default search action
Zhenfei Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang:
Key derivable signature and its application in blockchain stealth address. Cybersecur. 7(1): 43 (2024) - [j15]Ke Hu, Fei Wu, Zhenfei Zhang, Jun Luo, Huayan Pu:
High-low level task combination for object detection in foggy weather conditions. J. Vis. Commun. Image Represent. 98: 104042 (2024) - [c35]Zhenfei Zhang, Mingyang Li, Ming-Ching Chang:
A New Benchmark and Model for Challenging Image Manipulation Detection. AAAI 2024: 7405-7413 - [c34]Zhenfei Zhang, Mingyang Li, Xin Li, Ming-Ching Chang, Jun-Wei Hsieh:
Image Manipulation Detection with Implicit Neural Representation and Limited Supervision. ECCV (88) 2024: 255-273 - [c33]Zhenfei Zhang, Tsung-Wei Huang, Guan-Ming Su, Ming-Ching Chang, Xin Li:
Text-Driven Synchronized Diffusion Video and Audio Talking Head Generation. MIPR 2024: 61-67 - [i41]Wenqing Hu, Tianyi Liu, Ye Zhang, Yuncong Zhang, Zhenfei Zhang:
Parallel Zero-knowledge Virtual Machine. IACR Cryptol. ePrint Arch. 2024: 387 (2024) - [i40]Hang Su, Qi Yang, Zhenfei Zhang:
Jolt-b: recursion friendly Jolt with basefold commitment. IACR Cryptol. ePrint Arch. 2024: 1131 (2024) - 2023
- [c32]Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang:
Chipmunk: Better Synchronized Multi-Signatures from Lattices. CCS 2023: 386-400 - [c31]Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang:
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates. EUROCRYPT (2) 2023: 499-530 - [c30]Dandan Fu, Zishuo Chen, Xuejiao Liao, Jing Feng, Xun Liu, Zhenfei Zhang:
Tomato leaf diseases classification with convolutional neural network. ICCEIC 2023: 99-102 - [c29]Zhenfei Zhang, Ming-Ching Chang:
Two-Stage Dual Augmentation with CLIP for Improved Text-to-Sketch Synthesis. MIPR 2023: 1-6 - [c28]Zhenfei Zhang, Ping Li, Biaokai Zhu, Tao Wu, Panlong Yang, Zhao Lv:
Arrow: Capture the Inaudible Attacker in 3D Space via Smart-speaker. MSN 2023: 415-422 - [c27]Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho:
VeriZexe: Decentralized Private Computation with Universal Setup. USENIX Security Symposium 2023: 4445-4462 - [i39]Zhenfei Zhang, Mingyang Li, Ming-Ching Chang:
A New Benchmark and Model for Challenging Image Manipulation Detection. CoRR abs/2311.14218 (2023) - [i38]Zhenfei Zhang:
Origami: Fold a Plonk for Ethereum's VDF. IACR Cryptol. ePrint Arch. 2023: 384 (2023) - [i37]Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang:
Chipmunk: Better Synchronized Multi-Signatures from Lattices. IACR Cryptol. ePrint Arch. 2023: 1820 (2023) - 2022
- [j14]Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seong Oun Hwang:
TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU. IEEE Access 10: 20616-20632 (2022) - [j13]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid dual attack on LWE with arbitrary secrets. Cybersecur. 5(1): 15 (2022) - [c26]Nils Fleischhacker, Mark Simkin, Zhenfei Zhang:
Squirrel: Efficient Synchronized Multi-Signatures from Lattices. CCS 2022: 1109-1123 - [c25]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphaël C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. ESORICS (1) 2022: 25-45 - [c24]Zhenfei Zhang, Ming-Ching Chang, Tien D. Bui:
Improving Class Activation Map for Weakly Supervised Object Localization. ICASSP 2022: 2624-2628 - [i36]Nils Fleischhacker, Mark Simkin, Zhenfei Zhang:
Squirrel: Efficient Synchronized Multi-Signatures from Lattices. IACR Cryptol. ePrint Arch. 2022: 694 (2022) - [i35]Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho:
VERI-ZEXE: Decentralized Private Computation with Universal Setup. IACR Cryptol. ePrint Arch. 2022: 802 (2022) - [i34]Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang:
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates. IACR Cryptol. ePrint Arch. 2022: 1355 (2022) - [i33]Zhenfei Zhang:
An SVP attack on Vortex. IACR Cryptol. ePrint Arch. 2022: 1754 (2022) - 2021
- [c23]Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu:
Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand. Financial Cryptography (2) 2021: 560-578 - [i32]Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu:
ZEN: Efficient Zero-Knowledge Proofs for Neural Networks. IACR Cryptol. ePrint Arch. 2021: 87 (2021) - [i31]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid Dual Attack on LWE with Arbitrary Secrets. IACR Cryptol. ePrint Arch. 2021: 152 (2021) - [i30]Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang:
TensorCrypto. IACR Cryptol. ePrint Arch. 2021: 173 (2021) - [i29]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. IACR Cryptol. ePrint Arch. 2021: 302 (2021) - [i28]Shumo Chu, Yu Xia, Zhenfei Zhang:
Manta: a Plug and Play Private DeFi Stack. IACR Cryptol. ePrint Arch. 2021: 743 (2021) - [i27]Simon Masson, Antonio Sanso, Zhenfei Zhang:
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field. IACR Cryptol. ePrint Arch. 2021: 1152 (2021) - 2020
- [j12]Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang:
Modular lattice signatures, revisited. Des. Codes Cryptogr. 88(3): 505-532 (2020) - [j11]Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
A signature scheme from the finite field isomorphism problem. J. Math. Cryptol. 14(1): 39-54 (2020) - [c22]Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang:
Pointproofs: Aggregating Proofs for Multiple Vector Commitments. CCS 2020: 2007-2023 - [c21]Zhenfei Zhang, Tien D. Bui:
Attention-based Selection Strategy for Weakly Supervised Object Localization. ICPR 2020: 10305-10311 - [c20]Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. Public Key Cryptography (2) 2020: 66-93 - [i26]Naitik Bhise, Zhenfei Zhang, Tien D. Bui:
Improving Text to Image Generation using Mode-seeking Function. CoRR abs/2008.08976 (2020) - [i25]Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. IACR Cryptol. ePrint Arch. 2020: 198 (2020) - [i24]Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang:
Pointproofs: Aggregating Proofs for Multiple Vector Commitments. IACR Cryptol. ePrint Arch. 2020: 419 (2020) - [i23]Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu:
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand. IACR Cryptol. ePrint Arch. 2020: 1222 (2020) - [i22]Shumo Chu, Qiudong Xia, Zhenfei Zhang:
Manta: Privacy Preserving Decentralized Exchange. IACR Cryptol. ePrint Arch. 2020: 1607 (2020)
2010 – 2019
- 2019
- [c19]Xingye Lu, Man Ho Au, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. ACNS 2019: 110-130 - [c18]Dipayan Das, Man Ho Au, Zhenfei Zhang:
Ring Signatures Based on Middle-Product Learning with Errors Problems. AFRICACRYPT 2019: 139-156 - [c17]Zhenfei Zhang:
Wetland Environmental Protection and Spatial Distribution of Plant Communities in Arid and Semi-Arid Areas of Northwest China. Agro-Geoinformatics 2019: 1-5 - [c16]Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang:
Middle-Product Learning with Rounding Problem and Its Applications. ASIACRYPT (1) 2019: 55-81 - [c15]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. CRYPTO (1) 2019: 147-175 - [c14]Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-quantum Public-Key Encryption. PQCrypto 2019: 83-102 - [c13]Zhen Liu, Yanbin Pan, Zhenfei Zhang:
Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15. PQCrypto 2019: 153-166 - [c12]Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. TrustCom/BigDataSE 2019: 578-585 - [i21]Zhen Liu, Yanbin Pan, Zhenfei Zhang:
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15. IACR Cryptol. ePrint Arch. 2019: 83 (2019) - [i20]Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-Quantum Public-Key Encryption. IACR Cryptol. ePrint Arch. 2019: 90 (2019) - [i19]Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. IACR Cryptol. ePrint Arch. 2019: 567 (2019) - [i18]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. IACR Cryptol. ePrint Arch. 2019: 747 (2019) - [i17]Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang:
Middle-Product Learning with Rounding Problem and its Applications. IACR Cryptol. ePrint Arch. 2019: 1001 (2019) - [i16]Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang:
Modular lattice signatures, revisited. IACR Cryptol. ePrint Arch. 2019: 1301 (2019) - 2018
- [j10]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j9]Wei Dai, William Whyte, Zhenfei Zhang:
Optimizing Polynomial Convolution for NTRUEncrypt. IEEE Trans. Computers 67(11): 1572-1583 (2018) - [c11]Xingye Lu, Zhenfei Zhang, Man Ho Au:
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. ACISP 2018: 813-820 - [c10]Long Chen, Zhenfeng Zhang, Zhenfei Zhang:
On the Hardness of the Computational Ring-LWR Problem and Its Applications. ASIACRYPT (1) 2018: 435-464 - [c9]Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang:
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M. CARDIS 2018: 95-110 - [c8]Yarkin Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang:
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem. Public Key Cryptography (1) 2018: 125-155 - [i15]Wei Dai, William Whyte, Zhenfei Zhang:
Optimizing polynomial convolution for NTRUEncrypt. IACR Cryptol. ePrint Arch. 2018: 229 (2018) - [i14]Long Chen, Zhenfeng Zhang, Zhenfei Zhang:
On the Hardness of the Computational Ring-LWR Problem and its Applications. IACR Cryptol. ePrint Arch. 2018: 536 (2018) - [i13]Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
A signature scheme from the finite field isomorphism problem. IACR Cryptol. ePrint Arch. 2018: 675 (2018) - [i12]Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang:
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M. IACR Cryptol. ePrint Arch. 2018: 723 (2018) - [i11]Sauvik Bhattacharya, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-Quantum Public-Key Encryption. IACR Cryptol. ePrint Arch. 2018: 725 (2018) - [i10]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - [i9]Xingye Lu, Man Ho Au, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. IACR Cryptol. ePrint Arch. 2018: 857 (2018) - [i8]Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li:
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus. IACR Cryptol. ePrint Arch. 2018: 1009 (2018) - 2017
- [j8]Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Comput. J. 60(4): 588-599 (2017) - [c7]Zhenfei Zhang, Liquan Qu:
Correlation between climate warming and changes in agricultural caloric resources in arid regions of northwest China. Agro-Geoinformatics 2017: 1-5 - [c6]Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
Choosing Parameters for NTRUEncrypt. CT-RSA 2017: 3-18 - [i7]Yarkin Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang:
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem. IACR Cryptol. ePrint Arch. 2017: 548 (2017) - [i6]Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang:
A signature scheme from Learning with Truncation. IACR Cryptol. ePrint Arch. 2017: 995 (2017) - [i5]Hayo Baan, Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Jose Luis Torre-Arce, Zhenfei Zhang:
Round2: KEM and PKE based on GLWR. IACR Cryptol. ePrint Arch. 2017: 1183 (2017) - 2016
- [j7]John M. Schanck, William Whyte, Zhenfei Zhang:
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world. Proc. Priv. Enhancing Technol. 2016(4): 219-236 (2016) - [c5]Wei Dai, Berk Sunar, John M. Schanck, William Whyte, Zhenfei Zhang:
NTRU modular lattice signature scheme on CUDA GPUs. HPCS 2016: 501-508 - [i4]Wei Dai, John M. Schanck, Berk Sunar, William Whyte, Zhenfei Zhang:
NTRU Modular Lattice Signature Scheme on CUDA GPUs. IACR Cryptol. ePrint Arch. 2016: 471 (2016) - 2015
- [j6]Thomas Plantard, Willy Susilo, Zhenfei Zhang:
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme. Des. Codes Cryptogr. 76(2): 325-344 (2015) - [i3]John M. Schanck, William Whyte, Zhenfei Zhang:
A quantum-safe circuit-extension handshake for Tor. IACR Cryptol. ePrint Arch. 2015: 287 (2015) - [i2]Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
Choosing Parameters for NTRUEncrypt. IACR Cryptol. ePrint Arch. 2015: 708 (2015) - [i1]Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report. IACR Cryptol. ePrint Arch. 2015: 844 (2015) - 2014
- [j5]Kai Zheng, Jie Hu, Zhenfei Zhang, Jin Ma, Jin Qi:
An enhancement for heuristic attribute reduction algorithm in rough set. Expert Syst. Appl. 41(15): 6748-6754 (2014) - 2013
- [j4]Thomas Plantard, Willy Susilo, Zhenfei Zhang:
Fully Homomorphic Encryption Using Hidden Ideal Lattice. IEEE Trans. Inf. Forensics Secur. 8(12): 2127-2137 (2013) - [c4]Thomas Plantard, Willy Susilo, Zhenfei Zhang:
Adaptive Precision Floating Point LLL. ACISP 2013: 104-117 - 2012
- [c3]Zhenfei Zhang, Thomas Plantard, Willy Susilo:
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers. ISPEC 2012: 353-368 - [c2]Thomas Plantard, Willy Susilo, Zhenfei Zhang:
Lattice Reduction for Modular Knapsack. Selected Areas in Cryptography 2012: 275-286 - 2011
- [j3]Jin Qi, Jie Hu, Ying-hong Peng, Wei-ming Wang, Zhenfei Zhang:
AGFSM: An new FSM based on adapted Gaussian membership in case retrieval model for customer-driven design. Expert Syst. Appl. 38(1): 894-905 (2011) - [j2]Jin Qi, Jie Hu, Ying-hong Peng, Qiushi Ren, Wei-ming Wang, Zhenfei Zhang:
Integration of similarity measurement and dynamic SVM for electrically evoked potentials prediction in visual prostheses research. Expert Syst. Appl. 38(5): 5044-5060 (2011) - [c1]Zhenfei Zhang, Thomas Plantard, Willy Susilo:
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. ICISC 2011: 419-436
2000 – 2009
- 2009
- [j1]Jin Qi, Jie Hu, Ying-hong Peng, Wei-ming Wang, Zhenfei Zhang:
A case retrieval method combined with similarity measurement and multi-criteria decision making for concurrent design. Expert Syst. Appl. 36(7): 10357-10366 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint