default search action
Jizhong Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j88]Yuhao Shen, Wei Xi, Yunyun Cai, Yuwei Fan, He Yang, Jizhong Zhao:
Multi-objective federated learning: Balancing global performance and individual fairness. Future Gener. Comput. Syst. 162: 107468 (2025) - 2024
- [j87]Yuwei Fan, Wei Xi, Hengyi Zhu, Jizhong Zhao:
MiniPFL: Mini federations for hierarchical personalized federated learning. Future Gener. Comput. Syst. 157: 41-50 (2024) - [j86]Yihan Zhao, Wei Xi, Gairui Bai, Xinhui Liu, Jizhong Zhao:
Heterogeneous Interactive Graph Network for Audio-Visual Question Answering. Knowl. Based Syst. 300: 112165 (2024) - [j85]Han Ding, Linwei Zhai, Cui Zhao, Fei Wang, Ge Wang, Wei Xi, Zhi Wang, Jizhong Zhao:
Genre Classification Empowered by Knowledge-Embedded Music Representation. IEEE ACM Trans. Audio Speech Lang. Process. 32: 2764-2776 (2024) - [j84]He Yang, Wei Xi, Yuhao Shen, Canhui Wu, Jizhong Zhao:
RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 2951-2966 (2024) - [j83]Cui Zhao, Zhenjiang Li, Han Ding, Ge Wang, Wei Xi, Jizhong Zhao:
Enabling Multi-Frequency and Wider-Band RFID Sensing Using COTS Device. IEEE/ACM Trans. Netw. 32(4): 3591-3605 (2024) - 2023
- [j82]Han Ding, Zhenbin Chen, Cui Zhao, Fei Wang, Ge Wang, Wei Xi, Jizhong Zhao:
MI-Mesh: 3D Human Mesh Construction by Fusing Image and Millimeter Wave. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1): 10:1-10:24 (2023) - [j81]Ge Wang, Lubing Han, Yuance Chang, Yuting Shi, Chen Qian, Cong Zhao, Han Ding, Wei Xi, Cui Zhao, Jizhong Zhao:
Cross-technology Communication between Visible Light and Battery-free RFIDs. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(3): 129:1-129:20 (2023) - [j80]Ge Wang, Shouqian Shi, Huazhe Wang, Yi Liu, Chen Qian, Cong Zhao, Wei Xi, Han Ding, Zhiping Jiang, Jizhong Zhao:
Concurrent Rate-Adaptive Reading With Passive RFIDs. IEEE Internet Things J. 10(1): 499-511 (2023) - [j79]He Yang, Wei Xi, Zizhao Wang, Yuhao Shen, Xinyuan Ji, Cerui Sun, Jizhong Zhao:
FedRich: Towards efficient federated learning for heterogeneous clients using heuristic scheduling. Inf. Sci. 645: 119360 (2023) - [j78]Xinhui Liu, Wei Xi, Wen Li, Dong Xu, Gairui Bai, Jizhong Zhao:
Co-MDA: Federated Multisource Domain Adaptation on Black-Box Models. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7658-7670 (2023) - [j77]Heli Sun, Ning Wang, Jingyu Jia, Jianbin Huang, Hui Xiong, Liang He, Xinwang Liu, Shan Zhang, Shaojie Qiao, Jizhong Zhao:
Platform-Oriented Event Time Allocation. IEEE Trans. Knowl. Data Eng. 35(3): 2930-2942 (2023) - [j76]Ge Wang, Xiaofeng Shi, Haofan Cai, Chen Qian, Han Ding, Wei Xi, Kun Zhao, Jizhong Zhao, Jinsong Han:
A Generalized Method to Combat Multipaths for RFID Sensing. IEEE/ACM Trans. Netw. 31(1): 336-351 (2023) - 2022
- [j75]Wei Shi, Zuhao Chen, Kun Zhao, Wei Xi, Yuhang Qu, Hui He, Zhenge Guo, Zhe Ma, Xuhui Huang, Peng Wang, Bo Dong, Jizhong Zhao:
3D target location based on RFID polarization phase model. EURASIP J. Wirel. Commun. Netw. 2022(1): 17 (2022) - [j74]Yunyun Cai, Wei Xi, Yuhao Shen, Youcheng Peng, Shixuan Song, Jizhong Zhao:
High-efficient hierarchical federated learning on non-IID data with progressive collaboration. Future Gener. Comput. Syst. 137: 111-128 (2022) - [j73]Xinhui Liu, Wei Xi, Gairui Bai, Ziwei Wang, Zhilin Liu, Jizhong Zhao:
M2N: Mutual constraint network for multi-level unsupervised domain adaptation. Neurocomputing 487: 269-279 (2022) - [j72]Han Ding, Yizhan Wang, Hao Li, Cui Zhao, Ge Wang, Wei Xi, Jizhong Zhao:
UltraSpeech: Speech Enhancement by Interaction between Ultrasound and Speech. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(3): 111:1-111:25 (2022) - [j71]Ge Wang, Shouqian Shi, Minmei Wang, Chen Qian, Cong Zhao, Han Ding, Wei Xi, Jizhong Zhao:
RF-Chain: Decentralized, Credible, and Counterfeit-proof Supply Chain Management with Commodity RFIDs. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(4): 184:1-184:28 (2022) - [j70]Xiaoyu Ma, Wei Xi, Xinyu Zhao, Zuhao Chen, Hui Zhang, Jizhong Zhao:
Wisual: Indoor Crowd Density Estimation and Distribution Visualization Using Wi-Fi. IEEE Internet Things J. 9(12): 10077-10092 (2022) - [j69]Han Ding, Cui Zhao, Ge Wang, Kun Zhao, Wei Xi, Jizhong Zhao:
Utilizing Tag Interference for Refined Localization of Passive RFID. IEEE Internet Things J. 9(14): 12656-12672 (2022) - [j68]Zhou Yang, Heli Sun, Jianbin Huang, Liang He, Xiaolin Jia, Jizhong Zhao, Shaojie Qiao:
Robust Traffic Speed Inference With Ensemble Learning. IEEE Trans. Intell. Transp. Syst. 23(10): 17241-17257 (2022) - [j67]Han Ding, Jinsong Han, Cui Zhao, Ge Wang, Wei Xi, Zhiping Jiang, Jizhong Zhao:
Arbitrator2.0: Preventing Unauthorized Access on Passive Tags. IEEE Trans. Mob. Comput. 21(3): 835-848 (2022) - 2021
- [j66]Kun Zhao, Xiaoxian Yang, Wei Xi, Zhiping Jiang, Xiaohong Wang, Zhi Wang, Xinyuan Ji, Zhao Yang, Jizhong Zhao:
HCAR: Human continuous activity recognition using latent structure features. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j65]Zhi Wang, Yubing Li, Kun Zhao, Wei Shi, Liangliang Lin, Jizhong Zhao:
Worker Collaborative group estimation in spatial crowdsourcing. Neurocomputing 428: 385-391 (2021) - [j64]Han Ding, Linwei Zhai, Cui Zhao, Songjiang Hou, Ge Wang, Wei Xi, Jizhong Zhao, Yihong Gong:
RF-ray: Joint RF and Linguistics Domain Learning for Object Recognition. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 96:1-96:24 (2021) - [j63]Cui Zhao, Zhenjiang Li, Han Ding, Wei Xi, Ge Wang, Jizhong Zhao:
Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 139:1-139:22 (2021) - [j62]Wei Xi, Meichen Duan, Xiuxiu Bai, Kun Zhao, Lufeng Mo, Jizhong Zhao:
KEEP: Secure and Efficient Communication for Distributed IoT Devices. IEEE Internet Things J. 8(16): 12758-12770 (2021) - [j61]Kun Zhao, Wei Xi, Zhiping Jiang, Zhi Wang, Hui He, Tao Li, Xiaobin Zhang, Jizhong Zhao:
Indoor Geofencing Based on Sensorless Motion Sensing and Fingerprint Self-Updating. Mob. Networks Appl. 26(2): 851-869 (2021) - [j60]Lei Rao, Bin Zhang, Jizhong Zhao:
An Energy-Efficient Accelerator for Rain Removal Based on Convolutional Neural Network. IEEE Trans. Circuits Syst. II Express Briefs 68(8): 2957-2961 (2021) - [j59]Ge Wang, Chen Qian, Longfei Shangguan, Han Ding, Jinsong Han, Kaiyan Cui, Wei Xi, Jizhong Zhao:
Corrections to "HMO: Ordering RFID Tags With Static Devices in Mobile Environments". IEEE Trans. Mob. Comput. 20(4): 1746 (2021) - 2020
- [j58]Yubing Li, Kun Zhao, Fei Ren, Biao Wang, Jizhong Zhao:
Research on Super-Resolution Image Reconstruction Based on Low-Resolution Infrared Sensor. IEEE Access 8: 69186-69199 (2020) - [j57]Yubing Li, Kun Zhao, Meichen Duan, Wei Shi, Liangliang Lin, Xinyi Cao, Yang Liu, Jizhong Zhao:
Control Your Home With a Smartwatch. IEEE Access 8: 131601-131613 (2020) - [j56]Kun Zhao, Wei Xi, Zhi Wang, Jizhong Zhao, Ruimeng Wang, Zhiping Jiang:
SMSS: Secure Member Selection Strategy in Federated Learning. IEEE Intell. Syst. 35(4): 37-49 (2020) - [j55]Zhiping Jiang, Kun Zhao, Rui Li, Jizhong Zhao, Junzhao Du:
PHYAlert: identity spoofing attack detection and prevention for a wireless edge network. J. Cloud Comput. 9: 5 (2020) - [j54]Han Ding, Lei Guo, Cui Zhao, Fei Wang, Ge Wang, Zhiping Jiang, Wei Xi, Jizhong Zhao:
RFnet: Automatic Gesture Recognition and Human Identification Using Time Series RFID Signals. Mob. Networks Appl. 25(6): 2240-2253 (2020) - [j53]Ge Wang, Chen Qian, Longfei Shangguan, Han Ding, Jinsong Han, Kaiyan Cui, Wei Xi, Jizhong Zhao:
HMO: Ordering RFID Tags with Static Devices in Mobile Environments. IEEE Trans. Mob. Comput. 19(1): 74-89 (2020) - [j52]Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Shouqian Shi, Xin Li, Han Ding, Wei Xi, Jizhong Zhao:
Hu-Fu: Replay-Resilient RFID Authentication. IEEE/ACM Trans. Netw. 28(2): 547-560 (2020) - 2019
- [j51]Zhiping Jiang, Kun Zhao, Rui Li, Jizhong Zhao:
i-VALS: Visual Attention Localization for Mobile Service Computing. IEEE Access 7: 45166-45181 (2019) - [j50]Lin-Yuan He, Kun Liu, Jizhong Zhao, Du-yan Bi:
Visibility restoration of single foggy images under local surface analysis. Neurocomputing 341: 212-226 (2019) - [j49]Han Ding, Jinsong Han, Alex X. Liu, Wei Xi, Jizhong Zhao, Panlong Yang, Zhiping Jiang:
Counting Human Objects Using Backscattered Radio Frequency Signals. IEEE Trans. Mob. Comput. 18(5): 1054-1067 (2019) - [j48]Ge Wang, Jinsong Han, Chen Qian, Wei Xi, Han Ding, Zhiping Jiang, Jizhong Zhao:
Verifiable Smart Packaging with Passive RFID. IEEE Trans. Mob. Comput. 18(5): 1217-1230 (2019) - [j47]Han Ding, Chen Qian, Jinsong Han, Jian Xiao, Xingjun Zhang, Ge Wang, Wei Xi, Jizhong Zhao:
Close-Proximity Detection for Hand Approaching Using Backscatter Communication. IEEE Trans. Mob. Comput. 18(10): 2285-2297 (2019) - 2018
- [j46]Lin-Yuan He, Jizhong Zhao, Duyan Bi:
Effective haze removal under mixed domain and retract neighborhood. Neurocomputing 293: 29-40 (2018) - [j45]Guoying Wang, Xiaoping Wu, Lufeng Mo, Jizhong Zhao:
SCFSen: A Sensor Node for Regional Soil Carbon Flux Monitoring. Sensors 18(11): 3986 (2018) - [j44]Bin Zhang, Chen Zhao, Kuizhi Mei, Jizhong Zhao, Nanning Zheng:
Hierarchical and Parallel Pipelined Heterogeneous SoC for Embedded Vision Processing. IEEE Trans. Circuits Syst. Video Technol. 28(6): 1434-1444 (2018) - 2017
- [j43]Pei Liu, Tian Zhao, Feng Liang, Jizhong Zhao, Peilin Jiang:
A power-delay-product efficient and SEU-tolerant latch design. IEICE Electron. Express 14(23): 20170972 (2017) - [j42]Qinghua Yu, Jinjun Wang, Shizhou Zhang, Yihong Gong, Jizhong Zhao:
Combining local and global hypotheses in deep neural network for multi-label image classification. Neurocomputing 235: 38-45 (2017) - [j41]Lin-Yuan He, Jizhong Zhao, Nanning Zheng, Duyan Bi:
Haze Removal Using the Difference- Structure-Preservation Prior. IEEE Trans. Image Process. 26(3): 1063-1075 (2017) - [j40]Han Ding, Jinsong Han, Longfei Shangguan, Wei Xi, Zhiping Jiang, Zheng Yang, Zimu Zhou, Panlong Yang, Jizhong Zhao:
A Platform for Free-Weight Exercise Monitoring with Passive Tags. IEEE Trans. Mob. Comput. 16(12): 3279-3293 (2017) - [j39]Bin Zhang, Jizhong Zhao:
Hardware Implementation for Real-Time Haze Removal. IEEE Trans. Very Large Scale Integr. Syst. 25(3): 1188-1192 (2017) - [j38]Bin Zhang, Jizhong Zhao:
Elementary Function Computing Method for Floating-Point Unit. J. Signal Process. Syst. 88(3): 311-321 (2017) - 2016
- [j37]Ce Li, Yang Yang, Limei Xiao, Yongxin Li, Yannan Zhou, Jizhong Zhao:
A novel image enhancement method using fuzzy Sure entropy. Neurocomputing 215: 196-211 (2016) - [j36]Qiubo Chen, Hongbin Sun, Xuchong Zhang, Huibin Tao, Jie Yang, Jizhong Zhao, Nanning Zheng:
Algorithm and VLSI Architecture of Edge-Directed Image Upscaling for 4k Display System. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1758-1771 (2016) - [j35]Peng Cheng, Xiang Lian, Lei Chen, Jinsong Han, Jizhong Zhao:
Task Assignment on Multi-Skill Oriented Spatial Crowdsourcing. IEEE Trans. Knowl. Data Eng. 28(8): 2201-2215 (2016) - [j34]Jinsong Han, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, Jizhong Zhao:
GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags. IEEE/ACM Trans. Netw. 24(2): 846-858 (2016) - [j33]Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Wei Xi, Zhiping Jiang, Zhi Wang:
Twins: Device-Free Object Tracking Using Passive Tags. IEEE/ACM Trans. Netw. 24(3): 1605-1617 (2016) - [j32]Jinsong Han, Han Ding, Chen Qian, Wei Xi, Zhi Wang, Zhiping Jiang, Longfei Shangguan, Jizhong Zhao:
CBID: A Customer Behavior Identification System Using Passive Tags. IEEE/ACM Trans. Netw. 24(5): 2885-2898 (2016) - [j31]Lei Rao, Bin Zhang, Jizhong Zhao:
Hardware Implementation of Reconfigurable 1D Convolution. J. Signal Process. Syst. 82(1): 1-16 (2016) - 2015
- [j30]Shuo Lian, Jizhong Zhao, Yuan He:
Event Localization and Actuation in Wireless Sensor Network without Locations. Ad Hoc Sens. Wirel. Networks 26(1-4): 97-123 (2015) - [j29]Rui Li, Han Ding, Shaoping Li, Xing Wang, Hui Liu, Jizhong Zhao:
An Empirical Study on Hidden Tag Problem. Int. J. Distributed Sens. Networks 11: 526475:1-526475:12 (2015) - [j28]Guoying Wang, Lufeng Mo, Jizhong Zhao, Chaoqi Zhang:
Time Domain Similarity of Lightweight Parameters Based Soil Respiration Sensor Network Deployment. Int. J. Distributed Sens. Networks 11: 530272:1-530272:13 (2015) - [j27]Han Ding, Min Xi, Zhe Li, Jizhong Zhao:
Device-Free Mobile Target Tracking Using Passive Tags. Int. J. Distributed Sens. Networks 11: 870204:1-870204:12 (2015) - [j26]Bin Zhang, Kuizhi Mei, Jizhong Zhao:
Matrix computing coprocessor for an embedded system. Microprocess. Microsystems 39(7): 444-456 (2015) - [j25]Hai-Jiang Xie, Jizhong Zhao:
A lightweight identity authentication method by exploiting network covert channel. Peer-to-Peer Netw. Appl. 8(6): 1038-1047 (2015) - [j24]Peng Cheng, Xiang Lian, Zhao Chen, Rui Fu, Lei Chen, Jinsong Han, Jizhong Zhao:
Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers. Proc. VLDB Endow. 8(10): 1022-1033 (2015) - 2014
- [j23]Yanwei Wu, Jizhong Zhao, Xiang-Yang Li:
Throughput Optimization in Wireless Mesh Networks Using Zero-Sum Game. Ad Hoc Sens. Wirel. Networks 21(1-2): 151-175 (2014) - [j22]Jizhong Zhao, Lufeng Mo, Xiaoping Wu, Guoying Wang, Enbin Liu, Dan Dai:
Error Estimation of Iterative Maximum Likelihood Localization in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 23(3-4): 277-295 (2014) - [j21]Zhiping Jiang, Wei Xi, Xiangyang Li, Shaojie Tang, Jizhong Zhao, Jinsong Han, Kun Zhao, Zhi Wang, Bo Xiao:
Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation. J. Comput. Sci. Technol. 29(4): 589-604 (2014) - [j20]Rui Li, Kebin Liu, Xiang-Yang Li, Yuan He, Wei Xi, Zhi Wang, Jizhong Zhao, Meng Wan:
Assessing Diagnosis Approaches for Wireless Sensor Networks: Concepts and Analysis. J. Comput. Sci. Technol. 29(5): 887-900 (2014) - [j19]Zhi Wang, Jinsong Han, Wei Xi, Jizhong Zhao:
Efficient and secure key extraction using channel state information. J. Supercomput. 70(3): 1537-1554 (2014) - 2013
- [j18]Rui Li, Jizhong Zhao, Kebin Liu, Yuan He:
Ranking-based Feature Selection for Anomaly Detection in Sensor Networks. Ad Hoc Sens. Wirel. Networks 19(1-2): 119-139 (2013) - [j17]Rui Li, Jinsong Han, Zhi Wang, Jizhong Zhao, Yihong Gong, Xiaobin Zhang:
Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management. Int. J. Distributed Sens. Networks 9 (2013) - [j16]Shuo Lian, Jizhong Zhao, Xu Zhao:
Near-Optimal Diagnosis System Deployment in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j15]Lufeng Mo, YuJia Jiang, Guoying Wang, Jizhong Zhao:
Segmental Dynamic Duty Cycle Control for Sampling Scheduling in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j14]Zhi Wang, Han Ding, Jinsong Han, Jizhong Zhao:
Secure and Efficient Control Transfer for IoT Devices. Int. J. Distributed Sens. Networks 9 (2013) - [j13]Jizhong Zhao, Wei Xi, Yuan He, Yunhao Liu, Xiang-Yang Li, Lufeng Mo, Zheng Yang:
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality. IEEE/ACM Trans. Netw. 21(1): 311-323 (2013) - 2012
- [j12]Shan Chang, Yong Qi, Hongzi Zhu, Jizhong Zhao, Xuemin Shen:
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks. IEEE Trans. Parallel Distributed Syst. 23(6): 1103-1114 (2012) - [j11]Hongbin Sun, Chuanyin Liu, Wei Xu, Jizhong Zhao, Nanning Zheng, Tong Zhang:
Using Magnetic RAM to Build Low-Power and Soft Error-Resilient L1 Cache. IEEE Trans. Very Large Scale Integr. Syst. 20(1): 19-28 (2012) - 2011
- [j10]Min Xi, Yong Qi, Kui Wu, Jizhong Zhao, Mo Li:
Using Potential to Guide Mobile Nodes in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 12(3-4): 229-251 (2011) - [j9]Jinsong Han, Jizhong Zhao, Min Xi, Xingming Sun:
Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems. Int. J. Ad Hoc Ubiquitous Comput. 8(1/2): 106-113 (2011) - [j8]Ping Xu, Xiang-Yang Li, Shaojie Tang, Jizhong Zhao:
Efficient and Strategyproof Spectrum Allocations in Multichannel Wireless Networks. IEEE Trans. Computers 60(4): 580-593 (2011) - [j7]ShiGuang Wang, XuFei Mao, Shaojie Tang, Xiang-Yang Li, Jizhong Zhao, Guojun Dai:
On "Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks". IEEE Trans. Parallel Distributed Syst. 22(4): 687-694 (2011) - 2010
- [j6]Jinsong Han, Jun Miao, Jizhong Zhao, Jinpeng Huai, Lionel M. Ni:
Efficient Data Retrieving in Distributed Data-streaming Environments. Ad Hoc Sens. Wirel. Networks 10(2-3): 135-151 (2010) - [j5]Yunhao Liu, Guomo Zhou, Jizhong Zhao, Guojun Dai, Xiang-Yang Li, Ming Gu, Huadong Ma, Lufeng Mo, Yuan He, Jiliang Wang:
Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs. Frontiers Comput. Sci. China 4(3): 334-338 (2010) - 2009
- [j4]Xiang-Yang Li, Ashraf Nusairat, Yanwei Wu, Yong Qi, Jizhong Zhao, Xiaowen Chu, Yunhao Liu:
Joint Throughput Optimization for Wireless Mesh Networks. IEEE Trans. Mob. Comput. 8(7): 895-909 (2009) - 2008
- [j3]Xiang-Yang Li, Peng-Jun Wan, Wen-Zhan Song, Yanwei Wu, Jizhong Zhao:
Efficient Throughput for Wireless Mesh Networks by CDMA/OVSF Code Assignment. Ad Hoc Sens. Wirel. Networks 5(3-4): 265-291 (2008) - [j2]Mei Li, Wang-Chien Lee, Anand Sivasubramaniam, Jizhong Zhao:
Supporting K nearest neighbors query on high-dimensional data in P2P systems. Frontiers Comput. Sci. China 2(3): 234-247 (2008) - [j1]Mo Li, Lei Chen, Jizhong Zhao, Qian Zhang, Yunhao Liu:
Signature-File-Based Approach for Query Answering Over Wireless Sensor Networks. IEEE Trans. Veh. Technol. 57(5): 3146-3154 (2008)
Conference and Workshop Papers
- 2024
- [c88]Xinhui Liu, Zhenghao Chen, Luping Zhou, Dong Xu, Wei Xi, Gairui Bai, Yihan Zhao, Jizhong Zhao:
UFDA: Universal Federated Domain Adaptation with Practical Assumptions. AAAI 2024: 14026-14034 - [c87]Xiao Fu, Wei Xi, Zhao Yang, Rui Jiang, Dianwen Ng, Jie Yang, Jizhong Zhao:
MRFER: Multi-Channel Robust Feature Enhanced Fusion for Multi-Modal Emotion Recognition. ICME 2024: 1-6 - [c86]Gairui Bai, Wei Xi, Yihan Zhao, Xinhui Liu, Jizhong Zhao:
Attention Shifting to Pursue Optimal Representation for Adapting Multi-granularity Tasks. IJCAI 2024: 587-595 - [c85]Yihan Zhao, Wei Xi, Yuhang Cui, Gairui Bai, Xinhui Liu, Jizhong Zhao:
CoPL: Parameter-Efficient Collaborative Prompt Learning for Audio-Visual Tasks. ACM Multimedia 2024: 4455-4464 - [c84]Yihan Zhao, Wei Xi, Gairui Bai, Xinhui Liu, Jizhong Zhao:
Robust Contrastive Learning Against Audio-Visual Noisy Correspondence. PRCV (5) 2024: 526-540 - 2023
- [c83]Han Ding, Wenjing Song, Cui Zhao, Fei Wang, Ge Wang, Wei Xi, Jizhong Zhao:
Knowledge-Graph Augmented Music Representation for Genre Classification. ICASSP 2023: 1-5 - [c82]Zhao Yang, Dianwen Ng, Chong Zhang, Xiao Fu, Rui Jiang, Wei Xi, Yukun Ma, Chongjia Ni, Eng Siong Chng, Bin Ma, Jizhong Zhao:
Dual Acoustic Linguistic Self-supervised Representation Learning for Cross-Domain Speech Recognition. INTERSPEECH 2023: 72-76 - [c81]Zhao Yang, Dianwen Ng, Xizhe Li, Chong Zhang, Rui Jiang, Wei Xi, Yukun Ma, Chongjia Ni, Jizhong Zhao, Bin Ma, Eng Siong Chng:
Dual-Memory Multi-Modal Learning for Continual Spoken Keyword Spotting with Confidence Selection and Diversity Enhancement. INTERSPEECH 2023: 3774-3778 - [c80]Zhao Yang, Dianwen Ng, Chong Zhang, Rui Jiang, Wei Xi, Yukun Ma, Chongjia Ni, Jizhong Zhao, Bin Ma, Eng Siong Chng:
A Unified Recognition and Correction Model under Noisy and Accent Speech Conditions. INTERSPEECH 2023: 4953-4957 - [c79]Yuance Chang, Han Ding, Dachao Han, Teng Zhang, Ge Wang, Cui Zhao, Fei Wang, Wei Xi, Jizhong Zhao:
mmYodar: Lightweight and Robust Object Detection using mmWave Signals. SECON 2023: 151-159 - 2022
- [c78]Heli Sun, Ning Wang, Jingyu Jia, Jianbin Huang, Hui Xiong, Liang He, Xinwang Liu, Shan Zhang, Shaojie Qiao, Jizhong Zhao:
Platform-Oriented Event Time Allocation(Extended Abstract). ICDE 2022: 1525-1536 - [c77]Cui Zhao, Zhenjiang Li, Han Ding, Ge Wang, Wei Xi, Jizhong Zhao:
RF-Wise: Pushing the Limit of RFID-based Sensing. INFOCOM 2022: 1779-1788 - 2021
- [c76]Liangliang Lin, Kun Zhao, Xiaoyu Ma, Wei Xi, Chen Yang, Hui He, Jizhong Zhao:
Human Motion Recognition Based on Wi-Fi Imaging. CollaborateCom (1) 2021: 608-627 - [c75]Xiaoyu Ma, Hui He, Hui Zhang, Wei Xi, Zuhao Chen, Jizhong Zhao:
Measuring and Modeling Multipath of Wi-Fi to Locate People in Indoor Environments. ICPADS 2021: 185-192 - 2020
- [c74]Yinhui Zhang, Wei Xi, Zhao Yang, Sitao Men, Rui Jiang, Yuxin Yang, Jizhong Zhao:
Speech2Stroke: Generate Chinese Character Strokes Directly from Speech. CollaborateCom (1) 2020: 83-94 - [c73]Ge Wang, Chen Qian, Kaiyan Cui, Xiaofeng Shi, Han Ding, Wei Xi, Jizhong Zhao, Jinsong Han:
A Universal Method to Combat Multipaths for RFID Sensing. INFOCOM 2020: 277-286 - 2019
- [c72]Li Zhu, Xinyu Zhao, Zhi Wang, Jizhong Zhao:
Poster: Continuous Human Activity Recognition Based on WiFi Imaging. EWSN 2019: 256-257 - [c71]Ge Wang, Chen Qian, Kaiyan Cui, Han Ding, Haofan Cai, Wei Xi, Jinsong Han, Jizhong Zhao:
A (Near) Zero-cost and Universal Method to Combat Multipaths for RFID Sensing. ICNP 2019: 1-4 - 2018
- [c70]Zhao Yang, Wei Xi, Kun Zhao, Xiaohong Wang, Colin Allen, Jizhong Zhao:
Topic Model Based Management Frame Authentication Using CSI Information. ICCCS (6) 2018: 154-166 - [c69]Zhenge Guo, Zhaobin Liu, Jizhong Zhao, Hui He, Meiya Dong:
Towards Secure Device Pairing via Vibration Detection. ICCCS (6) 2018: 177-186 - [c68]Lei Rao, Bin Zhang, Jizhong Zhao:
Hardware Implementation of Reconfigurable Separable Convolution. ISVLSI 2018: 232-237 - [c67]Ge Wang, Chen Qian, Haofan Cai, Jinsong Han, Jizhong Zhao:
Replay-resilient Authentication for IoT. S3@MobiCom 2018: 3-5 - [c66]Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, Han Ding, Jizhong Zhao:
Towards Replay-resilient RFID Authentication. MobiCom 2018: 385-399 - 2017
- [c65]Kun Zhao, Wei Xi, Jinsong Han, Zhi Wang, Yaoxuan Yuan, Jizhong Zhao:
Efficient CSI Correction with CFO for Uplink MU-MIMO Networks. BigCom 2017: 256-264 - [c64]Han Ding, Nan Yang, Ge Wang, Jinsong Han, Jizhong Zhao:
Poster: Bidimensional Relative Localization Leveraging Interference among Passive Tags. EWSN 2017: 204-205 - [c63]Han Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, Kun Zhao, Jizhong Zhao:
RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags. ICDCS 2017: 447-457 - [c62]Ge Wang, Chen Qian, Haofan Cai, Jinsong Han, Han Ding, Jizhong Zhao:
Replay-resilient Physical-layer Authentication for Battery-free IoT Devices. HotWireless@MobiCom 2017: 7-11 - [c61]Ge Wang, Chen Qian, Longfei Shangguan, Han Ding, Jinsong Han, Nan Yang, Wei Xi, Jizhong Zhao:
HMRL: Relative Localization of RFID Tags with Static Devices. SECON 2017: 1-9 - [c60]Yaoxuan Yuan, Jizhong Zhao, Wei Xi, Chen Qian, Xiaobin Zhang, Zhi Wang:
SALM: Smartphone-Based Identity Authentication Using Lip Motion Characteristics. SMARTCOMP 2017: 1-8 - 2016
- [c59]Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao:
Instant and Robust Authentication and Key Agreement among Mobile Devices. CCS 2016: 616-627 - [c58]Xuan Wang, Mathieu Salzmann, Fei Wang, Jizhong Zhao:
Template-Free 3D Reconstruction of Poorly-Textured Nonrigid Surfaces. ECCV (7) 2016: 648-663 - [c57]Ge Wang, Chen Qian, Jinsong Han, Wei Xi, Han Ding, Zhiping Jiang, Jizhong Zhao:
Verifiable smart packaging with passive RFID. UbiComp 2016: 156-166 - [c56]Han Ding, Chen Qian, Jinsong Han, Ge Wang, Zhiping Jiang, Jizhong Zhao, Wei Xi:
Device-free detection of approach and departure behaviors using backscatter communication. UbiComp 2016: 167-177 - [c55]Zhiping Jiang, Jinsong Han, Chen Qian, Wei Xi, Kun Zhao, Han Ding, Shaojie Tang, Jizhong Zhao, Panlong Yang:
VADS: Visual attention detection with a smartphone. INFOCOM 2016: 1-9 - [c54]Yuanhang Cai, Wei Xi, Kun Zhao, Jinsong Han, Jizhong Zhao:
Smart retransmission for CSI recovery in uplink multi-user MIMO networks. INFOCOM Workshops 2016: 1061-1062 - [c53]Yuanhang Cai, Wei Xi, Zhi Wang, Kun Zhao, Jinsong Han, Chen Qian, Han Ding, Jizhong Zhao:
CSI feedback reduction by checking its validity period: poster. MobiCom 2016: 469-470 - [c52]Kun Zhao, Wei Xi, Zhiping Jiang, Zhi Wang, Hongliang Luo, Jizhong Zhao, Xiaobin Zhang:
Leveraging Topic Model for CSI Based Human Activity Recognition. MSN 2016: 23-30 - 2015
- [c51]Zhiping Jiang, Jinsong Han, Wei Xi, Jizhong Zhao:
NFV: Near Field Vibration Based Group Device Pairing. CollaborateCom 2015: 129-140 - [c50]Kun Zhao, Chen Qian, Wei Xi, Jinsong Han, Xue Liu, Zhiping Jiang, Jizhong Zhao:
EMoD: Efficient Motion Detection of Device-Free Objects Using Passive RFID Tags. ICNP 2015: 291-301 - [c49]Hai-Jiang Xie, Li Lin, Zhiping Jiang, Wei Xi, Kun Zhao, Meiyong Ding, Jizhong Zhao:
Accelerating Crowdsourcing Based Indoor Localization Using CSI. ICPADS 2015: 274-281 - [c48]Han Ding, Jinsong Han, Alex X. Liu, Jizhong Zhao, Panlong Yang, Wei Xi, Zhiping Jiang:
Human object estimation via backscattered radio frequency signal. INFOCOM 2015: 1652-1660 - [c47]Han Ding, Longfei Shangguan, Zheng Yang, Jinsong Han, Zimu Zhou, Panlong Yang, Wei Xi, Jizhong Zhao:
FEMO: A Platform for Free-weight Exercise Monitoring with RFIDs. SenSys 2015: 141-154 - 2014
- [c46]Deng Chen, Li Du, Zhiping Jiang, Wei Xi, Jinsong Han, Kun Zhao, Jizhong Zhao, Zhi Wang, Rui Li:
A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting. ICPADS 2014: 494-501 - [c45]Rui Li, Han Ding, Jinsong Han, Shaoping Li, Xing Wang, Hui Liu, Jizhong Zhao:
Nowhere to hide: An empirical study on hidden UHF RFID tags. ICPADS 2014: 608-615 - [c44]Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, Zhiping Jiang:
Electronic frog eye: Counting crowd using WiFi. INFOCOM 2014: 361-369 - [c43]Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Pengfeng Zhang, Wei Xi, Zhiping Jiang:
Twins: Device-free object tracking using passive tags. INFOCOM 2014: 469-476 - [c42]Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, Shaojie Tang, Jizhong Zhao, Kun Zhao:
KEEP: Fast secret key extraction protocol for D2D communication. IWQoS 2014: 350-359 - [c41]Tao Li, Wei Xi, Shaojie Tang, Jinsong Han, Jizhong Zhao, Xiang-Yang Li, Zhi Wang, Zhiping Jiang:
Poster: locating RFID tags by rotation. MobiCom 2014: 379-382 - 2013
- [c40]Dan Ma, Chen Qian, Wenpu Li, Jinsong Han, Jizhong Zhao:
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags. ICNP 2013: 1-10 - [c39]Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, Wei Xi:
Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information. INFOCOM 2013: 2544-2552 - [c38]Zhiping Jiang, Jizhong Zhao, Jinsong Han, Shaojie Tang, Jing Zhao, Wei Xi:
Wi-Fi Fingerprint Based Indoor Localization without Indoor Space Measurement. MASS 2013: 384-392 - [c37]Han Ding, Rui Li, Shaoping Li, Jinsong Han, Jizhong Zhao:
MISS: Multi-dimensional Information Sensing Surveillance for Cold Chain Logistics. MASS 2013: 519-523 - 2012
- [c36]Zhi Wang, Jizhong Zhao, Wei Xi, Zhiping Jiang:
A Scalable P2P Video Conferencing System Based on VCStream Model. ACIS-ICIS 2012: 77-82 - 2011
- [c35]Rui Li, Kebin Liu, Yuan He, Jizhong Zhao:
Does feature matter: anomaly detection in sensor networks. BODYNETS 2011: 85-91 - [c34]Yunhao Liu, Yuan He, Mo Li, Jiliang Wang, Kebin Liu, Lufeng Mo, Wei Dong, Zheng Yang, Min Xi, Jizhong Zhao, Xiang-Yang Li:
Does wireless sensor network scale? A measurement study on GreenOrbs. INFOCOM 2011: 873-881 - [c33]Wei Xi, Jizhong Zhao, Yuan He, Zhi Wang, Lufeng Mo:
Exploiting the Associated Information to Locate Mobile Users in Ubiquitous Computing Environment. MASS 2011: 510-519 - [c32]Shuo Lian, Yuan He, Jizhong Zhao:
CCD: Locating Event in Wireless Sensor Network without Locations. MASS 2011: 672-677 - [c31]Yaoxuan Yuan, Chen Qiu, Wei Xi, Jizhong Zhao:
Crowd Density Estimation Using Wireless Sensor Networks. MSN 2011: 138-145 - [c30]Hui He, Jizhong Zhao, Yong Qi, Shuo Lian, Wei Xi:
Lazy Schema: An Optimal Sampling Frequency Assignment for Real-Time Sensor Systems. MSN 2011: 152-159 - 2010
- [c29]Jun Zhang, Kuizhi Mei, Jizhong Zhao:
CSDA: An Adaptive Data Storage Strategy for Predictive Branch Path on Multi-Core Architecture. CIT 2010: 1695-1702 - [c28]Shaojie Tang, Jing Yuan, Xiang-Yang Li, Yunhao Liu, Guihai Chen, Ming Gu, Jizhong Zhao, Guojun Dai:
DAWN: Energy efficient data aggregation in WSN with mobile sinks. IWQoS 2010: 1-9 - [c27]Jun Zhang, Kuizhi Mei, Jizhong Zhao:
An Adaptive and Selective Instruction Active Push Mechanism for Multi-core Architecture. NAS 2010: 359-366 - [c26]Jun Zhang, Kuizhi Mei, Jizhong Zhao:
Filtering Cache Pollution by Using Replacement Operation Based on Confidence Estimation. NAS 2010: 386-392 - [c25]Wei Xi, Yuan He, Yunhao Liu, Jizhong Zhao, Lufeng Mo, Zheng Yang, Jiliang Wang, Xiang-Yang Li:
Locating sensors in the wild: pursuit of ranging quality. SenSys 2010: 295-308 - 2009
- [c24]Chenyang Ge, Nanning Zheng, Kuizhi Mei, Jizhong Zhao:
VLSI design of 3D display processing chip for head-mounted display. ICE-GIC 2009: 25-28 - [c23]Wei Xi, Jizhong Zhao, Xue Liu, Xiang-Yang Li, Yong Qi:
EUL: An Efficient and Universal Localization Method for Wireless Sensor Network. ICDCS 2009: 433-440 - [c22]Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu, Mo Li:
Run to Potential: Sweep Coverage in Wireless Sensor Networks. ICPP 2009: 50-57 - [c21]Cheng Wang, Xiang-Yang Li, Changjun Jiang, Shaojie Tang, Yunhao Liu, Jizhong Zhao:
Scaling Laws on Multicast Capacity of Large Scale Wireless Networks. INFOCOM 2009: 1863-1871 - [c20]Xiang-Yang Li, XiaoHua Xu, ShiGuang Wang, Shaojie Tang, Guojun Dai, Jizhong Zhao, Yong Qi:
Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model. MASS 2009: 353-362 - [c19]Qingsong Yao, Yong Qi, Jizhong Zhao, Jinsong Han:
An Enhanced Synchronization Approach for RFID Private Authentication. MASS 2009: 959-964 - [c18]Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiang-Yang Li, Yunhao Liu:
Randomizing RFID Private Authentication. PerCom 2009: 1-10 - [c17]Lufeng Mo, Yuan He, Yunhao Liu, Jizhong Zhao, Shaojie Tang, Xiang-Yang Li, Guojun Dai:
Canopy closure estimates with GreenOrbs: sustainable sensing in the forest. SenSys 2009: 99-112 - 2008
- [c16]Zhigang Li, Nong Xiao, Jizhong Zhao, Bin Xiao:
Bouncing Tracks in Sensor Networks. ICPADS 2008: 591-598 - [c15]Xiang-Yang Li, Jizhong Zhao, Yanwei Wu, Shao-Jie Tang, Xiao-Hua Xu, Xu-Fei Mao:
Broadcast capacity for wireless ad hoc networks. MASS 2008: 114-123 - [c14]Shan Chang, Qingxi Li, Yong Qi, Jizhong Zhao, Yuan He, Xue Liu:
Safety assurance for archeologists using sensor network. SenSys 2008: 359-360 - 2007
- [c13]Yong Qi, Min Xi, Saiyu Qi, Jizhong Zhao:
A Conflict Resolution Method in Context-Aware Computing. ACIS-ICIS 2007: 135-140 - [c12]Jizhong Zhao, Min Xi, Yong Qi:
Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing. ACIS-ICIS 2007: 844-849 - [c11]Qingsheng Zhang, Yong Qi, Di Hou, Jizhong Zhao, Huawei Han:
Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments. FSKD (3) 2007: 156-160 - [c10]Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Liang Liu:
A Study on Context-aware Privacy Protection for Personal Information. ICCCN 2007: 1351-1358 - [c9]Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Jihong Zhang:
Context-Aware Learning Privacy Disclosure Policy from Interaction History. ICNC (5) 2007: 3-7 - [c8]Xi Min, Jizhong Zhao, Yong Qi, Hui He, Li Ming, Wei Wei:
Isotope Programming Model: a Kind of Program Model for Context-Aware Application. MUE 2007: 597-602 - [c7]Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Yujie Niu:
Research on context-aware architecture for personal information privacy protection. SMC 2007: 3912-3916 - [c6]Min Xi, Jizhong Zhao, Yong Qi, Hui He, Liang Liu:
An Offset Algorithm for Conflict Resolution in Context-Aware Computing. UIC 2007: 878-887 - 2006
- [c5]Hai Ning Meng, Yong Qi, Di Hou, Ying Chen, Jizhong Zhao:
Software Aging Prediction Model Based on Fuzzy Wavelet Network with Adaptive Genetic Algorithm. ICTAI 2006: 659-666 - 2005
- [c4]Zhiyun Xin, Jizhong Zhao, Ming Gu, Jiaguang Sun:
Integrating Collaborate and Content-Based Filtering for Personalized Information Recommendation. CIS (1) 2005: 476-482 - [c3]Zhiyun Xin, Jizhong Zhao, Chihong Chi, Jiaguang Sun:
Information Push-Delivery for User-Centered and Personalized Service. FSKD (1) 2005: 594-602 - [c2]Jizhong Zhao, Yong Qi, Zhaofeng Ma:
Secure Multimedia Streaming with Trusted Digital Rights Management. LCN 2005: 817-821 - 2000
- [c1]Yong Qi, Li Ma, Jizhong Zhao, Junyi Shen:
OTMS-A CORBA-Compliant Object Transaction Management System. TOOLS (36) 2000: 126-133
Informal and Other Publications
- 2023
- [i8]Xinhui Liu, Zhenghao Chen, Luping Zhou, Dong Xu, Wei Xi, Gairui Bai, Yihan Zhao, Jizhong Zhao:
UFDA: Universal Federated Domain Adaptation with Practical Assumptions. CoRR abs/2311.15570 (2023) - 2022
- [i7]Zhao Yang, Wei Xi, Rui Wang, Rui Jiang, Jizhong Zhao:
Dual-Decoder Transformer For end-to-end Mandarin Chinese Speech Recognition with Pinyin and Character. CoRR abs/2201.10792 (2022) - 2015
- [i6]Peng Cheng, Xiang Lian, Lei Chen, Jinsong Han, Jizhong Zhao:
Task Assignment on Multi-Skill Oriented Spatial Crowdsourcing. CoRR abs/1510.03149 (2015) - 2014
- [i5]Peng Cheng, Xiang Lian, Zhao Chen, Lei Chen, Jinsong Han, Jizhong Zhao:
Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers. CoRR abs/1412.0223 (2014) - 2013
- [i4]Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Wei Xi, Kun Zhao, Shaojie Tang, Jinsong Han:
Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-based Speed Estimation. CoRR abs/1307.6349 (2013) - [i3]Jinsong Han, Chen Qian, Dan Ma, Xing Wang, Jizhong Zhao, Pengfeng Zhang, Wei Xi, Zhiping Jiang:
Twins: Device-free Object Tracking using Passive Tags. CoRR abs/1308.6805 (2013) - 2012
- [i2]Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, Wei Xi:
Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information. CoRR abs/1208.0412 (2012) - [i1]Jizhong Zhao, Wei Xi, Jinsong Han, Shaojie Tang, Xiang-Yang Li, Yunhao Liu, Yihong Gong, Zehua Zhou:
Efficient and Secure Key Extraction using CSI without Chasing down Errors. CoRR abs/1208.0688 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint