default search action
Mohammad Ghafari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Ehsan Firouzi, Mohammad Ghafari:
Time to separate from StackOverflow and match with ChatGPT for encryption. J. Syst. Softw. 216: 112135 (2024) - [c70]Argianto Rahartomo, Harpreet Kaur, Mohammad Ghafari:
Gameful Introduction to Cryptography for Dyslexic Students. CSEE&T 2024: 1-5 - [c69]Arash Mazidi, Davide Corradini, Mohammad Ghafari:
Mining REST APIs for Potential Mass Assignment Vulnerabilities. EASE 2024: 369-374 - [c68]Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari:
LLM Security Guard for Code. EASE 2024: 600-603 - [c67]Ehsan Firouzi, Ammar Mansuri, Mohammad Ghafari, Maziar Kaveh:
From Struggle to Simplicity with a Usable and Secure API for Encryption in Java. ESEM 2024: 556-565 - [c66]Ehsan Firouzi, Mohammad Ghafari, Mike Ebrahimi:
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools. ESEM 2024: 582-588 - [i38]Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari:
LLM Security Guard for Code. CoRR abs/2405.01103 (2024) - [i37]Arash Mazidi, Davide Corradini, Mohammad Ghafari:
Mining REST APIs for Potential Mass Assignment Vulnerabilities. CoRR abs/2405.01111 (2024) - [i36]Argianto Rahartomo, Harpreet Kaur, Mohammad Ghafari:
Gameful Introduction to Cryptography for Dyslexic Students. CoRR abs/2406.06153 (2024) - [i35]Ehsan Firouzi, Mohammad Ghafari:
Time to Separate from StackOverflow and Match with ChatGPT for Encryption. CoRR abs/2406.06164 (2024) - [i34]Ehsan Firouzi, Ammar Mansuri, Mohammad Ghafari, Maziar Kaveh:
From Struggle to Simplicity with a Usable and Secure API for Encryption in Java. CoRR abs/2409.05128 (2024) - [i33]Ehsan Firouzi, Mohammad Ghafari, Mike Ebrahimi:
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools. CoRR abs/2409.06561 (2024) - 2023
- [c65]Jos Wetzels, Daniel Ricardo dos Santos, Mohammad Ghafari:
Insecure by Design in the Backbone of Critical Infrastructure. CPS-IoT Week Workshops 2023: 7-12 - [c64]Alexander Nicholson, Quentin Stiévenart, Arash Mazidi, Mohammad Ghafari:
Wasmizer: Curating WebAssembly-driven Projects on GitHub. MSR 2023: 130-141 - [c63]Mohammad Mehdi Pourhashem Kallehbasti, Mohammad Ghafari:
Naturalistic Static Program Analysis. SANER 2023: 743-747 - [i32]Mohammad Mehdi Pourhashem Kallehbasti, Mohammad Ghafari:
Naturalistic Static Program Analysis. CoRR abs/2301.04862 (2023) - [i31]Alexander Nicholson, Quentin Stiévenart, Arash Mazidi, Mohammad Ghafari:
Wasmizer: Curating WebAssembly-driven Projects on GitHub. CoRR abs/2303.09623 (2023) - [i30]Jos Wetzels, Daniel Ricardo dos Santos, Mohammad Ghafari:
Insecure by Design in the Backbone of Critical Infrastructure. CoRR abs/2303.12340 (2023) - 2022
- [c62]Pascal Marc André, Quentin Stiévenart, Mohammad Ghafari:
Developers Struggle with Authentication in Blazor WebAssembly. ICSME 2022: 389-393 - [c61]Noah Bühlmann, Mohammad Ghafari:
How do developers deal with security issue reports on GitHub? SAC 2022: 1580-1589 - [c60]Quentin Stiévenart, Coen De Roover, Mohammad Ghafari:
Security risks of porting C programs to webassembly. SAC 2022: 1713-1722 - [c59]Mariano Ceccato, Banani Roy, Mohammad Ghafari:
Message from the General Chair and Program Co-Chairs SCAM 2022. SCAM 2022: ix-x - [c58]Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. SANER 2022: 268-272 - [i29]Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. CoRR abs/2201.04853 (2022) - [i28]Pascal Marc André, Quentin Stiévenart, Mohammad Ghafari:
Developers Struggle with Authentication in Blazor WebAssembly. CoRR abs/2208.00258 (2022) - [i27]Mohammad Ghafari, Konstantin Rubinov, Mohammad Mehdi Pourhashem Kallehbasti:
Mining unit test cases to synthesize API usage examples. CoRR abs/2208.00264 (2022) - 2021
- [j7]Pooja Rani, Sebastiano Panichella, Manuel Leuenberger, Mohammad Ghafari, Oscar Nierstrasz:
What do class comments tell us? An investigation of comment evolution and practices in Pharo Smalltalk. Empir. Softw. Eng. 26(5): 112 (2021) - [c57]Pascal Gadient, Marc-Andrea Tarnutzer, Oscar Nierstrasz, Mohammad Ghafari:
Security Smells Pervade Mobile App Servers. ESEM 2021: 19:1-19:10 - [c56]Simon Kafader, Mohammad Ghafari:
FluentCrypto: Cryptography in Easy Mode. ICSME 2021: 402-412 - [c55]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammadhossein Shabani, Mohammad Ghafari:
Hurdles for Developers in Cryptography. ICSME 2021: 659-663 - [c54]Mohammadreza Hazhirpasand, Mohammad Ghafari:
Crypto Experts Advise What They Adopt. ASE Workshops 2021: 179-184 - [c53]Mohammadreza Hazhirpasand, Mohammad Ghafari:
Worrisome Patterns in Developers: A Survey in Cryptography. ASE Workshops 2021: 185-190 - [c52]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Dazed and Confused: What's Wrong with Crypto Libraries? PST 2021: 1-6 - [c51]Mohammadreza Hazhirpasand, Mohammad Ghafari:
Cryptography Vulnerabilities on HackerOne. QRS 2021: 18-27 - [c50]Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari:
Security Header Fields in HTTP Clients. QRS 2021: 93-101 - [c49]Quentin Stiévenart, Coen De Roover, Mohammad Ghafari:
The Security Risk of Lacking Compiler Protection in WebAssembly. QRS 2021: 132-139 - [c48]Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari:
Phish What You Wish. QRS 2021: 1048-1059 - [c47]Pooja Rani, Mathias Birrer, Sebastiano Panichella, Mohammad Ghafari, Oscar Nierstrasz:
What Do Developers Discuss about Code Comments? SCAM 2021: 153-164 - [i26]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammadhossein Shabani, Mohammad Ghafari:
Hurdles for Developers in Cryptography. CoRR abs/2108.07141 (2021) - [i25]Pascal Gadient, Marc-Andrea Tarnutzer, Oscar Nierstrasz, Mohammad Ghafari:
Security Smells Pervade Mobile App Servers. CoRR abs/2108.07188 (2021) - [i24]Simon Kafader, Mohammad Ghafari:
FluentCrypto: Cryptography in Easy Mode. CoRR abs/2108.07211 (2021) - [i23]Pooja Rani, Mathias Birrer, Sebastiano Panichella, Mohammad Ghafari, Oscar Nierstrasz:
What Do Developers Discuss about Code Comments? CoRR abs/2108.07648 (2021) - [i22]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Worrisome Patterns in Developers: A Survey in Cryptography. CoRR abs/2109.14363 (2021) - [i21]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Crypto Experts Advise What They Adopt. CoRR abs/2109.15093 (2021) - [i20]Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
Dazed and Confused: What's Wrong with Crypto Libraries? CoRR abs/2111.01406 (2021) - [i19]Quentin Stiévenart, Coen De Roover, Mohammad Ghafari:
The Security Risk of Lacking Compiler Protection in WebAssembly. CoRR abs/2111.01421 (2021) - [i18]Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari:
Phish What You Wish. CoRR abs/2111.03596 (2021) - [i17]Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari:
Security Header Fields in HTTP Clients. CoRR abs/2111.03601 (2021) - [i16]Mohammadreza Hazhirpasand, Mohammad Ghafari:
Cryptography Vulnerabilities on HackerOne. CoRR abs/2111.03859 (2021) - [i15]Noah Bühlmann, Mohammad Ghafari:
How Do Developers Deal with Security Issue Reports on GitHub? CoRR abs/2112.10359 (2021) - [i14]Quentin Stiévenart, Coen De Roover, Mohammad Ghafari:
Security Risks of Porting C Programs to WebAssembly. CoRR abs/2112.11745 (2021) - 2020
- [c46]Nitish Patkar, Mohammad Ghafari, Oscar Nierstrasz, Sofija Hotomski:
Caveats in Eliciting Mobile App Requirements. EASE 2020: 180-189 - [c45]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
Tricking Johnny into Granting Web Permissions. EASE 2020: 276-281 - [c44]Mohammad Ghafari, Timm Gross, Davide Fucci, Michael Felderer:
Why Research on Test-Driven Development is Inconclusive? ESEM 2020: 25:1-25:10 - [c43]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
Java Cryptography Uses in the Wild. ESEM 2020: 40:1-40:6 - [c42]Pascal Gadient, Mohammad Ghafari, Marc-Andrea Tarnutzer, Oscar Nierstrasz:
Web APIs in Android through the Lens of Security. SANER 2020: 13-22 - [c41]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs. SANER 2020: 632-636 - [i13]Pascal Gadient, Mohammad Ghafari, Oscar Nierstrasz:
Web APIs in Android through the Lens of Security. CoRR abs/2001.00195 (2020) - [i12]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs. CoRR abs/2001.00773 (2020) - [i11]Nitish Patkar, Mohammad Ghafari, Oscar Nierstrasz, Sofija Hotomski:
Caveats in Eliciting Mobile App Requirements. CoRR abs/2002.08458 (2020) - [i10]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
Tricking Johnny into Granting Web Permissions. CoRR abs/2002.08463 (2020) - [i9]Pooja Rani, Sebastiano Panichella, Manuel Leuenberger, Mohammad Ghafari, Oscar Nierstrasz:
What do class comments tell us? An investigation of comment evolution and practices in Pharo. CoRR abs/2005.11583 (2020) - [i8]Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz:
Security Smells in Android. CoRR abs/2006.01181 (2020) - [i7]Mohammad Ghafari, Timm Gross, Davide Fucci, Michael Felderer:
Why Research on Test-Driven Development is Inconclusive? CoRR abs/2007.09863 (2020) - [i6]Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
Java Cryptography Uses in the Wild. CoRR abs/2009.01101 (2020)
2010 – 2019
- 2019
- [j6]Pascal Gadient, Mohammad Ghafari, Patrick Frischknecht, Oscar Nierstrasz:
Security code smells in Android ICC. Empir. Softw. Eng. 24(5): 3046-3076 (2019) - [c40]Mohammad Ghafari, Markus Eggiman, Oscar Nierstrasz:
Testability First! ESEM 2019: 1-6 - [c39]Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz:
The Impact of Developer Experience in Using Java Cryptography. ESEM 2019: 1-6 - [c38]Nitish Patkar, Pascal Gadient, Mohammad Ghafari, Oscar Nierstrasz:
Towards a Catalogue of Mobile Elicitation Techniques - Research Preview. REFSQ 2019: 281-288 - [i5]Mohammad Ghafari, Markus Eggiman, Oscar Nierstrasz:
Testability First! CoRR abs/1908.01476 (2019) - [i4]Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz:
The Impact of Developer Experience in Using Java Cryptography. CoRR abs/1908.01489 (2019) - 2018
- [j5]Leonel Merino, Mohammad Ghafari, Craig Anslow, Oscar Nierstrasz:
A systematic literature review of software visualization evaluation. J. Syst. Softw. 144: 165-180 (2018) - [j4]Jan Kurs, Jan Vraný, Mohammad Ghafari, Mircea Lungu, Oscar Nierstrasz:
Efficient parsing with parser combinators. Sci. Comput. Program. 161: 57-88 (2018) - [j3]Nevena Milojkovic, Clément Béra, Mohammad Ghafari, Oscar Nierstrasz:
Mining inline cache data to order inferred types in dynamic languages. Sci. Comput. Program. 161: 105-121 (2018) - [j2]Leonel Merino, Mohammad Ghafari, Oscar Nierstrasz:
Towards actionable visualization for software developers. J. Softw. Evol. Process. 30(2) (2018) - [c37]Mohammadreza Hazhirpasand, Mohammad Ghafari:
One Leak Is Enough to Expose Them All - From a WebRTC IP Leak to Web-Based Network Scanning. ESSoS 2018: 61-76 - [c36]Claudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz:
Idea: Benchmarking Android Data Leak Detection Tools. ESSoS 2018: 116-123 - [c35]Yuriy Tymchuk, Mohammad Ghafari, Oscar Nierstrasz:
JIT feedback: what experienced developers like about static analysis. ICPC 2018: 64-73 - [c34]Sten Vercammen, Mohammad Ghafari, Serge Demeyer, Markus Borg:
Goal-oriented mutation testing with focal methods. A-TEST@ESEC/SIGSOFT FSE 2018: 23-30 - [i3]Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
The Impact of Feature Selection on Predicting the Number of Bugs. CoRR abs/1807.04486 (2018) - [i2]Sten Vercammen, Mohammad Ghafari, Serge Demeyer, Markus Borg:
Goal-oriented Mutation Testing with Focal Methods. CoRR abs/1807.10953 (2018) - [i1]Pascal Gadient, Mohammad Ghafari, Patrick Frischknecht, Oscar Nierstrasz:
Security Code Smells in Android ICC. CoRR abs/1811.12713 (2018) - 2017
- [j1]Mohammad Ghafari, Konstantin Rubinov, Mohammad Mehdi Pourhashem Kallehbasti:
Mining unit test cases to synthesize API usage examples. J. Softw. Evol. Process. 29(12) (2017) - [c33]Leonel Merino, Mohammad Ghafari, Craig Anslow, Oscar Nierstrasz:
CityVR: Gameful Software Visualization. ICSME 2017: 633-637 - [c32]Manuel Leuenberger, Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
KOWALSKI: Collecting API Clients in Easy Mode. ICSME 2017: 653-657 - [c31]Nevena Milojkovic, Mohammad Ghafari, Oscar Nierstrasz:
Exploiting type hints in method argument names to improve lightweight type inference. ICPC 2017: 77-87 - [c30]Nevena Milojkovic, Mohammad Ghafari, Oscar Nierstrasz:
It's duck (typing) season! ICPC 2017: 312-315 - [c29]Yuriy Tymchuk, Mohammad Ghafari, Oscar Nierstrasz:
Renraku: the One Static Analysis Model to Rule Them All. IWST 2017: 13:1-13:10 - [c28]Haidar Osman, Andrei Chis, Claudio Corrodi, Mohammad Ghafari, Oscar Nierstrasz:
Exception evolution in long-lived Java systems. MSR 2017: 302-311 - [c27]Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz, Mircea Lungu:
An Extensive Analysis of Efficient Bug Prediction Configurations. PROMISE 2017: 107-116 - [c26]Manuel Leuenberger, Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
Harvesting the Wisdom of the Crowd to Infer Method Nullness in Java. SCAM 2017: 71-80 - [c25]Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz:
Security Smells in Android. SCAM 2017: 121-130 - [c24]Leonel Merino, Johannes Fuchs, Michael Blumenschein, Craig Anslow, Mohammad Ghafari, Oscar Nierstrasz, Michael Behrisch, Daniel A. Keim:
On the Impact of the Medium in the Effectiveness of 3D Software Visualizations. VISSOFT 2017: 11-21 - [c23]Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
Automatic feature selection by regularization to improve bug prediction accuracy. MaLTeSQuE 2017: 27-32 - [c22]Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
Hyperparameter optimization to improve bug prediction accuracy. MaLTeSQuE 2017: 33-38 - [c21]Haidar Osman, Andrei Chis, Jakob Schaerer, Mohammad Ghafari, Oscar Nierstrasz:
On the evolution of exception usage in Java projects. SANER 2017: 422-426 - [c20]Mohammad Ghafari, Hamidreza Moradi:
A framework for classifying and comparing source code recommendation systems. SANER 2017: 555-556 - 2016
- [c19]Jan Kurs, Jan Vraný, Mohammad Ghafari, Mircea Lungu, Oscar Nierstrasz:
Optimizing Parser Combinators. IWST 2016: 1 - [c18]Leonel Merino, Dominik Seliner, Mohammad Ghafari, Oscar Nierstrasz:
CommunityExplorer: A Framework for Visualizing Collaboration Networks. IWST 2016: 2 - [c17]Yuriy Tymchuk, Mohammad Ghafari, Oscar Nierstrasz:
When QualityAssistant Meets Pharo: Enforced Code Critiques Motivate More Valuable Rules. IWST 2016: 5 - [c16]Nevena Milojkovic, Clément Béra, Mohammad Ghafari, Oscar Nierstrasz:
Inferring Types by Mining Class Usage Frequency from Inline Caches. IWST 2016: 6 - [c15]Boris Spasojevic, Mohammad Ghafari, Oscar Nierstrasz:
The Object Repository: Pulling Objects out of the Ecosystem. IWST 2016: 7 - [c14]MohammadReza Tavakoli, Abbas Heydarnoori, Mohammad Ghafari:
Improving the quality of code snippets in stack overflow. SAC 2016: 1492-1497 - [c13]Leonel Merino, Mohammad Ghafari, Oscar Nierstrasz:
Towards Actionable Visualisation in Software Development. VISSOFT 2016: 61-70 - [c12]Yuriy Tymchuk, Leonel Merino, Mohammad Ghafari, Oscar Nierstrasz:
Walls, Pillars and Beams: A 3D Decomposition of Quality Anomalies. VISSOFT 2016: 126-135 - [c11]Leonel Merino, Mohammad Ghafari, Oscar Nierstrasz, Alexandre Bergel, Juraj Kubelka:
MetaVis: Exploring Actionable Visualization. VISSOFT 2016: 151-155 - 2015
- [b1]Mohammad Ghafari:
Mining unit test cases to synthesize API usage examples automatically. Polytechnic University of Milan, Italy, 2015 - [c10]Mohammad Ghafari, Abbas Heydarnoori, Hassan Haghighi:
A Safe Stopping Protocol to Enable Reliable Reconfiguration for Component-Based Distributed Systems. FSEN 2015: 100-109 - [c9]Vahid Amintabar, Abbas Heydarnoori, Mohammad Ghafari:
ExceptionTracer: a solution recommender for exceptions in an integrated development environment. ICPC 2015: 299-302 - [c8]Mohammad Ghafari, Carlo Ghezzi, Konstantin Rubinov:
Automatically identifying focal methods under test in unit test cases. SCAM 2015: 61-70 - 2014
- [c7]Mohammad Ghafari, Abbas Heydarnoori:
Towards a visualized code recommendation for APIs enriched with specification mining. RSSE@ICSE 2014: 26-27 - [c6]Mohammad Ghafari:
Extracting Code Examples from Unit Test Cases. ICSME 2014: 667 - [c5]Mohammad Ghafari, Carlo Ghezzi, Andrea Mocci, Giordano Tamburrelli:
Mining unit tests for code recommendation. ICPC 2014: 142-145 - 2013
- [c4]Pooyan Jamshidi, Mohammad Ghafari, Aakash Ahmad, Claus Pahl:
A Framework for Classifying and Comparing Architecture-centric Software Evolution Research. CSMR 2013: 305-314 - [c3]Mohammad Ghafari, Abbas Heydarnoori:
Partial Scalability to Ensure Reliable Dynamic Reconfiguration. SASO Workshops 2013: 83-88 - 2012
- [c2]Mohammad Ghafari, Pooyan Jamshidi, Saeed Shahbazi, Hassan Haghighi:
An architectural approach to ensure globally consistent dynamic reconfiguration of component-based systems. CBSE 2012: 177-182 - [c1]Mohammad Ghafari, Hamid Shoja, Mohammad Yosef Amirani:
Detection and Prevention of Data Manipulation from Client Side in Web Applications. TrustCom 2012: 1132-1136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint