default search action
Jixin Ma 0001
Person information
- affiliation (PhD 1994): University of Greenwich, School of Computing and Mathematical Sciences, London, UK
Other persons with the same name
- Jixin Ma 0002 — Chongqing Normal University, School of Computer and Information Science, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Xin Hua, Zhijiang Du, Jixin Ma, Hongjian Yu:
Multi kernel cross sparse graph attention convolutional neural network for brain magnetic resonance imaging super-resolution. Biomed. Signal Process. Control. 96: 106444 (2024) - [j42]Xin Hua, Zhijiang Du, Hongjian Yu, Jixin Ma, Fanjun Zheng, Chen Zhang, Qiaohui Lu, Hui Zhao:
A lightweight multi-scale multi-angle dynamic interactive transformer-CNN fusion model for 3D medical image segmentation. Neurocomputing 608: 128417 (2024) - [e5]Teruhisa Hochin, Jixin Ma, Osamu Mizuno:
22nd IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2024, Honolulu, HI, USA, May 30 - June 1, 2024. IEEE 2024, ISBN 979-8-3503-9134-3 [contents] - 2023
- [j41]Qing Wang, Xi Zhang, Jing Qin, Jixin Ma, Xinyi Huang:
A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree. Comput. J. 66(1): 174-183 (2023) - [j40]Jinlu Liu, Bo Zhao, Jing Qin, Xi Zhang, Jixin Ma:
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing. Comput. J. 66(1): 184-196 (2023) - [j39]Aihua Zheng, Xianpeng Zhu, Zhiqi Ma, Chenglong Li, Jin Tang, Jixin Ma:
Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Inf. Fusion 100: 101901 (2023) - [j38]Ye Su, Xi Zhang, Jing Qin, Jixin Ma:
Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices. IEEE Internet Things J. 10(15): 13945-13958 (2023) - [j37]Jinlu Liu, Bo Zhao, Jing Qin, Xinyi Hou, Jixin Ma:
Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Inf. Sci. 645: 119336 (2023) - [j36]Jinlu Liu, Zhongkai Wei, Jing Qin, Bo Zhao, Jixin Ma:
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting. IEEE Trans. Serv. Comput. 16(6): 4233-4247 (2023) - [c54]Zefeng Li, Zeyu Zhang, Jixin Ma, Lele Tian:
Improved YOLOV5 based industrial surface defect detection method. CIPAE 2023: 367-370 - [c53]Ala Othman Barzinji, Jixin Ma, Chaoying Ma:
SCALA: Scaling algorithm for multi-class imbalanced classification: A novel algorithm specifically designed for multi-class multiple minority imbalanced data problems. ICMLT 2023: 68-73 - [c52]Yanyi Li, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma, Dekai Li, Fangchun Dong:
Robust Zero-watermarking Algorithm for Medical Images Based on ORB and DCT. SNPD-Winter 2023: 282-289 - [c51]Shilong Dong, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma, Fangchun Dong, Yanyi Li:
Robust Zero-watermarking Algorithm for Medical Images Based on GFTT-KAZE and DCT. SNPD-Winter 2023: 290-297 - [c50]Guoshun Sun, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma, Fangchun Dong, Yanyi Li:
Robust Zero-Watermarking Algorithm for Medical Images Based on AGAST-LATCH and DCT. SNPD-Winter 2023: 298-305 - 2022
- [j35]Cheng Gong, Jing Liu, Ming Gong, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma:
Robust medical zero-watermarking algorithm based on Residual-DenseNet. IET Biom. 11(6): 547-556 (2022) - [j34]Wenxing Zhang, Jingbing Li, Uzair Aslam Bhatti, Mengxing Huang, Jixin Ma, Cheng Zeng:
Robust zero-watermarking algorithm for medical images based on K-means and DCT. Int. J. Wirel. Mob. Comput. 23(2): 163-172 (2022) - [c49]Jixin Ma:
Temporal Aspects in Big Data: Keynote Address. BCD 2022: 1 - [c48]Yuan Li, Jingbing Li, Chunyan Shao, Uzair Aslam Bhatti, Jixin Ma:
Robust Multi-watermarking Algorithm for Medical Images Using Patchwork-DCT. ICAIS (3) 2022: 386-399 - [c47]Huawei Ma, Jixin Ma, Shengbin Liang, Wencai Du:
A Model of Integrating Bert and BiGRU+ Attention Dual-channel Mechanism for Investor Sentiment Analysis of Stock Price Forecast. SNPD 2022: 126-131 - [e4]Zheng-an Yao, Simon Xu, Jixin Ma, Wencai Du, Wei Lu:
22nd IEEE/ACIS International Conference on Computer and Information Science, ICIS 2022, Zhuhai, China, June 26-28, 2022. IEEE 2022, ISBN 978-1-6654-9463-2 [contents] - [i2]Aihua Zheng, Xianpeng Zhu, Chenglong Li, Jin Tang, Jixin Ma:
Multi-spectral Vehicle Re-identification with Cross-directional Consistency Network and a High-quality Benchmark. CoRR abs/2208.00632 (2022) - [i1]Xin Hua, Zhijiang Du, Hongjian Yu, Jixin Ma, Fanjun Zheng, Cheng Zhang, Qiaohui Lu, Hui Zhao:
WSC-Trans: A 3D network model for automatic multi-structural segmentation of temporal bone CT. CoRR abs/2211.07143 (2022) - 2021
- [j33]Jiameng Sun, Ye Su, Jing Qin, Jiankun Hu, Jixin Ma:
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT. IEEE Trans. Cloud Comput. 9(3): 1195-1209 (2021) - [j32]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu, Jixin Ma:
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1408-1421 (2021) - [c46]Ala Othman Barzinji, Chaoying Ma, Wencai Du, Jixin Ma:
A Machine Learning Approach to Predict the Trend of Obesity Prevalence at a Global Level. BCD 2021: 25-30 - [e3]Jixin Ma, Simon Xu:
6th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science, BCD 2021, Zhuhai, China, September 13-15, 2021. IEEE 2021, ISBN 978-1-7281-7681-9 [contents] - 2020
- [j31]Jing Liu, Jixin Ma, Jingbing Li, Mengxing Huang, Naveed Sadiq, Yang Ai:
Robust Watermarking Algorithm for Medical Volume Data in Internet of Medical Things. IEEE Access 8: 93939-93961 (2020) - [j30]Patrick Schembri, Mariusz Pelc, Jixin Ma:
The Effect That Auditory Distractions Have on a Visual P300 Speller While Utilizing Low-Cost Off-the-Shelf Equipment. Comput. 9(3): 68 (2020) - [j29]Jingguo Dai, Jia Ren, Wencai Du, Vladimir Shikhin, Jixin Ma:
An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Comput. Appl. 32(5): 1413-1434 (2020) - [c45]Mujistapha Ahmed Safana, Yasmine Arafa, Jixin Ma:
Improving the performance of the Proof-of-Work Consensus Protocol Using Machine learning. BCCA 2020: 16-21 - [c44]Patrick Schemrbi, Mariusz Pelc, Jixin Ma:
Impact of Mental Fatigue during Repetitive Exercises of a Visual P300 Speller. BIOSIGNALS 2020: 156-163
2010 – 2019
- 2019
- [j28]Haining Yang, Jiameng Sun, Jing Qin, Jixin Ma:
An improved scheme for outsourced computation with attribute-based encryption. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j27]Dawei Xie, Haining Yang, Jing Qin, Jixin Ma:
Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud. Int. J. Digit. Crime Forensics 11(4): 14-27 (2019) - [j26]Xiaoqi Wu, Jingbing Li, Rong Tu, Jieren Cheng, Uzair Aslam Bhatti, Jixin Ma:
Contourlet-DCT based multiple robust watermarkings for medical images. Multim. Tools Appl. 78(7): 8463-8480 (2019) - [j25]Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
A Secure Data Sharing Scheme with Designated Server. Secur. Commun. Networks 2019: 4268731:1-4268731:16 (2019) - [j24]Wenting Shen, Jing Qin, Jixin Ma:
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. Secur. Commun. Networks 2019: 8275074:1-8275074:15 (2019) - [j23]Binrui Zhu, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao, Jixin Ma:
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks. Sensors 19(11): 2583 (2019) - [j22]Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Comput. 23(2): 527-536 (2019) - [c43]Patrick Schembri, Mariusz Pelc, Jixin Ma:
The Effect that Auxiliary Taxonomized Auditory Distractions have on a P300 Speller while utilising Low Fidelity Equipment. CEEC 2019: 118-123 - [c42]Patrick Schemrbi, Mariusz Pelc, Jixin Ma:
The Effect That an Auditory Distraction with Differing Levels of Intensity Have on a Visual P300 Speller While Utilizing Low Fidelity Equipment: Alongside the Development of a Taxonomy. CHIRA 2019: 50-58 - [c41]Patrick Schembri, Mariusz Pelc, Jixin Ma:
Taxonomized Auditory Distractions with Varying Intensity Levels and Their Effect on a Visual P300 Speller While Utilising Low-Cost off-the-Shelf Equipment. CHIRA (Revised Selected Papers) 2019: 124-141 - [c40]Jilin Yang, Chunjie Cao, Jun Zhang, Jixin Ma, Xiaoyi Zhou:
A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model. CSS (2) 2019: 263-274 - [c39]Patrick Schembri, Mariusz Pelc, Jixin Ma:
Comparison between a Passive and Active response task and their effect on the Amplitude and Latency of the P300 component for Visual Stimuli while using Low Fidelity Equipment. EMBC 2019: 4566-4571 - [c38]Rui Wang, Huaibo Huang, Xufeng Zhang, Jixin Ma, Aihua Zheng:
A Novel Distance Learning for Elastic Cross-Modal Audio-Visual Matching. ICME Workshops 2019: 300-305 - 2018
- [j21]Yu Wei, Libin Jiao, Jie Sha, Jixin Ma, Anton Umek, Anton Kos:
Sensor selection scheme in activity recognition based on hierarchical feature reduction. Int. J. Distributed Sens. Networks 14(8) (2018) - [j20]Libin Jiao, Rongfang Bie, Hao Wu, Yu Wei, Jixin Ma, Anton Umek, Anton Kos:
Golf swing classification with multiple deep convolutional neural networks. Int. J. Distributed Sens. Networks 14(10) (2018) - [j19]Yun Xiao, Bo Jiang, Zhengzheng Tu, Jixin Ma, Jin Tang:
A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing 315: 234-245 (2018) - [j18]Xiaoyi Zhou, Jixin Ma, Xiaoming Yao, Honglei Li:
A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations. Int. J. Softw. Innov. 6(2): 1-9 (2018) - [j17]Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Jixin Ma:
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication. Secur. Commun. Networks 2018: 5275132:1-5275132:15 (2018) - [c37]Shiqin Liu, Minjun Zhao, Jixin Ma, Jiangyuan Yao, Yucong Duan, Xiaoyi Zhou:
A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GA. ICCCS (4) 2018: 195-207 - [c36]Jixin Ma:
Presenting and Matching Time Series and State Sequences. SERA 2018: 1 - 2017
- [c35]Jiameng Sun, Jing Qin, Jixin Ma:
Securely Outsourcing Decentralized Multi-authority Attribute Based Signature. CSS 2017: 86-102 - [c34]Fuzhen Zhuang, Lang Huang, Jia He, Jixin Ma, Qing He:
Transfer Learning with Manifold Regularized Convolutional Neural Network. KSEM 2017: 483-494 - [c33]Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
The Public Verifiability of Public Key Encryption with Keyword Search. MONAMI 2017: 299-312 - [c32]Jiameng Sun, Binrui Zhu, Jing Qin, Jixin Ma:
A confidentiality preserving publicly verifiable computation for multivariate polynomials. SERA 2017: 5-12 - [c31]Xiaoyi Zhou, Xiaoming Yao, Honglei Li, Jixin Ma:
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting. SERA 2017: 19-23 - [e2]Liz Bacon, Jixin Ma, Lachlan M. MacKinnon:
15th IEEE International Conference on Software Engineering Research, Management and Applications, SERA 2017, London, United Kingdom, June 7-9, 2017. IEEE 2017, ISBN 978-1-5090-5756-6 [contents] - 2016
- [c30]Xiaoming Yao, Xiaoyi Zhou, Jixin Ma:
Differential Privacy of Big Data: An Overview. BigDataSecurity/HPSC/IDS 2016: 7-12 - 2015
- [c29]Sanjib Raj Pandey, Jixin Ma, Choi-Hong Lai:
Development of Temporal Logic-Based Fuzzy Decision Support System for Diagnosis of Acute Rheumatic Fever/Rheumatic Heart Disease. SGAI Conf. 2015: 213-228 - 2014
- [c28]Xiaoyi Zhou, Jixin Ma, Wencai Du, Yihong Li:
A Dynamic Multiple Digital Watermarking Model based on Temporal Series. 3PGCIC 2014: 367-371 - 2013
- [c27]Markus Wolf, Miltos Petridis, Jixin Ma:
Using Structural Similarity for Effective Retrieval of Knowledge from Class Diagrams. SGAI Conf. 2013: 185-198 - [c26]Jixin Ma, Miltos Petridis, Brian Knight:
Formulating the Temporal Causal Relationships Between Events and Their Results. SGAI Conf. 2013: 199-210 - [c25]Sanjib Raj Pandey, Jixin Ma, Choi-Hong Lai, Chiyaba Njovu:
A Fuzzy Logic-Based Decision Support System for the Diagnosis of Arthritis Pain for Rheumatic Fever Patients. SGAI Conf. 2013: 259-264 - 2012
- [c24]Aihua Zheng, Jixin Ma, Jin Tang, Bin Luo:
Matching State-Based Sequences with Rich Temporal Aspects. AAAI 2012: 2463-2464 - 2011
- [j16]Miltos Petridis, Jixin Ma, Brian Knight:
Temporal model for business process. Intell. Decis. Technol. 5(4): 321-331 (2011) - [c23]Xiaoyi Zhou, Jixin Ma, Miltos Petridis, Wencai Du:
Temporal Ordered Image Encryption. CMC 2011: 23-28 - 2010
- [j15]Aihua Zheng, Jixin Ma, Xiaoyi Zhou, Bin Luo:
Efficient and Effective State-based Framework for News Video Retrival. Int. J. Adv. Comp. Techn. 2(4): 151-161 (2010) - [j14]Aihua Zheng, Jixin Ma, Miltos Petridis, Jin Tang, Bin Luo:
Structure Based Feature Extraction in Basketball Zone-Defense Strategies. Int. J. Comput. Sci. Appl. 7(3): 18-32 (2010) - [c22]Xiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Mingrui Chen, Yongzhe Zhao:
Cryptanalysis of the Bisectional MQ Equations System. CIT 2010: 1038-1043 - [c21]Stelios Kapetanakis, Miltos Petridis, Jixin Ma, Liz Bacon:
Providing Explanations for the Intelligent Monitoring of Business Workflows Using Case-Based Reasoning. ExaCt 2010: 25-36 - [c20]Stelios Kapetanakis, Miltos Petridis, Brian Knight, Jixin Ma, Liz Bacon:
A Case Based Reasoning Approach for the Monitoring of Business Workflows. ICCBR 2010: 390-405 - [c19]Xiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Miltos Petridis, Yongzhe Zhao:
BMQE System - A MQ Equations System based on Ergodic Matrix. SECRYPT 2010: 431-435 - [e1]Jixin Ma, Liz Bacon, Wencai Du, Miltos Petridis:
11th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, SNPD 2010, London, England, UK, June 9-11, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4088-7 [contents]
2000 – 2009
- 2009
- [c18]Aihua Zheng, Jixin Ma, Bin Luo, Miltos Petridis, Sulan Zhai, Jin Tang:
Temporal Pattern Recognition in Video Clips Detection. ACIS-ICIS 2009: 416-421 - [c17]Aihua Zheng, Jixin Ma, Bin Luo, Miltos Petridis, Jin Tang:
Character-angle based video annotation. IMCSIT 2009: 547-552 - [c16]Aihua Zheng, Jixin Ma, Miltos Petridis, Jin Tang, Bin Luo:
A Robust Approach to Subsequence Matching. SERA (selected papers) 2009: 39-49 - 2008
- [c15]Jixin Ma, Brian Knight, Miltos Petridis:
Deriving Explanations From Partial Temporal Information. ExaCt 2008: 61-71 - [c14]Jixin Ma, Rongfang Bie, Guoxing Zhao:
An Ontological Characterization of Time-Series and State-Sequences for Data Mining. FSKD (5) 2008: 325-329 - [c13]Guoxing Zhao, Jixin Ma, Fuxing Shen, Miltos Petridis:
A Sound and Complete Reified Temporal Logic. SNPD 2008: 111-116 - 2007
- [j13]Jixin Ma:
Ontological considerations of time, meta-predicates and temporal propositions. Appl. Ontology 2(1): 37-66 (2007) - [c12]Jixin Ma, Guoxing Zhao, Edwin R. Hancock:
A Navigation-based Algorithm for Matching Scenario Patterns. Artificial Intelligence and Pattern Recognition 2007: 151-157 - [c11]Guoxing Zhao, Bin Luo, Jixin Ma:
Matching Scenarios Patterns by Using Linear Programming. FSKD (3) 2007: 346-350 - [c10]Guoxing Zhao, Bin Luo, Jin Tang, Jixin Ma:
Using Eigen-Decomposition Method for Weighted Graph Matching. ICIC (1) 2007: 1283-1294 - [c9]Wanli Lv, Jixin Ma, Bin Luo:
Image Content Authentication Algorithm Based on Laplace Spectra Feature. ICNC (3) 2007: 171-178 - [c8]Jixin Ma:
State-based Time-Series Analysis and Prediction. SNPD (3) 2007: 227-232 - 2006
- [j12]Jixin Ma, Patrick J. Hayes:
Primitive Intervals versus Point-Based Intervals: Rivals or Allies? Comput. J. 49(1): 32-41 (2006) - [c7]Jixin Ma, Brian Knight:
Using Set Operations to Deal with the Frame Problem. IEEE ICCI 2006: 447-452 - [c6]Xin Jin, Anbang Xu, Guoxing Zhao, Jixin Ma, Rongfang Bie:
Event Models for Tumor Classification with SAGE Gene Expression Data. International Conference on Computational Science (2) 2006: 775-782 - [c5]Xin Jin, Zhaodong Liu, Rongfang Bie, Guoxing Zhao, Jixin Ma:
Support Vector Machines for Regression and Applications to Software Quality Prediction. International Conference on Computational Science (4) 2006: 781-788 - 2005
- [c4]Jixin Ma, Bin Luo:
Representing and Recognizing Scenario Patterns. FSKD (2) 2005: 140-149 - [c3]Jixin Ma, Brian Knight, Miltos Petridis, Amin Mineh:
Visualizing a Temporal Consistence Checker. IV 2005: 686-691 - 2003
- [j11]Ephraim Nissan, Jixin Ma:
Identification and Doing Without It, V: A Formal Mathematical Analysis for a Case of Mix-Up of Individuals, and of Recovery from Failure to Attain Identification. Cybern. Syst. 34(6-7): 531-549 (2003) - [j10]Jixin Ma, Brian Knight:
Representing The Dividing Instant. Comput. J. 46(2): 213-222 (2003) - [c2]Jixin Ma, Brian Knight:
A Framework for Historical Case-Based Reasoning. ICCBR 2003: 246-260 - 2001
- [j9]Jixin Ma, Brian Knight:
Reified Temporal Logics: An Overview. Artif. Intell. Rev. 15(3): 189-217 (2001)
1990 – 1999
- 1999
- [j8]Jixin Ma, Brian Knight, Ephraim Nissan:
Temporal representation of state transitions. Artif. Intell. Eng. Des. Anal. Manuf. 13(2): 67-78 (1999) - 1997
- [c1]Jixin Ma, Brian Knight, Taoxin Peng:
Representing Temporal Relationships between Events and their Effects. TIME 1997: 148-152 - 1996
- [j7]Jixin Ma, Brian Knight:
A Reified Temporal Logic. Comput. J. 39(9): 800-807 (1996) - 1994
- [b1]Jixin Ma:
Towards a general temporal theory. University of Greenwich, London, UK, 1994 - [j6]Jixin Ma, Brian Knight:
A General Temporal Theory. Comput. J. 37(2): 114-123 (1994) - [j5]Brian Knight, Jixin Ma:
A Temporal Database Model Supporting Relative and Absolute Time. Comput. J. 37(7): 588-597 (1994) - [j4]Jixin Ma, Brian Knight, Miltos Pedritis:
A Revised Theory of Action and Time Based on Intervals and Points. Comput. J. 37(10): 847-857 (1994) - 1993
- [j3]Brian Knight, Jixin Ma:
Time representation: A taxonomy of temporal models. Artif. Intell. Rev. 7(6): 401-419 (1993) - [j2]Brian Knight, Jixin Ma:
An extended temporal system based on points and intervals. Inf. Syst. 18(2): 111-120 (1993) - 1992
- [j1]Brian Knight, Jixin Ma:
A General Temporal Model Supporting Duration Reasoning. AI Commun. 5(2): 75-84 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint