


default search action
Tung-Shou Chen
2020 – today
- 2025
- [j65]Wien Hong
, Guan-Zhong Su
, Wei-Ling Lin
, Tung-Shou Chen
:
Virtualized three-dimensional reference tables for efficient data embedding. J. Vis. Commun. Image Represent. 107: 104351 (2025) - 2024
- [j64]Xiaoyu Zhou
, Wien Hong
, Tung-Shou Chen, Guangsong Yang
, Cheng-Han Lin
:
An authentication scheme for color images with grayscale invariance and recoverability using image demosaicing. J. Inf. Secur. Appl. 86: 103886 (2024) - [j63]Wien Hong, Guan-Zhong Su, Tung-Shou Chen
, Jeanne Chen:
On the bitmap compression for joint coding and data hiding of AMBTC compressed images. Multim. Tools Appl. 83(35): 82131-82148 (2024) - 2023
- [j62]Xiaoyu Zhou
, Wien Hong
, Tung-Shou Chen, Guangsong Yang
:
Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques. J. Inf. Secur. Appl. 73: 103425 (2023) - [j61]Xiaoyu Zhou, Wien Hong
, Guangsong Yang, Tung-Shou Chen, Jeanne Chen:
An unsolvable pixel reduced authentication method for color images with grayscale invariance. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101726 (2023) - [j60]Xiaoyu Zhou, Guangsong Yang, Wien Hong
, Kia Sheng Chen, Tung-Shou Chen:
An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique. Multim. Tools Appl. 82(10): 15593-15612 (2023) - [c38]Xiaoyu Zhou
, Guangsong Yang
, Tung-Shou Chen
, Guan-Zhong Su
, Wien Hong
:
A Data Hiding Scheme for JPEG Images Based on EMD with Coefficient Selection Strategy. ICMSSP 2023: 19-24 - [c37]Jung-An Liu
, Wei-Ling Lin, Wei-Cheng Hong, Li-Syuan Chen, Tung-Shou Chen:
An Egg Sorting System Combining Egg Recognition Model and Smart Egg Tray. TAAI (2) 2023: 105-115 - 2021
- [j59]Wien Hong, Jeanne Chen, Peishih Chang, Jie Wu, Tung-Shou Chen, Jason Lin
:
A Color Image Authentication Scheme With Grayscale Invariance. IEEE Access 9: 6522-6535 (2021) - [j58]Wei-Ling Lin
, Chun-Hung Hsieh, Tung-Shou Chen, Jeanne Chen, Jian-Le Lee, Wei-Chung Chen:
Apply IOT technology to practice a pandemic prevention body temperature measurement system: A case study of response measures for COVID-19. Int. J. Distributed Sens. Networks 17(5): 155014772110181 (2021) - [j57]Chen-Yi Lin, Tung-Shou Chen, Jeanne Chen, Chih-Yu Chen:
Personalized live streaming channel recommendation based on most similar neighbors. Multim. Tools Appl. 80(13): 19867-19883 (2021) - 2020
- [j56]Haishan Chen, Junying Yuan, Wien Hong, Jiangqun Ni, Tung-Shou Chen:
On Performance Improvement Of Reversible Data Hiding With Contrast Enhancement. Comput. J. 63(10): 1584-1596 (2020) - [j55]Xiaoyu Zhou, Wien Hong, Shaowei Weng, Tung-Shou Chen, Jeanne Chen:
Reversible and recoverable authentication method for demosaiced images using adaptive coding technique. J. Inf. Secur. Appl. 55: 102629 (2020) - [j54]Wien Hong, Xiaoyu Zhou, Tung-Shou Chen, Chun-Hung Hsieh:
An efficient reversible authentication scheme for demosaiced images with improved detectability. Signal Process. Image Commun. 80 (2020)
2010 – 2019
- 2018
- [j53]Rong Wang
, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining. Comput. J. 61(8): 1123-1132 (2018) - [j52]Wien Hong
, Xiaoyu Zhou, Der-Chyuan Lou
, Tung-Shou Chen, Yuyang Li:
Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques. Inf. Sci. 463-464: 245-260 (2018) - [j51]Rong Wang
, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness. J. Comput. Sci. Technol. 33(6): 1231-1242 (2018) - [j50]Wien Hong, Meijin Chen
, Tung-Shou Chen, Chien-Che Huang
:
An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching. Multim. Tools Appl. 77(4): 4677-4695 (2018) - [j49]Chin-Chen Chang, Tung-Shou Chen, Yu-Kai Wang, Yanjun Liu
:
A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator. Multim. Tools Appl. 77(7): 9039-9053 (2018) - [c36]Xiaoyu Zhou, Wien Hong, Cancan Peng, Tung-Shou Chen, Yujing Zhai:
A Reversible Data Hiding Scheme for AMBTC Images Using Gray Code and Exclusive-OR Approaches. CISP-BMEI 2018: 1-5 - [c35]Haishan Chen, Wien Hong, Jiangqun Ni, Tung-Shou Chen:
Reversible Data Hiding in Partially-Encrypted Images. ICCCS (3) 2018: 670-679 - [c34]Chih-Wei Shiu
, Wien Hong, Jeanne Chen, Tung-Shou Chen, Wan-Yi Ji:
Data Hiding for Color Image by Rubik's Cube. SSIC 2018: 1-5 - 2017
- [j48]Wien Hong
, Tung-Shou Chen, Zhao-Xia Yin, Bin Luo
, Yuanbo Ma:
Data hiding in AMBTC images using quantization level modification and perturbation technique. Multim. Tools Appl. 76(3): 3761-3782 (2017) - [j47]Wien Hong, Yuan-bo Ma
, Hung-Che Wu
, Tung-Shou Chen:
An efficient reversible data hiding method for AMBTC compressed images. Multim. Tools Appl. 76(4): 5441-5460 (2017) - [j46]Wien Hong, Meijin Chen, Tung-Shou Chen:
An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Process. Image Commun. 58: 111-122 (2017) - [j45]Haishan Chen
, Jiangqun Ni, Wien Hong, Tung-Shou Chen:
High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction. IEEE Signal Process. Lett. 24(5): 574-578 (2017) - 2016
- [j44]Wenlong Xu, Chin-Chen Chang, Tung-Shou Chen, Liang-Min Wang:
An improved least-significant-bit substitution method using the modulo three strategy. Displays 42: 36-42 (2016) - [j43]Wien Hong, Shuozhen Zheng, Tung-Shou Chen, Chien-Che Huang
:
Reversible Data Hiding in Block Truncation Coding Compressed Images Using Quantization Level Swapping and Shifting. KSII Trans. Internet Inf. Syst. 10(6): 2817-2834 (2016) - [j42]Haishan Chen, Jiangqun Ni, Wien Hong, Tung-Shou Chen:
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering. Signal Process. Image Commun. 46: 1-16 (2016) - [c33]Cheng-Jung Yu, Jeanne Chen, Tzu-Ling Lin, Tung-Shou Chen, Wei-Hao Hsu:
Effectiveness of combing airdrop and mobile devices in word card teaching. ICSAI 2016: 471-475 - [c32]Chi-Nan Lin, Tzu-Ling Lin, Tung-Shou Chen, Jeanne Chen, Wei-Jhong Chen:
VoIP communication quality and flow volume preference - A SIP and Red5 example. ICSAI 2016: 782-786 - 2015
- [j41]Wien Hong, Gwoboa Horng, Chih-Wei Shiu
, Tung-Shou Chen, Yu-Chi Chen
:
Reversible Steganographic Method Using Complexity Control and Human Visual System. Comput. J. 58(10): 2583-2594 (2015) - [j40]Yuan-bo Ma, Quan-si Wen, Wien Hong, Ze-ming Lin, Tung-Shou Chen:
A High Visual Quality Embedding Method in Edges Based on Pixel Pair Difference. EAI Endorsed Trans. Creative Technol. 2(4): e1 (2015) - [j39]Wien Hong, Tung-Shou Chen, Jeanne Chen
:
Reversible data hiding using Delaunay triangulation and selective embedment. Inf. Sci. 308: 140-154 (2015) - [j38]Chen-Yi Lin, Tung-Shou Chen, Hui-Fang Tsai, Wei-Bin Lee, Tien-Yu Hsu, Yuan-Hung Kao
:
A Novel Anti-classification Approach for Knowledge Protection. J. Medical Syst. 39(10): 113:1-113:10 (2015) - 2014
- [j37]Jeanne Chen, Tung-Shou Chen, Wien Hong, Gwoboa Horng, Han-Yan Wu, Chih-Wei Shiu
:
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map. KSII Trans. Internet Inf. Syst. 8(3): 1105-1118 (2014) - 2013
- [j36]Xun Liang
, Yuefeng Ma, Yang Bo He, Li Yu, Rong-Chang Chen, Tao Liu, Xiaoping Yang, Tung-Shou Chen:
Fast pruning superfluous support vectors in SVMs. Pattern Recognit. Lett. 34(10): 1203-1209 (2013) - [j35]Tung-Shou Chen, Wei-Bin Lee, Jeanne Chen, Yuan-Hung Kao, Pei-Wen Hou:
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving. J. Supercomput. 66(2): 907-917 (2013) - [c31]Shih-Ying Chen, Jia-Hong Li, Ke-Chung Lin, Hung-Ming Chen, Tung-Shou Chen:
Using MapReduce Framework for Mining Association Rules. ITCS 2013: 723-731 - [c30]Jeanne Chen, Tung-Shou Chen, Wien Hong, Chi-Nan Lin, Mei-Chen Wu, Han-Yan Wu:
A Space Increased Reversible Information Hiding Technique by Reducing Redundant Recording. ITQM 2013: 229-236 - [c29]Wien Hong, Tung-Shou Chen, Jeanne Chen, Yu-Hsin Kao, Han-Yan Wu, Mei-Chen Wu:
Reversible Data Embedment for Encrypted Cartoon Images Using Unbalanced Bit Flipping. ICSI (2) 2013: 208-214 - 2012
- [j34]Wien Hong, Tung-Shou Chen, Chih-Wei Luo:
Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. J. Syst. Softw. 85(5): 1166-1175 (2012) - [j33]Wien Hong, Tung-Shou Chen, Han-Yan Wu:
An Improved Reversible Data Hiding in Encrypted Images Using Side Match. IEEE Signal Process. Lett. 19(4): 199-202 (2012) - [j32]Wien Hong, Tung-Shou Chen:
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Trans. Inf. Forensics Secur. 7(1): 176-184 (2012) - [c28]Wien Hong, Tung-Shou Chen, Han-Yan Wu, Hsun-Li Chang:
An enhanced smoothness evaluation for reversible data hiding in encrypted images. ICDIP 2012: 833434 - 2011
- [j31]Wien Hong, Tung-Shou Chen:
Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J. Vis. Commun. Image Represent. 22(2): 131-140 (2011) - 2010
- [j30]Wien Hong, Tung-Shou Chen:
A local variance-controlled reversible data hiding method using prediction and histogram-shifting. J. Syst. Softw. 83(12): 2653-2663 (2010) - [j29]Wien Hong, Tung-Shou Chen, Yu-Ping Chang, Chih-Wei Shiu
:
A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification. Signal Process. 90(11): 2911-2922 (2010)
2000 – 2009
- 2009
- [j28]Wien Hong, Tung-Shou Chen, Chih-Wei Shiu
:
Reversible data hiding for high quality images using modification of prediction errors. J. Syst. Softw. 82(11): 1833-1842 (2009) - 2008
- [c27]Wien Hong, Chih-Wei Shiu
, Tung-Shou Chen:
A High Quality Histogram Shifting Based Embedding Technique for Reversible Data Hiding. ISDA (3) 2008: 183-187 - [c26]Tung-Shou Chen, Jeanne Chen, Yuan-Hung Kao, Tsang-Chou Hsieh:
A Novel Anti-data Mining Technique Based On Hierarchical Anti-clustering (HAC). ISDA (3) 2008: 426-430 - [c25]Jeanne Chen, Tung-Shou Chen, Ping-Feng Chen:
Prediction Filling Differences for Compress a Set of HDR Images. ISDA (3) 2008: 581-586 - 2007
- [c24]Jeanne Chen, Tung-Shou Chen:
Content-based Rate Controlled Data Hiding in JPEG-LS. IIH-MSP 2007: 477-480 - [c23]Ching-Te Wang, Chiu-Hsiung Liao, Tung-Shou Chen:
Audio-Signal Authenticating System Based on Asymmetric Signature Schemes. MUE 2007: 656-661 - 2006
- [j27]Rong-Chang Chen, Tung-Shou Chen, Chih-Chiang Lin:
A new binary support vector system for increasing detection rate of credit card fraud. Int. J. Pattern Recognit. Artif. Intell. 20(2): 227-239 (2006) - [c22]Tung-Shou Chen, Chih-Chiang Lin, Yung-Hsing Chiu, Hsin-Lan Lin, Rong-Chang Chen:
A New Binary Classifier: Clustering-Launched Classification. ICIC (2) 2006: 278-283 - [c21]Chin-Chen Chang, Tung-Shou Chen, Hsien-Chu Hsia:
An ImageWatermarking Scheme Using Pattern Coding Technique. ICICIC (3) 2006: 467-470 - [c20]Ching-Te Wang, Tung-Shou Chen, Chiu-Hsiung Liao, Feng-Yung Chang:
A New Face Recognition Method for Blurred Images Using Multi-Channel Wiener Filter. IMECS 2006: 519-524 - 2005
- [j26]Jeanne Chen, Tung-Shou Chen, Hwa-Ching Hsu, Hsiao-Wen Chen:
New visual cryptography system based on circular shadow image and fixed angle segmentation. J. Electronic Imaging 14(3): 033018 (2005) - [j25]Jeanne Chen, Tung-Shou Chen, Yu-Mei Pan:
A crisscross checking technique for tamper detection in halftone images. J. Syst. Softw. 76(3): 287-295 (2005) - [c19]Ching-Lin Wang, Ren-Hung Hwang
, Tung-Shou Chen, Hsiu-Yueh Lee:
Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding. AINA 2005: 79-82 - [c18]Jeanne Chen, Tung-Shou Chen, Tzu-Hsin Tsai, Hui-Fang Tsai, Mingli Hsieh, Shih-Shan Tang:
Using the ACM Technique to Refine Protein Spots in 2DGE Images. AINA 2005: 289-292 - [c17]Pi-Chung Wang
, Chun-Liang Lee, Hung-Yi Chang, Tung-Shou Chen:
Hardware Accelerator for Vector Quantization by Using Pruned Look-Up Table. ICCSA (4) 2005: 1007-1016 - [c16]Rong-Chang Chen, Jeanne Chen, Tung-Shou Chen, Chunhung Hsieh, Teyu Chen, Kaiyang Wu:
Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm. ISNN (3) 2005: 409-414 - [c15]Rong-Chang Chen, Tung-Shou Chen, Yuer Chien, Yuru Yang:
Novel Questionnaire-Responded Transaction Approach with SVM for Credit Card Fraud Detection. ISNN (2) 2005: 916-921 - [c14]Ching-Te Wang, Tung-Shou Chen, Wen-Hung Chao:
A New Detection Method for Tampered Audio Signals Based on Discrete Cosine Transformation. WSTST 2005: 1216-1225 - 2004
- [j24]Tung-Shou Chen, Jeanne Chen, Jian-Guo Chen:
A simple and efficient watermark technique based on JPEG2000 Codec. Multim. Syst. 10(1): 16-26 (2004) - [c13]Tung-Shou Chen, Rong-Chang Chen, Tsui-Yun Chang:
A Research to Increase Users' Satisfaction and Loyalty Based on the Customer Satisfaction Index: A Case Study on the National Taichung Institute of Technology's Library. ICADL 2004: 574-583 - [c12]Kevin I.-J. Ho, Tung-Shou Chen, Chun-Wei Tsai, Mingli Hsieh, Hui-Fang Tsai:
Two-Dimensional Electrophoresis Image Filter Based on Vector Quantization Technique. PDPTA 2004: 953-959 - 2003
- [j23]Kuang-Fu Li, Tung-Shou Chen, Kuei-Hao Chen:
Fractal Image Process Based Image Comparison Search Engine. J. Inf. Sci. Eng. 19(1): 1-14 (2003) - [j22]Ching-Te Wang, Tung-Shou Chen, Shao-Hau He:
Detecting and restoring the tampered images based on iteration-free fractal compression. J. Syst. Softw. 67(2): 131-140 (2003) - [c11]Tung-Shou Chen, Jeanne Chen, Jian-Guo Chen:
A simple and efficient watermarking technique based on JPEG2000 codec. ISMSE 2003: 80-87 - [c10]Jeanne Chen, Tung-Shou Chen, Meng-Wen Cheng:
A new data hiding method in binary image. ISMSE 2003: 88-93 - [c9]Tung-Shou Chen, Jeanne Chen, Yu-Mei Pan:
A new detection method of halftone images based on crisscross checking technique. ISMSE 2003: 94-101 - [c8]Chun-Liang Tung, Tung-Shou Chen, Wei-Hua Andrew Wang, Shiow-Tyng Yeh:
A new improvement of SPIHT progressive image transmission. ISMSE 2003: 180-187 - [c7]Kuo-Lung Hung, Chin-Chen Chang, Tung-Shou Chen:
An Efficient Block-based Scheme for Progressively Transmitting Lossless Images. MMM 2003: 313-328 - 2002
- [j21]Chun-Liang Tung, Tung-Shou Chen, Yung-Chang Chiang:
An Intellectual Chinese Input System for Mobile Phones Based Upon Chinese Phonetic Symbols. Int. J. Comput. Process. Orient. Lang. 15(4): 395-406 (2002) - [j20]Tung-Shou Chen, Kuang-Fu Li, Yu-Cheng Tsai, Wen-Ping Lin:
Design of a Chinese Search Engine Based on Homophonic Chinese Character Encoding. Int. J. Comput. Process. Orient. Lang. 15(4): 407-416 (2002) - [j19]Tung-Shou Chen, Ming-Chiang Chen:
A New Search Engine for Chinese Document Image Retrieval Based on Chinese Character Segmentation Features. Int. J. Comput. Process. Orient. Lang. 15(4): 417-431 (2002) - [j18]Chin-Chen Chang, Jun-Chou Chuang, Tung-Shou Chen:
Recognition of Image Authenticity Using Significant DCT Coefficients Quantization. Informatica (Slovenia) 26(4) (2002) - [j17]Chin-Chen Chang, Tung-Shou Chen, Lou-Zo Chung:
A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141(1-2): 123-138 (2002) - [j16]Chwei-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen:
Sharing multiple secrets in digital images. J. Syst. Softw. 64(2): 163-170 (2002) - [c6]Tung-Shou Chen, Chen-Yi Lin:
A New Improvement of JPEG Progressive Image Transmission Using Weight Table of Quantized DCT Coefficient Bits. IEEE Pacific Rim Conference on Multimedia 2002: 720-728 - 2001
- [j15]Tung-Shou Chen, Chin-Chen Chang:
New method of secret image sharing based upon vector quantization. J. Electronic Imaging 10(4): 988-997 (2001) - [j14]Chin-Chen Chang, Lin-Li Chen, Tung-Shou Chen:
A New Two-Path Search Algorithm for Block Motion Estimation of Video Data. J. Inf. Sci. Eng. 17(3): 405-415 (2001) - [j13]Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen:
A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58(2): 83-91 (2001) - [c5]Chin-Chen Chang, Hsien-Chu Hsia, Tung-Shou Chen:
A Progressive Image Transmission Scheme Based on Block Truncation Coding. Human.Society@Internet 2001: 383-397 - 2000
- [j12]Ji-Han Jiang, Chin-Chen Chang, Tung-Shou Chen:
A Compact Sparse Matrix Representation Using Random Hash Functions. Data Knowl. Eng. 32(1): 29-49 (2000) - [j11]Chin-Chen Chang, Jer-Sheng Chou, Tung-Shou Chen:
An efficient computation of Euclidean distances using approximated look-up table. IEEE Trans. Circuits Syst. Video Technol. 10(4): 594-599 (2000) - [c4]Chin-Chen Chang, Chwei-Shyong Tsai, Tung-Shou Chen:
A New Scheme for Sharing Secret Color Images in Computer Network. ICPADS 2000: 21-27 - [c3]Chin-Chen Chang, Tung-Shou Chen, Yi Lin:
An efficient accessing technique of Chinese characters using Boshiamy Chinese input system. IRAL 2000: 61-67 - [c2]Chin-Chen Chang, Tung-Shou Chen:
An Improved Prediction Method for Quadtree Image Coding. ISMSE 2000: 269-275
1990 – 1999
- 1999
- [j10]Kuo-Lung Hung, Chin-Chen Chang, Tung-Shou Chen:
Reconstruction of lost blocks using codeword estimation. IEEE Trans. Consumer Electron. 45(4): 1190-1199 (1999) - [c1]Chin-Chen Chang, Fun-Chou Shiue, Tung-Shou Chen:
Tree Structured Vector Quantization with Dynamic Path Search. ICPP Workshops 1999: 536-541 - 1998
- [j9]Chin-Chen Chang, Wen-Tsai Li, Tung-Shou Chen:
Two improved codebook search methods of vector quantization based on orthogonal checking and fixed range search. J. Electronic Imaging 7(2): 357-366 (1998) - [j8]Chin-Chen Chang, Jer-Sheng Chou, Tung-Shou Chen:
A predictive image coding scheme using a smaller codebook. Signal Process. Image Commun. 12(1): 23-32 (1998) - [j7]Tung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang:
A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7(10): 1485-1488 (1998) - 1997
- [j6]Chin-Chen Chang, Dai-Chuan Lin, Tung-Shou Chen:
An Improved VQ Codebook Search Algorithm Using Principal Component Analysis. J. Vis. Commun. Image Represent. 8(1): 27-37 (1997) - [j5]Tung-Shou Chen, Chin-Chen Chang:
Diagonal axes method (DAM): a fast search algorithm for vector quantization. IEEE Trans. Circuits Syst. Video Technol. 7(3): 555-559 (1997) - [j4]Tung-Shou Chen, Chin-Chen Chang:
A new image coding algorithm using variable-rate side-match finite-state vector quantization. IEEE Trans. Image Process. 6(8): 1185-1187 (1997) - 1995
- [j3]Tung-Shou Chen:
SIMPLE: An Optimal Disk System with Two Restricted Heads. Inf. Process. Lett. 55(5): 273-277 (1995) - 1992
- [j2]Tung-Shou Chen, Wei-Pang Yang, Richard C. T. Lee:
Amortized Analysis of Some Disk Scheduling Algorithms: SSTF, SCAN, and N-Step SCAN. BIT 32(4): 546-558 (1992) - [j1]Tung-Shou Chen, Wei-Pang Yang:
Amortized Analysis of Disk Scheduling Algorithm V(R). J. Inf. Sci. Eng. 8(2): 223-242 (1992)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
