default search action
Rakesh Bobba
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i21]Unmesh Patil, Akshith Gunasekaran, Rakesh Bobba, Houssam Abbas:
ROS2-Based Simulation Framework for Cyberphysical Security Analysis of UAVs. CoRR abs/2410.03971 (2024) - 2023
- [c58]Zachary Coalson, Gabriel Ritter, Rakesh Bobba, Sanghyun Hong:
BERT Lost Patience Won't Be Robust to Adversarial Slowdown. NeurIPS 2023 - [i20]Zachary Coalson, Gabriel Ritter, Rakesh Bobba, Sanghyun Hong:
BERT Lost Patience Won't Be Robust to Adversarial Slowdown. CoRR abs/2310.19152 (2023) - 2022
- [j12]Mahsa Saeidi, McKenzie Calvert, Audrey Au, Anita Sarma, Rakesh B. Bobba:
If This Context Then That Concern: Exploring users' concerns with IFTTT applets. Proc. Priv. Enhancing Technol. 2022(1): 166-186 (2022) - [j11]Arezoo Rajabi, Mahdieh Abbasi, Rakesh B. Bobba, Kimia Tajik:
Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free. Proc. Priv. Enhancing Technol. 2022(3): 120-139 (2022) - [j10]Monowar Hasan, Sibin Mohan, Rakesh B. Bobba, Rodolfo Pellizzoni:
Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems. ACM Trans. Cyber Phys. Syst. 6(3): 22:1-22:25 (2022) - 2021
- [j9]Arezoo Rajabi, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
On the (Im)Practicality of Adversarial Perturbation for Image Privacy. Proc. Priv. Enhancing Technol. 2021(1): 85-106 (2021) - [j8]Arezoo Rajabi, Rakesh B. Bobba:
Resilience Against Data Manipulation in Distributed Synchrophasor-Based Mode Estimation. IEEE Trans. Smart Grid 12(4): 3538-3547 (2021) - [c57]Hui Xu, Guanpeng Li, Homa Alemzadeh, Rakesh Bobba, Varun Chandrasekaran, David E. Evans, Nicolas Papernot, Karthik Pattabiraman, Florian Tramèr:
Fourth International Workshop on Dependable and Secure Machine Learning - DSML 2021. DSN Workshops 2021: xvi - [c56]Ashish Kashinath, Monowar Hasan, Rakesh Kumar, Sibin Mohan, Rakesh B. Bobba, Smruti Padhy:
Safety Critical Networks using Commodity SDNs. INFOCOM 2021: 1-10 - 2020
- [c55]Mahdieh Abbasi, Arezoo Rajabi, Christian Gagné, Rakesh B. Bobba:
Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks. Canadian AI 2020: 1-14 - [c54]Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba:
Period Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems. DATE 2020: 430-435 - [c53]Homa Alemzadeh, Rakesh Bobba, Varun Chandrasekaran, David E. Evans, Nicolas Papernot, Karthik Pattabiraman, Florian Tramèr:
Third International Workshop on Dependable and Secure Machine Learning - DSML 2020. DSN Workshops 2020: x - [c52]Mahdieh Abbasi, Changjian Shui, Arezoo Rajabi, Christian Gagné, Rakesh B. Bobba:
Toward Metrics for Differentiating Out-of-Distribution Sets. ECAI 2020: 929-936 - [c51]Ashish Kashinath, Monowar Hasan, Sibin Mohan, Rakesh B. Bobba, Radhika Mittal:
Improving Dependability via Deadline Guarantees in Commodity Real-time Networks. GLOBECOM (Workshops) 2020: 1-6 - [i19]Chien-Ying Chen, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba:
On Scheduler Side-Channels in Dynamic-Priority Real-Time Systems. CoRR abs/2001.06519 (2020) - [i18]Mahdieh Abbasi, Arezoo Rajabi, Christian Gagné, Rakesh B. Bobba:
Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks. CoRR abs/2005.08321 (2020) - [i17]Arezoo Rajabi, Rakesh B. Bobba:
Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs. CoRR abs/2011.09123 (2020) - [i16]Mahsa Saeidi, McKenzie Calvert, Audrey Au, Anita Sarma, Rakesh B. Bobba:
If This Context Then That Concern: Exploring users' concerns with IFTTT applets. CoRR abs/2012.12518 (2020)
2010 – 2019
- 2019
- [c50]Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. NDSS 2019 - [c49]Chien-Ying Chen, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba, Negar Kiyavash:
A Novel Side-Channel in Real-Time Schedulers. RTAS 2019: 90-102 - [c48]Arezoo Rajabi, Rakesh B. Bobba:
False Data Detection in Distributed Oscillation Mode Estimation using Hierarchical k-means. SmartGridComm 2019: 1-7 - [i15]Hsuan-Chi Kuo, Akshith Gunasekaran, Yeongjin Jang, Sibin Mohan, Rakesh B. Bobba, David Lie, Jesse Walker:
MultiK: A Framework for Orchestrating Multiple Specialized Kernels. CoRR abs/1903.06889 (2019) - [i14]Mahdieh Abbasi, Changjian Shui, Arezoo Rajabi, Christian Gagné, Rakesh Bobba:
Toward Metrics for Differentiating Out-of-Distribution Sets. CoRR abs/1910.08650 (2019) - [i13]Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba:
Period Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems. CoRR abs/1911.11937 (2019) - [i12]Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. IACR Cryptol. ePrint Arch. 2019: 295 (2019) - 2018
- [c47]Vedanth Narayanan, Rakesh B. Bobba:
Learning Based Anomaly Detection for Industrial Arm Applications. CPS-SPC@CCS 2018: 13-23 - [c46]Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba:
A design-space exploration for allocating security tasks in multicore real-time systems. DATE 2018: 225-230 - [c45]Read Sprabery, Konstantin Evchenko, Abhilash Raj, Rakesh B. Bobba, Sibin Mohan, Roy H. Campbell:
Scheduling, Isolation, and Cache Allocation: A Side-Channel Defense. IC2E 2018: 34-40 - [i11]Arezoo Rajabi, Mahdieh Abbasi, Christian Gagné, Rakesh B. Bobba:
Towards Dependable Deep Convolutional Neural Networks (CNNs) with Out-distribution Learning. CoRR abs/1804.08794 (2018) - [i10]Chien-Ying Chen, Sibin Mohan, Rakesh B. Bobba, Rodolfo Pellizzoni, Negar Kiyavash:
ScheduLeak: A Novel Scheduler Side-Channel Attack Against Real-Time Autonomous Control Systems. CoRR abs/1806.01814 (2018) - [i9]Mahdieh Abbasi, Arezoo Rajabi, Azadeh Sadat Mozafari, Rakesh B. Bobba, Christian Gagné:
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection. CoRR abs/1808.08282 (2018) - 2017
- [c44]Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba:
Approximate Thumbnail Preserving Encryption. MPS@CCS 2017: 33-43 - [c43]Rakesh B. Bobba, Awais Rashid:
CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy. CCS 2017: 2629-2630 - [c42]Jun Ho Huh, Hyoungshick Kim, Swathi S. V. P. Rayala, Rakesh B. Bobba, Konstantin Beznosov:
I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails. CHI 2017: 387-391 - [c41]Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba:
Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems. ECRTS 2017: 23:1-23:22 - [c40]Read Sprabery, Zachary John Estrada, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Rakesh B. Bobba, Roy H. Campbell:
Trustworthy Services Built on Event-Based Probing for Layered Defense. IC2E 2017: 215-225 - [c39]Rakesh Kumar, Monowar Hasan, Smruti Padhy, Konstantin Evchenko, Lavanya Piramanayagam, Sibin Mohan, Rakesh B. Bobba:
End-to-End Network Delay Guarantees for Real-Time Systems Using SDN. RTSS 2017: 231-242 - [c38]Kim J. Kaaz, Alex Hoffer, Mahsa Saeidi, Anita Sarma, Rakesh B. Bobba:
Understanding user perceptions of privacy, and configuration challenges in home automation. VL/HCC 2017: 297-301 - [e2]Bhavani Thuraisingham, Rakesh B. Bobba, Awais Rashid:
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5394-6 [contents] - [i8]Rakesh Kumar, Monowar Hasan, Smruti Padhy, Konstantin Evchenko, Lavanya Piramanayagam, Sibin Mohan, Rakesh B. Bobba:
Dependable End-to-End Delay Constraints for Real-Time Systems using SDNs. CoRR abs/1703.01641 (2017) - [i7]Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba:
Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems. CoRR abs/1705.00138 (2017) - [i6]Chien-Ying Chen, AmirEmad Ghassami, Sibin Mohan, Negar Kiyavash, Rakesh B. Bobba, Rodolfo Pellizzoni, Man-Ki Yoon:
A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems. CoRR abs/1705.02561 (2017) - [i5]Read Sprabery, Konstantin Evchenko, Abhilash Raj, Rakesh B. Bobba, Sibin Mohan, Roy H. Campbell:
A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds. CoRR abs/1708.09538 (2017) - [i4]Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba:
A Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems. CoRR abs/1711.04808 (2017) - [i3]Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba:
Approximate Thumbnail Preserving Encryption. IACR Cryptol. ePrint Arch. 2017: 1046 (2017) - 2016
- [j7]Jun Ho Huh, Rakesh B. Bobba, Tom Markham, David M. Nicol, Julie Hull, Alexander Chernoguzov, Himanshu Khurana, Kevin Staggs, Jingwei Huang:
Next-Generation Access Control for Distributed Control Systems. IEEE Internet Comput. 20(5): 28-37 (2016) - [j6]Sibin Mohan, Man-Ki Yoon, Rodolfo Pellizzoni, Rakesh B. Bobba:
Integrating security constraints into fixed priority real-time schedulers. Real Time Syst. 52(5): 644-674 (2016) - [c37]Alvaro A. Cárdenas, Rakesh B. Bobba:
Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16). CCS 2016: 1884-1885 - [c36]Arezoo Rajabi, Rakesh B. Bobba:
A Resilient Algorithm for Power System Mode Estimation using Synchrophasors. ICSS 2016: 23-29 - [c35]Monowar Hasan, Sibin Mohan, Rakesh B. Bobba, Rodolfo Pellizzoni:
Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems. RTSS 2016: 123-134 - [c34]Gabriel A. Weaver, Kate Davis, Charles M. Davis, Edmond J. Rogers, Rakesh B. Bobba, Saman A. Zonouz, Robin Berthier, Peter W. Sauer, David M. Nicol:
Cyber-Physical models for power grid security analysis: 8-substation case. SmartGridComm 2016: 140-146 - [e1]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Alvaro A. Cárdenas, Rakesh B. Bobba:
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4568-2 [contents] - [i2]Monowar Hasan, Sibin Mohan, Rakesh B. Bobba, Rodolfo Pellizzoni:
Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems. CoRR abs/1608.07872 (2016) - 2015
- [j5]Katherine R. Davis, Charles M. Davis, Saman A. Zonouz, Rakesh B. Bobba, Robin Berthier, Luis Garcia, Peter W. Sauer:
A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures. IEEE Trans. Smart Grid 6(5): 2464-2475 (2015) - [c33]Roshan K. Thomas, Alvaro A. Cárdenas, Rakesh B. Bobba:
First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions. CCS 2015: 1705-1706 - [c32]Weijie Liu, Rakesh B. Bobba, Sibin Mohan, Roy H. Campbell:
Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraints. CNS 2015: 469-478 - [c31]Rodolfo Pellizzoni, Neda Paryab, Man-Ki Yoon, Stanley Bak, Sibin Mohan, Rakesh Bobba:
A generalized model for preventing information leakage in hard real-time systems. RTAS 2015: 271-282 - [c30]Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda N. Bashir, Konstantin Beznosov:
On the Memorability of System-generated PINs: Can Chunking Help? SOUPS 2015: 197-209 - 2014
- [j4]Saman A. Zonouz, Charles M. Davis, Katherine R. Davis, Robin Berthier, Rakesh B. Bobba, William H. Sanders:
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures. IEEE Trans. Smart Grid 5(1): 3-13 (2014) - [j3]Alvaro A. Cárdenas, Robin Berthier, Rakesh B. Bobba, Jun Ho Huh, Jorjeta G. Jetcheva, David Grochocki, William H. Sanders:
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures. IEEE Trans. Smart Grid 5(2): 906-915 (2014) - [c29]André Teixeira, György Dán, Henrik Sandberg, Robin Berthier, Rakesh B. Bobba, Alfonso Valdes:
Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures. ACC 2014: 4372-4378 - [c28]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rakesh B. Bobba:
Moving Target Defense for Hardening the Security of the Power System State Estimation. MTD@CCS 2014: 59-68 - [c27]Sibin Mohan, Man-Ki Yoon, Rodolfo Pellizzoni, Rakesh Bobba:
Real-Time Systems Security through Scheduler Constraints. ECRTS 2014: 129-140 - [c26]Robin Berthier, David I. Urbina, Alvaro A. Cárdenas, Michael Guerrero, Ulrich Herberg, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, Rakesh B. Bobba:
On the practicality of detecting anomalies with encrypted traffic in AMI. SmartGridComm 2014: 890-895 - [c25]Tawfeeq A. Shawly, Jun Liu, Nathan Burow, Saurabh Bagchi, Robin Berthier, Rakesh B. Bobba:
A risk assessment tool for advanced metering infrastructures. SmartGridComm 2014: 989-994 - 2013
- [c24]Stephen Skeirik, Rakesh B. Bobba, José Meseguer:
Formal Analysis of Fault-tolerant Group Key Management Using ZooKeeper. CCGRID 2013: 636-641 - [c23]Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell:
An empirical study on the software integrity of virtual appliances: are you really getting what you paid for? AsiaCCS 2013: 231-242 - [c22]Muhammad Salman Malik, Mirko Montanari, Jun Ho Huh, Rakesh B. Bobba, Roy H. Campbell:
Towards SDN enabled network control delegation in clouds. DSN 2013: 1-6 - [c21]György Dán, Rakesh B. Bobba, George Gross, Roy H. Campbell:
Cloud Computing for the Power Grid: From Service Composition to Assured Clouds. HotCloud 2013 - [c20]Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell:
Assessing software integrity of virtual appliances through software whitelists. NDSS 2013 - [c19]William Niemira, Rakesh B. Bobba, Peter W. Sauer, William H. Sanders:
Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters. SmartGridComm 2013: 402-407 - [c18]Ognjen Vukovic, György Dán, Rakesh B. Bobba:
Confidentiality-preserving obfuscation for cloud-based power system contingency analysis. SmartGridComm 2013: 432-437 - [c17]Robin Berthier, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, David Grochocki, Rakesh B. Bobba, Alvaro A. Cárdenas, William H. Sanders:
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures. SmartGridComm 2013: 450-455 - [c16]Muhammad Salman Malik, Robin Berthier, Rakesh B. Bobba, Roy H. Campbell, William H. Sanders:
Formal design of communication checkers for ICCP using UPPAAL. SmartGridComm 2013: 486-491 - [c15]Mirko Montanari, Jun Ho Huh, Rakesh Bobba, Roy H. Campbell:
Limiting Data Exposure in Monitoring Multi-domain Policy Conformance. TRUST 2013: 65-82 - 2012
- [j2]Saman A. Zonouz, Katherine M. Rogers, Robin Berthier, Rakeshbabu Bobba, William H. Sanders, Thomas J. Overbye:
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures. IEEE Trans. Smart Grid 3(4): 1790-1799 (2012) - [c14]Mirko Montanari, Jun Ho Huh, Derek Dagit, Rakesh Bobba, Roy H. Campbell:
Evidence of log integrity in policy-based security monitoring. DSN Workshops 2012: 1-6 - [c13]Kate L. Morrow, Erich Heine, Katherine M. Rogers, Rakeshbabu Bobba, Thomas J. Overbye:
Topology Perturbation for Detecting Malicious Data Injection. HICSS 2012: 2104-2113 - [c12]Jingwei Huang, David M. Nicol, Rakesh Bobba, Jun Ho Huh:
A framework integrating attribute-based policies into role-based access control. SACMAT 2012: 187-196 - [c11]Katherine R. Davis, Kate L. Morrow, Rakesh Bobba, Erich Heine:
Power flow cyber attacks and perturbation-based defense. SmartGridComm 2012: 342-347 - [c10]David Grochocki, Jun Ho Huh, Robin Berthier, Rakesh Bobba, William H. Sanders, Alvaro A. Cárdenas, Jorjeta G. Jetcheva:
AMI threats, intrusion detection requirements and deployment recommendations. SmartGridComm 2012: 395-400 - 2010
- [j1]Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Based Messaging: Access Control and Confidentiality. ACM Trans. Inf. Syst. Secur. 13(4): 31:1-31:35 (2010) - [c9]Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yardley, Pooja Agarwal, Erich Heine:
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols. HICSS 2010: 1-10
2000 – 2009
- 2009
- [c8]Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf:
PBES: a policy based encryption system with application to data sharing in the power grid. AsiaCCS 2009: 262-275 - [c7]Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. ESORICS 2009: 587-604 - [c6]Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana:
Usable secure mailing lists with untrusted servers. IDtrust 2009: 103-116 - [i1]Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2009: 371 (2009) - 2007
- [c5]Rakeshbabu Bobba, Himanshu Khurana:
DLPKH - Distributed Logical Public-Key Hierarchy. ICISS 2007: 110-127 - 2006
- [c4]Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana:
Using Attribute-Based Access Control to Enable Attribute-Based Messaging. ACSAC 2006: 403-413 - 2005
- [c3]Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva:
Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261 - 2003
- [c2]Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras:
Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 - [c1]Rakeshbabu Bobba, Laurent Eschenauer, Virgil D. Gligor, William A. Arbaugh:
Bootstrapping security associations for routing in mobile ad-hoc networks. GLOBECOM 2003: 1511-1515
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint