


default search action
Jiadong Ren
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j62]Yufeng Jia, Jiadong Ren, Haitao He, Xianshan Li, Pengwei Zhang, Rong Li:
Reducing Latency in SDN: An Innovative Closed-Loop Migration Collaboration Architecture. Trans. Emerg. Telecommun. Technol. 36(3) (2025) - [j61]Yuxuan Zhao
, Haitao He, Qian Wang, Lu Yu, Jiadong Ren:
SE-MSResNet: A lightweight squeeze-and-excitation multi-scaled ResNet with domain generalization for sleep apnea detection. Neurocomputing 620: 129201 (2025) - [j60]Yufeng Jia, Jiadong Ren, Xianshan Li, Haitao He, Pengwei Zhang, Rong Li:
Construction of a user-friendly software-defined networking management using a graph-based abstraction layer. PeerJ Comput. Sci. 11: e2674 (2025) - [j59]Qian Wang
, Weilong Wang
, Yan Wang, Jiadong Ren
, Bing Zhang
:
Multi-Stage Network Attack Detection Algorithm Based on Gaussian Mixture Hidden Markov Model and Transfer Learning. IEEE Trans Autom. Sci. Eng. 22: 3470-3484 (2025) - [j58]Yunkai Deng, Heng Zhang
, Kaiyu Liu, Wei Wang
, Naiming Ou
, Haidong Han, Ruiyun Yang, Jiadong Ren, Jili Wang
, Xiaoyuan Ren, Huaitao Fan
, Shibo Guo:
Hongtu-1: The First Spaceborne Single-Pass Multibaseline SAR Interferometry Mission. IEEE Trans. Geosci. Remote. Sens. 63: 1-18 (2025) - 2024
- [j57]Qian Wang
, Haiyang Jiang, Jiadong Ren, Han Liu, Xuehang Wang, Bing Zhang:
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network. Expert Syst. Appl. 244: 123014 (2024) - [j56]Qian Wang
, Xuehang Wang
, Han Liu
, Yan Wang, Jiadong Ren
, Bing Zhang
:
A Domain Adaptive IoT Intrusion Detection Algorithm Based on GWR-GCN Feature Extraction and Conditional Domain Adversary. IEEE Internet Things J. 11(24): 41223-41234 (2024) - [j55]Haitao He, Ruixi Zhang
, Yangsen Zhang, Jiadong Ren:
USBE: User-similarity based estimator for multimedia cold-start recommendation. Multim. Tools Appl. 83(1): 1127-1142 (2024) - [j54]Yuxuan Zhao
, Haitao He
, Weijin Gao
, Ke Xu
, Jiadong Ren
:
DM-IACNN: A Dual-Multiscale Interactive Attention-Based Convolution Neural Network for Automated Detection of Sleep Apnea. IEEE Trans. Instrum. Meas. 73: 1-10 (2024) - [j53]Bing Zhang
, Rong Ren, Jia Liu, Mingcai Jiang, Jiadong Ren
, Jingyue Li
:
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections. IEEE Trans. Software Eng. 50(7): 1807-1826 (2024) - [c26]Hao Ma, Wanying Cao, Jiale Peng, Jiadong Ren, Yuqing Zhang:
Security Evaluation of Emojis in NLP Tasks. BigComp 2024: 8-15 - [c25]Xu Kang, Zhiyang Jia, Jia Jia, Jiadong Ren:
3DA-NTC: 3D Channel Attention Aided Neural Tensor Completion for Crowdsensing Data Inference. IJCNN 2024: 1-8 - [c24]Jiazheng Li, Jiadong Ren, Shuailin Yang, Chenghao Zhi, Chunjiao Bao:
A Model for Vulnerability Classification based on Res-CNN-BiTLSTM. ISPA 2024: 2069-2075 - [i1]Boyang Yang
, Haoye Tian
, Jiadong Ren, Hongyu Zhang, Jacques Klein, Tegawendé F. Bissyandé, Claire Le Goues, Shunfu Jin:
Multi-Objective Fine-Tuning for Enhanced Program Repair with LLMs. CoRR abs/2404.12636 (2024) - 2023
- [j52]Yuxuan Zhao
, Jiadong Ren, Bing Zhang, Jinxiao Wu, Yongqiang Lyu:
An explainable attention-based TCN heartbeats classification model for arrhythmia detection. Biomed. Signal Process. Control. 80(Part): 104337 (2023) - [j51]Qian Wang, Yuying Gao, Jiadong Ren, Bing Zhang:
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network. Comput. Secur. 126: 103070 (2023) - [j50]Haitao He, Ruixi Zhang, Yangsen Zhang, Jiadong Ren:
AAIN: Attentional aggregative interaction network for deep learning based recommender systems. Neurocomputing 547: 126374 (2023) - [j49]Jiadong Ren, Mingyou Wu, Bing Zhang
, Ke Xu, Shangyang Li, Qian Wang, Yue Chang, Tao Cheng:
DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation. Int. J. Softw. Eng. Knowl. Eng. 33(9): 1327-1354 (2023) - [j48]Zhangqi Zheng
, Yongshan Liu, Bing Zhang, Jiadong Ren, Yongsheng Zong, Qian Wang, Xiaolei Yang, Qian Liu:
Software defect prediction method based on the heterogeneous integration algorithm. J. Intell. Fuzzy Syst. 45(3): 4807-4824 (2023) - 2022
- [j47]Haitao He, Haoran Niu
, Jianzhou Feng, Junlan Nie, Yangsen Zhang, Jiadong Ren:
An Embedding Model for Knowledge Graph Completion Based on Graph Sub-Hop Convolutional Network. Big Data Res. 30: 100351 (2022) - [j46]Zhangqi Zheng
, Bing Zhang, Yongshan Liu, Jiadong Ren, Xuyang Zhao, Qian Wang:
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm. Comput. Secur. 114: 102572 (2022) - [j45]Bing Zhang, Jingyue Li, Jiadong Ren, Guoyan Huang:
Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review. ACM Comput. Surv. 54(9): 190:1-190:35 (2022) - [j44]Qian Wang, Wenfang Zhao, Xiaoyu Wei, Jiadong Ren, Yuying Gao, Bing Zhang:
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine. Int. J. Softw. Eng. Knowl. Eng. 32(8): 1229-1245 (2022) - [j43]Bing Zhang
, Yuan Gao, Jingyi Wu, Ning Wang, Qian Wang, Jiadong Ren:
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning. Int. J. Softw. Eng. Knowl. Eng. 32(10): 1559-1582 (2022) - [j42]Qian Wang, Yazhou Li, Yan Wang, Jiadong Ren:
An automatic algorithm for software vulnerability classification based on CNN and GRU. Multim. Tools Appl. 81(5): 7103-7124 (2022) - [c23]Qian Wang, Jiadong Ren, Honghao Zhang, Yu Wang, Bing Zhang:
Identifying Influential Spreaders in Complex Networks Based on Degree Centrality. WISA 2022: 314-326 - [e1]Maosong Sun, Guilin Qi, Kang Liu, Jiadong Ren, Bin Xu, Yansong Feng, Yongbin Liu, Yubo Chen
:
Knowledge Graph and Semantic Computing: Knowledge Graph Empowers the Digital Economy - 7th China Conference, CCKS 2022, Qinhuangdao, China, August 24-27, 2022, Revised Selected Papers. Communications in Computer and Information Science 1669, Springer 2022, ISBN 978-981-19-7595-0 [contents] - 2021
- [j41]Ying Yu
, Jiaomin Liu, Jiadong Ren
, Qian Wang, Cuiyi Xiao:
Maximize Expected Profits by Dynamic After-Sales Service Investment Strategy Based on Word-of-Mouth Marketing in Social Network Shopping. Complex. 2021: 4237712:1-4237712:15 (2021) - [j40]Xinqian Liu, Jiadong Ren, Haitao He, Qian Wang, Chen Song:
Low-rate DDoS attacks detection method using data compression and behavior divergence measurement. Comput. Secur. 100: 102107 (2021) - [j39]Qian Wang, Wenfang Zhao, Jiadong Ren:
Intrusion detection algorithm based on image enhanced convolutional neural network. J. Intell. Fuzzy Syst. 41(1): 2183-2194 (2021) - [j38]Xinqian Liu
, Jiadong Ren, Haitao He, Bing Zhang
, Chen Song
, Yunxue Wang:
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel. J. Netw. Comput. Appl. 185: 103079 (2021) - [j37]Yakun Li
, Jiadong Ren, Jiaomin Liu, Yixin Chang:
Deep sparse autoencoder prediction model based on adversarial learning for cross-domain recommendations. Knowl. Based Syst. 220: 106948 (2021) - [j36]Guyu Zhao, Hongdou He
, Yifang Huang, Jiadong Ren:
Near-surface PM2.5 prediction combining the complex network characterization and graph convolution neural network. Neural Comput. Appl. 33(24): 17081-17101 (2021) - 2020
- [j35]Hongdou He
, Jiadong Ren
, Guyu Zhao
, Haitao He
:
Enhancing Spectrum-Based Fault Localization Using Fault Influence Propagation. IEEE Access 8: 18497-18513 (2020) - [j34]Guyu Zhao
, Guoyan Huang
, Hongdou He
, Jiadong Ren
, Haitao He
:
Mining Key Stations by Constructing the Air Quality Spatial-Temporal Propagation Network. IEEE Access 8: 97485-97502 (2020) - [j33]Yakun Li
, Jiaomin Liu, Jiadong Ren
, Yixin Chang:
A Novel Implicit Trust Recommendation Approach for Rating Prediction. IEEE Access 8: 98305-98315 (2020) - [j32]Munawar Hussain, Jiadong Ren, Awais Akram:
Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network. Int. J. Netw. Secur. 22(3): 542-549 (2020) - [j31]Bing Zhang, Chun Shan, Munawar Hussain, Jiadong Ren, Guoyan Huang:
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns. Int. J. Softw. Eng. Knowl. Eng. 30(5): 695-719 (2020) - [j30]Xinqian Liu, Jiadong Ren, Haitao He, Qian Wang, Shengting Sun:
A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition. KSII Trans. Internet Inf. Syst. 14(7): 3093-3115 (2020) - [c22]Jun Dong, Chengqian Hao, Jiadong Ren, Haitao Lu:
Research on Software Community Division Method Based on Inter-node Dependency. ICIC (1) 2020: 430-444
2010 – 2019
- 2019
- [j29]Guoyan Huang, Yazhou Li, Qian Wang
, Jiadong Ren, Yongqiang Cheng
, Xiaolin Zhao:
Automatic Classification Method for Software Vulnerability Based on Deep Neural Network. IEEE Access 7: 28291-28298 (2019) - [j28]Bing Zhang, Jiadong Ren, Yongqiang Cheng, Bing Wang, Zhiyao Wei:
Health Data Driven on Continuous Blood Pressure Prediction Based on Gradient Boosting Decision Tree Algorithm. IEEE Access 7: 32423-32433 (2019) - [j27]Hongdou He
, Jiadong Ren, Guyu Zhao
, Yinghui Zhang, Hao Xiaobing:
Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace. IEEE Access 7: 79602-79616 (2019) - [j26]Qian Wang
, Weijia Cao, Jiawei Guo, Jiadong Ren, Yongqiang Cheng
, Darryl N. Davis:
DMP_MI: An Effective Diabetes Mellitus Classification Algorithm on Imbalanced Data With Missing Values. IEEE Access 7: 102232-102238 (2019) - [j25]Haitao He, Xu Zhang, Qian Wang
, Jiadong Ren, Jiaxin Liu, Xiaolin Zhao
, Yongqiang Cheng
:
Ensemble MultiBoost Based on RIPPER Classifier for Prediction of Imbalanced Software Defect Data. IEEE Access 7: 110333-110343 (2019) - [j24]Guyu Zhao
, Guoyan Huang, Hongdou He
, Haitao He, Jiadong Ren:
Regional Spatiotemporal Collaborative Prediction Model for Air Quality. IEEE Access 7: 134903-134919 (2019) - [j23]Yakun Li
, Jiaomin Liu, Jiadong Ren:
A Novel Learning Model Based on Trust Diffusion and Global Item for Recommender Systems. IEEE Access 7: 170270-170281 (2019) - [j22]Haitao He
, Xiaobing Sun
, Hongdou He
, Guyu Zhao
, Ligang He
, Jiadong Ren
:
A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection. IEEE Access 7: 183207-183221 (2019) - [j21]Qian Wang, Chun Shan, Xiaolin Zhao, Jun Dong, Jiadong Ren, Jiaxin Liu:
A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory. Int. J. Softw. Eng. Knowl. Eng. 29(3): 415-432 (2019) - [j20]Jiadong Ren, Jiawei Guo, Qian Wang, Yuan Huang
, Hao Xiaobing
, Hu Jingjing:
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms. Secur. Commun. Networks 2019: 7130868:1-7130868:11 (2019) - [j19]Jiadong Ren, Zhangqi Zheng
, Qian Liu, Zhiyao Wei, Huaizhi Yan:
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning. Secur. Commun. Networks 2019: 8391425:1-8391425:13 (2019) - [c21]Jiadong Ren, Qian Wang, Xinqian Liu, Guoyan Huang, Haitao He, Xiaolin Zhao:
Mining important nodes in complex software network based on ripple effects of probability. ACM TUR-C 2019: 51:1-51:8 - 2018
- [j18]Qian Wang
, Jiadong Ren, Yu Wang, Bing Zhang
, Yongqiang Cheng
, Xiaolin Zhao:
CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network. IEEE Access 6: 19550-19559 (2018) - [j17]Bing Zhang
, Zhiyao Wei, Jiadong Ren, Yongqiang Cheng
, Zhangqi Zheng:
An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees. IEEE Access 6: 21758-21768 (2018) - [j16]Bing Zhang
, Guoyan Huang, Zhangqi Zheng, Jiadong Ren, Changzhen Hu:
Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes. IEEE Access 6: 32543-32553 (2018) - [j15]Bin Wang, Chao Chen, Ligang He, Bo Gao, Jiadong Ren, Zhangjie Fu, Songling Fu, Yongjian Hu, Chang-Tsun Li
:
Modelling and developing conflict-aware scheduling on large-scale data centres. Future Gener. Comput. Syst. 86: 995-1007 (2018) - [j14]Weina Li, Jiadong Ren:
Distributed Frequent Interactive Pattern-Based Complex Software Group Network Stability Measurement. Int. J. Softw. Eng. Knowl. Eng. 28(5): 619-642 (2018) - [j13]Di Wu, Jiadong Ren, Long Sheng:
Uncertain maximal frequent subgraph mining algorithm based on adjacency matrix and weight. Int. J. Mach. Learn. Cybern. 9(9): 1445-1455 (2018) - [j12]Bing Zhang
, Zhiyang Liu
, Yanguo Jia
, Jiadong Ren, Xiaolin Zhao:
Network Intrusion Detection Method Based on PCA and Bayes Algorithm. Secur. Commun. Networks 2018: 1914980:1-1914980:11 (2018) - [j11]Qian Wang
, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng
, Darryl N. Davis, Changzhen Hu:
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System. Secur. Commun. Networks 2018: 5716878:1-5716878:10 (2018) - [c20]Jiadong Ren, Xiaotong Zhang, Jiandang Sun, Qingshuang Zeng:
Interactive Multi-model Target Maneuver Tracking Method Based on the Adaptive Probability Correction. ICSI (2) 2018: 235-245 - 2017
- [j10]Di Wu, Jiadong Ren:
Representative Points and Cluster Attributes Based Incremental Sequence Clustering Algorithm. Comput. Informatics 36(6): 1361-1384 (2017) - [j9]Bing Zhang, Guoyan Huang, Haitao He, Jiadong Ren:
Approach to mine influential functions based on software execution sequence. IET Softw. 11(2): 48-54 (2017) - [j8]Wanchang Jiang, Jiadong Ren, Yuan Huang:
Using Fault Infection and Propagation Mining Top Important Function Nodes in Software Execution Complex Network. J. Inf. Hiding Multim. Signal Process. 8(3): 599-610 (2017) - [j7]Di Wu, Jiadong Ren, Long Sheng:
Representative points clustering algorithm based on density factor and relevant degree. Int. J. Mach. Learn. Cybern. 8(2): 641-649 (2017) - [j6]Di Wu, Jiadong Ren:
Sequence clustering algorithm based on weighted vector identification. Int. J. Mach. Learn. Cybern. 8(3): 731-738 (2017) - [c19]Wenzhe Liao, Qian Wang, Luqun Yang, Jiadong Ren, Darryl N. Davis, Changzhen Hu:
Mining Frequent Intra-Sequence and Inter-Sequence Patterns Using Bitmap with a Maximal Span. WISA 2017: 56-61 - [c18]Wenzhe Liao, Qian Wang, Yu Wang, Jiadong Ren, Yongqiang Cheng, Changzhen Hu:
Mining Frequent Patterns for Item-Oriented and Customer-Oriented Analysis. WISA 2017: 62-67 - 2016
- [j5]Qian Wang
, Darryl N. Davis
, Jiadong Ren:
Mining frequent biological sequences based on bitmap without candidate sequence generation. Comput. Biol. Medicine 69: 152-157 (2016) - [j4]Xiuping Peng, Jiadong Ren, Chengqian Xu, Kai Liu:
New Families of Binary Sequence Pairs with Three-Level Correlation and Odd Composite Length. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(4): 874-879 (2016) - [j3]Xiuping Peng, Chengqian Xu, Jiadong Ren, Kai Liu:
The Constructions of Mismatched Filtering of Periodic Quadriphase Sequences with Even Length. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(9): 1735-1739 (2016) - [j2]Xiuping Peng, Jiadong Ren, Chengqian Xu, Kai Liu:
Perfect Gaussian Integer Sequences of Degree-4 Using Difference Sets. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(12): 2604-2608 (2016) - [c17]Hongwei Xia, Li Li, Jianwei Liu, Jiadong Ren, Guangcheng Ma:
Stability analysis and stabilization for T-S fuzzy time-delay systems with mismatched premise membership functions. SMC 2016: 4640-4645 - 2014
- [j1]Youxi Wu
, Lingling Wang, Jiadong Ren, Wei Ding
, Xindong Wu:
Mining sequential patterns with periodic wildcard gaps. Appl. Intell. 41(1): 99-116 (2014) - 2011
- [c16]Wuzhou Dong, Jiadong Ren, Dongmei Zhang:
Hierarchical K-Means Clustering Algorithm Based on Silhouette and Entropy. AICI (1) 2011: 339-347 - 2010
- [c15]Jiaxin Liu, Shuting Yan, Jiadong Ren:
The design of storage structure for sequence in incremental sequential patterns mining. NCM 2010: 330-334 - [c14]Guibin Hou, Ruixia Yao, Jiadong Ren, Changzhen Hu:
A Clustering Algorithm Based on Matrix over High Dimensional Data Stream. WISM 2010: 86-94
2000 – 2009
- 2009
- [c13]Jiadong Ren, Changzhen Hu, Kunsheng Wang, Di Wu:
A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets. AMT 2009: 409-417 - [c12]Haitao He, Yanpeng Zhang, Jiadong Ren, Changzhen Hu:
An Improved OLAP Join and Aggregate Algorithm Based on Dimension Hierarchy. FSKD (5) 2009: 169-172 - [c11]Jiadong Ren, Ruiqing Ma:
Density-Based Data Streams Clustering over Sliding Windows. FSKD (5) 2009: 248-252 - [c10]Jiadong Ren, Qunhui Wu, Jia Zhang, Changzhen Hu:
Efficient Outlier Detection Algorithm for Heterogeneous Data Streams. FSKD (5) 2009: 259-264 - [c9]Yinzhao Li, Dongxu Yang, Jiadong Ren, Changzhen Hu:
An Approach for Database Intrusion Detection Based on the Event Sequence Clustering. NCM 2009: 584-588 - [c8]Jiadong Ren, Changzhen Hu, Kunsheng Wang, Dongmei Zhang:
Software Fault Feature Clustering Algorithm Based on Sequence Pattern. WISM 2009: 439-447 - 2008
- [c7]Jiadong Ren, Haiyan Tian:
Sequential Pattern Mining with Inaccurate Event in Temporal Sequence. NCM (2) 2008: 659-664 - [c6]Jiadong Ren, Haiyan Tian, Shiyong Lv:
Sliding-Window Filtering with Constraints of Compactness and Recency in Incremental Database. NCM (2) 2008: 665-669 - 2007
- [c5]Jiadong Ren, Xiaojian Zhang, Huili Peng:
On Mining Dynamic Web ClickStreams for Frequent Traversal Sequences. CIDM 2007: 477-484 - [c4]Jiadong Ren, Wanchang Jiang, Cong Huo:
Index-Based Load Shedding for Streaming Sliding Window Joins. ICIC (3) 2007: 162-170 - [c3]Jiadong Ren, Ke Li:
Find Recent Frequent Items with Sliding Windows in Data Streams. IIH-MSP 2007: 625-628 - [c2]Jiayin Feng, Jiadong Ren:
MMFI_DSSW - A New Method to Incrementally Mine Maximal Frequent Itemsets in Transaction Sensitive Sliding Window. KSEM 2007: 485-495 - 2006
- [c1]Jiadong Ren, Xiaojian Zhang, Huili Peng:
IMFTS: High-Speed Mining Frequent Traversal Sequences with Bidirectional Constraints. Web Intelligence 2006: 356-360
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-28 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint