default search action
Kevin W. Hamlen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c78]Md Shihabul Islam, Mahmoud Zamani, Kevin W. Hamlen, Latifur Khan, Murat Kantarcioglu:
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing. DBSec 2024: 71-91 - [c77]Saquib Irtiza, Xiaodi Li, Mahmoud Zamani, Latifur Khan, Kevin W. Hamlen:
VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning. DBSec 2024: 221-240 - 2023
- [j18]Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:
Con2Mix: A semi-supervised method for imbalanced tabular security data. J. Comput. Secur. 31(6): 705-726 (2023) - [c76]Md Shihabul Islam, Mahmoud Zamani, Chung Hwan Kim, Latifur Khan, Kevin W. Hamlen:
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone. CODASPY 2023: 153-164 - [c75]Basel Abdeen, Ehab Al-Shaer, Anoop Singhal, Latifur Khan, Kevin W. Hamlen:
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity. DBSec 2023: 243-260 - [c74]Sadaf Md. Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen, Youki Kadobayashi:
Securing Smart Vehicles Through Federated Learning. FPS (1) 2023: 18-35 - [c73]Mahmoud Zamani, Saquib Irtiza, Latifur Khan, Kevin W. Hamlen:
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes. FPS (1) 2023: 191-207 - [c72]Mahmoud Zamani, Saquib Irtiza, Shamila Wickramasuriya, Latifur Khan, Kevin W. Hamlen:
Cross Domain Vulnerability Detection using Graph Contrastive Learning. Tiny Papers @ ICLR 2023 - [c71]Erick Bauman, Jun Duan, Kevin W. Hamlen, Zhiqiang Lin:
Renewable Just-In-Time Control-Flow Integrity. RAID 2023: 580-594 - 2022
- [c70]Sadaf Md. Halim, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Md Delwar Hossain:
A Federated Approach for Learning from Electronic Health Records. BigDataSecurity/HPSC/IDS 2022: 218-223 - [c69]Saquib Irtiza, Latifur Khan, Kevin W. Hamlen:
SentMod: Hidden Backdoor Attack on Unstructured Textual Data. BigDataSecurity/HPSC/IDS 2022: 224-231 - [c68]Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data. DBSec 2022: 48-67 - [c67]Yibo Hu, Yu Lin, Erick Skorupa Parolin, Latifur Khan, Kevin W. Hamlen:
Controllable Fake Document Infilling for Cyber Deception. EMNLP (Findings) 2022: 6505-6519 - [c66]Zhuoyi Wang, Yibo Hu, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
CAPT: Contrastive Pre-Training based Semi-Supervised Open-Set Learning. MIPR 2022: 7-13 - [i1]Yibo Hu, Yu Lin, Erick Skorupa Parolin, Latifur Khan, Kevin W. Hamlen:
Controllable Fake Document Infilling for Cyber Deception. CoRR abs/2210.09917 (2022) - 2021
- [j17]Fadi Yilmaz, Meera Sridhar, Abhinav Mohanty, Vasant Tendulkar, Kevin W. Hamlen:
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities. Comput. Secur. 105: 102246 (2021) - [j16]Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan:
Crook-sourced intrusion detection as a service. J. Inf. Secur. Appl. 61: 102880 (2021) - [j15]Khaled Al-Naami, Amir El-Ghamry, Md Shihabul Islam, Latifur Khan, Bhavani Thuraisingham, Kevin W. Hamlen, Mohammed F. Alrahmawy, Magdi Zakria Rashad:
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks. IEEE Trans. Dependable Secur. Comput. 18(2): 505-517 (2021) - [c65]Frederico Araujo, Sailik Sengupta, Jiyong Jang, Adam Doupé, Kevin W. Hamlen, Subbarao Kambhampati:
Software Deception Steering through Version Emulation. HICSS 2021: 1-10 - 2020
- [c64]Zhuoyi Wang, Yigong Wang, Bo Dong, Pracheta Sahoo, Kevin W. Hamlen, Latifur Khan:
Adaptive Margin Based Deep Adversarial Metric Learning. BigDataSecurity/HPSC/IDS 2020: 100-108 - [c63]Kevin W. Hamlen, Long Lu:
FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation. CCS 2020: 2149-2150 - [c62]Gbadebo Ayoade, Frederico Araujo, Khaled Al-Naami, Ahmad M. Mustafa, Yang Gao, Kevin W. Hamlen, Latifur Khan:
Automating Cyberdeception Evaluation with Deep Learning. HICSS 2020: 1-10 - [c61]Xiaoyu He, Erick Bauman, Feng Li, Lei Yu, Linyu Li, Bingchang Liu, Aihua Piao, Kevin W. Hamlen, Wei Huo, Wei Zou:
Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing. LCTES 2020: 74-84 - [e2]Kevin W. Hamlen, Long Lu:
Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, FEAST2020, Virtual Event, USA, 13 November 2020. ACM 2020, ISBN 978-1-4503-8089-8 [contents]
2010 – 2019
- 2019
- [b2]Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang:
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings. Springer 2019, ISBN 978-3-030-02109-2 - [c60]Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan:
Improving intrusion detectors by crook-sourcing. ACSAC 2019: 245-256 - [c59]Gbadebo Ayoade, Erick Bauman, Latifur Khan, Kevin W. Hamlen:
Smart Contract Defense through Bytecode Rewriting. Blockchain 2019: 384-389 - [c58]Masoud Ghaffarinia, Kevin W. Hamlen:
Binary Control-Flow Trimming. CCS 2019: 1009-1022 - [c57]Benjamin Ferrell, Jun Duan, Kevin W. Hamlen:
CUDA au Coq: A Framework for Machine-validating GPU Assembly Programs. DATE 2019: 474-479 - [c56]Kevin W. Hamlen, Dakota Fisher, Gilmore R. Lundquist:
Source-free Machine-checked Validation of Native Code in Coq. FEAST@CCS 2019: 25-30 - [c55]Jun Duan, Kevin W. Hamlen, Benjamin Ferrell:
Better Late Than Never: An n-Variant Framework of Verification for Java Source Code on CPU x GPU Hybrid Platform. HPDC 2019: 207-218 - [c54]Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin:
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. USENIX Security Symposium 2019: 1805-1821 - 2018
- [c53]Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin W. Hamlen:
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. AsiaCCS 2018: 393-398 - [c52]Gbadebo Ayoade, Swarup Chandra, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
Automated Threat Report Classification over Multi-Source Data. CIC 2018: 236-245 - [c51]Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, Shuang Hao:
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks. ESORICS (2) 2018: 122-142 - [c50]Xiaoyang Xu, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin:
Towards Interface-Driven COTS Binary Hardening. FEAST@CCS 2018: 20-26 - [c49]Gbadebo Ayoade, Vishal Karande, Latifur Khan, Kevin W. Hamlen:
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment. IRI 2018: 15-22 - [c48]Erick Bauman, Zhiqiang Lin, Kevin W. Hamlen:
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. NDSS 2018 - [c47]Bahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisinski:
HoneyV: A virtualized honeynet system based on network softwarization. NOMS 2018: 1-5 - [c46]Meera Sridhar, Abhinav Mohanty, Fadi Yilmaz, Vasant Tendulkar, Kevin W. Hamlen:
Inscription: Thwarting ActionScript Web Attacks From Within. TrustCom/BigDataSE 2018: 504-515 - [e1]Francesco Calimeri, Kevin W. Hamlen, Nicola Leone:
Practical Aspects of Declarative Languages - 20th International Symposium, PADL 2018, Los Angeles, CA, USA, January 8-9, 2018, Proceedings. Lecture Notes in Computer Science 10702, Springer 2018, ISBN 978-3-319-73304-3 [contents] - 2017
- [c45]Ahmad M. Mustafa, Gbadebo Ayoade, Khaled Al-Naami, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Frederico Araujo:
Unsupervised deep embedding for novel class detection over data stream. IEEE BigData 2017: 1830-1839 - [c44]Wenhao Wang, Xiaoyang Xu, Kevin W. Hamlen:
Object Flow Integrity. CCS 2017: 1909-1924 - [c43]Ahsanul Haque, Zhuoyi Wang, Swarup Chandra, Bo Dong, Latifur Khan, Kevin W. Hamlen:
FUSION: An Online Method for Multistream Classification. CIKM 2017: 919-928 - [c42]Ahsanul Haque, Swarup Chandra, Latifur Khan, Kevin W. Hamlen, Charu C. Aggarwal:
Efficient Multistream Classification Using Direct Density Ratio Estimation. ICDE 2017: 155-158 - [c41]Jun Duan, Kang Zhang, Kevin W. Hamlen:
VisualVital: An observation model for multiple sections of scenes. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - 2016
- [c40]Khaled Al-Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham:
Adaptive encrypted traffic fingerprinting with bi-directional dependence. ACSAC 2016: 177-188 - [c39]Bhavani Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, Elisa Bertino:
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. IRI 2016: 1-10 - [c38]Gilmore R. Lundquist, Vishwath Mohan, Kevin W. Hamlen:
Searching for software diversity: attaining artificial diversity through program synthesis. NSPW 2016: 80-91 - [p1]Frederico Araujo, Kevin W. Hamlen:
Embedded Honeypotting. Cyber Deception 2016: 203-233 - 2015
- [j14]Phu H. Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan:
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content. IEEE Trans. Dependable Secur. Comput. 12(4): 443-457 (2015) - [c37]Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kevin W. Hamlen, Michael Franz:
Opaque Control-Flow Integrity. NDSS 2015 - [c36]Frederico Araujo, Kevin W. Hamlen:
Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception. USENIX Security Symposium 2015: 145-159 - 2014
- [j13]Safwan Mahmud Khan, Kevin W. Hamlen:
Penny: Secure, Decentralized Data Management. Int. J. Netw. Secur. 16(5): 340-354 (2014) - [j12]Meera Sridhar, Richard Wartell, Kevin W. Hamlen:
Hippocratic binary instrumentation: First do no harm. Sci. Comput. Program. 93: 110-124 (2014) - [c35]Huseyin Ulusoy, Murat Kantarcioglu, Erman Pattuk, Kevin W. Hamlen:
Vigiles: Fine-Grained Access Control for MapReduce Systems. BigData Congress 2014: 40-47 - [c34]Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser:
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation. CCS 2014: 942-953 - [c33]Safwan Mahmud Khan, Kevin W. Hamlen, Murat Kantarcioglu:
Silver Lining: Enforcing Secure Information Flow at the Cloud Edge. IC2E 2014: 37-46 - [c32]Richard Wartell, Yan Zhou, Kevin W. Hamlen, Murat Kantarcioglu:
Shingled Graph Disassembly: Finding the Undecideable Path. PAKDD (1) 2014: 273-285 - 2013
- [j11]Kevin W. Hamlen, Bhavani Thuraisingham:
Data security services, solutions and standards for outsourcing. Comput. Stand. Interfaces 35(1): 1-5 (2013) - [j10]Pallabi Parveen, Nathan McDaniel, Zackary R. Weger, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Evolving Insider Threat Detection Stream Mining Perspective. Int. J. Artif. Intell. Tools 22(5) (2013) - [c31]Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen:
Subverting system authentication with context-aware, reactive virtual machine introspection. ACSAC 2013: 229-238 - [c30]Safwan Mahmud Khan, Kevin W. Hamlen:
Computation Certification as a Service in the Cloud. CCGRID 2013: 434-441 - [c29]Kevin W. Hamlen:
Stealthy software: Next-generation cyber-attacks and defenses. ISI 2013: 109-112 - [c28]Daniel C. Krawczyk, James Bartlett, Murat Kantarcioglu, Kevin W. Hamlen, Bhavani Thuraisingham:
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches. ISI 2013: 364-367 - 2012
- [j9]Kevin W. Hamlen, Lalana Kagal, Murat Kantarcioglu:
Policy Enforcement Framework for Cloud Data Management. IEEE Data Eng. Bull. 35(4): 39-45 (2012) - [j8]Bhavani Thuraisingham, Tahseen Al-Khateeb, Latifur Khan, Mehedy Masud, Kevin W. Hamlen, Vaibhav Khadilkar, Satyen Abrol:
Design and Implementation of a Data Mining System for Malware Detection. J. Integr. Des. Process. Sci. 16(2): 33-49 (2012) - [j7]Kevin W. Hamlen, William Hamlen:
An economic perspective of message-dropping attacks in peer-to-peer overlays. Secur. Informatics 1(1): 6 (2012) - [c27]Safwan Mahmud Khan, Kevin W. Hamlen:
Hatman: Intra-cloud Trust Management for Hadoop. IEEE CLOUD 2012: 494-501 - [c26]Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin:
Securing untrusted code via compiler-agnostic binary rewriting. ACSAC 2012: 299-308 - [c25]Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin:
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. CCS 2012: 157-168 - [c24]Bhavani Thuraisingham, Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Mohammad Farhan Husain:
Cloud-Centric Assured Information Sharing. PAISI 2012: 1-26 - [c23]Kevin W. Hamlen, Micah Jones, Meera Sridhar:
Aspect-Oriented Runtime Monitor Certification. TACAS 2012: 126-140 - [c22]Safwan Mahmud Khan, Kevin W. Hamlen:
AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing. TrustCom 2012: 170-176 - [c21]Vishwath Mohan, Kevin W. Hamlen:
Frankenstein: Stitching Malware from Benign Binaries. WOOT 2012: 77-84 - 2011
- [j6]Kevin W. Hamlen, Bhavani Thuraisingham:
Secure Semantic Computing. Int. J. Semantic Comput. 5(2): 121-131 (2011) - [j5]Mohammad M. Masud, Clay Woolam, Jing Gao, Latifur Khan, Jiawei Han, Kevin W. Hamlen, Nikunj C. Oza:
Facing the reality of data stream classification: coping with scarcity of labeled data. Knowl. Inf. Syst. 33(1): 213-244 (2011) - [j4]Mohammad M. Masud, Tahseen Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Cloud-based malware detection for evolving data streams. ACM Trans. Manag. Inf. Syst. 2(3): 16:1-16:27 (2011) - [c20]Kevin W. Hamlen, Peng Liu, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu:
Identity management for cloud computing: developments and directions. CSIIRW 2011: 32 - [c19]Pallabi Parveen, Zackary R. Weger, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Supervised Learning for Insider Threat Detection Using Stream Mining. ICTAI 2011: 1032-1039 - [c18]Richard Wartell, Yan Zhou, Kevin W. Hamlen, Murat Kantarcioglu, Bhavani Thuraisingham:
Differentiating Code from Data in x86 Binaries. ECML/PKDD (3) 2011: 522-536 - [c17]Meera Sridhar, Kevin W. Hamlen:
Flexible in-lined reference monitor certification: challenges and future directions. PLPV 2011: 55-60 - [c16]Pallabi Parveen, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Insider Threat Detection Using Stream Mining and Graph Mining. SocialCom/PASSAT 2011: 1102-1110 - [c15]Micah Jones, Kevin W. Hamlen:
A Service-oriented Approach to Mobile Code Security. ANT/MobiWIS 2011: 531-538 - 2010
- [j3]Kevin W. Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham:
Security Issues for Cloud Computing. Int. J. Inf. Secur. Priv. 4(2): 36-48 (2010) - [c14]Micah Jones, Kevin W. Hamlen:
Disambiguating aspect-oriented security policies. AOSD 2010: 193-204 - [c13]Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham:
A Token-Based Access Control System for RDF Data in the Clouds. CloudCom 2010: 104-111 - [c12]Bhavani Thuraisingham, Kevin W. Hamlen:
Challenges and Future Directions of Software Technology: Secure Software Development. COMPSAC 2010: 17-20 - [c11]Aditi Patwardhan, Kevin W. Hamlen, Kendra M. L. Cooper:
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors. DMS 2010: 257-260 - [c10]Meera Sridhar, Kevin W. Hamlen:
ActionScript In-Lined Reference Monitoring in Prolog. PADL 2010: 149-151 - [c9]Bhavani Thuraisingham, Kevin W. Hamlen:
Secure Semantic Sensor Web and Pervasive Computing. SUTC/UMC 2010: 5-10 - [c8]Meera Sridhar, Kevin W. Hamlen:
Model-Checking In-Lined Reference Monitors. VMCAI 2010: 312-327
2000 – 2009
- 2009
- [j2]Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Exploiting an antivirus interface. Comput. Stand. Interfaces 31(6): 1182-1189 (2009) - [c7]Micah Jones, Kevin W. Hamlen:
Enforcing IRM security policies: Two case studies. ISI 2009: 214-216 - [c6]Brian W. DeVries, Gopal Gupta, Kevin W. Hamlen, Scott Moore, Meera Sridhar:
ActionScript bytecode verification with co-logic programming. PLAS 2009: 9-15 - 2008
- [c5]Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen:
Data Mining for Security Applications. EUC (2) 2008: 585-589 - [c4]Kevin W. Hamlen, Micah Jones:
Aspect-oriented in-lined reference monitors. PLAS 2008: 11-20 - 2007
- [c3]Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani Thuraisingham:
Centralized Security Labels in Decentralized P2P Networks. ACSAC 2007: 315-324 - [c2]Kevin W. Hamlen, Bhavani Thuraisingham:
Secure peer-to-peer networks for trusted collaboration. CollaborateCom 2007: 58-63 - 2006
- [b1]Kevin W. Hamlen:
Security Policy Enforcement by Automated Program-rewriting. Cornell University, USA, 2006 - [j1]Kevin W. Hamlen, J. Gregory Morrisett, Fred B. Schneider:
Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1): 175-205 (2006) - [c1]Kevin W. Hamlen, Greg Morrisett, Fred B. Schneider:
Certified In-lined Reference Monitoring on .NET. PLAS 2006: 7-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint