default search action
Haifeng Qian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j79]Hai Liu, Chengju Li, Haifeng Qian:
Parameters of several families of binary duadic codes and their related codes. Des. Codes Cryptogr. 92(1): 1-12 (2024) - [j78]Chunyu Gan, Chengju Li, Haifeng Qian, Xueying Shi:
On Bose distance of a class of BCH codes with two types of designed distances. Des. Codes Cryptogr. 92(7): 2031-2053 (2024) - [j77]Haifeng Qian, Cheng Lin, Qiaohan Chu, Jie Chen:
Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control. Frontiers Comput. Sci. 18(3): 183816 (2024) - [j76]Jiayun Yan, Jie Chen, Chen Qian, Anmin Fu, Haifeng Qian:
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing. J. Syst. Archit. 153: 103190 (2024) - [j75]Ziqi Zhu, Junqing Gong, Yuyu Wang, Haifeng Qian:
Fine-grained polynomial functional encryption. Theor. Comput. Sci. 1012: 114730 (2024) - [j74]Minghao Yang, Junqing Gong, Haifeng Qian:
Improved unbounded inner-product functional encryption. Theor. Comput. Sci. 1014: 114756 (2024) - [j73]Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian:
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud. IEEE Trans. Inf. Forensics Secur. 19: 2732-2745 (2024) - [c97]Haifeng Qian, Sujan Kumar Gonugondla, Sungsoo Ha, Mingyue Shang, Sanjay Krishna Gouda, Ramesh Nallapati, Sudipta Sengupta, Xiaofei Ma, Anoop Deoras:
BASS: Batched Attention-optimized Speculative Sampling. ACL (Findings) 2024: 8214-8224 - [c96]Jiuheng Su, Zhili Chen, Haifeng Qian, Junqing Gong:
Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection. ESORICS (3) 2024: 383-402 - [c95]Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. EUROCRYPT (2) 2024: 373-402 - [c94]Ben Athiwaratkun, Sujan Kumar Gonugondla, Sanjay Krishna Gouda, Haifeng Qian, Hantian Ding, Qing Sun, Jun Wang, Jiacheng Guo, Liangfu Chen, Parminder Bhatia, Ramesh Nallapati, Sudipta Sengupta, Bing Xiang:
Bifurcated Attention for Single-Context Large-Batch Sampling. ICML 2024 - [c93]Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian:
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions. Public Key Cryptography (4) 2024: 105-126 - [c92]Chang Liu, Deli Qiao, Haifeng Qian:
Joint Beamforming Design for Secure Communications Over An IRS-Aided Untrusted Relay Network. WCNC 2024: 1-6 - [i25]Daniel Melcer, Nathan Fulton, Sanjay Krishna Gouda, Haifeng Qian:
Constrained Decoding for Code Language Models via Efficient Left and Right Quotienting of Context-Sensitive Grammars. CoRR abs/2402.17988 (2024) - [i24]Ben Athiwaratkun, Sujan Kumar Gonugondla, Sanjay Krishna Gouda, Haifeng Qian, Hantian Ding, Qing Sun, Jun Wang, Jiacheng Guo, Liangfu Chen, Parminder Bhatia, Ramesh Nallapati, Sudipta Sengupta, Bing Xiang:
Bifurcated Attention for Single-Context Large-Batch Sampling. CoRR abs/2403.08845 (2024) - [i23]Haifeng Qian, Sujan Kumar Gonugondla, Sungsoo Ha, Mingyue Shang, Sanjay Krishna Gouda, Ramesh Nallapati, Sudipta Sengupta, Xiaofei Ma, Anoop Deoras:
BASS: Batched Attention-optimized Speculative Sampling. CoRR abs/2404.15778 (2024) - [i22]Yuhao Zhang, Shiqi Wang, Haifeng Qian, Zijian Wang, Mingyue Shang, Linbo Liu, Sanjay Krishna Gouda, Baishakhi Ray, Murali Krishna Ramanathan, Xiaofei Ma, Anoop Deoras:
CodeFort: Robust Training for Code Generation Models. CoRR abs/2405.01567 (2024) - [i21]Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. IACR Cryptol. ePrint Arch. 2024: 327 (2024) - 2023
- [j72]Haiyong Bao, Zheng Xu, Haibo Hong, Qinglei Kong, Haifeng Qian:
NLSP: A novel lattice-based secure primitive for privacy-preserving smart grid communications. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j71]Zhe Jiang, Xiwen Wang, Kai Zhang, Junqing Gong, Jie Chen, Haifeng Qian:
Revocable identity-based matchmaking encryption in the standard model. IET Inf. Secur. 17(4): 567-581 (2023) - [j70]Linjian Hong, Kai Zhang, Junqing Gong, Haifeng Qian:
Blockchain-Based Fair Payment for ABE with Outsourced Decryption. Peer Peer Netw. Appl. 16(1): 312-327 (2023) - [j69]Fangfang Yu, Xiangqian Wu, Xi Shao, Haifeng Qian:
Characterization of the East - West Spatial Uniformity for GOES-16/17 ABI Bands Using the Moon. Remote. Sens. 15(7): 1881 (2023) - [j68]Jun Zhao, Minghao Yang, Junqing Gong, Kai Zhang, Haifeng Qian:
Bounded-collusion decentralized ABE with sublinear parameters. Theor. Comput. Sci. 960: 113897 (2023) - [j67]Yansong Chang, Kai Zhang, Junqing Gong, Haifeng Qian:
Privacy-Preserving Federated Learning via Functional Encryption, Revisited. IEEE Trans. Inf. Forensics Secur. 18: 1855-1869 (2023) - [j66]Shuying Dong, Chengju Li, Sihem Mesnager, Haifeng Qian:
Parameters of Squares of Primitive Narrow-Sense BCH Codes and Their Complements. IEEE Trans. Inf. Theory 69(8): 5017-5031 (2023) - [j65]Zhengyi Du, Xiongtao Pang, Haifeng Qian:
PartitionChain: A Scalable and Reliable Data Storage Strategy for Permissioned Blockchain. IEEE Trans. Knowl. Data Eng. 35(4): 4124-4136 (2023) - [j64]Chang Liu, Jiayu Zhou, Ying Gao, Deli Qiao, Haifeng Qian:
IRS-Aided Secure Communications Over an Untrusted AF Relay System. IEEE Trans. Wirel. Commun. 22(12): 8620-8633 (2023) - [c91]Shiqi Wang, Zheng Li, Haifeng Qian, Chenghao Yang, Zijian Wang, Mingyue Shang, Varun Kumar, Samson Tan, Baishakhi Ray, Parminder Bhatia, Ramesh Nallapati, Murali Krishna Ramanathan, Dan Roth, Bing Xiang:
ReCode: Robustness Evaluation of Code Generation Models. ACL (1) 2023: 13818-13843 - [c90]Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered ABE via Predicate Encodings. ASIACRYPT (5) 2023: 66-97 - [c89]Ben Athiwaratkun, Sanjay Krishna Gouda, Zijian Wang, Xiaopeng Li, Yuchen Tian, Ming Tan, Wasi Uddin Ahmad, Shiqi Wang, Qing Sun, Mingyue Shang, Sujan Kumar Gonugondla, Hantian Ding, Varun Kumar, Nathan Fulton, Arash Farahani, Siddhartha Jain, Robert Giaquinto, Haifeng Qian, Murali Krishna Ramanathan, Ramesh Nallapati:
Multi-lingual Evaluation of Code Generation Models. ICLR 2023 - [c88]Radu Marinescu, Haifeng Qian, Alexander G. Gray, Debarun Bhattacharjya, Francisco Barahona, Tian Gao, Ryan Riegel:
Approximate Inference in Logical Credal Networks. IJCAI 2023: 5694-5701 - [c87]Xiaokai Wei, Sujan Kumar Gonugondla, Shiqi Wang, Wasi Uddin Ahmad, Baishakhi Ray, Haifeng Qian, Xiaopeng Li, Varun Kumar, Zijian Wang, Yuchen Tian, Qing Sun, Ben Athiwaratkun, Mingyue Shang, Murali Krishna Ramanathan, Parminder Bhatia, Bing Xiang:
Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study. ESEC/SIGSOFT FSE 2023: 224-236 - [i20]Hai Liu, Chengju Li, Haifeng Qian:
Parameters of several families of binary duadic codes and their related codes. CoRR abs/2302.13461 (2023) - [i19]Xiaokai Wei, Sujan K. Gonugondla, Wasi Uddin Ahmad, Shiqi Wang, Baishakhi Ray, Haifeng Qian, Xiaopeng Li, Varun Kumar, Zijian Wang, Yuchen Tian, Qing Sun, Ben Athiwaratkun, Mingyue Shang, Murali Krishna Ramanathan, Parminder Bhatia, Bing Xiang:
Greener yet Powerful: Taming Large Code Generation Models with Quantization. CoRR abs/2303.05378 (2023) - [i18]Hao Yang, Jie Fu, Zhili Cheng, Haifeng Qian:
Enhancing SCF with Privacy-Preserving and Splitting-Enabled E-Bills on Blockchain. CoRR abs/2308.10020 (2023) - [i17]Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered ABE via Predicate Encodings. IACR Cryptol. ePrint Arch. 2023: 1383 (2023) - 2022
- [j63]Yanzhao Shen, Ting Wu, Gaoli Wang, Xinfeng Dong, Haifeng Qian:
Improved Collision Detection Of MD5 Using Sufficient Condition Combination. Comput. J. 65(10): 2720-2729 (2022) - [j62]Jiayu Zhou, Deli Qiao, Haifeng Qian:
Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks. EURASIP J. Wirel. Commun. Netw. 2022(1): 44 (2022) - [j61]Ming Zeng, Haifeng Qian, Jie Chen, Kai Zhang:
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage. IEEE Trans. Cloud Comput. 10(1): 426-438 (2022) - [j60]Piao Zeng, Deli Qiao, Haifeng Qian, Qingqing Wu:
Joint Beamforming Design for IRS Aided Multiuser MIMO With Imperfect CSI. IEEE Trans. Veh. Technol. 71(10): 10729-10743 (2022) - [c86]Yuchen Duan, Haifeng Qian:
Enhancing RUP security for the OCB mode. ICCCS 2022: 410-418 - [c85]Wenxuan Yin, Haifeng Qian:
MEW: Evading Ownership Detection Against Deep Learning Models. ICONIP (6) 2022: 127-136 - [c84]Radu Marinescu, Haifeng Qian, Alexander G. Gray, Debarun Bhattacharjya, Francisco Barahona, Tian Gao, Ryan Riegel, Pravinda Sahu:
Logical Credal Networks. NeurIPS 2022 - [c83]Wenxuan Yin, Haifeng Qian:
Verify Deep Learning Models Ownership via Preset Embedding. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1113-1118 - [c82]Ying Gao, Deli Qiao, Haifeng Qian:
IRS-Aided Secure Communications over an Untrusted AF Relay System. WCSP 2022: 1161-1166 - [i16]Ben Athiwaratkun, Sanjay Krishna Gouda, Zijian Wang, Xiaopeng Li, Yuchen Tian, Ming Tan, Wasi Uddin Ahmad, Shiqi Wang, Qing Sun, Mingyue Shang, Sujan Kumar Gonugondla, Hantian Ding, Varun Kumar, Nathan Fulton, Arash Farahani, Siddhartha Jain, Robert Giaquinto, Haifeng Qian, Murali Krishna Ramanathan, Ramesh Nallapati, Baishakhi Ray, Parminder Bhatia, Sudipta Sengupta, Dan Roth, Bing Xiang:
Multi-lingual Evaluation of Code Generation Models. CoRR abs/2210.14868 (2022) - [i15]Shiqi Wang, Zheng Li, Haifeng Qian, Chenghao Yang, Zijian Wang, Mingyue Shang, Varun Kumar, Samson Tan, Baishakhi Ray, Parminder Bhatia, Ramesh Nallapati, Murali Krishna Ramanathan, Dan Roth, Bing Xiang:
ReCode: Robustness Evaluation of Code Generation Models. CoRR abs/2212.10264 (2022) - 2021
- [j59]Junqing Gong, Haifeng Qian:
Simple and efficient FE for quadratic functions. Des. Codes Cryptogr. 89(8): 1757-1786 (2021) - [j58]Chunyu Gan, Chengju Li, Haifeng Qian:
Parameters of Hulls of Primitive BCH Codes of Length q3 - 1. IEEE Commun. Lett. 25(4): 1070-1073 (2021) - [j57]Luping Wang, Kai Zhang, Haifeng Qian, Jie Chen:
Group Signature with Verifier-Local Revocation Based on Coding Theory. Secur. Commun. Networks 2021: 3259767:1-3259767:12 (2021) - [j56]Shengfeng Xu, Xiangxue Li, Haifeng Qian, Kefei Chen:
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN. Theor. Comput. Sci. 885: 91-103 (2021) - [j55]Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian:
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models. IEEE Trans. Inf. Forensics Secur. 16: 3709-3723 (2021) - [j54]Chunyu Gan, Chengju Li, Sihem Mesnager, Haifeng Qian:
On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes. IEEE Trans. Inf. Theory 67(10): 6442-6455 (2021) - [c81]Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models. ACISP 2021: 550-568 - [c80]Jiayu Zhou, Deli Qiao, Haifeng Qian:
Imitating Full-Duplex Secure Communication with Buffer-Aided Half-Duplex Relays. ICC 2021: 1-6 - [c79]Kai Zhang, Zhe Jiang, Junqing Gong, Haifeng Qian:
Updatable All-But-One Dual Projective Hashing and Its Applications. ICICS (2) 2021: 358-374 - [c78]Jianfeng Ma, Xiangxue Li, Haifeng Qian:
LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW. TrustCom 2021: 1039-1048 - [i14]Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models. CoRR abs/2102.11502 (2021) - [i13]Haifeng Qian:
An Ensemble Approach Towards Adversarial Robustness. CoRR abs/2106.05996 (2021) - [i12]Haifeng Qian, Radu Marinescu, Alexander G. Gray, Debarun Bhattacharjya, Francisco Barahona, Tian Gao, Ryan Riegel, Pravinda Sahu:
Logical Credal Networks. CoRR abs/2109.12240 (2021) - 2020
- [j53]Xiaoxia Dong, Jie Chen, Kai Zhang, Haifeng Qian:
Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data. IEEE Access 8: 2247-2257 (2020) - [j52]Shiqiang Zhu, Gaoli Wang, Yu He, Haifeng Qian:
Integral Attacks on Some Lightweight Block Ciphers. KSII Trans. Internet Inf. Syst. 14(11): 4502-4521 (2020) - [j51]Banghua Yan, Junye Chen, Cheng-Zhi Zou, Khalil Ahmad, Haifeng Qian, Kevin Garrett, Tong Zhu, Dejiang Han, Joseph Green:
Calibration and Validation of Antenna and Brightness Temperatures from Metop-C Advanced Microwave Sounding Unit-A (AMSU-A). Remote. Sens. 12(18): 2978 (2020) - [j50]Luping Wang, Jie Chen, Kai Zhang, Haifeng Qian:
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting. Theor. Comput. Sci. 835: 82-96 (2020) - [c77]Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
PALOR: Poisoning Attacks Against Logistic Regression. ACISP 2020: 447-460 - [c76]Yajuan Wu, Deli Qiao, Haifeng Qian:
Efficient Bandwidth Allocation for URLLC in Frequency-Selective Fading Channels. GLOBECOM 2020: 1-6 - [c75]Chenlong Yang, Xiangxue Li, Jingjing Li, Haifeng Qian:
Linear Scalability from Sharding and PoS. ICA3PP (1) 2020: 548-562 - [c74]Piao Zeng, Deli Qiao, Haifeng Qian:
Beamforming Design for Intelligent Reflecting Surface Aided Multi-Antenna MU-MIMO Communications with Imperfect CSI. ICCC 2020: 12-17 - [c73]Haifeng Qian:
Neural Belief Reasoner. IJCAI 2020: 4275-4282 - [c72]Qi Wang, Ming Xu, Xiangxue Li, Haifeng Qian:
Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2020: 305-312 - [c71]Yuan Linghu, Ming Xu, Xiangxue Li, Haifeng Qian:
Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network. MSN 2020: 479-487 - [i11]Jiayu Zhou, Deli Qiao, Haifeng Qian:
Mimicking Full-Duplex Secure Communications for Buffer-Aided Multi-Relay Systems. CoRR abs/2005.07364 (2020) - [i10]Jiayu Zhou, Deli Qiao, Haifeng Qian:
Alternate Distributed Beamforming for Buffer-Aided Multi-Antenna Relay Systems. CoRR abs/2005.07699 (2020) - [i9]Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models. CoRR abs/2006.11928 (2020) - [i8]Ryan Riegel, Alexander G. Gray, Francois P. S. Luus, Naweed Khan, Ndivhuwo Makondo, Ismail Yunus Akhalwaya, Haifeng Qian, Ronald Fagin, Francisco Barahona, Udit Sharma, Shajith Ikbal, Hima Karanam, Sumit Neelam, Ankita Likhyani, Santosh K. Srivastava:
Logical Neural Networks. CoRR abs/2006.13155 (2020) - [i7]Piao Zeng, Deli Qiao, Haifeng Qian:
Joint Beamforming Design for IRS-Aided Communications with Channel Estimation Errors. CoRR abs/2007.06859 (2020) - [i6]Junqing Gong, Haifeng Qian:
Simple and Efficient FE for Quadratic Functions. IACR Cryptol. ePrint Arch. 2020: 1026 (2020)
2010 – 2019
- 2019
- [j49]Jun Chen, Deli Qiao, Haifeng Qian:
Outage Analysis of Relay-Assisted mmWave Cellular Systems Employing JSDM. IEEE Access 7: 60793-60805 (2019) - [j48]Bo Hong, Jie Chen, Kai Zhang, Haifeng Qian:
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall. IEEE Access 7: 159002-159012 (2019) - [j47]Ming Zeng, Kai Zhang, Haifeng Qian, Xiaofeng Chen, Jie Chen:
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications. Comput. J. 62(4): 563-578 (2019) - [j46]Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, Huaxiong Wang:
Efficient public key encryption with equality test in the standard model. Theor. Comput. Sci. 755: 65-80 (2019) - [j45]Ming Zeng, Jie Chen, Kai Zhang, Haifeng Qian:
Public key encryption with equality test via hash proof system. Theor. Comput. Sci. 795: 20-35 (2019) - [c70]Haifeng Qian, Mark N. Wegman:
L2-Nonexpansive Neural Networks. ICLR (Poster) 2019 - [c69]Tiancheng Jin, Qingshun Wang, Lihua Xu, Chunmei Pan, Liang Dou, Haifeng Qian, Liang He, Tao Xie:
FinExpert: domain-specific test generation for FinTech systems. ESEC/SIGSOFT FSE 2019: 853-862 - [i5]Haifeng Qian:
Neural Belief Reasoner. CoRR abs/1909.04719 (2019) - 2018
- [j44]Ming Zeng, Kai Zhang, Jie Chen, Haifeng Qian:
P3GQ: A practical privacy-preserving generic location-based services query scheme. Pervasive Mob. Comput. 51: 56-72 (2018) - [j43]Jing Wan, Deli Qiao, Hui-Ming Wang, Haifeng Qian:
Buffer-Aided Two-Hop Secure Communications With Power Control and Link Selection. IEEE Trans. Wirel. Commun. 17(11): 7635-7647 (2018) - [c68]Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian:
An Encrypted Database with Enforced Access Control and Blockchain Validation. Inscrypt 2018: 260-273 - [c67]Xi Shao, Xiangqian Wu, Changyong Cao, Sirish Uprety, Fangfang Yu, Haifeng Qian, Frank Padula, Aaron Pearlman, Taeyoung Choi, Brent Bartlett, Jason Casey:
Validation of GOES-16 ABI reflective solar band calibration through reanalysis and comparison with field campaign data. Earth Observing Systems 2018: 107640I - [c66]Fangfang Yu, Xi Shao, Xiangqian Wu, Haifeng Qian:
In-orbit response versus scan-angle (RVS) validation for the GOES-16 ABI solar reflective bands. Earth Observing Systems 2018: 107640E - [c65]Fangfang Yu, Xiangqian Wu, Haifeng Qian, John Van Naarden, Michael Ramirez, Dan Lindsey, Chad Gravelle, Mathew M. Gunshor, Timothy J. Schmit, Xi Shao, Zhipeng Wang, Hyelim Yoo, Bob Iacovazzi, Vladimir Kondratovich:
Validation of GOES-16 ABI infrared spatial response uniformity. Earth Observing Systems 2018: 107640F - [c64]Haifeng Qian, Xiangqian Wu, Fangfang Yu, Xi Shao, Robert Iacovazzi, Zhipeng Wang, Hyelim Yoo:
Detection and characterization of striping in GOES-16 ABI VNIR/IR bands. Earth Observing Systems 2018: 107641N - [c63]Zhipeng Wang, Xiangqian Wu, Haifeng Qian, Fangfang Yu, Robert Iacovazzi, Xi Shao, Vladimir Kondratovich, Hyelim Yoo:
Radiometric quality assessment of GOES-16 ABI L1b images. Earth Observing Systems 2018: 107641T - [c62]Jing Wan, Deli Qiao, Haifeng Qian:
Optimal Power Control and Link Selection Policy for Buffer-Aided Two-Hop Secure Communications. ICNC 2018: 269-274 - [c61]Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan:
CCA Secure Multi-recipient KEM from LPN. ICICS 2018: 513-529 - [c60]Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan:
Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. ICICS 2018: 756-766 - [i4]Haifeng Qian, Mark N. Wegman:
L2-Nonexpansive Neural Networks. CoRR abs/1802.07896 (2018) - 2017
- [j42]Minhui Xue, Limin Yang, Keith W. Ross, Haifeng Qian:
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study. Peer-to-Peer Netw. Appl. 10(2): 357-367 (2017) - [j41]Xiaochen Liu, Shupeng Sun, Xin Li, Haifeng Qian, Pingqiang Zhou:
Machine Learning for Noise Sensor Placement and Full-Chip Voltage Emergency Detection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(3): 421-434 (2017) - [j40]Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian:
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing. Wirel. Commun. Mob. Comput. 2017 (2017) - [c59]Jieqiong Hou, Haifeng Qian:
Collaboratively filtering malware infections: a tensor decomposition approach. ACM TUR-C 2017: 28:1-28:7 - [c58]Fangfang Yu, Xiangqian Wu, Xi Shao, Boryana Efremova, Hyelim Yoo, Haifeng Qian, Bob Iacovazzi:
Early radiometric calibration performances of GOES-16 advanced baseline imager. Earth Observing Systems 2017: 104020S - [c57]Jieqiong Hou, Minhui Xue, Haifeng Qian:
Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers. ISPA/IUCC 2017: 1130-1137 - [c56]Deli Qiao, Haifeng Qian, Geoffrey Ye Li:
Multi-resolution codebook design for two-stage precoding in FDD massive MIMO networks. SPAWC 2017: 1-5 - [c55]Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian:
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. WASA 2017: 210-219 - [c54]Jing Wan, Deli Qiao, Haifeng Qian:
Buffer-aided secure two-hop communications with adaptive link selection and on/off power control. WCSP 2017: 1-6 - 2016
- [j39]Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian:
Thwarting location privacy protection in location-based social discovery services. Secur. Commun. Networks 9(11): 1496-1508 (2016) - [j38]Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian:
New application of partitioning methodology: identity-based dual receiver encryption. Secur. Commun. Networks 9(18): 5789-5802 (2016) - [j37]Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming Dong:
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud. IEEE Trans. Inf. Forensics Secur. 11(11): 2572-2583 (2016) - [j36]Deli Qiao, Haifeng Qian, Geoffrey Ye Li:
Broadbeam for Massive MIMO Systems. IEEE Trans. Signal Process. 64(9): 2365-2374 (2016) - [c53]Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou:
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. ACISP (1) 2016: 293-309 - [c52]Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao:
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. AsiaCCS 2016: 269-279 - [c51]Deli Qiao, Haifeng Qian, Geoffrey Ye Li:
On the design of broadbeam for massive MIMO systems. ICNC 2016: 1-5 - [c50]Minhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian:
You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users. Internet Measurement Conference 2016: 25-31 - [c49]Hua Xiang, Lakshmi N. Reddy, Haifeng Qian, Ching Zhou, Yu-Shiang Lin, Fanchieh Yee, Andrew Sullivan, Pong-Fei Lu:
Gate movement for timing improvement on row based Dual-VDD designs. ISQED 2016: 423-429 - [i3]Haifeng Qian, Hui Wan, Mark N. Wegman, Luis A. Lastras, Ruchir Puri:
A Proximity Measure using Blink Model. CoRR abs/1612.07365 (2016) - 2015
- [j35]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Signcryption KEM/tag-KEM, revisited. Secur. Commun. Networks 8(17): 3067-3082 (2015) - [c48]Xiaochen Liu, Shupeng Sun, Pingqiang Zhou, Xin Li, Haifeng Qian:
A statistical methodology for noise sensor placement and full-chip voltage map generation. DAC 2015: 94:1-94:6 - [c47]Deli Qiao, Haifeng Qian, Geoffrey Ye Li:
Broadbeam design for massive MIMO systems with uniform rectangular array. GlobalSIP 2015: 878-882 - [c46]Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian:
I know where you are: Thwarting privacy protection in location-based social discovery services. INFOCOM Workshops 2015: 179-184 - [c45]Rongrong Wang, Minhui Xue, Kelvin Liu, Haifeng Qian:
Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks. WASA 2015: 561-570 - [i2]Deli Qiao, Haifeng Qian, Geoffrey Ye Li:
Broadbeam for Massive MIMO Systems. CoRR abs/1503.06882 (2015) - 2014
- [j34]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Kefei Chen:
PWG: Progressive Weight-Growth Algorithm for LDPC Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(2): 685-689 (2014) - [j33]Xiangxue Li, Haifeng Qian, Yuan Zhou:
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption. Inf. Sci. 276: 290-294 (2014) - [j32]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang:
Robust password changing and DoS resilience for human-centric password authentication. Secur. Commun. Networks 7(10): 1552-1559 (2014) - [j31]Haifeng Qian, Yuan Zhou, Zhibin Li, Zhijie Chen:
Generating signatures with optimal overhead: practical paddings for signature schemes. Secur. Commun. Networks 7(12): 2345-2355 (2014) - [c44]Yuan Liang, Wenjian Yu, Haifeng Qian:
A hybrid random walk algorithm for 3-D thermal analysis of integrated circuits. ASP-DAC 2014: 849-854 - [c43]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. CCS 2014: 1457-1459 - [c42]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. CCS 2014: 1460-1462 - [c41]Hua Xiang, Haifeng Qian, Ching Zhou, Yu-Shiang Lin, Fanchieh Yee, Andrew Sullivan, Pong-Fei Lu:
Row Based Dual-VDD Island Generation and Placement. DAC 2014: 125:1-125:6 - [c40]Ruchir Puri, Mihir R. Choudhury, Haifeng Qian, Matthew M. Ziegler:
Bridging high performance and low power in processor design. ISLPED 2014: 183-188 - [c39]Nancy Y. Zhou, Phillip J. Restle, Joseph N. Palumbo, Joseph N. Kozhaya, Haifeng Qian, Zhuo Li, Charles J. Alpert, Cliff C. N. Sze:
Pacman: driving nonuniform clock grid loads for low-skew robust clock network. SLIP 2014: 3:1-3:5 - 2013
- [j30]Xiangxue Li, Haifeng Qian, Jian Weng, Yu Yu:
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math. Comput. Model. 57(3-4): 503-511 (2013) - [j29]Wenjian Yu, Tao Zhang, Xiaolong Yuan, Haifeng Qian:
Fast 3-D Thermal Simulation for Integrated Circuits With Domain Decomposition Method. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(12): 2014-2018 (2013) - [c38]Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng:
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. ACNS 2013: 186-201 - [c37]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. ICICS 2013: 167-184 - 2012
- [j28]Xiangxue Li, Haifeng Qian, Yuan Zhou:
Pitfalls in identity based encryption using an elliptic curve combined public key. Appl. Math. Lett. 25(8): 1111-1113 (2012) - [j27]Haifeng Qian, Xiangxue Li, Xinli Huang:
Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model. Informatica 23(3): 443-460 (2012) - [j26]Yuan Zhou, Haifeng Qian:
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs. Secur. Commun. Networks 5(7): 764-775 (2012) - [j25]Haifeng Qian, Junqing Gong, Yuan Zhou:
Anonymous password-based key exchange with low resources consumption and better user-friendliness. Secur. Commun. Networks 5(12): 1379-1393 (2012) - [j24]Zongyang Zhang, Zhenfu Cao, Haifeng Qian:
Chosen-ciphertext attack secure public key encryption with auxiliary inputs. Secur. Commun. Networks 5(12): 1404-1411 (2012) - [j23]Haifeng Qian, Phillip J. Restle, Joseph N. Kozhaya, Clifford L. Gunion:
Subtractive Router for Tree-Driven-Grid Clocks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 31(6): 868-877 (2012) - [j22]Haifeng Qian, Sachin S. Sapatnekar, Eren Kursun:
Fast poisson solvers for thermal analysis. ACM Trans. Design Autom. Electr. Syst. 17(3): 32:1-32:23 (2012) - [c36]Yong Zhang, Xiangxue Li, Haifeng Qian:
An anonymous remote attestation for trusted cloud computing. CCIS 2012: 426-429 - [c35]Huapeng Zhou, Xin Li, Chen-Yong Cher, Eren Kursun, Haifeng Qian, Shi-Chune Yao:
An information-theoretic framework for optimal temperature sensor allocation and full-chip thermal monitoring. DAC 2012: 642-647 - [c34]Yu Yu, Xiangxue Li, Haifeng Qian:
Two-source extractors for leaky sources. ITW 2012: 452-456 - 2011
- [j21]Joshua Friedrich, Ruchir Puri, Uwe Brandt, Markus Bühler, Jack DiLullo, Jeremy Hopkins, Mozammel Hossain, Michael A. Kazda, Joachim Keinert, Zahi M. Kurzum, Douglass Lamb, Alice Lee, Frank Musante, Jens Noack, Peter J. Osler, Stephen D. Posluszny, Haifeng Qian, Shyam Ramji, Vasant B. Rao, Lakshmi N. Reddy, Haoxing Ren, Thomas E. Rosser, Benjamin R. Russell, Cliff C. N. Sze, Gustavo E. Téllez:
Design methodology for the IBM POWER7 microprocessor. IBM J. Res. Dev. 55(3): 9 (2011) - [c33]Yuan Zhou, Haifeng Qian:
Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model. ADHOC-NOW 2011: 164-176 - [c32]Haifeng Qian, Shouhuai Xu:
Non-interactive editable signatures for assured data provenance. CODASPY 2011: 145-156 - [c31]Xing Wang, Haifeng Qian:
A novel identity-based signature with message recovery from RSA. EMEIT 2011: 4827-4831 - [c30]Joseph N. Kozhaya, Phillip J. Restle, Haifeng Qian:
Myth busters: Microprocessor clocking is from Mars, ASICs clocking is from Venus. ICCAD 2011: 271-275 - [c29]Xiangqian Wu, Haifeng Qian, Fangfang Yu, Trevor Beck:
Vicarious calibration of GOES visible channel using GOME-2. IGARSS 2011: 1033-1035 - [c28]Yuan Zhou, Haifeng Qian, Xiangxue Li:
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. ISC 2011: 341-354 - 2010
- [j20]Haifeng Qian, Shouhuai Xu:
Non-interactive multisignatures in the plain public-key model with efficient verification. Inf. Process. Lett. 111(2): 82-89 (2010) - [c27]Junqing Gong, Haifeng Qian, Yuan Zhou:
Fully-Secure and Practical Sanitizable Signatures. Inscrypt 2010: 300-317 - [c26]Haifeng Qian, Sachin S. Sapatnekar:
Fast Poisson solvers for thermal analysis. ICCAD 2010: 698-702 - [c25]Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi S. Sandhu:
Trustworthy Information: Concepts and Mechanisms. WAIM 2010: 398-404
2000 – 2009
- 2009
- [j19]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Jianhua Li:
Toward optimizing cauchy matrix for cauchy reed-solomon code. IEEE Commun. Lett. 13(8): 603-605 (2009) - [j18]Zecheng Wang, Haifeng Qian, Zhibin Li:
Adaptively Secure Threshold Signature Scheme in the Standard Model. Informatica 20(4): 591-612 (2009) - [j17]Hushrav Mogal, Haifeng Qian, Sachin S. Sapatnekar, Kia Bazargan:
Fast and Accurate Statistical Criticality Computation Under Process Variations. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 28(3): 350-363 (2009) - [j16]Xiaolei Dong, Haifeng Qian, Zhenfu Cao:
Provably secure RSA-type signature based on conic curve. Wirel. Commun. Mob. Comput. 9(2): 217-225 (2009) - [c24]Jingran Wang, Haifeng Qian:
An Optimal Blind Signature Padding with Message Recovery. IAS 2009: 673-676 - [c23]Haifeng Qian, Yangzhou Chen, Zhenlong Li, Yuzhen Yang:
Research of Chang'an Street Coordinated Fuzzy Control Based on Traffic Flow Forecasting. CSIE (6) 2009: 39-42 - [c22]Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009: 323-327 - [c21]Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. MobiSec 2009: 58-70 - 2008
- [j15]Haifeng Qian, Yuan Zhou, Zhibin Li, Zecheng Wang, Bing Zhang:
Efficient public key encryption with smallest ciphertext expansion from factoring. Des. Codes Cryptogr. 49(1-3): 233-249 (2008) - [j14]Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian, Haiyong Bao:
Biased Bit Commitment and Applications. J. Inf. Sci. Eng. 24(2): 441-452 (2008) - [j13]Haifeng Qian, Sachin S. Sapatnekar:
Stochastic Preconditioning for Diagonally Dominant Matrices. SIAM J. Sci. Comput. 30(3): 1178-1204 (2008) - [c20]Zecheng Wang, Taozhi Si, Haifeng Qian, Zhibin Li:
A CDH-Based Multi-Signature Scheme with Tight Security Reduction. ICYCS 2008: 2096-2101 - 2007
- [j12]Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Simulatability and security of certificateless threshold signatures. Inf. Sci. 177(6): 1382-1394 (2007) - [j11]Zecheng Wang, Haifeng Qian, Zhibin Li:
Hybrid proxy multisignature: A new type multi-party signature. Inf. Sci. 177(24): 5638-5650 (2007) - [j10]Haifeng Qian, Emrah Acar:
Timing-Aware Power Minimization via Extended Timing Graph Methods. J. Low Power Electron. 3(3): 318-326 (2007) - [c19]Zhibin Li, Yinping Liu, Haifeng Qian:
A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations. ASCM 2007: 188-198 - [c18]Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang:
A Practical Optimal Padding for Signature Schemes. CT-RSA 2007: 112-128 - [c17]Hushrav Mogal, Haifeng Qian, Sachin S. Sapatnekar, Kia Bazargan:
Clustering based pruning for statistical criticality computation under process variations. ICCAD 2007: 340-343 - 2006
- [j9]Jeng-Liang Tsai, Charlie Chung-Ping Chen, Guoqiang Chen, Brent Goplen, Haifeng Qian, Yong Zhan, Sung-Mo Kang, Martin D. F. Wong, Sachin S. Sapatnekar:
Temperature-Aware Placement for SOCs. Proc. IEEE 94(8): 1502-1518 (2006) - [c16]Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian:
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. IMSCCS (2) 2006: 8-12 - [c15]Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo:
Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. IMSCCS (2) 2006: 113-116 - [i1]Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian:
A New Construction of Time Capsule Signature. IACR Cryptol. ePrint Arch. 2006: 113 (2006) - 2005
- [j8]Haifeng Qian, Zhenfu Cao, Haiyong Bao:
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms. Appl. Math. Comput. 166(3): 501-505 (2005) - [j7]Haifeng Qian, Zhenfu Cao, Haiyong Bao:
Security of Pon-Lu-Jeng's Meta-He digital signature schemes. Appl. Math. Comput. 170(1): 724-730 (2005) - [j6]Haifeng Qian, Zhenfu Cao, Qingshui Xue:
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. Informatica 16(2): 261-274 (2005) - [j5]Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar:
Early-stage power grid analysis for uncertain working modes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 24(5): 676-682 (2005) - [j4]Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar:
Power grid analysis using random walks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 24(8): 1204-1224 (2005) - [c14]Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue:
Efficient Non-interactive Deniable Authentication Protocols. CIT 2005: 673-679 - [c13]Haiyong Bao, Zhenfu Cao, Haifeng Qian:
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. CANS 2005: 26-34 - [c12]Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Certificateless Threshold Signature Schemes. CIS (2) 2005: 104-109 - [c11]Haifeng Qian, Sachin S. Sapatnekar:
A hybrid linear equation solver and its application in quadratic placement. ICCAD 2005: 905-909 - [c10]Haifeng Qian, Zhenfu Cao:
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. ISPA Workshops 2005: 323-331 - 2004
- [j3]Haifeng Qian, Zhenfu Cao, Qingshui Xue:
A new threshold proxy signature scheme from bilinear pairings. Sci. China Ser. F Inf. Sci. 47(5): 612-622 (2004) - [c9]Haifeng Qian, Sachin S. Sapatnekar:
Hierarchical random-walk algorithms for power grid analysis. ASP-DAC 2004: 499-504 - [c8]Haifeng Qian, Joseph N. Kozhaya, Sani R. Nassif, Sachin S. Sapatnekar:
A chip-level electrostatic discharge simulation strategy. ICCAD 2004: 315-318 - [c7]Haiyong Bao, Zhenfu Cao, Haifeng Qian:
Cryptanalysis of group signature scheme from ID-based signature scheme. InfoSecu 2004: 115-118 - [c6]Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar:
Early-stage power grid analysis for uncertain working modes. ISPD 2004: 132-137 - [c5]Hongliang Chang, Haifeng Qian, Sachin S. Sapatnekar:
The Certainty of Uncertainty: Randomness in Nanometer Design. PATMOS 2004: 36-47 - [c4]Qingshui Xue, Zhenfu Cao, Haifeng Qian:
A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. PDCAT 2004: 662-665 - 2003
- [c3]Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar:
Random walks in a supply network. DAC 2003: 93-98
1990 – 1999
- 1997
- [j2]Jie Wu, Haifeng Qian:
Multitriangle: A Constant Node Degree Interconnection Network. Int. J. Found. Comput. Sci. 8(2): 187-210 (1997) - 1996
- [j1]Haifeng Qian, Jie Wu:
Enhanced Fibonacci Cubes. Comput. J. 39(4): 331-345 (1996) - 1995
- [c2]Haifeng Qian, Jie Wu:
Unicast, Multicast, and Broadcast on Enhanced Fibonacci Cubes. ICCCN 1995: 158 - [c1]Haifeng Qian, Eduardo B. Fernández, Jie Wu:
A combined functional and object-oriented approach to software design. ICECCS 1995: 167-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint