default search action
Rui Chang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Haicao Song, Rui Chang, Heshan Cheng, Pan Liu, Dongwei Yan:
The impact of manufacturing digital supply chain on supply chain disruption risks under uncertain environment - Based on dynamic capability perspective. Adv. Eng. Informatics 60: 102385 (2024) - [j41]Rui Chang, Xin Wei, Xi Zhang, Hui Xiong, Hengshu Zhu:
How recommendation letters affect career Mobility:Evidence from a social networking sites LinkedIn. Comput. Hum. Behav. 152: 108084 (2024) - [j40]Lingling Lv, Zikai Li, Rui Chang, Xinyang Liu:
Controllability and control for discrete periodic systems based on fully-actuated system approach. Int. J. Syst. Sci. 55(12): 2494-2505 (2024) - [j39]Rui Chang, Gang Liu, Haojie Tang, Yao Qian, Jianchao Tang:
RDGMEF: a multi-exposure image fusion framework based on Retinex decompostion and guided filter. Neural Comput. Appl. 36(20): 12083-12102 (2024) - [j38]Kaixin Li, Haojie Tang, Gang Liu, Rui Chang, Mengliang Xing, Jianchao Tang:
RSTFusion: an end-to-end fusion network for infrared and visible images based on residual swin transfomer. Neural Comput. Appl. 36(22): 13467-13489 (2024) - [j37]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. IEEE Trans. Dependable Secur. Comput. 21(1): 403-418 (2024) - [j36]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Hexiang Wang, Baolei Hou, Lei Wu, Xiapu Luo:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. IEEE Trans. Dependable Secur. Comput. 21(4): 3501-3514 (2024) - [j35]Xingjian Zhang, Haochen Gong, Rui Chang, Yajin Zhou:
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping. IEEE Trans. Inf. Forensics Secur. 19: 3758-3771 (2024) - [j34]Xiaoye Zheng, Zhiyuan Wan, Yun Zhang, Rui Chang, David Lo:
A Closer Look at the Security Risks in the Rust Ecosystem. ACM Trans. Softw. Eng. Methodol. 33(2): 34:1-34:30 (2024) - [j33]Zicong Gao, Hao Xiong, Weiyu Dong, Rui Chang, Rui Yang, Yajin Zhou, Liehui Jiang:
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing. IEEE Trans. Software Eng. 50(1): 1-15 (2024) - [c35]Qirui Liu, Wenbo Shen, Jinmeng Zhou, Zhuoruo Zhang, Jiayi Hu, Shukai Ni, Kangjie Lu, Rui Chang:
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow. ESORICS (3) 2024: 194-214 - [c34]Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren:
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem. ICSE 2024: 24:1-24:13 - [c33]Ruofan Zhu, Xingyu Wang, Chengwei Liu, Zhengzi Xu, Wenbo Shen, Rui Chang, Yang Liu:
ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem. ICSE 2024: 211:1-211:12 - [c32]Hao Xiong, Qinming Dai, Rui Chang, Mingran Qiu, Renxiang Wang, Wenbo Shen, Yajin Zhou:
Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries. ISSTA 2024: 350-362 - [c31]Xiaoyong Yan, Biao He, Wenbo Shen, Yu Ouyang, Kaihang Zhou, Xingjian Zhang, Xingyu Wang, Yukai Cao, Rui Chang:
Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph. ISSTA 2024: 1377-1388 - [i7]Ruofan Zhu, Xingyu Wang, Chengwei Liu, Zhengzi Xu, Wenbo Shen, Rui Chang, Yang Liu:
ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem. CoRR abs/2401.02090 (2024) - [i6]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. CoRR abs/2401.17606 (2024) - 2023
- [j32]Jixun Gao, Rui Chang, Zhipeng Yang, Quanzheng Huang, Yuanyuan Zhao, Yu Wu:
A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization. Clust. Comput. 26(1): 337-348 (2023) - [j31]Fanlang Zeng, Rui Chang, Hao Xu, Shaoping Pan, Yongwang Zhao:
Refinement-based Modeling and Formal Verification for Multiple Secure Partitions of TrustZone. Int. J. Softw. Informatics 13(3): 297-321 (2023) - [j30]Shan-Shan Zhong, Yu-Yan Sara Zhao, Honglei Lin, Rui Chang, Chao Qi, Junhu Wang, Bing Mo, Yuanyun Wen, Wen Yu, Di-Sheng Zhou, Xiao-Wen Yu, Xiongyao Li, Jianzhong Liu:
High-Temperature Oxidation of Magnesium- and Iron-Rich Olivine under a CO2 Atmosphere: Implications for Venus. Remote. Sens. 15(8): 1959 (2023) - [j29]Lei Bai, Rui Chang, Guanghui Chen, Yu Zhou:
Speech-Visual Emotion Recognition via Modal Decomposition Learning. IEEE Signal Process. Lett. 30: 1452-1456 (2023) - [j28]Chaojie Lu, Jibin Zheng, Tianyuan Yang, Rui Chang, Hongwei Liu:
DOA Estimation Based on Coherent Integration-Sparse Bayesian Learning With Time-Variant Gain-Phase Errors. IEEE Trans. Aerosp. Electron. Syst. 59(6): 7951-7962 (2023) - [j27]Jian Lin, Dingding Wang, Rui Chang, Lei Wu, Yajin Zhou, Kui Ren:
EnBinDiff: Identifying Data-Only Patches for Binaries. IEEE Trans. Dependable Secur. Comput. 20(1): 343-359 (2023) - [j26]Xinliang Miao, Rui Chang, Jianhong Zhao, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. IEEE Trans. Dependable Secur. Comput. 20(1): 377-391 (2023) - [j25]Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. IEEE Trans. Software Eng. 49(4): 1683-1703 (2023) - [c30]Ziqi Yuan, Siyu Hong, Rui Chang, Yajin Zhou, Wenbo Shen, Kui Ren:
VDom: Fast and Unlimited Virtual Domains on Multiple Architectures. ASPLOS (2) 2023: 905-919 - [c29]Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. CCS 2023: 120-134 - [c28]Zhuoruo Zhang, Jilin Hu, Chenyang Yu, Rui Chang, Yongwang Zhao:
VeriReach: A Formally Verified Algorithm for Reachability Analysis in Virtual Private Cloud Networks. ICWS 2023: 71-77 - [c27]Fanlang Zeng, Zhuoruo Zhang, Rui Chang, Chenyang Yu, Zijun Zhang, Yongwang Zhao:
Lark: Verified Cross-Domain Access Control for Trusted Execution Environments. ISSRE 2023: 160-171 - [c26]Lin Ma, Duoming Zhou, Hanjie Wu, Yajin Zhou, Rui Chang, Hao Xiong, Lei Wu, Kui Ren:
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel. SP 2023: 2138-2154 - [c25]Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren:
Demystifying Pointer Authentication on Apple M1. USENIX Security Symposium 2023: 2833-2848 - [i5]Xiaoye Zheng, Zhiyuan Wan, Yun Zhang, Rui Chang, David Lo:
A Closer Look at the Security Risks in the Rust Ecosystem. CoRR abs/2308.15046 (2023) - [i4]Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren:
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem. CoRR abs/2310.17186 (2023) - 2022
- [j24]Zicong Gao, Weiyu Dong, Rui Chang, Yisen Wang:
Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j23]Yaobin Xie, Rui Chang, Liehui Jiang:
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j22]Rui Chang, Wei Yang, Honglei Lin, Rui Xu, Sheng Gou, Rong Wang, Yangting Lin:
Lunar Terrestrial Analog Experiment on the Spectral Interpretations of Rocks Observed by the Yutu-2 Rover. Remote. Sens. 14(10): 2323 (2022) - [c24]Jinyan Xu, Haoran Lin, Ziqi Yuan, Wenbo Shen, Yajin Zhou, Rui Chang, Lei Wu, Kui Ren:
RegVault: hardware assisted selective data randomization for operating system kernels. DAC 2022: 715-720 - [c23]Xinliang Miao, Fanlang Zeng, Rui Chang, Chenyang Yu, Zijun Zhang, Liehui Jiang, Yongwang Zhao:
Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE. Internetware 2022: 252-261 - [c22]Weiyu Dong, Jian Lin, Rui Chang, Ruimin Wang:
CaDeCFF: Compiler-Agnostic Deobfuscator of Control Flow Flattening. Internetware 2022: 282-291 - [i3]Zhuoruo Zhang, Chenyang Yu, He Huang, Rui Chang, Mingshuai Chen, Qinming Dai, Wenbo Shen, Yongwang Zhao, Kui Ren:
PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot. CoRR abs/2209.07936 (2022) - 2021
- [j21]Yu Chen, Rui Chang, Jifeng Guo:
Effects of Data Augmentation Method Borderline-SMOTE on Emotion Recognition of EEG Signals Based on Convolutional Neural Network. IEEE Access 9: 47491-47502 (2021) - [c21]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting challenges for selective data protection of real applications. APSys 2021: 138-145 - [c20]Xingjian Zhang, Ziqi Yuan, Rui Chang, Yajin Zhou:
Seeds of SEED: H2Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks. SEED 2021: 29-36 - [i2]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting Challenges for Selective Data Protection of Real Applications. CoRR abs/2105.14251 (2021) - [i1]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Baolei Hou, Xiapu Luo, Lei Wu, Kui Ren:
A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices. CoRR abs/2105.14298 (2021) - 2020
- [j20]Xiaodong Zhu, Yi Zhang, Liehui Jiang, Rui Chang:
Determining the base address of MIPS firmware based on absolute address statistics and string reference matching. Comput. Secur. 88 (2020) - [j19]Ivan Carcamo-Orive, Marc Y. R. Henrion, Kuixi Zhu, Noam D. Beckmann, Paige Cundiff, Sara Moein, Zenan Zhang, Melissa Alamprese, Sunita L. D'Souza, Martin Wabitsch, Eric E. Schadt, Thomas Quertermous, Joshua W. Knowles, Rui Chang:
Predictive network modeling in human induced pluripotent stem cells identifies key driver genes for insulin responsiveness. PLoS Comput. Biol. 16(12) (2020)
2010 – 2019
- 2019
- [j18]Rui Chang, Liehui Jiang, Yaobin Xie, Hongqi He, Danmin Chen, Lu Ren:
Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j17]Xinmin Tao, Rui Chang, Chenxi Li, Ruotong Wang, Rui Liu:
Density-sensitive Robust Fuzzy Kernel Principal Component Analysis technique. Neurocomputing 329: 210-226 (2019) - [j16]Xinmin Tao, Ruotong Wang, Rui Chang, Chenxi Li:
Density-sensitive fuzzy kernel maximum entropy clustering algorithm. Knowl. Based Syst. 166: 42-57 (2019) - [j15]Xinmin Tao, Ruotong Wang, Rui Chang, Chenxi Li, Rui Liu, Junrong Zou:
Spectral clustering algorithm using density-sensitive distance measure with global and local consistencies. Knowl. Based Syst. 170: 26-42 (2019) - 2018
- [j14]Boxue Du, Rui Chang, Jinpeng Jiang, Jin Li:
Temperature-Dependent Surface Charge and Flashover Behaviors of Oil-Paper Insulation Under Impulse With Superimposed DC Voltage. IEEE Access 6: 63087-63093 (2018) - [j13]Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He, Shuiqiao Yang, Hang Jiang, Wei Liu, Yong Liu:
Towards a multilayered permission-based access control for extending Android security. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j12]Rui Lou, Liehui Jiang, Rui Chang, Yisen Wang:
A Multi-level Perception Security Model Using Virtualization. KSII Trans. Internet Inf. Syst. 12(11): 5588-5613 (2018) - [c19]Gongbo Wang, Weiyu Dong, Rui Chang:
Association Analysis of Firmware Based on NoSQL Database. ICCCS (5) 2018: 94-105 - [c18]Yaobin Xie, Wei Wang, Faren Wang, Rui Chang:
VTET: A Virtual Industrial Control System Testbed for Cyber Security Research. SSIC 2018: 1-7 - 2017
- [j11]Rui Chang, Liehui Jiang, Wenzhi Chen, Yang Xiang, Yuxia Cheng, Abdulhameed Alelaiwi:
MIPE: a practical memory integrity protection method in a trusted execution environment. Clust. Comput. 20(2): 1075-1087 (2017) - [j10]Yuxia Cheng, Xinjie Yu, Wenzhi Chen, Rui Chang, Yang Xiang:
A practical cross-datacenter fault-tolerance algorithm in the cloud storage system. Clust. Comput. 20(2): 1801-1813 (2017) - [j9]Xian Chen, Wenzhi Chen, Zhongyong Lu, Yu Zhang, Rui Chang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Yang Xiang:
MBSA: a lightweight and flexible storage architecture for virtual machines. Concurr. Comput. Pract. Exp. 29(16) (2017) - [c17]Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong:
Implementing a ARM-Based Secure Boot Scheme for the Isolated Execution Environment. CIS 2017: 336-340 - [c16]Lu Ren, Rui Chang, Qing Yin, Wei Wang:
Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper). ISPEC 2017: 759-769 - [c15]Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang:
An Effective Authentication for Client Application Using ARM TrustZone. ISPEC 2017: 802-813 - [c14]Ariella Cohain, Aparna A. Divaraniya, Kuixi Zhu, Joseph R. Scarpa, Andrew Kasarskis, Jun Zhu, Rui Chang, Joel T. Dudley, Eric E. Schadt:
Exploring the Reproducibility of Probabilistic Causal Molecular Network Models>. PSB 2017: 120-131 - [c13]Lu Ren, Rui Chang, Qing Yin, Yujia Man:
A Formal Android Permission Model Based on the B Method. SpaCCS 2017: 381-394 - [c12]Rui Chang, Jun Wu, Haoqi Ren:
A compilation method for zero overhead loop in DSPs with VLIW. WCSP 2017: 1-7 - 2016
- [j8]Charlotte Bay Hasager, Poul Astrup, Rong Zhu, Rui Chang, Merete Badger, Andrea N. Hahmann:
Quarter-Century Offshore Winds from SSM/I and WRF in the North Sea and South China Sea. Remote. Sens. 8(9): 769 (2016) - [j7]Rui Chang, Rong Zhu, Peng Guo:
A Case Study of Land-Surface-Temperature Impact from Large-Scale Deployment of Wind Farms in China from Guazhou. Remote. Sens. 8(10): 790 (2016) - [c11]Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He, Shuiqiao Yang:
Enhancement of Permission Management for an ARM-Android Platform. CIT 2016: 415-422 - [c10]Haowei Huang, Liehui Jiang, Weiyu Dong, Rui Chang, Yifan Hou, Michael Gerndt:
A Fine-Granular Programming Scheme for Irregular Scientific Applications. ACA 2016: 130-141 - [c9]Rui Chang, Liehui Jiang, Qing Yin, Wei Liu, Shengqiao Zhang:
A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment. CIS 2016: 254-258 - [c8]Rui Chang, Liehui Jiang, Qing Yin, Lu Ren, Qingfeng Liu:
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment. ICCNS 2016: 6-10 - 2015
- [j6]Rui Chang, Rong Zhu, Merete Badger, Charlotte Bay Hasager, Xuhuang Xing, Yirong Jiang:
Offshore Wind Resources Assessment from Multiple Satellite Data and WRF Modeling over South China Sea. Remote. Sens. 7(1): 467-487 (2015) - [c7]Rui Chang, Jonathan R. Karr, Eric E. Schadt:
Causal Inference in Biology Networks with Integrated Belief Propagation. Pacific Symposium on Biocomputing 2015: 359-370 - 2014
- [c6]Rui Chang, Liehui Jiang, Hui Shu, Hongqi He:
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition. CIS 2014: 499-504 - 2011
- [j5]Rui Chang, Robert Shoemaker, Wei Wang:
Systematic Search for Recipes to Generate Induced Pluripotent Stem Cells. PLoS Comput. Biol. 7(12) (2011) - [j4]Rui Chang, Robert Shoemaker, Wei Wang:
A Novel Knowledge-Driven Systems Biology Approach for Phenotype Prediction upon Genetic Intervention. IEEE ACM Trans. Comput. Biol. Bioinform. 8(5): 1170-1182 (2011) - 2010
- [c5]Rui Chang, Wei Wang:
A Novel Knowledge-driven Systems Biology Approach for Phenotype Prediction Upon Genetic Intervention. BIOCOMP 2010: 724-733 - [c4]Rui Chang, Wei Wang:
Novel algorithm for Bayesian network parameter learning with informative prior constraints. IJCNN 2010: 1-8 - [e2]Hamid R. Arabnia, Quoc-Nam Tran, Rui Chang, Matthew He, Andy Marsh, Ashu M. G. Solo, Jack Y. Yang:
International Conference on Bioinformatics & Computational Biology, BIOCOMP 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2010, ISBN 1-60132-134-1 [contents] - [e1]Hamid R. Arabnia, David de la Fuente, Elena B. Kozerenko, José Angel Olivas, Rui Chang, Peter M. LaMonica, Raymond A. Liuzzi, Ashu M. G. Solo:
Proceedings of the 2010 International Conference on Artificial Intelligence, ICAI 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2010, ISBN 1-60132-148-1 [contents]
2000 – 2009
- 2009
- [j3]Gary Boudreau, John Panicker, Ning Guo, Rui Chang, Neng Wang, Sophie Vrzic:
Interference coordination and cancellation for 4G networks. IEEE Commun. Mag. 47(4): 74-81 (2009) - 2008
- [b1]Rui Chang:
Advanced probabilistic network modeling framework with qualitative prior knowledge. Technical University Munich, Germany, 2008, pp. 1-148 - [j2]Rui Chang, Wilfried Brauer, Martin Stetter:
Modeling semantics of inconsistent qualitative knowledge for quantitative Bayesian network inference. Neural Networks 21(2-3): 182-192 (2008) - [j1]Rui Chang, Martin Stetter, Wilfried Brauer:
Quantitative Inference by Qualitative Semantic Knowledge Mining with Bayesian Model Averaging. IEEE Trans. Knowl. Data Eng. 20(12): 1587-1600 (2008) - 2007
- [c3]Rui Chang:
Consistent Modeling, Integration and Simulation of Molecular Interaction Networks in Space-Time Dimension. BIBE 2007: 1254-1259 - [c2]Rui Chang, Martin Stetter:
A Knowledge-based Dynamic Bayesian Framework Towards Molecular Network Modeling and Quantitative Prediction. BIOCOMP 2007: 37-43 - [c1]Rui Chang, Martin Stetter:
Quantitative Bayesian Inference by Qualitative Knowledge Modeling. IJCNN 2007: 2563-2568
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint