default search action
Quanxin Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Yu-an Tan, Quanxin Zhang, Yuanzhang Li:
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Comput. Networks 245: 110376 (2024) - [j54]Haoran Lyu, Yajie Wang, Yu-An Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. Cybersecur. 7(1): 6 (2024) - [j53]Huipeng Zhou, Yajie Wang, Yu-an Tan, Shangbo Wu, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding. IEEE Trans. Artif. Intell. 5(1): 412-419 (2024) - [c31]Xundi Yang, Kefan Qiu, Quanxin Zhang:
EasyLog: An Efficient Kernel Logging Service for Machine Learning. ACNS Workshops (1) 2024: 16-28 - 2023
- [j52]Jie Yang, Jun Zheng, Thar Baker, Shuai Tang, Yu-an Tan, Quanxin Zhang:
Clean-label poisoning attacks on federated learning for IoT. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j51]Shengang Hao, Jun Zheng, Jie Yang, Haipeng Sun, Quanxin Zhang, Li Zhang, Nan Jiang, Yuanzhang Li:
Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering. Inf. Sci. 634: 85-100 (2023) - [j50]Yaoyuan Zhang, Yu-an Tan, Haipeng Sun, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Improving the invisibility of adversarial examples with perceptually adaptive perturbation. Inf. Sci. 635: 126-137 (2023) - [j49]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Dianxin Wang, Quanxin Zhang, Yuanzhang Li:
Towards interpreting vulnerability of object detection models via adversarial distillation. J. Inf. Secur. Appl. 72: 103410 (2023) - [j48]Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang:
Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things. IEEE Trans. Ind. Informatics 19(6): 7480-7488 (2023) - [c30]Shuai Tang, Tianshi Mu, Jun Zheng, Yurong Fu, Quanxin Zhang, Jie Yang:
A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse. AIS&P (1) 2023: 316-327 - [c29]Rong Huang, Li Chen, Jun Zheng, Quanxin Zhang, Xiao Yu:
Adversarial Attacks Against Object Detection in Remote Sensing Images. AIS&P (1) 2023: 358-367 - [c28]Yashi Liu, Kefan Qiu, Lu Liu, Quanxin Zhang:
Penetrating Machine Learning Servers via Exploiting BMC Vulnerability. ML4CS 2023: 163-172 - 2022
- [j47]Yuanzhang Li, Junli Liu, Xinting Xu, Xiaosong Zhang, Zhang Li, Quanxin Zhang:
A robust packet-dropping covert channel for mobile intelligent terminals. Int. J. Intell. Syst. 37(10): 6928-6950 (2022) - [j46]Li Zhang, Zhao Li, Huali Ren, Xiao Yu, Yuxi Ma, Quanxin Zhang:
Knowledge graph and behavior portrait of intelligent attack against path planning. Int. J. Intell. Syst. 37(10): 7110-7123 (2022) - [j45]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Tian Chen, Yuanzhang Li, Quanxin Zhang:
Boosting cross-task adversarial attack with random blur. Int. J. Intell. Syst. 37(10): 8139-8154 (2022) - [j44]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture. Int. J. Intell. Syst. 37(12): 11167-11187 (2022) - [c27]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Quanxin Zhang, Yuanzhang Li, Dianxin Wang:
Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation. ACNS Workshops 2022: 53-65 - [c26]Shengang Hao, Jun Zheng, Jie Yang, Ziwei Ni, Quanxin Zhang, Li Zhang:
A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service. ACNS Workshops 2022: 84-103 - [c25]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture. ACNS Workshops 2022: 104-123 - [c24]Yaoyuan Zhang, Yu-an Tan, Tian Chen, Xinrui Liu, Quanxin Zhang, Yuanzhang Li:
Enhancing the Transferability of Adversarial Examples with Random Patch. IJCAI 2022: 1672-1678 - [i3]Haoran Lyu, Yajie Wang, Yu-an Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Boosting Adversarial Transferability of MLP-Mixer. CoRR abs/2204.12204 (2022) - [i2]Nan Luo, Yuanzhang Li, Yajie Wang, Shangbo Wu, Yu-An Tan, Quanxin Zhang:
Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers. CoRR abs/2206.04881 (2022) - 2021
- [j43]Yuxi Ma, Meng Shen, Yuhang Zhao, Zhao Li, Xiaoyao Tong, Quanxin Zhang, Zhi Wang:
Opponent portrait for multiagent reinforcement learning in competitive environment. Int. J. Intell. Syst. 36(12): 7461-7474 (2021) - [j42]Xiaohui Kuang, Xianfeng Gao, Lianfang Wang, Gang Zhao, Lishan Ke, Quanxin Zhang:
A discrete cosine transform-based query efficient attack on black-box object detectors. Inf. Sci. 546: 596-607 (2021) - [j41]Yajie Wang, Haoran Lv, Xiaohui Kuang, Gang Zhao, Yu-an Tan, Quanxin Zhang, Jingjing Hu:
Towards a physical-world adversarial patch for blinding object detection models. Inf. Sci. 556: 459-471 (2021) - [j40]Quanxin Zhang, Mengyan Zhu, Chen Liang, Kunqing Wang, Kai Yang, Yuanzhang Li:
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis. Mob. Networks Appl. 26(4): 1493-1502 (2021) - [j39]Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu:
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers. Mob. Networks Appl. 26(4): 1616-1629 (2021) - [c23]Yuan Xue, Shouxin Wang, Tian Chen, Quanxin Zhang, Lu Liu, Yu-an Tan:
On-line Firmware Updating and Fingerprint Generating for Solid State Disks. DMBD (2) 2021: 28-36 - [c22]Xinrui Liu, Xiao Yu, Zhibin Zhang, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
A Random Multi-target Backdooring Attack on Deep Neural Networks. DMBD (2) 2021: 45-52 - [c21]Zhao Li, Yuxi Ma, Zhibin Zhang, Xiao Yu, Quanxin Zhang, Yuanzhang Li:
Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles. DMBD (2) 2021: 53-60 - [c20]Xiaoyao Tong, Yuxi Ma, Yuan Xue, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning. DMBD (2) 2021: 61-68 - [c19]Zhiwei Shi, Tian Chen, Yuan Xue, Yuanzhang Li, Quanxin Zhang, Yu-an Tan, Jingjing Hu:
Code Decoupling Execution Isolating Based on TF Card Firmware Extension. DSC 2021: 403-408 - [c18]Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang:
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. IJCAI 2021: 3125-3133 - [i1]Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang:
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. CoRR abs/2107.01396 (2021) - 2020
- [j38]Quanxin Zhang, Yuhang Zhao, Yajie Wang, Thar Baker, Jian Zhang, Jingjing Hu:
Towards cross-task universal perturbation against black-box object detectors in autonomous driving. Comput. Networks 180: 107388 (2020) - [j37]Quanxin Zhang, Xiaosong Zhang, Yuan Xue, Jingjing Hu:
A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints. Future Gener. Comput. Syst. 102: 472-480 (2020) - [j36]Yucheng Shi, Yahong Han, Quanxin Zhang, Xiaohui Kuang:
Adaptive iterative attack towards explainable adversarial robustness. Pattern Recognit. 105: 107309 (2020) - [c17]Yujie Liu, Wenjia Wu, Wen Bo, Chen Han, Quanxin Zhang, Changyou Zhang:
Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System. HCC 2020: 84-90 - [c16]Haitao Zhang, Fan Jia, Quanxin Zhang, Yahong Han, Xiaohui Kuang, Yu-an Tan:
Two-Way Feature-Aligned And Attention-Rectified Adversarial Training. ICME 2020: 1-6
2010 – 2019
- 2019
- [j35]Yuanzhang Li, Shangjun Yao, Kai Yang, Yu-an Tan, Quan-Xin Zhang:
A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images. IEEE Access 7: 73573-73582 (2019) - [j34]Xiaosong Zhang, Linhong Guo, Yuan Xue, Quanxin Zhang:
A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment. IEEE Access 7: 122214-122223 (2019) - [j33]Quanxin Zhang, Kunqing Wang, Wenjiao Zhang, Jingjing Hu:
Attacking Black-Box Image Classifiers With Particle Swarm Optimization. IEEE Access 7: 158051-158063 (2019) - [j32]Xiaohui Kuang, Hongyi Liu, Ye Wang, Qikun Zhang, Quanxin Zhang, Jun Zheng:
A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks. IEEE Access 7: 172938-172947 (2019) - [j31]Li Zhang, Shengang Hao, Quanxin Zhang:
Recovering SQLite data from fragmented flash pages. Ann. des Télécommunications 74(7-8): 451-460 (2019) - [j30]Hua Wei, Changzhen Hu, Shiyou Chen, Yuan Xue, Quanxin Zhang:
Establishing a software defect prediction model via effective dimension reduction. Inf. Sci. 477: 399-409 (2019) - [j29]Xiao Yu, Yu-an Tan, Zhizhuo Sun, Jingyu Liu, Chen Liang, Quanxin Zhang:
A fault-tolerant and energy-efficient continuous data protection system. J. Ambient Intell. Humaniz. Comput. 10(8): 2945-2954 (2019) - [j28]Quan-Xin Zhang, Hanxiao Gong, Xiaosong Zhang, Chen Liang, Yu-an Tan:
A sensitive network jitter measurement for covert timing channels over interactive traffic. Multim. Tools Appl. 78(3): 3493-3509 (2019) - [c15]Xinxin Wang, Yuanzhang Li, Quanxin Zhang, Xiaohui Kuang:
Boosting Training for PDF Malware Classifier via Active Learning. CSS (2) 2019: 101-110 - [c14]Haojia Zhu, Can Cui, Fengyin Li, Zhongxing Liu, Quanxin Zhang:
Design of Anonymous Communication Protocol Based on Group Signature. CSS (2) 2019: 175-181 - [c13]Dongfeng Wang, Qinghua Li, Fengyin Li, Quanxin Zhang, Banghai Xu:
Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain. CSS (1) 2019: 274-278 - [c12]Haojun Ai, Yifeng Wang, Yuhong Yang, Quanxin Zhang:
An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant. CSS (1) 2019: 363-373 - [c11]Yaxiao Wang, Yuanzhang Li, Quanxin Zhang, Jingjing Hu, Xiaohui Kuang:
Evading PDF Malware Classifiers with Generative Adversarial Network. CSS (1) 2019: 374-387 - [c10]Haojun Ai, Wuyang Xia, Quanxin Zhang:
Speaker Recognition Based on Lightweight Neural Network for Smart Home Solutions. CSS (2) 2019: 421-431 - [c9]Aming Wu, Yahong Han, Quanxin Zhang, Xiaohui Kuang:
Untargeted Adversarial Attack via Expanding the Semantic Gap. ICME 2019: 514-519 - [c8]Xiao Yu, Kunqing Wang, Quanxin Zhang, Yuanzhang Li:
A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles. SmartCom 2019: 34-41 - [c7]Yuhang Zhao, Kunqing Wang, Yuan Xue, Quanxin Zhang, Xiaosong Zhang:
An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors. SmartCom 2019: 63-72 - [c6]Xiaosong Zhang, Linhong Guo, Yuan Xue, Hongwei Jiang, Lu Liu, Quanxin Zhang:
A Hybrid Covert Channel with Feedback over Mobile Networks. SocialSec 2019: 87-94 - 2018
- [j27]Qikun Zhang, Yong Gan, Quan-Xin Zhang, Ruifang Wang, Yu-an Tan:
A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application. IEEE Access 6: 24064-24074 (2018) - [j26]Jiamin Zheng, Yu-an Tan, Qikun Zhang, Xiaosong Zhang, Liehuang Zhu, Quan-Xin Zhang:
Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci. China Inf. Sci. 61(4): 048103:1-048103:3 (2018) - [j25]Yu-an Tan, Xinting Xu, Chen Liang, Xiaosong Zhang, Quan-Xin Zhang, Yuanzhang Li:
An end-to-end covert channel via packet dropout for mobile networks. Int. J. Distributed Sens. Networks 14(5) (2018) - [j24]Yuan Xue, Yu-an Tan, Chen Liang, Yuanzhang Li, Jun Zheng, Quan-Xin Zhang:
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444: 36-50 (2018) - [j23]Xiaosong Zhang, Chen Liang, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng, Yu-an Tan:
Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445-446: 66-78 (2018) - [j22]Yu-an Tan, Yuan Xue, Chen Liang, Jun Zheng, Quan-Xin Zhang, Jiamin Zheng, Yuanzhang Li:
A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107: 69-82 (2018) - [j21]Chen Liang, Yu-an Tan, Xiaosong Zhang, Xianmin Wang, Jun Zheng, Quan-Xin Zhang:
Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118: 144-153 (2018) - [j20]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Xianmin Wang, Quan-Xin Zhang, Yuanzhang Li:
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks. Sensors 18(5): 1663 (2018) - [j19]Zhizhuo Sun, Quan-Xin Zhang, Yuanzhang Li, Yu-an Tan:
DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage. IEEE Trans. Circuits Syst. Video Technol. 28(1): 193-205 (2018) - [j18]Yu-an Tan, Xiaosong Zhang, Kashif Sharif, Chen Liang, Quan-Xin Zhang, Yuanzhang Li:
Covert Timing Channels for IoT over Mobile Networks. IEEE Wirel. Commun. 25(6): 38-44 (2018) - [j17]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Quan-Xin Zhang, Yuanzhang Li:
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services. Wirel. Commun. Mob. Comput. 2018: 5401890:1-5401890:9 (2018) - [c5]Wencong Han, Quanxin Zhang, Chongzhi Gao, Jingjing Hu, Fang Yan:
Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware. ICA3PP (4) 2018: 249-259 - 2017
- [j16]Xiaosong Zhang, Yu-an Tan, Yuan Xue, Quan-Xin Zhang, Yuanzhang Li, Can Zhang, Jun Zheng:
Cryptographic key protection against FROST for mobile devices. Clust. Comput. 20(3): 2393-2402 (2017) - [j15]Ruijin Zhu, Baofeng Zhang, Junjie Mao, Quan-Xin Zhang, Yu-an Tan:
A methodology for determining the image base of ARM-based industrial control system firmware. Int. J. Crit. Infrastructure Prot. 16: 26-35 (2017) - [c4]Aourra Khaled, Quan-Xin Zhang:
An Energy Aware Mass Memory Unit for Small Satellites Using Hybrid Architecture. CSE/EUC (1) 2017: 210-213 - [c3]Pengfei Pang, Aourra Khaled, Yuan Xue, Yuanzhang Li, Quan-Xin Zhang:
A Transparent Encryption Scheme of Video Data for Android Devices. CSE/EUC (1) 2017: 817-822 - [c2]Shaoru Liu, Yao Wang, Quan-Xin Zhang, Yuanzhang Li:
A VoLTE Encryption Experiment for Android Smartphones. GSKI (1) 2017: 115-125 - 2016
- [j14]Ruijin Zhu, Yu-an Tan, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng:
Determining image base of firmware for ARM devices by matching literal pools. Digit. Investig. 16: 19-28 (2016) - [j13]Ruijin Zhu, Yu-an Tan, Quan-Xin Zhang, Fei Wu, Jun Zheng, Yuan Xue:
Determining Image Base of Firmware Files for ARM Devices. IEICE Trans. Inf. Syst. 99-D(2): 351-359 (2016) - 2015
- [j12]Li Zhang, Shen-Gang Hao, Jun Zheng, Yu-an Tan, Quan-xin Zhang, Yuan-zhang Li:
Descrambling data on solid-state disks by reverse-engineering the firmware. Digit. Investig. 12: 77-87 (2015) - [j11]Xiao Yu, Tong-Sheng Ju, Quan-Xin Zhang, Yuanzhang Li, Yu-an Tan:
Tuner and demodulator design of antenna control system. Int. J. Wirel. Mob. Comput. 8(2): 141-146 (2015) - 2014
- [j10]Li Gao, Quanxin Zhang, Shouhua Liu:
Oscillatory behavior of third-order nonlinear delay dynamic equations on time scales. J. Comput. Appl. Math. 256: 104-113 (2014) - 2013
- [j9]Yue Gao, Quanxin Zhang, Yulei Chu, Xiang He, Jun Wan, Zhiqiang Zhou, Jing Lin:
The research and implementation of customised launcher in Android. Int. J. Wirel. Mob. Comput. 6(5): 441-447 (2013) - 2012
- [j8]Quanxin Zhang, Li Gao, Yuanhong Yu:
Oscillation criteria for third-order neutral differential equations with continuously distributed delay. Appl. Math. Lett. 25(10): 1514-1519 (2012) - 2011
- [j7]Quanxin Zhang, Shouhua Liu, Li Gao:
Oscillation criteria for even-order half-linear functional differential equations with damping. Appl. Math. Lett. 24(10): 1709-1715 (2011) - [j6]Shouhua Liu, Quanxin Zhang, Yuanhong Yu:
Oscillation of even-order half-linear functional differential equations with damping. Comput. Math. Appl. 61(8): 2191-2196 (2011) - [j5]Quanxin Zhang, Li Gao, Lei Wang:
Oscillation of second-order nonlinear delay dynamic equations on time scales. Comput. Math. Appl. 61(8): 2342-2348 (2011) - [j4]Quanxin Zhang, Fang Qiu:
Oscillation theorems for second-order half-linear delay dynamic equations with damping on time scales. Comput. Math. Appl. 62(11): 4185-4193 (2011) - [j3]Quanxin Zhang:
Oscillation of second-order half-linear delay dynamic equations with damping on time scales. J. Comput. Appl. Math. 235(5): 1180-1188 (2011) - 2010
- [j2]Quanxin Zhang, Jurang Yan, Li Gao:
Oscillation behavior of even-order nonlinear neutral differential equations with variable coefficients. Comput. Math. Appl. 59(1): 426-430 (2010)
2000 – 2009
- 2008
- [c1]Fusheng Jin, Zhendong Niu, Quanxin Zhang, Haiyang Lang, Kai Qin:
A User Reputation Model for DLDE Learning 2.0 Community. ICADL 2008: 61-70 - 2006
- [j1]Quanxin Zhang, Jurang Yan:
Oscillation behavior of even order neutral differential equations with variable coefficients. Appl. Math. Lett. 19(11): 1202-1206 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint