default search action
Teng Huang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Yan Li, Hongyang Yan, Teng Huang, Zijie Pan, Jiewei Lai, Xiaoxue Zhang, Kongyang Chen, Jin Li:
Model architecture level privacy leakage in neural networks. Sci. China Inf. Sci. 67(3) (2024) - [j57]Jianhong Li, Qi Chen, Jin Li, Zihan Jiang, Guoyu Yang, Teng Huang, Hongyang Yan, Duncan S. Wong:
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus. Comput. Stand. Interfaces 90: 103855 (2024) - [j56]Li Hu, Anli Yan, Hongyang Yan, Jin Li, Teng Huang, Yingying Zhang, Changyu Dong, Chunsheng Yang:
Defenses to Membership Inference Attacks: A Survey. ACM Comput. Surv. 56(4): 92:1-92:34 (2024) - [j55]Teng Huang, Qin Su, Chuling Yu, Zheng Zhang, Fei Liu:
Strategic team design for sustainable effectiveness: A data-driven analytical perspective and its implications. Decis. Support Syst. 181: 114227 (2024) - [j54]Jiahui Huang, Teng Huang, Huanchun Wei, Jiehua Zhang, Hongyang Yan, Duncan S. Wong, Haibo Hu:
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j53]Weichu Deng, Jin Li, Hongyang Yan, Arthur Sandor Voundi Koe, Teng Huang, Jianfeng Wang, Cong Peng:
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols. J. Inf. Secur. Appl. 86: 103885 (2024) - [j52]Cong Li, Haiyang Wang, Weipeng Liang, Yunhao Li, Hongyang Yan, Teng Huang, Bo Li, Jianwei He:
LEOCN: Real-time and complete network simulation framework for LEO constellation networks1. J. High Speed Networks 30(1): 1-18 (2024) - [j51]Bo Wei, Teng Huang, Xi Zhang, Jiaming Liang, Yunhao Li, Cong Cao, Dan Li, Yongfeng Chen, Huagang Xiong, Feng Jiang, Xiqiu Zhang:
Cam-PC: A Novel Method for Camouflaging Point Clouds to Counter Adversarial Deception in Remote Sensing. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 56-67 (2024) - [j50]Teng Huang, Cheng Liang, Di Wu, Yi He:
A Debiasing Autoencoder for Recommender System. IEEE Trans. Consumer Electron. 70(1): 3603-3613 (2024) - [j49]Teng Huang, Yile Hong, Yan Pang, Jiaming Liang, Jie Hong, Lin Huang, Yuan Zhang, Yan Jia, Patrizia Savi:
AdaptFormer: An Adaptive Hierarchical Semantic Approach for Change Detection on Remote Sensing Images. IEEE Trans. Instrum. Meas. 73: 1-12 (2024) - [j48]Yan Pang, Jiaming Liang, Teng Huang, Hao Chen, Yunhao Li, Dan Li, Lin Huang, Qiong Wang:
Slim UNETR: Scale Hybrid Transformers to Efficient 3D Medical Image Segmentation Under Limited Computational Resources. IEEE Trans. Medical Imaging 43(3): 994-1005 (2024) - [c27]Teng Huang, Bin-Bin Jia, Min-Ling Zhang:
Deep Multi-Dimensional Classification with Pairwise Dimension-Specific Features. IJCAI 2024: 4183-4191 - [c26]Jiaming Liang, Mingdu Zhang, Caiyan Tan, Teng Huang, Xi Zhang, Zheng Zhang, Shegan Gao, Qian Sheng, Yan Pang:
Comprehensive Transformer Integration Network (CTIN): Advancing Endoscopic Disease Segmentation with Hybrid Transformer Architecture. PRCV (15) 2024: 210-224 - [c25]Yunhao Li, Caiyan Tan, Mingdu Zhang, Xi Zhang, Teng Huang, Xiao-Qing Pei, Yan Pang:
IPM: An Intelligent Component for 3D Brain Tumor Segmentation Integrating Semantic Extractor and Pixel Refiner. PRCV (15) 2024: 225-240 - [i6]Minxia Chen, Ke Fu, Teng Huang, Miao Bai:
Learning Decisions Offline from Censored Observations with ε-insensitive Operational Costs. CoRR abs/2408.07305 (2024) - 2023
- [j47]Huaicheng Zhou, Kanghua Mo, Teng Huang, Yongjin Li:
Empirical study of privacy inference attack against deep reinforcement learning models. Connect. Sci. 35(1) (2023) - [j46]Haolin Feng, Yiwu Jia, Siyi Zhou, Hongyi Chen, Teng Huang:
A Dataset of Service Time and Related Patient Characteristics from an Outpatient Clinic. Data 8(3): 47 (2023) - [j45]Behnam Zahednejad, Teng Huang, Saeed Kosari, Xiaojun Ren:
A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability. Int. J. Intell. Syst. 2023: 1-19 (2023) - [j44]Teng Huang, Jiahui Huang, Yan Pang, Hongyang Yan:
Smart contract watermarking based on code obfuscation. Inf. Sci. 628: 439-448 (2023) - [j43]Anli Yan, Teng Huang, Lishan Ke, Xiaozhang Liu, Qi Chen, Changyu Dong:
Explanation leaks: Explanation-guided model extraction attacks. Inf. Sci. 632: 269-284 (2023) - [j42]Hua Zhang, Kaixuan Li, Teng Huang, Xin Zhang, Wenmin Li, Zhengping Jin, Fei Gao, Minghui Gao:
Publishing locally private high-dimensional synthetic data efficiently. Inf. Sci. 633: 343-356 (2023) - [j41]Chun Ding, Meimin Wang, Zhili Zhou, Teng Huang, Xiaoliang Wang, Jin Li:
Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval. Neural Comput. Appl. 35(11): 8125-8142 (2023) - [j40]Weichu Deng, Huanchun Wei, Teng Huang, Cong Cao, Yun Peng, Xuan Hu:
Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion. Sensors 23(16): 7246 (2023) - [j39]Peng Zhang, Teng Huang, Xiaoqiang Sun, Wei Zhao, Hongwei Liu, Shangqi Lai, Joseph K. Liu:
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 20(3): 2348-2359 (2023) - [j38]Anli Yan, Hongyang Yan, Li Hu, Xiaozhang Liu, Teng Huang:
Holistic Implicit Factor Evaluation of Model Extraction Attacks. IEEE Trans. Dependable Secur. Comput. 20(6): 4678-4689 (2023) - [j37]Ruitao Hou, Teng Huang, Hongyang Yan, Lishan Ke, Weixuan Tang:
A stealthy and robust backdoor attack via frequency domain transform. World Wide Web (WWW) 26(5): 2767-2783 (2023) - [c24]Xingjiang Cheng, Fuxing Zhang, Yun Peng, Xianmin Wang, Teng Huang, Ziye Zhou, Duncan S. Wong, Changyu Dong:
A Survey of Privacy Preserving Subgraph Matching Methods. AIS&P (1) 2023: 98-113 - [c23]Teng Huang, Bin-Bin Jia, Min-Ling Zhang:
Progressive Label Propagation for Semi-Supervised Multi-Dimensional Classification. IJCAI 2023: 3821-3829 - [c22]Gaoming Zhang, Sen Lin, Xianmin Wang, Teng Huang, Xuan Hu, Lingyun Zou:
Experimental Comparison of Graph Edit Distance Computation Methods. MDM 2023: 303-308 - [c21]Cheng Liang, Di Wu, Yi He, Teng Huang, Zhong Chen, Xin Luo:
MMA: Multi-Metric-Autoencoder for Analyzing High-Dimensional and Incomplete Data. ECML/PKDD (5) 2023: 3-19 - [c20]Teng Huang, Weiqing Kong, Jiaming Liang, Ziyu Ding, Hui Li, Xi Zhang:
Lightweight Multispectral Skeleton and Multi-stream Graph Attention Networks for Enhanced Action Prediction with Multiple Modalities. PRCV (1) 2023: 72-83 - [c19]Dan Li, Teng Huang, Jie Hong, Yile Hong, Jiaqi Wang, Zhen Wang, Xi Zhang:
Event Sparse Net: Sparse Dynamic Graph Multi-representation Learning with Temporal Attention for Event-Based Data. PRCV (9) 2023: 208-219 - [c18]Bo Wei, Huanchun Wei, Cong Cao, Teng Huang, Huagang Xiong, Aobo Lang, Xiqiu Zhang, Haiqing Zhang:
A Physically Feasible Counter-Attack Method for Remote Sensing Imaging Point Clouds. PRCV (4) 2023: 394-404 - [c17]Jiaming Liang, Teng Huang, Dan Li, Ziyu Ding, Yunhao Li, Lin Huang, Qiong Wang, Xi Zhang:
AgileNet: A Rapid and Efficient Breast Lesion Segmentation Method for Medical Image Analysis. PRCV (5) 2023: 419-430 - 2022
- [j36]Peng Wang, Chenxiao Wu, Teng Huang, Yizhang Chen:
A Supervised Link Prediction Method Using Optimized Vertex Collocation Profile. Entropy 24(10): 1465 (2022) - [j35]Jiamin Zheng, Teng Huang, Jiahui Huang:
CRFL: A novel federated learning scheme of client reputation assessment via local model inversion. Int. J. Intell. Syst. 37(8): 5457-5471 (2022) - [j34]Yan Pang, Teng Huang, Zhen Wang, Jianwei Li, Poorya Hosseini, Ji Zhang, Chao Liu, Shan Ai:
Graph Decipher: A transparent dual-attention graph neural network to understand the message-passing mechanism for the node classification. Int. J. Intell. Syst. 37(11): 8747-8769 (2022) - [j33]Yan Pang, Ai Shan, Zhen Wang, Mengyu Wang, Jianwei Li, Ji Zhang, Teng Huang, Chao Liu:
Sparse-Dyn: Sparse dynamic graph multirepresentation learning via event-based sparse temporal attention network. Int. J. Intell. Syst. 37(11): 8770-8789 (2022) - [j32]Guanbiao Lin, Hongyang Yan, Guang Kou, Teng Huang, Shiyu Peng, Yingying Zhang, Changyu Dong:
Understanding adaptive gradient clipping in DP-SGD, empirically. Int. J. Intell. Syst. 37(11): 9674-9700 (2022) - [j31]Wenjun Li, Anli Yan, Di Wu, Taoyu Zhu, Teng Huang, Xuandi Luo, Shaowei Wang:
DPCL: Contrastive representation learning with differential privacy. Int. J. Intell. Syst. 37(11): 9701-9725 (2022) - [j30]Anli Yan, Ruitao Hou, Xiaozhang Liu, Hongyang Yan, Teng Huang, Xianmin Wang:
Towards explainable model extraction attacks. Int. J. Intell. Syst. 37(11): 9936-9956 (2022) - [j29]Thiago Serra, Teng Huang, Arvind U. Raghunathan, David Bergman:
Template-Based Minor Embedding for Adiabatic Quantum Optimization. INFORMS J. Comput. 34(1): 427-439 (2022) - [j28]David Bergman, Teng Huang, Philip Brooks, Andrea Lodi, Arvind U. Raghunathan:
JANOS: An Integrated Predictive and Prescriptive Modeling Framework. INFORMS J. Comput. 34(2): 807-816 (2022) - [j27]Li Dai, Teng Huang, Runze Gao, Yuan Zhang, Yuanqing Xia:
Cloud-Based Computational Data-Enabled Predictive Control. IEEE Internet Things J. 9(24): 24949-24962 (2022) - [j26]Ruitao Hou, Shan Ai, Qi Chen, Hongyang Yan, Teng Huang, Kongyang Chen:
Similarity-based integrity protection for deep learning systems. Inf. Sci. 601: 255-267 (2022) - [j25]Naihao Liu, Teng Huang, Jinghuai Gao, Xiudi Jiang, Fangyu Li:
Seismic Local Instantaneous Frequency Extraction for Describing Superposed Sands. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j24]Naihao Liu, Teng Huang, Jinghuai Gao, Zongben Xu, Daxing Wang, Fangyu Li:
Quantum-Enhanced Deep Learning-Based Lithology Interpretation From Well Logs. IEEE Trans. Geosci. Remote. Sens. 60: 1-13 (2022) - [j23]Zhang-Feng Ma, Sheng-Ji Wei, Yosuke Aoki, Ji-Hong Liu, Teng Huang:
A New Spatiotemporal InSAR Tropospheric Noise Filtering: An Interseismic Case Study Over Central San Andreas Fault. IEEE Trans. Geosci. Remote. Sens. 60: 1-16 (2022) - [j22]Zhang-Feng Ma, Sheng-Ji Wei, Xing Li, Yosuke Aoki, Ji-Hong Liu, Xiaojie Liu, Wenfei Mao, Shun Yang, Nanxin Wang, Qihuan Huang, Teng Huang, Sang-Ho Yun:
Challenges and Prospects to Time Series Burst Overlap Interferometry (BOI): Some Insights From a New BOI Algorithm Test Over the Chaman Fault. IEEE Trans. Geosci. Remote. Sens. 60: 1-19 (2022) - [c16]Jiahui Huang, Teng Huang, Jiehua Zhang:
zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs. ML4CS (2) 2022: 400-410 - [c15]Wenjun Li, Anli Yan, Taoyu Zhu, Teng Huang, Xuandi Luo, Shaowei Wang:
Towards Differentially Private Contrastive Learning. ML4CS (2) 2022: 510-520 - [c14]Cheng Liang, Yi He, Teng Huang, Di Wu:
AutoRec++: Incorporating Debias Methods into Autoencoder-based Recommender System. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1876-1881 - [i5]Wenyan Pan, Zhili Zhou, Guangcan Liu, Teng Huang, Hongyang Yan, Q. M. Jonathan Wu:
Auto-Focus Contrastive Learning for Image Manipulation Detection. CoRR abs/2211.10922 (2022) - [i4]Cheng Liang, Teng Huang, Yi He, Song Deng, Di Wu, Xin Luo:
Multi-Metric AutoRec for High Dimensional and Sparse User Behavior Data Prediction. CoRR abs/2212.13879 (2022) - 2021
- [j21]Shan Ai, Arthur Sandor Voundi Koe, Teng Huang:
Adversarial perturbation in remote sensing image recognition. Appl. Soft Comput. 105: 107252 (2021) - [j20]Shuhui Chen, Jincheng Zhong, Teng Huang, Ziling Wei, Shuang Zhao:
CMT: An Efficient Algorithm for Scalable Packet Classification. Comput. J. 64(6): 941-959 (2021) - [j19]Zhenyu Yue, Fei Gao, Qingxu Xiong, Jun Wang, Teng Huang, Erfu Yang, Huiyu Zhou:
A Novel Semi-Supervised Convolutional Neural Network Method for Synthetic Aperture Radar Image Recognition. Cogn. Comput. 13(4): 795-806 (2021) - [j18]Chenyang Zhang, Teng Huang, Rongchun Zhang, Xuefeng Yi:
PLD-SLAM: A New RGB-D SLAM Method with Point and Line Features for Indoor Dynamic Scene. ISPRS Int. J. Geo Inf. 10(3): 163 (2021) - [j17]Kanghua Mo, Xiaozhang Liu, Teng Huang, Anli Yan:
Querying little is enough: Model inversion attack via latent information. Int. J. Intell. Syst. 36(2): 681-690 (2021) - [j16]Chang Chen, Teng Huang:
Camdar-adv: Generating adversarial patches on 3D object. Int. J. Intell. Syst. 36(3): 1441-1453 (2021) - [j15]Huali Ren, Teng Huang, Hongyang Yan:
Adversarial examples: attacks and defenses in the physical world. Int. J. Mach. Learn. Cybern. 12(11): 3325-3336 (2021) - [j14]Zhang-Feng Ma, Mi Jiang, Teng Huang:
A Sequential Approach for Sentinel-1 TOPS Time-Series Co-Registration Over Low Coherence Scenarios. IEEE Trans. Geosci. Remote. Sens. 59(6): 4818-4826 (2021) - [j13]Li Dai, Yuantao Yu, Di-Hua Zhai, Teng Huang, Yuanqing Xia:
Robust Model Predictive Tracking Control for Robot Manipulators With Disturbances. IEEE Trans. Ind. Electron. 68(5): 4288-4297 (2021) - [c13]Teng Huang, Huiqun Yu, Guisheng Fan:
Dual-Channel Graph Contextual Self-Attention Network for Session-Based Recommendation. CollaborateCom (1) 2021: 244-258 - [c12]Yue Xu, Teng Huang, Zhiya Zuo, Xi Wang:
Social Media Sentiment and COVID-19 Transmission: Results from a Time-varying SIR Model. PACIS 2021: 31 - 2020
- [j12]Ping Li, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, Alzubair Hassan:
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme. Complex. 2020: 1784276:1-1784276:13 (2020) - [j11]Teng Huang, Yongfeng Chen, Bingjian Yao, Bifen Yang, Xianmin Wang, Ya Li:
Adversarial attacks on deep-learning-based radar range profile target recognition. Inf. Sci. 531: 159-176 (2020) - [j10]Khaled Riad, Teng Huang, Lishan Ke:
A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J. Netw. Comput. Appl. 160: 102633 (2020) - [j9]Teng Huang, Qixiang Zhang, Jiabao Liu, Ruitao Hou, Xianmin Wang, Ya Li:
Adversarial attacks on deep-learning-based SAR image target recognition. J. Netw. Comput. Appl. 162: 102632 (2020) - [c11]Tianyi Tan, Teng Huang, Xi Wang, Zhiya Zuo:
A preliminary investigation of COVID -19 transmission in the United States by incorporating social media sentiments. ASIST 2020 - [c10]Chang Chen, Teng Huang:
Camdar-Adv: Method for Generating Adversarial Patches on 3D Object. CSS 2020: 1-8 - [c9]Ruitao Hou, Xiaoyu Xiang, Qixiang Zhang, Jiabao Liu, Teng Huang:
Universal Adversarial Perturbations of Malware. CSS 2020: 9-19 - [c8]Fabian Paus, Teng Huang, Tamim Asfour:
Predicting Pushing Action Effects on Spatial Object Relations by Learning Internal Prediction Models. ICRA 2020: 10584-10590 - [c7]Huali Ren, Teng Huang:
Adversarial Example Attacks in the Physical World. ML4CS (2) 2020: 572-582 - [c6]Kanghua Mo, Teng Huang, Xiaoyu Xiang:
Querying Little Is Enough: Model Inversion Attack via Latent Information. ML4CS (2) 2020: 583-591
2010 – 2019
- 2019
- [j8]Fei Gao, Teng Huang, Jinping Sun, Jun Wang, Amir Hussain, Erfu Yang:
A New Algorithm for SAR Image Target Recognition Based on an Improved Deep Convolutional Neural Network. Cogn. Comput. 11(6): 809-824 (2019) - [j7]Rafik Hamza, Alzubair Hassan, Teng Huang, Lishan Ke, Hongyang Yan:
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment. Complex. 2019: 1625678:1-1625678:11 (2019) - [j6]Fei Gao, Teng Huang, Jinping Sun, Amir Hussain, Erfu Yang, Huiyu Zhou:
A Novel Semi-Supervised Learning Method Based on Fast Search and Density Peaks. Complex. 2019: 6876173:1-6876173:23 (2019) - [j5]Chenyang Zhang, Teng Huang, Qiang Zhao:
A New Model of RGB-D Camera Calibration Based On 3D Control Field. Sensors 19(23): 5082 (2019) - [c5]Yuan Tang, Teng Huang, Chuanming Song:
Single Image Dehazing Algorithm Based on Sky Segmentation. BESC 2019: 1-4 - [c4]Jun Tu, Teng Huang, Xusong Liu, Fei Gao, Erfu Yang:
A Novel HRRP Target Recognition Method Based on LSTM and HMM Decision-making. ICAC 2019: 1-6 - [i3]Thiago Serra, Teng Huang, Arvind U. Raghunathan, David Bergman:
Template-based Minor Embedding for Adiabatic Quantum Optimization. CoRR abs/1910.02179 (2019) - [i2]David Bergman, Teng Huang, Philip Brooks, Andrea Lodi, Arvind U. Raghunathan:
JANOS: An Integrated Predictive and Prescriptive Modeling Framework. CoRR abs/1911.09461 (2019) - 2018
- [i1]Teng Huang, David Bergman, Ram D. Gopal:
Predictive and Prescriptive Analytics for Location Selection of Add-on Retail Products. CoRR abs/1804.01182 (2018) - 2017
- [c3]Ning Cao, Yongbin Zhao, Jing Liang, Tiantian Wang, Teng Huang, Dongchen Xu, Yuzhen Xu:
The Comparison of Single-Hop and LEACH Protocols in Wireless Sensor Networks. CSE/EUC (2) 2017: 426-429 - [c2]Fei Gao, Teng Huang, Jun Wang, Jinping Sun, Erfu Yang, Amir Hussain:
Combining Deep Convolutional Neural Network and SVM to SAR Image Target Recognition. iThings/GreenCom/CPSCom/SmartData 2017: 1082-1085 - 2015
- [j4]Yin Chen, Zhizhong Ding, Dingliang Wang, Teng Huang:
Design and Implementation of System Under Test for LTE Protocol Conformance Testing. J. Commun. 10(2): 145-153 (2015) - [j3]Teng Huang, Zhizhong Ding, Younan Duan, Yin Chen, Lu Ding:
A Simplified and Efficient LTE RRC Conformance Testing Adapter. J. Softw. 10(2): 127-141 (2015) - [j2]Younan Duan, Zhizhong Ding, Teng Huang, Dingliang Wang:
TTCN-3 Codec Implementation for LTE RRM Conformance Test. J. Softw. 10(10): 1176-1188 (2015) - 2014
- [j1]Shuai Jiang, Yi-Rong Liu, Teng Huang, Hui Wen, Kang-Ming Xu, Wei-Xiong Zhao, Wei-Jun Zhang, Wei Huang:
Study of Cl-(H2O)n (n = 1-4) using basin-hopping method coupled with density functional theory. J. Comput. Chem. 35(2): 159-165 (2014) - [c1]Kamil Adiloglu, Tobias Herzke, Volker Hohmann, Matthieu Recugnat, Martin Besnard, Teng Huang, Bradford Backus:
The ABCIT research platform. IWAENC 2014: 26-29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint