


Остановите войну!
for scientists:


default search action
Hideya Ochiai
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Hideya Ochiai, Md. Delwar Hossain
, Pawissakan Chirupphapa, Youki Kadobayashi, Hiroshi Esaki:
Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning. IEEE Commun. Mag. 61(6): 43-49 (2023) - [c79]Xiaodi Li
, Md. Delwar Hossain
, Hideya Ochiai, Latifur Khan:
2MiCo: A Contrastive Semi-Supervised Method with Double Mixup for Smart Meter Modbus RS-485 Communication Security. BigDataSecurity/HPSC/IDS 2023: 30-39 - [c78]Eisuke Tomiyama
, Hiroshi Esaki
, Hideya Ochiai
:
Competitive and Asynchronous Decentralized Federated Learning with Blockchain Smart Contracts. GoodIT 2023: 92-99 - [c77]Md. Delwar Hossain
, Hideya Ochiai, Latifur Khan, Youki Kadobayashi:
Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach. ICCAE 2023: 559-564 - [c76]Ryusei Higuchi, Hideya Ochiai, Hiroshi Esaki:
Honeypot-Assisted Masquerade Detection with Character-Level Machine Learning. KST 2023: 1-6 - [c75]Eisuke Tomiyama, Hiroshi Esaki, Hideya Ochiai:
WAFL-GAN: Wireless Ad Hoc Federated Learning for Distributed Generative Adversarial Networks. KST 2023: 1-6 - [c74]Olufemi Abiodun Abraham, Hideya Ochiai, Md. Delwar Hossain
, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data. WFCS 2023: 1-8 - [c73]Hideya Ochiai, Md. Delwar Hossain
, Youki Kadobayashi, Hiroshi Esaki:
Attacker Localization with Machine Learning in RS-485 Industrial Control Networks. WFCS 2023: 1-8 - [i17]Yuwei Sun, Hideya Ochiai, Jun Sakuma:
Instance-level Trojan Attacks on Visual Question Answering via Adversarial Learning in Neuron Activation Space. CoRR abs/2304.00436 (2023) - [i16]Sevvandi Kandanaarachchi, Mahdi Abolghasemi, Hideya Ochiai, Asha Rao:
Detecting inner-LAN anomalies using hierarchical forecasting. CoRR abs/2304.13941 (2023) - 2022
- [j6]Yuwei Sun
, Hideya Ochiai
:
Homogeneous Learning: Self-Attention Decentralized Deep Learning. IEEE Access 10: 7695-7703 (2022) - [j5]Sevvandi Kandanaarachchi
, Hideya Ochiai
, Asha Rao
:
Honeyboost: Boosting honeypot performance with data fusion and anomaly detection. Expert Syst. Appl. 201: 117073 (2022) - [j4]Yuwei Sun
, Hideya Ochiai
, Hiroshi Esaki:
Decentralized Deep Learning for Multi-Access Edge Computing: A Survey on Communication Efficiency and Trustworthiness. IEEE Trans. Artif. Intell. 3(6): 963-972 (2022) - [c72]Olufemi Abiodun Abraham, Hideya Ochiai, Kabid Hassan Shibly, Md. Delwar Hossain
, Yuzo Taenaka, Youki Kadobayashi:
Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network. FNWF 2022: 688-693 - [c71]Yuwei Sun, Ng S. T. Chong, Hideya Ochiai:
Feature Distribution Matching for Federated Domain Generalization. ACML 2022: 942-957 - [c70]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks. CCNC 2022: 743-744 - [c69]Manabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki:
Misbehavior Detection Using Collective Perception under Privacy Considerations. CCNC 2022: 808-814 - [c68]Shugo Fujimura, Koki Fujita, Yuwei Sun, Hiroshi Esaki, Hideya Ochiai:
A Flexible Distributed Building Simulator for Federated Reinforcement Learning. COINS 2022: 1-6 - [c67]Koki Fujita, Shugo Fujimura, Yuwei Sun, Hiroshi Esaki, Hideya Ochiai:
Federated Reinforcement Learning for the Building Facilities. COINS 2022: 1-6 - [c66]Yuwei Sun
, Hideya Ochiai, Jun Sakuma:
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis. IJCNN 2022: 1-8 - [c65]Pawissakan Chirupphapa, Md. Delwar Hossain
, Hiroshi Esaki, Hideya Ochiai:
Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive Measurement. IPCCC 2022: 17-23 - [c64]Md. Delwar Hossain
, Hideya Ochiai, Tatsuya Arisawa, Youki Kadobayashi:
Smart Meter Modbus RS-485 Spoofing Attack Detection by LSTM Deep Learning Approach. SDS 2022: 47-52 - [c63]Yuwei Sun, Ng S. T. Chong, Hideya Ochiai:
Federated Phish Bowl: LSTM-Based Decentralized Phishing Email Detection. SMC 2022: 20-25 - [c62]Ryo Yoshikawa, Hideya Ochiai, Koji Yatani:
DualCheck: Exploiting Human Verification Tasks for Opportunistic Online Safety Microlearning. SOUPS @ USENIX Security Symposium 2022: 19-37 - [c61]Naoya Tezuka, Hideya Ochiai, Yuwei Sun, Hiroshi Esaki:
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks. TPS-ISA 2022: 168-177 - [c60]Qingzhe Jin, Hideya Ochiai:
Decentralized P2P Federated Learning on Ad-hoc Like Networks with Non-IID Dataset. WiMob 2022: 387-393 - [i15]Yuwei Sun, Hideya Ochiai, Jun Sakuma:
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis. CoRR abs/2203.11633 (2022) - [i14]Yuwei Sun, Ng S. T. Chong, Hideya Ochiai:
Multi-Source Domain Adaptation Based on Federated Knowledge Alignment. CoRR abs/2203.11635 (2022) - [i13]Norrathep Rattanavipanon, Donlapark Ponnoprat, Hideya Ochiai, Kuljaree Tantayakul, Touchai Angchuan, Sinchai Kamolphiwong:
Detecting Anomalous LAN Activities under Differential Privacy. CoRR abs/2204.06704 (2022) - [i12]Hideya Ochiai, Yuwei Sun, Qingzhe Jin, Nattanon Wongwiwatchai, Hiroshi Esaki:
Wireless Ad Hoc Federated Learning: A Fully Distributed Cooperative Machine Learning. CoRR abs/2205.11779 (2022) - [i11]Yuwei Sun, Hideya Ochiai:
UniCon: Unidirectional Split Learning with Contrastive Loss for Visual Question Answering. CoRR abs/2208.11435 (2022) - [i10]Naoya Tezuka, Hideya Ochiai, Yuwei Sun, Hiroshi Esaki:
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks. CoRR abs/2211.03489 (2022) - 2021
- [j3]Yuwei Sun
, Hiroshi Esaki, Hideya Ochiai:
Adaptive Intrusion Detection in the Networking of Large-Scale LANs With Segmented Federated Learning. IEEE Open J. Commun. Soc. 2: 102-112 (2021) - [c59]Yuyi Cai, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki:
MAC address randomization tolerant crowd monitoring system using Wi-Fi packets. AINTEC 2021: 27-33 - [c58]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Multi-Type Anomaly Detection Based on Raw Network Traffic. CCNC 2021: 1-2 - [c57]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Deep Learning-Based Anomaly Detection in LAN from Raw Network Traffic Measurement. CISS 2021: 1-5 - [c56]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Intrusion Measurement and Detection in LAN Using Protocol-Wise Associative Memory. ICAIIC 2021: 5-9 - [c55]Yuwei Sun, Ng S. T. Chong, Hideya Ochiai:
Network Flows-Based Malware Detection Using A Combined Approach of Crawling And Deep Learning. ICC 2021: 1-6 - [c54]Meatasit Karakate, Hiroshi Esaki, Hideya Ochiai:
SDNHive: A Proof-of-Concept SDN and Honeypot System for Defending Against Internal Threats. ICCNS 2021: 9-20 - [c53]Yuwei Sun, Ng S. T. Chong, Hideya Ochiai:
Information Stealing in Federated Learning Systems Based on Generative Adversarial Networks. SMC 2021: 2749-2754 - [c52]Mai Hirata, Manabu Tsukada, Keisuke Okumura, Yasumasa Tamura
, Hideya Ochiai, Xavier Défago
:
Roadside-Assisted Cooperative Planning using Future Path Sharing for Autonomous Driving. VTC Fall 2021: 1-7 - [i9]Sevvandi Kandanaarachchi
, Hideya Ochiai, Asha Rao:
Honeyboost: Boosting honeypot performance with data fusion and anomaly detection. CoRR abs/2105.02526 (2021) - [i8]Yuwei Sun, Ng S. T. Chong, Hideya Ochiai:
Information Stealing in Federated Learning Systems Based on Generative Adversarial Networks. CoRR abs/2108.00701 (2021) - [i7]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Decentralized Deep Learning for Mobile Edge Computing: A Survey on Communication Efficiency and Trustworthiness. CoRR abs/2108.03980 (2021) - [i6]Mai Hirata, Manabu Tsukada, Keisuke Okumura, Yasumasa Tamura, Hideya Ochiai, Xavier Défago:
Roadside-assisted Cooperative Planning using Future Path Sharing for Autonomous Driving. CoRR abs/2108.04629 (2021) - [i5]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks. CoRR abs/2108.09062 (2021) - [i4]Yuwei Sun, Hideya Ochiai:
Homogeneous Learning: Self-Attention Decentralized Deep Learning. CoRR abs/2110.05290 (2021) - [i3]Yuwei Sun, Ng S. T. Chong, Hideya Ochiai:
Privacy-Preserving Phishing Email Detection Based on Federated Learning and LSTM. CoRR abs/2110.06025 (2021) - [i2]Manabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki:
Misbehavior Detection Using Collective Perception under Privacy Considerations. CoRR abs/2111.03461 (2021) - [i1]Yuyi Cai, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki:
MAC address randomization tolerant crowd monitoring system using Wi-Fi packets. CoRR abs/2112.02161 (2021) - 2020
- [j2]Md. Delwar Hossain
, Hiroyuki Inoue
, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. IEEE Access 8: 185489-185502 (2020) - [c51]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Nor Azlina Ali, Zalizah Awang Long, Mohd Nizam Husen, Tawfik Al Hadhrami, Hideya Ochiai:
SMOTE-Based Framework for IoT Botnet Attack Detection. ACeS 2020: 287-296 - [c50]Md. Delwar Hossain
, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches. ICCCS 2020: 491-497 - [c49]Yuwei Sun
, Ng S. T. Chong, Hideya Ochiai:
Text-based Malicious Domain Names Detection Based on Variational Autoencoder And Supervised Learning. CISS 2020: 1-5 - [c48]Md. Delwar Hossain
, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus. COMPSAC 2020: 10-17 - [c47]Sheng Gong, Hideya Ochiai, Hiroshi Esaki:
Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle Attacks Against Wi-Fi. COMPSAC 2020: 1498-1503 - [c46]Md. Delwar Hossain
, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning. CSCloud/EdgeCom 2020: 62-69 - [c45]Md. Delwar Hossain
, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach. GLOBECOM 2020: 1-6 - [c44]Yuwei Sun, Russ Tedrake, Hideya Ochiai:
Trajectory Optimization for An Autonomous Vehicle Driving across Stochastic Traffic Flows based on Direct Collocation. ICCAD 2020: 1-6 - [c43]Yuwei Sun
, Hiroshi Esaki, Hideya Ochiai:
Blockchain-Based Federated Learning Against End-Point Adversarial Data Corruption. ICMLA 2020: 729-734 - [c42]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Intrusion Detection with Segmented Federated Learning for Large-Scale Multiple LANs. IJCNN 2020: 1-8 - [c41]Zhiqing Zhang, Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai:
XGBoosted Misuse Detection in LAN-Internal Traffic Dataset. ISI 2020: 1-6 - [c40]Rikuta Furuta, Hideya Ochiai, Hiroshi Esaki:
Mitigating Privacy Leak by Injecting Unique Noise into the Traffic of Smart Speakers. SMARTCOMP 2020: 452-457
2010 – 2019
- 2019
- [c39]Hyuga Kobayashi, Zhiqing Zhang, Hideya Ochiai, Hiroshi Esaki:
Probing Firewalls of Malware-Infected Networks with Honeypot. CFI 2019: 3:1-3:4 - [c38]Kai Matsufuji, Satoru Kobayashi, Hiroshi Esaki, Hideya Ochiai:
ARP Request Trend Fitting for Detecting Malicious Activity in LAN. IMCOM 2019: 89-96 - [c37]Supanat Limjitti, Hideya Ochiai, Hiroshi Esaki, Kunwadee Sripanidkulchai:
IoT-VuLock: Locking IoT Device Vulnerability with Enhanced Network Scans. IMCOM 2019: 225-233 - [c36]Porapat Ongkanchana, Hiroshi Esaki, Hideya Ochiai:
A Rule-Based Algorithm of Finding Valid Hosts for IoT Device Using Its Network Traffic. IMCOM 2019: 279-287 - [c35]Abdulaziz Aborujilah, Rasheed Mohammad Nassr
, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Nur Syahela, Hideya Ochiai:
Security Assessment Model to Analysis DOS Attacks in WSN. IRICT 2019: 789-800 - [c34]Zhiqing Zhang, Hiroshi Esaki, Hideya Ochiai:
Analysis of Malware Hidden Behind Firewalls with Back Scans. ISDFS 2019: 1-6 - [c33]Ei Ei Mon
, Hideya Ochiai, Chaiyachet Saivichit, Chaodit Aswakul
:
Recurrent and Non-recurrent Congestion Based Gridlock Detection on Chula-SSS Urban Road Network. SUMO 2019: 158-171 - [c32]Manabu Tsukada
, Masahiro Kitazawa, Takaharu Oi, Hideya Ochiai, Hiroshi Esaki:
Cooperative awareness using roadside unit networks in mixed traffic. VNC 2019: 1-8 - 2018
- [c31]Hideya Ochiai, Kurt Geihs
, Susumu Takeuchi:
Message from the BIOT 2018 Workshop Organizers. COMPSAC (2) 2018: 516 - [c30]Mohd. Saalim Jamal, Venkata Keerthy S
, Hideya Ochiai, Hiroshi Esaki, Kotaro Kataoka
:
INSTRUCT: A Clustering Based Identification of Valid Communications in IoT Networks. IoTSMS 2018: 228-233 - 2017
- [c29]Hideya Ochiai, Zhiqing Zhang, Hiroto Kitamura, Hiroshi Esaki:
IR-XY-PV: Infrared Multihop Communication for XY-Coordinated PV Modules. AINTEC 2017: 1-7 - [c28]Zhiqing Zhang, Hideya Ochiai, Hiroshi Esaki:
An IoT Application-Layer Protocol Modem: A Case Study on Interfacing IEEE 1888 with AT Commands. CyberC 2017: 346-349 - [c27]Ajinkya Mulay, Hideya Ochiai, Hiroshi Esaki:
IoT WebSocket Connection Management Algorithm for Early Warning Earthquake Alert Applications. UCC (Companion") 2017: 189-194 - 2016
- [c26]Hideya Ochiai, Kurt Geihs
, Susumu Takeuchi, Jun Suzuki:
Message from the BIOT Workshop Organizers. COMPSAC Workshops 2016: 325 - [c25]Tomoya Kitazato, Manabu Tsukada
, Hideya Ochiai, Hiroshi Esaki:
Proxy cooperative awareness message: an infrastructure-assisted V2V messaging. ICMU 2016: 1-6 - [c24]Hideya Ochiai, Hiroyuki Ikegami:
PPLC-PV: A pulse power line communication for series-connected PV monitoring. SmartGridComm 2016: 338-344 - 2015
- [c23]Hideya Ochiai, Susumu Takeuchi, Kurt Geihs
, Ting-Yun Chi:
Message from the BIOT 2015 Workshop Organizers. COMPSAC Workshops 2015: 478 - [c22]Hiroyuki Ikegami, Manabu Tsukada
, Hideya Ochiai, Hideaki Nii, Hiroshi Esaki:
Electric current based power line communication for plug-load device auto identification. SmartGridComm 2015: 121-126 - [c21]Hoan Tran Quoc, Hideya Ochiai, Hiroshi Esaki:
Hidden topics modeling approach for review quality prediction and classification. SoCPaR 2015: 278-283 - 2014
- [c20]Hideya Ochiai, Hiroyuki Ikegami, Yuuichi Teranishi, Hiroshi Esaki:
Facility Information Management on HBase: Large-Scale Storage for Time-Series Data. COMPSAC Workshops 2014: 306-311 - [c19]Hideya Ochiai, Yuuichi Teranishi, Hiroshi Esaki:
InNetTC: in-network traffic control for full IP sensor-actuator networks. ICUIMC 2014: 3:1-3:7 - [c18]Hideya Ochiai, Hiroki Nakagami, Yuuichi Teranishi, Hiroshi Esaki:
Facility networking with IP over RS485: Packet control for master-slave cascaded networks. SmartGridComm 2014: 410-415 - [c17]Masato Yamanouchi, Hideya Ochiai, Y. K. Reddy, Hiroshi Esaki, Hideki Sunahara:
Case Study of Constructing Weather Monitoring System in Difficult Environment. UIC/ATC/ScalCom 2014: 692-696 - [c16]Manussanun Buranachokphaisan, Hideya Ochiai, Hiroshi Esaki:
Unidirectional Link-Aware DTN-based sensor network in building monitoring scenario. Wireless Days 2014: 1-4 - 2011
- [j1]Hideya Ochiai, Hiroshi Esaki:
CCDM: Ladder-Logic Programming for Wireless Sensors and Actuators with Central Controller-Based Device Management. IEICE Trans. Commun. 94-B(8): 2208-2215 (2011) - [c15]Hideya Ochiai, Kenji Matsuo, Satoshi Matsuura, Hiroshi Esaki:
A Case Study of UTMesh: Design and Impact of Real World Experiments with Wi-Fi and Bluetooth Devices. SAINT 2011: 433-438 - [c14]Hideya Ochiai, Masaya Nakayama, Hiroshi Esaki:
Hop-by-hop reliable, parallel message propagation for intermittently-connected mesh networks. WOWMOM 2011: 1-9 - 2010
- [c13]Hideya Ochiai, Kenichi Shimotada, Hiroshi Esaki:
DTIPN: delay tolerant IP networking for opportunistic network applications. MobiOpp 2010: 65-71 - [c12]Kaveevivitchai Sathita, Hideya Ochiai, Hiroshi Esaki:
Message Deletion and Mobility Patterns for Efficient Message Delivery in DTNs. PerCom Workshops 2010: 760-763
2000 – 2009
- 2009
- [c11]Hideya Ochiai, Hiroshi Esaki:
Message routing on potential-fields in forwarding-based DTNs. ICUIMC 2009: 185-193 - [c10]Hideya Ochiai, Kenichi Shimotada, Hiroshi Esaki:
IP over DTN: Large-delay asynchronous packet delivery in the internet. ICUMT 2009: 1-4 - [c9]Hideyuki Shimonishi, Hideya Ochiai, Nobuyuki Enomoto, Atsushi Iwata:
Building Hierarchical Switch Network Using OpenFlow. INCoS 2009: 391-394 - [c8]Akihiro Sugiyama, Hideya Ochiai, Hiroshi Esaki:
CCDM: Central Controller-Based Device Management Architecture and Method to Split Management Scripts. SAINT 2009: 185-188 - [c7]Kaveevivitchai Sathita, Hideya Ochiai, Hiroshi Esaki:
RainWatch Project: Location-Awared Realtime Detection and Notification of Rain on Internet-Based Sensor Network. SAINT 2009: 259-262 - [c6]Elyes Ben Hamida, Hideya Ochiai, Hiroshi Esaki, Pierre Borgnat
, Patrice Abry
, Eric Fleury:
Measurement Analysis of the Live E! Sensor Network: Spatial-Temporal Correlations and Data Aggregation. SAINT 2009: 263-266 - 2008
- [c5]Hideya Ochiai, Hiroshi Esaki:
Mobility entropy and message routing in community-structured delay tolerant networks. AINTEC 2008: 93-102 - [c4]Hideya Ochiai, Hiroshi Esaki:
Accuracy-Based Cache Consistency Management for Numerical Object Replication. SAINT 2008: 421-424 - 2007
- [c3]Satoshi Matsuura, Hiroki Ishizuka, Hideya Ochiai, Shinichi Doi, Shinichi Ishida, Masaya Nakayama, Hiroshi Esaki, Hideki Sunahara:
Live E! Project: Establishment of Infrastructure Sharing Environmental Information. SAINT Workshops 2007: 67 - [c2]Hideya Ochiai, Hiroshi Esaki:
Architecture of Scalable Embedded Device Management System with Configurable Plug-In Translator. SAINT Workshops 2007: 73 - [c1]Hideya Ochiai, Zhiyong Wang, Ryo Oguchi, Tetsuhiro Sugiyama, Yusuke Sakamoto, Shinichi Ishida, Hiroshi Esaki:
Application of Content-Based Network for Sensor Data Distribution System. SAINT Workshops 2007: 74
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-08 10:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint