default search action
Chu-Hsing Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c69]Chu-Hsing Lin, Yan-Xiang Chen, Yun-Yang Tsai, Hsin-Yu Chen:
Analysis of Tweet Sentiment and Propagation Graph of Twitter Users. ICKII 2023: 206-209 - [c68]Chu-Hsing Lin, Jhen-Yu Jian, Yu-Fei Wu, Yi-Jung Yang, Ying-Chi Chao:
Multimodal Framework for Fake Messages Detection with Textual and Facial Data. ICKII 2023: 487-491 - 2021
- [i3]Rong-Ching Chang, Chun-Ming Lai, Kai-Lai Chang, Chu-Hsing Lin:
Dataset of Propaganda Techniques of the State-Sponsored Information Operation of the People's Republic of China. CoRR abs/2106.07544 (2021) - [i2]Rong-Ching Chang, Chu-Hsing Lin:
Detecting Propaganda on the Sentence Level during the COVID-19 Pandemic. CoRR abs/2108.12269 (2021) - 2020
- [c67]Chu-Hsing Lin, Jung-Chun Liu, Po-Kai Yang:
Performance Enhancement of GPU Parallel Computing Using Memory Allocation Optimization. IMCOM 2020: 1-5 - [c66]Chu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin:
Detecting Security Breaches in Personal Data Protection with Machine Learning. IMCOM 2020: 1-7 - [c65]Chun-Ming Lai, Yi-Chen Liu, Rong-Ching Chang, Jon William Chapman, Chu-Hsing Lin:
Pandemic Response and Crisis Informatics: An Imperative for Public Health Messaging. ICS 2020: 570-575
2010 – 2019
- 2019
- [j33]Chu-Hsing Lin, Jung-Chun Liu, Joy Iong-Zong Chen, Tien-Pin Chu:
On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing. Wirel. Pers. Commun. 109(1): 491-504 (2019) - [c64]Chu-Hsing Lin, Hsuan Chi:
A Novel Movie Recommendation System Based on Collaborative Filtering and Neural Networks. AINA 2019: 895-903 - [c63]Chu-Hsing Lin, Hsiao-Wen Lu:
Response to Co-resident Threats in Cloud Computing Using Machine Learning. AINA 2019: 904-913 - 2015
- [j32]Cheng-Chieh Li, Jung-Chun Liu, Chu-Hsing Lin, Winston Lo:
On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations. Int. J. Softw. Innov. 3(4): 1-17 (2015) - [c62]Cheng-Chieh Li, Jung-Chun Liu, Chu-Hsing Lin, Winston Lo:
On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations. SNPD (revised selected papers) 2015: 1-16 - [c61]Chu-Hsing Lin, Jung-Chun Liu, Hsin-Jen Yao, William Cheng-Chung Chu, Chao-Tung Yang:
Performance Evaluation of Parallel Genetic Algorithm Using Single Program Multiple Data Technique. TSA 2015: 135-140 - 2014
- [j31]Fuu-Cheng Jiang, Chu-Hsing Lin, Hsiang-Wei Wu:
Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Ad Hoc Networks 21: 84-96 (2014) - [j30]Joy Iong-Zong Chen, Chu-Hsing Lin:
Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN. Peer-to-Peer Netw. Appl. 7(4): 710-722 (2014) - [j29]Joy Iong-Zong Chen, Chu-Hsing Lin:
Throughput Evaluation of a Novel Scheme to Mitigate the Congestion over WSNs. Wirel. Pers. Commun. 75(4): 1863-1877 (2014) - [c60]Chu-Hsing Lin, Jung-Chun Liu, Cheng-Chieh Li, Po-Wei Chu:
Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation. AsiaJCIS 2014: 71-75 - [c59]Wen-Chen Wu, Chu-Hsing Lin, Jung-Chun Liu, Ssu-Ying Lin:
Designing QR Code with Authentication Capabilities. ICS 2014: 801-810 - 2013
- [j28]Joy Iong-Zong Chen, Lu-Tsou Yeh, Chu-Hsing Lin:
Performance evaluation of outage probability and BER for MIMO-femtocell system over spatial correlated channel. Comput. Electr. Eng. 39(6): 1837-1845 (2013) - [j27]Fang-Yie Leu, Chu-Hsing Lin, Aniello Castiglione:
Special issue on cloud, wireless and e-commerce security. J. Ambient Intell. Humaniz. Comput. 4(2): 207-208 (2013) - [j26]Chu-Hsing Lin, Hung-Yan Lin, Tang-Wei Wu, Ying-Hsuan Chen, Chien-Hua Huang:
Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues. J. Ambient Intell. Humaniz. Comput. 4(2): 275-282 (2013) - [j25]Chu-Hsing Lin, Chen-Yu Lee, Krishna M. Kavi, Deng-Jyi Chen, Yi-Shiung Yeh:
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms. J. Inf. Sci. Eng. 29(5): 889-905 (2013) - 2012
- [j24]Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang, Chu-Hsing Lin, Kuo-Hsiung Wang:
Design strategy for optimizing power consumption of sensor node with Min(N, T) policy M/G/1 queuing models. Int. J. Commun. Syst. 25(5): 652-671 (2012) - [j23]Fuu-Cheng Jiang, Chu-Hsing Lin, Der-Chen Huang, Chao-Tung Yang:
Dual paths node-disjoint routing for data salvation in mobile ad hoc. J. Supercomput. 59(1): 268-296 (2012) - [c58]Chu-Hsing Lin, Hung-Yan Lin, Wei-Bin Lee:
Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks. BWCCA 2012: 468-471 - [c57]Chu-Hsing Lin, Jung-Chun Liu, Wen-Chen Wu, Tsau-Wei You, Ming-Hung Liu:
Mobile Computer System with User Friendly Environment and Security Protection. IMIS 2012: 623-627 - 2011
- [j22]Chu-Hsing Lin, Chen-Yu Lee, Deng-Jyi Chen:
Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET. Comput. Informatics 30(6): 1167-1180 (2011) - [j21]Lein Harn, Chu-Hsing Lin:
Contract signature in e-commerce. Comput. Electr. Eng. 37(2): 169-173 (2011) - [c56]Chu-Hsing Lin, Guan-Han Chen, Shih-Pei Chien:
Energy Consumption Analysis for Cryptographic Algorithms with Different Clocks on Smart Cards in Mobile Devices. BWCCA 2011: 369-373 - [c55]Yi-Li Huang, Chu-Hsing Lin, Fang-Yie Leu:
Verification of a Batch of Bad Signatures by Using the Matrix-Detection Algorithm. CCP 2011: 299-306 - [c54]Chu-Hsing Lin, Jeng-Heng Chen, Shang-Sheng Yang, Yi-Zhu Cao:
Design and implementation of a mouth-controlled mouse. EUROCON 2011: 1-4 - [c53]Chu-Hsing Lin, Yi-Shiung Yeh, Shih-Pei Chien, Chen-Yu Lee, Hung-Sheng Chien:
Generalized secure hash algorithm: SHA-X. EUROCON 2011: 1-4 - [c52]Chu-Hsing Lin, Jung-Chun Liu, Chien-Hsing Lee, Tang-Wei Wu:
An Indoor Location-Aware System Based on Rotation Sampling in Positioning. FGIT-FGCN (1) 2011: 77-81 - [c51]Chu-Hsing Lin, Jung-Chun Liu, Sheng-Hsing Tsai, Hung-Yan Lin:
Research on the ZigBee-Based Indoor Location Estimation Technology. FGIT-FGCN (1) 2011: 82-86 - [c50]Chu-Hsing Lin, Chen-Yu Lee, Tzu-Chien Yang, Shin-Pin Lai:
Visible Watermarking Based on Multi-parameters Adjustable Gamma Correction. FGIT-FGCN (1) 2011: 87-92 - [c49]Chu-Hsing Lin, Chen-Yu Lee, Shu-Yuan Lu, Shih-Pei Chien:
Unseen Visible Watermarking for Gray Level Images Based on Gamma Correction. FGIT-FGCN (1) 2011: 236-243 - [c48]Chu-Hsing Lin, Jung-Chun Liu, Guan-Han Chen, Ying-Hsuan Chen, Chien-Hua Huang:
Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS Attacks. IMIS 2011: 537-542 - [c47]Chao-Tung Yang, Chu-Hsing Lin, Guey-Luen Chang:
Implementation of Image Watermarking Processes on Cloud Computing Environments. SUComS 2011: 131-140 - 2010
- [j20]Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao:
Energy analysis of multimedia video decoding on mobile handheld devices. Comput. Stand. Interfaces 32(1-2): 10-17 (2010) - [c46]Chu-Hsing Lin, Jung-Chun Liu, Wei-Cheng Hsu, Hsing-Weng Wang, Wei-Chih Lin, Jian-Wei Li:
Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks. ACN 2010: 134-143 - [c45]Lein Harn, Chu-Hsing Lin, Che-Wei Hu:
Contract Signatures in E-Commerce Applications. BWCCA 2010: 384-388 - [c44]Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin:
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques. BWCCA 2010: 469-474 - [c43]Chu-Hsing Lin, Chen-Yu Lee:
Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET. CISIS 2010: 818-821
2000 – 2009
- 2009
- [c42]Chu-Hsing Lin, Jung-Chun Liu, Ching-Ru Chen:
Access Log Generator for Analyzing Malicious Website Browsing Behaviors. IAS 2009: 126-129 - [c41]Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Chi Lo:
Analysis of Priority Queue-Based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks. FGIT-FGCN 2009: 301-307 - [c40]Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu:
Counteract SYN flooding using second chance packet filtering. ICUIMC 2009: 216-220 - [c39]Chu-Hsing Lin, Jung-Chun Liu, Lun-Yuen Cheng, Jung-Jung Chung:
Binary Documents Recovery Based on Skeleton Extraction. MUE 2009: 164-167 - [c38]Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng, Tsung-Che Yang, Mei-Chun Chou:
Energy Analysis of Multimedia Video Streaming on Mobile Devices. ISA 2009: 347-357 - [c37]Chu-Hsing Lin, Chen-Yu Lee, Jung-Chun Liu, Hao-Tian Zuo:
Investigations of Factors Affecting the Genetic Algorithm for Shortest Driving Time. SoCPaR 2009: 106-111 - 2008
- [j19]Chu-Hsing Lin, Yu-Ying Lin, Frode Eika Sandnes:
Integrity Protection of Binary Text Document Images Based on Image Topologies. Int. J. Pattern Recognit. Artif. Intell. 22(8): 1599-1620 (2008) - [c36]Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou:
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks. AINA Workshops 2008: 1272-1277 - [c35]Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang:
Safeguard Intranet Using Embedded and Distributed Firewall System. FGCN (1) 2008: 489-492 - [c34]Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng:
Energy Analysis of Multimedia Video Decoding on Embedded Systems. ICOIN 2008: 1-5 - [c33]Chu-Hsing Lin, Chih-Hsiong Shih, Jung-Chun Liu, Mao-Hua Cheng, Yan-Wei Lee:
Energy efficiency measurement for multimedia audio decoding on embedded systems. ICUIMC 2008: 404-408 - [c32]Chu-Hsing Lin, Jung-Chun Liu, Fuu-Cheng Jiang, Chien-Ting Kuo:
An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks. IIH-MSP 2008: 1371-1374 - [c31]Chu-Hsing Lin, Jung-Chun Liu, Chih-Chieh Lien:
Detection Method Based on Reverse Proxy against Web Flooding Attacks. ISDA (3) 2008: 281-284 - [c30]Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou:
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. MUE 2008: 102-107 - [c29]Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee:
A Robust Watermark Scheme for Copyright Protection. MUE 2008: 132-137 - [c28]Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang:
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. MUE 2008: 176-181 - [c27]Chu-Hsing Lin, Jui-Ling Yu, Jung-Chun Liu, Chia-Jen Lee:
Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems. MUE 2008: 402-406 - [c26]Chu-Hsing Lin, Fuu-Cheng Jiang, Jen-Chieh Chang, Frode Eika Sandnes:
Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks. PDCAT 2008: 342-349 - [c25]Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han:
On the Security of the Full-Band Image Watermark for Copyright Protection. SUTC 2008: 74-80 - 2007
- [c24]Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Chieh Chang:
Robust Multi-scale Full-Band Image Watermarking for Copyright Protection. IEA/AIE 2007: 176-184 - [c23]Chu-Hsing Lin, Wen-Kui Chang, Yu-Ying Lin, Lun-Yuen Cheng:
Binary Document Images Authentication by Thinning Digital Patterns. IIH-MSP 2007: 485-488 - [c22]Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao:
Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices. MUE 2007: 120-125 - [c21]Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen:
A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967 - 2006
- [c20]Chu-Hsing Lin, Hsiu-Hsia Lin, Jen-Chieh Chang:
Multiparty Key Agreement for Secure Teleconferencing. SMC 2006: 3702-3707 - [c19]Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin:
An improvement of an efficient user identification scheme based on ID-based cryptosystem. SUTC (1) 2006: 558-561 - [c18]Chin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang:
A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. UIC 2006: 816-825 - 2005
- [j18]Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn:
Improved DSA variant for batch verification. Appl. Math. Comput. 169(1): 75-81 (2005) - [c17]Chu-Hsing Lin, Wei Lee:
Efficient Secret Sharing with Access Structures in a Hierarchy. AINA 2005: 123-126 - [c16]Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen:
Dynamic Key Generations for Secret Sharing in Access Structures. AINA 2005: 127-130 - [c15]Chu-Hsing Lin, Hsiu-Hsia Lin:
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. AINA 2005: 135-138 - [c14]Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang:
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. AINA 2005: 249-252 - [c13]Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen:
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. AINA 2005: 261-264 - [c12]Chu-Hsing Lin, Wei Lee, Yi-Kang Ho:
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. AINA 2005: 399-402 - [c11]Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin, Yi-Yi Lai:
On the security of ID-based password authentication scheme using smart cards and fingerprints. ITRE 2005: 230-232 - [i1]Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu:
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol. IACR Cryptol. ePrint Arch. 2005: 457 (2005) - 2004
- [j17]Chu-Hsing Lin, Chia-Yin Lee, Wei Lee:
Comments on the Yang-Chang-Hwang anonymous conference key distribution system. Comput. Stand. Interfaces 26(3): 171-174 (2004) - [j16]Chu-Hsing Lin, Yi-Yi Lai:
A flexible biometrics remote user authentication scheme. Comput. Stand. Interfaces 27(1): 19-23 (2004) - [c10]Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang:
Secret Sharing with Access Structures in a Hierarchy. AINA (2) 2004: 31-34 - [c9]Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang:
Supervising Secret-Key Agreements in a Level-Based Hierarchy. AINA (1) 2004: 309-314 - [c8]Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin:
Using IC Cards to Remotely Login Passwords without Verification Tables. AINA (1) 2004: 321-326 - [c7]Chu-Hsing Lin, Yi-Yi Lai:
A fingerprint-based user authentication scheme for multimedia systems. ICME 2004: 935-938 - [c6]Jue-Sam Chou, Chu-Hsing Lin, Ting-Ying Lee:
A Novel Hierarchical Key Management Scheme Based on Quadratic Residues. ISPA 2004: 858-865 - 2003
- [c5]Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang:
Signature Schemes Based on Two Hard Problems Simultaneously. AINA 2003: 557-560 - [c4]Chin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin:
Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. AINA 2003: 807-811 - [c3]Yi-Fung Huang, Kun-Li Wen, Ruei-Hau Hsu, Chu-Hsing Lin:
Infinite generating keys based on publish system. SMC 2003: 3238-3243 - 2002
- [j15]Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin:
A New Micro-Payment System Using General Payword Chain. Electron. Commer. Res. 2(1-2): 159-168 (2002) - [c2]Chu-Hsing Lin, Chen-Yu Lee:
A Software Protection System for Internet Commerce. IEEE Pacific Rim Conference on Multimedia 2002: 1033-1040 - 2001
- [j14]Chu-Hsing Lin:
Hierarchical key assignment without public-key cryptography. Comput. Secur. 20(7): 612-619 (2001) - 2000
- [j13]Yi-Shiung Yeh, Chu-Hsing Lin, Chan-Chi Wang:
Dynamic GOST. J. Inf. Sci. Eng. 16(6): 857-861 (2000)
1990 – 1999
- 1999
- [j12]Tsu-Miin Hsieh, Yi-Shiung Yeh, Chu-Hsing Lin, Ssu-Heng Tuan:
One-Way Hash Functions With Changeable Parameters. Inf. Sci. 118(1-4): 223-239 (1999) - 1998
- [j11]Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang:
Threshold signature schemes with traceable signers in group communications. Comput. Commun. 21(8): 771-776 (1998) - [j10]Chu-Hsing Lin, Tien-Chi Lee:
A confused document encrypting scheme and its implementation. Comput. Secur. 17(6): 543-551 (1998) - 1997
- [j9]Chu-Hsing Lin:
Dynamic key management schemes for access control in a hierarchy. Comput. Commun. 20(15): 1381-1385 (1997) - 1996
- [c1]Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang:
A group-oriented (t, n) undeniable signature scheme without trusted center. ACISP 1996: 266-274 - 1995
- [j8]Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee:
New Public-Key Cipher System Based Upon the Diophantine Equations. IEEE Trans. Computers 44(1): 13-19 (1995) - 1994
- [j7]Chu-Hsing Lin, Chin-Chen Chang:
Method for constructing a group-oriented cipher system. Comput. Commun. 17(11): 805-808 (1994) - 1992
- [j6]Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee:
A Record-Oriented Cryptosystem for Database Sharing (Short Note). Comput. J. 35(6): 658-660 (1992) - [j5]Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee:
A conference key broadcasting system using sealed locks. Inf. Syst. 17(4): 323-328 (1992) - [j4]Chin-Chen Chang, Chu-Hsing Lin, Richard C. T. Lee:
Hierarchy representations based on arithmetic coding for dynamic information protection systems. Inf. Sci. 64(1-2): 35-48 (1992) - 1991
- [j3]Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee:
Password authentication using Newton's interpolating polynomials. Inf. Syst. 16(1): 97-102 (1991) - 1990
- [j2]Chin-Chen Chang, Chu-Hsing Lin:
A Reciprocal Confluence Tree Unit and Its Applications. BIT 30(1): 27-33 (1990) - [j1]Chu-Hsing Lin, Richard C. T. Lee, Chin-Chen Chang:
A Dynamic Access Control Mechanism in Information Protection Systems. J. Inf. Sci. Eng. 6(1): 25-35 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-31 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint