


default search action
Qiaoyan Yu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Pruthvy Yellu, Nishanth Goud Chennagouni
, Qiaoyan Yu
:
INEAD: Intermediate Node Evaluation-Based Attack Detection for Secure Approximate Computing Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(3): 716-727 (2024) - [c73]Mohammad Mezanur Rahman Monjur, Qiaoyan Yu
:
Advanced Continuous-Time Convolution Framework for Security Assurance in Wireless Sensor Networks. ACM Great Lakes Symposium on VLSI 2024: 319-322 - [c72]Nishanth Goud Chennagouni
, Mashrafi Alam Kajol
, Diliang Chen
, Dongpeng Xu
, Qiaoyan Yu
:
Feature-driven Approximate Computing for Wearable Health-Monitoring Systems. ACM Great Lakes Symposium on VLSI 2024: 712-717 - [c71]Mohammad Mezanur Rahman Monjur, Qiaoyan Yu:
CTC: Continuous-Time Convolution based Multi-Attack Detection for Sensor Networks. ISCAS 2024: 1-5 - 2023
- [j28]Kai Yang, Lei Hou
, Jianfeng Man, Qiaoyan Yu, Yu Li, Xinru Zhang, Jiaquan Liu:
Supply reliability analysis of natural gas pipeline network based on demand-side economic loss risk. Reliab. Eng. Syst. Saf. 230: 108961 (2023) - [j27]Mashrafi Alam Kajol
, Mohammad Mezanur Rahman Monjur, Qiaoyan Yu
:
A Circuit-Level Solution for Secure Temperature Sensor. Sensors 23(12): 5685 (2023) - [j26]Pruthvy Yellu, Qiaoyan Yu
:
Securing Approximate Computing Systems via Obfuscating Approximate-Precise Boundary. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(1): 27-40 (2023) - [j25]Mohammad Mezanur Rahman Monjur, Joshua Calzadillas
, Qiaoyan Yu
:
Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry. ACM Trans. Design Autom. Electr. Syst. 28(5): 83:1-83:22 (2023) - [c70]Nishanth Goud Chennagouni, Mohammad Mezanur Rahman Monjur, Wei Lu, Qiaoyan Yu:
A Hybrid Neural Network for Simultaneous Multi-Attack Detection in Sensor Networks. AsianHOST 2023: 1-6 - [c69]Mashrafi Alam Kajol
, Sandeep Sunkavilli, Qiaoyan Yu:
AHD-LAM: A New Mitigation Method against Voltage-Drop Attacks in Multi-tenant FPGAs. AsianHOST 2023: 1-6 - [c68]Mashrafi Alam Kajol, Qiaoyan Yu:
Attack-Resilient Temperature Sensor Design. ISCAS 2023: 1-5 - 2022
- [c67]Diliang Chen, Nozhan Ghoreishi, Femi Olugbon
, Stella Ansah, Ming-Chun Huang, Qiaoyan Yu:
Optimal pressure sensor locations in smart insoles for heel-strike and toe-off detection. BioCAS 2022: 458-461 - [c66]Mohammad Mezanur Rahman Monjur, Joshua Calzadillas, Mashrafi Alam Kajol
, Qiaoyan Yu
:
Hardware Security in Advanced Manufacturing. ACM Great Lakes Symposium on VLSI 2022: 469-474 - [c65]Qiaoyan Yu:
Session details: Session 6A: Special Session -1: Machine Learning and Hardware Attacks. ACM Great Lakes Symposium on VLSI 2022 - [c64]Sandeep Sunkavilli, Qiaoyan Yu:
Security Threats and Countermeasure Deployment Using Partial Reconfiguration in FPGA CAD Tools. HOST 2022: 33-36 - [c63]Mohammad Mezanur Rahman Monjur, Joseph Heacock, Joshua Calzadillas, Rui Sun, Qiaoyan Yu
:
Challenges of Securing Low-Power LoRaWAN Devices Deployed in Advanced Manufacturing. ISQED 2022: 1 - [c62]Sandeep Sunkavilli, Nishanth Goud Chennagouni, Qiaoyan Yu:
DPReDO: Dynamic Partial Reconfiguration enabled Design Obfuscation for FPGA Security. SOCC 2022: 1-6 - [p2]Qiaoyan Yu, Pruthvy Yellu, Landon Buell:
Towards Securing Approximate Computing Systems: Security Threats and Attack Mitigation. Approximate Computing 2022: 333-361 - 2021
- [j24]Jiaquan Liu, Lei Hou, Xin Wang, Rui Zhang, Xingshen Sun, Lei Xu, Qiaoyan Yu:
Explainable fault diagnosis of gas-liquid separator based on fully convolutional neural network. Comput. Chem. Eng. 155: 107535 (2021) - [j23]Pruthvy Yellu, Landon Buell, Miguel Mark, Michel A. Kinsy, Dongpeng Xu, Qiaoyan Yu
:
Security Threat Analyses and Attack Models for Approximate Computing Systems: From Hardware and Micro-architecture Perspectives. ACM Trans. Design Autom. Electr. Syst. 26(4): 32:1-32:31 (2021) - [c61]Zhiming Zhang, Ivan Miketic, Emre Salman, Qiaoyan Yu:
Assessing Correlation Power Analysis (CPA) Attack Resilience of Transistor-Level Logic Locking. ACM Great Lakes Symposium on VLSI 2021: 415-420 - [c60]Sandeep Sunkavilli, Zhiming Zhang, Qiaoyan Yu
:
Analysis of Attack Surfaces and Practical Attack Examples in Open Source FPGA CAD Tools. ISQED 2021: 504-509 - [c59]Zhiming Zhang, Ivan Miketic, Emre Salman, Qiaoyan Yu:
Towards Enhancing Power-Analysis Attack Resilience for Logic Locking Techniques. ISVLSI 2021: 132-137 - [c58]Sandeep Sunkavilli, Zhiming Zhang, Qiaoyan Yu
:
New Security Threats on FPGAs: From FPGA Design Tools Perspective. ISVLSI 2021: 278-283 - [c57]Dongpeng Xu
, Binbin Liu, Weijie Feng, Jiang Ming, Qilong Zheng, Jing Li, Qiaoyan Yu
:
Boosting SMT solver performance on mixed-bitwise-arithmetic expressions. PLDI 2021: 651-664 - 2020
- [j22]Zhiming Zhang, Jaya Dofe, Qiaoyan Yu:
Improving power analysis attack resistance using intrinsic noise in 3D ICs. Integr. 73: 30-42 (2020) - [j21]Zhiming Zhang, Jaya Dofe, Pruthvy Yellu, Qiaoyan Yu
:
Comprehensive Analysis on Hardware Trojans in 3D ICs: Characterization and Experimental Impact Assessment. SN Comput. Sci. 1(4): 233 (2020) - [j20]Antonio Miele
, Qiaoyan Yu
, Maria K. Michael
:
Guest Editor's Introduction: Special Section on Reliability-Aware Design and Analysis Methods for Digital Systems: From Gate to System Level. IEEE Trans. Emerg. Top. Comput. 8(3): 561-563 (2020) - [c56]Pruthvy Yellu, Mohammad Mezanur Rahman Monjur, Timothy Kammerer, Dongpeng Xu
, Qiaoyan Yu
:
Security Threats and Countermeasures for Approximate Arithmetic Computing. ASP-DAC 2020: 259-264 - [c55]Pruthvy Yellu, Landon Buell, Dongpeng Xu
, Qiaoyan Yu:
Blurring Boundaries: A New Way to Secure Approximate Computing Systems. ACM Great Lakes Symposium on VLSI 2020: 327-332 - [c54]Mohammad Shafeul Wara, Qiaoyan Yu
:
New Replay Attacks on ZigBee Devices for Internet-of-Things (IoT) Applications. ICESS 2020: 1-6 - [c53]Pruthvy Yellu, Qiaoyan Yu:
Can We Securely Use Approximate Computing? ISCAS 2020: 1-5 - [c52]Zhiming Zhang, Qiaoyan Yu:
Invariance Checking Based Trojan Detection Method for Three-Dimensional Integrated Circuits. ISCAS 2020: 1-5 - [c51]Zhiming Zhang, Qiaoyan Yu:
FTAI: Frequency-based Trojan-Activity Identification Method for 3D Integrated Circuits. MWSCAS 2020: 281-284 - [c50]Mohammad Mezanur Rahman Monjur, Sandeep Sunkavilli, Qiaoyan Yu
:
ADobf: Obfuscated Detection Method against Analog Trojans on I2C Master-Slave Interface. MWSCAS 2020: 1064-1067
2010 – 2019
- 2019
- [j19]Lake Bu
, Jaya Dofe, Qiaoyan Yu, Michel A. Kinsy:
SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems. J. Hardw. Syst. Secur. 3(3): 200-218 (2019) - [j18]Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Qiaoyan Yu
:
Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense. IEEE Trans. Very Large Scale Integr. Syst. 27(3): 665-678 (2019) - [j17]Yuejun Zhang, Zhao Pan, Pengjun Wang
, Dailu Ding, Qiaoyan Yu
:
A 0.1-pJ/b and ACF <0.04 Multiple-Valued PUF for Chip Identification Using Bit-Line Sharing Strategy in 65-nm CMOS. IEEE Trans. Very Large Scale Integr. Syst. 27(5): 1043-1052 (2019) - [c49]Jiawei Wang, Yuejun Zhang, Pengjun Wang, Zhicun Luan, Xiaoyong Xue, Xiaoyang Zeng, Qiaoyan Yu:
An Orthogonal Algorithm for Key Management in Hardware Obfuscation. AsianHOST 2019: 1-4 - [c48]Pruthvy Yellu, Novak Boskov, Michel A. Kinsy, Qiaoyan Yu:
Security Threats in Approximate Computing Systems. ACM Great Lakes Symposium on VLSI 2019: 387-392 - [c47]Pruthvy Yellu, Zhiming Zhang, Mohammad Mezanur Rahman Monjur, Ranuli Abeysinghe, Qiaoyan Yu:
Emerging Applications of 3D Integration and Approximate Computing in High-Performance Computing Systems: Unique Security Vulnerabilities. HPEC 2019: 1-7 - [c46]Zhiming Zhang, Qiaoyan Yu:
Modeling Hardware Trojans in 3D ICs. ISVLSI 2019: 483-488 - 2018
- [j16]Yuejun Zhang, Dailu Ding, Zhao Pan, Pengjun Wang, Qiaoyan Yu:
An ultra-low power multiplier using multi-valued adiabatic logic in 65 nm CMOS process. Microelectron. J. 78: 26-34 (2018) - [j15]Jaya Dofe, Qiaoyan Yu
:
Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(2): 273-285 (2018) - [j14]Chen Yan
, Jaya Dofe, Scott Kontak, Qiaoyan Yu, Emre Salman
:
Hardware-Efficient Logic Camouflaging for Monolithic 3-D ICs. IEEE Trans. Circuits Syst. II Express Briefs 65-II(6): 799-803 (2018) - [c45]Jaya Dofe, Qiaoyan Yu:
Exploiting PDN noise to thwart correlation power analysis attacks in 3D ICs. SLIP@DAC 2018: 6:1-6:6 - [c44]Zhiming Zhang, Qiaoyan Yu:
A Survey on Energy Efficiency Techniques for Secure Computing Systems. IGSC 2018: 1-6 - [c43]Zhiming Zhang, Qiaoyan Yu, Laurent Njilla, Charles A. Kamhoua:
FPGA-oriented moving target defense against security threats from malicious FPGA tools. HOST 2018: 163-166 - [c42]Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Qiaoyan Yu:
Securing FPGA-based obsolete component replacement for legacy systems. ISQED 2018: 401-406 - [c41]Qiaoyan Yu, Zhiming Zhang, Jaya Dofe:
Investigating Reliability and Security of Integrated Circuits and Systems. ISVLSI 2018: 106-111 - [c40]Zhiming Zhang, Qiaoyan Yu:
Exploiting Principle of Moving Target Defense to Secure FPGA Systems. ISVLSI 2018: 393-398 - 2017
- [j13]Jonathan Frey, Qiaoyan Yu:
A hardened network-on-chip design using runtime hardware Trojan mitigation methods. Integr. 56: 15-31 (2017) - [c39]Rishad A. Shafik, Qiaoyan Yu, S. Saqib Khursheed, Antonio Miele
:
Welcome Message. DFT 2017 - [c38]Jaya Dofe, Peng Gu, Dylan C. Stow, Qiaoyan Yu, Eren Kursun, Yuan Xie:
Security Threats and Countermeasures in Three-Dimensional Integrated Circuits. ACM Great Lakes Symposium on VLSI 2017: 321-326 - [c37]Jaya Dofe, Zhiming Zhang, Qiaoyan Yu, Chen Yan, Emre Salman:
Impact of Power Distribution Network on Power Analysis Attacks in Three-Dimensional Integrated Circuits. ACM Great Lakes Symposium on VLSI 2017: 327-332 - [c36]Sean Kramer, Zhiming Zhang, Jaya Dofe, Qiaoyan Yu:
Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank. ACM Great Lakes Symposium on VLSI 2017: 483-486 - [c35]Jaya Dofe, Qiaoyan Yu:
Analyzing security vulnerabilities of three-dimensional integrated circuits. HOST 2017: 156 - [c34]Mohammad Raashid Ansari, W. Thomas Miller III, Chenghua She, Qiaoyan Yu:
A low-cost masquerade and replay attack detection method for CAN in automobiles. ISCAS 2017: 1-4 - [c33]Qiaoyan Yu, Jaya Dofe, Zhiming Zhang:
Exploiting hardware obfuscation methods to prevent and detect hardware Trojans. MWSCAS 2017: 819-822 - 2016
- [j12]Kejun Wu, Peng Liu, Weidong Wang, Qiaoyan Yu, Yingtao Jiang:
PSS4: Four-Phase Shifted Sinusoid Symbol Signaling for High Speed I/O interconnects. Comput. Electr. Eng. 51: 104-117 (2016) - [j11]Jaya Dofe, Hoda Pahlevanzadeh, Qiaoyan Yu:
A Comprehensive FPGA-Based Assessment on Fault-Resistant AES against Correlation Power Analysis Attack. J. Electron. Test. 32(5): 611-624 (2016) - [c32]Hoda Pahlevanzadeh, Jaya Dofe, Qiaoyan Yu:
Assessing CPA resistance of AES with different fault tolerance mechanisms. ASP-DAC 2016: 661-666 - [c31]Omer Khan, Maria K. Michael, Antonio Miele
, Qiaoyan Yu:
Foreword. DFT 2016: iii - [c30]Jaya Dofe, Qiaoyan Yu, Hailang Wang, Emre Salman:
Hardware Security Threats and Potential Countermeasures in Emerging 3D ICs. ACM Great Lakes Symposium on VLSI 2016: 69-74 - [c29]Jaya Dofe, Chen Yan, Scott Kontak, Emre Salman, Qiaoyan Yu:
Transistor-level camouflaged logic locking method for monolithic 3D IC security. AsianHOST 2016: 1-6 - [c28]Jaya Dofe, Jonathan Frey, Qiaoyan Yu:
Hardware security assurance in emerging IoT applications. ISCAS 2016: 2050-2053 - [c27]Jaya Dofe, Yuejun Zhang, Qiaoyan Yu:
DSD: A Dynamic State-Deflection Method for Gate-Level Netlist Obfuscation. ISVLSI 2016: 565-570 - 2015
- [j10]Jaya Dofe, Jonathan Frey, Hoda Pahlevanzadeh, Qiaoyan Yu:
Strengthening SIMON Implementation Against Intelligent Fault Attacks. IEEE Embed. Syst. Lett. 7(4): 113-116 (2015) - [c26]Mohammad Raashid Ansari, Shucheng Yu
, Qiaoyan Yu:
IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles. DFTS 2015: 233-236 - [c25]Patrick Nsengiyumva, Qiaoyan Yu:
Investigation of single-event upsets in dynamic logic based flip-flops. ISCAS 2015: 818-821 - [c24]Jaya Dofe, Connor Reed, Ning Zhang, Qiaoyan Yu:
Fault-tolerant methods for a new lightweight cipher SIMON. ISQED 2015: 460-464 - [c23]Jaya Dofe, Jonathan Frey, Patrick Nsengiyumva, Qiaoyan Yu:
Investigating power characteristics of memristor-based logic gates and their applications in a security primitive. MWSCAS 2015: 1-4 - [c22]Jonathan Frey, Qiaoyan Yu:
Exploiting state obfuscation to detect hardware trojans in NoC network interfaces. MWSCAS 2015: 1-4 - 2014
- [j9]Hoda Pahlevanzadeh, Qiaoyan Yu:
A New Analytical Model of SET Latching Probability for Circuits Experiencing Single- or Multiple-Cycle Single-Event Transients. J. Electron. Test. 30(5): 595-609 (2014) - [j8]Wafi Danesh
, Jaya Dofe
, Qiaoyan Yu
:
Efficient Hardware Trojan Detection with Differential Cascade Voltage Switch Logic. VLSI Design 2014: 652187:1-652187:11 (2014) - [j7]Yu-Cheng Fan
, Qiaoyan Yu
, Thomas Schumann
, Ying-Ren Chien
, Chih-Cheng Lu
:
Advanced VLSI Architecture Design for Emerging Digital Systems. VLSI Design 2014: 746132:1-746132:2 (2014) - [c21]Kejun Wu, Hoda Pahlevanzadeh, Peng Liu, Qiaoyan Yu:
A new fault injection method for evaluation of combining SEU and SET effects on circuit reliability. ISCAS 2014: 602-605 - [c20]Kejun Wu, Peng Liu, Qiaoyan Yu:
A novel signaling technique for high-speed wireline backplane transceiver: Four phase-shifted sinusoid symbol (PSS-4). ISCAS 2014: 2141-2144 - [c19]Hoda Pahlevanzadeh, Qiaoyan Yu:
Systematic analyses for latching probability of single-event transients. ISQED 2014: 442-449 - 2013
- [j6]Qiaoyan Yu, Meilin Zhang, Paul Ampadu:
Addressing network-on-chip router transient errors with inherent information redundancy. ACM Trans. Embed. Comput. Syst. 12(4): 105:1-105:21 (2013) - [c18]Qiaoyan Yu, Jonathan Frey:
Exploiting error control approaches for Hardware Trojans on Network-on-Chip links. DFTS 2013: 266-271 - [c17]Qiaoyan Yu, Drew Stock:
Collaborative error control method for sequential logic circuits. ISCAS 2013: 785-788 - [c16]Tao Zhang, Qiaoyan Yu:
A fully integrated video digital-to-analog converter with minimized gain error. ISCAS 2013: 837-840 - [c15]Kejun Wu, Peng Liu, Qiaoyan Yu:
A novel energy-efficient serializer design method for gigascale systems. ISCAS 2013: 1978-1981 - 2012
- [j5]Qiaoyan Yu, Paul Ampadu:
Dual-Layer Adaptive Error Control for Network-on-Chip Links. IEEE Trans. Very Large Scale Integr. Syst. 20(7): 1304-1317 (2012) - [c14]Qiaoyan Yu, Paul Ampadu:
Transient error management for partially adaptive router in network-on-chip (NoC). ISCAS 2012: 1672-1675 - [c13]Meilin Zhang, Qiaoyan Yu, Paul Ampadu:
Fine-grained splitting methods to address permanent errors in Network-on-Chip links. ISCAS 2012: 2717-2720 - [c12]Qiaoyan Yu, José Cano
, José Flich
, Paul Ampadu:
Transient and Permanent Error Control for High-End Multiprocessor Systems-on-Chip. NOCS 2012: 169-176 - 2011
- [j4]Qiaoyan Yu, Paul Ampadu:
A Dual-Layer Method for Transient and Permanent Error Co-Management in NoC Links. IEEE Trans. Circuits Syst. II Express Briefs 58-II(1): 36-40 (2011) - [c11]Qiaoyan Yu, Meilin Zhang, Paul Ampadu:
Exploiting inherent information redundancy to manage transient errors in NoC routing arbitration. NOCS 2011: 105-112 - [c10]Qiaoyan Yu, Meilin Zhang, Paul Ampadu:
A comprehensive Networks-on-Chip simulator for error control explorations. NOCS 2011: 263-264 - [p1]Paul Ampadu, Bo Fu, David Wolpert, Qiaoyan Yu:
Adaptive Voltage Control for Energy-Efficient NoC Links. Low Power Networks-on-Chip 2011: 45-69 - 2010
- [j3]Qiaoyan Yu, Paul Ampadu:
A Flexible Parallel Simulator for Networks-on-Chip With Error Control. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 29(1): 103-116 (2010) - [c9]Qiaoyan Yu, Bo Zhang, Yan Li, Paul Ampadu:
Error control integration scheme for reliable NoC. ISCAS 2010: 3893-3896 - [c8]Qiaoyan Yu, Paul Ampadu:
Transient and Permanent Error Co-management Method for Reliable Networks-on-Chip. NOCS 2010: 145-154
2000 – 2009
- 2009
- [j2]Qiaoyan Yu, Paul Ampadu:
Adaptive error control for nanometer scale network-on-chip links. IET Comput. Digit. Tech. 3(6): 643-659 (2009) - [j1]Dennis Huo, Qiaoyan Yu, David Wolpert, Paul Ampadu:
A simulator for ballistic nanostructures in a 2-D electron gas. ACM J. Emerg. Technol. Comput. Syst. 5(1): 5:1-5:21 (2009) - [c7]Qiaoyan Yu, Paul Ampadu:
Dual-Layer Cooperative Error Control for Reliable Nanoscale Networks-on-Chip. DFT 2009: 431-439 - 2008
- [c6]Qiaoyan Yu, Paul Ampadu:
Adaptive Error Control for NoC Switch-to-Switch Links in a Variable Noise Environment. DFT 2008: 352-360 - [c5]Qiaoyan Yu, Paul Ampadu:
Adaptive error control for reliable systems-on-chip. ISCAS 2008: 832-835 - [c4]Qiaoyan Yu, Paul Ampadu:
Configurable error correction for multi-wire errors in switch-to-switch SOC links. SoCC 2008: 71-74 - 2007
- [c3]Dennis Huo, Qiaoyan Yu, Paul Ampadu:
A ballistic nanoelectronic device simulator. NANOARCH 2007: 38-45 - 2006
- [c2]Bo Fu, Qiaoyan Yu, Paul Ampadu:
Energy-delay minimization in nanoscale domino logic. ACM Great Lakes Symposium on VLSI 2006: 316-319 - [c1]Qiaoyan Yu, Paul Ampadu:
Cell Ratio Bounds for Reliable SRAM Operation. ICECS 2006: 1192-1195
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint