default search action
Weihong Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Jiawei Zhang, Xiaodong Wang, Hailong Qiu, Yanchun Zhang, Weihong Han, Jialin Wang, Tianchen Wang, Yiyu Shi, Meiping Huang, Jian Zhuang, Huiming Guo, Xiaowei Xu:
HOCM-Net: 3D coarse-to-fine structural prior fusion based segmentation network for the surgical planning of hypertrophic obstructive cardiomyopathy. Expert Syst. Appl. 257: 125005 (2024) - [j25]Jiawei Zhang, Rui Chen, Yanchun Zhang, Weihong Han, Zhaoquan Gu, Shuqiang Yang, Yongquan Fu:
MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss. Knowl. Based Syst. 283: 111110 (2024) - [j24]Yangyang Mei, Weihong Han, Kaihan Lin:
Intrusion Detection for Intelligent Connected Vehicles Based on Bidirectional Temporal Convolutional Network. IEEE Netw. 38(6): 113-119 (2024) - [j23]Yongquan Fu, Weihong Han, Dong Yuan:
Disentangled Orchestration on Cyber Ranges. IEEE Trans. Dependable Secur. Comput. 21(4): 2344-2360 (2024) - [j22]Yangyang Mei, Weihong Han, Shudong Li, Kaihan Lin, Zhihong Tian, Shumei Li:
A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning. IEEE Trans. Intell. Transp. Syst. 25(9): 12131-12140 (2024) - [j21]Kaihan Lin, Weihong Han, Shudong Li, Zhaoquan Gu, Huimin Zhao, Yangyang Mei:
Detecting Deepfake Videos using Spatiotemporal Trident Network. ACM Trans. Multim. Comput. Commun. Appl. 20(11): 340:1-340:20 (2024) - [i1]Jun Huang, Jiawei Zhang, Qi Wang, Weihong Han, Yanchun Zhang:
Exploring Advanced Methodologies in Security Evaluation for LLMs. CoRR abs/2402.17970 (2024) - 2023
- [j20]Kaihan Lin, Weihong Han, Shudong Li, Zhaoquan Gu, Huimin Zhao, Jinchang Ren, Li Zhu, Jujian Lv:
IR-Capsule: Two-Stream Network for Face Forgery Detection. Cogn. Comput. 15(1): 13-22 (2023) - [j19]Fucai Luo, Haiyan Wang, Saif M. Al-Kuwari, Weihong Han:
Multi-key Fully Homomorphic Encryption without CRS from RLWE. Comput. Stand. Interfaces 86: 103742 (2023) - [j18]Zhuocheng Yu, Shudong Li, Youming Bai, Weihong Han, Xiaobo Wu, Zhihong Tian:
REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion. IEEE Internet Things J. 10(18): 16134-16143 (2023) - [c71]Xiaohui Huang, Shudong Li, Weihong Han, Shumei Li, Yanchen Xu, Zikang Liu:
A Social Bot Detection Method Using Multi-features Fusion and Model Optimization Strategy. APWeb-WAIM (2) 2023: 347-362 - [c70]Liqun Sun, Yulu Qi, Shuqiang Yang, Weihong Han, Xiaoxia Li:
Analyzing Security Attacks Against Platoon of Intelligent and Connected Vehicles. DSC 2023: 76-81 - 2022
- [j17]Shudong Li, Danyi Qin, Xiaobo Wu, Juan Li, Baohui Li, Weihong Han:
False Alert Detection Based on Deep Learning and Machine Learning. Int. J. Semantic Web Inf. Syst. 18(1): 1-21 (2022) - [j16]Hafiz Muhammad Jamsheed Nazir, Weihong Han:
Proliferation of Cyber Situational Awareness: Today's Truly Pervasive Drive of Cybersecurity. Secur. Commun. Networks 2022: 6015253:1-6015253:16 (2022) - [j15]Yangyang Mei, Weihong Han, Shudong Li, Kaihan Lin, Cui Luo:
A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm. IEEE Trans. Netw. Serv. Manag. 19(4): 4262-4272 (2022) - [c69]Yang Lv, Shaona Qin, Zifeng Zhu, Zhuocheng Yu, Shudong Li, Weihong Han:
A Review of Provenance Graph based APT Attack Detection: Applications and Developments. DSC 2022: 498-505 - [c68]Yangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu, Kaihan Lin, Yulu Qi:
A Review of Attribution Technical for APT Attacks. DSC 2022: 512-518 - [c67]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Weihong Han:
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption. ESORICS (1) 2022: 259-282 - [c66]Yongquan Fu, Weihong Han, Dong Yuan:
Orchestrating Heterogeneous Cyber-range Event Chains With Serverless-container Workflow. MASCOTS 2022: 97-104 - 2021
- [j14]Shudong Li, Laiyuan Jiang, Xiaobo Wu, Weihong Han, Dawei Zhao, Zhen Wang:
A weighted network community detection algorithm based on deep learning. Appl. Math. Comput. 401: 126012 (2021) - [j13]Shudong Li, Qianqing Zhang, Xiaobo Wu, Weihong Han, Zhihong Tian:
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques. Secur. Commun. Networks 2021: 9396141:1-9396141:12 (2021) - [j12]Shudong Li, Yuan Li, Weihong Han, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
Malicious mining code detection based on ensemble learning in cloud computing environment. Simul. Model. Pract. Theory 113: 102391 (2021) - [j11]Weihong Han, Zhihong Tian, Chunsheng Zhu, Zizhong Huang, Yan Jia, Mohsen Guizani:
A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence. IEEE Trans. Comput. Soc. Syst. 8(1): 191-200 (2021) - [c65]Kaihan Lin, Weihong Han, Zhaoquan Gu, Shudong Li:
A Survey of DeepFakes Generation and Detection. DSC 2021: 474-478 - [c64]Yangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu:
A Survey of Advanced Persistent Threats Attack and Defense. DSC 2021: 608-613 - [c63]Chuanyu Zhao, Shudong Li, Xiaobo Wu, Weihong Han, Zhihong Tian, Maofei Chen:
A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning. DSC 2021: 614-620 - [c62]Haipeng Zhang, Shudong Li, Xiaobo Wu, Weihong Han, Laifu Wang:
An android malware detection approach using multi-feature fusion and TF-IDF algorithm. DSC 2021: 629-634 - [c61]Na Xu, Shudong Li, Xiaobo Wu, Weihong Han, Xiaojing Luo:
An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBM. DSC 2021: 635-639 - [p2]Yan Jia, Zhaoquan Gu, Aiping Li, Weihong Han:
Introduction to the MDATA Model. MDATA: A New Knowledge Representation Model 2021: 1-18 - [p1]Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhihong Tian, Zhaoquan Gu:
Entity Alignment: Optimization by Seed Selection. MDATA: A New Knowledge Representation Model 2021: 99-116 - 2020
- [j10]Weihong Han, Zhihong Tian, Zizhong Huang, Shudong Li, Yan Jia:
Topic representation model based on microblogging behavior analysis. World Wide Web 23(6): 3083-3097 (2020) - [c60]Meihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian:
A Novel Malware Detection Framework Based on Weighted Heterograph. CIAT 2020: 39-43 - [c59]Xiangyi Kong, Zhaoquan Gu, Le Wang, Lihua Yin, Shudong Li, Weihong Han:
Resume Extraction and Validation from Public Information. CIAT 2020: 355-359 - [c58]Yinyin Cai, Zhaoquan Gu, Le Wang, Shudong Li, Weihong Han:
An APT Group Knowledge Model based on MDATA. CIAT 2020: 374-378 - [c57]Yushun Xie, Zhaoquan Gu, Bin Zhu, Le Wang, Weihong Han, Lihua Yin:
Adversarial Examples for Chinese Text Classification. DSC 2020: 238-245 - [c56]Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhaoquan Gu:
Seeds Optimization for Entity Alignment in Knowledge Graph Embedding. DSC 2020: 333-338 - [c55]Lingxiao Meng, Shudong Li, Xiaobo Wu, Weihong Han:
Framework Design of Environment Monitoring System Based on Machine Learning. ICAIS (2) 2020: 380-392 - [c54]Weihong Han, Ling Tong, Jiang Wen:
Long-Term Spatiotemporal Trend Analysis (1998-2016) of PM2.5 in China Using Satellite Product. IGARSS 2020: 5562-5565 - [c53]Yushun Xie, Zhaoquan Gu, Xiaopeng Fu, Le Wang, Weihong Han, Yuexuan Wang:
Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 590-596
2010 – 2019
- 2019
- [j9]Weihong Han, Zhihong Tian, Zizhong Huang, Dongqiu Huang, Yan Jia:
Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation. IEEE Access 7: 134293-134300 (2019) - [j8]Hangfeng Yang, Shudong Li, Xiaobo Wu, Hui Lu, Weihong Han:
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning. IEEE Access 7: 148853-148860 (2019) - [j7]Weihong Han, Zizhong Huang, Shudong Li, Yan Jia:
Distribution-Sensitive Unbalanced Data Oversampling Method for Medical Diagnosis. J. Medical Syst. 43(2): 39:1-39:10 (2019) - [j6]Weihong Han, Zhihong Tian, Zizhong Huang, Shudong Li, Yan Jia:
Bidirectional self-adaptive resampling in internet of things big data learning. Multim. Tools Appl. 78(21): 30111-30126 (2019) - [j5]Weihong Han, Zhihong Tian, Wei Shi, Zizhong Huang, Shudong Li:
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things. Sensors 19(12): 2804 (2019) - [c52]Yixia Li, Shudong Li, Yanshan Chen, Peiyan He, Xiaobo Wu, Weihong Han:
Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks. DependSys 2019: 454-461 - [c51]Haocheng Zhong, Chenxi Zeng, Aiping Li, Yan Jia, Rong Jiang, Yulu Qi, Weihong Han:
Research of Trojan Attack Effect Evaluation Based on FAHP. DSC 2019: 31-37 - [c50]Yunxuan Liu, Aiping Li, Jiuming Huang, Xinping Zheng, Hao Wang, Weihong Han, Zhichao Wang:
Joint Extraction of Entities and Relations Based on Multi-label Classification. DSC 2019: 106-111 - [c49]Xiao-Juan Zhao, Yan Jia, Aiping Li, Rong Jiang, Haocheng Xie, Yichen Song, Weihong Han:
Multi-source Knowledge Fusion: A Survey. DSC 2019: 119-127 - [c48]Han Yu, Aiping Li, Rong Jiang, Yan Jia, Xiao-Juan Zhao, Weihong Han:
HDGS: A Hybrid Dialogue Generation System using Adversarial Learning. DSC 2019: 135-141 - [c47]Hao Wang, Bin Zhou, Jiuming Huang, Yunxuan Liu, Xinping Zheng, Weihong Han:
BICON: Connecting the Same Users of Different Social Networks using BiLSTM. DSC 2019: 432-438 - [c46]Junbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han:
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match. DSC 2019: 480-486 - [c45]Haitian Liu, Weihong Han, Yan Jia:
Construction of Cyber Range Network Security Indication System Based on Deep Learning. DSC 2019: 495-502 - [c44]Yulu Qi, Jincheng Zhong, Rong Jiang, Yan Jia, Aiping Li, Li Huang, Weihong Han:
FSM-Based Cyber Security Status Analysis Method. DSC 2019: 510-515 - [c43]Haocheng Xie, Aiping Li, Rong Jiang, Yan Jia, Li Huang, Weihong Han:
Intrusion Detection Results Analysis Based on Variational Auto-Encoder. DSC 2019: 516-521 - [c42]Yong Quan, Yichen Song, Lu Deng, Yan Jia, Bin Zhou, Weihong Han:
Identify Influentials Based on User Behavior Across Different Topics. ICAIS (4) 2019: 476-487 - [c41]Hang Yang, Yan Jia, Weihong Han, Yuan-Ping Nie, Shudong Li, Xiao-Juan Zhao:
Calculation of Network Security Index Based on Convolution Neural Networks. ICAIS (3) 2019: 530-540 - [c40]Yue Han, Weihong Han, Shudong Li:
Review: Topic Model Application for Social Network Public Opinion Analysis. ICITEE 2019: 22:1-22:9 - 2018
- [j4]Yong Quan, Yan Jia, Bin Zhou, Weihong Han, Shudong Li:
Repost prediction incorporating time-sensitive mutual influence in social networks. J. Comput. Sci. 28: 217-227 (2018) - [c39]Yan Jia, Lu Deng, Bin Zhou, Binxing Fang, Weihong Han, Aiping Li, Qiang Liu, Yong Quan:
Topic Analysis Model for Online Social Network. DSC 2018: 39-44 - [c38]Yan Jia, Yong Quan, Weihong Han, Binxing Fang, Qiang Liu, Lu Deng:
Individual Analysis Model and Related Research in Social Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1837-1843 - 2017
- [j3]Yunping Chen, Shudong Wang, Weihong Han, Yajv Xiong, Wenhuan Wang, Ling Tong:
A New Air Pollution Source Identification Method Based on Remotely Sensed Aerosol and Improved Glowworm Swarm Optimization. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 10(8): 3454-3464 (2017) - [c37]Lingfeng Li, Yuanping Nie, Weihong Han, Jiuming Huang:
A Multi-attention-Based Bidirectional Long Short-Term Memory Network for Relation Extraction. ICONIP (5) 2017: 216-227 - [c36]Weihong Han, Ling Tong, Yunping Chen:
A new algorithm for high temporal and spatial resolution aerosol retrieval using gaofen-4 and landsat-8 data. IGARSS 2017: 6052-6055 - 2016
- [j2]Dong Liu, Quanyuan Wu, Weihong Han, Bin Zhou:
Sockpuppet gang detection on social media sites. Frontiers Comput. Sci. 10(1): 124-135 (2016) - [c35]Yaju Xiong, Yunping Chen, Weihong Han, Ling Tong:
A new aerosol retrieval algorithm based on statistical segmentation using Landsat-8 OLI data. IGARSS 2016: 4059-4062 - [c34]Yunping Chen, Weihong Han, Wenhuan Wang, Yajv Xiong, Tong Ling:
A new air pollution sources identification method based on remotely sensed aerosol and swarm intelligence. IGARSS 2016: 4131-4134 - [c33]Weihong Han, Ling Tong, Yunping Chen:
A new algorithm for aerosol retrieval using HJ-1 CCD and MODIS NDVI data over urban areas. IGARSS 2016: 5737-5740 - 2015
- [c32]Xiang Fu, Can Peng, Weihong Han:
A Consistent Hashing Based Data Redistribution Algorithm. IScIDE (2) 2015: 559-566 - [c31]Weihong Han, Ling Tong, Yunping Chen:
Aerosol Retrieval over Urban Area by Syngertic Use of Feng Yun-3C MERSI and Terra MODIS Data. SmartCity 2015: 108-111 - [c30]Yunping Chen, Weihong Han, Wenhuan Wang, Yaju Xiong, Ling Tong:
Air Pollution Sources Identification Precisely Based on Remotely Sensed Aerosol and Glowworm Swarm Optimization. SmartCity 2015: 112-116 - 2014
- [j1]Li He, Yan Jia, Zhaoyun Ding, Weihong Han:
Hierarchical classification with a topic taxonomy via LDA. Int. J. Mach. Learn. Cybern. 5(4): 491-497 (2014) - [c29]Fei Liu, Hong Yin, Weihong Han:
A Top K Relative Outlier Detection Algorithm in Uncertain Datasets. APWeb 2014: 36-47 - [c28]Lu Deng, Weihong Han, Aiping Li, Yong Quan:
The Research of Partitioning Model Based on Virtual Identity Data. APWeb Workshophs 2014: 214-224 - [c27]Yi Zheng, Weihong Han, Chengzhang Zhu:
A Novel Feature Selection Method Based on Category Distribution and Phrase Attributes. ISCTCS 2014: 25-32 - [e1]Weihong Han, Zi Huang, Changjun Hu, Hongli Zhang, Li Guo:
Web Technologies and Applications - APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings. Lecture Notes in Computer Science 8710, Springer 2014, ISBN 978-3-319-11118-6 [contents] - 2013
- [c26]Li He, Yan Jia, Zhaoyun Ding, Weihong Han:
Research on Large Scale Hierarchical Classification Based on Candidate Search. IEEE WISA 2013: 355-360 - [c25]Hu Li, Peng Zou, Weihong Han, Rongze Xia:
A Combination Method for Multi-class Imbalanced Data Classification. IEEE WISA 2013: 365-368 - [c24]Hu Li, Peng Zou, Weihong Han, Rongze Xia, Fei Liu:
Ensemble multi-label learning based on neural network. ICIMCS 2013: 323-326 - [c23]Weihong Han, Ling Tong, Jinping Bai, Yunping Chen:
Spatial distribution of PM2.5 concentration based on aerosol optical thickness inverted by Landsat ETM+ data over Chengdu. IGARSS 2013: 2250-2253 - [c22]Hu Li, Peng Zou, Weihong Han, Rongze Xia:
Imbalanced Chinese Text Classification Based on Weighted Sampling. ISCTCS 2013: 38-45 - [c21]Hu Li, Peng Zou, Weihong Han:
Chinese Text Classification Based on Neural Network. ISNN (1) 2013: 514-522 - [c20]Dong Liu, Quanyuan Wu, Weihong Han:
Measuring Micro-blogging User Influence Based on User-Tweet Interaction Model. ICSI (2) 2013: 146-153 - 2012
- [c19]Fei Liu, Yan Jia, Weihong Han:
A New K-anonymity Algorithm towards Multiple Sensitive Attributes. CIT 2012: 768-772 - [c18]Fei Liu, Yan Jia, Weihong Han:
A Multi-phase k-anonymity Algorithm Based on Clustering Techniques. ISCTCS 2012: 365-372 - [c17]Weihong Han, Qingguang Wang, Yan Jia:
Research and Implement of Security Situation Awareness System YH-SSAS. ISCTCS 2012: 721-729
2000 – 2009
- 2009
- [c16]Bo Wang, Yan Jia, Yi Han, Weihong Han:
Effective Feature Selection on Data with Uncertain Labels. ICDE 2009: 1657-1662 - [c15]Weihong Han, Yan Jia, Shuqiang Yang:
Research of Massive Internet Text Data Real-Time Loading and Index System. NCM 2009: 960-965 - 2008
- [c14]Peng Zou, Liang Su, Yan Jia, Weihong Han, Shuqiang Yang:
Fast similarity matching on data stream with noise. ICDE Workshops 2008: 194-199 - 2007
- [c13]Di Zheng, Yan Jia, Peng Zhou, Weihong Han:
Context-Aware Middleware Support for Component Based Applications in Pervasive Computing. APPT 2007: 161-171 - [c12]Le Wang, Li Tian, Yan Jia, Weihong Han:
A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means. APWeb/WAIM Workshops 2007: 198-203 - [c11]Di Zheng, Jun Wang, Yan Jia, Weihong Han, Peng Zou:
Middleware Based Context Management for the Component-Based Pervasive Computing. ATC 2007: 71-81 - [c10]Liang Su, Weihong Han, Shuqiang Yang, Peng Zou, Yan Jia:
Continuous Adaptive Outlier Detection on Distributed Data Streams. HPCC 2007: 74-85 - [c9]Le Wang, Yan Jia, Weihong Han:
Instant Message Clustering Based on Extended Vector Space Model. ISICA 2007: 435-443 - [c8]Liang Su, Weihong Han, Peng Zou, Yan Jia:
Continuous Kernel-Based Outlier Detection over Distributed Data Streams. ISPA Workshops 2007: 305-314 - [c7]Di Zheng, Jun Wang, Yan Jia, Weihong Han, Peng Zou:
Deployment of Context-Aware Component-Based Applications Based on Middleware. UIC 2007: 908-918 - 2006
- [c6]Di Zheng, Jun Wang, Weihong Han, Yan Jia, Peng Zou:
Towards A Context-Aware Middleware for Deploying Component-Based Applications in Pervasive Computing. GCC 2006: 454-457 - [c5]Weihong Han, Yan Jia, Shuqiang Yang:
Research and Implement of Real-Time Data Loading System IMIL. WISE Workshops 2006: 133-144 - 2005
- [c4]Kebo Wang, Zhiying Wang, Yan Jia, Weihong Han:
An Optimal Component Distribution Algorithm Based on MINLP. ICCNMC 2005: 808-816 - 2004
- [c3]Yi Ren, Quanyuan Wu, Yan Jia, Jianbo Guan, Weihong Han:
Transactional Business Coordination and Failure Recovery for Web Services Composition. GCC 2004: 26-33 - 2003
- [c2]Lei Dou, Quanyuan Wu, Yan Jia, Weihong Han:
A Dynamic Reconfiguration Platform Based on Distributed Component Technology CCM. APPT 2003: 520-524 - [c1]Yi Ren, Jianbo Guan, Yan Jia, Weihong Han, Quanyuan Wu:
StarOTS: An Effcient Distributed Transaction Recovery Mechanism in the CORBA Component Runtime Environment. GCC (1) 2003: 932-939
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint