default search action
Hiroshi Yoshiura
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Takumi Nakamura, Shusuke Kawamura, Hiroshi Yoshiura, Masatsugu Ichino:
Personal Authentication for Periocular Region in Thermal and Visible Light Images by Using CNN. J. Inf. Process. 32: 396-406 (2024) - [c64]Takeya Horiuchi, Ryunosuke Shimmura, Hiroshi Yoshiura, Yoichi Midorikawa, Hideki Yoshii, Masatsugu Ichino:
Machine-Learning-Based Re-identification of Location Histories Using Features Considering Sparsity Obtained from Social Networking Services. GCCE 2024: 176-177 - 2023
- [c63]Shusuke Kawamura, Hiroshi Yoshiura, Masatsugu Ichino:
Cross-Spectral Periocular Recognition by Translating Thermal Images into Visible Light Images. GCCE 2023: 654-655 - [c62]Tomoaki Ohkawa, Hiroshi Yoshiura, Takayasu Yamaguchi:
Explainable Multimodal Fake Posts Detection Using Feature Extraction with Attention Mechanisms. QRS Companion 2023: 555-563 - 2022
- [c61]Yukari Shirota, Kotaro Kuno, Hiroshi Yoshiura:
Time Series Analysis of SHAP Values by Automobile Manufacturers Recovery Rates. ICDLT 2022: 135-141 - [c60]Takeya Horiuchi, Hiroshi Yoshiura, Yoichi Midorikawa, Hideki Yoshii, Masatsugu Ichino:
Machine Learning based Re-identification of Location Histories using Contact Information Collected from Social Networking Services. QRS Companion 2022: 129-136 - [c59]Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura:
Breaking Anonymity of Social Media by Profiling from Multimodal Information. QRS Companion 2022: 137-144 - 2021
- [c58]Takumi Nakamura, Hiroshi Yoshiura, Masatsugu Ichino:
Periocular Recognition Based on Features from Thermal and Visible-Light Images. GCCE 2021: 980-981 - [c57]Kento Yoshikawa, Masatsugu Ichino, Hiroshi Yoshiura:
Modeling Malicious Behaviors and Fake News Dissemination on Social Networks. I3E 2021: 643-655 - [c56]Kento Yoshikawa, Takumi Awa, Risa Kusano, Masatsugu Ichino, Hiroshi Yoshiura:
Reliability-Disguised Attacks on Social Network to Accelerate Fake News Dissemination. QRS Companion 2021: 841-848 - 2020
- [c55]Kento Yoshikawa, Takumi Awa, Risa Kusano, Hiroyuki Sato, Masatsugu Ichino, Hiroshi Yoshiura:
A Fake News Dissemination Model Based on Updating Reliability and Doubt among Individuals. iCAST 2020: 1-8 - [c54]Takuto Ohka, Shun Matsumoto, Masatsugu Ichino, Hiroshi Yoshiura:
Time-aware multi-resolutional approach to re-identifying location histories by using social networks. QRS Companion 2020: 176-183
2010 – 2019
- 2019
- [c53]Daisuke Uenoyama, Hiroshi Yoshiura, Masatsugu Ichino:
Personal Authentication of Iris and Periocular Recognition using XGBoost. GCCE 2019: 186-187 - [c52]Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura:
A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data. iCAST 2019: 1-8 - [c51]Hiroshi Yoshiura:
Re-identifying people from anonymous histories of their activities. iCAST 2019: 1-5 - 2018
- [j20]Shintaro Oishi, Yoshihiro Shirakawa, Masatsugu Ichino, Hiroshi Yoshiura:
Personal Identification by Integrating a Number of Features from Iris and Periocular Region Using AdaBoost. J. Inf. Process. 26: 518-528 (2018) - 2016
- [j19]Masatsugu Ichino, Hiroaki Maeda, Hiroshi Yoshiura:
Score Level Fusion for Network Traffic Application Identification. IEICE Trans. Commun. 99-B(6): 1341-1352 (2016) - [c50]Eina Hashimoto, Masatsugu Ichino, Tetsuji Kuboyama, Isao Echizen, Hiroshi Yoshiura:
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning. I3E 2016: 455-470 - 2015
- [j18]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information. IEICE Trans. Inf. Syst. 98-D(1): 78-88 (2015) - [j17]Masatsugu Ichino, Kenji Kawamoto, Toru Iwano, Mitsuhiro Hatada, Hiroshi Yoshiura:
Evaluating Header Information Features for Malware Infection Detection. J. Inf. Process. 23(5): 603-612 (2015) - [j16]Masatsugu Ichino, Yasushi Yamazaki, Hiroshi Yoshiura:
Speaker verification method for operation system of consumer electronic devices. IEEE Trans. Consumer Electron. 61(1): 96-102 (2015) - [c49]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
A Rule-Based Approach for Detecting Location Leaks of Short Text Messages. BIS (Workshops) 2015: 199-210 - [c48]Yohei Ogawa, Eina Hashimoto, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
De-anonymising Social Network Posts by Linking with Résumé. BIS (Workshops) 2015: 248-260 - [c47]Masatsugu Ichino, Hiroshi Yoshiura, Jiro Katto:
Transportation means identification of content delivery system for consumer electronic devices. ICCE 2015: 118-119 - [c46]Shintaro Oishi, Masatsugu Ichino, Hiroshi Yoshiura:
Fusion of iris and periocular user authentication by AdaBoost for mobile devices. ICCE 2015: 428-429 - 2014
- [j15]Yusuke Otsuki, Masatsugu Ichino, Soichi Kimura, Mitsuhiro Hatada, Hiroshi Yoshiura:
Evaluating payload features for malware infection detection. J. Inf. Process. 22(2): 376-387 (2014) - [c45]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure. ARES 2014: 455-460 - [c44]Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura:
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation. ARES 2014: 461-467 - 2013
- [c43]Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
Anonymizing Face Images by Using Similarity-Based Metric. ARES 2013: 517-524 - [c42]Yutaka Nishiwaki, Ryo Kato, Hiroshi Yoshiura:
Securing a B+tree for Use with Secret-Shared Databases. DNIS 2013: 246-261 - [c41]Masatsugu Ichino, Yusuke Otsuki, Mitsuhiro Hatada, Hiroshi Yoshiura:
Detection of malware infection using score level fusion with Kernel Fisher Discriminant Analysis. GCCE 2013: 536-537 - [c40]Hoang-Quoc Nguyen-Son, Anh-Tu Hoang, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services. IWDW 2013: 437-451 - [c39]Tomotaka Okuno, Akira Utsumi, Masatsugu Ichino, Hiroshi Yoshiura, Isao Echizen:
Ineluctable background checking on social networks: Linking job seeker's résumé and posts. PerCom Workshops 2013: 273-278 - 2012
- [j14]Naoto Kiribuchi, Ryo Kato, Tsukasa Endo, Takashi Nishide, Hiroshi Yoshiura:
Batch Logical Protocols for Efficient Multi-Party Computation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(10): 1718-1728 (2012) - [j13]Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation. Inf. Media Technol. 7(4): 1596-1605 (2012) - [j12]Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation. J. Inf. Process. 20(4): 861-870 (2012) - [j11]Takaaki Yamada, Isao Echizen, Hiroshi Yoshiura:
PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing. Trans. Data Hiding Multim. Secur. 7: 15-33 (2012) - [c38]Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen:
Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure. ARES 2012: 358-364 - [c37]Midori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura:
A Private Information Detector for Controlling Circulation of Private Information through Social Networks. ARES 2012: 473-478 - [c36]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Tien Dung Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services. IWDW 2012: 410-424 - 2011
- [c35]Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura:
Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation. Inscrypt 2011: 289-308 - [c34]Tomotaka Okuno, Masatsugu Ichino, Tetsuji Kuboyama, Hiroshi Yoshiura:
Content-Based De-anonymisation of Tweets. IIH-MSP 2011: 53-56 - [c33]Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols. WISA 2011: 187-202 - 2010
- [j10]Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryôichi Sasaki:
HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery. J. Digit. Forensics Secur. Law 5(2): 21-34 (2010) - [c32]Tran Hong Ngoc, Isao Echizen, Komei Kamiyama, Hiroshi Yoshiura:
New Approach to Quantification of Privacy on Social Network Sites. AINA 2010: 556-564 - [c31]Van H. Dang, Sven Wohlgemuth, Hiroshi Yoshiura, Thuc Dinh Nguyen, Isao Echizen:
Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram. FGIT-UNESST 2010: 17-30 - [c30]Koichiro Komiyama, Toshinori Seko, Yusuke Ichinose, Kei Kato, Kohei Kawano, Hiroshi Yoshiura:
In-depth Evaluation of Content-Based Phishing Detection to Clarify Its Strengths and Limitations. FGIT-UNESST 2010: 95-106 - [c29]Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura:
Measuring Accumulated Revelations of Private Information by Multiple Media. I3E 2010: 70-80 - [c28]Natsuki Watanabe, Hiroshi Yoshiura:
Detecting Revelation of Private Information on Online Social Networks. IIH-MSP 2010: 502-505 - [c27]Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura:
Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network. IIH-MSP 2010: 506-509
2000 – 2009
- 2009
- [j9]Takaaki Yamada, Yoshiyasu Takahashi, Yasuhiro Fujii, Ryu Ebisawa, Hiroshi Yoshiura, Isao Echizen:
Integrity verification method for video content using robust watermarking. Int. J. Knowl. Based Intell. Eng. Syst. 13(3-4): 141-153 (2009) - [c26]Shinta Nakayama, Hiroshi Yoshiura, Isao Echizen:
Preventing False Positives in Content-Based Phishing Detection. IIH-MSP 2009: 48-51 - 2008
- [j8]Yusuke Atomori, Isao Echizen, Masanori Dainaka, Shinta Nakayama, Hiroshi Yoshiura:
Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion. J. Digit. Inf. Manag. 6(2): 161-167 (2008) - [c25]Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura:
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. ARES 2008: 1287-1293 - [c24]Yusuke Atomori, Isao Echizen, Hiroshi Yoshiura:
Picture Watermarks Surviving General Affine Transformation and Random Distortion. IIH-MSP 2008: 315-318 - [c23]Satoshi Kaneko, Isao Echizen, Hiroshi Yoshiura:
Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models. IWDW 2008: 401-418 - [p3]Takaaki Yamada, Yoshiyasu Takahashi, Hiroshi Yoshiura, Isao Echizen:
Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream. New Directions in Intelligent Interactive Multimedia 2008: 331-340 - [p2]Takaaki Yamada, Yoshiyasu Takahashi, Yasuhiro Fujii, Ryu Ebisawa, Hiroshi Yoshiura, Isao Echizen:
Evaluation of Integrity Verification System for Video Content Using Digital Watermarking. New Directions in Intelligent Interactive Multimedia 2008: 363-372 - 2007
- [c22]Hideaki Tanaka, Shoichi Sasaki, Isao Echizen, Hiroshi Yoshiura:
Secure Generation of Digital Signature on Compromised Computer. IIH-MSP 2007: 12-15 - [c21]Isao Echizen, Yusuke Atomori, Shinta Nakayama, Hiroshi Yoshiura:
HVS-Based Robust Video Watermarking with Dual-plane Correlation. IIH-MSP 2007: 20-24 - [c20]Haruno Kataoka, Akira Utsumi, Yuki Hirose, Hiroshi Yoshiura:
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet. Security Protocols Workshop 2007: 178-188 - [c19]Hiroshi Yoshiura:
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet - (Transcript of Discussion). Security Protocols Workshop 2007: 189-190 - [p1]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Adaptive Embedding and Detection for Improved Video Watermarking. Intelligent Multimedia Data Hiding: New Directions 2007: 157-187 - 2006
- [j7]Hiroshi Yoshiura, Isao Echizen:
Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models. IEICE Trans. Inf. Syst. 89-D(1): 256-270 (2006) - [j6]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Use of Statistically Adaptive Accumulation to Improve Video Watermark Detection. Inf. Media Technol. 1(2): 1109-1122 (2006) - [c18]Masanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura:
Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. IIH-MSP 2006: 93-96 - [c17]Isao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura:
Improved Video Verification Method Using Digital Watermarking. IIH-MSP 2006: 445-448 - [c16]Isao Echizen, Koichi Tanimoto, Takaaki Yamada, Masanori Dainaka, Satoru Tezuka, Hiroshi Yoshiura:
PC-based real-time watermark embedding system with standard video interface. SMC 2006: 267-271 - [e2]Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura:
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings. Lecture Notes in Computer Science 4266, Springer 2006, ISBN 3-540-47699-7 [contents] - 2005
- [j5]Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai:
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 239-246 (2005) - [j4]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Perceptually Adaptive Video Watermarking Using Motion Estimation. Int. J. Image Graph. 5(1): 89-110 (2005) - [c15]Ryôichi Sasaki, Saneyuki Ishii, Yuu Hidaka, Hiroshi Yajima, Hiroshi Yoshiura, Yuko Murayama:
Development Concept for and Trial Application of a "Mulutiplex Risk Communicator". I3E 2005: 607-621 - [c14]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Correlation-based model of color picture watermarking against random geometric distortion. ICME 2005: 213-216 - [c13]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Improved Video Watermark Detection Using Statistically-Adaptive Accumulation. KES (4) 2005: 300-308 - [c12]Isao Echizen, Takaaki Yamada, Yasuhiro Fujii, Satoru Tezuka, Hiroshi Yoshiura:
Real-time video watermark embedding system using software on personal computer. SMC 2005: 3369-3373 - [c11]Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka:
Use of inferential statistics to estimate error probability of video watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2005: 391-399 - [e1]Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura:
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan. IFIP 181, Springer 2005, ISBN 0-387-25658-X [contents] - 2004
- [j3]Hiroshi Yoshiura, Isao Echizen:
Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion. IEICE Trans. Inf. Syst. 87-D(9): 2239-2252 (2004) - 2003
- [c10]Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Satoru Tezuka:
Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders. IWDW 2003: 184-199 - 2002
- [c9]Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki:
Legally Authorized and Unauthorized Digital Evidence. Security Protocols Workshop 2002: 67-73 - [c8]Ryôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh:
Combinatorial Optimization of Countermeasures against Illegal Copying. Security Protocols Workshop 2002: 128-144 - 2001
- [c7]Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki:
A Multi-OS Approach to Trusted Computer Systems. Security Protocols Workshop 2001: 107-114 - [c6]Hiroshi Yoshiura:
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion). Security Protocols Workshop 2001: 115-118 - 2000
- [c5]Shinsuke Honjo, Seiichi Susaki, Hiroshi Yoshiura, Hirokazu Aoshima, Satoru Tezuka, Ryôichi Sasaki, Tsukasa Saitoh, Hisashi Toyoshima:
Internet-Marks: the secure seal for WWW site authentication. ICPADS Workshops 2000: 393-398 - [c4]Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki:
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. Security Protocols Workshop 2000: 238-248 - [c3]Hiroshi Yoshiura:
Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion). Security Protocols Workshop 2000: 249-252
1990 – 1999
- 1999
- [j2]Isao Echizen, Hiroshi Yoshiura, Takao Arai, Hiroyuki Kimura, Toshifumi Takeuchi:
General quality maintenance module for motion picture watermarking. IEEE Trans. Consumer Electron. 45(4): 1150-1158 (1999) - [c2]Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryôichi Sasaki, Satoru Tezuka:
INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds. Security Protocols Workshop 1999: 195-207 - 1998
- [c1]Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi:
Secure Fingerprinting Using Public-Key Cryptography (Position Paper). Security Protocols Workshop 1998: 83-89
1980 – 1989
- 1984
- [j1]Hiroshi Yoshiura, Kikuo Fujimura, Tosiyasu L. Kunii:
Top-Down Construction of 3-D Mechanical Object Shapes from Engineering Drawings. Computer 17(12): 32-40 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint