default search action
Bin Yuan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Gang Huang, Bin Yuan, Wei Zhang, Xiaocong Lyu, Xuan Zhu:
Improved phase-state identification bypass approach of the hydrocarbons-CO2-H2O system for compositional reservoir simulation. Comput. Geosci. 193: 105725 (2024) - [j43]Zhong Qu, Ming Li, Bin Yuan, Guoqing Mu:
A method of hybrid dilated and global convolution networks for pavement crack detection. Multim. Syst. 30(4): 210 (2024) - [j42]Yang Yuan, Bin Yuan, Jiaxuan Li, Zijian Wang, Jialong Zeng, Zhongjun Yu:
A Broadband Cascode Low-Noise Amplifier Using Transformer Feedback and Darlington Techniques. IEEE Trans. Circuits Syst. II Express Briefs 71(1): 41-45 (2024) - [j41]Senrong You, Bin Yuan, Zhihan Lyu, Charles K. Chui, C. L. Philip Chen, Baiying Lei, Shuqiang Wang:
Generative AI Enables Synthesizing Cross-Modality Brain Image via Multi-Level-Latent Representation Learning. IEEE Trans. Computational Imaging 10: 1152-1164 (2024) - [j40]Bin Yuan, Maogen Yang, Zheng Xu, Qunjinming Chen, Zhanxiang Song, Zhen Li, Deqing Zou, Hai Jin:
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure. IEEE Trans. Dependable Secur. Comput. 21(4): 3196-3210 (2024) - [j39]Bin Yuan, Chi Zhang, Jiajun Ren, Qunjinming Chen, Biang Xu, Qiankun Zhang, Zhen Li, Deqing Zou, Fan Zhang, Hai Jin:
Toward Automated Attack Discovery in SDN Controllers Through Formal Verification. IEEE Trans. Netw. Serv. Manag. 21(3): 3636-3655 (2024) - [c42]Bin Yuan, Yunya Zhou:
Task replication scheduling algorithm under resource constraints. CAIBDA 2024: 293-299 - [c41]Yunya Zhou, Bin Yuan, Yan Zhong, Yuling Li:
Multi-label Robust Feature Selection via Subspace-Sparsity Learning. ICANN (1) 2024: 3-17 - [c40]Yuanfan Zheng, Yesheng Gao, Xingzhao Liu, Bin Yuan:
A 3-D SAR Imaging Method Based on 2-D Wavefront Modulation. IGARSS 2024: 11375-11379 - [c39]Dongjie Yuan, Bin Yuan, Yan Zhong:
Multi-label Feature Selection with Adaptive Subspace Learning. KSEM (1) 2024: 148-160 - [c38]Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing:
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. SP 2024: 2385-2403 - [i4]Xiaonan Xu, Bin Yuan, Yongyao Mo, Tianbo Song, Shulin Li:
Curriculum Recommendations Using Transformer Base Model with InfoNCE Loss And Language Switching Method. CoRR abs/2401.09699 (2024) - [i3]Jingyu Xu, Yifeng Jiang, Bin Yuan, Shulin Li, Tianbo Song:
Automated Scoring of Clinical Patient Notes using Advanced NLP and Pseudo Labeling. CoRR abs/2401.12994 (2024) - [i2]Bin Yuan, Tianbo Song, Jerry Yao:
Identification of important nodes in the information propagation network based on the artificial intelligence method. CoRR abs/2403.00190 (2024) - [i1]Bin Yuan, Tianbo Song:
Structural Resilience and Connectivity of the IPv6 Internet: An AS-level Topology Examination. CoRR abs/2403.00193 (2024) - 2023
- [j38]Chenghu He, Chen Li, Bowen Chen, Bin Yuan, Yongjing Yin:
Research on Defect Detection of the Outer Side of Bottle Cap Based on High Angle and Multi-View Vision System. IEEE Access 11: 65798-65809 (2023) - [j37]Changqing Du, Jingjian Li, Bin Yuan:
Low-illumination image enhancement with logarithmic tone mapping. Open Comput. Sci. 13(1) (2023) - [j36]Guangdong Xue, Jian Wang, Bingjie Zhang, Bin Yuan, Caili Dai:
Double groups of gates based Takagi-Sugeno-Kang (DG-TSK) fuzzy system for simultaneous feature selection and rule extraction. Fuzzy Sets Syst. 469: 108627 (2023) - [j35]Bin Yuan, Jun Wan, Yuhan Wu, Deqing Zou, Hai Jin:
On the Security of Smart Home Systems: A Survey. J. Comput. Sci. Technol. 38(2): 228-247 (2023) - [j34]Yang Yuan, Jiaxuan Li, Bin Yuan, Jialong Zeng, Jingxin Fan, Zhongjun Yu:
Analysis and Design of a Gain-Enhanced 1-20-GHz LNA With Output-Stage Transformer Feedback. IEEE Trans. Circuits Syst. II Express Briefs 70(9): 3539-3543 (2023) - [j33]Bin Yuan, Yuhan Wu, Maogen Yang, Luyi Xing, Xuchang Wang, Deqing Zou, Hai Jin:
SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform. IEEE Trans. Dependable Secur. Comput. 20(2): 1656-1674 (2023) - [j32]Guangdong Xue, Jian Wang, Bin Yuan, Caili Dai:
DG-ALETSK: A High-Dimensional Fuzzy Approach With Simultaneous Feature Selection and Rule Extraction. IEEE Trans. Fuzzy Syst. 31(11): 3866-3880 (2023) - [c37]Zhi Li, Weijie Liu, XiaoFeng Wang, Bin Yuan, Hongliang Tian, Hai Jin, Shoumeng Yan:
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation. CCS 2023: 3063-3077 - [c36]Jincheng Wang, Zhuohua Li, Mingshen Sun, Bin Yuan, John C. S. Lui:
IoT Anomaly Detection Via Device Interaction Graph. DSN 2023: 494-507 - [c35]Bin Yuan, Tianbo Song:
Structural Resilience and Connectivity of the IPv6 Internet: An AS-level Topology Examination. ICAICE 2023: 853-856 - [c34]Runmei Zhang, Jiaxiang Li, Zhong Chen, Fangfang Dong, Zhennan Jia, Bin Yuan:
Adaptive Neural Network Sliding Mode Control Method Based on Udwadia-Kalaba Theory. ICARM 2023: 733-738 - [c33]Xueqing Fang, Zhan Li, Bin Yuan, Xinrui Wang, Zekai Jiang, Jianliang Zeng, Qingliang Chen:
Prior-Enhanced Network for Image-Based PM2.5 Estimation from Imbalanced Data Distribution. ICONIP (10) 2023: 260-271 - [c32]Bin Yuan, Yifan Lu, Yilin Fang, Yueming Wu, Deqing Zou, Zhen Li, Zhi Li, Hai Jin:
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model. ICSE 2023: 2262-2274 - [c31]Tiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu, Bin Yuan, Deqing Zou, Hai Jin:
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree. ISSTA 2023: 89-100 - 2022
- [j31]Fei Liang, Jiaquan Ye, Yuankai Li, Huan Lin, Bin Yuan, Jian Xu:
Q-Band Radial Waveguide Power Divider Based on a Specific Cycloidal-Like Transition Implementation. IEEE Access 10: 30501-30512 (2022) - [j30]Chen Li, Yongjing Yin, Bin Yuan, Xiangqing Li:
Research on Surface Defect Detection Technology Based on the Zonal and Time-Sharing Computational Imaging. IEEE Access 10: 79574-79583 (2022) - [j29]Haoyu Chen, Deqing Zou, Hai Jin, Shouhuai Xu, Bin Yuan:
SAND: semi-automated adaptive network defense via programmable rule generation and deployment. Sci. China Inf. Sci. 65(7): 1-18 (2022) - [j28]Xiaodong Yue, Yufei Chen, Bin Yuan, Ying Lv:
Three-Way Image Classification with Evidential Deep Convolutional Neural Networks. Cogn. Comput. 14(6): 2074-2086 (2022) - [j27]Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, Francis A. Ruambo, Bin Yuan, Hai Jin:
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach. Comput. Commun. 194: 55-65 (2022) - [j26]Haoyu Chen, Bin Yuan, Deqing Zou, Hai Jin:
A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks. IEEE Netw. 36(4): 150-158 (2022) - [c30]Zhechang Zhang, Bin Yuan, Kehan Yang, Deqing Zou, Hai Jin:
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance. ACSAC 2022: 756-768 - [c29]Ze Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu:
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. CCS 2022: 1647-1661 - 2021
- [j25]Bin Yuan:
Introduction to special issue on advances in multi-phase fluid and multi-scale particulate reactive flow modeling and simulation for petroleum engineering applications. Simul. 97(2) (2021) - [j24]Hai Jin, Zhi Li, Deqing Zou, Bin Yuan:
DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1125-1136 (2021) - [j23]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan, Weiqi Dai:
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment. IEEE Trans. Emerg. Top. Comput. 9(2): 866-877 (2021) - [j22]Bin Yuan, Chen Lin, Deqing Zou, Laurence Tianruo Yang, Hai Jin:
Detecting Malicious Switches for a Secure Software-defined Tactile Internet. ACM Trans. Internet Techn. 21(4): 84:1-84:23 (2021) - [j21]Bin Yuan, Changqing Du, Zhongyuan Wang, Rong Zhu:
Research on Intelligent Algorithm of Identity Authentication Based on Facial Features. Wirel. Commun. Mob. Comput. 2021: 5558578:1-5558578:11 (2021) - [j20]Bin Yuan, M. M. Kamruzzaman, Shaonan Shan:
Application of Motion Sensor Based on Neural Network in Basketball Technology and Physical Fitness Evaluation System. Wirel. Commun. Mob. Comput. 2021: 5562954:1-5562954:11 (2021) - [c28]Shuang Jiang, WeiHua Zhong, Bin Yuan, Deng Lan:
Adaptive PI Controller for Dredged Pipeline Transportation. CACRE 2021: 359-363 - [c27]Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. CCS 2021: 1289-1305 - [c26]Bin Yuan, Shengyao Sun, Xianjun Deng, Deqing Zou, Haoyu Chen, Shenghui Li, Hai Jin:
Automatically derived stateful network functions including non-field attributes. TrustCom 2021: 944-951 - 2020
- [j19]Bin Yuan, Deqing Zou, Hai Jin, Shui Yu, Laurence T. Yang:
HostWatcher: Protecting hosts in cloud data centers through software-defined networking. Future Gener. Comput. Syst. 105: 964-972 (2020) - [j18]Tianlong Gu, Bin Yuan, Yining Liu, Peng Wang, Long Li, Liang Chang:
An improved EAAP scheme for vehicular ad hoc networks. Int. J. Commun. Syst. 33(6) (2020) - [j17]Bin Yuan, Chen Lin, Huan Zhao, Deqing Zou, Laurence Tianruo Yang, Hai Jin, Chunming Rong:
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services. IEEE Internet Things J. 7(9): 7967-7981 (2020) - [j16]Haitao Zheng, Jialei Tao, Yalei Sun, Bin Yuan:
Differential Evolution Analysis of Clinical Characteristics of Severe Viral Pneumonia in Children. J. Medical Imaging Health Informatics 10(1): 65-70 (2020) - [j15]Bin Yuan, Huan Zhao, Chen Lin, Deqing Zou, Laurence Tianruo Yang, Hai Jin, Ligang He, Shui Yu:
Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management. IEEE Trans. Netw. Sci. Eng. 7(4): 2541-2554 (2020) - [j14]Zhi Li, Hai Jin, Deqing Zou, Bin Yuan:
Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment. IEEE Trans. Parallel Distributed Syst. 31(3): 695-706 (2020) - [j13]Lijuan Duan, Song Cui, Yuanhua Qiao, Bin Yuan:
Clustering Based on Supervised Learning of Exemplar Discriminative Information. IEEE Trans. Syst. Man Cybern. Syst. 50(12): 5255-5270 (2020) - [c25]Ying Yuan, Bin Yuan, Hanqiu Mao:
Performance of Existing Predictor of SubCellular Localization of Long Non-Coding RNA on the New Database. ICCPR 2020: 497-500 - [c24]Bin Yuan, Xiaodong Yue, Ying Lv, Thierry Denoeux:
Evidential Deep Neural Networks for Uncertain Data Classification. KSEM (2) 2020: 427-437 - [c23]Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. USENIX Security Symposium 2020: 1183-1200
2010 – 2019
- 2019
- [j12]Jinan Shen, Deqing Zou, Hai Jin, Bin Yuan, Weiqi Dai:
A domain-divided configurable security model for cloud computing-based telecommunication services. J. Supercomput. 75(1): 109-122 (2019) - [j11]Bin Yuan, Deqing Zou, Shui Yu, Hai Jin, Weizhong Qiang, Jinan Shen:
Defending Against Flow Table Overloading Attack in Software-Defined Networks. IEEE Trans. Serv. Comput. 12(2): 231-246 (2019) - [c22]Bin Yuan, Zongqing Lu, Jing-Hao Xue, Qingmin Liao:
A New Approach to Automatic Clothing Matting from Mannequins. ICME 2019: 880-885 - [c21]Lei Tao, Xue Jiang, Ye Zhang, Xingzhao Liu, Bin Yuan:
A Robust Multiscale Dictionary Learning Algorithm for Sar Object Recognition. IGARSS 2019: 1192-1195 - [c20]Ce Zheng, Xue Jiang, Ye Zhang, Xingzhao Liu, Bin Yuan, Zhixin Li:
Self-Normalizing Generative Adversarial Network for Super-Resolution Reconstruction of SAR Images. IGARSS 2019: 1911-1914 - [c19]Jiaqi Wu, Yesheng Gao, Bin Yuan, Xingzhao Liu:
An Optronic Processor for Ultra-Wideband Spectrum Awareness. IGARSS 2019: 1931-1934 - [c18]Jie Li, Ran Cheng, Yesheng Gao, Xue Jiang, Bin Yuan, Ye Zhang, Xingzhao Liu:
Automatic Sub-Images Extraction from Entire Urban SAR Scenes Based on the Clustering-Based Algorithm and Graph Traversal Methods. IGARSS 2019: 8602-8605 - [c17]Kaichen Zhu, Xianhu Liang, Bin Yuan, Marco A. Villena, Chao Wen, Tao Wang, Shaochuan Chen, Mario Lanza, Fei Hui, Yuanyuan Shi:
Tristate Resistive Switching in Heterogenous Van Der Waals Dielectric Structures. IRPS 2019: 1-6 - 2018
- [j10]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan, Weiming Li:
SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks. IEEE Access 6: 8292-8301 (2018) - [j9]Deqing Zou, Yu Lu, Bin Yuan, Haoyu Chen, Hai Jin:
A Fine-Grained Multi-Tenant Permission Management Framework for SDN and NFV. IEEE Access 6: 25562-25572 (2018) - [j8]Deqing Zou, Zirong Huang, Bin Yuan, Haoyu Chen, Hai Jin:
Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network. IEEE Access 6: 62286-62295 (2018) - [j7]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan:
Validating User Flows to Protect Software Defined Network Environments. Secur. Commun. Networks 2018: 1308678:1-1308678:14 (2018) - [j6]Bin Yuan, Hai Jin, Deqing Zou, Laurence Tianruo Yang, Shui Yu:
A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 15(2): 825-839 (2018) - [c16]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan:
Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network. ICCCN 2018: 1-9 - [c15]Huan Lin, Bo Wang, Bin Yuan, Qingdong Li:
The Influence Simulation Analysis of the Sensitive Area of the Instrument Landing System's Localizer On The Position Of The Aircraft Take-off Waiting Line. ICRAI 2018: 70-75 - [c14]Xianhu Liang, Bin Yuan, Yuanyuan Shi, Fei Hui, Xu Jing, Mario Lanza, Felix Palumbo:
Enhanced reliability of hexagonal boron nitride dielectric stacks due to high thermal conductivity. IRPS 2018: 6-1 - 2017
- [j5]Jiang Han, Bin Yuan, Lulu Wu, Feihu Zhao, Lian Xia:
Mechanism study on gear tooth surface texture in power honing process. Int. J. Manuf. Res. 12(2): 212-224 (2017) - [j4]Bin Yuan:
基于B样条的Level-Set GPU演化算法 (Level-Set GPU Evolution Algorithm Based on B-spline). 计算机科学 44(3): 59-62 (2017) - 2015
- [c13]Tao Jiang, Bin Yuan, Jing Jiang, Hongzhi Yu:
Short Text Sentiment Entropy Optimization Based on the Fuzzy Sets. IEEE WISA 2015: 247-250 - [c12]Dongxu Zhang, Bin Yuan, Dong Wang, Rong Liu:
Joint Semantic Relevance Learning with Text Data and Graph Knowledge. CVSC 2015: 32-40 - [c11]Ming Li, Jing Liu, Zhichao Ma, Chongwei Yuan, Bin Yuan:
Throughput optimization with fairness consideration for coexisting WBANs. ICC 2015: 6418-6423 - [c10]Bin Yuan, Jing Liu, Wenlong Liu, Shuqiang Zheng:
DIM: A novel decentralized interference mitigation scheme in WBAN. WCSP 2015: 1-5 - 2014
- [j3]Yang Liu, Shiyou Xu, Zengping Chen, Bin Yuan:
MTRC compensation in high-resolution ISAR imaging via improved polar format algorithm based on ICPF. EURASIP J. Adv. Signal Process. 2014: 179 (2014) - [j2]Bin Yuan, Zengping Chen, Shiyou Xu:
Micro-Doppler Analysis and Separation Based on Complex Local Mean Decomposition for Aircraft With Fast-Rotating Parts in ISAR Imaging. IEEE Trans. Geosci. Remote. Sens. 52(2): 1285-1298 (2014) - [c9]Yan-juan Zhu, Haibo Zhang, Li-Rong Liu, Bin Yuan, Fu-Li Zhang, Jian-Ping Bai, Yong Li, Yi-Hong Liu, Yan-Chun Qu, Xin Qu:
Relation between the Yin-cold or Yang-heat syndrome type of TCM and the EGFR gene status in patients with NSCLC. BIBM 2014: 33-35 - [c8]Rui Wang, Tingting Liu, Haotian Yang, Kaizhi Wang, Bin Yuan, Xingzhao Liu:
Radar staring imaging scheme and target change detection based on range pulse compression and azimuth wavefront modulation. IGARSS 2014: 676-679 - [c7]Ming Li, Jing Liu, Qiang Shen, Bin Yuan:
QS-PS: A New Approach for Emergency Packet Delivery in WBAN. WASA 2014: 589-600 - 2013
- [j1]Parag Parekh, Sanchit Kamble, Nianxi Zhao, Zihua Zeng, Jianguo Wen, Bin Yuan, Youli Zu:
Biostable ssDNA Aptamers Specific for Hodgkin Lymphoma. Sensors 13(11): 14543-14557 (2013) - [c6]Hongwang Du, Wei Xiong, Haitao Wang, Zu-wen Wang, Bin Yuan:
Physical Modeling and Configuration Simulation for Constrained Cables of Electromechanical Products. CAD/Graphics 2013: 268-273 - 2011
- [c5]Kai-Mo Hu, Bin Wang, Bin Yuan, Jun-Hai Yong:
Automatic Generation of Canonical Views for CAD Models. CAD/Graphics 2011: 17-24
2000 – 2009
- 2009
- [c4]Bin Yuan, Wei Xiong, Zu-wen Wang:
STEP-Based Research and Realization on CAD Data Transformation for Virtual Assembly. CSIE (1) 2009: 707-710 - [c3]Fenglou Zou, Deyu Song, Qiang Li, Bin Yuan:
A New Intelligent Technology of Steering-by-Wire System by Variable Structure Control with Sliding Mode. JCAI 2009: 857-860 - 2008
- [c2]Bin Yuan, Guoqiang Zhang, Yanjun Li, Guoqing Zhang, Zhongcheng Li:
Improving Chinese Internet's Resilience through Degree Rank Based Overlay Relays Placement. ICC 2008: 5823-5827
1990 – 1999
- 1994
- [c1]A. Lynn Abbott, Bin Yuan:
Automatic classification of wooden cabinet doors. WACV 1994: 18-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint