default search action
Milan Petkovic
Person information
- affiliation: Eindhoven University of Technology, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2003
- [b1]Milan Petkovic, Willem Jonker:
Content-Based Video Retrieval - A Database Perspective. Multimedia systems and applications 25, Springer 2003, ISBN 978-1-4419-5396-4, pp. I-X, 1-151
Journal Articles
- 2024
- [j15]Sreejita Ghosh, Pia Burger, Mladena Simeunovic-Ostojic, Joyce Maas, Milan Petkovic:
Review of machine learning solutions for eating disorders. Int. J. Medical Informatics 189: 105526 (2024) - 2023
- [j14]Alessio Gallucci, Dmitry Znamenskiy, Yuxuan Long, Nicola Pezzotti, Milan Petkovic:
Generating High-Resolution 3D Faces and Bodies Using VQ-VAE-2 with PixelSNAIL Networks on 2D Representations. Sensors 23(3): 1168 (2023) - 2022
- [j13]Roberto Rocchetta, Qi Gao, Dimitrios Mavroeidis, Milan Petkovic:
A robust model selection framework for fault detection and system health monitoring with limited failure examples: Heterogeneous data fusion and formal sensitivity bounds. Eng. Appl. Artif. Intell. 114: 105140 (2022) - [j12]Tim Hulsen, Milan Petkovic, Orsolya Edit Varga, Saumya Shekhar Jamuar:
Editorial: AI in Healthcare: From Data to Intelligence. Frontiers Artif. Intell. 5: 909391 (2022) - 2021
- [j11]Vadim Liventsev, Aki Härmä, Milan Petkovic:
Towards Effective Patient Simulators. Frontiers Artif. Intell. 4: 798659 (2021) - [j10]Allmin Pradhap Singh Susaiyah, Aki Härmä, Ehud Reiter, Milan Petkovic:
Neural Scoring of Logical Inferences from Data using Feedback. Int. J. Interact. Multim. Artif. Intell. 6(5): 90-99 (2021) - 2017
- [j9]Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy:
A white-box anomaly-based framework for database leakage detection. J. Inf. Secur. Appl. 32: 27-46 (2017) - 2016
- [j8]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
A severity-based quantification of data leakages in database systems. J. Comput. Secur. 24(3): 321-345 (2016) - 2015
- [j7]Elisa Costante, Jerry den Hartog, Milan Petkovic:
Understanding Perceived Trust to Reduce Regret. Comput. Intell. 31(2): 327-347 (2015) - [j6]Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone:
An anomaly analysis framework for database systems. Comput. Secur. 53: 156-173 (2015) - 2014
- [j5]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
A reference model for reputation systems. Decis. Support Syst. 61: 147-154 (2014) - 2009
- [j4]Milan Petkovic, Willem Jonker:
Preface. J. Comput. Secur. 17(1): 1-3 (2009) - 2008
- [j3]Anna Zych, Milan Petkovic, Willem Jonker:
Efficient key management for cryptographically enforced access control. Comput. Stand. Interfaces 30(6): 410-417 (2008) - 2006
- [j2]Claudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde:
Controlled Sharing of Personal Content Using Digital Rights Management. J. Res. Pract. Inf. Technol. 38(1) (2006) - 2004
- [j1]Milan Petkovic, Willem Jonker:
Integrated use of different content derivation techniques within a multimedia database management system. J. Vis. Commun. Image Represent. 15(3): 303-329 (2004)
Conference and Workshop Papers
- 2023
- [c59]Allmin Pradhap Singh Susaiyah, Aki Härmä, Simone Balloccu, Ehud Reiter, Milan Petkovic:
Smart Selection of Useful Insights from Wearables. ICASSP Workshops 2023: 1-4 - [c58]Marko Petkovic, Joyce Maas, Milan Petkovic:
Tracking of Nutritional Intake Using Artificial Intelligence. MIE 2023: 1033-1034 - 2022
- [c57]Alessio Gallucci, Dmitry Znamenskiy, Nicola Pezzotti, Milan Petkovic:
Generating High-Resolution 3D Faces Using VQ-VAE-2 with PixelSNAIL Networks. ICIAP Workshops 2022: 228-239 - 2021
- [c56]Vadim Liventsev, Aki Härmä, Milan Petkovic:
Neurogenetic programming framework for explainable reinforcement learning. GECCO Companion 2021: 329-330 - [c55]Alessio Gallucci, Nicola Pezzotti, Dmitry Znamenskiy, Milan Petkovic:
A latent space exploration for microscopic skin lesion augmentations with VQ-VAE-2 and PixelSNAIL. Image Processing 2021 - 2020
- [c54]Anastasiia Grishina, Milosh Stolikj, Qi Gao, Milan Petkovic:
Improving Spare Part Search for Maintenance Services using Topic Modelling. CIKM (Workshops) 2020 - [c53]Alessio Gallucci, Dmitry Znamenskiy, Nicola Pezzotti, Milan Petkovic:
Don't Tear Your Hair Out: Analysis of the Impact of Skin Hair on the Diagnosis of Microscopic Skin Lesions. ICPR Workshops (1) 2020: 406-416 - [c52]Allmin Pradhap Singh Susaiyah, Aki Härmä, Ehud Reiter, Rim Helaoui, Milan Petkovic:
Towards a Generalised Framework for Behaviour Insight Mining (short paper). SmartPhil@IUI 2020: 92-99 - 2018
- [c51]Stefan Thaler, Vlado Menkovski, Milan Petkovic:
Deep Metric Learning for Sequential Data Using Approximate Information. MLDM (1) 2018: 269-282 - 2017
- [c50]Stefan Thaler, Vlado Menkovski, Milan Petkovic:
Unsupervised Signature Extraction from Forensic Logs. ECML/PKDD (3) 2017: 305-316 - 2016
- [c49]Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone:
Role Mining with Missing Values. ARES 2016: 167-176 - [c48]Stefan Thaler, Jerry den Hartog, Milan Petkovic:
Towards Creating Believable Decoy Project Folders for Detecting Data Theft. DBSec 2016: 161-169 - 2015
- [c47]Daniel Pletea, Saeed Sedghi, Meilof Veeningen, Milan Petkovic:
Secure distributed key generation in attribute based encryption systems. ICITST 2015: 103-107 - 2014
- [c46]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
Data Leakage Quantification. DBSec 2014: 98-113 - [c45]Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy:
Hunting the Unknown - White-Box Database Leakage Detection. DBSec 2014: 243-259 - [c44]Tanya Ignatenko, Milan Petkovic:
AU2EU: Privacy-Preserving Matching of DNA Sequences. WISTP 2014: 180-189 - 2013
- [c43]Sokratis Vavilis, Nicola Zannone, Milan Petkovic:
Data reliability in home healthcare services. CBMS 2013: 377-380 - [c42]Willem Jonker, Milan Petkovic:
Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler. Secure Data Management 2013: 54-58 - [c41]Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone:
Database Anomalous Activities - Detection and Quantification. SECRYPT 2013: 603-608 - 2012
- [c40]Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. ARES 2012: 212-217 - [c39]Sebastian Banescu, Milan Petkovic, Nicola Zannone:
Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 - [c38]Elisa Costante, Jerry den Hartog, Milan Petkovic:
What Websites Know About You. DPM/SETOP 2012: 146-159 - [c37]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
Impact of ICT on Home Healthcare. HCC 2012: 111-122 - [c36]Muhammad Asim, R. Paul Koster, Milan Petkovic, Martin Rosner:
eConsent Management and Enforcement in Personal Telehealth. ISSE 2012: 209-216 - [c35]Mina Deng, Marco Nalin, Milan Petkovic, Ilaria Baroni, Abitabile Marco:
Towards Trustworthy Health Platform Cloud. Secure Data Management 2012: 162-175 - [c34]Elisa Costante, Yuanhao Sun, Milan Petkovic, Jerry den Hartog:
A machine learning solution to assess privacy policy completeness: (short paper). WPES 2012: 91-96 - 2011
- [c33]Mina Deng, Milan Petkovic, Marco Nalin, Ilaria Baroni:
A Home Healthcare System in the Cloud-Addressing Security and Privacy Challenges. IEEE CLOUD 2011: 549-556 - [c32]Muhammad Asim, Milan Petkovic, Mike Qu, Changjie Wang:
An interoperable security framework for connected healthcare. CCNC 2011: 116-120 - [c31]Muhammad Asim, Luan Ibraimi, Milan Petkovic:
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme. Communications and Multimedia Security 2011: 244-246 - [c30]Dragana Martinovic, Victor Ralevich, Milan Petkovic:
Personal Health Data: Patient Consent in Information Age. MIE 2011: 58-62 - [c29]R. Paul Koster, Muhammad Asim, Milan Petkovic:
End-to-End Security for Personal Telehealth. MIE 2011: 621-625 - [c28]Milan Petkovic, Davide Prandi, Nicola Zannone:
Purpose Control: Did You Process the Data for the Intended Purpose? Secure Data Management 2011: 145-168 - [c27]Elisa Costante, Jerry den Hartog, Milan Petkovic:
On-line trust perception: What really matters. STAST 2011: 52-59 - 2010
- [c26]Luan Ibraimi, Muhammad Asim, Milan Petkovic:
An Encryption Scheme for a Secure Policy Updating. ICETE (Selected Papers) 2010: 304-318 - [c25]Nicola Zannone, Milan Petkovic, Sandro Etalle:
Towards Data Protection Compliance. SECRYPT 2010: 213-216 - [c24]Luan Ibraimi, Muhammad Asim, Milan Petkovic:
An Encryption Scheme for a Secure Policy Updating. SECRYPT 2010: 399-408 - 2009
- [c23]Julien Künzi, R. Paul Koster, Milan Petkovic:
Emergency Access to Protected Health Records. MIE 2009: 705-709 - [c22]Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. WISA 2009: 309-323 - 2008
- [c21]Stefan Katzenbeisser, Milan Petkovic:
Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. ARES 2008: 889-895 - [c20]Bart Bouwman, Sjouke Mauw, Milan Petkovic:
Rights Management for Role-Based Access Control. CCNC 2008: 1085-1090 - [c19]Ton van Deursen, R. Paul Koster, Milan Petkovic:
Reliable Personal Health Records. MIE 2008: 484-489 - 2007
- [c18]Milan Petkovic, Hong Li:
Digital Inheritance of Personal and Commercial Content Using DRM. CCNC 2007: 950-954 - [c17]Anna Zych, Milan Petkovic, Willem Jonker:
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. DBSec 2007: 95-97 - [c16]Milan Petkovic, Stefan Katzenbeisser, Klaus Kursawe:
Rights Management Technologies: A Good Choice for Securing Electronic Health Records? ISSE 2007: 178-187 - [c15]Anna Zych, Milan Petkovic, Willem Jonker:
A Key Management Method for Cryptographically Enforced Access Control. WOSIS 2007: 9-22 - [c14]Ton van Deursen, R. Paul Koster, Milan Petkovic:
Hedaquin: A Reputation-based Health Data Quality Indicator. STM@ESORICS 2007: 159-167 - 2006
- [c13]Milan Petkovic, Claudine Conrado, Malik Hammoutène:
Cryptographically Enforced Personalized Role-Based Access Control. SEC 2006: 364-376 - 2005
- [c12]Milan Petkovic, R. Paul Koster:
User-Attributed Rights in DRM. DRMTICS 2005: 75-89 - [c11]Claudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde:
Controlled Sharing of Personal Content using Digital Rights Management. WOSIS 2005: 173-185 - 2004
- [c10]Claudine Conrado, Milan Petkovic, Willem Jonker:
Privacy-Preserving Digital Rights Management. Secure Data Management 2004: 83-99 - 2003
- [c9]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker:
Techniques for automatic video content derivation. ICIP (2) 2003: 611-614 - 2002
- [c8]Milan Petkovic, Willem Jonker:
Cobra: A Content-Based Video Retrieval System. EDBT 2002: 736-738 - [c7]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker:
Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study. EDBT Workshops 2002: 318-341 - [c6]Milan Petkovic, Roelof van Zwol, Henk Ernst Blok, Willem Jonker, Peter M. G. Apers, Menzo Windhouwer, Martin L. Kersten:
Content-Based Video Indexing for the Support of Digital Library Search. ICDE 2002: 494-495 - [c5]Milan Petkovic, Vojkan Mihajlovic, Willem Jonker, Slobodanka Djordjevic-Kajan:
Multi-modal extraction of highlights from TV Formula 1 programs. ICME (1) 2002: 817-820 - 2001
- [c4]Milan Petkovic, Willem Jonker:
Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events. IEEE Workshop on Detection and Recognition of Events in Video 2001: 75-82 - [c3]Milan Petkovic, Willem Jonker, Z. Zivkovic:
Recognizing Strokes in Tennis Videos using Hidden Markov Models. VIIP 2001: 512-516 - [c2]Henk Ernst Blok, Menzo Windhouwer, Roelof van Zwol, Milan Petkovic, Peter M. G. Apers, Martin L. Kersten, Willem Jonker:
Flexible and scalable digital library search. VLDB 2001: 705-706 - 2000
- [c1]Milan Petkovic:
Content-based Video Retrieval. EDBT PhD Workshop 2000
Parts in Books or Collections
- 2019
- [p7]Ziawasch Abedjan, Nozha Boujemaa, Stuart Campbell, Patricia Casla, Supriyo Chatterjea, Sergio Consoli, Cristóbal Costa Soria, Paul Czech, Marija Despenic, Chiara Garattini, Dirk Hamelinck, Adrienne Heinrich, Wessel Kraaij, Jacek Kustra, Aizea Lojo, Marga Martin Sanchez, Miguel Angel Mayer, Matteo Melideo, Ernestina Menasalvas, Frank Møller Aarestrup, Elvira Narro Artigot, Milan Petkovic, Diego Reforgiato Recupero, Alejandro Rodríguez González, Gisele Roesems Kerremans, Roland Roller, Mário Romão, Stefan Rüping, Felix Sasaki, Wouter Spek, Nenad Stojanovic, Jack Thoms, Andrejs Vasiljevs, Wilfried Verachtert, Roel Wuyts:
Data Science in Healthcare: Benefits, Challenges and Opportunities. Data Science for Healthcare 2019: 3-38 - 2010
- [p6]Jorge Guajardo, Muhammad Asim, Milan Petkovic:
Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction. Towards Hardware-Intrinsic Security 2010: 387-407 - 2007
- [p5]Milan Petkovic, Willem Jonker:
Privacy and Security Issues in a Digital World. Security, Privacy, and Trust in Modern Data Management 2007: 3-10 - [p4]Milan Petkovic, Willem Jonker, Henk M. Blanken:
A Spatio-Temporal and a Probabilistic Approach for Video Retrieval. Multimedia Retrieval 2007: 251-269 - [p3]Vojkan Mihajlovic, Milan Petkovic, Willem Jonker, Henk M. Blanken:
Multimodal Content-based Video Retrieval. Multimedia Retrieval 2007: 271-294 - [p2]Hong Li, Milan Petkovic:
DRM for Protecting Personal Content. Security, Privacy, and Trust in Modern Data Management 2007: 333-346 - [p1]Milan Petkovic, Claudine Conrado, Geert Jan Schrijen, Willem Jonker:
Enhancing Privacy for Digital Rights Management. Security, Privacy, and Trust in Modern Data Management 2007: 347-364
Editorship
- 2019
- [e12]Sergio Consoli, Diego Reforgiato Recupero, Milan Petkovic:
Data Science for Healthcare - Methodologies and Applications. Springer 2019, ISBN 978-3-030-05248-5 [contents] - 2014
- [e11]Willem Jonker, Milan Petkovic:
Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings. Lecture Notes in Computer Science 8425, Springer 2014, ISBN 978-3-319-06810-7 [contents] - 2012
- [e10]Willem Jonker, Milan Petkovic:
Secure Data Management - 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings. Lecture Notes in Computer Science 7482, Springer 2012, ISBN 978-3-642-32872-5 [contents] - 2011
- [e9]Willem Jonker, Milan Petkovic:
Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings. Lecture Notes in Computer Science 6933, Springer 2011, ISBN 978-3-642-23555-9 [contents] - 2010
- [e8]Willem Jonker, Milan Petkovic:
Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings. Lecture Notes in Computer Science 6358, Springer 2010, ISBN 978-3-642-15545-1 [contents] - 2009
- [e7]Willem Jonker, Milan Petkovic:
Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings. Lecture Notes in Computer Science 5776, Springer 2009, ISBN 978-3-642-04218-8 [contents] - 2008
- [e6]Willem Jonker, Milan Petkovic:
Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings. Lecture Notes in Computer Science 5159, Springer 2008, ISBN 978-3-540-85258-2 [contents] - 2007
- [e5]Milan Petkovic, Willem Jonker:
Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, Springer 2007, ISBN 978-3-540-69860-9 [contents] - [e4]Willem Jonker, Milan Petkovic:
Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings. Lecture Notes in Computer Science 4721, Springer 2007, ISBN 978-3-540-75247-9 [contents] - 2006
- [e3]Willem Jonker, Milan Petkovic:
Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings. Lecture Notes in Computer Science 4165, Springer 2006, ISBN 978-3-540-38984-2 [contents] - 2005
- [e2]Willem Jonker, Milan Petkovic:
Secure Data Management, Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005, Proceedings. Lecture Notes in Computer Science 3674, Springer 2005, ISBN 3-540-28798-1 [contents] - 2004
- [e1]Willem Jonker, Milan Petkovic:
Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings. Lecture Notes in Computer Science 3178, Springer 2004, ISBN 3-540-22983-3 [contents]
Informal and Other Publications
- 2024
- [i8]Vadim Liventsev, Vivek Kumar, Allmin Pradhap Singh Susaiyah, Zixiu Wu, Ivan Rodin, Asfand Yaar, Simone Balloccu, Marharyta Beraziuk, Sebastiano Battiato, Giovanni Maria Farinella, Aki Härmä, Rim Helaoui, Milan Petkovic, Diego Reforgiato Recupero, Ehud Reiter, Daniele Riboni, Raymond Sterling:
PhilHumans: Benchmarking Machine Learning for Personal Health. CoRR abs/2405.02770 (2024) - 2023
- [i7]Allmin Pradhap Singh Susaiyah, Aki Härmä, Milan Petkovic:
Schema-Driven Actionable Insight Generation and Smart Recommendation. CoRR abs/2307.13176 (2023) - 2021
- [i6]Vadim Liventsev, Aki Härmä, Milan Petkovic:
BF++: a language for general-purpose neural program synthesis. CoRR abs/2101.09571 (2021) - [i5]Vadim Liventsev, Aki Härmä, Milan Petkovic:
Neurogenetic Programming Framework for Explainable Reinforcement Learning. CoRR abs/2102.04231 (2021) - [i4]Sander de Bruin, Vadim Liventsev, Milan Petkovic:
Autoencoders as Tools for Program Synthesis. CoRR abs/2108.07129 (2021) - 2019
- [i3]Michael van Hartskamp, Sergio Consoli, Wim Verhaegh, Milan Petkovic, Anja van de Stolpe:
Artificial Intelligence in Clinical Health Care Applications: Viewpoint. CoRR abs/1906.02090 (2019) - 2018
- [i2]Stefan Thaler, Vlado Menkovski, Milan Petkovic:
Deep Learning in Information Security. CoRR abs/1809.04332 (2018) - 2012
- [i1]Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. CoRR abs/1205.5757 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint