default search action
Lu Zhou 0002
Person information
- affiliation: Nanjing University of Aeronautics and Astronautics, Nanjing, China
- affiliation (former): University of Aizu, Division of Computer Science, Japan
Other persons with the same name
- Lu Zhou — disambiguation page
- Lu Zhou 0001 — Utah State University, Department of Mathematics and Statistics, Logan, UT, USA
- Lu Zhou 0003 — Wuhan Polytechnic University, School of Mathematics and Computer Science, China
- Lu Zhou 0004 — Tsinghua University, Department of Earth System Science, MoE Key Laboratory for Earth System Modeling, Beijing, China
- Lu Zhou 0005 — TigerGraph, Inc., San Diego, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j44]Siqi Liu, Zhusen Liu, Donglong Chen, Wangchen Dai, Lu Zhou, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç:
MLFormer: a high performance MPC linear inference framework for transformers. J. Cryptogr. Eng. 15(1): 2 (2025) - [j43]Hao Wang, Yichen Cai, Yu Tao, Luyao Wang, Yanbin Li, Lu Zhou:
B2DFL: Bringing butterfly to decentralized federated learning assisted with blockchain. J. Parallel Distributed Comput. 195: 104978 (2025) - 2024
- [j42]Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. IEEE Trans. Computers 73(12): 2817-2829 (2024) - [j41]Hao Wang, Chunpeng Ge, Lu Zhou, Zhe Liu, Dongwan Lan, Xiaozhen Lu, Danni Jiang:
A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts. IEEE Trans. Cloud Comput. 12(1): 70-83 (2024) - [j40]Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library. IEEE Trans. Dependable Secur. Comput. 21(5): 4895-4906 (2024) - [j39]Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices. IEEE Trans. Inf. Forensics Secur. 19: 3800-3813 (2024) - [j38]Zhusen Liu, Weizheng Wang, Yutong Ye, Nan Min, Zhenfu Cao, Lu Zhou, Zhe Liu:
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing. IEEE Trans. Inf. Forensics Secur. 19: 7019-7032 (2024) - [j37]Hao Wang, Yichen Cai, Jun Wang, Chuan Ma, Chunpeng Ge, Xiangmou Qu, Lu Zhou:
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation. IEEE Trans. Inf. Forensics Secur. 19: 9744-9759 (2024) - [j36]Zhusen Liu, Luyao Wang, Haiyong Bao, Zhenfu Cao, Lu Zhou, Zhe Liu:
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks. IEEE Trans. Ind. Informatics 20(5): 8007-8018 (2024) - [c30]Weibin Wu, Ying Wang, Yangpan Zhang, Luyao Wang, Lu Zhou:
Parallel Secure Inference for Multiple Models Based on CKKS. APWeb/WAIM (4) 2024: 199-213 - [c29]Yifan Wang, Yu Tao, Hao Wang, Chunpeng Ge, Lu Zhou:
ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on Blockchain. APWeb/WAIM (4) 2024: 261-277 - [c28]Meiqi Yang, Yu Tao, Xiaofei Wu, Chunpeng Ge, Lu Zhou:
Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DApps. APWeb/WAIM (4) 2024: 309-325 - [c27]Xuan Yu, Jipeng Zhang, Junhao Huang, Donglong Chen, Lu Zhou:
Multi-way High-Throughput Implementation of Kyber. ISC (2) 2024: 41-60 - [i9]Qiannan Wang, Changchun Yin, Liming Fang, Lu Zhou, Zhe Liu, Run Wang, Chenhao Lin:
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. CoRR abs/2401.00137 (2024) - [i8]Hao Wang, Yichen Cai, Jun Wang, Chuan Ma, Chunpeng Ge, Xiangmou Qu, Lu Zhou:
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation. CoRR abs/2408.06885 (2024) - 2023
- [j35]Feng Zhang, Hao Wang, Lu Zhou, Dequan Xu, Liang Liu:
A blockchain-based security and trust mechanism for AI-enabled IIoT systems. Future Gener. Comput. Syst. 146: 78-85 (2023) - [j34]Weibin Wu, Jun Wang, Yangpan Zhang, Zhe Liu, Lu Zhou, Xiaodong Lin:
VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations. IEEE Trans. Inf. Forensics Secur. 18: 4214-4228 (2023) - [j33]Zhaoyang Han, Yaoqi Yang, Weizheng Wang, Lu Zhou, Thippa Reddy Gadekallu, Mamoun Alazab, Prosanta Gope, Chunhua Su:
RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 24(4): 4641-4650 (2023) - [j32]Shenqing Wang, Chunpeng Ge, Lu Zhou, Huaqun Wang, Zhe Liu, Jian Wang:
Privacy-Preserving Classification in Multiple Clouds eHealthcare. IEEE Trans. Serv. Comput. 16(1): 493-503 (2023) - [c26]Xinhang Wan, Xinwang Liu, Jiyuan Liu, Siwei Wang, Yi Wen, Weixuan Liang, En Zhu, Zhe Liu, Lu Zhou:
Auto-Weighted Multi-View Clustering for Large-Scale Data. AAAI 2023: 10078-10086 - [c25]Pei Zhang, Siwei Wang, Liang Li, Changwang Zhang, Xinwang Liu, En Zhu, Zhe Liu, Lu Zhou, Lei Luo:
Let the Data Choose: Flexible and Diverse Anchor Graph Fusion for Scalable Multi-View Clustering. AAAI 2023: 11262-11269 - [c24]Zhicheng Li, Yundi Shi, Xuan Sheng, Changchun Yin, Lu Zhou, Piji Li:
Vulnerability Analysis of Continuous Prompts for Pre-trained Language Models. ICANN (9) 2023: 508-519 - [c23]Zikang Jin, Changchun Yin, Piji Li, Lu Zhou, Liming Fang, Xiangmao Chang, Zhe Liu:
Multi-Layer Feature Division Transferable Adversarial Attack. ICASSP 2023: 1-5 - [c22]Luping Rao, Chuan Ma, Ming Ding, Yuwen Qian, Lu Zhou, Zhe Liu:
Sparse Federated Training of Object Detection in the Internet of Vehicles. ICC 2023: 1768-1773 - [c21]Jiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan, Xiaofei Wu, Lu Zhou, Liming Fang:
An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV. ICICS 2023: 383-395 - [c20]Yunfei Wang, Hao Wang, Xiaozhen Lu, Lu Zhou, Liang Liu:
Detecting Ethereum Phishing Scams with Temporal Motif Features of Subgraph. ISCC 2023: 631-636 - [c19]Zhicheng Li, Piji Li, Xuan Sheng, Changchun Yin, Lu Zhou:
IMTM: Invisible Multi-trigger Multimodal Backdoor Attack. NLPCC (2) 2023: 533-545 - [i7]Xinhang Wan, Xinwang Liu, Jiyuan Liu, Siwei Wang, Yi Wen, Weixuan Liang, En Zhu, Zhe Liu, Lu Zhou:
Auto-weighted Multi-view Clustering for Large-scale Data. CoRR abs/2303.01983 (2023) - [i6]Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet another Improvement of Plantard Arithmetic for Faster Kyber on Low-end 32-bit IoT Devices. CoRR abs/2309.00440 (2023) - [i5]Luping Rao, Chuan Ma, Ming Ding, Yuwen Qian, Lu Zhou, Zhe Liu:
Sparse Federated Training of Object Detection in the Internet of Vehicles. CoRR abs/2309.03569 (2023) - [i4]Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU. IACR Cryptol. ePrint Arch. 2023: 49 (2023) - [i3]Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, Yunlei Zhao:
XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1428 (2023) - [i2]Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. IACR Cryptol. ePrint Arch. 2023: 1429 (2023) - 2022
- [j31]Yi Yang, Debiao He, Huaqun Wang, Lu Zhou:
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 33(5) (2022) - [j30]Zhaoyang Han, Lu Zhou, Chunpeng Ge, Juan Li, Zhe Liu:
Robust privacy-preserving federated learning framework for IoT devices. Int. J. Intell. Syst. 37(11): 9655-9673 (2022) - [j29]Zhaoyang Han, Yaoqi Yang, Weizheng Wang, Lu Zhou, Tu N. Nguyen, Chunhua Su:
Age Efficient Optimization in UAV-Aided VEC Network: A Game Theory Viewpoint. IEEE Trans. Intell. Transp. Syst. 23(12): 25287-25296 (2022) - [j28]Xiangmao Chang, Jun Zhan, Guoliang Xing, Jun Huang, Bing Chen, Lu Zhou:
Measurement-Based Optimization of Cell Selection in NB-IoT Networks. ACM Trans. Sens. Networks 18(4): 65:1-65:19 (2022) - [j27]Kun Zhu, Lujiu Li, Yuanyuan Xu, Tong Zhang, Lu Zhou:
Multi-Connection Based Scalable Video Streaming in UDNs: A Multi-Agent Multi-Armed Bandit Approach. IEEE Trans. Wirel. Commun. 21(2): 1156-1169 (2022) - [c18]Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu:
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts. ACISP 2022: 449-468 - [c17]Yuqing Niu, Lu Zhou, Zhe Liu:
A Deep Looking at the Code Changes in OpenHarmony. APWeb/WAIM (1) 2022: 426-434 - [c16]Yundi Shi, Piji Li, Changchun Yin, Zhaoyang Han, Lu Zhou, Zhe Liu:
PromptAttack: Prompt-Based Attack for Language Models via Gradient Search. NLPCC (1) 2022: 682-693 - [c15]Sihan He, Weibin Wu, Yanbin Li, Lu Zhou, Liming Fang, Zhe Liu:
Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis. WASA (2) 2022: 93-104 - [c14]Xin Guo, Ruyun Zhang, Lu Zhou, Xiaozhen Lu:
Precise Code Clone Detection with Architecture of Abstract Syntax Trees. WASA (3) 2022: 117-126 - [c13]Fengyuan Qiu, Hao Yang, Lu Zhou, Chuan Ma, Liming Fang:
Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption. WASA (1) 2022: 427-440 - [i1]Yundi Shi, Piji Li, Changchun Yin, Zhaoyang Han, Lu Zhou, Zhe Liu:
PromptAttack: Prompt-based Attack for Language Models via Gradient Search. CoRR abs/2209.01882 (2022) - 2021
- [j26]Chunpeng Ge, Lu Zhou, Gerhard P. Hancke, Chunhua Su:
A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks. IEEE Internet Things J. 8(16): 12481-12489 (2021) - [j25]Liming Fang, Xinyu Yun, Changchun Yin, Weiping Ding, Lu Zhou, Zhe Liu, Chunhua Su:
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning. IEEE Trans. Fuzzy Syst. 29(4): 742-756 (2021) - [c12]Wei-Yang Chiu, Lu Zhou, Weizhi Meng, Zhe Liu, Chunpeng Ge:
ActAnyware - Blockchain-Based Software Licensing Scheme. BlockSys 2021: 559-573 - [c11]Zhixin Zhao, Lu Zhou, Chunhua Su:
Systematic Research on Technology and Challenges of Lightning Network. DSC 2021: 1-8 - [c10]Zhongming Wang, Biwen Chen, Tao Xiang, Lu Zhou, Yan-Hong Liu, Jin Li:
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control. ProvSec 2021: 3-18 - [c9]Zhixin Zhao, Chunpeng Ge, Lu Zhou, Huaqun Wang:
Fully Discover the Balance of Lightning Network Payment Channels. WASA (1) 2021: 159-173 - [c8]Jingxiu Yang, Lu Zhou, Liang Liu, Zuchao Ma:
ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network. WASA (2) 2021: 494-509 - 2020
- [j24]Lu Zhou, Chunpeng Ge, Chunhua Su:
A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes. Sci. China Inf. Sci. 63(3) (2020) - [j23]Boyu Kuang, Anmin Fu, Lu Zhou, Willy Susilo, Yuqing Zhang:
DO-RA: Data-oriented runtime attestation for IoT devices. Comput. Secur. 97: 101945 (2020) - [j22]Lu Zhou, Chunpeng Ge, Simin Hu, Chunhua Su:
Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks. IEEE Internet Things J. 7(5): 3948-3957 (2020) - [j21]Liming Fang, Changchun Yin, Lu Zhou, Yang Li, Chunhua Su, Jinyue Xia:
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine. Inf. Sci. 507: 143-160 (2020) - [j20]Cong Peng, Jianhua Chen, Lu Zhou, Kim-Kwang Raymond Choo, Debiao He:
CsiIBS: A post-quantum identity-based signature scheme based on isogenies. J. Inf. Secur. Appl. 54: 102504 (2020) - [j19]Guangkai Ma, Chunpeng Ge, Lu Zhou:
Achieving reliable timestamp in the bitcoin platform. Peer-to-Peer Netw. Appl. 13(6): 2251-2259 (2020) - [j18]Lu Zhou, Chunhua Su, Wayne Chiu, Kuo-Hui Yeh:
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks. IEEE Trans. Emerg. Top. Comput. 8(2): 303-312 (2020) - [j17]Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, Debiao He:
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(6): 5813-5825 (2020) - [c7]Hanyi Zhang, Liming Fang, Keyu Jiang, Weiting Zhang, Minghui Li, Lu Zhou:
Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data. ICPADS 2020: 406-413 - [c6]Changchun Yin, Hao Wang, Lu Zhou, Liming Fang:
Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data. TrustCom 2020: 277-284
2010 – 2019
- 2019
- [j16]Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su:
A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing. IEEE Access 7: 137266-137278 (2019) - [j15]Lu Zhou, Jiageng Chen, Yidan Zhang, Chunhua Su, Marino Anthony James:
Security analysis and new models on the intelligent symmetric key encryption. Comput. Secur. 80: 14-24 (2019) - [j14]Lu Zhou, Xiong Li, Kuo-Hui Yeh, Chunhua Su, Wayne Chiu:
Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 91: 244-251 (2019) - [j13]Lu Zhou, Chunhua Su, Zhen Li, Zhe Liu, Gerhard P. Hancke:
Automatic fine-grained access control in SCADA by machine learning. Future Gener. Comput. Syst. 93: 548-559 (2019) - [j12]Lu Zhou, Xin Sun, Chunhua Su, Zhe Liu, Kim-Kwang Raymond Choo:
Game theoretic security of quantum bit commitment. Inf. Sci. 479: 503-514 (2019) - [j11]Liming Fang, Minghui Li, Lu Zhou, Hanyi Zhang, Chunpeng Ge:
A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch. Sensors 19(9): 2109 (2019) - [j10]Lu Zhou, Chunhua Su, Zhi Hu, Sokjoon Lee, Hwajeong Seo:
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device. ACM Trans. Embed. Comput. Syst. 18(3): 23:1-23:13 (2019) - [j9]Lu Zhou, Chunhua Su, Kuo-Hui Yeh:
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things. ACM Trans. Embed. Comput. Syst. 18(3): 28:1-28:10 (2019) - [c5]Johann Großschädl, Zhe Liu, Zhi Hu, Chunhua Su, Lu Zhou:
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism. SIoT 2019: 1-8 - [c4]Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su:
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds. SocialSec 2019: 139-151 - 2018
- [j8]Kuo-Hui Yeh, Chunhua Su, Wayne Chiu, Lu Zhou:
I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics. IEEE Commun. Mag. 56(2): 150-157 (2018) - [j7]Rupeng Yang, Qiuliang Xu, Man Ho Au, Zuoxia Yu, Hao Wang, Lu Zhou:
Position based cryptography with location privacy: A step for Fog Computing. Future Gener. Comput. Syst. 78: 799-806 (2018) - [j6]Lu Zhou, Youwen Zhu, Kim-Kwang Raymond Choo:
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gener. Comput. Syst. 81: 404-413 (2018) - [j5]Lu Zhou, Chunhua Su, Yamin Wen, Weijie Li, Zheng Gong:
Towards practical white-box lightweight block cipher implementations for IoTs. Future Gener. Comput. Syst. 86: 507-514 (2018) - [j4]Lu Zhou, Chunhua Su, Xin Sun, Xishun Zhao, Kim-Kwang Raymond Choo:
Stag hunt and trust emergence in social networks. Future Gener. Comput. Syst. 88: 168-172 (2018) - [j3]Lu Zhou, Quanlong Wang, Xin Sun, Piotr Kulicki, Arcangelo Castiglione:
Quantum technique for access control in cloud computing II: Encryption and key distribution. J. Netw. Comput. Appl. 103: 178-184 (2018) - [j2]Lu Zhou, Kuo-Hui Yeh, Gerhard P. Hancke, Zhe Liu, Chunhua Su:
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints. IEEE Signal Process. Mag. 35(5): 76-87 (2018) - 2017
- [j1]Zhe Liu, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou:
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age. IEEE Trans. Dependable Secur. Comput. 14(3): 237-248 (2017) - 2016
- [c3]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, Howon Kim:
Parallel Implementations of LEA, Revisited. WISA 2016: 318-330 - [c2]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Lu Zhou, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward. WISA 2016: 331-340 - 2015
- [c1]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim:
Faster ECC over F2521-1 (feat. NEON). ICISC 2015: 169-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint