default search action
Changyu Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Li Hu, Anli Yan, Hongyang Yan, Jin Li, Teng Huang, Yingying Zhang, Changyu Dong, Chunsheng Yang:
Defenses to Membership Inference Attacks: A Survey. ACM Comput. Surv. 56(4): 92:1-92:34 (2024) - [j30]Xiaojun Ren, Jiluan Fan, Ning Xu, Shaowei Wang, Changyu Dong, Zikai Wen:
DPGazeSynth: Enhancing eye-tracking virtual reality privacy with differentially private data synthesis. Inf. Sci. 675: 120720 (2024) - [j29]Emanuele Scala, Changyu Dong, Flavio Corradini, Leonardo Mostarda:
ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain. J. Inf. Secur. Appl. 83: 103794 (2024) - [j28]Boyu Zhu, Changyu Dong, Yuan Zhang, Yunlong Mao, Sheng Zhong:
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers. IEEE Trans. Inf. Forensics Secur. 19: 1810-1825 (2024) - [j27]Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study. IEEE Trans. Inf. Forensics Secur. 19: 2501-2516 (2024) - [j26]Jingyu Jia, Xinhao Li, Tong Li, Zhewei Liu, Chang Tan, Siyi Lv, Liang Guo, Changyu Dong, Zheli Liu:
ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes. IEEE Trans. Inf. Forensics Secur. 19: 8338-8352 (2024) - [j25]Lei Zhang, Yunzhe Jiang, Yazhou Ma, Shiwen Mao, Wenyuan Huang, Zhiyong Yu, Xiao Zheng, Lin Shu, Xiaochen Fan, Guangquan Xu, Changyu Dong:
Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi. IEEE Trans. Inf. Forensics Secur. 19: 8731-8746 (2024) - [j24]Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. ACM Trans. Priv. Secur. 27(1): 11:1-11:35 (2024) - [c43]Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. AsiaCCS 2024 - [c42]Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang:
Secret-Shared Shuffle with Malicious Security. NDSS 2024 - [c41]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
A New Hash-Based Enhanced Privacy ID Signature Scheme. PQCrypto (1) 2024: 37-71 - [i23]Shaowei Wang, Changyu Dong, Di Wang, Xiangfu Song:
Beyond Statistical Estimation: Differentially Private Individual Computation in the Shuffle Model. CoRR abs/2406.18145 (2024) - [i22]Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. IACR Cryptol. ePrint Arch. 2024: 649 (2024) - [i21]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2024: 650 (2024) - [i20]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
A New Hash-based Enhanced Privacy ID Signature Scheme. IACR Cryptol. ePrint Arch. 2024: 651 (2024) - [i19]Yaxi Yang, Xiaojian Liang, Xiangfu Song, Linting Huang, Hongyu Ren, Changyu Dong, Jianying Zhou:
Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF. IACR Cryptol. ePrint Arch. 2024: 789 (2024) - [i18]Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State. IACR Cryptol. ePrint Arch. 2024: 950 (2024) - 2023
- [j23]Jingyu Jia, Chang Tan, Zhewei Liu, Xinhao Li, Zheli Liu, Siyi Lv, Changyu Dong:
Total variation distance privacy: Accurately measuring inference attacks and improving utility. Inf. Sci. 626: 537-558 (2023) - [j22]Anli Yan, Teng Huang, Lishan Ke, Xiaozhang Liu, Qi Chen, Changyu Dong:
Explanation leaks: Explanation-guided model extraction attacks. Inf. Sci. 632: 269-284 (2023) - [j21]Zikai Alex Wen, Jingyu Jia, Hongyang Yan, Yaxing Yao, Zheli Liu, Changyu Dong:
The influence of explanation designs on user understanding differential privacy and making data-sharing decision. Inf. Sci. 642: 118799 (2023) - [j20]Li Hu, Jin Li, Guanbiao Lin, Shiyu Peng, Zhenxin Zhang, Yingying Zhang, Changyu Dong:
Defending Against Membership Inference Attacks With High Utility by GAN. IEEE Trans. Dependable Secur. Comput. 20(3): 2144-2157 (2023) - [c40]Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou:
Predicate Private Set Intersection with Linear Complexity. ACNS 2023: 143-166 - [c39]Emanuele Scala, Changyu Dong, Flavio Corradini, Leonardo Mostarda:
Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption. AINA (2) 2023: 461-472 - [c38]Xingjiang Cheng, Fuxing Zhang, Yun Peng, Xianmin Wang, Teng Huang, Ziye Zhou, Duncan S. Wong, Changyu Dong:
A Survey of Privacy Preserving Subgraph Matching Methods. AIS&P (1) 2023: 98-113 - [c37]Ruilin Yang, Hui Yang, Jiluan Fan, Changyu Dong, Yan Pang, Duncan S. Wong, Shaowei Wang:
Personalized Differential Privacy in the Shuffle Model. AIS&P (1) 2023: 468-482 - [c36]Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. AsiaCCS 2023: 716-730 - [c35]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-Based Direct Anonymous Attestation. PQCrypto 2023: 565-600 - [i17]Roberto Metere, Changyu Dong:
A Direct Lazy Sampling Proof Technique in Probabilistic Relational Hoare Logic. CoRR abs/2311.16844 (2023) - [i16]Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study. IACR Cryptol. ePrint Arch. 2023: 1764 (2023) - [i15]Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang:
Secret-Shared Shuffle with Malicious Security. IACR Cryptol. ePrint Arch. 2023: 1794 (2023) - 2022
- [j19]Xiaojie Guo, Jin Li, Zheli Liu, Yu Wei, Xiao Zhang, Changyu Dong:
Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy. Sci. China Inf. Sci. 65(5): 1-14 (2022) - [j18]Guanbiao Lin, Hongyang Yan, Guang Kou, Teng Huang, Shiyu Peng, Yingying Zhang, Changyu Dong:
Understanding adaptive gradient clipping in DP-SGD, empirically. Int. J. Intell. Syst. 37(11): 9674-9700 (2022) - [j17]Zheli Liu, Siyi Lv, Jin Li, Yanyu Huang, Liang Guo, Yali Yuan, Changyu Dong:
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. IEEE Trans. Dependable Secur. Comput. 19(3): 1579-1591 (2022) - [j16]Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, Changyu Dong:
Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection. IEEE Trans. Dependable Secur. Comput. 19(3): 2023-2037 (2022) - [j15]Chong-zhi Gao, Jin Li, Shi-bing Xia, Kim-Kwang Raymond Choo, Wenjing Lou, Changyu Dong:
MAS-Encryption and its Applications in Privacy-Preserving Classifiers. IEEE Trans. Knowl. Data Eng. 34(5): 2306-2323 (2022) - [j14]Xu Ma, Xiaoqian Sun, Yuduo Wu, Zheli Liu, Xiaofeng Chen, Changyu Dong:
Differentially Private Byzantine-Robust Federated Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3690-3701 (2022) - [c34]Yi Xie, Mengdie Huang, Xiaoyu Zhang, Changyu Dong, Willy Susilo, Xiaofeng Chen:
GAME: Generative-Based Adaptive Model Extraction Attack. ESORICS (1) 2022: 570-588 - [c33]Aydin Abadi, Changyu Dong, Steven J. Murdoch, Sotirios Terzis:
Multi-party Updatable Delegated Private Set Intersection. Financial Cryptography 2022: 100-119 - [i14]Jingyu Jia, Zikai Alex Wen, Zheli Liu, Changyu Dong:
New Differential Privacy Communication Pipeline and Design Framework. CoRR abs/2208.02759 (2022) - 2021
- [j13]Yanyu Huang, Siyi Lv, Zheli Liu, Xiangfu Song, Jin Li, Yali Yuan, Changyu Dong:
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX. Sci. China Inf. Sci. 64(8) (2021) - [j12]Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu, Changyu Dong, Wenjing Lou:
Searchable Symmetric Encryption with Forward Search Privacy. IEEE Trans. Dependable Secur. Comput. 18(1): 460-474 (2021) - [j11]Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou, Changyu Dong, Thar Baker:
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning. IEEE Trans. Inf. Forensics Secur. 16: 1736-1751 (2021) - [j10]Peng Jiang, Jianting Ning, Kaitai Liang, Changyu Dong, Jiageng Chen, Zhenfu Cao:
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Trans. Serv. Comput. 14(5): 1357-1369 (2021) - [c32]Huiping Chen, Changyu Dong, Liyue Fan, Grigorios Loukides, Solon P. Pissis, Leen Stougie:
Differentially Private String Sanitization for Frequency-Based Mining Tasks. ICDM 2021: 41-50 - [c31]Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. USENIX Security Symposium 2021: 965-982 - 2020
- [j9]Jin Li, Changyu Dong, Francesco Palmieri:
Special issue on advanced techniques for security and privacy of internet-of-things with machine learning. J. Netw. Comput. Appl. 167: 102697 (2020) - [j8]Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IEEE Trans. Dependable Secur. Comput. 17(5): 912-927 (2020) - [c30]Roben Castagna Lunardi, Maher Alharby, Henry C. Nunes, Avelino F. Zorzo, Changyu Dong, Aad van Moorsel:
Context-based consensus for appendable-block blockchains. Blockchain 2020: 401-408 - [i13]Aydin Abadi, Sotirios Terzis, Changyu Dong:
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection. IACR Cryptol. ePrint Arch. 2020: 407 (2020) - [i12]Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong:
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free. IACR Cryptol. ePrint Arch. 2020: 1576 (2020)
2010 – 2019
- 2019
- [j7]Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. IEEE Trans. Dependable Secur. Comput. 16(4): 608-624 (2019) - [c29]Shaimaa Bajoudah, Changyu Dong, Paolo Missier:
Toward a Decentralized, Trust-Less Marketplace for Brokered IoT Data Trading Using Blockchain. Blockchain 2019: 339-346 - 2018
- [j6]Jin Li, Aniello Castiglione, Changyu Dong:
Special issue on security in cloud computing. J. Netw. Comput. Appl. 110: 97-98 (2018) - [j5]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analyzing and Patching SPEKE in ISO/IEC. IEEE Trans. Inf. Forensics Secur. 13(11): 2844-2855 (2018) - [i11]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analysing and Patching SPEKE in ISO/IEC. CoRR abs/1802.04900 (2018) - [i10]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. IACR Cryptol. ePrint Arch. 2018: 489 (2018) - [i9]Changyu Dong, Grigorios Loukides:
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity. IACR Cryptol. ePrint Arch. 2018: 495 (2018) - [i8]Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. IACR Cryptol. ePrint Arch. 2018: 496 (2018) - [i7]Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IACR Cryptol. ePrint Arch. 2018: 497 (2018) - 2017
- [j4]Changyu Dong, Grigorios Loukides:
Approximating Private Set Union/Intersection Cardinality With Logarithmic Complexity. IEEE Trans. Inf. Forensics Secur. 12(11): 2792-2806 (2017) - [c28]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CCS 2017: 211-227 - [c27]Roberto Metere, Changyu Dong:
Automated Cryptographic Analysis of the Pedersen Commitment Scheme. MMM-ACNS 2017: 275-287 - [i6]Roberto Metere, Changyu Dong:
Automated Cryptographic Analysis of the Pedersen Commitment Scheme. CoRR abs/1705.05897 (2017) - [i5]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CoRR abs/1708.01171 (2017) - [i4]Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. CoRR abs/1710.00183 (2017) - 2016
- [c26]Aydin Abadi, Sotirios Terzis, Changyu Dong:
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets. Financial Cryptography 2016: 149-168 - [c25]Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier, Changyu Dong, David M. Eyers, Jean Bacon:
Information Flow Control with Minimal Tag Disclosure. ICC 2016 2016: 17:1-17:4 - 2015
- [c24]Changyu Dong, Franziskus Kiefer:
Secure Set-Based Policy Checking and Its Application to Password Registration. CANS 2015: 59-74 - [c23]Aydin Abadi, Sotirios Terzis, Changyu Dong:
O-PSI: Delegated Private Set Intersection on Outsourced Datasets. SEC 2015: 3-17 - [c22]Changyu Dong:
Efficient Data Intensive Secure Computation: Fictional or Real? Security Protocols Workshop 2015: 350-360 - [c21]Changyu Dong:
Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion). Security Protocols Workshop 2015: 361-363 - [i3]Changyu Dong, Franziskus Kiefer:
Secure Set-based Policy Checking and Its Application to Password Registration. IACR Cryptol. ePrint Arch. 2015: 945 (2015) - 2014
- [c20]Changyu Dong, Liqun Chen:
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost. ESORICS (1) 2014: 380-399 - [c19]Changyu Dong, Liqun Chen:
A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining. PAKDD (1) 2014: 606-617 - [c18]Zikai Wen, Changyu Dong:
Efficient protocols for private record linkage. SAC 2014: 1688-1694 - 2013
- [c17]Changyu Dong, Liqun Chen, Zikai Wen:
When private set intersection meets big data: an efficient and scalable protocol. CCS 2013: 789-800 - [c16]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. DBSec 2013: 128-144 - [i2]Changyu Dong, Liqun Chen, Zikai Wen:
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. IACR Cryptol. ePrint Arch. 2013: 515 (2013) - 2012
- [i1]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. IACR Cryptol. ePrint Arch. 2012: 252 (2012) - 2011
- [j3]Changyu Dong, Giovanni Russello, Naranker Dulay:
Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19(3): 367-397 (2011) - [c15]Changyu Dong, Naranker Dulay:
Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications. IFIPTM 2011: 133-148 - [c14]Changyu Dong, Naranker Dulay:
Argumentation-based fault diagnosis for home networks. HomeNets@SIGCOMM 2011: 37-42 - 2010
- [j2]Leonardo Mostarda, Changyu Dong, Naranker Dulay:
Context-based authentication and transport of cultural assets. Pers. Ubiquitous Comput. 14(4): 321-334 (2010) - [j1]Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen:
Providing data confidentiality against malicious hosts in Shared Data Spaces. Sci. Comput. Program. 75(6): 426-439 (2010) - [c13]Changyu Dong, Naranker Dulay:
Shinren: Non-monotonic Trust Management for Distributed Systems. IFIPTM 2010: 125-140
2000 – 2009
- 2009
- [b1]Changyu Dong:
Non-monotonic trust management for distributed systems. Imperial College London, UK, 2009 - [c12]Dimosthenis Pediaditakis, Leonardo Mostarda, Changyu Dong, Naranker Dulay:
Policies for Self Tuning Home Networks. POLICY 2009: 29-32 - 2008
- [c11]Giovanni Russello, Changyu Dong, Naranker Dulay:
A Workflow-Based Access Control Framework for e-Health Applications. AINA Workshops 2008: 111-120 - [c10]Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen:
Encrypted Shared Data Spaces. COORDINATION 2008: 264-279 - [c9]Changyu Dong, Giovanni Russello, Naranker Dulay:
Shared and Searchable Encrypted Data for Untrusted Servers. DBSec 2008: 127-143 - [c8]Changyu Dong, Giovanni Russello, Naranker Dulay:
Flexible Resolution of Authorisation Conflicts in Distributed Systems. DSOM 2008: 95-108 - [c7]Leonardo Mostarda, Changyu Dong, Naranker Dulay:
Place and Time Authentication of Cultural Assets. IFIPTM 2008: 279-294 - [c6]Giovanni Russello, Changyu Dong, Naranker Dulay:
Personalising situated workflow systems for pervasive healthcare applications. PervasiveHealth 2008: 183-187 - [c5]Giovanni Russello, Changyu Dong, Naranker Dulay:
Consent-Based Workflows for Healthcare Management. POLICY 2008: 153-161 - 2007
- [c4]Giovanni Russello, Changyu Dong, Naranker Dulay:
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents. AINA Workshops (1) 2007: 489-496 - [c3]Changyu Dong, Giovanni Russello, Naranker Dulay:
Trust Transfer in Distributed Systems. IFIPTM 2007: 17-29 - [c2]Giovanni Russello, Changyu Dong, Naranker Dulay:
Authorisation and Conflict Resolution for Hierarchical Domains. POLICY 2007: 201-210 - 2006
- [c1]Changyu Dong, Naranker Dulay:
Privacy Preserving Trust Negotiation for Pervasive Healthcare. PervasiveHealth 2006: 1-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint