default search action
Blase Ur
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Nathan Reitinger, Bruce Wen, Michelle L. Mazurek, Blase Ur:
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads. Proc. Priv. Enhancing Technol. 2024(3): 715-743 (2024) - [c73]Galen Harrison, Kevin Bryson, Ahmad Emmanuel Balla Bamba, Luca Dovichi, Aleksander Herrmann Binion, Arthur Borem, Blase Ur:
JupyterLab in Retrograde: Contextual Notifications That Highlight Fairness and Bias Issues for Data Scientists. CHI 2024: 475:1-475:19 - [c72]Weijia He, Kevin Bryson, Ricardo Calderon, Vijay Prakash, Nick Feamster, Danny Yuxing Huang, Blase Ur:
Can Allowlists Capture the Variability of Home IoT Device Network Behavior? EuroS&P 2024: 114-138 - [c71]Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur:
Data Subjects' Reactions to Exercising Their Right of Access. USENIX Security Symposium 2024 - [c70]Leona Lassak, Elleen Pan, Blase Ur, Maximilian Golla:
Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication. USENIX Security Symposium 2024 - 2023
- [c69]Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum:
Comprehension from Chaos: Towards Informed Consent for Private Computation. CCS 2023: 210-224 - [c68]Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur:
Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website's User Experience. USENIX Security Symposium 2023: 3619-3636 - [c67]Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, Blase Ur:
A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords. USENIX Security Symposium 2023: 5127-5144 - [c66]Nathan Reitinger, Bruce Wen, Michelle L. Mazurek, Blase Ur:
Analysis of Google Ads Settings Over Time: Updated, Individualized, Accurate, and Filtered. WPES@CCS 2023: 167-172 - 2022
- [j6]Lefan Zhang, Cyrus Zhou, Michael L. Littman, Blase Ur, Shan Lu:
Helping Users Debug Trigger-Action Programs. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(4): 196:1-196:32 (2022) - [c65]Jamar L. Sullivan Jr., William Brackenbury, Andrew McNut, Kevin Bryson, Kwam Byll, Yuxin Chen, Michael L. Littman, Chenhao Tan, Blase Ur:
Explaining Why: How Instructions and User Interfaces Impact Annotator Rationales When Labeling Text Data. NAACL-HLT 2022: 521-531 - [c64]Will Brackenbury, Kyle Chard, Aaron J. Elmore, Blase Ur:
Summarizing Sets of Related ML-Driven Recommendations for Improving File Management in Cloud Storage. UIST 2022: 95:1-95:11 - [c63]Collins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv:
"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits. USENIX Security Symposium 2022: 4023-4040 - [i1]Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum:
Comprehension from Chaos: What Users Understand and Expect from Private Computation. CoRR abs/2211.07026 (2022) - 2021
- [j5]Natã M. Barbosa, Gang Wang, Blase Ur, Yang Wang:
Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 88:1-88:32 (2021) - [c62]Valerie Zhao, Lefan Zhang, Bo Wang, Michael L. Littman, Shan Lu, Blase Ur:
Understanding Trigger-Action Programs Through Novel Visualizations of Program Differences. CHI 2021: 312:1-312:17 - [c61]Maia J. Boyd, Jamar L. Sullivan Jr., Marshini Chetty, Blase Ur:
Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters. CHI 2021: 549:1-549:18 - [c60]Weijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah D. Hester, Blase Ur:
SoK: Context Sensing for Access Control in the Adversarial Home IoT. EuroS&P 2021: 37-53 - [c59]Günce Su Yilmaz, Fiona Gasaway, Blase Ur, Mainack Mondal:
Perceptions of Retrospective Edits, Changes, and Deletion on Social Media. ICWSM 2021: 841-852 - [c58]Will Brackenbury, Galen Harrison, Kyle Chard, Aaron J. Elmore, Blase Ur:
Files of a Feather Flock Together? Measuring and Modeling How Users Perceive File Similarity in Cloud Storage. SIGIR 2021: 787-797 - [c57]Kentrell Owens, Olabode Anise, Amanda Krauss, Blase Ur:
User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators. SOUPS @ USENIX Security Symposium 2021: 57-76 - [c56]Sophie Veys, Daniel Serrano, Madison Stamos, Margot Herman, Nathan Reitinger, Michelle L. Mazurek, Blase Ur:
Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design. SOUPS @ USENIX Security Symposium 2021: 217-242 - [c55]Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, Sascha Fahl:
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. SOUPS @ USENIX Security Symposium 2021: 437-454 - [c54]Will Brackenbury, Andrew M. McNutt, Kyle Chard, Aaron J. Elmore, Blase Ur:
KondoCloud: Improving Information Management in Cloud Storage via Recommendations Based on File Similarity. UIST 2021: 69-83 - [c53]Sophie Welber, Valerie Zhao, Claire Dolin, Olivia Morkved, Henry Hoffmann, Blase Ur:
Do Users Have Contextual Preferencesfor Smartphone Power Management? UMAP 2021: 44-54 - [c52]Leona Lassak, Annika Hildebrandt, Maximilian Golla, Blase Ur:
"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn. USENIX Security Symposium 2021: 91-108 - [c51]Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva:
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage. USENIX Security Symposium 2021: 1145-1162 - [c50]Omer Akgul, Ruba Abu-Salma, Wei Bai, Elissa M. Redmiles, Michelle L. Mazurek, Blase Ur:
From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging. WPES@CCS 2021: 119-135 - 2020
- [j4]Lefan Zhang, Weijia He, Olivia Morkved, Valerie Zhao, Michael L. Littman, Shan Lu, Blase Ur:
Trace2TAP: Synthesizing Trigger-Action Programs from Traces of Behavior. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(3): 104:1-104:26 (2020) - [c49]Julia Hanson, Miranda Wei, Sophie Veys, Matthew Kugler, Lior Jacob Strahilevitz, Blase Ur:
Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers' Privacy Perceptions and Decisions to Disclose Private Information. CHI 2020: 1-13 - [c48]Valerie Zhao, Lefan Zhang, Bo Wang, Shan Lu, Blase Ur:
Visualizing Differences to Improve End-User Understanding of Trigger-Action Programs. CHI Extended Abstracts 2020: 1-10 - [c47]Galen Harrison, Julia Hanson, Christine Jacinto, Julio Ramirez, Blase Ur:
An empirical study on the perceived fairness of realistic, imperfect machine learning models. FAT* 2020: 392-402 - [c46]Miranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L. Mazurek, Blase Ur:
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data. USENIX Security Symposium 2020: 145-162
2010 – 2019
- 2019
- [c45]Ben Weinshel, Miranda Wei, Mainack Mondal, Euirim Choi, Shawn Shan, Claire Dolin, Michelle L. Mazurek, Blase Ur:
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. CCS 2019: 149-166 - [c44]Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva:
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media. CCS 2019: 991-1008 - [c43]Will Brackenbury, Abhimanyu Deora, Jillian Ritchey, Jason Vallee, Weijia He, Guan Wang, Michael L. Littman, Blase Ur:
How Users Interpret Bugs in Trigger-Action Programming. CHI 2019: 552 - [c42]Lefan Zhang, Weijia He, Jesse J. Martinez, Noah Brackenbury, Shan Lu, Blase Ur:
AutoTap: synthesizing and repairing trigger-action programs using LTL properties. ICSE 2019: 281-291 - [c41]Judah Newman, Bowen Wang, Valerie Zhao, Amy Zeng, Michael L. Littman, Blase Ur:
Evidence Humans Provide When Explaining Data-Labeling Decisions. INTERACT (3) 2019: 390-409 - [c40]Weijia He, Jesse J. Martinez, Roshni Padhi, Lefan Zhang, Blase Ur:
When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices. IEEE Symposium on Security and Privacy Workshops 2019: 150-155 - [c39]Enze Liu, Amanda Nakanishi, Maximilian Golla, David Cash, Blase Ur:
Reasoning Analytically about Password-Cracking Software. IEEE Symposium on Security and Privacy 2019: 380-397 - 2018
- [c38]Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur:
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. CCS 2018: 1549-1566 - [c37]Claire Dolin, Ben Weinshel, Shawn Shan, Chang Min Hahn, Euirim Choi, Michelle L. Mazurek, Blase Ur:
Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization. CHI 2018: 493 - [c36]Mohammad Taha Khan, Maria Hyun, Chris Kanich, Blase Ur:
Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage. CHI 2018: 543 - [c35]Blase Ur:
SIGCHI Outstanding Dissertation Award - Supporting Password Decisions with Data. CHI Extended Abstracts 2018 - [c34]Will Brackenbury, Rui Liu, Mainack Mondal, Aaron J. Elmore, Blase Ur, Kyle Chard, Michael J. Franklin:
Draining the Data Swamp: A Similarity-based Approach. HILDA@SIGMOD 2018: 13:1-13:7 - [c33]Ruba Abu-Salma, Elissa M. Redmiles, Blase Ur, Miranda Wei:
Exploring User Mental Models of End-to-End Encrypted Communication Tools. FOCI @ USENIX Security Symposium 2018 - [c32]Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase Ur:
Rethinking Access Control and Authentication for the Home Internet of Things (IoT). USENIX Security Symposium 2018: 255-272 - [c31]Yuxi Wu, Panya Gupta, Miranda Wei, Yasemin Acar, Sascha Fahl, Blase Ur:
Your Secrets Are Safe: How Browsers' Explanations Impact Misconceptions About Private Browsing Mode. WWW 2018: 217-226 - 2017
- [j3]William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Better Passwords through Science (and Neural Networks). login Usenix Mag. 42(4) (2017) - [c30]Blase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin, Jessica Colnago, Lorrie Faith Cranor, Henry Dixon, Pardis Emami Naeini, Hana Habib, Noah Johnson, William Melicher:
Design and Evaluation of a Data-Driven Password Meter. CHI 2017: 3775-3786 - [c29]Joshua Tan, Lujo Bauer, Joseph Bonneau, Lorrie Faith Cranor, Jeremy Thomas, Blase Ur:
Can Unicorns Help Users Compare Crypto Key Fingerprints? CHI 2017: 3787-3798 - [c28]Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Diversify to Survive: Making Passwords Stronger with Adaptive Policies. SOUPS 2017: 1-12 - [c27]William Melicher, Blase Ur, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. USENIX ATC 2017 - [c26]Yuan Tian, Nan Zhang, Yue-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague:
SmartAuth: User-Centered Authorization for the Internet of Things. USENIX Security Symposium 2017: 361-378 - 2016
- [b1]Blase Ur:
Supporting Password-Security Decisions with Data. Carnegie Mellon University, USA, 2016 - [j2]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Designing Password Policies for Strength and Usability. ACM Trans. Inf. Syst. Secur. 18(4): 13:1-13:34 (2016) - [c25]William Melicher, Darya Kurilova, Sean M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Usability and Security of Text Passwords on Mobile Devices. CHI 2016: 527-539 - [c24]Blase Ur, Melwyn Pak Yong Ho, Stephen Brawner, Jiyun Lee, Sarah Mennicken, Noah Picard, Diane Schulze, Michael L. Littman:
Trigger-Action Programming in the Wild: An Analysis of 200, 000 IFTTT Recipes. CHI 2016: 3227-3231 - [c23]Blase Ur, Jonathan Bees, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Do Users' Perceptions of Password Security Match Reality? CHI 2016: 3748-3760 - [c22]William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. USENIX Security Symposium 2016: 175-191 - 2015
- [c21]Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, Patrick Tague, Lorrie Faith Cranor:
Supporting Privacy-Conscious App Update Decisions with User Reviews. SPSM@CCS 2015: 51-61 - [c20]Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek, William Melicher, Sean M. Segreti, Blase Ur:
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior. CHI 2015: 2903-2912 - [c19]Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab. SOUPS 2015: 123-140 - [c18]Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay:
Measuring Real-World Accuracies and Biases in Modeling Password Guessability. USENIX Security Symposium 2015: 463-481 - 2014
- [c17]Blase Ur, Elyse McManus, Melwyn Pak Yong Ho, Michael L. Littman:
Practical trigger-action programming in the smart home. CHI 2014: 803-812 - [c16]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Can long passwords be secure and usable? CHI 2014: 2927-2936 - [c15]Blase Ur, Jaeyeon Jung, Stuart E. Schechter:
Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance. UbiComp 2014: 129-139 - [c14]Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, Blase Ur:
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. SOUPS 2014: 19-35 - 2013
- [c13]Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur:
Measuring password guessability for an entire university. CCS 2013: 173-186 - [c12]Manya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh:
"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets. CHI 2013: 3277-3286 - [c11]Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, Lorrie Faith Cranor:
What matters to users?: factors that affect users' willingness to share information with online advertisers. SOUPS 2013: 7:1-7:12 - [c10]Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. WPES 2013: 1-12 - [c9]Blase Ur, Yang Wang:
A cross-cultural framework for protecting user privacy in online social media. WWW (Companion Volume) 2013: 755-762 - 2012
- [j1]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Julio C. López:
Helping Users Create Better Passwords. login Usenix Mag. 37(6) (2012) - [c8]Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, Michael K. Reiter:
Tag, you can see it!: using tags for access control in photo sharing. CHI 2012: 377-386 - [c7]Pedro Giovanni Leon, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, Lorrie Faith Cranor:
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising. CHI 2012: 589-598 - [c6]Blase Ur, Yang Wang:
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook. iConference 2012: 398-406 - [c5]Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, Yang Wang:
Smart, useful, scary, creepy: perceptions of online behavioral advertising. SOUPS 2012: 4 - [c4]Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Correct horse battery staple: exploring the usability of system-assigned passphrases. SOUPS 2012: 7 - [c3]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. USENIX Security Symposium 2012: 65-80 - [c2]Pedro Giovanni Leon, Justin Cranshaw, Lorrie Faith Cranor, Jim Graves, Manoj Hastak, Blase Ur, Guzi Xu:
What do online behavioral advertising privacy disclosures communicate to users? WPES 2012: 19-30 - 2011
- [c1]Jordan T. Ash, Monica Babes, Gal Cohen, Sameen Jalal, Sam Lichtenberg, Michael L. Littman, Vukosi Marivate, Phillip Quiza, Blase Ur, Emily Zhang:
Scratchable Devices: User-Friendly Programming for Household Appliances. HCI (3) 2011: 137-146
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 23:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint