default search action
Kan Yang 0001
Person information
- affiliation: University of Memphis, Department of Computer Science, TN, USA
- affiliation (2014 - 2016): University of Waterloo, Department of Electrical and Computer Engineering, ON, Canada
- affiliation (PhD 2013): City University of Hong Kong, Department of Computer Science, Hong Kong
Other persons with the same name
- Kan Yang 0002 — National University of Defense Technology, Changsha, China
- Kan Yang 0003 — Peking University, Beijing, China
- Kan Yang 0004 — Hohai University, College of Hydrology and Water Resources, Nanjing, China
- Kan Yang 0005 — State Grid Zhejiang Electric Power Co., Ltd, Hangzhou, China
- Kan Yang 0006 — Tsinghua University, Department of Automation, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j51]Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang:
EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics. Proc. Priv. Enhancing Technol. 2025(1): 361-378 (2025) - 2024
- [j50]Ye Bi, Kai Fan, Zhilin Zeng, Kan Yang, Hui Li, Yintang Yang:
Seamless group handover authentication protocol for vehicle networks: Services continuity. Comput. Networks 252: 110661 (2024) - [j49]Kan Yang, Rongxing Lu, Mohamed M. E. A. Mahmoud, Xiaohua Jia:
Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing. IEEE Internet Things J. 11(2): 1784-1787 (2024) - [j48]Wenjie Li, Kai Fan, Kan Yang, Yintang Yang, Hui Li:
PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0. IEEE Internet Things J. 11(4): 7128-7140 (2024) - [j47]Kai Fan, Wenhao Li, Yuhan Bai, Yintang Yang, Kan Yang, Hui Li:
EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector. IEEE Internet Things J. 11(9): 15229-15240 (2024) - [j46]Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang:
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT. Peer Peer Netw. Appl. 17(4): 2031-2046 (2024) - [j45]Shiyu Li, Yuan Zhang, Yaqing Song, Nan Cheng, Kan Yang, Hongwei Li:
Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution. IEEE Trans. Computers 73(4): 1114-1125 (2024) - [j44]Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Dahai Tao, Hongwei Li, Kan Yang:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. IEEE Trans. Inf. Forensics Secur. 19: 6425-6440 (2024) - [c26]Jamal Mosakheil, Kan Yang:
SilentProof: Anonymous Authentication with Blockchain-Backed Offloading. AsiaCCS 2024 - [c25]Xinyu He, Yuan Zhang, Yaqing Song, Nan Cheng, Kan Yang:
STAGE: Secure and Efficient Data Delivery for Exchange-Assisted Data Marketplaces. ICC 2024: 1-6 - [c24]Yali Wang, Yuan Zhang, Yaqing Song, Nan Cheng, Kan Yang:
PPoD: Practical Proofs of Dealership for Authorized Data Trading. ICC 2024: 1340-1345 - [c23]Meiying Zhang, Huan Zhao, Sheldon C. Ebron Jr., Ruitao Xie, Kan Yang:
Ensuring Fairness in Federated Learning Services: Innovative Approaches to Client Selection, Scheduling, and Rewards. ICDCS 2024: 762-773 - [i9]Meiying Zhang, Huan Zhao, Sheldon C. Ebron Jr., Kan Yang:
Towards Fair, Robust and Efficient Client Contribution Evaluation in Federated Learning. CoRR abs/2402.04409 (2024) - 2023
- [j43]Jiangang Shu, Tingting Yang, Xinying Liao, Farong Chen, Yao Xiao, Kan Yang, Xiaohua Jia:
Clustered Federated Multitask Learning on Non-IID Data With Enhanced Privacy. IEEE Internet Things J. 10(4): 3453-3467 (2023) - [j42]Zhiming Liu, Kan Zheng, Lu Hou, Haojun Yang, Kan Yang:
A Novel Blockchain-Assisted Aggregation Scheme for Federated Learning in IoT Networks. IEEE Internet Things J. 10(19): 17544-17556 (2023) - [j41]Kai Fan, Zeyu Shi, Yicen Yang, Liyang Bai, Yintang Yang, Kan Yang, Hui Li:
Blockchain-based cloud-edge clock calibration in IoT. Peer Peer Netw. Appl. 16(3): 1432-1444 (2023) - [j40]Kan Yang, Jiangang Shu, Ruitao Xie:
Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems. IEEE Trans. Inf. Forensics Secur. 18: 71-84 (2023) - [i8]Sheldon C. Ebron Jr., Kan Yang:
FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework. CoRR abs/2311.10248 (2023) - [i7]Meiying Zhang, Huan Zhao, Sheldon C. Ebron Jr., Ruitao Xie, Kan Yang:
Multi-Criteria Client Selection and Scheduling with Fairness Guarantee for Federated Learning Service. CoRR abs/2312.14941 (2023) - [i6]Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, Kan Yang:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. IACR Cryptol. ePrint Arch. 2023: 1775 (2023) - [i5]Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang:
Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics. IACR Cryptol. ePrint Arch. 2023: 1779 (2023) - [i4]Jamal Mosakheil, Kan Yang:
Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation. IACR Cryptol. ePrint Arch. 2023: 1791 (2023) - 2022
- [j39]Xingmiao Wang, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, Hui Li, Yintang Yang:
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. Comput. Commun. 186: 121-132 (2022) - [j38]Lei Yan, Kan Yang, Shouyi Yang:
Reputation-Based Truth Discovery With Long-Term Quality of Source in Internet of Things. IEEE Internet Things J. 9(7): 5410-5421 (2022) - [j37]Anjia Yang, Jian Weng, Kan Yang, Cheng Huang, Xuemin Shen:
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(2): 1284-1298 (2022) - 2021
- [j36]Hanzhe Yang, Ruidan Su, Pei Huang, Yuhan Bai, Kai Fan, Kan Yang, Hui Li, Yintang Yang:
PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage. Secur. Commun. Networks 2021: 9993855:1-9993855:11 (2021) - [j35]Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, Robert H. Deng:
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing. IEEE Trans. Dependable Secur. Comput. 18(1): 117-130 (2021) - [j34]Bin Zhao, Kai Fan, Kan Yang, Zilong Wang, Hui Li, Yintang Yang:
Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data. IEEE Trans. Ind. Informatics 17(9): 6314-6323 (2021) - [j33]Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Nan Cheng, Xuemin Shen:
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage. IEEE Trans. Mob. Comput. 20(6): 2297-2312 (2021) - [j32]Jiangang Shu, Xiaohua Jia, Kan Yang, Hua Wang:
Privacy-Preserving Task Recommendation Services for Crowdsourcing. IEEE Trans. Serv. Comput. 14(1): 235-247 (2021) - [c22]Lei Yan, Kan Yang, Shouyi Yang, Zhuo Han:
A Trust-aware Fog Offloading Game with Long-term Trustworthiness of Users. GLOBECOM 2021: 1-6 - [c21]Kan Yang, Senjuti Dutta:
Secure and Efficient Task Matching with Multi-keyword in Multi-requester and Multi-worker Crowdsourcing. IWQoS 2021: 1-6 - 2020
- [j31]Guowen Xu, Hongwei Li, Sen Liu, Kan Yang, Xiaodong Lin:
VerifyNet: Secure and Verifiable Federated Learning. IEEE Trans. Inf. Forensics Secur. 15: 911-926 (2020) - [j30]Zhou Su, Qichao Xu, Qiyong Zhao, Jiantao Song, Wenxue Shen, Ying Wang, Kan Yang:
Experience Blocking Ratio Based Game Theoretic Approach for Spectrum Sharing in Heterogeneous Networks. IEEE Trans. Netw. Sci. Eng. 7(1): 343-355 (2020) - [c20]Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haomiao Yang, Kan Yang, Robert H. Deng:
Secure and Verifiable Inference in Deep Neural Networks. ACSAC 2020: 784-797 - [c19]Bin Zhao, Kai Fan, Wei You, Kan Yang, Zilong Wang, Hui Li:
A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid. ICC 2020: 1-6
2010 – 2019
- 2019
- [j29]Guowen Xu, Hongwei Li, Hao Ren, Kan Yang, Robert H. Deng:
Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities. IEEE Commun. Mag. 57(11): 116-122 (2019) - [j28]Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, Victor C. M. Leung:
Blockchain-Based Decentralized Trust Management in Vehicular Networks. IEEE Internet Things J. 6(2): 1495-1505 (2019) - [j27]Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng:
SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing. IEEE Internet Things J. 6(2): 3003-3013 (2019) - [j26]Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, Yintang Yang:
Blockchain-Based Secure Time Protection Scheme in IoT. IEEE Internet Things J. 6(3): 4671-4679 (2019) - [j25]Guowen Xu, Hongwei Li, Yuanshun Dai, Kan Yang, Xiaodong Lin:
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data. IEEE Trans. Inf. Forensics Secur. 14(4): 870-885 (2019) - 2018
- [j24]Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, Dong Zheng:
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain. IEEE Access 6: 31077-31087 (2018) - [j23]Jiangang Shu, Ximeng Liu, Xiaohua Jia, Kan Yang, Robert H. Deng:
Anonymous Privacy-Preserving Task Matching in Crowdsourcing. IEEE Internet Things J. 5(4): 3068-3078 (2018) - [j22]Hao Ren, Hongwei Li, Yuanshun Dai, Kan Yang, Xiaodong Lin:
Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities. IEEE Netw. 32(6): 144-151 (2018) - [j21]Kuan Zhang, Xiaohui Liang, Jianbing Ni, Kan Yang, Xuemin Sherman Shen:
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage. IEEE Trans. Dependable Secur. Comput. 15(4): 607-620 (2018) - [j20]Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Jianying Zhou, Xiaodong Lin:
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems. IEEE Trans. Ind. Informatics 14(9): 4101-4112 (2018) - [c18]Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng:
SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing. GLOBECOM 2018: 1-6 - 2017
- [j19]Qichao Xu, Zhou Su, Kan Yang:
Optimal Control Theory-Based Epidemic Information Spreading Scheme for Mobile Social Users With Energy Constraint. IEEE Access 5: 14107-14118 (2017) - [j18]Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, Xuemin Sherman Shen:
Security and Privacy in Smart City Applications: Challenges and Solutions. IEEE Commun. Mag. 55(1): 122-129 (2017) - [j17]Guowen Xu, Hongwei Li, Chen Tan, Dongxiao Liu, Yuanshun Dai, Kan Yang:
Achieving efficient and privacy-preserving truth discovery in crowd sensing systems. Comput. Secur. 69: 114-126 (2017) - [j16]Kan Yang, Qi Han, Hui Li, Kan Zheng, Zhou Su, Xuemin Shen:
An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy. IEEE Internet Things J. 4(2): 563-571 (2017) - [j15]Peng Yang, Ning Zhang, Shan Zhang, Kan Yang, Li Yu, Xuemin Shen:
Identifying the Most Valuable Workers in Fog-Assisted Spatial Crowdsourcing. IEEE Internet Things J. 4(5): 1193-1203 (2017) - [j14]Kan Yang, Kuan Zhang, Xiaohua Jia, M. Anwar Hasan, Xuemin (Sherman) Shen:
Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf. Sci. 387: 116-131 (2017) - [j13]Xiao-Jun Jin, Ning Zhang, Kan Yang, Xuemin Shen, Zhaobin Xu, Chaojie Zhang, Zhonghe Jin:
PN Ranging Based on Noncommensurate Sampling: Zero-Bias Mitigation Methods. IEEE Trans. Aerosp. Electron. Syst. 53(2): 926-940 (2017) - [c17]Guowen Xu, Yan Ren, Hongwei Li, Dongxiao Liu, Yuanshun Dai, Kan Yang:
CryptMDB: A practical encrypted MongoDB over big data. ICC 2017: 1-6 - [c16]Qichao Xu, Zhou Su, Qiyong Zhao, Jiantao Song, Wenxue Shen, Ying Wang, Kan Yang:
QoE loss probability based game-theoretic approach for spectrum sharing in heterogeneous networks. ICC 2017: 1-6 - [c15]Zhe Yang, Kan Zheng, Kan Yang, Victor C. M. Leung:
A blockchain-based reputation system for data credibility assessment in vehicular networks. PIMRC 2017: 1-5 - [i3]Dajiang Chen, Ning Zhang, Nan Cheng, Kuan Zhang, Kan Yang, Zhiguang Qin, Xuemin Shen:
Multi-message Authentication over Noisy Channel with Secure Channel Codes. CoRR abs/1708.02888 (2017) - 2016
- [j12]Kan Zheng, Zhe Yang, Kuan Zhang, Periklis Chatzimisios, Kan Yang, Wei Xiang:
Big data-driven optimization for mobile networks toward 5G. IEEE Netw. 30(1): 44-51 (2016) - [j11]Kan Yang, Zhen Liu, Xiaohua Jia, Xuemin Sherman Shen:
Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach. IEEE Trans. Multim. 18(5): 940-950 (2016) - [j10]Bo Zhang, Xiaohua Jia, Kan Yang, Ruitao Xie:
Design of Analytical Model and Algorithm for Optimal Roadside AP Placement in VANETs. IEEE Trans. Veh. Technol. 65(9): 7708-7718 (2016) - [j9]Lei Lei, Yiru Kuang, Xuemin Sherman Shen, Kan Yang, Jian Qiao, Zhangdui Zhong:
Optimal Reliability in Energy Harvesting Industrial Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 15(8): 5399-5413 (2016) - [j8]Ju Ren, Yaoxue Zhang, Qiang Ye, Kan Yang, Kuan Zhang, Xuemin Sherman Shen:
Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks. IEEE Trans. Wirel. Commun. 15(10): 6813-6827 (2016) - [i2]Lei Lei, Yiru Kuang, Xuemin Shen, Kan Yang, Jian Qiao, Zhangdui Zhong:
Optimal Reliability in Energy Harvesting Industrial Wireless Sensor Networks. CoRR abs/1605.02068 (2016) - 2015
- [j7]Kan Yang, Kuan Zhang, Ju Ren, Xuemin Shen:
Security and privacy in mobile crowdsourcing networks: challenges and opportunities. IEEE Commun. Mag. 53(8): 75-81 (2015) - [j6]Kan Yang, Xiaohua Jia, Kui Ren:
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud. IEEE Trans. Parallel Distributed Syst. 26(12): 3461-3470 (2015) - [j5]Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin (Sherman) Shen, Henry H. Luo:
Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wirel. Commun. 22(4): 104-112 (2015) - [c14]Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, Xuemin Sherman Shen:
Exploiting mobile social behaviors for Sybil detection. INFOCOM 2015: 271-279 - [c13]Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, Ming Xu:
Generalized pattern matching string search on encrypted data in cloud systems. INFOCOM 2015: 2101-2109 - [c12]Kai He, Chuanhe Huang, Kan Yang, Jiaoli Shi:
Identity-preserving public auditing for shared cloud data. IWQoS 2015: 159-164 - [c11]Zhou Su, Qichao Xu, Kuan Zhang, Kan Yang, Xuemin Sherman Shen:
Dynamic bandwidth allocation in mobile social networks with multiple homing access. WCSP 2015: 1-6 - 2014
- [b1]Kan Yang, Xiaohua Jia:
Security for Cloud Storage Systems. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4614-7872-0, pp. i-xi, 1-83 - [j4]Kan Yang, Xiaohua Jia:
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(7): 1735-1744 (2014) - [c10]Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, Liusheng Huang:
Enabling efficient access control with dynamic policy updating for big data in the cloud. INFOCOM 2014: 2013-2021 - [i1]Kan Yang, Xiaohua Jia, Kuan Zhang, Xuemin (Sherman) Shen:
Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms. IACR Cryptol. ePrint Arch. 2014: 966 (2014) - 2013
- [j3]Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie:
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems. IEEE Trans. Inf. Forensics Secur. 8(11): 1790-1801 (2013) - [j2]Kan Yang, Xiaohua Jia:
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 24(9): 1717-1726 (2013) - [c9]Kan Yang, Xiaohua Jia, Kui Ren:
Attribute-based fine-grained access control with efficient revocation in cloud storage systems. AsiaCCS 2013: 523-528 - [c8]Ruitao Xie, Xiaohua Jia, Kan Yang, Bo Zhang:
Energy Saving Virtual Machine Allocation in Cloud Computing. ICDCS Workshops 2013: 132-137 - [c7]Bo Zhang, Xiaohua Jia, Kan Yang, Ruitao Xie:
Multi-path Routing and Stream Scheduling with Spatial Multiplexing and Interference Cancellation in MIMO Networks. ICDCS Workshops 2013: 256-261 - [c6]Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang:
DAC-MACS: Effective data access control for multi-authority cloud storage systems. INFOCOM 2013: 2895-2903 - 2012
- [j1]Kan Yang, Xiaohua Jia:
Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4): 409-428 (2012) - [c5]Kan Yang, Xiaohua Jia:
Attributed-Based Access Control for Multi-authority Systems in Cloud Storage. ICDCS 2012: 536-545 - 2010
- [c4]Kan Yang, Xiaohua Jia, Bo Zhang, Zhongming Zheng:
Threshold Key Redistribution for Dynamic Change of Authentication Group in Wireless Mesh Networks. GLOBECOM 2010: 1-5 - [c3]Bo Zhang, Zhongming Zheng, Xiaohua Jia, Kan Yang:
A Distributed Collaborative Relay Protocol for Multi-Hop WLAN Accesses. GLOBECOM 2010: 1-5 - [c2]Zhongming Zheng, Bo Zhang, Xiaohua Jia, Jun Zhang, Kan Yang:
Minimum AP Placement for WLAN with Rate Adaptation Using Physical Interference Model. GLOBECOM 2010: 1-5
2000 – 2009
- 2008
- [c1]Fang Song, Liusheng Huang, Wei Yang, Kan Yang:
Building QKD Networks Based On a Novel QKD Scheme. ICNSC 2008: 596-601
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint