default search action
Fengwei Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Hongyi Lu, Zhibo Liu, Shuai Wang, Fengwei Zhang:
DTD: Comprehensive and Scalable Testing for Debuggers. Proc. ACM Softw. Eng. 1(FSE): 1172-1193 (2024) - [j24]Jingquan Ge, Fengwei Zhang:
SnapMem: Hardware/Software Cooperative Memory Resistant to Cache-Related Attacks on ARM-FPGA Embedded SoC. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 2902-2915 (2024) - [j23]Lei Zhou, Fengwei Zhang, Kevin Leach, Xuhua Ding, Zhenyu Ning, Guojun Wang, Jidong Xiao:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. IEEE Trans. Dependable Secur. Comput. 21(4): 2085-2098 (2024) - [j22]Chenxu Wang, Yunjie Deng, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang:
Building a Lightweight Trusted Execution Environment for Arm GPUs. IEEE Trans. Dependable Secur. Comput. 21(4): 3801-3816 (2024) - [j21]Tai Yue, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu, Lei Zhou:
Armor: Protecting Software Against Hardware Tracing Techniques. IEEE Trans. Inf. Forensics Secur. 19: 4247-4262 (2024) - [c64]Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu:
ESem: To Harden Process Synchronization for Servers. AsiaCCS 2024 - [c63]Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Hai Jin, Zhenkai Liang:
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches. CCS 2024: 3898-3912 - [c62]Jinting Wu, Haodong Zheng, Yu Wang, Tai Yue, Fengwei Zhang:
TATOO: A Flexible Hardware Platform for Binary-Only Fuzzing. DAC 2024: 204:1-204:6 - [c61]Jinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang, Zhenyu Ning, Man Ho Au, Weisong Shi:
BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts. DSN 2024: 389-402 - [c60]Yihao Luo, Yunjie Deng, Jingquan Ge, Zhenyu Ning, Fengwei Zhang:
BootRIST: Detecting and Isolating Mercurial Cores at the Booting Stage. ESORICS (2) 2024: 85-103 - [c59]Zhenyu Ye, Lei Zhou, Fengwei Zhang, Wenqiang Jin, Zhenyu Ning, Yupeng Hu, Zheng Qin:
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor. ISSTA 2024: 38-50 - [c58]Yunkai Bai, Peinan Li, Yubiao Huang, Michael C. Huang, Shijun Zhao, Lutan Zhao, Fengwei Zhang, Dan Meng, Rui Hou:
HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management. MICRO 2024: 105-120 - [c57]Chenxu Wang, Fengwei Zhang, Yunjie Deng, Kevin Leach, Jiannong Cao, Zhenyu Ning, Shoumeng Yan, Zhengyu He:
CAGE: Complementing Arm CCA with GPU Extensions. NDSS 2024 - [c56]Tai Yue, Yibo Jin, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu:
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing. RAID 2024: 450-464 - [c55]Haoyang Huang, Fengwei Zhang, Shoumeng Yan, Tao Wei, Zhengyu He:
SoK: A Comparison Study of Arm TrustZone and CCA. SEED 2024: 107-118 - [c54]Hongyi Lu, Shuai Wang, Yechang Wu, Wanning He, Fengwei Zhang:
MOAT: Towards Safe BPF Kernel Extension. USENIX Security Symposium 2024 - [i8]Pengzhou Cheng, Wei Du, Zongru Wu, Fengwei Zhang, Libo Chen, Gongshen Liu:
Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models. CoRR abs/2402.18945 (2024) - [i7]Junjie Ma, Muhui Jiang, Jinan Jiang, Xiapu Luo, Yufeng Hu, Yajin Zhou, Qi Wang, Fengwei Zhang:
Demystifying the DAO Governance Process. CoRR abs/2403.11758 (2024) - [i6]Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Hai Jin, Zhenkai Liang:
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches. CoRR abs/2409.04484 (2024) - 2023
- [j20]Xuefeng Song, Fei Dai, Fengwei Zhang, Dengming Wang, Yuchen Liu:
Calibration of DEM models for fertilizer particles based on numerical simulations and granular experiments. Comput. Electron. Agric. 204: 107507 (2023) - [j19]Xuefeng Song, Fei Dai, Xuekun Zhang, Huhu Chen, Fengwei Zhang, Wuyun Zhao:
Numerical analyses ridge-forming for whole film-mulching and double ridge-furrow, a discrete element method. Comput. Electron. Agric. 215: 108364 (2023) - [j18]Zhenyu Ning, Chenxu Wang, Yinhua Chen, Fengwei Zhang, Jiannong Cao:
Revisiting ARM Debugging Features: Nailgun and its Defense. IEEE Trans. Dependable Secur. Comput. 20(1): 574-589 (2023) - [c53]Jingquan Ge, Fengwei Zhang:
FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A. AsiaCCS 2023: 190-204 - [c52]Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. CCS 2023: 341-355 - [c51]Yiming Zhang, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang:
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features. ISSTA 2023: 917-928 - [c50]Yu Wang, Jinting Wu, Haodong Zheng, Zhenyu Ning, Boyuan He, Fengwei Zhang:
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V. RAID 2023: 595-608 - [c49]Wanning He, Hongyi Lu, Fengwei Zhang, Shuai Wang:
RingGuard: Guard io_uring with eBPF. eBPF@SIGCOMM 2023: 56-62 - [c48]Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, Zhengyu He:
SHELTER: Extending Arm CCA with Isolation in User Space. USENIX Security Symposium 2023: 6257-6274 - [i5]Hongyi Lu, Shuai Wang, Yechang Wu, Wanning He, Fengwei Zhang:
MOAT: Towards Safe BPF Kernel Extension. CoRR abs/2301.13421 (2023) - 2022
- [j17]Pengzhou Cheng, Mu Han, Aoxue Li, Fengwei Zhang:
STC-IDS: Spatial-temporal correlation feature analyzing based intrusion detection system for intelligent connected vehicles. Int. J. Intell. Syst. 37(11): 9532-9561 (2022) - [j16]Li Yang, Cheng Li, Teng Wei, Fengwei Zhang, Jianfeng Ma, Naixue Xiong:
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices. IEEE Internet Things J. 9(12): 10093-10107 (2022) - [j15]Xusheng Chen, Shixiong Zhao, Ji Qi, Jianyu Jiang, Haoze Song, Cheng Wang, Tsz On Li, T.-H. Hubert Chan, Fengwei Zhang, Xiapu Luo, Sen Wang, Gong Zhang, Heming Cui:
Efficient and DoS-resistant Consensus for Permissioned Blockchains. Perform. Evaluation 153: 102244 (2022) - [j14]Xusheng Chen, Shixiong Zhao, Ji Qi, Jianyu Jiang, Haoze Song, Cheng Wang, Tsz On Li, T.-H. Hubert Chan, Fengwei Zhang, Xiapu Luo, Sen Wang, Gong Zhang, Heming Cui:
Efficient and DoS-resistant Consensus for Permissioned Blockchains. SIGMETRICS Perform. Evaluation Rev. 49(3): 61-62 (2022) - [j13]Tianxiang Shen, Jianyu Jiang, Yunpeng Jiang, Xusheng Chen, Ji Qi, Shixiong Zhao, Fengwei Zhang, Xiapu Luo, Heming Cui:
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network. IEEE Trans. Dependable Secur. Comput. 19(4): 2286-2303 (2022) - [j12]Saeid Mofrad, Ishtiaq Ahmed, Fengwei Zhang, Shiyong Lu, Ping Yang, Heming Cui:
Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments. IEEE Trans. Dependable Secur. Comput. 19(6): 4187-4203 (2022) - [c47]Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi:
Speedster: An Efficient Multi-party State Channel via Enclaves. AsiaCCS 2022: 637-651 - [c46]Yunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang:
StrongBox: A GPU TEE on Arm Endpoints. CCS 2022: 769-783 - [c45]Hongyi Lu, Fengwei Zhang:
Raven: a novel kernel debugging tool on RISC-V. DAC 2022: 1039-1044 - [c44]Yu Wang, Jinting Wu, Tai Yue, Zhenyu Ning, Fengwei Zhang:
RetTag: hardware-assisted return address integrity on RISC-V. EuroSec@EUROSYS 2022: 50-56 - [c43]Lei Zhou, Xuhua Ding, Fengwei Zhang:
Smile: Secure Memory Introspection for Live Enclave. SP 2022: 386-401 - [c42]Tianxiang Shen, Ji Qi, Jianyu Jiang, Xian Wang, Siyuan Wen, Xusheng Chen, Shixiong Zhao, Sen Wang, Li Chen, Xiapu Luo, Fengwei Zhang, Heming Cui:
SOTER: Guarding Black-box Inference for General Neural Networks at the Edge. USENIX ATC 2022: 723-738 - [i4]Rabimba Karanjai, Lei Xu, Lin Chen, Fengwei Zhang, Zhimin Gao, Weidong Shi:
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research. CoRR abs/2203.12724 (2022) - [i3]Mu Han, Pengzhou Cheng, Fengwei Zhang:
STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles. CoRR abs/2204.10990 (2022) - 2021
- [j11]Yizhuo Zhang, Fengwei Zhang, Jinxiang Cheng, Huan Zhao:
Classification and Recognition of Fish Farming by Extraction New Features to Control the Economic Aquatic Product. Complex. 2021: 5530453:1-5530453:9 (2021) - [j10]Lei Zhou, Fengwei Zhang, Jidong Xiao, Kevin Leach, Westley Weimer, Xuhua Ding, Guojun Wang:
A Coprocessor-Based Introspection Framework Via Intel Management Engine. IEEE Trans. Dependable Secur. Comput. 18(4): 1920-1932 (2021) - [j9]Zhenyu Ning, Fengwei Zhang:
Corrections to "Hardware-Assisted Transparent Tracing and Debugging on ARM". IEEE Trans. Inf. Forensics Secur. 16: 3479 (2021) - [c41]Fengwei Zhang:
BadUSB-C: Revisiting BadUSB with Type-C. ASSS@AsiaCCS 2021: 7-9 - [c40]Haonan Li, Weijie Huang, Mingde Ren, Hongyi Lu, Zhenyu Ning, Heming Cui, Fengwei Zhang:
A Novel Memory Management for RISC-V Enclaves. HASP@MICRO 2021: 3:1-3:9 - [c39]Rabimba Karanjai, Weidong Shi, Lei Xu, Lin Chen, Fengwei Zhang, Zhimin Gao:
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research. HASP@MICRO 2021: 5:1-5:8 - [c38]Hongyi Lu, Yechang Wu, Shuqing Li, You Lin, Chaozu Zhang, Fengwei Zhang:
BADUSB-C: Revisiting BadUSB with Type-C. SP (Workshops) 2021: 327-338 - [c37]Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. SP 2021: 1641-1658 - [i2]Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi:
Speedster: A TEE-assisted State Channel System. CoRR abs/2104.01289 (2021) - 2020
- [j8]Fei Tang, Boyang Ma, Jinku Li, Fengwei Zhang, Jipeng Su, Jianfeng Ma:
RansomSpector: An introspection-based approach to detect crypto ransomware. Comput. Secur. 97: 101997 (2020) - [j7]Mu Han, Ailan Wan, Fengwei Zhang, Shidian Ma:
An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles. IEEE Trans. Intell. Veh. 5(4): 545-555 (2020) - [c36]Ishtiaq Ahmed, Saeid Mofrad, Shiyong Lu, Changxin Bai, Fengwei Zhang, Dunren Che:
SEED: Confidential Big Data Workflow Scheduling with Intel SGX Under Deadline Constraints. SCC 2020: 108-115 - [c35]Jianyu Jiang, Xusheng Chen, Tsz On Li, Cheng Wang, Tianxiang Shen, Shixiong Zhao, Heming Cui, Cho-Li Wang, Fengwei Zhang:
Uranus: Simple, Efficient SGX Programming and its Applications. AsiaCCS 2020: 826-840 - [c34]Fan Lang, Huorong Li, Wei Wang, Jingqiang Lin, Fengwei Zhang, Wuqiong Pan, Qiongxiao Wang:
E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS. Inscrypt 2020: 221-243 - [c33]Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, Guojun Wang:
KShot: Live Kernel Patching with SMM and SGX. DSN 2020: 1-13 - [c32]Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao:
HART: Hardware-Assisted Kernel Module Tracing on Arm. ESORICS (1) 2020: 316-337
2010 – 2019
- 2019
- [j6]Zhenyu Ning, Fengwei Zhang:
Hardware-Assisted Transparent Tracing and Debugging on ARM. IEEE Trans. Inf. Forensics Secur. 14(6): 1595-1609 (2019) - [c31]Saeid Mofrad, Ishtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, Fengwei Zhang:
SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments. ACSAC 2019: 390-403 - [c30]Guoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang:
Defeating Speculative-Execution Attacks on SGX with HyperRace. DSC 2019: 1-8 - [c29]Zhenyu Ning, Fengwei Zhang, Stephen M. Remias:
Understanding the Security of Traffic Signal Infrastructure. DIMVA 2019: 154-174 - [c28]Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang:
Nighthawk: Transparent System Introspection from Ring -3. ESORICS (2) 2019: 217-238 - [c27]Wei Chen, Wenxin Yu, Zhiqiang Zhang, Yunye Zhang, Kepeng Xu, Fengwei Zhang, Yibo Fan, Gang He, Zhuo Yang:
Target-Based Attention Model for Aspect-Level Sentiment Analysis. ICONIP (3) 2019: 259-269 - [c26]Marwan Ali Albahar, Xing Gao, Gaby G. Dagher, Daiping Liu, Fengwei Zhang, Jidong Xiao:
A Study of the Multiple Sign-in Feature in Web Applications. SecureComm (2) 2019: 440-453 - [c25]Zhenyu Ning, Fengwei Zhang:
Understanding the Security of ARM Debugging Features. IEEE Symposium on Security and Privacy 2019: 602-619 - 2018
- [j5]Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen Tao Zhu, Yingjiu Li, Zhan Wang:
User-friendly deniable storage for mobile devices. Comput. Secur. 72: 163-174 (2018) - [j4]Li Yang, Teng Wei, Fengwei Zhang, Jianfeng Ma:
SADUS: Secure data deletion in user space for mobile devices. Comput. Secur. 77: 612-626 (2018) - [j3]Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang:
Towards Transparent Debugging. IEEE Trans. Dependable Secur. Comput. 15(2): 321-335 (2018) - [j2]Jinku Li, Xiaomeng Tong, Fengwei Zhang, Jianfeng Ma:
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. IEEE Trans. Inf. Forensics Secur. 13(6): 1535-1550 (2018) - [c24]Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching:
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. DSN 2018: 454-465 - [c23]Zhenyu Ning, Fengwei Zhang:
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. DSN 2018: 690-701 - [c22]Zhenyu Ning, Jinghui Liao, Fengwei Zhang, Weisong Shi:
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms. SEC 2018: 421-426 - [c21]Saeid Mofrad, Fengwei Zhang, Shiyong Lu, Weidong Shi:
A comparison study of intel SGX and AMD memory encryption technology. HASP@ISCA 2018: 9:1-9:8 - [i1]Zhenyu Ning, Fengwei Zhang:
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. CoRR abs/1803.02471 (2018) - 2017
- [c20]Kai Huang, Xing Gao, Fengwei Zhang, Jidong Xiao:
COMS: Customer Oriented Migration Service. CLOUD 2017: 692-695 - [c19]Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - [c18]Constantinos Kolias, Lucas Copi, Fengwei Zhang, Angelos Stavrou:
Breaking BLE Beacons For Fun But Mostly Profit. EUROSEC 2017: 4:1-4:6 - [c17]Zhenyu Ning, Fengwei Zhang, Weisong Shi, Weidong Shi:
Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments. HASP@ISCA 2017: 6:1-6:8 - [c16]Kevin Leach, Fengwei Zhang, Westley Weimer:
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage. RAID 2017: 403-424 - [c15]Lei Zhou, Fengwei Zhang, Guojun Wang:
Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c14]Zhenyu Ning, Fengwei Zhang:
Ninja: Towards Transparent Tracing and Debugging on ARM. USENIX Security Symposium 2017: 33-49 - 2016
- [c13]Fengwei Zhang, Hongwei Zhang:
SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security. HASP@ISCA 2016: 3:1-3:8 - [c12]Kevin Leach, Chad Spensky, Westley Weimer, Fengwei Zhang:
Towards Transparent Introspection. SANER 2016: 248-259 - 2015
- [c11]Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang:
MobiPluto: File System Friendly Deniable Storage for Mobile Devices. ACSAC 2015: 381-390 - [c10]Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou:
TrustLogin: Securing Password-Login on Commodity Operating Systems. AsiaCCS 2015: 333-344 - [c9]Dan Fleck, Fengwei Zhang, Sharath Hiremagalore, Stephen Reese, Liam McGhee:
Class-Chord: Efficient Messages to Classes of Nodes in Chord. CSCloud 2015: 165-174 - [c8]Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun:
Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 - 2014
- [j1]Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou:
HyperCheck: A Hardware-AssistedIntegrity Monitor. IEEE Trans. Dependable Secur. Comput. 11(4): 332-344 (2014) - [c7]Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou:
A Framework to Secure Peripherals at Runtime. ESORICS (1) 2014: 219-238 - 2013
- [c6]Fengwei Zhang:
IOCheck: A framework to enhance the security of I/O devices at runtime. DSN Workshops 2013: 1-4 - [c5]Fengwei Zhang, Kevin Leach, Kun Sun, Angelos Stavrou:
SPECTRE: A dependable introspection framework via System Management Mode. DSN 2013: 1-12 - 2012
- [c4]Hongbin Sun, Fengwei Zhang, Nanning Zheng:
An edge-based adaptive image interpolation and its VLSI architecture. APSIPA 2012: 1-6 - [c3]Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou:
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. NDSS 2012 - 2011
- [c2]Jiang Wang, Fengwei Zhang, Kun Sun, Angelos Stavrou:
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics. SADFE 2011: 1-5
2000 – 2009
- 2008
- [c1]Ju An Wang, Fengwei Zhang, Min Xia:
Temporal metrics for software vulnerabilities. CSIIRW 2008: 44:1-44:3
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint