


default search action
Wenchao Huang 0001
Person information
- affiliation: University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
Other persons with the same name
- Wenchao Huang — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j24]Zhaoyi Meng
, Jiale Zhang, Jiaqi Guo, Wansen Wang
, Wenchao Huang
, Jie Cui
, Hong Zhong
, Yan Xiong
:
Detecting Android Malware by Visualizing App Behaviors From Multiple Complementary Views. IEEE Trans. Inf. Forensics Secur. 20: 2915-2929 (2025)
[c49]Yiming Zhu, Wenchao Huang, Yan Xiong:
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1. USENIX Security Symposium 2025: 2557-2576
[i15]Zhaoyi Meng, Fenglei Xu, Wenxiang Zhao, Wansen Wang, Wenchao Huang, Jie Cui, Hong Zhong, Yan Xiong:
MalFlows: Context-aware Fusion of Heterogeneous Flow Semantics for Android Malware Detection. CoRR abs/2508.03588 (2025)- 2024
[j23]Wansen Wang
, Wenchao Huang
, Zhaoyi Meng
, Yan Xiong
, Cheng Su
:
Advancing the Automation Capability of Verifying Security Protocols. IEEE Trans. Dependable Secur. Comput. 21(6): 5059-5070 (2024)
[c48]Jianlei Zhu, Guilu Fu, Wenchao Huang, Boxuan Shi, Yan Xiong:
Encrypted Mining Traffic Detection Mechanism Based on TLS Handshake Message and Machine Learning. BigCom 2024: 247-254
[i14]Yiming Zhu, Wenchao Huang, Yan Xiong:
LightSLH: Provable and Low-Overhead Spectre v1 Mitigation through Targeted Instruction Hardening. CoRR abs/2408.16220 (2024)
[i13]Zhaoyi Meng, Jiale Zhang, Jiaqi Guo, Wansen Wang, Wenchao Huang, Jie Cui, Hong Zhong, Yan Xiong:
Detecting Android Malware by Visualizing App Behaviors from Multiple Complementary Views. CoRR abs/2410.06157 (2024)
[i12]Wansen Wang, Pu Zhang, Renjie Ji, Wenchao Huang, Zhaoyi Meng, Yan Xiong:
JANUS: A Difference-Oriented Analyzer For Financial Centralization Risks in Smart Contracts. CoRR abs/2412.03938 (2024)
[i11]Wansen Wang, Caichang Tu, Zhaoyi Meng, Wenchao Huang, Yan Xiong:
WACANA: A Concolic Analyzer for Detecting On-chain Data Vulnerabilities in WASM Smart Contracts. CoRR abs/2412.03946 (2024)- 2023
[c47]Renjie Ji, Wansen Wang, Yan Xiong, Wenchao Huang:
SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts. BIGCOM 2023: 88-95
[c46]Jiaqi Guo, Zhaoyi Meng, Qian Zhang, Yan Xiong, Wenchao Huang:
MVVDroid: Android Malware Detection based on Multi-View Visualization. BIGCOM 2023: 96-102
[c45]Caichang Tu, Wansen Wang, Kaiwen Shi, Yan Xiong, Wenchao Huang:
EOSVERIF: An Automated Analyzer for EOSIO Smart Contracts. BIGCOM 2023: 103-109
[c44]Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji:
Automated Inference on Financial Security of Ethereum Smart Contracts. USENIX Security Symposium 2023: 3367-3383- 2022
[i10]Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji:
An Automated Analyzer for Financial Security of Ethereum Smart Contracts. CoRR abs/2208.12960 (2022)- 2021
[j22]Keju Meng, Fuyou Miao, Yu Ning, Wenchao Huang, Yan Xiong, Chin-Chen Chang:
A proactive secret sharing scheme based on Chinese remainder theorem. Frontiers Comput. Sci. 15(2): 152801 (2021)
[j21]Zhaoyi Meng
, Yan Xiong
, Wenchao Huang
, Fuyou Miao
, Jianmeng Huang
:
AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs. IEEE Trans. Inf. Forensics Secur. 16: 1912-1927 (2021)
[c43]Yuting Feng, Feng Xiong, Wenchao Huang, Yan Xiong:
Security Analysis of Session Initiation Protocol Digest Access Authentication Scheme. BigCom 2021: 129-135
[c42]Mingzhe Hu
, Yu Zhang, Wenchao Huang, Yan Xiong:
Static Type Inference for Foreign Functions of Python. ISSRE 2021: 423-433- 2020
[j20]Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, Yan Xiong:
A Formal Framework of Shielding Systems by Stepwise Refinement. Int. J. Netw. Secur. 22(1): 54-67 (2020)
[j19]Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications. Int. J. Netw. Secur. 22(3): 383-393 (2020)
[j18]Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:
Static Analysis of Superfluous Network Transmissions in Android Applications. Int. J. Netw. Secur. 22(3): 411-420 (2020)
[j17]Keju Meng, Fuyou Miao, Wenchao Huang, Yan Xiong:
Threshold changeable secret sharing with secure secret reconstruction. Inf. Process. Lett. 157: 105928 (2020)
[j16]Zeng Li, Wenchao Huang, Yan Xiong, Siqi Ren, Tuanfei Zhu:
Incremental learning imbalanced data streams with concept drift: The dynamic updated ensemble algorithm. Knowl. Based Syst. 195: 105694 (2020)
[j15]Changbin Lu, Fuyou Miao, Junpeng Hou, Wenchao Huang, Yan Xiong:
A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security. Quantum Inf. Process. 19(1): 24 (2020)
[j14]Huihua Xia, Yan Xiong, Wenchao Huang
, Zhaoyi Meng, Fuyou Miao
:
Limiting Privacy Breaches in Average-Distance Query. Secur. Commun. Networks 2020: 8895281:1-8895281:24 (2020)
[j13]Jianmeng Huang
, Yan Xiong
, Wenchao Huang
, Chen Xu, Fuyou Miao:
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications. IEEE Syst. J. 14(1): 375-386 (2020)
[c41]Zihan Zhou, Yan Xiong, Wenchao Huang, Lu Ma:
SPrune: A Code Pruning Tool for Ethereum Solidity Contract Static Analysis. BigCom 2020: 66-70
[c40]Guangshuai Mo, Yan Xiong, Wenchao Huang, Lu Ma:
Automated Theorem Proving via Interacting with Proof Assistants by Dynamic Strategies. BigCom 2020: 71-75
[c39]Cijian Song, Yan Xiong, Wenchao Huang, Lu Ma:
Joint Self-Attention and Multi-Embeddings for Chinese Named Entity Recognition. BigCom 2020: 76-80
[c38]Chuanhu Cheng, Yan Xiong, Wenchao Huang, Lu Ma:
Context-aware Generation of Proof Scripts for Theorem Proving. BigCom 2020: 81-85
[c37]Shangwu Dong, Yan Xiong, Wenchao Huang, Lu Ma:
KIMS: Kernel Integrity Measuring System based on TrustZone. BigCom 2020: 103-107
[c36]Chen Xu, Yan Xiong, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Cheng Su, Guangshuai Mo:
Identifying compatibility-related APIs by exploring biased distribution in Android apps. ICSE (Companion Volume) 2020: 280-281
[c35]Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang:
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies. USENIX Security Symposium 2020: 253-270
2010 – 2019
- 2019
[j12]Keju Meng, Fuyou Miao, Wenchao Huang, Yan Xiong:
Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem. Discret. Appl. Math. 268: 152-163 (2019)
[j11]Zhaoyi Meng
, Yan Xiong, Wenchao Huang, Lei Qin, Xin Jin, Hongbing Yan:
AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications. Neurocomputing 341: 10-25 (2019)
[j10]Taeho Jung
, Xiang-Yang Li
, Wenchao Huang
, Zhongying Qiao
, Jianwei Qian
, Linlin Chen, Junze Han
, Jiahui Hou
:
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers. IEEE Trans. Inf. Forensics Secur. 14(1): 223-234 (2019)
[j9]Xuangou Wu
, Zhaobin Chu, Panlong Yang, Chaocan Xiang
, Xiao Zheng, Wenchao Huang
:
TW-See: Human Activity Recognition Through the Wall With Commodity Wi-Fi Devices. IEEE Trans. Veh. Technol. 68(1): 306-319 (2019)
[c34]Chen Xu, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
An Observational Study on Compatibility-Related API Usage. BigCom 2019: 64-68
[c33]Xiaoyu Li, Cheng Su, Yan Xiong, Wenchao Huang, Wansen Wang:
Formal Verification of BNB Smart Contract. BigCom 2019: 74-78
[c32]Zeng Li, Yan Xiong, Wenchao Huang:
Drift-detection Based Incremental Ensemble for Reacting to Different Kinds of Concept Drift. BigCom 2019: 107-114
[c31]Xianglin Bao, Cheng Su, Yan Xiong, Wenchao Huang, Yifei Hu:
FLChain: A Blockchain for Auditable Federated Learning with Trust and Incentive. BigCom 2019: 151-159
[c30]Huihua Xia, Wenchao Huang, Yan Xiong:
Differentially Private Geo-Social Ranking. BigCom 2019: 250-254
[c29]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs. ICSE (Companion Volume) 2019: 230-231
[i9]Fuyou Miao, Keju Meng, Yue Yu, Wenchao Huang, Yan Xiong, Xingfu Wang:
Tightly Coupled Secret Sharing and Its Application to Group Authentication. CoRR abs/1908.02110 (2019)- 2018
[j8]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Panlong Yang, Yanan Zhang, XuFei Mao:
Lightitude: Indoor Positioning Using Uneven Light Intensity Distribution. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(2): 67:1-67:25 (2018)
[c28]Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang:
Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem. ASIACRYPT (3) 2018: 310-331
[c27]Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:
Detecting Stubborn Permission Requests in Android Applications. BigCom 2018: 84-89
[c26]Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:
Identifying Superfluous Network Transmissions in Android Applications. BigCom 2018: 96-101
[c25]Hongbing Yan, Yan Xiong, Wenchao Huang, Jianmeng Huang, Zhaoyi Meng:
Automatically Detecting Malicious Sensitive Data Usage in Android Applications. BigCom 2018: 102-107
[c24]Lei Qin, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation. BigCom 2018: 108-113
[c23]Jiabin Zhu, Yan Xiong, Wenchao Huang:
A Formal Framework for State Continuity of Protected Modules. BigCom 2018: 114-119
[c22]Yifei Hu, Yan Xiong, Wenchao Huang, Xianglin Bao:
KeyChain: Blockchain-Based Key Distribution. BigCom 2018: 126-131
[c21]Jiabin Zhu, Wenchao Huang, Yan Xiong:
Formally Verifying Memory Isolation Based on ARM Processors. BigCom 2018: 195-200
[c20]Shuangshuang Xue, Lan Zhang, Anran Li, Xiang-Yang Li, Chaoyi Ruan, Wenchao Huang:
AppDNA: App Behavior Profiling via Graph-based Deep Learning. INFOCOM 2018: 1475-1483
[i8]Yan Xiong, Cheng Su, Wenchao Huang:
Verifying Security Protocols using Dynamic Strategies. CoRR abs/1807.00669 (2018)
[i7]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs. CoRR abs/1809.07036 (2018)
[i6]Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang:
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem. IACR Cryptol. ePrint Arch. 2018: 837 (2018)- 2017
[j7]Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang:
A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems. Int. J. Netw. Secur. 19(5): 794-803 (2017)
[j6]Wenchao Huang, Xiang-Yang Li, Yan Xiong
, Panlong Yang, Yiqing Hu, XuFei Mao, Fuyou Miao, Baohua Zhao, Jumin Zhao:
Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers. IEEE J. Sel. Areas Commun. 35(5): 1104-1117 (2017)
[c19]Xin Jin, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
Mining Anomalous Usage of Sensitive Data through Anomaly Detection. BigCom 2017: 59-67
[c18]Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang, Cheng Su:
A Verified Secure Protocol Model of OAuth Dynamic Client Registration. BigCom 2017: 106-110
[c17]Taeho Jung, Xiang-Yang Li, Wenchao Huang, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou, Cheng Su:
AccountTrade: Accountable protocols for big data trading against dishonest consumers. INFOCOM 2017: 1-9- 2016
[j5]Xiaopu Wang, Yan Xiong, Wenchao Huang:
An Accurate Direction Finding Scheme Using Virtual Antenna Array via Smartphones. Sensors 16(11): 1811 (2016)
[c16]Xiaopu Wang, Yan Xiong, Wenchao Huang:
Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones. BigCom 2016: 111-122
[c15]Wenchao Huang, Xiang-Yang Li, Yan Xiong, Panlong Yang, Yiqing Hu, XuFei Mao, Fuyou Miao, Baohua Zhao, Ju-Min Zhao:
WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals. UbiComp 2016: 439-450
[c14]Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang:
Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus. Trustcom/BigDataSE/ISPA 2016: 42-49- 2015
[j4]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu, Xingfu Wang:
Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones. IEEE Trans. Mob. Comput. 14(10): 2145-2157 (2015)
[c13]Xiaopu Wang, Yan Xiong, Wenchao Huang:
Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones. BigCom 2015: 126-140
[c12]Xudong Gong, Yan Xiong, Wenchao Huang, Lei Chen
, Qiwei Lu, Yiqing Hu:
Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation. DASFAA (1) 2015: 108-124
[c11]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Yanan Zhang, XuFei Mao, Panlong Yang, Caimei Wang:
Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices. ICDCS 2015: 732-733
[c10]Yuyang Ke, Yan Xiong, Yiqing Hu, Xudong Gong, Wenchao Huang:
Magemite: Character inputting system based on magnetic sensor. WOWMOM 2015: 1-3
[i5]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Yanan Zhang, XuFei Mao, Panlong Yang, Caimei Wang:
Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices. CoRR abs/1505.05977 (2015)
[i4]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Yiqing Hu, XuFei Mao, Panlong Yang:
WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker. CoRR abs/1508.05477 (2015)- 2014
[j3]Xuangou Wu, Yan Xiong, Panlong Yang, Shouhong Wan, Wenchao Huang:
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 13(10): 5867-5877 (2014)
[c9]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu:
Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones. INFOCOM 2014: 370-378
[c8]Lan Zhang, Xiang-Yang Li, Wenchao Huang, Kebin Liu, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, Yunhao Liu:
It starts with iGaze: visual attention driven networking with smart glasses. MobiCom 2014: 91-102
[c7]Lan Zhang, Xiang-Yang Li, Wenchao Huang, Kebin Liu, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, Yunhao Liu:
Demo: visual attention driven networking with smart glasses. MobiCom 2014: 329-332- 2013
[j2]Xuangou Wu, Yan Xiong, Wenchao Huang, Hong Shen, Mingxi Li:
An efficient compressive data gathering routing scheme for large-scale wireless sensor networks. Comput. Electr. Eng. 39(6): 1935-1946 (2013)
[j1]Wenchao Huang, Yan Xiong, Xingfu Wang, Fuyou Miao, Chengyi Wu, Xudong Gong, Qiwei Lu:
Fine-Grained Refinement on TPM-Based Protocol Applications. IEEE Trans. Inf. Forensics Secur. 8(6): 1013-1026 (2013)
[c6]Qingwen Liu, Yan Xiong, Wenchao Huang:
Integrating Social Information into Collaborative Filtering for Celebrities Recommendation. ACIIDS (2) 2013: 109-118
[c5]Yiqing Hu, Yan Xiong, Xudong Gong, Qiwei Lu, Mingxi Li, Wenchao Huang:
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism. TrustCom/ISPA/IUCC 2013: 1729-1734
[i3]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu:
Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones. CoRR abs/1306.1651 (2013)
[i2]Qiwei Lu, Wenchao Huang, Xudong Gong, Xingfu Wang, Yan Xiong, Fuyou Miao:
A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET. CoRR abs/1307.2977 (2013)
[i1]Qiwei Lu, Wenchao Huang, Yan Xiong, Xudong Gong:
Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining. CoRR abs/1307.2991 (2013)- 2012
[c4]Shichen Liu, Yan Xiong, Qiwei Lu, Wenchao Huang:
Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization. IJCCI 2012: 133-143
[c3]Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang:
Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing. TrustCom 2012: 100-108
[c2]Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao:
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET. TrustCom 2012: 656-665
2000 – 2009
- 2009
[c1]Wenchao Huang, Yan Xiong, Depin Chen:
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. CSE (2) 2009: 809-816
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-08 01:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







