default search action
Tugba Erpek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2019
- [b1]Tugba Erpek:
Multi-layer Optimization Aspects of Deep Learning and MIMO-based Communication Systems. Virginia Tech, Blacksburg, VA, USA, 2019
Journal Articles
- 2024
- [j14]Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus:
Joint Sensing and Semantic Communications with Multi-Task Deep Learning. IEEE Commun. Mag. 62(9): 74-81 (2024) - [j13]Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus:
Will 6G Be Semantic Communications? Opportunities and Challenges From Task Oriented and Secure Communications to Integrated Sensing. IEEE Netw. 38(6): 72-80 (2024) - [j12]Tarun S. Cousik, Vijay K. Shah, Tugba Erpek, Yalin E. Sagduyu, Jeffrey H. Reed:
Deep Learning for Fast and Reliable Initial Access in AI-Driven 6G mmWave Networks. IEEE Trans. Netw. Sci. Eng. 11(6): 5668-5680 (2024) - 2023
- [j11]Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener:
Is Semantic Communication Secure? A Tale of Multi-Domain Adversarial Attacks. IEEE Commun. Mag. 61(11): 50-55 (2023) - [j10]Yi Shi, Maice Costa, Tugba Erpek, Yalin E. Sagduyu:
Deep Reinforcement Learning for NextG Radio Access Network Slicing With Spectrum Coexistence. IEEE Netw. Lett. 5(3): 149-153 (2023) - 2022
- [j9]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas. Entropy 24(8): 1047 (2022) - [j8]Xueyuan Wang, Mustafa Cenk Gursoy, Tugba Erpek, Yalin E. Sagduyu:
Learning-Based UAV Path Planning for Data Collection With Integrated Collision Avoidance. IEEE Internet Things J. 9(17): 16663-16676 (2022) - [j7]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers. IEEE Trans. Wirel. Commun. 21(6): 3868-3880 (2022) - 2021
- [j6]Yalin E. Sagduyu, Yi Shi, Tugba Erpek:
Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks. IEEE Trans. Mob. Comput. 20(2): 306-319 (2021) - [j5]Kemal Davaslioglu, Sohraab Soltani, Tugba Erpek, Yalin E. Sagduyu:
DeepWiFi: Cognitive WiFi with Deep Learning. IEEE Trans. Mob. Comput. 20(2): 429-444 (2021) - 2019
- [j4]Tugba Erpek, Yalin E. Sagduyu, Yi Shi, Satya Prakash Ponnaluri:
Network control and rate optimization for multiuser MIMO communications. Ad Hoc Networks 85: 92-102 (2019) - [j3]Tugba Erpek, Yalin E. Sagduyu, Yi Shi:
Deep Learning for Launching and Mitigating Wireless Jamming Attacks. IEEE Trans. Cogn. Commun. Netw. 5(1): 2-14 (2019) - 2017
- [j2]Yalin E. Sagduyu, Sohraab Soltani, Tugba Erpek, Yi Shi, Jason H. Li:
A Unified Solution to Cognitive Radio Programming, Test and Evaluation for Tactical Communications. IEEE Commun. Mag. 55(10): 12-20 (2017) - 2011
- [j1]Tugba Erpek, Mark A. McHenry, Andrew Stirling:
Dynamic spectrum access operational parameters with wireless microphones. IEEE Commun. Mag. 49(3): 38-45 (2011)
Conference and Workshop Papers
- 2024
- [c39]Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus:
Joint Sensing and Task-Oriented Communications with Image and Wireless Data Modalities for Dynamic Spectrum Access. DySPAN 2024: 57-62 - 2023
- [c38]Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener:
Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks. CISS 2023: 1-6 - [c37]D. J. Shyy, Cuong Luu, David Gabay, John D. Xu, David Bate, Lingjia Liu, Tugba Erpek:
Multi-Hop User Equipment (UE) to UE Relays for MANET/Mesh Leveraging 5G NR Sidelink. SEC 2023: 341-346 - [c36]Yi Shi, Yalin E. Sagduyu, Tugba Erpek:
Jamming Attacks on Decentralized Federated Learning in General Multi-Hop Wireless Networks. INFOCOM Workshops 2023: 1-6 - [c35]Yalin E. Sagduyu, Tugba Erpek:
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep Learning. MILCOM 2023: 385-390 - [c34]Yalin E. Sagduyu, Tugba Erpek, Yi Shi:
Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution. MILCOM 2023: 815-820 - 2022
- [c33]Kemal Davaslioglu, Tugba Erpek, Yalin E. Sagduyu:
Autoencoder Communications with Optimized Interference Suppression for NextG RAN. FNWF 2022: 164-169 - [c32]Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Mustafa Cenk Gursoy:
Jamming Attacks on NextG Radio Access Network Slicing with Reinforcement Learning. FNWF 2022: 397-402 - [c31]Brian Kim, Tugba Erpek, Yalin E. Sagduyu, Sennur Ulukus:
Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces. WCNC 2022: 411-416 - [c30]Michael Hegarty, Yalin E. Sagduyu, Tugba Erpek, Yi Shi:
Deep Learning for Spectrum Awareness and Covert Communications via Unintended RF Emanations. WiseML@WiSec 2022: 27-32 - 2021
- [c29]Tugba Erpek, Yalin E. Sagduyu, Ahmed Alkhateeb, Aylin Yener:
Autoencoder-based Communications with Reconfigurable Intelligent Surfaces. DySPAN 2021: 242-247 - [c28]Brian Kim, Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus:
Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications. GLOBECOM (Workshops) 2021: 1-6 - [c27]Xueyuan Wang, Mustafa Cenk Gursoy, Tugba Erpek, Yalin E. Sagduyu:
Collision-Aware UAV Trajectories for Data Collection via Reinforcement Learning. GLOBECOM 2021: 1-6 - [c26]Maice Costa, Yalin E. Sagduyu, Tugba Erpek, Muriel Médard:
Robust Improvement of the Age of Information by Adaptive Packet Coding. ICC 2021: 1-6 - [c25]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus:
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers. ICC 2021: 1-6 - [c24]Xueyuan Wang, Mustafa Cenk Gursoy, Tugba Erpek, Yalin E. Sagduyu:
Jamming-Resilient Path Planning for Multiple UAVs via Deep Reinforcement Learning. ICC Workshops 2021: 1-6 - [c23]Tarun S. Cousik, Vijay K. Shah, Jeffrey H. Reed, Tugba Erpek, Yalin E. Sagduyu:
Fast Initial Access with Deep Learning for Beam Prediction in 5G mmWave Networks. MILCOM 2021: 664-669 - [c22]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus:
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G And Beyond. SSP 2021: 590-594 - 2020
- [c21]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy. ACSSC 2020: 763-767 - [c20]Yi Shi, Yalin E. Sagduyu, Tugba Erpek:
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing. CAMAD 2020: 1-6 - [c19]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels. CISS 2020: 1-6 - [c18]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus:
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers. GLOBECOM (Workshops) 2020: 1-6 - 2019
- [c17]Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek:
Real-Time Experimentation of Deep Learning-based RF Signal Classifier on FPGA. DySPAN 2019: 1-2 - [c16]Tugba Erpek, Sennur Ulukus, Yalin E. Sagduyu:
Interference Regime Enforcing Rate Maximization for Non-Orthogonal Multiple Access (NOMA). ICNC 2019: 950-954 - [c15]Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek:
Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification. MILCOM 2019: 1-6 - [c14]Nof Abuzainab, Volkan Isler, Aylin Yener, Tugba Erpek, Kemal Davaslioglu, Yalin E. Sagduyu, Yi Shi, Sharon J. Mackey, Mitesh P. Patel, Frank Panettieri, Muhammad A. Qureshi:
QoS and Jamming-Aware Wireless Networking Using Deep Reinforcement Learning. MILCOM 2019: 610-615 - [c13]Yalin E. Sagduyu, Yi Shi, Tugba Erpek:
IoT Network Security from the Perspective of Adversarial Deep Learning. SECON 2019: 1-9 - 2018
- [c12]Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Zhuo Lu, Jason H. Li:
Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies. ICC Workshops 2018: 1-6 - [c11]Tugba Erpek, Timothy J. O'Shea, T. Charles Clancy:
Learning a Physical Layer Scheme for the MIMO Interference Channel. ICC 2018: 1-5 - [c10]Tugba Erpek, Yalin E. Sagduyu, Yi Shi, Maice Costa, Kemal Davaslioglu, Hao Han, Daniel Fayette, Eric Johnson, Elizabeth S. Bentley, Clif Banner:
Routing, Network Coding and TCP Support for Wideband HF Communications. MILCOM 2018: 157-162 - [c9]Yi Shi, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li:
Spectrum Data Poisoning with Adversarial Deep Learning. MILCOM 2018: 407-412 - [c8]Tugba Erpek, Yalin E. Sagduyu, Yi Shi, Satya Prakash Ponnaluri:
Rate Optimization with Distributed Network Coordination of Multiuser MIMO Communications. VTC Fall 2018: 1-5 - 2017
- [c7]Timothy J. O'Shea, Tugba Erpek, T. Charles Clancy:
Physical layer deep learning of encodings for the MIMO fading channel. Allerton 2017: 76-80 - [c6]Timothy J. O'Shea, Tamoghna Roy, Tugba Erpek:
Spectral detection and localization of radio events with learned convolutional neural features. EUSIPCO 2017: 331-335 - [c5]Yalin E. Sagduyu, Yi Shi, Tugba Erpek, Sohraab Soltani, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri, Boleslaw K. Szymanski, Guohong Cao:
Multilayer MANET routing with social-cognitive learning. MILCOM 2017: 103-108 - 2016
- [c4]Satya Prakash Ponnaluri, Babak Azimi-Sadjadi, Yik-Kiong Hue, Tugba Erpek, Arash Komaee, Wade Trappe:
A practical wireless reciprocity-aware key establishment protocol. MILCOM 2016: 1107-1113 - [c3]Tugba Erpek, Ahmed Abdel-Hadi, T. Charles Clancy:
Application-aware resource block and power allocation for LTE. SysCon 2016: 1-5 - 2015
- [c2]Tugba Erpek, Ahmed Abdel-Hadi, T. Charles Clancy:
An optimal application-aware resource block scheduling in LTE. ICNC 2015: 275-279 - 2012
- [c1]Tugba Erpek, Karl Steadman, Ram Krishnan, Qiao Chen:
LTE signal classification and center frequency detection without Priori information. DySPAN 2012: 299-304
Parts in Books or Collections
- 2020
- [p1]Tugba Erpek, Timothy J. O'Shea, Yalin E. Sagduyu, Yi Shi, T. Charles Clancy:
Deep Learning for Wireless Communications. Development and Analysis of Deep Learning Architectures 2020: 223-266
Informal and Other Publications
- 2024
- [i41]Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus:
Will 6G be Semantic Communications? Opportunities and Challenges from Task Oriented and Secure Communications to Integrated Sensing. CoRR abs/2401.01531 (2024) - [i40]Kemal Davaslioglu, Sastry Kompella, Tugba Erpek, Yalin E. Sagduyu:
Continual Deep Reinforcement Learning to Prevent Catastrophic Forgetting in Jamming Mitigation. CoRR abs/2410.10521 (2024) - 2023
- [i39]Yi Shi, Yalin E. Sagduyu, Tugba Erpek:
Jamming Attacks on Decentralized Federated Learning in General Multi-Hop Wireless Networks. CoRR abs/2301.05250 (2023) - [i38]Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus:
Multi-Receiver Task-Oriented Communications via Multi-Task Deep Learning. CoRR abs/2308.06884 (2023) - [i37]Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus:
Joint Sensing and Semantic Communications with Multi-Task Deep Learning. CoRR abs/2311.05017 (2023) - [i36]Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, Sennur Ulukus:
Joint Sensing and Task-Oriented Communications with Image and Wireless Data Modalities for Dynamic Spectrum Access. CoRR abs/2312.13931 (2023) - [i35]Yalin E. Sagduyu, Tugba Erpek:
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep Learning. CoRR abs/2312.16715 (2023) - [i34]Yalin E. Sagduyu, Tugba Erpek, Yi Shi:
Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution. CoRR abs/2312.17164 (2023) - 2022
- [i33]Kemal Davaslioglu, Tugba Erpek, Yalin E. Sagduyu:
End-to-End Autoencoder Communications with Optimized Interference Suppression. CoRR abs/2201.01388 (2022) - [i32]Yi Shi, Yalin E. Sagduyu, Tugba Erpek:
Federated Learning for Distributed Spectrum Sensing in NextG Communication Networks. CoRR abs/2204.03027 (2022) - [i31]Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener:
Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial Attacks. CoRR abs/2212.10438 (2022) - [i30]Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener:
Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks. CoRR abs/2212.11205 (2022) - 2021
- [i29]Tarun S. Cousik, Vijay K. Shah, Tugba Erpek, Yalin E. Sagduyu, Jeffrey H. Reed:
Deep Learning for Fast and Reliable Initial Access in AI-Driven 6G mmWave Networks. CoRR abs/2101.01847 (2021) - [i28]Yalin E. Sagduyu, Tugba Erpek, Yi Shi:
Adversarial Machine Learning for 5G Communications Security. CoRR abs/2101.02656 (2021) - [i27]Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Mustafa Cenk Gursoy:
How to Attack and Defend 5G Radio Access Network Slicing with Reinforcement Learning. CoRR abs/2101.05768 (2021) - [i26]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus:
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond. CoRR abs/2103.13989 (2021) - [i25]Xueyuan Wang, Mustafa Cenk Gursoy, Tugba Erpek, Yalin E. Sagduyu:
Jamming-Resilient Path Planning for Multiple UAVs via Deep Reinforcement Learning. CoRR abs/2104.04477 (2021) - [i24]Brian Kim, Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus:
Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications. CoRR abs/2109.08139 (2021) - [i23]Tugba Erpek, Yalin E. Sagduyu, Ahmed Alkhateeb, Aylin Yener:
Autoencoder-based Communications with Reconfigurable Intelligent Surfaces. CoRR abs/2112.04441 (2021) - [i22]Brian Kim, Tugba Erpek, Yalin E. Sagduyu, Sennur Ulukus:
Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces. CoRR abs/2112.11414 (2021) - 2020
- [i21]Yalin E. Sagduyu, Yi Shi, Tugba Erpek, William C. Headley, Bryse Flowers, George Stantchev, Zhuo Lu:
When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions. CoRR abs/2001.08883 (2020) - [i20]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels. CoRR abs/2002.02400 (2020) - [i19]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers. CoRR abs/2005.05321 (2020) - [i18]Tugba Erpek, Timothy J. O'Shea, Yalin E. Sagduyu, Yi Shi, T. Charles Clancy:
Deep Learning for Wireless Communications. CoRR abs/2005.06068 (2020) - [i17]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy. CoRR abs/2005.07675 (2020) - [i16]Tarun S. Cousik, Vijay K. Shah, Jeffrey H. Reed, Tugba Erpek, Yalin E. Sagduyu:
Fast Initial Access with Deep Learning for Beam Prediction in 5G mmWave Networks. CoRR abs/2006.12653 (2020) - [i15]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus:
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers. CoRR abs/2007.16204 (2020) - [i14]Yi Shi, Yalin E. Sagduyu, Tugba Erpek:
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing. CoRR abs/2009.06579 (2020) - [i13]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus:
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers. CoRR abs/2012.02160 (2020) - [i12]Maice Costa, Yalin E. Sagduyu, Tugba Erpek, Muriel Médard:
Robust Improvement of the Age of Information by Adaptive Packet Coding. CoRR abs/2012.05172 (2020) - 2019
- [i11]Tugba Erpek, Sennur Ulukus, Yalin E. Sagduyu:
Interference Regime Enforcing Rate Maximization for Non-Orthogonal Multiple Access (NOMA). CoRR abs/1901.03927 (2019) - [i10]Yi Shi, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li:
Spectrum Data Poisoning with Adversarial Deep Learning. CoRR abs/1901.09247 (2019) - [i9]Yalin E. Sagduyu, Yi Shi, Tugba Erpek:
IoT Network Security from the Perspective of Adversarial Deep Learning. CoRR abs/1906.00076 (2019) - [i8]Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek:
Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification. CoRR abs/1910.05765 (2019) - [i7]Nof Abuzainab, Tugba Erpek, Kemal Davaslioglu, Yalin E. Sagduyu, Yi Shi, Sharon J. Mackey, Mitesh P. Patel, Frank Panettieri, Muhammad A. Qureshi, Volkan Isler, Aylin Yener:
QoS and Jamming-Aware Wireless Networking Using Deep Reinforcement Learning. CoRR abs/1910.05766 (2019) - [i6]Kemal Davaslioglu, Sohraab Soltani, Tugba Erpek, Yalin E. Sagduyu:
DeepWiFi: Cognitive WiFi with Deep Learning. CoRR abs/1910.13315 (2019) - [i5]Yalin E. Sagduyu, Yi Shi, Tugba Erpek:
Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks. CoRR abs/1911.00500 (2019) - 2018
- [i4]Tugba Erpek, Yalin E. Sagduyu, Yi Shi:
Deep Learning for Launching and Mitigating Wireless Jamming Attacks. CoRR abs/1807.02567 (2018) - 2017
- [i3]Timothy J. O'Shea, Tugba Erpek, T. Charles Clancy:
Deep Learning Based MIMO Communications. CoRR abs/1707.07980 (2017) - 2015
- [i2]Tugba Erpek, Ahmed Abdel-Hadi, T. Charles Clancy:
Application-Aware Resource Block and Power Allocation for LTE. CoRR abs/1511.04814 (2015) - 2014
- [i1]Tugba Erpek, Ahmed Abdel-Hadi, T. Charles Clancy:
An Optimal Application-Aware Resource Block Scheduling in LTE. CoRR abs/1405.7446 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint