
Zonghua Zhang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j51]Peng Liu, Zonghua Zhang, Zhaozong Meng
, Nan Gao:
Monocular Depth Estimation with Joint Attention Feature Distillation and Wavelet-Based Loss Function. Sensors 21(1): 54 (2021) - [j50]Montida Pattaranantakul, Ruan He, Zonghua Zhang
, Ahmed Meddahi, Ping Wang:
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds. IEEE Trans. Dependable Secur. Comput. 18(1): 372-383 (2021) - 2020
- [j49]Peng Liu
, Zonghua Zhang
, Zhaozong Meng, Nan Gao:
Joint Attention Mechanisms for Monocular Depth Estimation With Multi-Scale Convolutions and Adaptive Weight Adjustment. IEEE Access 8: 184437-184450 (2020) - [j48]Yanjun Xiao, Xuan Kong, Shuyu Wang, Zonghua Zhang, Yanchun Xiao:
Design and feasibility study of roots-type power machine rotor based on numerical simulation. Neural Comput. Appl. 32(1): 223-234 (2020) - [j47]Xuefei Bai, Zhaozong Meng, Nan Gao, Zonghua Zhang
, David Zhang:
3D palmprint identification using blocked histogram and improved sparse representation-based classifier. Neural Comput. Appl. 32(16): 12547-12560 (2020) - [j46]Hui Zhang, Zonghua Zhang, Nan Gao, Yanjun Xiao, Zhaozong Meng, Zhen Li:
Cost-Effective Wearable Indoor Localization and Motion Analysis via the Integration of UWB and IMU. Sensors 20(2): 344 (2020) - [c49]Arie Haenel, Yoram Haddad, Zonghua Zhang:
Lightweight Authentication Scheme for Internet of Things. CCNC 2020: 1-2 - [c48]Zakirul Alam, Zonghua Zhang, Haibo Zhang:
Message from the Program Chairs CSCloud 2020 CSCloud-EdgeCom 2020. CSCloud/EdgeCom 2020: 1 - [c47]Meng Ma, Jingmin Xu, Yuan Wang, Pengfei Chen, Zonghua Zhang
, Ping Wang:
AutoMAP: Diagnose Your Microservice-based Web Applications Automatically. WWW 2020: 246-258
2010 – 2019
- 2019
- [j45]Zhe Liu, Zhaozong Meng, Nan Gao, Zonghua Zhang
:
Calibration of the Relative Orientation between Multiple Depth Cameras Based on a Three-Dimensional Target. Sensors 19(13): 3008 (2019) - [j44]Lei Cui, Zonghua Zhang
, Nan Gao, Zhaozong Meng
, Zhen Li:
Radio Frequency Identification and Sensing Techniques and Their Applications - A Review of the State-of-the-Art. Sensors 19(18): 4012 (2019) - [j43]Caixia Chang, Zonghua Zhang
, Nan Gao, Zhaozong Meng
:
Measurement of the Three-Dimensional Shape of Discontinuous Specular Objects Using Infrared Phase-Measuring Deflectometry. Sensors 19(21): 4621 (2019) - [j42]Lichen Cheng
, Jiqiang Liu
, Guangquan Xu
, Zonghua Zhang
, Hao Wang
, Hong-Ning Dai
, Yulei Wu
, Wei Wang
:
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs. IEEE Trans. Comput. Soc. Syst. 6(6): 1373-1385 (2019) - [j41]Xuefei Bai
, Nan Gao, Zonghua Zhang
, David Zhang
:
Person Recognition Using 3-D Palmprint Data Based on Full-Field Sinusoidal Fringe Projection. IEEE Trans. Instrum. Meas. 68(9): 3287-3298 (2019) - [c46]Arie Haenel, Yoram Haddad, Zonghua Zhang:
Performance Evaluation of Sensors Lightweight Security Mechanism. MASS Workshops 2019: 176-177 - [c45]Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. NCA 2019: 1-5 - [c44]Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang
, Ahmed Meddahi:
Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV. SecureComm (2) 2019: 287-301 - [i1]Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. CoRR abs/1912.11831 (2019) - 2018
- [j40]Licheng Wang, Zonghua Zhang
, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang:
Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Commun. Mag. 56(11): 76-81 (2018) - [j39]Montida Pattaranantakul, Ruan He, Qipeng Song, Zonghua Zhang
, Ahmed Meddahi
:
NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures. IEEE Commun. Surv. Tutorials 20(4): 3330-3368 (2018) - [j38]Shujun Huang, Yue Liu, Nan Gao, Zonghua Zhang
, Feng Gao
, Xiangqian Jiang:
Distance Calibration between Reference Plane and Screen in Direct Phase Measuring Deflectometry. Sensors 18(1): 144 (2018) - [j37]Lun Li
, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang
, Xiangliang Zhang
, Zonghua Zhang
:
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles. IEEE Trans. Intell. Transp. Syst. 19(7): 2204-2220 (2018) - [j36]Hua Wang
, Zonghua Zhang, Tarek Taleb:
Editorial: Special Issue on Security and Privacy of IoT. World Wide Web 21(1): 1-6 (2018) - [j35]Yang Liu, Chaoshun Zuo, Zonghua Zhang, Shanqing Guo, Xin-Shun Xu:
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps. World Wide Web 21(1): 127-150 (2018) - [c43]Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
IoT Devices Recognition Through Network Traffic Analysis. BigData 2018: 5187-5192 - [c42]Mengdi Liu
, Guangquan Xu, Jun Zhang, Rajan Shankaran
, Gang Luo, Xi Zheng
, Zonghua Zhang:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems. ICA3PP (4) 2018: 495-510 - [e1]David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang
, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5 [contents] - 2017
- [j34]Rishikesh Sahay, Gregory Blanc
, Zonghua Zhang
, Hervé Debar:
ArOMA: An SDN based autonomic DDoS mitigation framework. Comput. Secur. 70: 482-499 (2017) - [j33]Hao Hu, Rongxing Lu, Zonghua Zhang:
TPSQ: Trust-based platoon service query via vehicular communications. Peer Peer Netw. Appl. 10(1): 262-277 (2017) - [j32]Hao Hu, Rongxing Lu, Cheng Huang, Zonghua Zhang:
PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer Peer Netw. Appl. 10(5): 1204-1218 (2017) - [j31]Xuefei Bai, Nan Gao, Zonghua Zhang, David Zhang
:
3D palmprint identification combining blocked ST and PCA. Pattern Recognit. Lett. 100: 89-95 (2017) - [j30]Xiaohong Liu, Shujun Huang, Zonghua Zhang, Feng Gao
, Xiangqian Jiang:
Full-Field Calibration of Color Camera Chromatic Aberration using Absolute Phase Maps. Sensors 17(5): 1048 (2017) - [j29]Yongjia Xu, Feng Gao
, Hongyu Ren, Zonghua Zhang, Xiangqian Jiang:
An Iterative Distortion Compensation Algorithm for Camera Calibration Based on Phase Target. Sensors 17(6): 1188 (2017) - [j28]Zonghua Zhang
, Yuemin Wang, Shujun Huang, Yue Liu, Caixia Chang, Feng Gao
, Xiangqian Jiang:
Three-Dimensional Shape Measurements of Specular Objects Using Phase-Measuring Deflectometry. Sensors 17(12): 2835 (2017) - [j27]Hao Hu, Rongxing Lu, Zonghua Zhang
, Jun Shao:
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET. IEEE Trans. Veh. Technol. 66(2): 1786-1797 (2017) - [c41]Montida Pattaranantakul, Yuchia Tseng, Ruan He, Zonghua Zhang, Ahmed Meddahi:
A First Step Towards Security Extension for NFV Orchestrator. SDN-NFV@CODASPY 2017: 25-30 - [c40]Yuchia Tseng, Montida Pattaranantakul, Ruan He, Zonghua Zhang, Farid Naït-Abdesselam:
Controller DAC: Securing SDN controller with dynamic access control. ICC 2017: 1-6 - [c39]Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval:
SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. ICICS 2017: 570-581 - [c38]Xiangfeng Li, Bo Zhang, Zonghua Zhang, Lili Qu, Hui Liao:
A novel MMC sub-module based on controllability theory. IECON 2017: 4829-4833 - [c37]Xiangfeng Li, Lili Qu, Bo Zhang, Hui Liao, Zonghua Zhang:
A novel topolgoy of multi-level converters using split wound coupled inductors. IECON 2017: 4834-4838 - [c36]Xiangfeng Li, Lili Qu, Bo Zhang, Hui Liao, Zonghua Zhang:
An improved multi-level converter with a novel sub-module circuit. IECON 2017: 4863-4866 - 2016
- [j26]Liwen He, Feiyi Huang, Jie Zhang, Bin Liu
, Chunling Chen, Zonghua Zhang, Yang Yang, Weifeng Lu:
Dynamic Secure Interconnection for Security Enhancement in Cloud Computing. Int. J. Comput. Commun. Control 11(3): 348-357 (2016) - [j25]Hao Hu, Rongxing Lu
, Cheng Huang, Zonghua Zhang:
TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs. Sensors 16(6): 803 (2016) - [j24]Yingpeng Sang
, Hong Shen, Hui Tian, Zonghua Zhang
:
Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model. IEEE Trans. Inf. Forensics Secur. 11(10): 2187-2202 (2016) - [j23]Shen Wang, Soufiene Djahel, Zonghua Zhang
, Jennifer McManis
:
Next Road Rerouting: A Multiagent System for Mitigating Unexpected Urban Traffic Congestion. IEEE Trans. Intell. Transp. Syst. 17(10): 2888-2899 (2016) - [c35]Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu:
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. AsiaCCS 2016: 895-900 - [c34]Yuchia Tseng, Zonghua Zhang, Farid Naït-Abdesselam:
SRV: Switch-based rules verification in software defined networking. NetSoft 2016: 477-482 - [c33]Yuchia Tseng, Zonghua Zhang, Farid Naït-Abdesselam:
ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications. PDCAT 2016: 268-273 - [c32]Montida Pattaranantakul, Ruan He, Ahmed Meddahi, Zonghua Zhang:
SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration. Trustcom/BigDataSE/ISPA 2016: 598-605 - 2015
- [j22]Changhoon Yoon, Taejune Park, Seungsoo Lee, Heedo Kang, Seungwon Shin, Zonghua Zhang
:
Enabling security functions with SDN: A feasibility study. Comput. Networks 85: 19-35 (2015) - [j21]Shuzhen Wang, Zonghua Zhang, Farid Naït-Abdesselam:
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems. Secur. Commun. Networks 8(2): 232-244 (2015) - [j20]Intesab Hussain, Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam:
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP). Secur. Commun. Networks 8(18): 4436-4451 (2015) - [j19]Miao Liu, Changku Sun, Shujun Huang, Zonghua Zhang:
An Accurate Projector Calibration Method Based on Polynomial Distortion Representation. Sensors 15(10): 26567-26582 (2015) - [c31]Paul-Edmond Berthier, Stéphane Cauchie, Zonghua Zhang:
Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices. AsiaCCS 2015: 675 - [c30]Hao Hu, Rongxing Lu, Zonghua Zhang:
VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications. GLOBECOM 2015: 1-6 - [c29]An Wan, Jing Xu, Song Zhang
, Zonghua Zhang, Ken Chen:
Learning optimal measurement and control of assembly robot for large-scale heavy-weight parts. ROBIO 2015: 1240-1246 - [c28]An Wan, Jing Xu, Zonghua Zhang, Ken Chen:
A new survey adjustment method for laser tracker relocation. ROBIO 2015: 2383-2388 - 2014
- [j18]Jingwei Liu, Zonghua Zhang
, Xiaofeng Chen, Kyung Sup Kwak:
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE Trans. Parallel Distributed Syst. 25(2): 332-342 (2014) - [c27]Sawand M. Ajmal, Stefano Paris, Zonghua Zhang, Farid Naït-Abdesselam:
An Efficient Admission Control Algorithm for Virtual Sensor Networks. HPCC/CSS/ICESS 2014: 735-742 - [c26]Ajmal Sawand, Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam:
Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems. ICCC 2014: 187-192 - 2013
- [j17]Shuzhen Wang, Zonghua Zhang
, Youki Kadobayashi:
Exploring attack graph for cost-benefit security hardening: A probabilistic approach. Comput. Secur. 32: 158-169 (2013) - [c25]Yingpeng Sang, Hong Shen, Hui Tian, Zonghua Zhang:
Achieving Probabilistic Anonymity Against One-to-Multiple Linkage Attacks. ICEBE 2013: 176-183 - 2012
- [j16]Mourad Amad
, Ahmed Meddahi, Djamil Aïssani
, Zonghua Zhang:
HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity. J. Netw. Comput. Appl. 35(6): 1818-1830 (2012) - [j15]Soufiene Djahel
, Zonghua Zhang
, Farid Naït-Abdesselam, John Murphy:
Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs. IEEE Wirel. Commun. Lett. 1(5): 540-543 (2012) - [c24]Zonghua Zhang
, Shuzhen Wang:
Boosting Logical Attack Graph for Efficient Security Control. ARES 2012: 218-223 - [c23]Jingwei Liu, Zonghua Zhang, Rong Sun, Kyung Sup Kwak:
Certificateless Partially Blind Signature. AINA Workshops 2012: 128-133 - [c22]Jingwei Liu, Zonghua Zhang, Rong Sun, Kyung Sup Kwak:
An efficient certificateless remote anonymous authentication scheme for wireless body area networks. ICC 2012: 3404-3408 - 2011
- [j14]Zonghua Zhang
, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi:
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks. Comput. Secur. 30(6-7): 525-537 (2011) - [j13]Soufiene Djahel
, Farid Naït-Abdesselam, Zonghua Zhang
:
Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges. IEEE Commun. Surv. Tutorials 13(4): 658-672 (2011) - [j12]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete logarithm based additively homomorphic encryption and secure data aggregation. Inf. Sci. 181(16): 3308-3322 (2011) - [c21]Huaqun Guo, Fan Yu, Zonghua Zhang, Wai-Choong Wong
, Maode Ma, Yongdong Wu:
HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication. ICC 2011: 1-5 - [c20]Tao Ban, Shanqing Guo, Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Practical network traffic analysis in P2P environment. IWCMC 2011: 1801-1807 - 2010
- [j11]Zonghua Zhang
, Pin-Han Ho, Farid Naït-Abdesselam:
RADAR: A reputation-driven anomaly detection system for wireless mesh networks. Wirel. Networks 16(8): 2221-2236 (2010) - [c19]Juan Li, Zonghua Zhang, Weiyi Zhang:
MobiTrust: Trust Management System in Mobile Social Computing. CIT 2010: 954-959 - [c18]Zonghua Zhang, Jingwei Liu, Youki Kadobayashi:
STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems. DPM/SETOP 2010: 170-187
2000 – 2009
- 2009
- [j10]Zonghua Zhang
, Pin-Han Ho, Liwen He:
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach. Comput. Secur. 28(7): 605-614 (2009) - [j9]Zonghua Zhang
, Pin-Han Ho:
Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks. J. Netw. Comput. Appl. 32(3): 710-720 (2009) - [j8]Zonghua Zhang
, Hong Shen:
M-AID: An adaptive middleware built upon anomaly detectors for intrusion detection and rational response. ACM Trans. Auton. Adapt. Syst. 4(4): 24:1-24:35 (2009) - [c17]Ruo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda:
A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration. DASC 2009: 95-102 - [c16]Zonghua Zhang, Pin-Han Ho, Farid Naït-Abdesselam:
On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks. ICC 2009: 1-5 - [c15]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. ICICS 2009: 493-502 - 2008
- [j7]Pin-Han Ho, Zonghua Zhang, Rongxing Lu:
Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal. Secur. Commun. Networks 1(3): 191-193 (2008) - [j6]Soufiene Djahel
, Farid Naït-Abdesselam, Zonghua Zhang, Ashfaq A. Khokhar:
Defending against packet dropping attack in vehicular ad hoc networks. Secur. Commun. Networks 1(3): 245-258 (2008) - [c14]Zonghua Zhang
, Farid Naït-Abdesselam, Pin-Han Ho:
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. ARES 2008: 352-359 - [c13]Zonghua Zhang
, Ruo Ando, Youki Kadobayashi:
Hardening Botnet by a Rational Botmaster. Inscrypt 2008: 348-369 - [c12]Haibo Zhang, Hong Shen, Yawen Chen, Zonghua Zhang:
Balancing energy consumption for uniform data gathering wireless sensor networks. PODC 2008: 436 - [c11]Zonghua Zhang, Farid Naït-Abdesselam, Xiaodong Lin, Pin-Han Ho:
A model-based semi-quantitative approach for evaluating security of enterprise networks. SAC 2008: 1069-1074 - [c10]Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Xiaodong Lin:
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. WCNC 2008: 2621-2626 - 2007
- [j5]Zonghua Zhang, Hong Shen:
Constructing a Multilayered Boundary to Defend against Intrusive Anomalies. IEICE Trans. Inf. Syst. 90-D(2): 490-499 (2007) - [j4]Zonghua Zhang, Hong Shen, Yingpeng Sang:
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection. Int. J. Netw. Secur. 4(3): 292-305 (2007) - [j3]Zonghua Zhang, Nikolaus F. Troje:
3D Periodic Human Motion Reconstruction from 2D Motion Sequences. Neural Comput. 19(5): 1400-1421 (2007) - 2006
- [c9]Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen:
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. ICISC 2006: 136-154 - 2005
- [j2]Zonghua Zhang
, Hong Shen:
Application of online-training SVMs for real-time intrusion detection with different considerations. Comput. Commun. 28(12): 1428-1442 (2005) - [j1]Zonghua Zhang, Nikolaus F. Troje:
View-independent person identification from human gait. Neurocomputing 69(1-3): 250-256 (2005) - [c8]Zonghua Zhang
, Hong Shen:
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. DSN 2005: 118-127 - [c7]Zonghua Zhang, Hong Shen:
Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts. ICN (2) 2005: 989-996 - [c6]Zonghua Zhang, Hong Shen:
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. ISPEC 2005: 178-191 - [c5]Yingpeng Sang, Hong Shen, Zonghua Zhang:
An Efficient Protocol for the Problem of Secure Two-party Vector Dominance. PDCAT 2005: 488-492 - [c4]Zonghua Zhang, Hong Shen, Xavier Défago
, Yingpeng Sang:
A Brief Comparative Study on Analytical Models of Computer System Dependability and Security. PDCAT 2005: 493-497 - 2004
- [c3]Zonghua Zhang, Hong Shen:
Online Training of SVMs for Real-time Intrusion Detection. AINA (1) 2004: 568-573 - [c2]Zonghua Zhang, Nikolaus F. Troje:
3D Periodic Human Motion Reconstruction from 2D Motion Sequences. CVPR Workshops 2004: 186 - [c1]Zonghua Zhang, Hong Shen:
Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method. EEE 2004: 163-166
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-22 23:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint