. CoRR abs/2301.09072 (2023) - [i18]Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang:
ConFL: Constraint-guided Fuzzing for Machine Learning Framework. CoRR abs/2307.05642 (2023) - [i17]Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen:
Demystifying RCE Vulnerabilities in LLM-Integrated Apps. CoRR abs/2309.02926 (2023) - [i16]Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. CoRR abs/2309.05679 (2023) - [i15]Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma:
DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models. CoRR abs/2312.11057 (2023) - 2022
- [j11]Ruishi Li, Yunfei Yang, Jinghua Liu, Peiwei Hu, Guozhu Meng:
The inconsistency of documentation: a study of online C standard library documents. Cybersecur. 5(1): 14 (2022) - [j10]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. Proc. ACM Meas. Anal. Comput. Syst. 6(2): 40:1-40:27 (2022) - [j9]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
Towards Security Threats of Deep Learning Systems: A Survey. IEEE Trans. Software Eng. 48(5): 1743-1770 (2022) - [c33]Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng:
Understanding Real-world Threats to Deep Learning Models in Android Apps. CCS 2022: 785-799 - [c32]Qintao Shen, Hongyu Sun, Guozhu Meng, Kai Chen, Yuqing Zhang:
Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns. Inscrypt 2022: 391-407 - [c31]Huajun Cui, Guozhu Meng, Yueqi Li, Yuejun Li, Yan Zhang, Jiyan Sun, Dali Zhu, Weiping Wang:
LibHunter: An Unsupervised Approach for Third-party Library Detection without Prior Knowledge. ISCC 2022: 1-7 - [c30]Yuejun Li, Huajun Cui, Jiyan Sun, Yan Zhang, Yueqi Li, Guozhu Meng, Weiping Wang:
Automated Privacy Network Traffic Detection via Self-labeling and Learning. ISCC 2022: 1-8 - [c29]Yan-Fu Li, Yinxing Xue, Lei Ma, Shengjian Guo, Guozhu Meng:
Message from the RAIS 2022 Chairs. ISSRE Workshops 2022: xxxviii - [c28]Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu:
TransRepair: Context-aware Program Repair for Compilation Errors. ASE 2022: 108:1-108:13 - [c27]Huajun Cui, Guozhu Meng, Yan Zhang, Weiping Wang, Dali Zhu, Ting Su, Xiaodong Zhang, Yuejun Li:
TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps. SciSec 2022: 541-556 - [c26]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. SIGMETRICS (Abstracts) 2022: 21-22 - [c25]Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu:
Learning Program Semantics with Code Representations: An Empirical Study. SANER 2022: 554-565 - [i14]Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu:
Learning Program Semantics with Code Representations: An Empirical Study. CoRR abs/2203.11790 (2022) - [i13]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning. CoRR abs/2209.03563 (2022) - [i12]Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng:
Understanding Real-world Threats to Deep Learning Models in Android Apps. CoRR abs/2209.09577 (2022) - [i11]Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu:
TransRepair: Context-aware Program Repair for Compilation Errors. CoRR abs/2210.03986 (2022) - 2021
- [j8]Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu:
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 16: 1563-1578 (2021) - [c24]Xingbo Hu, Yibing Lan, Ruimin Gao, Guozhu Meng, Kai Chen:
Why is Your Trojan NOT Responding? A Quantitative Analysis of Failures in Backdoor Attacks of Neural Networks. ICA3PP (3) 2021: 754-771 - [c23]Yuekang Li, Guozhu Meng, Jun Xu, Cen Zhang, Hongxu Chen, Xiaofei Xie, Haijun Wang, Yang Liu:
Vall-nut: Principled Anti-Grey box - Fuzzing. ISSRE 2021: 288-299 - [c22]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. USENIX Security Symposium 2021: 1901-1918 - [c21]Shuang Liu, Baiyang Zhao, Renjie Guo, Guozhu Meng, Fan Zhang, Meishan Zhang:
Have You been Properly Notified? Automatic Compliance Analysis of Privacy Policy Text with GDPR Article 13. WWW 2021: 2154-2164 - [c20]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. WWW 2021: 2733-2744 - [i10]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. CoRR abs/2102.09764 (2021) - [i9]Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, Xingbo Hu:
DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks. CoRR abs/2105.06209 (2021) - 2020
- [j7]Xiang Chen, Yingquan Zhao, Zhanqi Cui, Guozhu Meng, Yang Liu, Zan Wang:
Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods. IEEE Trans. Reliab. 69(1): 70-87 (2020) - [c19]Sen Chen, Lingling Fan, Guozhu Meng, Ting Su, Minhui Xue, Yinxing Xue, Yang Liu, Lihua Xu:
An empirical assessment of security risks of global Android banking apps. ICSE 2020: 1310-1322 - [c18]Bingchang Liu, Guozhu Meng, Wei Zou, Qi Gong, Feng Li, Min Lin, Dandan Sun, Wei Huo, Chao Zhang:
A large-scale empirical study on vulnerability distribution within projects and the lessons learned. ICSE 2020: 1547-1559 - [c17]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. ICSME 2020: 617-628 - [i8]Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu:
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices. CoRR abs/2005.04970 (2020) - [i7]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. CoRR abs/2008.13768 (2020)
2010 – 2019
- 2019
- [j6]Zhushou Tang, Minhui Xue, Guozhu Meng, Chengguo Ying, Yugeng Liu, Jianan He, Haojin Zhu, Yang Liu:
Securing android applications via edge assistant third-party library detection. Comput. Secur. 80: 257-272 (2019) - [j5]Guozhu Meng, Matthew Patrick, Yinxing Xue, Yang Liu, Jie Zhang:
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets. IEEE Trans. Inf. Forensics Secur. 14(7): 1944-1959 (2019) - [c16]Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou, Kai Chen:
RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems. Inscrypt 2019: 101-117 - [c15]Ruitao Feng, Sen Chen, Xiaofei Xie, Lei Ma, Guozhu Meng, Yang Liu, Shang-Wei Lin:
MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform. ICECCS 2019: 61-70 - [c14]Ruitao Feng, Guozhu Meng, Xiaofei Xie, Ting Su, Yang Liu, Shang-Wei Lin:
Learning Performance Optimization from Code Changes for Android Apps. ICST Workshops 2019: 285-290 - [c13]Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng, Yao Guo:
Characterizing Android App Signing Issues. ASE 2019: 280-292 - [i6]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
Towards Privacy and Security of Deep Learning Systems: A Survey. CoRR abs/1911.12562 (2019) - 2018
- [j4]Guozhu Meng, Ruitao Feng, Guangdong Bai, Kai Chen, Yang Liu:
DroidEcho: an in-depth dissection of malicious behaviors in Android applications. Cybersecur. 1(1): 4 (2018) - [c12]Ning Zhang, Guangquan Xu, Guozhu Meng, Xi Zheng:
SoProtector: Securing Native C/C++ Libraries for Mobile Applications. ICA3PP (3) 2018: 417-431 - [c11]Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su:
Large-scale analysis of framework-specific exceptions in Android apps. ICSE 2018: 408-419 - [c10]Chunyang Chen, Ting Su, Guozhu Meng, Zhenchang Xing, Yang Liu:
From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation. ICSE 2018: 665-676 - [c9]Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu:
Efficiently manifesting asynchronous programming errors in Android apps. ASE 2018: 486-497 - [c8]Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, Lihua Xu:
Are mobile banking apps secure? what can be improved? ESEC/SIGSOFT FSE 2018: 797-802 - [e1]Li Li, Guozhu Meng, Jacques Klein, Sam Malek:
Proceedings of the 1st International Workshop on Advances in Mobile App Analysis, A-Mobile@ASE 2018, Montpellier, France, September 4, 2018. ACM 2018 [contents] - [i5]Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su:
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps. CoRR abs/1801.07009 (2018) - [i4]Sen Chen, Guozhu Meng, Ting Su, Lingling Fan, Yinxing Xue, Yang Liu, Lihua Xu, Minhui Xue, Bo Li, Shuang Hao:
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps. CoRR abs/1805.05236 (2018) - [i3]Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu:
Efficiently Manifesting Asynchronous Programming Errors in Android Apps. CoRR abs/1808.03178 (2018) - 2017
- [b1]Guozhu Meng:
A semantic-based analysis of Android malware for detection, generation, and trend analysis. Nanyang Technological University, Singapore, 2017 - [j3]Yinxing Xue, Guozhu Meng, Yang Liu, Tian Huat Tan, Hongxu Chen, Jun Sun, Jie Zhang:
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique. IEEE Trans. Inf. Forensics Secur. 12(7): 1529-1544 (2017) - [j2]Liang He, Guozhu Meng, Yu Gu, Cong Liu, Jun Sun, Ting Zhu, Yang Liu, Kang G. Shin:
Battery-Aware Mobile Data Service. IEEE Trans. Mob. Comput. 16(6): 1544-1558 (2017) - [c7]Liang He, Eugene Kim, Kang G. Shin, Guozhu Meng, Tian He:
Battery state-of-health estimation for mobile devices. ICCPS 2017: 51-60 - [c6]Yun Lin, Guozhu Meng, Yinxing Xue, Zhenchang Xing, Jun Sun, Xin Peng, Yang Liu, Wenyun Zhao, Jin Song Dong:
Mining implicit design templates for actionable code reuse. ASE 2017: 394-404 - [c5]Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, Zhendong Su:
Guided, stochastic model-based GUI testing of Android apps. ESEC/SIGSOFT FSE 2017: 245-256 - [i2]Guozhu Meng, Yinxing Xue, Jing Kai Siow, Ting Su, Annamalai Narayanan, Yang Liu:
AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis. CoRR abs/1711.07451 (2017) - 2016
- [c4]Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu, Jie Zhang, Tieming Chen:
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools. AsiaCCS 2016: 365-376 - [c3]Annamalai Narayanan, Guozhu Meng, Yang Liu, Jinliang Liu, Lihui Chen:
Contextual Weisfeiler-Lehman graph kernel for malware detection. IJCNN 2016: 4701-4708 - [c2]Guozhu Meng, Yinxing Xue, Zhengzi Xu, Yang Liu, Jie Zhang, Annamalai Narayanan:
Semantic modelling of Android malware for effective malware comprehension, detection, and classification. ISSTA 2016: 306-317 - [i1]Annamalai Narayanan, Guozhu Meng, Yang Liu, Jinliang Liu, Lihui Chen:
Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection. CoRR abs/1606.06369 (2016) - 2015
- [j1]Guozhu Meng, Yang Liu, Jie Zhang, Alexander Pokluda, Raouf Boutaba:
Collaborative Security: A Survey and Taxonomy. ACM Comput. Surv. 48(1): 1:1-1:42 (2015) - 2013
- [c1]Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, Jin Song Dong:
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations. NDSS 2013
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint