default search action
Kai Fan 0001
Person information
- affiliation: Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- affiliation (PhD 2007): Xidian University, China
Other persons with the same name
- Kai Fan — disambiguation page
- Kai Fan 0002 — Alibaba DAMO Academy, Machine Intelligence Technology Lab, Hangzhou, China (and 2 more)
- Kai Fan 0003 — Northwest A&F University, College of Natural Resources and Environment, Xianyang, China
- Kai Fan 0004 — Taiyuan University of Science and Technology, Engineering Research Center of Heavy Machinery Ministry of Education, Taiyuan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Ye Bi, Kai Fan, Zhilin Zeng, Kan Yang, Hui Li, Yintang Yang:
Seamless group handover authentication protocol for vehicle networks: Services continuity. Comput. Networks 252: 110661 (2024) - [j65]Silv Wang, Kai Fan, Kuan Zhang, Hui Li, Yintang Yang:
Data complexity-based batch sanitization method against poison in distributed learning. Digit. Commun. Networks 10(2): 416-428 (2024) - [j64]Nan Gao, Kai Fan, Haoyang Wang, Hongyan Chen, Kuan Zhang, Hui Li, Yintang Yang:
Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT. IEEE Internet Things J. 11(1): 889-903 (2024) - [j63]Nan Gao, Kai Fan, Haoyang Wang, Kuan Zhang, Hui Li, Yintang Yang:
Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT. IEEE Internet Things J. 11(1): 1065-1079 (2024) - [j62]Kai Fan, Jingtao Hong, Wenjie Li, Xingwen Zhao, Hui Li, Yintang Yang:
FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning. IEEE Internet Things J. 11(2): 1816-1826 (2024) - [j61]Wenjie Li, Kai Fan, Kan Yang, Yintang Yang, Hui Li:
PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0. IEEE Internet Things J. 11(4): 7128-7140 (2024) - [j60]Kai Fan, Hengrui Lu, Yuhan Bai, Yu Luo, Yintang Yang, Kuan Zhang, Hui Li:
SC-Chain: An Efficient Blockchain Framework for Smart City. IEEE Internet Things J. 11(5): 7863-7877 (2024) - [j59]Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Hui Li, Yintang Yang:
Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things. IEEE Internet Things J. 11(5): 9213-9225 (2024) - [j58]Kai Fan, Yuanshuai Ren, Yuhan Bai, Guanglu Wei, Kuan Zhang, Hui Li, Yintang Yang:
Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid. IEEE Internet Things J. 11(6): 9487-9504 (2024) - [j57]Xingwen Zhao, Luhui Gan, Kai Fan:
Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments. IEEE Internet Things J. 11(7): 12377-12387 (2024) - [j56]Kai Fan, Wenhao Li, Yuhan Bai, Yintang Yang, Kan Yang, Hui Li:
EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector. IEEE Internet Things J. 11(9): 15229-15240 (2024) - [j55]Yuhan Bai, Kai Fan, Kuan Zhang, Hui Li, Yintang Yang:
CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing. IEEE Internet Things J. 11(10): 17727-17739 (2024) - [j54]Xuefei Cao, Lanjun Dang, Kai Fan, Xingwen Zhao, Yulong Fu, Yingzi Luan:
A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET. IEEE Internet Things J. 11(17): 29146-29156 (2024) - [j53]Dexin Li, Xingwen Zhao, Hui Li, Kai Fan:
Volume-Hiding Multidimensional Verifiable Dynamic Searchable Symmetric Encryption Scheme for Cloud Computing. IEEE Internet Things J. 11(23): 37437-37451 (2024) - [j52]Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang:
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT. Peer Peer Netw. Appl. 17(4): 2031-2046 (2024) - [j51]Haoyang Wang, Kai Fan, Chong Yu, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang, Haojin Zhu:
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing. IEEE Trans. Serv. Comput. 17(5): 2583-2596 (2024) - [i1]Wenjie Li, Kai Fan, Jingyuan Zhang, Hui Li, Wei Yang Bryan Lim, Qiang Yang:
Enhancing Security and Privacy in Federated Learning using Update Digests and Voting-Based Defense. CoRR abs/2405.18802 (2024) - 2023
- [j50]Ye Bi, Kai Fan, Kuan Zhang, Yuhan Bai, Hui Li, Yintang Yang:
A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects. IEEE Internet Things J. 10(18): 16225-16237 (2023) - [j49]Kai Fan, Ye Bi, Yintang Yang, Kuan Zhang, Hui Li:
Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud. IEEE Netw. 37(4): 314-322 (2023) - [j48]Kai Fan, Zeyu Shi, Yicen Yang, Liyang Bai, Yintang Yang, Kan Yang, Hui Li:
Blockchain-based cloud-edge clock calibration in IoT. Peer Peer Netw. Appl. 16(3): 1432-1444 (2023) - [j47]Kai Fan, Qi Chen, Ruidan Su, Kuan Zhang, Haoyang Wang, Hui Li, Yintang Yang:
MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End. IEEE Trans. Cloud Comput. 11(2): 1170-1181 (2023) - [j46]Haoyang Wang, Kai Fan, Hongyan Chen, Qi Chen, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang:
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme. IEEE Trans. Dependable Secur. Comput. 20(3): 2578-2592 (2023) - 2022
- [j45]Xingmiao Wang, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, Hui Li, Yintang Yang:
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. Comput. Commun. 186: 121-132 (2022) - [j44]Haoyang Wang, Kai Fan, Kuan Zhang, Zilong Wang, Hui Li, Yintang Yang:
Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks. IEEE Internet Things J. 9(8): 5957-5970 (2022) - [j43]Haoyang Wang, Kai Fan, Kuan Zhang, Zilong Wang, Hui Li, Yintang Yang:
Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22375-22388 (2022) - [j42]Kai Fan, Zeyu Shi, Ruidan Su, Yuhan Bai, Pei Huang, Kuan Zhang, Hui Li, Yintang Yang:
Blockchain-based trust management for verifiable time synchronization service in IoT. Peer-to-Peer Netw. Appl. 15(2): 1152-1162 (2022) - 2021
- [j41]Junbin Kang, Kai Fan, Kuan Zhang, Xiaochun Cheng, Hui Li, Yintang Yang:
An ultra light weight and secure RFID batch authentication scheme for IoMT. Comput. Commun. 167: 48-54 (2021) - [j40]Kai Fan, Wei Jiang, Qi Luo, Hui Li, Yintang Yang:
Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV. J. Frankl. Inst. 358(1): 193-209 (2021) - [j39]Liyang Bai, Kai Fan, Yuhan Bai, Xiaochun Cheng, Hui Li, Yintang Yang:
Cross-domain access control based on trusted third-party and attribute mapping center. J. Syst. Archit. 116: 101957 (2021) - [j38]Jianxing Liu, Kai Fan, Hui Li, Yintang Yang:
A blockchain-based privacy preservation scheme in multimedia network. Multim. Tools Appl. 80(20): 30691-30705 (2021) - [j37]Hanzhe Yang, Ruidan Su, Pei Huang, Yuhan Bai, Kai Fan, Kan Yang, Hui Li, Yintang Yang:
PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage. Secur. Commun. Networks 2021: 9993855:1-9993855:11 (2021) - [j36]Bin Zhao, Kai Fan, Kan Yang, Zilong Wang, Hui Li, Yintang Yang:
Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data. IEEE Trans. Ind. Informatics 17(9): 6314-6323 (2021) - 2020
- [j35]Pei Huang, Kai Fan, Hanzhe Yang, Kuan Zhang, Hui Li, Yintang Yang:
A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System. IEEE Access 8: 94780-94794 (2020) - [j34]Qi Chen, Kai Fan, Kuan Zhang, Haoyang Wang, Hui Li, Yingtang Yang:
Privacy-preserving searchable encryption in the intelligent edge computing. Comput. Commun. 164: 31-41 (2020) - [j33]Kai Fan, Qi Luo, Kuan Zhang, Yintang Yang:
Cloud-based lightweight secure RFID mutual authentication protocol in IoT. Inf. Sci. 527: 329-340 (2020) - [j32]Kai Fan, Tingting Liu, Kuan Zhang, Hui Li, Yintang Yang:
A secure and efficient outsourced computation on data sharing scheme for privacy computing. J. Parallel Distributed Comput. 135: 169-176 (2020) - [j31]Haoyang Wang, Kai Fan, Hui Li, Yintang Yang:
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. Peer-to-Peer Netw. Appl. 13(6): 2342-2355 (2020) - [j30]Kai Fan, Qiang Pan, Kuan Zhang, Yuhan Bai, Shili Sun, Hui Li, Yintang Yang:
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(6): 5826-5835 (2020) - [c26]Bin Zhao, Kai Fan, Wei You, Kan Yang, Zilong Wang, Hui Li:
A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid. ICC 2020: 1-6
2010 – 2019
- 2019
- [j29]Sheng Ding, Jin Cao, Chen Li, Kai Fan, Hui Li:
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 7: 38431-38441 (2019) - [j28]Jianying Qiu, Kai Fan, Kuan Zhang, Qiang Pan, Hui Li, Yintang Yang:
An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT. IEEE Access 7: 180205-180217 (2019) - [j27]Kai Fan, Huiyue Xu, Longxiang Gao, Hui Li, Yintang Yang:
Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Gener. Comput. Syst. 99: 134-142 (2019) - [j26]Kai Fan, Shili Sun, Zheng Yan, Qiang Pan, Hui Li, Yintang Yang:
A blockchain-based clock synchronization Scheme in IoT. Future Gener. Comput. Syst. 101: 524-533 (2019) - [j25]Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, Yintang Yang:
Blockchain-Based Secure Time Protection Scheme in IoT. IEEE Internet Things J. 6(3): 4671-4679 (2019) - [j24]Kai Fan, Shanshan Zhu, Kuan Zhang, Hui Li, Yintang Yang:
A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems. IEEE Netw. 33(2): 44-49 (2019) - [j23]Kai Fan, Junbin Kang, Shanshan Zhu, Hui Li, Yintang Yang:
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles. Sensors 19(1): 152 (2019) - [c25]Kai Fan, Yuhan Bai, Huiyue Xu, Qiang Pan, Hui Li, Yintang Yang:
A Secure Cross-Domain Access Control Scheme in Social Networks. ICC 2019: 1-6 - 2018
- [j22]Kai Fan, Yanhui Ren, Yue Wang, Hui Li, Yingtang Yang:
Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun. 12(5): 527-532 (2018) - [j21]Kai Fan, Shangyang Wang, Yanhui Ren, Hui Li, Yintang Yang:
MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain. J. Medical Syst. 42(8): 136:1-136:11 (2018) - [j20]Kai Fan, Xin Wang, Katsuya Suto, Hui Li, Yintang Yang:
Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 52-57 (2018) - [j19]Kai Fan, Wei Wang, Wei Jiang, Hui Li, Yintang Yang:
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw. Appl. 11(4): 723-734 (2018) - [j18]Kai Fan, Junxiong Wang, Xin Wang, Hui Li, Yintang Yang:
Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw. Appl. 11(4): 766-777 (2018) - [j17]Kai Fan, Shuyang Lou, Ruidan Su, Hui Li, Yintang Yang:
Secure and private key management scheme in big data networking. Peer-to-Peer Netw. Appl. 11(5): 992-999 (2018) - [j16]Kai Fan, Jie Yin, Kuan Zhang, Hui Li, Yintang Yang:
EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing. Sensors 18(11): 3616 (2018) - [j15]Kai Fan, Wei Jiang, Hui Li, Yintang Yang:
Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Trans. Ind. Informatics 14(4): 1656-1665 (2018) - [c24]Kai Fan, Qiang Pan, Junxiong Wang, Tingting Liu, Hui Li, Yintang Yang:
Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing. EDGE 2018: 87-92 - [c23]Kai Fan, Yanhui Ren, Zheng Yan, Shangyang Wang, Hui Li, Yintang Yang:
Secure Time Synchronization Scheme in IoT Based on Blockchain. iThings/GreenCom/CPSCom/SmartData 2018: 1063-1068 - 2017
- [j14]Kai Fan, Panfei Song, Yintang Yang:
ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G. Mob. Inf. Syst. 2017: 2349149:1-2349149:7 (2017) - [j13]Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang:
An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Netw. Appl. 10(2): 368-376 (2017) - [j12]Kai Fan, Junxiong Wang, Xin Wang, Yintang Yang:
Proxy-assisted access control scheme of cloud data for smart cities. Pers. Ubiquitous Comput. 21(5): 937-947 (2017) - [j11]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. Secur. Commun. Networks 2017: 4796373:1-4796373:9 (2017) - [j10]Kai Fan, Junxiong Wang, Xin Wang, Hui Li, Yintang Yang:
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing. Sensors 17(7): 1695 (2017) - [c22]Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, Yintang Yang:
U2F based secure mutual authentication protocol for mobile payment. ACM TUR-C 2017: 27:1-27:6 - [c21]Kai Fan, Qi Luo, Hui Li, Yintang Yang:
Cloud-Based Lightweight RFID Mutual Authentication Protocol. DSC 2017: 333-338 - [c20]Kai Fan, Jie Yin, Junxiong Wang, Hui Li, Yintang Yang:
Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data. GLOBECOM 2017: 1-6 - [c19]Xuefei Cao, Lanjun Dang, Kai Fan, Yulong Fu:
An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement. SpaCCS 2017: 56-69 - 2016
- [j9]Kai Fan, Zhao Du, Yuanyuan Gong, Yue Wang, Tongjiang Yan, Hui Li, Yintang Yang:
A Secure RFID Application Revocation Scheme for IoT. IEICE Trans. Inf. Syst. 99-D(8): 2027-2035 (2016) - [j8]Kai Fan, Yuanyuan Gong, Chen Liang, Hui Li, Yintang Yang:
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Networks 9(16): 3095-3104 (2016) - [c18]Kai Fan, Wei Wang, Yue Wang, Hui Li, Yintang Yang:
Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol. GLOBECOM 2016: 1-6 - [c17]Kai Fan, Qiong Tian, Nana Huang, Yue Wang, Hui Li, Yintang Yang:
Privacy protection based access control scheme in cloud-based services. ICCC 2016: 1-5 - [c16]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme for Mobile Payment. WASA 2016: 116-125 - 2015
- [j7]Kai Fan, Wei Wang, Hui Li, Yintang Yang:
Adaptive Sensing Private Property Protection Protocol Based on Cloud. Int. J. Distributed Sens. Networks 11: 743580:1-743580:9 (2015) - [c15]Kai Fan, Nana Huang, Yue Wang, Hui Li, Yintang Yang:
Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption. CSCloud 2015: 111-114 - [c14]Kai Fan, Hai Deng, Lang Wang, Hui Li, Yintang Yang:
Ciphertext Retrieval in Super-Peer P2P Network. GLOBECOM 2015: 1-6 - [c13]Kai Fan, Yuanyuan Gong, Zhao Du, Hui Li, Yintang Yang:
RFID Secure Application Revocation for IoT in 5G. TrustCom/BigDataSE/ISPA (1) 2015: 175-181 - [c12]Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang:
ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device. WASA 2015: 114-122 - 2014
- [j6]Kai Fan, Jie Li, Hui Li, Xiaohui Liang, Xuemin (Sherman) Shen, Yintang Yang:
RSEL: revocable secure efficient lightweight RFID authentication scheme. Concurr. Comput. Pract. Exp. 26(5): 1084-1096 (2014) - [c11]Kai Fan, Chen Liang, Hui Li, Yintang Yang:
LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT. CIT 2014: 276-280 - 2013
- [c10]Kai Fan, Dayang Zhang, Hui Li, Yintang Yang:
An Adaptive Feedback Load Balancing Algorithm in HDFS. INCoS 2013: 23-29 - 2012
- [j5]Kai Fan, Yue Wang, Hui Li:
A new proxy blind signature scheme. Int. J. Grid Util. Comput. 3(1): 38-42 (2012) - [j4]Kai Fan, Yue Wang, Hui Li:
Fairness electronic payment protocol. Int. J. Grid Util. Comput. 3(1): 53-58 (2012) - [c9]Kai Fan, Libin Zhao, Xuemin (Sherman) Shen, Hui Li, Yintang Yang:
Smart-blocking file storage method in cloud computing. ICCC 2012: 57-62 - [c8]Kai Fan, Jie Li, Hui Li, Xiaohui Liang, Xuemin (Sherman) Shen, Yintang Yang:
ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things. INCoS 2012: 323-328 - 2011
- [c7]Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma, Kai Fan:
Fast Parallel Computation of Tate Pairing. INCoS 2011: 178-183 - [c6]Kai Fan, Yue Wang, Hui Li:
Forward Secure Proxy Blind Signature Scheme. INCoS 2011: 263-267 - [c5]Kai Fan, Yue Wang, Hui Li:
Abuse-freeness Electronic Payment Protocol. INCoS 2011: 275-278 - 2010
- [j3]Lanjun Dang, Weidong Kou, Hui Li, Junwei Zhang, Xuefei Cao, Bin Zhao, Kai Fan:
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks. IEEE Trans. Wirel. Commun. 9(2): 594-604 (2010)
2000 – 2009
- 2009
- [c4]Kai Fan, Hui Li, Yue Wang:
Security Analysis of the Kerberos Protocol Using BAN Logic. IAS 2009: 467-470 - [c3]Kai Fan, Yue Wang, Hui Li:
A New Abuse-Free Fair Electronic Payment Protocol. IAS 2009: 633-636 - 2007
- [j2]Lanjun Dang, Weidong Kou, Nan Dang, Hui Li, Bin Zhao, Kai Fan:
Mobile ip registration in certificateless public key infrastructure. IET Inf. Secur. 1(4): 167-173 (2007) - [j1]Jun Zhang, Weidong Kou, Kai Fan, Lei Ye:
Watermarking protocol of secure verification. J. Electronic Imaging 16(4): 043002 (2007) - [c2]Bin Zhao, Kai Fan, Yue Wang, Weidong Kou:
Adaptive Encrypted Information Hiding Scheme for Images. CIS 2007: 950-953 - [c1]Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang, Zan Li, Kai Fan:
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. Inscrypt 2007: 442-456
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint