


Остановите войну!
for scientists:
Xingjun Ma
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j4]Lingjuan Lyu
, Yitong Li
, Karthik Nandakumar
, Jiangshan Yu
, Xingjun Ma
:
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning. IEEE Trans. Dependable Secur. Comput. 19(2): 1003-1017 (2022) - [c43]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. IEEE Symposium on Security and Privacy 2022: 824-841 - [i47]Yiming Li, Haoxiang Zhong, Xingjun Ma, Yong Jiang, Shu-Tao Xia:
Few-Shot Backdoor Attacks on Visual Object Tracking. CoRR abs/2201.13178 (2022) - [i46]Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, Jiming Chen:
VeriFi: Towards Verifiable Federated Unlearning. CoRR abs/2205.12709 (2022) - [i45]Chen Chen, Yuchen Liu, Xingjun Ma, Lingjuan Lyu:
CalFAT: Calibrated Federated Adversarial Training with Label Skewness. CoRR abs/2205.14926 (2022) - [i44]Yuhua Sun, Tailai Zhang, Xingjun Ma, Pan Zhou, Jian Lou, Zichuan Xu, Xing Di, Yu Cheng, Lichao Sun:
Backdoor Attacks on Crowd Counting. CoRR abs/2207.05641 (2022) - 2021
- [j3]Xingjun Ma
, Yuhao Niu
, Lin Gu
, Yisen Wang, Yitian Zhao
, James Bailey, Feng Lu
:
Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recognit. 110: 107332 (2021) - [c42]Jiabo He, Wei Liu, Yu Wang, Xingjun Ma, Xian-Sheng Hua:
SpineOne: A One-Stage Detection Framework for Degenerative Discs and Vertebrae. BIBM 2021: 1331-1334 - [c41]Bojia Zi, Shihao Zhao, Xingjun Ma, Yu-Gang Jiang:
Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better. ICCV 2021: 16423-16432 - [c40]Yang Bai, Yuyuan Zeng, Yong Jiang, Shu-Tao Xia, Xingjun Ma, Yisen Wang:
Improving Adversarial Robustness via Channel-wise Activation Suppressing. ICLR 2021 - [c39]Hanxun Huang, Xingjun Ma, Sarah Monazam Erfani, James Bailey, Yisen Wang:
Unlearnable Examples: Making Personal Data Unexploitable. ICLR 2021 - [c38]Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma:
Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks. ICLR 2021 - [c37]Khondker Fariha Hossain, Sharif Amit Kamran
, Alireza Tavakkoli, Lei Pan, Xingjun Ma, Sutharshan Rajasegarar, Chandan Karmaker:
ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks. ICMLA 2021: 50-56 - [c36]Jingyi Wang, Jialuo Chen, Youcheng Sun
, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. ICSE 2021: 300-311 - [c35]Ang Li, Qiuhong Ke, Xingjun Ma, Haiqin Weng, Zhiyuan Zong, Feng Xue, Rui Zhang:
Noise Doesn't Lie: Towards Universal Detection of Deep Inpainting. IJCAI 2021: 786-792 - [c34]Hanxun Huang, Xingjun Ma, Sarah M. Erfani, James Bailey:
Neural Architecture Search via Combinatorial Multi-Armed Bandit. IJCNN 2021: 1-8 - [c33]Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, James Bailey:
Dual Head Adversarial Training. IJCNN 2021: 1-8 - [c32]Zichan Ruan, Shuiqiao Yang, Lei Pan, Xingjun Ma, Wei Luo
, Marthie Grobler:
Microwave Link Failures Prediction via LSTM-based Feature Fusion Network. IJCNN 2021: 1-8 - [c31]Saheed A. Tijani, Xingjun Ma, Ran Zhang, Frank Jiang, Robin Doss:
Federated Learning with Extreme Label Skew: A Data Extension Approach. IJCNN 2021: 1-8 - [c30]Hanxun Huang, Yisen Wang, Sarah M. Erfani, Quanquan Gu, James Bailey, Xingjun Ma:
Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks. NeurIPS 2021: 5545-5559 - [c29]Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma:
Anti-Backdoor Learning: Training Clean Models on Poisoned Data. NeurIPS 2021: 14900-14912 - [c28]Xinyi Xu, Lingjuan Lyu, Xingjun Ma, Chenglin Miao, Chuan Sheng Foo, Bryan Kian Hsiang Low:
Gradient Driven Rewards to Guarantee Fairness in Collaborative Machine Learning. NeurIPS 2021: 16104-16117 - [c27]Jiabo He, Sarah M. Erfani, Xingjun Ma, James Bailey, Ying Chi, Xian-Sheng Hua:
$\alpha$-IoU: A Family of Power Intersection over Union Losses for Bounding Box Regression. NeurIPS 2021: 20230-20242 - [c26]James Bailey, Michael E. Houle, Xingjun Ma:
Relationships Between Local Intrinsic Dimensionality and Tail Entropy. SISAP 2021: 186-200 - [c25]Yanchuan Chang, Jianzhong Qi
, Egemen Tanin, Xingjun Ma, Hanan Samet:
Sub-trajectory Similarity Join with Obfuscation. SSDBM 2021: 181-192 - [c24]R. G. Gayathri, Atul Sajjanhar, Yong Xiang, Xingjun Ma:
Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data. TrustCom 2021: 718-725 - [i43]Hanxun Huang, Xingjun Ma, Sarah M. Erfani, James Bailey:
Neural Architecture Search via Combinatorial Multi-Armed Bandit. CoRR abs/2101.00336 (2021) - [i42]Bojia Zi, Minghao Chang, Jingjing Chen, Xingjun Ma, Yu-Gang Jiang:
WildDeepfake: A Challenging Real-World Dataset for Deepfake Detection. CoRR abs/2101.01456 (2021) - [i41]Hanxun Huang, Xingjun Ma, Sarah Monazam Erfani, James Bailey, Yisen Wang:
Unlearnable Examples: Making Personal Data Unexploitable. CoRR abs/2101.04898 (2021) - [i40]Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma:
Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks. CoRR abs/2101.05930 (2021) - [i39]Nodens Koren, Qiuhong Ke, Yisen Wang, James Bailey, Xingjun Ma:
Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions. CoRR abs/2101.06704 (2021) - [i38]Shihao Zhao, Xingjun Ma, Yisen Wang, James Bailey, Bo Li, Yu-Gang Jiang:
What Do Deep Nets Learn? Class-wise Patterns Revealed in the Input Space. CoRR abs/2101.06898 (2021) - [i37]Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. CoRR abs/2102.05913 (2021) - [i36]R. G. Gayathri, Atul Sajjanhar, Yong Xiang, Xingjun Ma:
Multi-class Classification Based Anomaly Detection of Insider Activities. CoRR abs/2102.07277 (2021) - [i35]Guanli Liu, Lars Kulik, Xingjun Ma, Jianzhong Qi:
A Lazy Approach for Efficient Index Learning. CoRR abs/2102.08081 (2021) - [i34]Yang Bai, Yuyuan Zeng, Yong Jiang, Shu-Tao Xia, Xingjun Ma, Yisen Wang:
Improving Adversarial Robustness via Channel-wise Activation Suppressing. CoRR abs/2103.08307 (2021) - [i33]Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, James Bailey:
Dual Head Adversarial Training. CoRR abs/2104.10377 (2021) - [i32]Ang Li, Qiuhong Ke, Xingjun Ma, Haiqin Weng, Zhiyuan Zong, Feng Xue, Rui Zhang:
Noise Doesn't Lie: Towards Universal Detection of Deep Inpainting. CoRR abs/2106.01532 (2021) - [i31]Yanchuan Chang, Jianzhong Qi, Egemen Tanin, Xingjun Ma, Hanan Samet:
Sub-trajectory Similarity Join with Obfuscation. CoRR abs/2106.03355 (2021) - [i30]Bojia Zi, Shihao Zhao, Xingjun Ma, Yu-Gang Jiang:
Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better. CoRR abs/2108.07969 (2021) - [i29]Hanxun Huang, Yisen Wang, Sarah Monazam Erfani, Quanquan Gu, James Bailey, Xingjun Ma:
Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks. CoRR abs/2110.03825 (2021) - [i28]Khondker Fariha Hossain, Sharif Amit Kamran, Xingjun Ma, Alireza Tavakkoli:
ECG-ATK-GAN: Robustness against Adversarial Attacks on ECG using Conditional Generative Adversarial Networks. CoRR abs/2110.09983 (2021) - [i27]Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, Xingjun Ma:
Anti-Backdoor Learning: Training Clean Models on Poisoned Data. CoRR abs/2110.11571 (2021) - [i26]Jiabo He, Sarah M. Erfani, Xingjun Ma, James Bailey, Ying Chi, Xian-Sheng Hua:
Alpha-IoU: A Family of Power Intersection over Union Losses for Bounding Box Regression. CoRR abs/2110.13675 (2021) - [i25]Jiabo He, Wei Liu, Yu Wang, Xingjun Ma, Xian-Sheng Hua:
SpineOne: A One-Stage Detection Framework for Degenerative Discs and Vertebrae. CoRR abs/2110.15082 (2021) - [i24]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. CoRR abs/2112.05588 (2021) - [i23]Yisen Wang, Xingjun Ma, James Bailey, Jinfeng Yi, Bowen Zhou, Quanquan Gu:
On the Convergence and Robustness of Adversarial Training. CoRR abs/2112.08304 (2021) - 2020
- [j2]Yunzhe Jia
, James Bailey, Kotagiri Ramamohanarao, Christopher Leckie
, Xingjun Ma
:
Exploiting patterns to explain individual predictions. Knowl. Inf. Syst. 62(3): 927-950 (2020) - [j1]Lingjuan Lyu, Jiangshan Yu, Karthik Nandakumar, Yitong Li
, Xingjun Ma
, Jiong Jin
, Han Yu, Kee Siong Ng:
Towards Fair and Privacy-Preserving Federated Deep Models. IEEE Trans. Parallel Distributed Syst. 31(11): 2524-2541 (2020) - [c23]Jesslyn Lamtara
, Nathan Hanegbi
, Benjamin Talks
, Sudanthi N. R. Wijewickrema
, Xingjun Ma
, Patorn Piromchai
, James Bailey
, Stephen J. O'Leary
:
Transfer of Automated Performance Feedback Models to Different Specimens in Virtual Reality Temporal Bone Surgery. AIED (1) 2020: 296-308 - [c22]Ranjie Duan, Xingjun Ma
, Yisen Wang, James Bailey, A. Kai Qin
, Yun Yang:
Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles. CVPR 2020: 997-1005 - [c21]Shihao Zhao, Xingjun Ma
, Xiang Zheng, James Bailey, Jingjing Chen, Yu-Gang Jiang:
Clean-Label Backdoor Attacks on Video Recognition Models. CVPR 2020: 14431-14440 - [c20]Yunfei Liu, Xingjun Ma
, James Bailey, Feng Lu:
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. ECCV (10) 2020: 182-199 - [c19]Ang Li, Shanshan Zhao, Xingjun Ma
, Mingming Gong, Jianzhong Qi
, Rui Zhang, Dacheng Tao, Ramamohanarao Kotagiri:
Short-Term and Long-Term Context Aggregation Network for Video Inpainting. ECCV (4) 2020: 728-743 - [c18]Yisen Wang, Difan Zou, Jinfeng Yi, James Bailey, Xingjun Ma, Quanquan Gu:
Improving Adversarial Robustness Requires Revisiting Misclassified Examples. ICLR 2020 - [c17]Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma:
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets. ICLR 2020 - [c16]Xingjun Ma, Hanxun Huang, Yisen Wang, Simone Romano, Sarah M. Erfani, James Bailey:
Normalized Loss Functions for Deep Learning with Noisy Labels. ICML 2020: 6543-6553 - [c15]Bojia Zi, Minghao Chang, Jingjing Chen, Xingjun Ma, Yu-Gang Jiang:
WildDeepfake: A Challenging Real-World Dataset for Deepfake Detection. ACM Multimedia 2020: 2382-2390 - [i22]Dongxian Wu
, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma:
Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets. CoRR abs/2002.05990 (2020) - [i21]Shihao Zhao, Xingjun Ma, Xiang Zheng, James Bailey, Jingjing Chen, Yu-Gang Jiang:
Clean-Label Backdoor Attacks on Video Recognition Models. CoRR abs/2003.03030 (2020) - [i20]Ranjie Duan, Xingjun Ma, Yisen Wang, James Bailey, A. Kai Qin, Yun Yang:
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles. CoRR abs/2003.08757 (2020) - [i19]Xingjun Ma, Hanxun Huang, Yisen Wang, Simone Romano, Sarah M. Erfani, James Bailey:
Normalized Loss Functions for Deep Learning with Noisy Labels. CoRR abs/2006.13554 (2020) - [i18]Linxi Jiang, Xingjun Ma, Zejia Weng, James Bailey, Yu-Gang Jiang:
Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. CoRR abs/2006.13726 (2020) - [i17]Yunfei Liu, Xingjun Ma, James Bailey, Feng Lu:
Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. CoRR abs/2007.02343 (2020) - [i16]Lingjuan Lyu, Yitong Li, Karthik Nandakumar, Jiangshan Yu, Xingjun Ma:
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning. CoRR abs/2007.09370 (2020) - [i15]Ang Li, Shanshan Zhao, Xingjun Ma, Mingming Gong, Jianzhong Qi, Rui Zhang, Dacheng Tao, Ramamohanarao Kotagiri:
Short-Term and Long-Term Context Aggregation Network for Video Inpainting. CoRR abs/2009.05721 (2020) - [i14]Lingjuan Lyu, Han Yu, Xingjun Ma, Lichao Sun, Jun Zhao, Qiang Yang, Philip S. Yu:
Privacy and Robustness in Federated Learning: Attacks and Defenses. CoRR abs/2012.06337 (2020)
2010 – 2019
- 2019
- [c14]Yisen Wang, Xingjun Ma
, Zaiyi Chen, Yuan Luo, Jinfeng Yi, James Bailey:
Symmetric Cross Entropy for Robust Learning With Noisy Labels. ICCV 2019: 322-330 - [c13]Yisen Wang, Xingjun Ma, James Bailey, Jinfeng Yi, Bowen Zhou, Quanquan Gu:
On the Convergence and Robustness of Adversarial Training. ICML 2019: 6586-6595 - [c12]Ang Li, Jianzhong Qi, Rui Zhang, Xingjun Ma
, Kotagiri Ramamohanarao:
Generative Image Inpainting with Submanifold Alignment. IJCAI 2019: 811-817 - [c11]Linxi Jiang, Xingjun Ma
, Shaoxiang Chen
, James Bailey, Yu-Gang Jiang:
Black-box Adversarial Attacks on Video Recognition Models. ACM Multimedia 2019: 864-872 - [i13]Linxi Jiang, Xingjun Ma, Shaoxiang Chen, James Bailey, Yu-Gang Jiang:
Black-box Adversarial Attacks on Video Recognition Models. CoRR abs/1904.05181 (2019) - [i12]Sukarna Barua, Xingjun Ma, Sarah Monazam Erfani, Michael E. Houle, James Bailey:
Quality Evaluation of GANs Using Cross Local Intrinsic Dimensionality. CoRR abs/1905.00643 (2019) - [i11]Lingjuan Lyu, Jiangshan Yu, Karthik Nandakumar, Yitong Li, Xingjun Ma, Jiong Jin:
Towards Fair and Decentralized Privacy-Preserving Deep Learning with Blockchain. CoRR abs/1906.01167 (2019) - [i10]Xingjun Ma, Yuhao Niu, Lin Gu, Yisen Wang, Yitian Zhao, James Bailey, Feng Lu:
Understanding Adversarial Attacks on Deep Learning Based Medical Image Analysis Systems. CoRR abs/1907.10456 (2019) - [i9]Ang Li, Jianzhong Qi, Rui Zhang, Xingjun Ma, Kotagiri Ramamohanarao:
Generative Image Inpainting with Submanifold Alignment. CoRR abs/1908.00211 (2019) - [i8]Yisen Wang, Xingjun Ma, Zaiyi Chen, Yuan Luo, Jinfeng Yi, James Bailey:
Symmetric Cross Entropy for Robust Learning with Noisy Labels. CoRR abs/1908.06112 (2019) - 2018
- [b1]Xingjun Ma:
Machine learning with adversarial perturbations and noisy labels. University of Melbourne, Parkville, Victoria, Australia, 2018 - [c10]Sudanthi N. R. Wijewickrema, Xingjun Ma
, Patorn Piromchai
, Robert Briggs, James Bailey, Gregor E. Kennedy, Stephen J. O'Leary:
Providing Automated Real-Time Technical Feedback for Virtual Reality Based Surgical Training: Is the Simpler the Better? AIED (1) 2018: 584-598 - [c9]Sudanthi N. R. Wijewickrema, Bridget Copson, Xingjun Ma
, Robert Briggs, James Bailey, Gregor E. Kennedy, Stephen J. O'Leary:
Development and Validation of a Virtual Reality Tutor to Teach Clinically Oriented Surgical Anatomy of the Ear. CBMS 2018: 12-17 - [c8]Yisen Wang, Weiyang Liu, Xingjun Ma
, James Bailey, Hongyuan Zha, Le Song, Shu-Tao Xia:
Iterative Learning With Open-Set Noisy Labels. CVPR 2018: 8688-8696 - [c7]Xingjun Ma, Bo Li, Yisen Wang, Sarah M. Erfani, Sudanthi N. R. Wijewickrema, Grant Schoenebeck, Dawn Song, Michael E. Houle, James Bailey:
Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. ICLR 2018 - [c6]Xingjun Ma, Yisen Wang, Michael E. Houle, Shuo Zhou, Sarah M. Erfani, Shu-Tao Xia, Sudanthi N. R. Wijewickrema, James Bailey:
Dimensionality-Driven Learning with Noisy Labels. ICML 2018: 3361-3370 - [i7]Xingjun Ma, Bo Li, Yisen Wang, Sarah M. Erfani, Sudanthi N. R. Wijewickrema, Michael E. Houle, Grant Schoenebeck, Dawn Song, James Bailey:
Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. CoRR abs/1801.02613 (2018) - [i6]Yisen Wang, Weiyang Liu, Xingjun Ma, James Bailey, Hongyuan Zha, Le Song, Shu-Tao Xia:
Iterative Learning with Open-set Noisy Labels. CoRR abs/1804.00092 (2018) - [i5]Xingjun Ma, Yisen Wang, Michael E. Houle, Shuo Zhou, Sarah M. Erfani, Shu-Tao Xia, Sudanthi N. R. Wijewickrema, James Bailey:
Dimensionality-Driven Learning with Noisy Labels. CoRR abs/1806.02612 (2018) - 2017
- [c5]Yisen Wang, Simone Romano, Vinh Nguyen, James Bailey, Xingjun Ma, Shu-Tao Xia:
Unbiased Multivariate Correlation Analysis. AAAI 2017: 2754-2760 - [c4]Xingjun Ma
, Sudanthi N. R. Wijewickrema, Yun Zhou, Bridget Copson, James Bailey, Gregor E. Kennedy, Stephen J. O'Leary:
Simulation for Training Cochlear Implant Electrode Insertion. CBMS 2017: 1-6 - [c3]Sudanthi N. R. Wijewickrema, Bridget Copson, Yun Zhou, Xingjun Ma
, Robert Briggs, James Bailey, Gregor E. Kennedy, Stephen J. O'Leary:
Design and Evaluation of a Virtual Reality Simulation Module for Training Advanced Temporal Bone Surgery. CBMS 2017: 7-12 - [c2]Xingjun Ma
, Sudanthi N. R. Wijewickrema, Shuo Zhou, Yun Zhou, Zakaria Mhammedi, Stephen J. O'Leary, James Bailey:
Adversarial Generation of Real-time Feedback with Neural Networks for Simulation-based Training. IJCAI 2017: 3763-3769 - [c1]Xingjun Ma
, Sudanthi N. R. Wijewickrema, Yun Zhou, Shuo Zhou, Stephen J. O'Leary, James Bailey:
Providing Effective Real-Time Feedback in Simulation-Based Surgical Training. MICCAI (2) 2017: 566-574 - [i4]Xingjun Ma, James Bailey, Sudanthi N. R. Wijewickrema, Shuo Zhou, Zakaria Mhammedi, Yun Zhou, Stephen J. O'Leary:
Extracting Real-time Feedback with Neural Networks for Simulation-based Learning. CoRR abs/1703.01460 (2017) - [i3]Xingjun Ma, Chunping Li, James Bailey, Sudanthi N. R. Wijewickrema:
Finding Influentials in Twitter: A Temporal Influence Ranking Model. CoRR abs/1703.01468 (2017) - [i2]Sudanthi N. R. Wijewickrema, Xingjun Ma, James Bailey, Gregor E. Kennedy, Stephen J. O'Leary:
Feedback Techniques in Computer-Based Simulation Training: A Survey. CoRR abs/1705.04683 (2017) - [i1]Xingjun Ma, Sudanthi N. R. Wijewickrema, Yun Zhou, Shuo Zhou, Stephen J. O'Leary, James Bailey:
Providing Effective Real-time Feedback in Simulation-based Surgical Training. CoRR abs/1706.10036 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-08-01 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint