default search action
Zhuo Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Zhuo Ma, Yilong Yang, Yang Liu, Xinjing Liu, Jianfeng Ma:
Mitigate noisy data for smart IoT via GAN based machine unlearning. Sci. China Inf. Sci. 67(3) (2024) - [j50]Teng Li, Weiguo Lin, Ruichen Ma, Zhuo Ma, Yulong Shen, Jianfeng Ma:
CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci. China Inf. Sci. 67(5) (2024) - [j49]Jinhai Zhang, Junwei Zhang, Zhuo Ma, Yang Liu, Xindi Ma, Jianfeng Ma:
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay. J. Syst. Archit. 150: 103111 (2024) - [j48]Shuai Xu, Xiaoming Fu, Dechang Pi, Zhuo Ma:
Inferring Individual Human Mobility From Sparse Check-in Data: A Temporal-Context-Aware Approach. IEEE Trans. Comput. Soc. Syst. 11(1): 600-611 (2024) - [j47]Yang Wei, Zhuo Ma, Zhuoran Ma, Zhan Qin, Yang Liu, Bin Xiao, Xiuli Bi, Jianfeng Ma:
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack. IEEE Trans. Dependable Secur. Comput. 21(4): 4206-4219 (2024) - [j46]Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j45]Ruidong Han, Siqi Ma, Juanru Li, Surya Nepal, David Lo, Zhuo Ma, Jianfeng Ma:
Range Specification Bug Detection in Flight Control System Through Fuzzing. IEEE Trans. Software Eng. 50(3): 461-473 (2024) - [c33]Zhuo Ma, Yilong Yang, Yang Liu, Tong Yang, Xinjing Liu, Teng Li, Zhan Qin:
Need for Speed: Taming Backdoor Attacks with Speed and Precision. SP 2024: 1217-1235 - [i8]Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, Kui Ren:
Efficient 2PC for Constant Round Secure Equality Testing and Comparison. IACR Cryptol. ePrint Arch. 2024: 949 (2024) - 2023
- [j44]Zhuo Ma, Jiawei Zhang:
Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems. IEEE Access 11: 45206-45221 (2023) - [j43]Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma:
Are our clone detectors good enough? An empirical study of code effects by obfuscation. Cybersecur. 6(1): 14 (2023) - [j42]Yue Wang, Yaxin Song, Zhuo Ma, Xiaoxue Han:
Multidisciplinary considerations of fairness in medical AI: A scoping review. Int. J. Medical Informatics 178: 105175 (2023) - [j41]Junwei Zhang, Yuqing Wang, Zhuo Ma, Xiaohan Yang, Zuobin Ying, Jianfeng Ma:
A Location-Aware Verifiable Outsourcing Data Aggregation in Multiblockchains. IEEE Internet Things J. 10(6, March 15): 4783-4798 (2023) - [j40]Yuanpeng Li, Feiyu Wang, Xiang Yu, Yilong Yang, Kaicheng Yang, Tong Yang, Zhuo Ma, Bin Cui, Steve Uhlig:
LadderFilter: Filtering Infrequent Items with Small Memory and Time Overhead. Proc. ACM Manag. Data 1(1): 10:1-10:21 (2023) - [j39]Zhuo Ma, Yilong Yang, Bin Xiao, Yang Liu, Xinjing Liu, Zhuoran Ma, Tong Yang:
Sniffer: A Novel Model Type Detection System against Machine-Learning-as-a-Service Platforms. Proc. VLDB Endow. 16(12): 3942-3945 (2023) - [j38]Zhuo Ma, Haofeng Zhang, Siyang Zuo, Jianbin Liu:
Design and Verification of Lockable Upper-Limb Exoskeleton Based on Jamming and Engagement Mechanisms. IEEE Robotics Autom. Lett. 8(3): 1359-1366 (2023) - [j37]Junwei Zhang, Xin Kang, Yang Liu, Huawei Ma, Teng Li, Zhuo Ma, Sergey Gataullin:
A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem. Symmetry 15(2): 319 (2023) - [j36]Zhuzhu Wang, Cui Hu, Bin Xiao, Yang Liu, Teng Li, Zhuo Ma, Jianfeng Ma:
Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database. IEEE Trans. Big Data 9(5): 1408-1419 (2023) - [j35]Zhuo Ma, Shuai Xu, Bo Liu, Jiuxin Cao:
LPP2KL: Online Location Privacy Protection Against Knowing-and-Learning Attacks for LBSs. IEEE Trans. Comput. Soc. Syst. 10(1): 234-245 (2023) - [j34]Zhuo Ma, Yang Liu, Ximeng Liu, Jian Liu, Jianfeng Ma, Kui Ren:
Learn to Forget: Machine Unlearning via Neuron Masking. IEEE Trans. Dependable Secur. Comput. 20(4): 3194-3207 (2023) - [j33]Zhuo Ma, Xinjing Liu, Yang Liu, Ximeng Liu, Zhan Qin, Kui Ren:
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer. IEEE Trans. Dependable Secur. Comput. 20(6): 4810-4822 (2023) - [j32]Yang Liu, Bingsheng Zhang, Yuxiang Ma, Zhuo Ma, Zecheng Wu:
iPrivJoin: An ID-Private Data Join Framework for Privacy-Preserving Machine Learning. IEEE Trans. Inf. Forensics Secur. 18: 4300-4312 (2023) - [j31]Yilong Yang, Zhuo Ma, Bin Xiao, Yang Liu, Teng Li, Junwei Zhang:
Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation. IEEE Trans. Knowl. Data Eng. 35(12): 12958-12971 (2023) - [c32]You Peng, Zhuo Ma, Wenjie Zhang, Xuemin Lin, Ying Zhang, Xiaoshuang Chen:
Efficiently Answering Quality Constrained Shortest Distance Queries in Large Graphs. ICDE 2023: 856-868 - [c31]Yang Wei, Bin Xiao, Xiuli Bi, Zhuoran Ma, Yang Liu, Zhuo Ma:
Secondary Labeling: A Novel Labeling Strategy for Image Manipulation Detection. ACM Multimedia 2023: 8225-8232 - [c30]Teng Li, Shengkai Zhang, Zexu Dang, Yongcai Xiao, Zhuo Ma:
TripleLP: Privacy-Preserving Log Parsing Based on Blockchain. PAAP 2023: 1-6 - 2022
- [j30]Jianbin Liu, Zhuo Ma, Yingxue Wang, Siyang Zuo:
Reconfigurable Self-Sensing Pneumatic Artificial Muscle With Locking Ability Based on Modular Multi-Chamber Soft Actuator. IEEE Robotics Autom. Lett. 7(4): 8635-8642 (2022) - [j29]Yang Liu, Zhuo Ma, Yilong Yang, Ximeng Liu, Jianfeng Ma, Kui Ren:
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(6): 3671-3685 (2022) - [j28]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Kui Ren:
Privacy-Preserving Object Detection for Medical Images With Faster R-CNN. IEEE Trans. Inf. Forensics Secur. 17: 69-84 (2022) - [j27]Zuobin Ying, Shuanglong Cao, Ximeng Liu, Zhuo Ma, Jianfeng Ma, Robert H. Deng:
PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 23(9): 16290-16303 (2022) - [j26]Yuanpeng Li, Xiang Yu, Yilong Yang, Yang Zhou, Tong Yang, Zhuo Ma, Shigang Chen:
Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement. IEEE/ACM Trans. Netw. 30(2): 586-600 (2022) - [c29]Yinbin Miao, Rongpeng Xie, Xinghua Li, Ximeng Liu, Zhuo Ma, Robert H. Deng:
Compressed Federated Learning Based on Adaptive Local Differential Privacy. ACSAC 2022: 159-170 - [c28]Shuai Xu, Donghai Guan, Zhuo Ma, Qing Meng:
A Temporal-Context-Aware Approach for Individual Human Mobility Inference Based on Sparse Trajectory Data. APWeb/WAIM (1) 2022: 106-120 - [c27]Xinjing Liu, Zhuo Ma, Yang Liu, Zhan Qin, Junwei Zhang, Zhuzhu Wang:
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection. ESORICS (1) 2022: 610-630 - [c26]Yingxue Wang, Jingshuo Gao, Zhuo Ma, Yuehua Li, Siyang Zuo, Jianbin Liu:
Design and Verification of an Active Lower Limb Exoskeleton for Micro-low Gravity Simulation Training. ICIRA (1) 2022: 114-123 - [c25]Yang Liu, Mingyuan Fan, Cen Chen, Ximeng Liu, Zhuo Ma, Li Wang, Jianfeng Ma:
Backdoor Defense with Machine Unlearning. INFOCOM 2022: 280-289 - [c24]Lin Cui, Xin Chen, Zhuo Ma:
Dynamic Resource Scheduling and Frequency Scaling in NOMA-Based Multi-access Edge Computing System. SmartIoT 2022: 200-207 - [c23]Shougang Du, Xin Chen, Libo Jiao, Yijie Wang, Zhuo Ma:
Deep Reinforcement Learning-based UAV-assisted Mobile Edge Computing Offloading and Resource Allocation Decision. SMC 2022: 2728-2734 - [i7]Yang Liu, Mingyuan Fan, Cen Chen, Ximeng Liu, Zhuo Ma, Li Wang, Jianfeng Ma:
Backdoor Defense with Machine Unlearning. CoRR abs/2201.09538 (2022) - [i6]You Peng, Zhuo Ma, Wenjie Zhang, Xuemin Lin, Ying Zhang, Xiaoshuang Chen:
Efficiently Answering Quality Constrained Shortest Distance Queries in Large Graphs. CoRR abs/2211.08648 (2022) - 2021
- [j25]Xinghua Li, Mengyao Zhu, Laurence T. Yang, Mengfan Xu, Zhuo Ma, Cheng Zhong, Hui Li, Yang Xiang:
Sustainable Ensemble Learning Driving Intrusion Detection Model. IEEE Trans. Dependable Secur. Comput. 18(4): 1591-1604 (2021) - [j24]Junwei Zhang, Fan Yang, Zhuo Ma, Zhuzhu Wang, Ximeng Liu, Jianfeng Ma:
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 22(4): 2299-2313 (2021) - [c22]Zhuo Ma, Baojun Chen, Jianbin Liu, Siyang Zuo:
A Performance Evaluating Platform for Variable Stiffness Exoskeleton Joint. ICIRA (1) 2021: 709-716 - [c21]Wanxin Ren, Zhuo Ma, Siyang Zuo, Jianbin Liu:
Novel pneumatic artificial muscle based on film thermoforming and wire weaving. M2VIP 2021: 656-660 - [c20]Teng Ma, Xin Chen, Zhuo Ma, Libo Jiao:
Deep Reinforcement Learning Based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles. WASA (3) 2021: 244-253 - 2020
- [j23]Jiuxin Cao, Zhuo Ma, Jue Xie, Xiangying Zhu, Fang Dong, Bo Liu:
Towards tenant demand-aware bandwidth allocation strategy in cloud datacenter. Future Gener. Comput. Syst. 105: 904-915 (2020) - [j22]Bin Xiao, Yunqiu Xu, Xiuli Bi, Weisheng Li, Zhuo Ma, Junhui Zhang, Xu Ma:
Follow the Sound of Children's Heart: A Deep-Learning-Based Computer-Aided Pediatric CHDs Diagnosis System. IEEE Internet Things J. 7(3): 1994-2004 (2020) - [j21]Zhuzhu Wang, Yang Liu, Zhuo Ma, Ximeng Liu, Jianfeng Ma:
LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid. IEEE Internet Things J. 7(5): 3935-3947 (2020) - [j20]Yang Liu, Zhuo Ma, Zheng Yan, Zhuzhu Wang, Ximeng Liu, Jianfeng Ma:
Privacy-preserving federated k-means for proactive caching in next generation cellular networks. Inf. Sci. 521: 14-31 (2020) - [j19]Zhuo Ma, Yang Liu, Zhuzhu Wang, Haoran Ge, Meng Zhao:
A machine learning-based scheme for the security analysis of authentication and key agreement protocols. Neural Comput. Appl. 32(22): 16819-16831 (2020) - [j18]Guoqiang Zhong, Zhuo Ma, Junbo Wang, Chuantao Zheng, Yu Zhang, Yiding Wang, Frank K. Tittel:
Near-Infrared Tunable Laser Absorption Spectroscopic Acetylene Sensor System Using a Novel Three Mirror-Based, Dense Pattern Gas Cell. Sensors 20(5): 1266 (2020) - [j17]Zhuozheng Wang, Yingjie Dong, Wei Liu, Zhuo Ma:
A Novel Fault Diagnosis Approach for Chillers Based on 1-D Convolutional Neural Network and Gated Recurrent Unit. Sensors 20(9): 2458 (2020) - [j16]Zhuo Ma, Yilong Yang, Ximeng Liu, Yang Liu, Siqi Ma, Kui Ren, Chang Yao:
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid. IEEE Trans. Ind. Informatics 16(10): 6597-6606 (2020) - [j15]Zhuo Ma, Junwei Zhang, Yongzhen Guo, Yang Liu, Ximeng Liu, Wei He:
An Efficient Decentralized Key Management Mechanism for VANET With Blockchain. IEEE Trans. Veh. Technol. 69(6): 5836-5849 (2020) - [c19]Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma, Zhuo Ma, Danni Yuan:
Medical Privacy-preserving Service Recommendation. ICC 2020: 1-6 - [c18]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren:
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing. ICDCS 2020: 1-11 - [c17]Yang Liu, Yilong Yang, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma:
PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication. IWQoS 2020: 1-10 - [c16]Zhuo Ma, Xin Chen, Teng Ma, Ying Chen:
Deep Deterministic Policy Gradient Based Resource Allocation in Internet of Vehicles. PAAP 2020: 295-306 - [c15]Teng Ma, Xin Chen, Zhuo Ma, Ying Chen:
Deep Reinforcement Learning for Pre-caching and Task Allocation in Internet of Vehicles. SmartIoT 2020: 79-85 - [c14]Yang Song, Zhuzhu Wang, Junwei Zhang, Zhuo Ma, Jianfeng Ma:
A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS. SPDE 2020: 249-262 - [i5]Zhuo Ma, Haoran Ge, Zhuzhu Wang, Yang Liu, Ximeng Liu:
Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning. CoRR abs/2002.03594 (2020) - [i4]Yang Liu, Zhuo Ma, Ximeng Liu, Jianfeng Ma:
Learn to Forget: User-Level Memorization Elimination in Federated Learning. CoRR abs/2003.10933 (2020)
2010 – 2019
- 2019
- [j14]Zhuo Ma, Haoran Ge, Yang Liu, Meng Zhao, Jianfeng Ma:
A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms. IEEE Access 7: 21235-21245 (2019) - [j13]Yongzhen Guo, Zhuo Ma, Meng Zhao:
Polynomial Based Progressive Secret Image Sharing Scheme With Smaller Shadow Size. IEEE Access 7: 73782-73789 (2019) - [j12]Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Kui Ren:
Lightweight Privacy-Preserving Ensemble Classification for Face Recognition. IEEE Internet Things J. 6(3): 5778-5790 (2019) - [j11]Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Feifei Li:
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices. IEEE Internet Things J. 6(5): 8406-8420 (2019) - [j10]Baihe Ma, Zhihong Liu, Yong Zeng, Zhuo Ma, Hui Zhang, Jianfeng Ma:
Cooperative Jamming for Secrecy of Wireless Communications. J. Inf. Sci. Eng. 35(5): 1029-1044 (2019) - [j9]Zhuo Ma, Tian Zhang, Ximeng Liu, Xinghua Li, Kui Ren:
Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory. IEEE Trans. Veh. Technol. 68(8): 8091-8102 (2019) - [j8]Yanjiao Chen, Zhuo Ma, Qian Wang, Jing Huang, Xin Tian, Qian Zhang:
Privacy-Preserving Spectrum Auction Design: Challenges, Solutions, and Research Directions. IEEE Wirel. Commun. 26(5): 142-150 (2019) - [j7]Jiuxin Cao, Rongqing Xia, Yifang Guo, Zhuo Ma:
Collusion-aware detection of review spammers in location based social networks. World Wide Web 22(6): 2921-2951 (2019) - [c13]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c12]Jiayin Li, Wenzhong Guo, Zhuo Ma, Xianjia Meng, Yang Yang, Ximeng Liu:
Privacy-Preserving Compressive Sensing for Traffic Estimation. GLOBECOM 2019: 1-6 - [c11]Zhuo Ma, Meng Zhao, Ximeng Liu, Chong Shen, Jianfeng Ma:
Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent. GLOBECOM 2019: 1-6 - [c10]Xuewen Dong, Qiao Kang, Yang Xu, Zhuo Ma, Teng Li:
Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation. INFOCOM Workshops 2019: 1047-1048 - [c9]Jiawei Zhang, Jianfeng Ma, Zhuo Ma, Ning Lu, Yanbo Yang, Teng Li, Dawei Wei:
Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health. NaNA 2019: 319-324 - [i3]Zhihong Liu, Jiajia Liu, Yong Zeng, Zhuo Ma, Jianfeng Ma, Qiping Huang:
Challenges in Covert Wireless Communications with Active Warden on AWGN channels. CoRR abs/1901.03185 (2019) - [i2]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng:
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing. CoRR abs/1907.10218 (2019) - [i1]Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren:
Revocable Federated Learning: A Benchmark of Federated Forest. CoRR abs/1911.03242 (2019) - 2018
- [j6]Jiuxin Cao, Ziqing Zhu, Liang Shi, Bo Liu, Zhuo Ma:
Multi-feature based event recommendation in Event-Based Social Network. Int. J. Comput. Intell. Syst. 11(1): 618-633 (2018) - [j5]Zhuo Ma, Jiuxin Cao, Xiusheng Chen, Shuai Xu, Bo Liu, Yuntao Yang:
GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services. Secur. Commun. Networks 2018: 9148768:1-9148768:14 (2018) - [j4]Zhuo Ma, Xinglong Wang, Rui Ma, Zhuzhu Wang, Jianfeng Ma:
Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept. Sensors 18(9): 2894 (2018) - 2016
- [c8]Jiuxin Cao, Xiangying Zhu, Fang Dong, Bo Liu, Zhuo Ma, Huiyu Min:
Time Series Based Bandwidth Allocation Strategy in Cloud Datacenter. CBD 2016: 228-233 - [c7]Zhuo Ma, WanWan Gao, Shuanyi Du, Bo Kang:
A simple frequency-domain equalizer over doubly-selective channel without feedback. CITS 2016: 1-5 - [c6]Jiuxin Cao, Tao Zhou, Dan Dong, Shuai Xu, Ziqing Zhu, Zhuo Ma, Bo Liu:
Attribute-Based Influence Maximization in Social Networks. WISE (1) 2016: 3-18 - 2014
- [c5]Zhuo Ma, Shuanyi Du:
Data Directed Estimation Based Turbo Equalization in HF Communication. CSE 2014: 884-889 - [c4]Hengzhou Yuan, Yang Guo, Zhuo Ma:
A 40nm/65nm process adaptive low jitter phase-locked loop. ISIC 2014: 500-503 - 2013
- [j3]Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma:
An Improved Password-Based Remote User Authentication Protocol without Smart Cards. Inf. Technol. Control. 42(2): 113-123 (2013) - [j2]Qi Jiang, Jianfeng Ma, Zhuo Ma, Guangsong Li:
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 37(1): 9897 (2013) - [c3]Hengzhou Yuan, Zhuo Ma, Yang Guo:
An adaptive multi-modulus frequency divider. ASICON 2013: 1-4 - 2011
- [c2]Zhuo Ma, Yang Guo, Lunguo Xie, Rongrong Liu, Hongjian Zuo:
A noise rejective VCO with build-in active LC filter. ASICON 2011: 598-601 - 2010
- [j1]Zhuo Ma, Jianfeng Ma, Sang-Jae Moon, Xinghua Li:
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment. IEICE Trans. Inf. Syst. 93-D(3): 430-437 (2010)
2000 – 2009
- 2008
- [c1]Zhuo Ma, Jianfeng Ma, Yulong Shen:
Provably Secure Trusted Access Protocol for WLAN Mesh Networks. EUC (2) 2008: 43-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint