default search action
Ping Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Ahmed Almutairi, Ping Yi, Mahmoud Owais:
New Approach for Estimating Intersection Control Delay From Passive Traffic Sensors at Network Level. IEEE Access 12: 2882-2900 (2024) - [j37]Tianming Zheng, Haojun Liu, Hang Xu, Xiang Chen, Ping Yi, Yue Wu:
Few-VulD: A Few-shot learning framework for software vulnerability detection. Comput. Secur. 144: 103992 (2024) - [j36]Zehui Zhang, Futai Zou, Jianan Hong, Libo Chen, Ping Yi:
Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT. IEEE Internet Things J. 11(17): 28267-28280 (2024) - [c61]Haoyu Jiang, Nan Li, Ping Yi:
PUBA: A Physical Undirected Backdoor Attack in Vision-based UAV Detection and Tracking Systems. IJCNN 2024: 1-8 - [c60]Haoyu Jiang, Haiyang Yu, Nan Li, Ping Yi:
OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection. IJCNN 2024: 1-8 - [c59]Yong Xiao, Jin Ma, Ping Yi, Xiuzhen Chen:
Sponge Backdoor Attack: Increasing the Latency of Object Detection Exploiting Non-Maximum Suppression. IJCNN 2024: 1-8 - [i7]Pengzhou Cheng, Yidong Ding, Tianjie Ju, Zongru Wu, Wei Du, Ping Yi, Zhuosheng Zhang, Gongshen Liu:
TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models. CoRR abs/2405.13401 (2024) - [i6]Nan Li, Haiyang Yu, Ping Yi:
Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective. CoRR abs/2405.17746 (2024) - [i5]Nan Li, Haoyu Jiang, Ping Yi:
Magnitude-based Neuron Pruning for Backdoor Defens. CoRR abs/2405.17750 (2024) - [i4]Xuhong Wang, Haoyu Jiang, Yi Yu, Jingru Yu, Yilun Lin, Ping Yi, Yingchun Wang, Yu Qiao, Li Li, Fei-Yue Wang:
Building Intelligence Identification System via Large Language Model Watermarking: A Survey and Beyond. CoRR abs/2407.11100 (2024) - 2023
- [j35]Bolun Wu, Futai Zou, Ping Yi, Yue Wu, Liang Zhang:
SlicedLocator: Code vulnerability locator based on sliced dependence graph. Comput. Secur. 134: 103469 (2023) - [j34]Lin Hu, Haibo Li, Ping Yi, Jing Huang, Miao Lin, Hong Wang:
Investigation on AEB Key Parameters for Improving Car to Two-Wheeler Collision Safety Using In-Depth Traffic Accident Data. IEEE Trans. Veh. Technol. 72(1): 113-124 (2023) - [i3]Haoyu Jiang, Haiyang Yu, Nan Li, Ping Yi:
OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection. CoRR abs/2312.01585 (2023) - 2022
- [c58]Tianming Zheng, Zhixin Tong, Ping Yi, Yue Wu:
Automated Generation of Bug Samples Based on Source Code Analysis. APSEC 2022: 51-60 - [c57]Xiang Li, Yihao Li, Ping Yi:
Graph-based Malicious Account Groups Detection in Electronic Trading of Bulk Commodities. CSCloud/EdgeCom 2022: 62-67 - [c56]Dongliang Guan, Sheng Liu, Yihao Li, Ping Yi:
Graph-based Algorithm For Self-trading Accounts Detection in Bulk Commodity Trade. CSCloud/EdgeCom 2022: 141-146 - [i2]Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He:
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin. CoRR abs/2205.11783 (2022) - 2021
- [j33]Baixi Lai, Ping Yi, Yu Sui, Qingquan Zhang:
Energy distribution in EV energy network under energy shortage. Neurocomputing 444: 179-188 (2021) - [j32]Guangyun Tan, Peipei Wei, Yongyi He, Huahu Xu, Xinxin Shi, Ping Yi:
An algorithm based on valuation forecasting for game tree search. Int. J. Mach. Learn. Cybern. 12(4): 1083-1095 (2021) - [j31]Guangyun Tan, Yongyi He, Huahu Xu, Peipei Wei, Ping Yi, Xinxin Shi:
Winning Rate Prediction Model Based on Monte Carlo Tree Search for Computer Dou Dizhu. IEEE Trans. Games 13(2): 123-137 (2021) - [c55]Chenqi Xie, Ping Yi, Baowen Zhang, Futai Zou:
DeepMark: Embedding Watermarks into Deep Neural Network Using Pruning. ICTAI 2021: 169-175 - [c54]Wei Wang, Zeyu Ning, Hugues Nelson Iradukunda, Qingquan Zhang, Ting Zhu, Ping Yi:
MailLeak: Obfuscation-Robust Character Extraction Using Transfer Learning. SEC 2021: 459-464 - [i1]Haowen Liu, Ping Yi, Hsiao-Ying Lin, Jie Shi, Weidong Qiu:
DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction. CoRR abs/2103.06487 (2021) - 2020
- [j30]Xiaoshi Liang, Futai Zou, Linsen Li, Ping Yi:
Mobile terminal identity authentication system based on behavioral characteristics. Int. J. Distributed Sens. Networks 16(1) (2020) - [j29]Zhiyang Xia, Ping Yi, Yunyu Liu, Bo Jiang, Wei Wang, Ting Zhu:
GENPass: A Multi-Source Deep Learning Model for Password Guessing. IEEE Trans. Multim. 22(5): 1323-1332 (2020) - [c53]Giulia Serafini, Ping Yi, Qingquan Zhang, Marco Brambilla, Jiayue Wang, Yiwei Hu, Beibei Li:
Sentiment-Driven Price Prediction of the Bitcoin based on Statistical and Deep Learning Approaches. IJCNN 2020: 1-8 - [c52]Yuzong Hu, Futai Zou, Linsen Li, Ping Yi:
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet. TrustCom 2020: 418-424
2010 – 2019
- 2019
- [j28]Yu Sui, Ping Yi, Xin Liu, Ting Zhu:
Energy Transport Station Deployment in Electric Vehicles Energy Internet. IEEE Access 7: 97986-97995 (2019) - [j27]Kedi Wang, Ping Yi, Futai Zou, Yue Wu:
Generating Adversarial Samples With Constrained Wasserstein Distance. IEEE Access 7: 136812-136821 (2019) - [j26]Qingquan Zhang, Yao Yao, Ting Zhu, Ziqiao Zhou, Wei Xu, Ping Yi, Sheng Xiao:
Dynamic Enhanced Field Division: An Advanced Localizing and Tracking Middleware. ACM Trans. Sens. Networks 15(1): 2:1-2:26 (2019) - [j25]Cheng Huang, Ping Yi, Futai Zou, Yao Yao, Wei Wang, Ting Zhu:
CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS. Wirel. Commun. Mob. Comput. 2019: 6705347:1-6705347:9 (2019) - [c51]Qitao Xie, Dayuan Tan, Ting Zhu, Qingquan Zhang, Sheng Xiao, Junyu Wang, Beibei Li, Lei Sun, Ping Yi:
Chatbot Application on Cryptocurrency. CIFEr 2019: 1-8 - [c50]Tangda Yu, Futai Zou, Linsen Li, Ping Yi:
An Encrypted Malicious Traffic Detection System Based on Neural Network. CyberC 2019: 62-70 - [c49]Baixi Lai, Ping Yi, Yu Sui, Qingquan Zhang:
Energy Distribution in EV Energy Network under Energy Shortage. HPCC/SmartCity/DSS 2019: 2594-2600 - [c48]Shuangchi Gu, Ping Yi, Ting Zhu, Yao Yao, Wei Wang:
Detecting Adversarial Examples in Deep Neural Networks using Normalizing Filters. ICAART (2) 2019: 164-173 - 2018
- [j24]Peng Ji, Hong Zeng, Aiguo Song, Ping Yi, Pengwen Xiong, Huijun Li:
Virtual exoskeleton-driven uncalibrated visual servoing control for mobile robotic manipulators based on human-robot-robot cooperation. Trans. Inst. Meas. Control 40(14): 4046-4062 (2018) - [j23]Ping Yi, Yuxiang Guan, Futai Zou, Yao Yao, Wei Wang, Ting Zhu:
Web Phishing Detection Using a Deep Learning Framework. Wirel. Commun. Mob. Comput. 2018: 4678746:1-4678746:9 (2018) - [c47]Yunyu Liu, Zhiyang Xia, Ping Yi, Yao Yao, Tiantian Xie, Wei Wang, Ting Zhu:
GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation. ICC 2018: 1-6 - [c46]Yunlong Hu, Ping Yi, Yu Sui, Zongrui Zhang, Yao Yao, Wei Wang, Ting Zhu:
Dispatching and Distributing Energy in Energy Internet under Energy Dilemma. SSIC 2018: 1-5 - [c45]Yishuang Meng, Ping Yi, Xuejun Guo, Wen Gu, Xin Liu, Wei Wang, Ting Zhu:
Detection for Pulmonary Nodules using RGB Channel Superposition Method in Deep Learning Framework. SSIC 2018: 1-8 - 2017
- [j22]Jianwen Xu, Ping Yi, Wei Wang, Ting Zhu:
A power storage station placement algorithm for power distribution based on electric vehicle. Int. J. Distributed Sens. Networks 13(2) (2017) - [j21]Kyoung-Don Kang, Daniel Sadoc Menasché, Gürhan Küçük, Ting Zhu, Ping Yi:
Edge computing in the Internet of Things. Int. J. Distributed Sens. Networks 13(9) (2017) - [j20]Peng Ji, Aiguo Song, Pengwen Xiong, Ping Yi, Xiaonong Xu, Huijun Li:
Egocentric-Vision based Hand Posture Control System for Reconnaissance Robots. J. Intell. Robotic Syst. 87(3-4): 583-599 (2017) - [j19]Ping Yi, Aiguo Song, Jianhui Guo, Ruili Wang:
Regularization feature selection projection twin support vector machine via exterior penalty. Neural Comput. Appl. 28(S-1): 683-697 (2017) - [j18]Dixiong Yang, Zhenjun Liu, Ping Yi:
Computational efficiency of accelerated particle swarm optimization combined with different chaotic maps for global optimization. Neural Comput. Appl. 28(S-1): 1245-1264 (2017) - [c44]Yu Sui, Ping Yi, Xin Liu, Wei Wang, Ting Zhu:
Optimization for charge station placement in electric vehicles energy network. SmartIoT@SEC 2017: 1:1-1:6 - [c43]Jianwen Xu, Ping Yi, Tiantian Xie, Wei Wang, Xin Liu, Ting Zhu:
Charge station placement in electric vehicle energy distribution network. ICC 2017: 1-6 - [c42]Xin Liu, Wei Wang, Ting Zhu, Qingquan Zhang, Ping Yi:
Poster: Smart Object-Oriented Dynamic Energy Management for Base Stations in Smart Cities. SmartObjects@MobiCom 2017: 27-28 - 2016
- [j17]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Li Pan:
Puppet attack: A denial of service attack in advanced metering infrastructure network. J. Netw. Comput. Appl. 59: 325-332 (2016) - [j16]Ping Yi, Ting Zhu, Bo Jiang, Ruofan Jin, Bing Wang:
Deploying Energy Routers in an Energy Internet Based on Electric Vehicles. IEEE Trans. Veh. Technol. 65(6): 4714-4725 (2016) - [c41]Jialin Gao, Ping Yi, Zicheng Chi, Ting Zhu:
Enhanced Wearable Medical Systems for Effective Blood Glucose Control. CHASE 2016: 199-208 - [c40]Chandrima Dadi, Ping Yi, Zongming Fei, Hui Lu:
A New Block-Based Data Distribution Mechanism in Cloud Computing. CSCloud 2016: 54-59 - [c39]Shengyang Li, Ping Yi, Zhichuan Huang, Tiantian Xie, Ting Zhu:
Energy scheduling and allocation in electric vehicles energy internet. ISGT 2016: 1-5 - 2015
- [j15]Futai Zou, Siyu Zhang, Weixiong Rao, Ping Yi:
Detecting Malware Based on DNS Graph Mining. Int. J. Distributed Sens. Networks 11: 102687:1-102687:12 (2015) - [j14]Ting Zhu, Qingquan Zhang, Sheng Xiao, Yu Gu, Ping Yi, Yanhua Li:
Big Data in Future Sensing. Int. J. Distributed Sens. Networks 11: 837159:1-837159:2 (2015) - [j13]Ting Zhu, Sheng Xiao, Qingquan Zhang, Yu Gu, Ping Yi, Yanhua Li:
Emergent Technologies in Big Data Sensing: A Survey. Int. J. Distributed Sens. Networks 11: 902982:1-902982:13 (2015) - [j12]Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang, Ping Yi:
Security and trust management in opportunistic networks: a survey. Secur. Commun. Networks 8(9): 1812-1827 (2015) - [c38]Qingquan Zhang, Wei Xu, Zhichuan Huang, Ziqiao Zhou, Ping Yi, Ting Zhu, Sheng Xiao:
Context-Centric Target Localization with Optimal Anchor Deployments. ICNP 2015: 396-405 - [c37]Qingquan Zhang, Ziqiao Zhou, Wei Xu, Jing Qi, Chenxi Guo, Ping Yi, Ting Zhu, Sheng Xiao:
Fingerprint-free tracking with dynamic enhanced field division. INFOCOM 2015: 2785-2793 - [c36]Abdurrahman Arikan, Ruofan Jin, Bing Wang, Song Han, Krishna R. Pattipati, Ping Yi, Ting Zhu:
Optimal renewable energy transfer via electrical vehicles. ISGT 2015: 1-5 - [c35]Ping Yi:
Impact Study of Vehicle Platooning and Gap Management on Traffic Operation Through Automated Vehicles. ITITS (1) 2015: 17-18 - [c34]Yue Wu, Fanchao Meng, Guanghao Wang, Ping Yi:
A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks. SSIC 2015: 1-7 - 2014
- [j11]Jianhui Guo, Ping Yi, Ruili Wang, Qiaolin Ye, Chunxia Zhao:
Feature selection for least squares projection twin support vector machine. Neurocomputing 144: 174-183 (2014) - [j10]Zongming Fei, Ping Yi, Jianjun Yang:
A Performance Perspective on Choosing between Single Aggregate and Multiple Aggregates for GENI Experime nts. EAI Endorsed Trans. Ind. Networks Intell. Syst. 1(1): e5 (2014) - [j9]Ping Yi, Minjie Yu, Ziqiao Zhou, Wei Xu, Qingquan Zhang, Ting Zhu:
A Three-Dimensional Wireless Indoor Localization System. J. Electr. Comput. Eng. 2014: 149016:1-149016:13 (2014) - [j8]Wenchao Li, Ping Yi, Yue Wu, Li Pan, Jianhua Li:
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network. J. Electr. Comput. Eng. 2014: 240217:1-240217:8 (2014) - [j7]Zuying Wei, Tianrong Zhang, Fan Wu, Xiaofeng Gao, Guihai Chen, Ping Yi:
A truthful auction mechanism for channel allocation in multi-radio, multi-channel non-cooperative wireless networks. Pers. Ubiquitous Comput. 18(4): 925-937 (2014) - [c33]Sijun Ren, Ping Yi, Dapeng Hong, Yue Wu, Ting Zhu:
Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks. CSE 2014: 901-908 - [c32]Sijun Ren, Ping Yi, Yue Wu, Jianhua Li:
An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree. CSE 2014: 1205-1212 - [c31]Sijun Ren, Ping Yi, Zhuqiulong Lin, Chenxi Guo, Yue Wu:
Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor Networks. CSE 2014: 1570-1576 - [c30]Ping Yi, Zongming Fei:
Characterizing the GENI Networks. GREE 2014: 53-56 - [c29]Weigang Zhong, Zhichuan Huang, Ting Zhu, Yu Gu, Qingquan Zhang, Ping Yi, Dingde Jiang, Sheng Xiao:
iDES: Incentive-driven distributed energy sharing in sustainable microgrids. IGCC 2014: 1-10 - [c28]Ziqiao Zhou, Mengjun Xie, Ting Zhu, Wei Xu, Ping Yi, Zhichuan Huang, Qingquan Zhang, Sheng Xiao:
EEP2P: An energy-efficient and economy-efficient P2P network protocol. IGCC 2014: 1-6 - [c27]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Jianhua Li:
A denial of service attack in advanced metering infrastructure network. ICC 2014: 1029-1034 - [c26]Sijun Ren, Ping Yi, Ting Zhu, Yue Wu, Jianhua Li:
A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks. ICCC 2014: 829-834 - [c25]Ping Yi, Yixiong Tang, Yijie Hong, Yuzhe Shen, Ting Zhu, Qingquan Zhang, Miroslav Begovic:
Renewable energy transmission through multiple routes in a mobile electrical grid. ISGT 2014: 1-5 - [c24]Zongming Fei, Ping Yi, Jianjun Yang:
The Tradeoff Between Single Aggregate and Multiple Aggregates in Designing GENI Experiments. TRIDENTCOM 2014: 23-32 - 2013
- [j6]Ping Yi, Ting Zhu, Jianqing Ma, Yue Wu:
An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 17(3-4): 269-292 (2013) - [j5]Chundong She, Ping Yi, Junfeng Wang, Hongshen Yang:
Intrusion Detection for Black Hole and Gray Hole in MANETs. KSII Trans. Internet Inf. Syst. 7(7): 1721-1736 (2013) - [c23]Ping Yi, Ting Zhu, Guangyu Lin, Xiuchen Jiang, Guojie Li, Liangqi Si, Miroslav Begovic:
Energy scheduling and allocation in electric vehicle energy distribution networks. ISGT 2013: 1-6 - [c22]Ping Yi, Ting Zhu, Guangyu Lin, Qingquan Zhang:
Routing Renewable Energy Using Electric Vehicles in Mobile Electrical Grid. MASS 2013: 19-27 - [c21]Qingquan Zhang, Lingkun Fu, Ting Zhu, Yu Gu, Ping Yi, Jiming Chen:
Mobile Anchor Assisted Error Bounded Sensing in Sensor Networks: An Implementation Perspective. MASS 2013: 592-596 - 2012
- [c20]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Jianhua Li:
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. GLOBECOM 2012: 3037-3042 - [c19]Ping Yi, Ting Zhu, Bo Jiang, Bing Wang, Don Towsley:
An energy transmission and distribution network using electric vehicles. ICC 2012: 3335-3339 - 2011
- [j4]Xudong Wang, Ping Yi:
Security Framework for Wireless Communications in Smart Distribution Grid. IEEE Trans. Smart Grid 2(4): 809-818 (2011) - 2010
- [c18]Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu:
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. AINA 2010: 775-780 - [c17]Jiacheng Hong, Ning Liu, Ping Yi, Futai Zou, Qiang Zhai:
Securing Wireless Mesh Network with Mobile Firewall. WCSP 2010: 1-6
2000 – 2009
- 2009
- [j3]Ping Yi, Silin Ding, Heng Wei, George W. Saylor:
Investigating the Effect of Detector Spacing on Midpoint-Based Travel Time Estimation. J. Intell. Transp. Syst. 13(3): 149-159 (2009) - [c16]Ping Yi, Hongkai Xing, Yue Wu, Linchun Li:
Alert correlation by a retrospective method. ICOIN 2009: 1-3 - [c15]Ping Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma:
Security in Wireless Mesh Networks: Challenges and Solutions. ITNG 2009: 423-428 - [c14]Ning Liu, Jianhua Li, Ping Yi, Jianing Li, Yue Wu:
Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks. ITNG 2009: 541-545 - [c13]Yang Liu, Ping Yi, Yue Wu:
Efficient implementation of FIR type time domain equalizers for MIMO wireless channels via M-LESQ. PIMRC 2009: 286-290 - 2008
- [c12]Ning Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi:
Group-Based Trust Model in P2P System Based on Trusted Computing. CSSE (3) 2008: 797-801 - [c11]Junhua Tang, Yue Wu, Linsen Li, Ping Yi:
The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink. GLOBECOM 2008: 5091-5095 - [c10]Linchun Li, Jianhua Li, Yue Wu, Ping Yi:
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. PerCom 2008: 324-329 - 2006
- [c9]Ping Yi, Chun Shao, Li Sheng:
Improved Signal Control for Oversaturated Intersection. ITSC 2006: 81-84 - 2005
- [c8]Ping Yi, YiPing Zhong, Shiyong Zhang:
A Novel Intrusion Detection Method for Mobile Ad Hoc Networks. EGC 2005: 1183-1192 - [c7]Ping Yi, YiPing Zhong, Shiyong Zhang:
Applying Mobile Agent to Intrusion Response for Ad Hoc Networks. International Conference on Computational Science (2) 2005: 593-600 - [c6]Yang Li, Ping Yi, Qiyan Li:
Optimizing Path Expression Queries of XML Data. ICEBE 2005: 497-504 - [c5]Ping Yi, Shiyong Zhang, YiPing Zhong:
An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks. ICEIS (4) 2005: 220-226 - [c4]Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang:
Resisting Flooding Attacks in Ad Hoc Networks. ITCC (2) 2005: 657-662 - [c3]Ping Yi, Yichuan Jiang, YiPing Zhong, Shiyong Zhang:
Distributed Intrusion Detection for Mobile Ad Hoc Networks. SAINT Workshops 2005: 94-97 - 2004
- [c2]Yan Yao, Ping Yi, Yi-Ping Zhong, Shi-Yong Zhang:
Gossip-based scalable and reliable group key distribution framework. InfoSecu 2004: 53-61 - [c1]Ping Yi, Yan Yao, Yafei Hou, Yiping Zhong, Shiyong Zhang:
Securing ad hoc networks through mobile agent. InfoSecu 2004: 125-129 - 2001
- [j2]Ping Yi, Paul Lam:
Teaching highway safety analysis through networking and visualization. Comput. Appl. Eng. Educ. 9(3): 171-179 (2001) - [j1]Ping Yi, T. A. Flickinger, John Lu, Lawrence A. Klein, S. Dissanayake:
Relocatable detector Concept for Dilemma Zone Protection at High-Speed Intersections. J. Intell. Transp. Syst. 6(4): 327-350 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint