default search action
Kaushik Roy 0003
Person information
- affiliation: North Carolina State University, Raleigh, NC, USA
Other persons with the same name
- Kaushik Roy — disambiguation page
- Kaushik Roy 0001 — Purdue University, West Lafayette, IN, USA
- Kaushik Roy 0002 — Concordia University, Institute for Information Systems Engineering, Montreal, QC, CA
- Kaushik Roy 0004 — West Bengal State University, Barasat, India
- Kaushik Roy 0005 — RV College of Engineering, Bangalore, India
- Kaushik Roy 0006 — University of Windsor, Canada
- Kaushik Roy 0007 — Stanford University, Stanford, CA, USA
- Kaushik Roy 0008 — Sungkyunkwan University, MOPIC, R&B Center, Suwon-si, South Korea (and 1 more)
- Kaushik Roy 0009 — University of South Carolina, Department of computer science, AI Institute, Columbia, SC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Mansi Bhavsar, Yohannes Belayneh Bekele, Kaushik Roy, John C. Kelly, Daniel B. Limbrick:
FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT. IEEE Access 12: 52215-52226 (2024) - [j32]Roger E. Davis, Jingsheng Xu, Kaushik Roy:
Classifying Malware Traffic Using Images and Deep Convolutional Neural Network. IEEE Access 12: 58031-58038 (2024) - [j31]Amber Hoenig, Kaushik Roy, Yaa Takyiwaa Acquaah, Sun Yi, Salil S. Desai:
Explainable AI for Cyber-Physical Systems: Issues and Challenges. IEEE Access 12: 73113-73140 (2024) - [j30]John Jenkins, Kaushik Roy:
Exploring deep convolutional generative adversarial networks (DCGAN) in biometric systems: a survey study. Discov. Artif. Intell. 4(1): 42 (2024) - [c55]John Jenkins, Kaushik Roy:
Using DCGANs and HOG + Patch-Based CNN for Face Spoofing Mitigation. AIAI (4) 2024: 41-53 - [c54]Md Tasnim Alam, Yaa Takyiwaa Acquaah, Kaushik Roy:
Image-Based Human Action Recognition with Transfer Learning Using Grad-CAM for Visualization. AIAI (1) 2024: 117-130 - [c53]Yaa Takyiwaa Acquaah, Kaushik Roy:
Exploration of Ensemble Methods for Cyber Attack Detection in Cyber-Physical Systems. AIAI (1) 2024: 330-347 - 2023
- [j29]Olusola Tolulope Odeyomi, Bassey Ude, Kaushik Roy:
Online Decentralized Multi-Agents Meta-Learning With Byzantine Resiliency. IEEE Access 11: 68286-68300 (2023) - [j28]Zhipeng Liu, Junyi Hu, Yang Liu, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu:
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network. IEEE Access 11: 91116-91132 (2023) - [j27]Fikirte Ayalke Demmese, Ajaya Neupane, Sajad Khorsandroo, May Wang, Kaushik Roy, Yu Fu:
Machine learning based fileless malware traffic classification using image visualization. Cybersecur. 6(1): 32 (2023) - [j26]Niraj Thapa, Meenal Chaudhari, Kaushik Roy:
Presentation attack detection: an analysis of spoofing in the wild (SiW) dataset using deep learning models. Discov. Artif. Intell. 3(1) (2023) - [j25]Mansi Bhavsar, Kaushik Roy, John C. Kelly, Olusola Tolulope Odeyomi:
Anomaly-based intrusion detection system for IoT application. Discov. Internet Things 3(1): 5 (2023) - [j24]Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy:
Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP. Discov. Internet Things 3(1): 21 (2023) - [j23]Karen Schnell, Kaushik Roy, Madhuri Siddula:
A Descriptive Study of Webpage Designs for Posting Privacy Policies for Different-Sized US Hospitals to Create an Assessment Framework. Future Internet 15(3): 112 (2023) - [j22]Ning Guo, Letu Qingge, Yuanchen Huang, Kaushik Roy, Yanggui Li, Pei Yang:
Blind Image Quality Assessment via Multiperspective Consistency. Int. J. Intell. Syst. 2023: 1-14 (2023) - [c52]Daryle Smith, Sajad Khorsandroo, Kaushik Roy:
Supervised and Unsupervised Learning Techniques Utilizing Malware Datasets. ICAIC 2023: 1-7 - [c51]Jeffrey J. Hernandez V., Rodney Dejournett, Justin Bowser, Xiaohong Yuan, Kaushik Roy:
A Comparison of Deep Learning Models for Periocular Region-Based Authentication. IntelliSys (2) 2023: 461-476 - [c50]David Johnson, Xiaohong Yuan, Kaushik Roy:
Using Ensemble Convolutional Neural Network to Detect Deepfakes Using Periocular Data. IntelliSys (2) 2023: 546-563 - [c49]Bassey Ude, Olusola Tolulope Odeyomi, Kaushik Roy, Xiaohong Yuan:
A Survey on Bias Mitigation in Federated Learning. SSCI 2023: 1170-1175 - [i8]Xuan-Bac Nguyen, Chi Nhan Duong, Marios Savvides, Kaushik Roy, Khoa Luu:
Fairness in Visual Clustering: A Novel Transformer Clustering Approach. CoRR abs/2304.07408 (2023) - [i7]Melodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy:
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data. CoRR abs/2311.14195 (2023) - [i6]Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan, Kossi D. Edoh:
Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net. CoRR abs/2312.00040 (2023) - [i5]Justin Spencer, Deborah Lawrence, Prosenjit Chatterjee, Kaushik Roy, Albert C. Esterline, Jung-Hee Kim:
Presentation Attack Detection using Convolutional Neural Networks and Local Binary Patterns. CoRR abs/2312.00041 (2023) - [i4]Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy:
Continuous Authentication Using Mouse Clickstream Data Analysis. CoRR abs/2312.00802 (2023) - 2022
- [j21]Daryle Smith, Sajad Khorsandroo, Kaushik Roy:
Machine Learning Algorithms and Frameworks in Ransomware Detection. IEEE Access 10: 117597-117610 (2022) - [j20]Niraj Thapa, Meenal Chaudhari, Sean McManus, Kaushik Roy, Robert H. Newman, Hiroto Saigo, K. C. Dukka B.:
Correction: DeepSuccinylSite: a deep learning based approach for protein succinylation site prediction. BMC Bioinform. 23(1): 349 (2022) - [j19]Tony Gwyn, Kaushik Roy:
Examining Gender Bias of Convolutional Neural Networks via Facial Recognition. Future Internet 14(12): 375 (2022) - [j18]Ali Alwehaibi, Marwan Bikdash, Mohammad Albogmi, Kaushik Roy:
A study of the performance of embedding methods for Arabic short-text sentiment analysis using deep learning approaches. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part B): 6140-6149 (2022) - [j17]Ahmed Al Hamoud, Amber Hoenig, Kaushik Roy:
Sentence subjectivity analysis of a political and ideological debate dataset using LSTM and BiLSTM with attention and GRU models. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 7974-7987 (2022) - [j16]Kha Gia Quach, Ngan Le, Chi Nhan Duong, Ibsa Jalata, Kaushik Roy, Khoa Luu:
Non-volume preserving-based fusion to group-level emotion recognition on crowd videos. Pattern Recognit. 128: 108646 (2022) - [c48]Richard Farrell, Xiaohong Yuan, Kaushik Roy:
IoT to Structured Data (IoT2SD): A Big Data Information Extraction Framework. ICAIC 2022: 1-6 - [c47]Shaun Anthony Little, Kaushik Roy, Ahmed Al Hamoud:
Performance Benchmark of Machine Learning-Based Methodology for Swahili News Article Categorization. ICMLA 2022: 1517-1521 - [c46]David Johnson, Tony Gwyn, Letu Qingge, Kaushik Roy:
Deepfake Detection Using CNN Trained on Eye Region. IEA/AIE 2022: 443-451 - [c45]Jeffrey J. Hernandez V., Rodney Dejournett, Udayasri Nannuri, Tony Gwyn, Xiaohong Yuan, Kaushik Roy:
Face Authentication from Masked Face Images Using Deep Learning on Periocular Biometrics. IEA/AIE 2022: 452-459 - [c44]Mansi Bhavsar, Kaushik Roy, Zhipeng Liu, John C. Kelly, Balakrishna Gokaraju:
Intrusion-Based Attack Detection Using Machine Learning Techniques for Connected Autonomous Vehicle. IEA/AIE 2022: 505-515 - [c43]Yaa Takyiwaa Acquaah, Balakrishna Gokaraju, Raymond C. Tesiero, Kaushik Roy:
Machine Learning Techniques to Predict Real Time Thermal Comfort, Preference, Acceptability, and Sensation for Automation of HVAC Temperature. IEA/AIE 2022: 659-665 - [i3]Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy:
Interpretable Machine Learning for Detection and Classification of Ransomware Families Based on API Calls. CoRR abs/2210.11235 (2022) - [i2]Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy:
A Comparative Performance Analysis of Explainable Machine Learning Models With And Without RFECV Feature Selection Technique Towards Ransomware Classification. CoRR abs/2212.04864 (2022) - 2021
- [j15]Tony Gwyn, Kaushik Roy, Mustafa Atay:
Face Recognition Using Popular Deep Net Architectures: A Brief Comparative Study. Future Internet 13(7): 164 (2021) - [j14]Norah Alshareef, Xiaohong Yuan, Kaushik Roy, Mustafa Atay:
A Study of Gender Bias in Face Presentation Attack and Its Mitigation. Future Internet 13(9): 234 (2021) - [j13]Zhipeng Liu, Niraj Thapa, Addison Shaver, Kaushik Roy, Madhuri Siddula, Xiaohong Yuan, Anna Yu:
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1 - A New IoT Dataset. Sensors 21(14): 4834 (2021) - [c42]Sandeep Shah, Pramita Sree Muhuri, Xiaohong Yuan, Kaushik Roy, Prosenjit Chatterjee:
Implementing a network intrusion detection system using semi-supervised support vector machine and random forest. ACM Southeast Conference 2021: 180-184 - [c41]Mesafint Fanuel, Xiaohong Yuan, Hyung Nam Kim, Letu Qingge, Kaushik Roy:
A Survey on Skeleton-Based Activity Recognition using Graph Convolutional Networks (GCN). ISPA 2021: 177-182 - [c40]Leyu Gao, Sandeep Shah, Nasser Assery, Xiaohong Yuan, Xiuli Qu, Kaushik Roy:
Semi-Supervised Self Training to Assess the Credibility of Tweets. ISPA/BDCloud/SocialCom/SustainCom 2021: 1532-1537 - [c39]Nawaf Aljohani, Joseph Shelton, Kaushik Roy:
Authentication Based on Touch Patterns Using an Artificial Immune System. SSCI 2021: 1-8 - [c38]Mustafa Atay, Hailey Gipson, Tony Gwyn, Kaushik Roy:
Evaluation of Gender Bias in Facial Recognition with Traditional Machine Learning Algorithms. SSCI 2021: 1-7 - [c37]Karen Schnell, Kaushik Roy:
Website Privacy Notification for the Visually Impaired. SSCI 2021: 1-6 - 2020
- [j12]John Jenkins, Kaushik Roy, Joseph Shelton:
Using deep learning techniques and genetic-based feature extraction for presentation attack mitigation. Array 7: 100029 (2020) - [j11]Janelle C. Mason, Rushit Dave, Prosenjit Chatterjee, Ieschecia Graham-Allen, Albert C. Esterline, Kaushik Roy:
An Investigation of Biometric Authentication in the Healthcare Environment. Array 8: 100042 (2020) - [j10]Niraj Thapa, Meenal Chaudhari, Sean McManus, Kaushik Roy, Robert H. Newman, Hiroto Saigo, Dukka B. KC:
DeepSuccinylSite: a deep learning based approach for protein succinylation site prediction. BMC Bioinform. 21-S(3): 63 (2020) - [j9]Niraj Thapa, Zhipeng Liu, Dukka B. KC, Balakrishna Gokaraju, Kaushik Roy:
Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems. Future Internet 12(10): 167 (2020) - [j8]Pramita Sree Muhuri, Prosenjit Chatterjee, Xiaohong Yuan, Kaushik Roy, Albert C. Esterline:
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks. Inf. 11(5): 243 (2020) - [c36]Sonya J. Burroughs, Balakrishna Gokaraju, Kaushik Roy, Khoa Luu:
DeepFakes Detection in Videos using Feature Engineering Techniques in Deep Learning Convolution Neural Network Frameworks. AIPR 2020: 1-4 - [c35]Addison Shaver, Zhipeng Liu, Niraj Thapa, Kaushik Roy, Balakrishna Gokaraju, Xiaohong Yuan:
Anomaly Based Intrusion Detection for IoT with Machine Learning. AIPR 2020: 1-6 - [c34]Chi Nhan Duong, Thanh-Dat Truong, Khoa Luu, Kha Gia Quach, Hung Bui, Kaushik Roy:
Vec2Face: Unveil Human Faces From Their Blackbox Features in Face Recognition. CVPR 2020: 6131-6140 - [c33]Tony Gwyn, Mustafa Atay, Kaushik Roy, Albert C. Esterline:
Evaluation of Local Binary Pattern Algorithm for User Authentication with Face Biometric. ICMLA 2020: 1051-1058 - [c32]W. Shannon Brown, Kaushik Roy, Xiaohong Yuan:
US Traffic Sign Recognition Using CNNs. IntelliSys (3) 2020: 657-661 - [c31]Steve Chesney, Kaushik Roy, Sajad Khorsandroo:
Machine Learning Algorithms for Preventing IoT Cybersecurity Attacks. IntelliSys (3) 2020: 679-686 - [c30]Nasser Assery, Xiaohong Yuan, Xiuli Qu, Sultan Almalki, Kaushik Roy:
Identifying Panic Triggers from Disaster-Related Tweets. ISPA/BDCloud/SocialCom/SustainCom 2020: 827-836 - [c29]Daniel Xie, Prosenjit Chatterjee, Zhipeng Liu, Kaushik Roy, Kossi D. Edoh:
DeepFake Detection on Publicly Available Datasets using Modified AlexNet. SSCI 2020: 1866-1871 - [i1]Chi Nhan Duong, Thanh-Dat Truong, Kha Gia Quach, Hung Bui, Kaushik Roy, Khoa Luu:
Vec2Face: Unveil Human Faces from their Blackbox Features in Face Recognition. CoRR abs/2003.06958 (2020)
2010 – 2019
- 2019
- [j7]Dylan J. Gunn, Zhipeng Liu, Rushit Dave, Xiaohong Yuan, Kaushik Roy:
Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework. Int. J. Comput. Intell. Appl. 18(4): 1950022:1-1950022:16 (2019) - [j6]Christopher Kelley, Janelle C. Mason, Albert C. Esterline, Kaushik Roy:
An Empirical Evaluation of User Movement Data on Smartphones. Int. J. Comput. Intell. Appl. 18(4): 1950025:1-1950025:18 (2019) - [c28]Emmanuel Borkor Nuakoh, Kaushik Roy, Xiaohong Yuan, Albert C. Esterline:
Deep Learning Approach for U.S. Traffic Sign Recognition. ICDLT 2019: 47-50 - [c27]Nasser Assery, Xiaohong Yuan, Sultan Almalki, Kaushik Roy, Xiuli Qu:
Comparing Learning-Based Methods for Identifying Disaster-Related Tweets. ICMLA 2019: 1829-1836 - [c26]Janelle C. Mason, Prosenjit Chatterjee, Kaushik Roy, Albert C. Esterline:
A Framework to Identify People in Unstructured Environments Incorporating Biometrics. SpaCCS Workshops 2019: 65-75 - [c25]Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy:
Continuous Authentication Using Mouse Clickstream Data Analysis. SpaCCS Workshops 2019: 76-85 - [c24]Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan, Kossi D. Edoh:
Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net. SpaCCS Workshops 2019: 86-94 - [c23]Melodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy:
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data. SpaCCS 2019: 147-156 - 2018
- [c22]Daniel Hooks, Xiaohong Yuan, Kaushik Roy, Albert C. Esterline, Joaquin Hernandez:
Applying Artificial Immune System for Intrusion Detection. BigDataService 2018: 287-292 - [c21]Pablo Arias, Christopher Kelley, Janelle C. Mason, Kelvin Bryant, Kaushik Roy:
Classification of User Movement Data. ICDSP 2018: 156-160 - [c20]Ali Alwehaibi, Kaushik Roy:
Comparison of Pre-Trained Word Vectors for Arabic Text Classification Using Deep Learning Approach. ICMLA 2018: 1471-1474 - [c19]Janelle C. Mason, Christopher Kelley, Bisoye Olaleye, Albert C. Esterline, Kaushik Roy:
An Evaluation of User Movement Data. IEA/AIE 2018: 729-735 - [c18]Ahmed Al Hamoud, Ali Alwehaibi, Kaushik Roy, Marwan Bikdash:
Classifying Political Tweets Using Naïve Bayes and Support Vector Machines. IEA/AIE 2018: 736-744 - [c17]Prosenjit Chatterjee, Kaushik Roy:
Anti-spoofing Approach Using Deep Convolutional Neural Network. IEA/AIE 2018: 745-750 - [c16]Abel Hailemichael, Solomon Gebreyohannes, Ali Karimoddini, Kaushik Roy, Abdollah Homaifar:
Development of a Generic and Configurable Fuzzy Logic Systems Library for Real-Time Control Applications Using an Object-Oriented Approach. IRC 2018: 159-164 - [c15]Anthony Dobson, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu:
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection. ITNAC 2018: 1-6 - [c14]Dylan J. Gunn, Kaushik Roy, Kelvin Bryant:
Simulated Cloud Authentication Based on Touch Dynamics with SVM. SSCI 2018: 639-644 - 2017
- [j5]Nawaf Aljohani, Joseph Shelton, Kaushik Roy:
A secure one time password protocol schema. Int. J. Inf. Priv. Secur. Integr. 3(2): 75-95 (2017) - [j4]Joseph Shelton, John Jenkins, Kaushik Roy:
Extending disposable feature templates for mitigating replay attacks. Int. J. Inf. Priv. Secur. Integr. 3(2): 96-116 (2017) - [c13]Marguerite McDaniel, Emma Sloan, Siobahn C. Day, James Mayes, Albert C. Esterline, Kaushik Roy, William Nick:
Situation-based ontologies for a computational framework for identity focusing on crime scenes. CogSIMA 2017: 1-7 - [c12]Nawaf Aljohani, Joseph Shelton, Kaushik Roy:
Continuous Authentication on Smartphones Using An Artificial Immune System. MAICS 2017: 171-174 - 2016
- [j3]Kaushik Roy, Joseph Shelton, Albert C. Esterline:
A brief survey on multispectral iris recognition. Int. J. Appl. Pattern Recognit. 3(4): 308-323 (2016) - [c11]Joseph Shelton, John Jenkins, Kaushik Roy:
Palm Print Identification and Verification Using a Genetic-Based Feature Extraction Technique. ICIAR 2016: 63-68 - 2015
- [j2]Kaushik Roy, Joseph Shelton, Brian O'Connor, Mohamed S. Kamel:
Multibiometric system using fuzzy level set, and genetic and evolutionary feature extraction. IET Biom. 4(3): 151-161 (2015) - [c10]Pablo A. Arias, Joseph Shelton, Kaushik Roy, Foysal Ahmad, Gerry V. Dozier:
Micro Genetic and Evolutionary Feature Extraction: An Exploratory Data Analysis Approach for Multispectral Iris Recognition. ICIAR 2015: 178-185 - [c9]Nawaf Aljohani, Foysal Ahmad, Kaushik Roy, Joseph Shelton:
Mutibiometric System Based on Game Theory. ICIAR 2015: 194-199 - [c8]Pablo A. Arias, Joseph Shelton, Kaushik Roy, Gerry V. Dozier, Foysal Ahmad:
Multispectral Recognition Using Genetic and Evolutionary Feature Extraction. MAICS 2015: 19-24 - 2014
- [j1]Kaushik Roy, Brian O'Connor, Foysal Ahmad, Mohamed S. Kamel:
Multibiometric System Using Level Set, Modified LBP and Random Forest. Int. J. Image Graph. 14(3) (2014) - [c7]Foysal Ahmad, Kaushik Roy, Khary Popplewell:
Multispectral Iris Recognition Using Patch Based Game Theory. ICIAR (2) 2014: 112-119 - [c6]Joseph Shelton, Kaushik Roy, Foysal Ahmad, Brian O'Connor:
Iris recognition using Level Set and hGEFE. SMC 2014: 1392-1395 - [c5]Khary Popplewell, Kaushik Roy, Foysal Ahmad, Joseph Shelton:
Multispectral iris recognition utilizing hough transform and modified LBP. SMC 2014: 1396-1399 - 2012
- [c4]Kaushik Roy, Mohamed S. Kamel:
Facial Expression Recognition Using Game Theory. ANNPR 2012: 139-150 - [c3]Kaushik Roy, Mohamed S. Kamel:
Facial Expression Recognition Using Game Theory and Particle Swarm Optimization. ICCVG 2012: 581-589 - [c2]Kaushik Roy, Mohamed S. Kamel:
Multibiometric System Using Distance Regularized Level Set Method and Particle Swarm Optimization. ICCVG 2012: 590-599 - [c1]Kaushik Roy, Mohamed S. Kamel:
Multibiometric System Using Level Set Method and Particle Swarm Optimization. ICIAR (2) 2012: 20-29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint