default search action
Zhen Yang 0004
Person information
- affiliation: Beijing University of Technology, College of Computer Science, China
- affiliation (former): Beijing University of Posts and Telecommunications, China
Other persons with the same name
- Zhen Yang — disambiguation page
- Zhen Yang 0001 — Nanjing University of Posts and Telecommunications, Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, China (and 1 more)
- Zhen Yang 0002 — The Johns Hopkins University, Department of Electrical and Computer Engineering, Baltimore, MD, USA
- Zhen Yang 0003 — Beijing Institute of Technology, School of Computer Science and Technology, China
- Zhen Yang 0005 — Xinyang Normal University, School of Physics and Electronic Engineering / Key Laboratory of Microelectronics and Energy of Henan Province, China
- Zhen Yang 0006 — University of Waterloo, Ontario, Canada (and 1 more)
- Zhen Yang 0007 — University of Chinese Academy of Sciences, China (and 1 more)
- Zhen Yang 0008 — Huawei, Shanghai, China
- Zhen Yang 0009 — Zhejiang University, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Hao Yue, Tong Li, Di Wu, Runzi Zhang, Zhen Yang:
Detecting APT attacks using an attack intent-driven and sequence-based learning approach. Comput. Secur. 140: 103748 (2024) - [j45]Di Wu, Zhen Yang, Tong Li, Junrui Liu:
JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm. Concurr. Comput. Pract. Exp. 36(4) (2024) - [j44]Junrui Liu, Tong Li, Zhen Yang, Di Wu, Huan Liu:
Fusion learning of preference and bias from ratings and reviews for item recommendation. Data Knowl. Eng. 150: 102283 (2024) - [j43]Zifang Tang, Tong Li, Di Wu, Junrui Liu, Zhen Yang:
A Systematic Literature Review of Reinforcement Learning-based Knowledge Graph Research. Expert Syst. Appl. 238(Part B): 121880 (2024) - [j42]Di Wu, Tong Li, Yiran Zhao, Junrui Liu, Zifang Tang, Zhen Yang:
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment. Int. J. Softw. Eng. Knowl. Eng. 34(5): 821-843 (2024) - [j41]Ning Li, Ming Zhou, Haiyang Yu, Yuwen Chen, Zhen Yang:
SVFLC: Secure and Verifiable Federated Learning With Chain Aggregation. IEEE Internet Things J. 11(8): 13125-13136 (2024) - [j40]Ming Zhou, Zhen Yang, Haiyang Yu, Shui Yu:
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain. J. Netw. Comput. Appl. 223: 103814 (2024) - [j39]Yunbo Huang, Yuwen Chen, José-Fernán Martí-nez-Ortega, Haiyang Yu, Zhen Yang:
Batch data recovery from gradients based on generative adversarial networks. Neural Comput. Appl. 36(24): 14661-14672 (2024) - [j38]Haiyang Yu, Hui Zhang, Zhen Yang, Shui Yu:
Edasvic: Enabling Efficient and Dynamic Storage Verification for Clouds of Industrial Internet Platforms. IEEE Trans. Inf. Forensics Secur. 19: 6896-6909 (2024) - [j37]Xigui Wang, Haiyang Yu, Yuwen Chen, Richard O. Sinnott, Zhen Yang:
PrVFL: Pruning-Aware Verifiable Federated Learning for Heterogeneous Edge Computing. IEEE Trans. Mob. Comput. 23(12): 15062-15079 (2024) - [j36]Haiyang Yu, Runtong Xu, Hui Zhang, Zhen Yang, Huan Liu:
EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks. IEEE/ACM Trans. Netw. 32(2): 1723-1737 (2024) - [j35]Haiyang Yu, Yurun Chen, Zhen Yang, Yuwen Chen, Shui Yu:
EDCOMA: Enabling Efficient Double Compressed Auditing for Blockchain-Based Decentralized Storage. IEEE Trans. Serv. Comput. 17(5): 2273-2286 (2024) - [c53]Gengyu Lyu, Weiqi Kang, Haobo Wang, Zheng Li, Zhen Yang, Songhe Feng:
Common-Individual Semantic Fusion for Multi-View Multi-Label Learning. IJCAI 2024: 4715-4723 - [c52]Jinyuan Wang, Tong Li, Runzi Zhang, Zifang Tang, Di Wu, Zhen Yang:
VCRLog: Variable Contents Relationship Perception for Log-based Anomaly Detection. ISSRE 2024: 156-167 - 2023
- [j34]Shuang Zheng, Zhengwen He, Zhen Yang, Chengbin Chu, Nengmin Wang:
Effective upper and lower bounds for a two-stage reentrant flexible flow shop scheduling problem. Comput. Oper. Res. 153: 106183 (2023) - [j33]Di Wu, Weite Feng, Tong Li, Zhen Yang:
Evaluating the intelligence capability of smart homes: A conceptual modeling approach. Data Knowl. Eng. 148: 102218 (2023) - [j32]Zhen Yang, Shisong Yang, Yunbo Huang, José-Fernán Martínez, Lourdes López-Santidrián, Yuwen Chen:
AAIA: an efficient aggregation scheme against inverting attack for federated learning. Int. J. Inf. Sec. 22(4): 919-930 (2023) - [j31]Yuwen Chen, Shisong Yang, José-Fernán Martínez-Ortega, Lourdes López-Santidrián, Zhen Yang:
A Resilient Group-Based Multisubset Data Aggregation Scheme for Smart Grid. IEEE Internet Things J. 10(15): 13649-13661 (2023) - [j30]Shisong Yang, Yuwen Chen, Zhen Yang, Bowen Li, Huan Liu:
Fast Secure Aggregation With High Dropout Resilience for Federated Learning. IEEE Trans. Green Commun. Netw. 7(3): 1501-1514 (2023) - [j29]Xiaohu Shan, Haiyang Yu, Yuwen Chen, Zhen Yang:
Physical Unclonable Function-Based Lightweight and Verifiable Data Stream Transmission for Industrial IoT. IEEE Trans. Ind. Informatics 19(12): 11573-11583 (2023) - [j28]Gengyu Lyu, Songhe Feng, Shaokai Wang, Zhen Yang:
Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning. ACM Trans. Intell. Syst. Technol. 14(2): 25:1-25:16 (2023) - [j27]Zhanyu Ma, Xiaoou Lu, Jiyang Xie, Zhen Yang, Jing-Hao Xue, Zheng-Hua Tan, Bo Xiao, Jun Guo:
On the Comparisons of Decorrelation Approaches for Non-Gaussian Neutral Vector Variables. IEEE Trans. Neural Networks Learn. Syst. 34(4): 1823-1837 (2023) - [j26]Zhen Yang, Ming Zhou, Haiyang Yu, Richard O. Sinnott, Huan Liu:
Efficient and Secure Federated Learning With Verifiable Weighted Average Aggregation. IEEE Trans. Netw. Sci. Eng. 10(1): 205-222 (2023) - [c51]Zhen Yang, Junrui Liu, Tong Li, Di Wu, Shiqiu Yang, Huan Liu:
A Two-tier Shared Embedding Method for Review-based Recommender Systems. CIKM 2023: 2928-2938 - [c50]Yu Liu, Tong Li, Zheqing Huang, Zhen Yang:
BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation. SEET@ICSE 2023: 141-152 - [c49]Lidan Zhao, Tong Li, Zhen Yang, Junrui Liu:
A novel subjective bias detection method based on multi-information fusion. SEKE 2023: 449-455 - [c48]Jiacheng Li, Tong Li, Runzi Zhang, Di Wu, Hao Yue, Zhen Yang:
APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning. TrustCom 2023: 10-19 - [i2]Mingzhu Zhang, Ruiping Yin, Zhen Yang, Yipeng Wang, Kan Li:
Advances and Challenges of Multi-task Learning Method in Recommender System: A Survey. CoRR abs/2305.13843 (2023) - 2022
- [j25]Yongheng Liu, Zhen Yang, Tong Li, Di Wu:
A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction. Appl. Intell. 52(5): 5310-5324 (2022) - [j24]Yu Du, Tong Li, Muhammad Salman Pathan, Hailay Kidu Teklehaymanot, Zhen Yang:
An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits. Cogn. Comput. 14(1): 78-90 (2022) - [j23]Zhen Yang, Xiaodong Liu, Tong Li, Di Wu, Jinjiang Wang, Yunwei Zhao, Han Han:
A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput. Secur. 116: 102675 (2022) - [j22]Weite Feng, Junrui Liu, Tong Li, Zhen Yang, Di Wu:
FAC: A Music Recommendation Model Based on Fusing Audio and Chord Features (115). Int. J. Softw. Eng. Knowl. Eng. 32(11&12): 1753-1770 (2022) - [j21]Junrui Liu, Zhen Yang, Tong Li, Di Wu, Ruiyi Wang:
SPR: Similarity pairwise ranking for personalized recommendation. Knowl. Based Syst. 239: 107828 (2022) - [j20]Haiyang Yu, Zhen Yang, Shanshan Tu, Muhammad Waqas, Huan Liu:
Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2944-2956 (2022) - [c47]Yueqi Zhang, Ruiping Yin, Zhen Yang:
Data Poisoning Attacks to Session-Based Recommender Systems. ICCNS 2022: 1-6 - [c46]Shisong Yang, Yuwen Chen, Shanshan Tu, Zhen Yang:
A Post-quantum Secure Aggregation for Federated Learning. ICCNS 2022: 117-124 - [c45]Zhanshi Li, Tong Li, Runzi Zhang, Di Wu, Zhen Yang:
A Novel Network Alert Classification Model based on Behavior Semantic. SEKE 2022: 553-558 - [c44]Weite Feng, Tong Li, Zhen Yang:
COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms. SEKE 2022: 616-621 - 2021
- [j19]Haiyang Yu, Shuai Ma, Qi Hu, Zhen Yang:
Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks. Computer 54(8): 33-45 (2021) - [j18]Haiyang Yu, Zhen Yang, Muhammad Waqas, Shanshan Tu, Zhu Han, Zahid Halim, Richard O. Sinnott, Udaya Parampalli:
Efficient dynamic multi-replica auditing for the cloud with geographic location. Future Gener. Comput. Syst. 125: 285-298 (2021) - [j17]Yuwen Chen, José-Fernán Martínez-Ortega, Lourdes López-Santidrián, Haiyang Yu, Zhen Yang:
A Dynamic Membership Group-Based Multiple-Data Aggregation Scheme for Smart Grid. IEEE Internet Things J. 8(15): 12360-12374 (2021) - [j16]Xiaodong Liu, Tong Li, Runzi Zhang, Di Wu, Yongheng Liu, Zhen Yang:
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection. Secur. Commun. Networks 2021: 9947059:1-9947059:15 (2021) - [j15]Haiyang Yu, Qi Hu, Zhen Yang, Huan Liu:
Efficient Continuous Big Data Integrity Checking for Decentralized Storage. IEEE Trans. Netw. Sci. Eng. 8(2): 1658-1673 (2021) - [c43]Guodi Wang, Tong Li, Hao Yue, Zhen Yang, Runzi Zhang:
Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis. COMPSAC 2021: 714-724 - [c42]Hailay Kidu, Haile Misgna, Tong Li, Zhen Yang:
User Response-Based Fake News Detection on Social Media. ICAI 2021: 173-187 - [c41]Hongao Zhang, Zhen Yang, Haiyang Yu:
Lightweight and Privacy-preserving Search over Encryption Blockchain. IC-NIDC 2021: 423-427 - [c40]Ming Zhou, Zhen Yang, Haiyang Yu, Yingxu Lai, Zhanyu Ma:
Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation. IC-NIDC 2021: 428-433 - [c39]Jian Wu, Haiyang Yu, Zhen Yang, Ruiping Yin:
Disk Failure Prediction with Multiple Channel Convolutional Neural Network. IJCNN 2021: 1-8 - [c38]Weite Feng, Tong Li, Haiyang Yu, Zhen Yang:
A Hybrid Music Recommendation Algorithm Based on Attention Mechanism. MMM (1) 2021: 328-339 - [c37]Yinghao Zhi, Tong Li, Zhen Yang:
Extracting features from app descriptions based on POS and dependency. SAC 2021: 1354-1358 - 2020
- [j14]Shuang Zheng, Zhen Yang, Zhengwen He, Nengmin Wang, Chengbin Chu, Haiyang Yu:
Hybrid simulated annealing and reduced variable neighbourhood search for an aircraft scheduling and parking problem. Int. J. Prod. Res. 58(9): 2626-2646 (2020) - [c36]Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery: Extended Abstract. AIRE@RE 2020: 22 - [c35]Ruiyi Wang, Tong Li, Zhen Yang, Haiyang Yu:
Predicting Polypharmacy Side Effects Based on an Enhanced Domain Knowledge Graph. ICAI 2020: 89-103 - [c34]Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery. SEKE 2020: 77-82 - [c33]Hesong Wang, Zhen Yang:
BJUT at TREC 2020 Incident Streams Track. TREC 2020
2010 – 2019
- 2019
- [j13]Haiyang Yu, Zhen Yang, Richard O. Sinnott:
Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology. IEEE Access 7: 6288-6296 (2019) - [j12]Haiyang Yu, Yongquan Cai, Richard O. Sinnott, Zhen Yang:
ID-based dynamic replicated data auditing for the cloud. Concurr. Comput. Pract. Exp. 31(11) (2019) - [j11]Zhen Yang, Haiyang Yu, Jiliang Tang, Huan Liu:
Toward Keyword Extraction in Constrained Information Retrieval in Vehicle Social Network. IEEE Trans. Veh. Technol. 68(5): 4285-4294 (2019) - [c32]Shiheng Wang, Tong Li, Zhen Yang:
Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach. APSEC 2019: 39-46 - [c31]Shiheng Wang, Tong Li, Zhen Yang:
Using Graph Embedding to Improve Requirements Traceability Recovery. ICAI 2019: 533-545 - 2018
- [j10]Zhen Yang, Jiliang Tang, Huan Liu:
Cloud Information Retrieval: Model Description and Scheme Design. IEEE Access 6: 15420-15430 (2018) - [j9]Zhen Yang, Weitong Chen, Jian Huang:
Enhancing recommendation on extremely sparse data with blocks-coupled non-negative matrix factorization. Neurocomputing 278: 126-133 (2018) - [j8]Zhanyu Ma, Jing-Hao Xue, Arne Leijon, Zheng-Hua Tan, Zhen Yang, Jun Guo:
Decorrelation of Neutral Vector Variables: Theory and Applications. IEEE Trans. Neural Networks Learn. Syst. 29(1): 129-143 (2018) - [j7]Zhen Yang, Kaiming Gao, Jian Huang:
External Expansion Risk Management: Enhancing Microblogging Filtering Using Implicit Query. Wirel. Pers. Commun. 102(3): 2199-2209 (2018) - [c30]Ning Lu, Hesong Wang, Zhen Yang:
BJUT at TREC 2018: Incident Streams Track. TREC 2018 - 2017
- [c29]Lupu Li, Guangyuan Zhang, Zhen Yang:
BJUT at TREC 2017: Tasks Track. TREC 2017 - [c28]Qingwei Meng, Kai Wang, Zhen Yang:
BJUT at TREC 2017: Real-Time Summarization Track. TREC 2017 - [i1]Zhanyu Ma, Jing-Hao Xue, Arne Leijon, Zheng-Hua Tan, Zhen Yang, Jun Guo:
Decorrelation of Neutral Vector Variables: Theory and Applications. CoRR abs/1705.10524 (2017) - 2016
- [c27]Youjun E, Weitong Chen, Zhen Yang:
BJUT at TREC 2016: LiveQA Track. TREC 2016 - [c26]Cheng Li, Zhen Yang, David Lillis:
BJUT at TREC 2016 OpenSearch Track: Search Ranking Based on Clickthrough Data. TREC 2016 - [c25]Kai Wang, Zhen Yang:
BJUT at TREC 2016: Real-Time Summarization Track. TREC 2016 - 2015
- [j6]Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai:
Sensational Headline Identification By Normalized Cross Entropy-Based Metric. Comput. J. 58(4): 644-655 (2015) - [j5]Yingxu Lai, Wenwen Zhang, Zhen Yang:
Software Abnormal Behavior Detection Based on Function Semantic Tree. IEICE Trans. Inf. Syst. 98-D(10): 1777-1787 (2015) - [j4]Yingxu Lai, Yinong Chen, Zenghui Liu, Zhen Yang, Xiulong Li:
On monitoring and predicting mobile network traffic abnormality. Simul. Model. Pract. Theory 50: 176-188 (2015) - [j3]Yingxu Lai, Yinong Chen, Qichen Zou, Zenghui Liu, Zhen Yang:
Design and analysis on trusted network equipment access authentication protocol. Simul. Model. Pract. Theory 51: 157-169 (2015) - [c24]Zhen Yang, Isaac Jones, Xia Hu, Huan Liu:
Finding the Right Social Media Site for Questions. ASONAM 2015: 639-644 - [c23]Harsh Dani, Fred Morstatter, Xia Hu, Zhen Yang, Huan Liu:
Social Answer: A System for Finding Appropriate Sites for Questions in Social Media. ICDM Workshops 2015: 1632-1635 - [c22]Weitong Chen, Hanchen Li, Zhen Yang:
BJUT at TREC 2015 Contextual Suggestion Track. TREC 2015 - [c21]Chaoyang Li, Zhen Yang, Kefeng Fan:
BJUT at TREC 2015 Microblog Track: Real-Time Filtering Using Non-negative Matrix Factorization. TREC 2015 - [c20]Luyang Liu, Zhen Yang:
BJUT at TREC 2015 Microblog Track: Real-Time Filtering Using Knowledge Base. TREC 2015 - [c19]Yingzhe Yao, Zhen Yang, Kefeng Fan:
BJUT at TREC 2015 Temporal Summarization Track. TREC 2015 - 2014
- [j2]Lijuan Duan, Hongyan Zhong, Jun Miao, Zhen Yang, Wei Ma, Xuan Zhang:
A Voting Optimized Strategy Based on ELM for Improving Classification of Motor Imagery BCI Data. Cogn. Comput. 6(3): 477-483 (2014) - [j1]Yingxu Lai, Wenwen Zhang, Zhen Yang:
Research on Software Trust Analysis Based on Behavior. IEICE Trans. Inf. Syst. 97-D(3): 488-496 (2014) - [c18]Lijuan Duan, Zeming Zhao, Wei Ma, Jili Gu, Zhen Yang, Yuanhua Qiao:
A combined model for scan path in pedestrian searching. IJCNN 2014: 2156-2161 - [c17]Hanchen Li, Zhen Yang, Yingxu Lai, Lijuan Duan, Kefeng Fan:
BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information. TREC 2014 - [c16]Guangyuan Zhang, Zhen Yang, Shuyong Si:
BJUT at TREC 2014 Microblog Track. TREC 2014 - [c15]Yun Zhao, Fei Yao, Huayang Sun, Zhen Yang:
BJUT at TREC 2014 Temporal Summarization Track. TREC 2014 - 2013
- [c14]Lijuan Duan, Haitao Qiao, Chunpeng Wu, Zhen Yang, Wei Ma:
Modeling of Human Saccadic Scanpaths Based on Visual Saliency. ICGEC 2013: 267-274 - [c13]Lijuan Duan, Jili Gu, Zhen Yang, Jun Miao, Wei Ma, Chunpeng Wu:
Bio-inspired Visual Attention Model and Saliency Guided Object Segmentation. ICGEC 2013: 291-298 - [c12]Zhen Yang, Fei Yao, Huayang Sun, Yun Zhao, Yingxu Lai, Kefeng Fan:
BJUT at TREC 2013 Temporal Summarization Track. TREC 2013 - [c11]Zhen Yang, Guangyuan Zhang, Shuyong Si, Yingxu Lai, Kefeng Fan:
BJUT at TREC 2013 Microblog Track. TREC 2013 - 2011
- [c10]Lijuan Duan, Chunpeng Wu, Haitao Qiao, Jili Gu, Jun Miao, Laiyun Qing, Zhen Yang:
Bio-inspired Visual Saliency Detection and Its Application on Image Retargeting. ICONIP (1) 2011: 182-189 - [c9]Lijuan Duan, Xuebin Wang, Zhen Yang, Haiyan Zhou, Chunpeng Wu, Qi Zhang, Jun Miao:
An Emotional Face Evoked EEG Signal Recognition Method Based on Optimal EEG Feature and Electrodes Selection. ICONIP (1) 2011: 296-305 - [c8]Kefeng Fan, Subing Zhang, Yinghua Huang, Zhen Yang:
A risk assessment model for the operating system of the DTV. HPCS 2011: 621-625 - 2010
- [c7]Yingxu Lai, Qian Ma, Zhen Yang, Jing Liu:
Framework of Web content filtering for IPv6. HPCS 2010: 686-690 - [c6]Lijuan Duan, Jicai Ma, Zhen Yang, Jun Miao:
An Approach to Texture Segmentation Analysis Based on Sparse Coding Model and EM Algorithm. ISNN (2) 2010: 128-135
2000 – 2009
- 2009
- [c5]Zhen Yang, Kefeng Fan, Yingxu Lai:
Trusted Computing Based Mobile DRM Authentication Scheme. IAS 2009: 7-10 - 2006
- [c4]Zhen Yang, Xiangfei Nie, Weiran Xu, Jun Guo:
An Approach to Spam Detection by Naive Bayes Ensemble Based on Decision Induction. ISDA (2) 2006: 861-866 - [c3]Zhen Yang, Jun Guo, Weiran Xu, Xiangfei Nie, Jian Wang, Jianjun Lei:
Multi-scale Support Vector Machine for Regression Estimation. ISNN (1) 2006: 1030-1037 - [c2]Zhen Yang, Wei Xu, Bo Chen, Weiran Xu, Jun Guo:
BUPT at TREC 2006: Spam Track. TREC 2006 - 2005
- [c1]Zhen Yang, Weiran Xu, Bo Chen, Jiani Hu, Jun Guo:
PRIS Kidult Anti-SPAM Solution at the TREC 2005 Spam Track: Improving the Performance of Naive Bayes for Spam Detection. TREC 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint