default search action
Ahmed Abbasi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Ahmed Abbasi, Jeffrey Parsons, Gautam Pant, Olivia R. Liu Sheng, Suprateek Sarker:
Pathways for Design Research on Artificial Intelligence. Inf. Syst. Res. 35(2): 441-459 (2024) - [j46]Ahmed Abbasi, Robin Dillon, H. Raghav Rao, Olivia R. Liu Sheng:
Preparedness and Response in the Century of Disasters: Overview of Information Systems Research Frontiers. Inf. Syst. Res. 35(2): 460-468 (2024) - [j45]Brent Kitchens, Jennifer L. Claggett, Ahmed Abbasi:
Timely, Granular, and Actionable: Designing a Social Listening Platform for Public Health 3.0. MIS Q. 48(3): 899-930 (2024) - [j44]Zifan Jiang, Salman Seyedi, Emily Griner, Ahmed Abbasi, Ali Bahrami Rad, Hyeokhyen Kwon, Robert O. Cotes, Gari D. Clifford:
Multimodal Mental Health Digital Biomarker Analysis From Remote Interviews Using Facial, Vocal, Linguistic, and Cardiovascular Patterns. IEEE J. Biomed. Health Informatics 28(3): 1680-1691 (2024) - [j43]John P. Lalor, Ahmed Abbasi, Kezia Oketch, Yi Yang, Nicole Forsgren:
Should Fairness be a Metric or a Model? A Model-based Framework for Assessing Bias in Machine Learning Pipelines. ACM Trans. Inf. Syst. 42(4): 99:1-99:41 (2024) - [c37]Ruiyang Qin, Yuting Hu, Zheyu Yan, Jinjun Xiong, Ahmed Abbasi, Yiyu Shi:
FL-NAS: Towards Fairness of NAS for Resource Constrained Devices via Large Language Models : (Invited Paper). ASPDAC 2024: 429-434 - [c36]Ruiyang Qin, Jun Xia, Zhenge Jia, Meng Jiang, Ahmed Abbasi, Peipei Zhou, Jingtong Hu, Yiyu Shi:
Enabling On-Device Large Language Model Personalization with Self-Supervised Data Selection and Synthesis. DAC 2024: 29:1-29:6 - [c35]Hanyu Duan, Yixuan Tang, Yi Yang, Ahmed Abbasi, Kar Yan Tam:
Exploring the Relationship between In-Context Learning and Instruction Tuning. EMNLP (Findings) 2024: 3197-3210 - [i14]Ruiyang Qin, Yuting Hu, Zheyu Yan, Jinjun Xiong, Ahmed Abbasi, Yiyu Shi:
FL-NAS: Towards Fairness of NAS for Resource Constrained Devices via Large Language Models. CoRR abs/2402.06696 (2024) - [i13]Ruiyang Qin, Dancheng Liu, Zheyu Yan, Zhaoxuan Tan, Zixuan Pan, Zhenge Jia, Meng Jiang, Ahmed Abbasi, Jinjun Xiong, Yiyu Shi:
Empirical Guidelines for Deploying LLMs onto Resource-constrained Edge Devices. CoRR abs/2406.03777 (2024) - 2023
- [j42]Kai Yang, Raymond Y. K. Lau, Ahmed Abbasi:
Getting Personal: A Deep Learning Artifact for Text-Based Measurement of Personality. Inf. Syst. Res. 34(1): 194-222 (2023) - [j41]Ahmed Abbasi, Roger H. L. Chiang, Jennifer Xu:
Data Science for Social Good. J. Assoc. Inf. Syst. 24(6): 10 (2023) - [j40]Sriram Somanchi, Ahmed Abbasi, Ken Kelley, David G. Dobolyi, Ted Tao Yuan:
Examining User Heterogeneity in Digital Experiments. ACM Trans. Inf. Syst. 41(4): 100:1-100:34 (2023) - [i12]Marialena Bevilacqua, Kezia Oketch, Ruiyang Qin, Will Stamey, Xinyuan Zhang, Yi Gan, Kai Yang, Ahmed Abbasi:
When Automated Assessment Meets Automated Content Generation: Examining Text Quality in the Era of GPTs. CoRR abs/2309.14488 (2023) - [i11]Hanyu Duan, Yixuan Tang, Yi Yang, Ahmed Abbasi, Kar Yan Tam:
Exploring the Relationship between In-Context Learning and Instruction Tuning. CoRR abs/2311.10367 (2023) - [i10]Yi Yang, Hanyu Duan, Ahmed Abbasi, John P. Lalor, Kar Yan Tam:
Bias A-head? Analyzing Bias in Transformer-Based Language Model Attention Heads. CoRR abs/2311.10395 (2023) - [i9]Ruiyang Qin, Jun Xia, Zhenge Jia, Meng Jiang, Ahmed Abbasi, Peipei Zhou, Jingtong Hu, Yiyu Shi:
Enabling On-Device Large Language Model Personalization with Self-Supervised Data Selection and Synthesis. CoRR abs/2311.12275 (2023) - [i8]Ahmed Abbasi, Roger H. L. Chiang, Jennifer J. Xu:
Data Science for Social Good. CoRR abs/2311.14683 (2023) - 2022
- [j39]Ahmed Abbasi, Abdul Rehman Javed, Amanullah Yasin, Zunera Jalil, Natalia Kryvinska, Usman Tariq:
A Large-Scale Benchmark Dataset for Anomaly Detection and Rare Event Classification for Audio Forensics. IEEE Access 10: 38885-38894 (2022) - [j38]Faizan Ahmad, Ahmed Abbasi, Brent Kitchens, Donald A. Adjeroh, Daniel Zeng:
Deep Learning for Adverse Event Detection From Web Search. IEEE Trans. Knowl. Data Eng. 34(6): 2681-2695 (2022) - [c34]Yue Guo, Yi Yang, Ahmed Abbasi:
Auto-Debias: Debiasing Masked Language Models with Automated Biased Prompts. ACL (1) 2022: 1012-1023 - [c33]Farkhund Iqbal, Ahmed Abbasi, Abdul Rehman Javed, Zunera Jalil, Jamal N. Al-Karaki:
Deepfake Audio Detection Via Feature Engineering And Machine Learning. CIKM Workshops 2022 - [c32]Hanyu Duan, Yi Yang, Ahmed Abbasi, Kar Yan Tam:
BARLE: Background-Aware Representation Learning for Background Shift Out-of-Distribution Detection. EMNLP (Findings) 2022: 750-764 - [c31]John Lalor, Yi Yang, Kendall Smith, Nicole Forsgren, Ahmed Abbasi:
Benchmarking Intersectional Biases in NLP. NAACL-HLT 2022: 3598-3609 - 2021
- [j37]Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed:
Toward Tweet-Mining Framework for Extracting Terrorist Attack-Related Information and Reporting. IEEE Access 9: 115535-115547 (2021) - [j36]Yan Chen, Fatemeh Mariam Zahedi, Ahmed Abbasi, David G. Dobolyi:
Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools. Inf. Manag. 58(1): 103394 (2021) - [j35]Ahmed Abbasi, David G. Dobolyi, Anthony Vance, Fatemeh Mariam Zahedi:
The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites. Inf. Syst. Res. 32(2): 410-436 (2021) - [j34]Ahmed Abbasi, Robin L. Dillon-Merrill, H. Raghav Rao, Olivia Sheng, Rui Chen:
Call for Papers - Special Issue of Information Systems Research - Unleashing the Power of Information Technology for Strategic Management of Disasters. Inf. Syst. Res. 32(4): 1490-1493 (2021) - [c30]Saminur Islam, Ahmed Abbasi, Nitin Agarwal, Wanhong Zheng, Gianfranco Doretto, Donald A. Adjeroh:
Detecting Drug-Drug Interactions using Protein Sequence-Structure Similarity Networks. BIBM 2021: 3472-3477 - [c29]Ahmed Abbasi, David G. Dobolyi, John P. Lalor, Richard G. Netemeyer, Kendall Smith, Yi Yang:
Constructing a Psychometric Testbed for Fair Natural Language Processing. EMNLP (1) 2021: 3748-3758 - [c28]Nicholas Berente, John P. Lalor, Sriram Somanchi, Ahmed Abbasi:
The Illusion of Certainty and Data-Driven Decision Making in Emergent Situations. ICIS 2021 - 2020
- [j33]Jingjing Li, Kai R. Larsen, Ahmed Abbasi:
TheoryOn: A Design Framework and System for Unlocking Behavioral Knowledge Through Ontology Learning. MIS Q. 44(4) (2020) - [j32]Faizan Ahmad, Ahmed Abbasi, Jingjing Li, David G. Dobolyi, Richard G. Netemeyer, Gari D. Clifford, Hsinchun Chen:
A Deep Learning Architecture for Psychometric Natural Language Processing. ACM Trans. Inf. Syst. 38(1): 6:1-6:29 (2020) - [c27]Syed Hasan Amin Mahmood, Ahmed Abbasi:
Using Deep Generative Models to Boost Forecasting: A Phishing Prediction Case Study. ICDM (Workshops) 2020: 496-505 - [c26]David G. Dobolyi, Ahmed Abbasi, F. Mariam Zahedi, Anthony Vance:
An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility. ISI 2020: 1-6 - [c25]Syed Hasan Amin Mahmood, Syed Mustafa Ali Abbasi, Ahmed Abbasi, Fareed Zaffar:
Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks. ISI 2020: 1-6 - [i7]Ahmed Abbasi, David G. Dobolyi, Richard G. Netemeyer:
Constructing a Testbed for Psychometric Natural Language Processing. CoRR abs/2007.12969 (2020)
2010 – 2019
- 2019
- [j31]Shasha Deng, Yilu Zhou, Pengzhu Zhang, Ahmed Abbasi:
Using discussion logic in analyzing online group discussions: A text mining approach. Inf. Manag. 56(4): 536-551 (2019) - [j30]Ahmed Abbasi, Jingjing Li, Donald A. Adjeroh, Marie Abate, Wanhong Zheng:
Don't Mention It? Analyzing User-Generated Content Signals for Early Adverse Event Warnings. Inf. Syst. Res. 30(3): 1007-1028 (2019) - 2018
- [j29]Brent Kitchens, David G. Dobolyi, Jingjing Li, Ahmed Abbasi:
Advanced Customer Analytics: Strategic Value Through Integration of Relationship-Oriented Big Data. J. Manag. Inf. Syst. 35(2): 540-574 (2018) - [j28]Ahmed Abbasi, Yili Zhou, Shasha Deng, Pengzhu Zhang:
Text Analytics to Support Sense-Making in Social Media: A Language-Action Perspective. MIS Q. 42(2) (2018) - [j27]David Zimbra, Ahmed Abbasi, Daniel Zeng, Hsinchun Chen:
The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation. ACM Trans. Manag. Inf. Syst. 9(2): 5:1-5:29 (2018) - [c24]Hameeduddin Irfan Khaja, Marie Abate, Wanhong Zheng, Ahmed Abbasi, Donald A. Adjeroh:
Evaluating Semantic Similarity for Adverse Drug Event Narratives. SBP-BRiMS 2018: 292-299 - 2017
- [c23]Donald A. Adjeroh, Maen Allaga, Jun Tan, Jie Lin, Yue Jiang, Ahmed Abbasi, Xiaobo Zhou:
String-Based Models for Predicting RNA-Protein Interaction. BCB 2017: 661-666 - 2016
- [j26]Ahmed Abbasi, Suprateek Sarker, Roger H. L. Chiang:
Big Data Research in Information Systems: Toward an Inclusive Research Agenda. J. Assoc. Inf. Syst. 17(2): 3 (2016) - [c22]Ahmed Abbasi, Kevin Zhao, Brendan Abraham:
A Prototype System for Collecting and Analyzing Credible Online Medical Content. DESRIST 2016: 197-201 - [c21]Jingjing Li, Kai R. Larsen, Ahmed Abbasi:
TheoryOn: Designing a Construct-Based Search Engine to Reduce Information Overload for Behavioral Science Research. DESRIST 2016: 212-216 - [c20]David G. Dobolyi, Ahmed Abbasi:
PhishMonger: A free and open source public archive of real-world phishing websites. ISI 2016: 31-36 - [c19]Ahmed Abbasi, F. Mariam Zahedi, Yan Chen:
Phishing susceptibility: The good, the bad, and the ugly. ISI 2016: 169-174 - 2015
- [j25]Donald E. Brown, Ahmed Abbasi, Raymond Y. K. Lau:
Predictive [Guest editors' introduction]. IEEE Intell. Syst. 30(2): 6-8 (2015) - [j24]Donald E. Brown, Ahmed Abbasi, Raymond Y. K. Lau:
Predictive Analytics: Predictive Modeling at the Micro Level. IEEE Intell. Syst. 30(3): 6-8 (2015) - [j23]Ahmed Abbasi, Raymond Y. K. Lau, Donald E. Brown:
Predicting Behavior. IEEE Intell. Syst. 30(3): 35-43 (2015) - [j22]Fatemeh "Mariam" Zahedi, Ahmed Abbasi, Yan Chen:
Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance. J. Assoc. Inf. Syst. 16(6): 2 (2015) - [j21]Ahmed Abbasi, Fatemeh "Mariam" Zahedi, Daniel Zeng, Yan Chen, Hsinchun Chen, Jay F. Nunamaker Jr.:
Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information. J. Manag. Inf. Syst. 31(4): 109-157 (2015) - [c18]Hashim Sharif, Saad Ismail, Shehroze Farooqi, Mohammad Taha Khan, Muhammad Ali Gulzar, Hasnain Lakhani, Fareed Zaffar, Ahmed Abbasi:
A Classification Based Framework to Predict Viral Threads. PACIS 2015: 134 - 2014
- [j20]Ahmed Abbasi, Donald A. Adjeroh, Mark Dredze, Michael J. Paul, Fatemeh "Mariam" Zahedi, Huimin Zhao, Nitin Walia, Hemant K. Jain, Patrick Sanvanson, Reza Shaker, Marco D. Huesch, Richard Beal, Wanhong Zheng, Marie Abate, Arun Ross:
Social Media Analytics for Smart Health. IEEE Intell. Syst. 29(2): 60-80 (2014) - [j19]Victor A. Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A. Larson, Hsinchun Chen:
Evaluating text visualization for authorship analysis. Secur. Informatics 3(1): 10 (2014) - [c17]Ahmed Abbasi, Weifeng Li, Victor A. Benjamin, Shiyu Hu, Hsinchun Chen:
Descriptive Analytics: Examining Expert Hackers in Web Forums. JISIC 2014: 56-63 - [c16]Ahmed Abbasi, Ammar Hassan, Milan Dhar:
Benchmarking Twitter Sentiment Analysis Tools. LREC 2014: 823-829 - 2013
- [j18]Zhu Zhang, Daniel Dajun Zeng, Ahmed Abbasi, Jing Peng, Xiaolong Zheng:
A Random Walk Model for Item Recommendation in Social Tagging Systems. ACM Trans. Manag. Inf. Syst. 4(2): 8:1-8:24 (2013) - [c15]Richard Beal, Donald A. Adjeroh, Ahmed Abbasi:
The Forward Stem Matrix: An Efficient Data Structure for Finding Hairpins in RNA Secondary Structures. BCB 2013: 575 - [c14]Victor A. Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A. Larson, Hsinchun Chen:
Evaluating text visualization: An experiment in authorship analysis. ISI 2013: 16-20 - [c13]Ahmed Abbasi, Tianjun Fu, Daniel Zeng, Donald A. Adjeroh:
Crawling Credible Online Medical Sentiments for Social Intelligence. SocialCom 2013: 254-263 - [c12]Ammar Hassan, Ahmed Abbasi, Daniel Zeng:
Twitter Sentiment Analysis: A Bootstrap Ensemble Framework. SocialCom 2013: 357-364 - [i6]Ahmed Abbasi, Hsinchun Chen:
Detecting Fake Escrow Websites using Rich Fraud Cues and Kernel Based Methods. CoRR abs/1309.7261 (2013) - [i5]F. Mariam Zahedi, Ahmed Abbasi, Yan Chen:
Design Elements that Promote the use of Fake Website Detection Tools. CoRR abs/1309.7262 (2013) - [i4]Ahmed Abbasi, Siddharth Kaza, F. Mariam Zahedi:
Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites. CoRR abs/1309.7266 (2013) - [i3]Tianjun Fu, Ahmed Abbasi, Daniel Zeng, Hsinchun Chen:
Evaluating the Usefulness of Sentiment Information for Focused Crawlers. CoRR abs/1309.7270 (2013) - [i2]Ahmed Abbasi, Zhu Zhang, Hsinchun Chen:
A Statistical Learning Based System for Fake Website Detection. CoRR abs/1309.7958 (2013) - [i1]Zhu Zhang, Daniel Zeng, Ahmed Abbasi, Jing Peng:
A Random Walk Model for Item Recommendation in Folksonomies. CoRR abs/1310.7957 (2013) - 2012
- [j17]Ahmed Abbasi, Conan Albrecht, Anthony Vance, James Hansen:
MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud. MIS Q. 36(4): 1293-1327 (2012) - [j16]Ahmed Abbasi, Fatemeh "Mariam" Zahedi, Siddharth Kaza:
Detecting Fake Medical Web Sites Using Recursive Trust Labeling. ACM Trans. Inf. Syst. 30(4): 22:1-22:36 (2012) - [j15]Tianjun Fu, Ahmed Abbasi, Daniel Zeng, Hsinchun Chen:
Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers. ACM Trans. Inf. Syst. 30(4): 24:1-24:30 (2012) - [c11]Ahmed Abbasi, Fatemeh Zahedi, Yan Chen:
Impact of anti-phishing tool performance on attack success rates. ISI 2012: 12-17 - [c10]Jason Koepke, Siddharth Kaza, Ahmed Abbasi:
Exploratory experiments to identify fake websites by using features from the network stack. ISI 2012: 126-128 - 2011
- [j14]Ahmed Abbasi, Stephen L. France, Zhu Zhang, Hsinchun Chen:
Selecting Attributes for Sentiment Classification Using Feature Relation Networks. IEEE Trans. Knowl. Data Eng. 23(3): 447-462 (2011) - [c9]Yan Chen, Fatemeh "Mariam" Zahedi, Ahmed Abbasi:
Interface Design Elements for Anti-phishing Systems. DESRIST 2011: 253-265 - [c8]Stephen L. France, Ahmed Abbasi:
Boosting Unsupervised Additive Clustering Using Cluster-Wise Optimization and Multi-label Learning. ICDM Workshops 2011: 236-243 - 2010
- [j13]Ahmed Abbasi:
Intelligent Feature Selection for Opinion Classification. IEEE Intell. Syst. 25(4): 75-79 (2010) - [j12]Tianjun Fu, Ahmed Abbasi, Hsinchun Chen:
A focused crawler for Dark Web forums. J. Assoc. Inf. Sci. Technol. 61(6): 1213-1231 (2010) - [j11]David Zimbra, Ahmed Abbasi, Hsinchun Chen:
A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study. J. Comput. Mediat. Commun. 16(1): 48-70 (2010) - [j10]Ahmed Abbasi, Zhu Zhang, David Zimbra, Hsinchun Chen, Jay F. Nunamaker Jr.:
Detecting Fake Websites: The Contribution of Statistical Learning Theory. MIS Q. 34(3): 435-461 (2010) - [p1]Yi-Da Chen, Ahmed Abbasi, Hsinchun Chen:
Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement. Security Informatics 2010: 1-23
2000 – 2009
- 2009
- [j9]Ahmed Abbasi, Hsinchun Chen:
A Comparison of Tools for Detecting Fake Websites. Computer 42(10): 78-86 (2009) - [j8]Ahmed Abbasi, Hsinchun Chen:
A comparison of fraud cues and classification methods for fake escrow website detection. Inf. Technol. Manag. 10(2-3): 83-101 (2009) - 2008
- [j7]Tianjun Fu, Ahmed Abbasi, Hsinchun Chen:
A hybrid approach to Web forum interactional coherence analysis. J. Assoc. Inf. Sci. Technol. 59(8): 1195-1209 (2008) - [j6]Ahmed Abbasi, Hong-Mei Chen, Jay F. Nunamaker Jr.:
Stylometric Identification in Electronic Markets: Scalability and Robustness. J. Manag. Inf. Syst. 25(1): 49-78 (2008) - [j5]Ahmed Abbasi, Hsinchun Chen:
CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication. MIS Q. 32(4): 811-837 (2008) - [j4]Ahmed Abbasi, Hsinchun Chen, S. Thoms, Tianjun Fu:
Affect Analysis of Web Forums and Blogs Using Correlation Ensembles. IEEE Trans. Knowl. Data Eng. 20(9): 1168-1180 (2008) - [j3]Ahmed Abbasi, Hsinchun Chen:
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2): 7:1-7:29 (2008) - [j2]Ahmed Abbasi, Hsinchun Chen, Arab Salem:
Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums. ACM Trans. Inf. Syst. 26(3): 12:1-12:34 (2008) - [c7]Yi-Da Chen, Ahmed Abbasi, Hsinchun Chen:
Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement. ISI 2008: 7-12 - 2007
- [c6]Ahmed Abbasi, Hsinchun Chen:
A Framework for Stylometric Similarity Detection in Online Settings. AMCIS 2007: 127 - [c5]Ahmed Abbasi, Hsinchun Chen:
Affect Intensity Analysis of Dark Web Forums. ISI 2007: 282-288 - [c4]Tianjun Fu, Ahmed Abbasi, Hsinchun Chen:
Interaction Coherence Analysis for Dark Web Forums. ISI 2007: 342-349 - [c3]Ahmed Abbasi, Hsinchun Chen:
Categorization and analysis of text in computer mediated communication archives using visualization. JCDL 2007: 11-18 - 2006
- [c2]Ahmed Abbasi, Hsinchun Chen:
Visualizing Authorship for Identification. ISI 2006: 60-71 - 2005
- [j1]Ahmed Abbasi, Hsinchun Chen:
Applying Authorship Analysis to Extremist-Group Web Forum Messages. IEEE Intell. Syst. 20(5): 67-75 (2005) - [c1]Ahmed Abbasi, Hsinchun Chen:
Applying Authorship Analysis to Arabic Web Content. ISI 2005: 183-197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint