


default search action
Hassan Jameel Asghar
Person information
- affiliation: Macquarie University, Department of Computing, Sydney, NSW, Australia
- affiliation: CSIRO, Data61, Sydney, NSW, Australia
Other persons with the same name
- Hassan Asghar 0002
— Hongik University, Department of Software and Communications Engineering, Sejong, South Korea (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Hassan Jameel Asghar
, Benjamin Zi Hao Zhao, Muhammad Ikram
, Giang Linh Duc Nguyen, Dali Kaafar
, Sean Lamont, Daniel Coscia:
Use of cryptography in malware obfuscation. J. Comput. Virol. Hacking Tech. 20(1): 135-152 (2024) - [c23]Rahat Masood
, Wing Yan Cheng
, Dinusha Vatsalan
, Deepak Mishra
, Hassan Jameel Asghar
, Dali Kaafar
:
Privacy Preserving Release of Mobile Sensor Data. ARES 2024: 5:1-5:13 - [c22]Muhammad Ikram, I Wayan Budi Sentana, Hassan Jameel Asghar, Mohamed Ali Kâafar, Michal Kepkowski:
More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator Apps. WISE (5) 2024: 177-192 - [i44]Conor Atkins, Ian D. Wood, Mohamed Ali Kâafar, Hassan Asghar, Nardine Basta, Michal Kepkowski:
ConvoCache: Smart Re-Use of Chatbot Responses. CoRR abs/2406.18133 (2024) - [i43]Tariq Bontekoe, Hassan Jameel Asghar, Fatih Turkmen:
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model. CoRR abs/2406.18940 (2024) - [i42]Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kâafar:
On the Robustness of Malware Detectors to Adversarial Samples. CoRR abs/2408.02310 (2024) - [i41]Hassan Jameel Asghar, Arghya Mukherjee, Gavin K. Brennen:
Efficient Fault-Tolerant Quantum Protocol for Differential Privacy in the Shuffle Model. CoRR abs/2409.04026 (2024) - [i40]Robin Carpentier, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Dali Kaafar:
Preempting Text Sanitization Utility in Resource-Constrained Privacy-Preserving LLM Interactions. CoRR abs/2411.11521 (2024) - [i39]Hassan Jameel Asghar, Robin Carpentier, Benjamin Zi Hao Zhao, Dali Kaafar:
dX-Privacy for Text and the Curse of Dimensionality. CoRR abs/2411.13784 (2024) - [i38]Chenhan Zhang, Benjamin Zi Hao Zhao, Hassan Asghar, Dali Kaafar:
Targeted Therapy in Data Removal: Object Unlearning Based on Scene Graphs. CoRR abs/2412.00067 (2024) - [i37]Tariq Bontekoe, Hassan Jameel Asghar, Fatih Turkmen:
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model. IACR Cryptol. ePrint Arch. 2024: 1042 (2024) - 2023
- [j18]Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Mohamed Ali Kâafar:
Unintended Memorization and Timing Attacks in Named Entity Recognition Models. Proc. Priv. Enhancing Technol. 2023(2): 329-346 (2023) - [c21]Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
, Ian D. Wood
, Mohamed Ali Kâafar
:
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories. ACNS (1) 2023: 284-308 - [i36]Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian D. Wood, Mohamed Ali Kâafar:
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories. CoRR abs/2304.05371 (2023) - [i35]Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar:
On the Adversarial Inversion of Deep Biometric Representations. CoRR abs/2304.05561 (2023) - [i34]Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar:
Practical, Private Assurance of the Value of Collaboration. CoRR abs/2310.02563 (2023) - 2022
- [j17]Josh Smith, Hassan Jameel Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, Paul Tyler:
Making the Most of Parallel Composition in Differential Privacy. Proc. Priv. Enhancing Technol. 2022(1): 253-273 (2022) - [j16]Zhigang Lu
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning With Convexified Loss Functions. IEEE Trans. Inf. Forensics Secur. 17: 2151-2165 (2022) - [j15]Nazim Uddin Sheikh
, Hassan Jameel Asghar
, Farhad Farokhi
, Mohamed Ali Kâafar
:
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters. IEEE Trans. Serv. Comput. 15(6): 3198-3209 (2022) - [i33]Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning with Convexified Loss Functions. CoRR abs/2204.01049 (2022) - [i32]Rahat Masood
, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Privacy Preserving Release of Mobile Sensor Data. CoRR abs/2205.06641 (2022) - [i31]Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar:
Unintended Memorization and Timing Attacks in Named Entity Recognition Models. CoRR abs/2211.02245 (2022) - [i30]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang L. D. Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. CoRR abs/2212.04008 (2022) - [i29]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. IACR Cryptol. ePrint Arch. 2022: 1699 (2022) - 2021
- [c20]Marina Dehez-Clementi
, Jérôme Lacan
, Jean-Christophe Deneuville, Hassan Asghar
, Dali Kaafar
:
A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation. Blockchain 2021: 257-265 - [c19]Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar
, Raghav Bhaskar, Mohamed Ali Kâafar
, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. EuroS&P 2021: 232-251 - [c18]Nazim Uddin Sheikh
, Zhigang Lu, Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics. ICETE (Selected Papers) 2021: 305-333 - [c17]Nazim Uddin Sheikh
, Zhigang Lu, Hassan Asghar
, Mohamed Ali Kâafar
:
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. SECRYPT 2021: 283-294 - [i28]Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. CoRR abs/2103.07101 (2021) - [i27]Tham Nguyen, Hassan Jameel Asghar, Raghav Bhaskar, Dali Kaafar, Farhad Farokhi
:
Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants. CoRR abs/2106.09904 (2021) - [i26]Josh Smith, Hassan Jameel Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, Paul Tyler:
Making the Most of Parallel Composition in Differential Privacy. CoRR abs/2109.09078 (2021) - 2020
- [j14]Hassan Jameel Asghar
, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Dali Kaafar
:
Differentially Private Release of Datasets using Gaussian Copula. J. Priv. Confidentiality 10(2) (2020) - [j13]Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries. Proc. Priv. Enhancing Technol. 2020(1): 103-125 (2020) - [j12]Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms. Proc. Priv. Enhancing Technol. 2020(2): 358-378 (2020) - [j11]Benjamin Zi Hao Zhao
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Francesca Trevisan
, Haiyue Yuan
:
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes. ACM Trans. Priv. Secur. 24(1): 1:1-1:33 (2020) - [c16]Marina Dehez-Clementi
, Jean-Christophe Deneuville, Jérôme Lacan
, Hassan Asghar
, Dali Kaafar
:
Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening. DPM/CBT@ESORICS 2020: 437-446 - [c15]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. NDSS 2020 - [i25]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. CoRR abs/2001.04056 (2020) - [i24]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar, Francesca Trevisan, Haiyue Yuan:
Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes. CoRR abs/2007.11210 (2020) - [i23]Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2020: 261 (2020) - [i22]Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk:
The Topographic Signature (TopoSign) Protocol. IACR Cryptol. ePrint Arch. 2020: 1220 (2020)
2010 – 2019
- 2019
- [j10]Hassan Jameel Asghar
, Emiliano De Cristofaro, Guillaume Jourjon, Mohamed Ali Kâafar
, Laurent Mathy, Luca Melis, Craig Russell, Mang Yu:
Fast privacy-preserving network function outsourcing. Comput. Networks 163 (2019) - [c14]Benjamin Zi Hao Zhao, Muhammad Ikram
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Abdelberi Chaabane, Kanchana Thilakarathna
:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. AsiaCCS 2019: 193-205 - [c13]Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams. NDSS 2019 - [i21]Hassan Jameel Asghar, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Mohamed Ali Kâafar:
Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula. CoRR abs/1902.01499 (2019) - [i20]Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Perturbation Algorithms. CoRR abs/1902.06414 (2019) - [i19]Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. CoRR abs/1904.10629 (2019) - [i18]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar:
On Inferring Training Data Attributes in Machine Learning Models. CoRR abs/1908.10558 (2019) - 2018
- [j9]Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking. Proc. Priv. Enhancing Technol. 2018(2): 122-142 (2018) - [i17]Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar:
dX-Private Mechanisms for Linear Queries. CoRR abs/1806.02389 (2018) - [i16]Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams. CoRR abs/1811.03197 (2018) - 2017
- [j8]Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack. J. Math. Cryptol. 11(3): 177-194 (2017) - [j7]Muhammad Ikram
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Anirban Mahanti, Balachander Krishnamurthy:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. Proc. Priv. Enhancing Technol. 2017(1): 79-99 (2017) - [c12]Rahat Masood
, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
POSTER: TouchTrack: How Unique are your Touch Gestures? CCS 2017: 2555-2557 - [c11]Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
, Jonathan Chan, Mohamed Ali Kâafar
:
BehavioCog: An Observation Resistant Authentication Scheme. Financial Cryptography 2017: 39-58 - [i15]Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kâafar:
Differentially Private Release of Public Transport Data: The Opal Use Case. CoRR abs/1705.05957 (2017) - [i14]Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kâafar:
On the Privacy of the Opal Data Release: A Response. CoRR abs/1705.08994 (2017) - 2016
- [c10]Jagmohan Chauhan, Hassan Jameel Asghar
, Anirban Mahanti, Mohamed Ali Kâafar
:
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. ACNS 2016: 648-665 - [c9]Luca Melis, Hassan Jameel Asghar
, Emiliano De Cristofaro, Mohamed Ali Kâafar
:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. SDN-NFV@CODASPY 2016: 39-44 - [c8]Hassan Jameel Asghar
, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar
, Laurent Mathy:
SplitBox: Toward Efficient Private Network Function Virtualization. HotMiddlebox@SIGCOMM 2016: 7-13 - [i13]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. CoRR abs/1601.06454 (2016) - [i12]Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Balachander Krishnamurthy, Anirban Mahanti:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. CoRR abs/1603.06289 (2016) - [i11]Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar, Laurent Mathy:
SplitBox: Toward Efficient Private Network Function Virtualization. CoRR abs/1605.03772 (2016) - [i10]Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, Mohamed Ali Kâafar:
BehavioCog: An Observation Resistant Authentication Scheme. CoRR abs/1610.09044 (2016) - 2015
- [j6]Hassan Jameel Asghar
, Ron Steinfeld, Shujun Li
, Mohamed Ali Kâafar
, Josef Pieprzyk
:
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Trans. Inf. Forensics Secur. 10(8): 1643-1655 (2015) - [c7]Girish Revadigar, Chitra Javali, Hassan Jameel Asghar
, Kasper Bonne Rasmussen, Sanjay Jha
:
Mobility Independent Secret Key Generation for Wearable Health-care Devices. BODYNETS 2015 - [c6]Girish Revadigar, Chitra Javali, Hassan Jameel Asghar
, Kasper Bonne Rasmussen, Sanjay Jha
:
iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel. AsiaCCS 2015: 669 - [i9]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. IACR Cryptol. ePrint Arch. 2015: 949 (2015) - [i8]Hassan Jameel Asghar, Mohamed Ali Kâafar:
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack. IACR Cryptol. ePrint Arch. 2015: 1231 (2015) - 2014
- [j5]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A subexponential construction of graph coloring for multiparty computation. J. Math. Cryptol. 8(4): 363-403 (2014) - [c5]Muhammad Ikram, Hassan Asghar
, Mohamed Ali Kâafar
, Anirban Mahanti:
On the Intrusiveness of JavaScript on the Web. CoNEXT Student Workshop 2014: 31-33 - [i7]Jagmohan Chauhan, Hassan Jameel Asghar, Mohamed Ali Kâafar, Anirban Mahanti:
Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case. CoRR abs/1412.2855 (2014) - [i6]Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A Subexponential Construction of Graph Coloring for Multiparty Computation. IACR Cryptol. ePrint Arch. 2014: 66 (2014) - [i5]Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar, Josef Pieprzyk:
Algebraic Attacks on Human Identification Protocols. IACR Cryptol. ePrint Arch. 2014: 767 (2014) - 2013
- [j4]Hassan Jameel Asghar
, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the convex hull click human identification protocol. Int. J. Inf. Sec. 12(2): 83-96 (2013) - [c4]Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. NDSS 2013 - 2012
- [i4]Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. IACR Cryptol. ePrint Arch. 2012: 659 (2012) - 2011
- [j3]Hassan Jameel Asghar
, Josef Pieprzyk
, Huaxiong Wang:
On the Hardness of the Sum of k Mins Problem. Comput. J. 54(10): 1652-1660 (2011) - 2010
- [j2]Riaz Ahmed Shaikh
, Hassan Jameel Asghar
, Brian J. d'Auriol
, Heejo Lee, Sungyoung Lee, Young Jae Song:
Achieving Network Level Privacy in Wireless Sensor Networks. Sensors 10(3): 1447-1472 (2010) - [c3]Hassan Jameel Asghar
, Josef Pieprzyk
, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. ACNS 2010: 349-366 - [c2]Hassan Jameel Asghar
, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. ISC 2010: 24-30 - [i3]Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. IACR Cryptol. ePrint Arch. 2010: 316 (2010) - [i2]Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. IACR Cryptol. ePrint Arch. 2010: 478 (2010)
2000 – 2009
- 2009
- [j1]Riaz Ahmed Shaikh
, Hassan Jameel Asghar
, Brian J. d'Auriol
, Heejo Lee, Sungyoung Lee, Young Jae Song:
Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. Sensors 9(8): 5989-6007 (2009) - [c1]Shujun Li
, Hassan Jameel Asghar
, Josef Pieprzyk
, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-Based Authentication Service). ACSAC 2009: 209-218 - [i1]Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-based Authentication Service). IACR Cryptol. ePrint Arch. 2009: 476 (2009)
Coauthor Index
aka: Dali Kaafar

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint