default search action
Diqun Yan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Kailai Shen, Diqun Yan, Jing Hu, Zhe Ye:
Non-intrusive speech quality assessment: A survey. Neurocomputing 580: 127471 (2024) - [j50]Dongjie Zhang, Yuting Hong, Xiaojie Qiu, Li Dong, Diqun Yan, Chengbin Peng:
C²F²: Cross-Task Cross-Domain Feature Fusion for Semi-Supervised Change Detection. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j49]Peiwen Zhuo, Diqun Yan, Kaiyu Ying, Rangding Wang, Li Dong:
Audio steganography cover enhancement via reinforcement learning. Signal Image Video Process. 18(2): 1007-1013 (2024) - [j48]Jiale Chen, Li Dong, Rangding Wang, Diqun Yan, Chengbin Peng:
Mixed-Bit Sampling Graphic: When Watermarking Meets Copy Detection Pattern. IEEE Signal Process. Lett. 31: 286-290 (2024) - [j47]Chongchong Shen, Jiangbo Qian, Chong Wang, Diqun Yan, Caiming Zhong:
Dynamic Sensing and Correlation Loss Detector for Small Object Detection in Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-12 (2024) - [j46]Baochen Yao, Li Dong, Xiaojie Qiu, Kangkang Song, Diqun Yan, Chengbin Peng:
Uncertainty-Guided Contrastive Learning for Weakly Supervised Point Cloud Segmentation. IEEE Trans. Geosci. Remote. Sens. 62: 1-13 (2024) - [j45]Hui Xiao, Yuting Hong, Li Dong, Diqun Yan, Junjie Xiong, Jiayan Zhuang, Dongtai Liang, Chengbin Peng:
Multi-Level Label Correction by Distilling Proximate Patterns for Semi-Supervised Semantic Segmentation. IEEE Trans. Multim. 26: 8077-8087 (2024) - [c33]Zhe Ye, Diqun Yan, Li Dong, Kailai Shen:
Breaking Speaker Recognition with Paddingback. ICASSP 2024: 4435-4439 - [c32]Ying Ren, Kailai Shen, Zhe Ye, Diqun Yan:
EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events. ICME 2024: 1-6 - [i15]Hui Xiao, Yuting Hong, Li Dong, Diqun Yan, Jiayan Zhuang, Junjie Xiong, Dongtai Liang, Chengbin Peng:
Multi-Level Label Correction by Distilling Proximate Patterns for Semi-supervised Semantic Segmentation. CoRR abs/2404.02065 (2024) - 2023
- [j44]Mingyu Dong, Diqun Yan, Rangding Wang:
Adversarial Examples Protect Your Privacy on Speech Enhancement System. Comput. Syst. Sci. Eng. 46(1): 1-12 (2023) - [j43]Hui Xiao, Li Dong, Hao Xu, Shuibo Fu, Diqun Yan, Kangkang Song, Chengbin Peng:
Corrigendum to "Semi-supervised semantic segmentation with cross teacher training" [Neurocomputing 508 (2022) 36-46]. Neurocomputing 516: 48 (2023) - [j42]Lang Chen, Rangding Wang, Li Dong, Diqun Yan:
Imperceptible adversarial audio steganography based on psychoacoustic model. Multim. Tools Appl. 82(17): 26451-26463 (2023) - [j41]Kailai Shen, Diqun Yan, Zhe Ye, Xianbo Xu, Jinxing Gao, Li Dong, Chengbin Peng, Kun Yang:
Non-intrusive speech quality assessment with attention-based ResNet-BiLSTM. Signal Image Video Process. 17(7): 3377-3385 (2023) - [j40]Zhe Ye, Diqun Yan, Li Dong, Jiacheng Deng, Shui Yu:
Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger. IEEE Signal Process. Lett. 30: 1057-1061 (2023) - [c31]Jiale Chen, Xiaojian Ji, Li Dong, Rangding Wang, Diqun Yan, Jinyu Tian:
Physically Robust Reversible Watermarking. AMC-SME 2023: 37-43 - [c30]Kailai Shen, Diqun Yan, Li Dong, Ying Ren, Xiaoxun Wu, Jing Hu:
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Listener Dependent Modeling for Zero-Shot Out-of-Domain MOS Prediction. ASRU 2023: 1-6 - [c29]Zhimin He, Jiangbo Qian, Diqun Yan, Chong Wang, Yu Xin:
Animal Re-Identification Algorithm for Posture Diversity. ICASSP 2023: 1-5 - [c28]Huazheng Hao, Hui Xiao, Li Dong, Diqun Yan, Dongtai Liang, Jiayan Zhuang, Chengbin Peng:
A Pseudo-Dual Self-Rectification Framework for Semantic Segmentation. ICME 2023: 408-413 - [c27]Xiaojian Ji, Li Dong, Rangding Wang, Diqun Yan, Yang Yin, Jinyu Tian:
Gradient Sign Inversion: Making an Adversarial Attack a Good Defense. IJCNN 2023: 1-6 - [c26]Zhe Ye, Terui Mao, Li Dong, Diqun Yan:
Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion. INTERSPEECH 2023: 4923-4927 - [c25]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. ACM Multimedia 2023: 7559-7568 - [c24]Xianbo Xu, Diqun Yan, Li Dong:
Adaptive-SpEx: Local and Global Perceptual Modeling with Speaker Adaptation for Target Speaker Extraction. SMC 2023: 342-347 - [i14]Zhe Ye, Terui Mao, Li Dong, Diqun Yan:
Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion. CoRR abs/2306.15875 (2023) - [i13]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. CoRR abs/2308.02369 (2023) - [i12]Zhe Ye, Diqun Yan, Li Dong, Kailai Shen:
Evil Operation: Breaking Speaker Recognition with PaddingBack. CoRR abs/2308.04179 (2023) - [i11]Ying Ren, Kailai Shen, Zhe Ye, Diqun Yan:
BadSQA: Stealthy Backdoor Attacks Using Presence Events as Triggers in Non-Intrusive Speech Quality Assessment. CoRR abs/2309.01480 (2023) - [i10]Yuwen Pu, Jiahao Chen, Jiayu Pan, Hao Li, Diqun Yan, Xuhong Zhang, Shouling Ji:
Facial Data Minimization: Shallow Model as Your Privacy Filter. CoRR abs/2310.15590 (2023) - [i9]Jiahao Chen, Diqun Yan, Li Dong:
Adversarial defense based on distribution transfer. CoRR abs/2311.13841 (2023) - 2022
- [j39]Jinxing Gao, Diqun Yan, Mingyu Dong:
Black-box adversarial attacks through speech distortion for speech emotion recognition. EURASIP J. Audio Speech Music. Process. 2022(1): 20 (2022) - [j38]Hui Xiao, Li Dong, Hao Xu, Shuibo Fu, Diqun Yan, Kangkang Song, Chengbin Peng:
Semi-supervised semantic segmentation with cross teacher training. Neurocomputing 508: 36-46 (2022) - [j37]Yi Xie, Xianliang Jiang, Guang Jin, Ziyi Jiang, Diqun Yan:
NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9052-9059 (2022) - [j36]Tianyun Liu, Diqun Yan, Nan Yan, Gang Chen:
Anti-forensics of fake stereo audio using generative adversarial network. Multim. Tools Appl. 81(12): 17155-17167 (2022) - [j35]Jiacheng Deng, Li Dong, Rangding Wang, Rui Yang, Diqun Yan:
Decision-Based Attack to Speaker Recognition System via Local Low-Frequency Perturbation. IEEE Signal Process. Lett. 29: 1432-1436 (2022) - [c23]Jiale Chen, Li Dong, Rangding Wang, Diqun Yan, Weiwei Sun, Hang-Yu Fan:
Physical Anti-copying Semi-robust Random Watermarking for QR Code. IWDW 2022: 131-146 - [c22]Jiacheng Deng, Terui Mao, Diqun Yan, Li Dong, Mingyu Dong:
Detection of Synthetic Speech Based on Spectrum Defects. DDAM@MM 2022: 3-8 - [c21]Ning Lu, Li Dong, Diqun Yan, Xianliang Jiang:
On Attacking Deep Image Quality Evaluator Via Spatial Transform. SMC 2022: 2876-2881 - [c20]Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan, Yuanman Li:
Robust Document Image Forgery Localization Against Image Blending. TrustCom 2022: 810-817 - [i8]Zhe Ye, Jiahao Chen, Diqun Yan:
Residual-Guided Non-Intrusive Speech Quality Assessment. CoRR abs/2203.11499 (2022) - [i7]Jiacheng Deng, Shunyi Chen, Li Dong, Diqun Yan, Rangding Wang:
Transferability of Adversarial Attacks on Synthetic Speech Detection. CoRR abs/2205.07711 (2022) - [i6]Mingyu Dong, Diqun Yan, Rangding Wang:
Adversarial Privacy Protection on Speech Enhancement. CoRR abs/2206.08170 (2022) - [i5]Mingyu Dong, Jiahao Chen, Diqun Yan, Jingxing Gao, Li Dong, Rangding Wang:
Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations. CoRR abs/2206.15128 (2022) - [i4]Hui Xiao, Li Dong, Kangkang Song, Hao Xu, Shuibo Fu, Diqun Yan, Chengbin Peng:
Semi-Supervised Semantic Segmentation with Cross Teacher Training. CoRR abs/2209.01327 (2022) - 2021
- [j34]Kaiyu Ying, Rangding Wang, Yuzhen Lin, Diqun Yan:
Adaptive Audio Steganography Based on Improved Syndrome-Trellis Codes. IEEE Access 9: 11705-11715 (2021) - [j33]Lang Chen, Rangding Wang, Diqun Yan, Jie Wang:
Learning to Generate Steganographic Cover for Audio Steganography Using GAN. IEEE Access 9: 88098-88107 (2021) - [j32]Donghua Wang, Li Dong, Rangding Wang, Diqun Yan:
Fast speech adversarial example generation for keyword spotting system with conditional GAN. Comput. Commun. 179: 145-156 (2021) - [j31]Jie Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yuzhen Lin:
Towards breaking DNN-based audio steganalysis with GAN. Int. J. Auton. Adapt. Commun. Syst. 14(4): 371-383 (2021) - [j30]Tianyun Liu, Diqun Yan, Rangding Wang, Nan Yan, Gang Chen:
Identification of Fake Stereo Audio Using SVM and CNN. Inf. 12(7): 263 (2021) - [j29]Yongkang Gong, Diqun Yan, Terui Mao, Donghua Wang, Rangding Wang:
Defending and Detecting Audio Adversarial Example using Frame Offsets. KSII Trans. Internet Inf. Syst. 15(4): 1538-1552 (2021) - [j28]Diqun Yan, Mingyu Dong, Jinxing Gao:
Exposing Speech Transsplicing Forgery with Noise Level Inconsistency. Secur. Commun. Networks 2021: 6659371:1-6659371:6 (2021) - [j27]Yuzhen Lin, Rangding Wang, Li Dong, Diqun Yan, Jie Wang:
Tackling the Cover Source Mismatch Problem in Audio Steganalysis With Unsupervised Domain Adaptation. IEEE Signal Process. Lett. 28: 1475-1479 (2021) - [j26]Diqun Yan, Yongkang Gong, Tianyun Liu:
Antiforensics of Speech Resampling Using Dual-Path Strategy. Wirel. Commun. Mob. Comput. 2021: 6640106:1-6640106:8 (2021) - [c19]Terui Mao, Diqun Yan, Yongkang Gong, Rangding Wang:
Identification of Synthetic Spoofed Speech with Deep Capsule Network. FCS 2021: 257-265 - [c18]Kaiyu Ying, Rangding Wang, Diqun Yan:
Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing. WIFS 2021: 1-6 - [i3]Tianyun Liu, Diqun Yan:
Identification of fake stereo audio. CoRR abs/2104.09832 (2021) - [i2]Mingyu Dong, Diqun Yan, Yongkang Gong, Rangding Wang:
Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise. CoRR abs/2108.13562 (2021) - [i1]Jiahao Chen, Diqun Yan:
Adversarial Attacks on Machinery Fault Diagnosis. CoRR abs/2110.02498 (2021) - 2020
- [j25]Xueyuan Zhang, Rangding Wang, Diqun Yan, Li Dong, Yuzhen Lin:
Selecting Optimal Submatrix for Syndrome-Trellis Codes (STCs)-Based Steganography With Segmentation. IEEE Access 8: 61754-61766 (2020) - [j24]Donghua Wang, Li Dong, Rangding Wang, Diqun Yan, Jie Wang:
Targeted Speech Adversarial Example Generation With Generative Adversarial Network. IEEE Access 8: 124503-124513 (2020) - [j23]Heng Yu, Rangding Wang, Li Dong, Diqun Yan, Yongkang Gong, Yuzhen Lin:
A High-Capacity Reversible Data Hiding Scheme Using Dual-Channel Audio. IEEE Access 8: 162271-162278 (2020) - [j22]Biaoli Tao, Rangding Wang, Diqun Yan, Chao Jin:
Anti-Forensics of Double Compressed MP3 Audio. Int. J. Digit. Crime Forensics 12(3): 45-57 (2020) - [j21]Yongchao Ye, Lingjie Lao, Diqun Yan, Rangding Wang:
Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network. Int. J. Digit. Multim. Broadcast. 2020: 8927031:1-8927031:10 (2020) - [j20]Lang Lin, Rangding Wang, Diqun Yan, Li Dong:
A Robust Method for Speech Replay Attack Detection. KSII Trans. Internet Inf. Syst. 14(1): 168-182 (2020) - [j19]Diqun Yan, Xiaowen Li, Li Dong, Rangding Wang:
An Antiforensic Method against AMR Compression Detection. Secur. Commun. Networks 2020: 8849902:1-8849902:8 (2020) - [j18]Li Dong, Jiantao Zhou, Weiwei Sun, Diqun Yan, Rangding Wang:
First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding. IEEE Trans. Circuits Syst. II Express Briefs 67-II(5): 951-955 (2020) - [c17]Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan, Yuzhen Lin, Jie Wang:
Towards Designing an Effective Complexity Indicator for Audio Steganography. ICC 2020: 1-6 - [c16]Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Yiming Ren:
Efficient Generation of Speech Adversarial Examples with Generative Model. IWDW 2020: 251-264 - [c15]Diqun Yan, Tingting Wu:
Detection of Various Speech Forgery Operations Based on Recurrent Neural Network. SPDE 2020: 415-426 - [c14]Jie Wang, Rangding Wang, Li Dong, Diqun Yan:
Robust, Imperceptible and End-to-End Audio Steganography Based on CNN. SPDE 2020: 427-442 - [c13]Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yongkang Gong:
Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey. SPDE 2020: 443-468 - [c12]Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan:
Post-processing for Enhancing Audio Steganographic Undetectability. SPDE 2020: 546-559
2010 – 2019
- 2019
- [j17]Xiaowen Li, Diqun Yan, Li Dong, Rangding Wang:
Anti-Forensics of Audio Source Identification Using Generative Adversarial Network. IEEE Access 7: 184332-184339 (2019) - [j16]Diqun Yan, Li Xiang, Zhifeng Wang, Rangding Wang:
Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum. Autom. Control. Comput. Sci. 53(1): 72-79 (2019) - [j15]Chao Jin, Rangding Wang, Diqun Yan:
Source smartphone identification by exploiting encoding characteristics of recorded speech. Digit. Investig. 29: 129-146 (2019) - [c11]Yuzhen Lin, Rangding Wang, Diqun Yan, Li Dong, Xueyuan Zhang:
Audio Steganalysis with Improved Convolutional Neural Network. IH&MMSec 2019: 210-215 - 2018
- [j14]Qijuan Huang, Rangding Wang, Diqun Yan, Jian Zhang:
AAC Double Compression Audio Detection Algorithm Based on the Difference of Scale Factor. Inf. 9(7): 161 (2018) - [j13]Tianyun Qin, Rangding Wang, Diqun Yan, Lang Lin:
Source Cell-Phone Identification in the Presence of Additive Noise from CQT Domain. Inf. 9(8): 205 (2018) - [j12]Diqun Yan, Rangding Wang, Jinglei Zhou, Chao Jin, Zhifeng Wang:
Compression history detection for MP3 audio. KSII Trans. Internet Inf. Syst. 12(2): 662-675 (2018) - [c10]Lang Lin, Rangding Wang, Diqun Yan, Can Li:
A Replay Voice Detection Algorithm Based on Multi-feature Fusion. ICCCS (6) 2018: 289-299 - [c9]Qijuan Huang, Rangding Wang, Diqun Yan, Jian Zhang:
AAC Audio Compression Detection Based on QMDCT Coefficient. ICCCS (6) 2018: 347-359 - [c8]Lang Lin, Rangding Wang, Diqun Yan:
A Replay Speech Detection Algorithm Based on Sub-band Analysis. Intelligent Information Processing 2018: 337-345 - 2017
- [j11]Chao Jin, Rangding Wang, Diqun Yan:
Steganalysis of MP3Stego with low embedding-rate using Markov feature. Multim. Tools Appl. 76(5): 6143-6158 (2017) - 2016
- [j10]Chao Jin, Rangding Wang, Diqun Yan, Pengfei Ma, Jinglei Zhou:
An efficient algorithm for double compressed AAC audio detection. Multim. Tools Appl. 75(8): 4815-4832 (2016) - [c7]Biaoli Tao, Rangding Wang, Diqun Yan, Chao Jin, Yanan Chen, Li Zhang:
Audio Tampering Detection Based on Quantization Artifacts. ICCCS (2) 2016: 430-439 - [c6]Chao Jin, Rangding Wang, Diqun Yan, Biaoli Tao, Yanan Chen, Anshan Pei:
Source Cell-Phone Identification Using Spectral Features of Device Self-noise. IWDW 2016: 29-45 - 2015
- [c5]Jinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan:
Multiple MP3 Compression Detection Based on the Statistical Properties of Scale Factors. IWDW 2015: 51-60 - 2014
- [j9]Xianmin Yu, Rangding Wang, Diqun Yan, Pengfei Ma:
Detecting Fake-Quality MP3 based on Huffman Table Index. J. Softw. 9(4): 907-912 (2014) - [j8]Pengfei Ma, Rangding Wang, Diqun Yan, Chao Jin:
Detecting double-compressed MP3 with the Same Bit-rate. J. Softw. 9(10): 2522-2527 (2014) - [j7]Juan Li, Rangding Wang, Diqun Yan, Youming Li:
A multipurpose audio aggregation watermarking based on multistage vector quantization. Multim. Tools Appl. 68(3): 571-593 (2014) - [j6]Diqun Yan, Rangding Wang:
Detection of MP3Stego exploiting recompression calibration-based feature. Multim. Tools Appl. 72(1): 865-878 (2014) - [c4]Chao Jin, Rangding Wang, Diqun Yan, Pengfei Ma, Kaiyun Yang:
A novel detection scheme for MP3Stego with low payload. ChinaSIP 2014: 602-606 - [c3]Jinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan:
Detecting Fake-Quality WAV Audio Based on Phase Differences. IWDW 2014: 525-534 - 2013
- [j5]Diqun Yan, Rangding Wang, Xianmin Yu, Jie Zhu:
Steganalysis for MP3Stego using differential statistics of quantization step. Digit. Signal Process. 23(4): 1181-1185 (2013) - [j4]Xianmin Yu, Rangding Wang, Diqun Yan:
Detecting MP3Stego using calibrated side information features. J. Softw. 8(10): 2628-2636 (2013) - [c2]Pengfei Ma, Rangding Wang, Diqun Yan, Chao Jin:
A Huffman Table Index Based Approach to Detect Double MP3 Compression. IWDW 2013: 258-271 - 2012
- [j3]Diqun Yan, Rangding Wang, Xianmin Yu, Jie Zhu:
Steganography for MP3 audio by exploiting the rule of window switching. Comput. Secur. 31(5): 704-716 (2012) - 2011
- [j2]Diqun Yan, Rangding Wang:
Huffman table swapping-based steganograpy for MP3 audio. Multim. Tools Appl. 52(2-3): 291-305 (2011)
2000 – 2009
- 2009
- [j1]Diqun Yan, Rangding Wang, Liguang Zhang:
Quantization Step Parity-based Steganography for MP3 Audio. Fundam. Informaticae 97(1-2): 1-14 (2009) - 2008
- [c1]Diqun Yan, Rangding Wang:
Reversible Data Hiding for Audio Based on Prediction Error Expansion. IIH-MSP 2008: 249-252
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint