default search action
Bihuan Chen 0001
Person information
- affiliation: Fudan University, School of Computer Science / Shanghai Key Laboratory of Data Science, China
- affiliation (former): Nanyang Technological University, Singapore
Other persons with the same name
- Bihuan Chen 0002 — GF Securities, Guangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c55]Kaifeng Huang, Chenhao Lu, Yiheng Cao, Bihuan Chen, Xin Peng:
VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching. CCS 2024: 3958-3972 - [c54]Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. ICSE 2024: 34:1-34:13 - [c53]Susheng Wu, Wenyan Song, Kaifeng Huang, Bihuan Chen, Xin Peng:
Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities. ICSE 2024: 162:1-162:12 - [c52]Xuezhi Song, Yijian Wu, Shuning Liu, Bihuan Chen, Yun Lin, Xin Peng:
C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging. ISSTA 2024: 300-312 - [c51]You Lu, Yifan Tian, Yuyang Bi, Bihuan Chen, Xin Peng:
DiaVio: LLM-Empowered Diagnosis of Safety Violations in ADS Simulation Testing. ISSTA 2024: 376-388 - [c50]Kaifeng Huang, Yingfeng Xia, Bihuan Chen, Siyang He, Huazheng Zeng, Zhuotong Zhou, Jin Guo, Xin Peng:
Your "Notice" Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking. ISSTA 2024: 1022-1034 - [c49]Yiheng Huang, Ruisi Wang, Wen Zheng, Zhuotong Zhou, Susheng Wu, Shulin Ke, Bihuan Chen, Shan Gao, Xin Peng:
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching. ASE 2024: 1146-1158 - [c48]Susheng Wu, Ruisi Wang, Kaifeng Huang, Yiheng Cao, Wenyan Song, Zhuotong Zhou, Yiheng Huang, Bihuan Chen, Xin Peng:
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities. ASE 2024: 1447-1459 - [c47]Zhuotong Zhou, Yongzhuo Yang, Susheng Wu, Yiheng Huang, Bihuan Chen, Xin Peng:
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing. ASE 2024: 1633-1644 - [c46]Dongfang Xie, Bihuan Chen, Kaifeng Huang, Yu Wang, Linghao Pan, Zhicheng Chen, Xin Peng:
Enhancing Field Tracking and Interprocedural Analysis to Find More Null Pointer Exceptions. SANER 2024: 849-859 - [i20]Yufei Zhao, Dingji Wang, Bihuan Chen, Ziqian Chen, Xin Peng:
A general approach to enhance the survivability of backdoor attacks by decision path coupling. CoRR abs/2403.02950 (2024) - [i19]Xueying Du, Geng Zheng, Kaixin Wang, Jiayi Feng, Wentai Deng, Mingwei Liu, Bihuan Chen, Xin Peng, Tao Ma, Yiling Lou:
Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG. CoRR abs/2406.11147 (2024) - [i18]Kaifeng Huang, Bihuan Chen, You Lu, Susheng Wu, Dingji Wang, Yiheng Huang, Haowen Jiang, Zhuotong Zhou, Junming Cao, Xin Peng:
Lifting the Veil on the Large Language Model Supply Chain: Composition, Risks, and Mitigations. CoRR abs/2410.21218 (2024) - [i17]You Lu, Yifan Tian, Dingji Wang, Bihuan Chen, Xin Peng:
AdvFuzz: Finding More Violations Caused by the EGO Vehicle in Simulation Testing by Adversarial NPC Vehicles. CoRR abs/2411.19567 (2024) - [i16]Fan Yang, You Lu, Bihuan Chen, Peng Qin, Xin Peng:
RoadGen: Generating Road Scenarios for Autonomous Vehicle Testing. CoRR abs/2411.19577 (2024) - 2023
- [j16]Bihuan Chen, Yang Liu, Xin Peng, Yijian Wu, Shengchao Qin:
Baton: symphony of random testing and concolic testing through machine learning and taint analysis. Sci. China Inf. Sci. 66(3) (2023) - [j15]Yutong Zhao, Lu Xiao, Andre B. Bondi, Bihuan Chen, Yang Liu:
A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects. IEEE Trans. Software Eng. 49(2): 924-946 (2023) - [c45]Junming Cao, Bihuan Chen, Longjie Hu, Jie Gao, Kaifeng Huang, Xuezhi Song, Xin Peng:
Characterizing the Complexity and Its Impact on Testing in ML-Enabled Systems : A Case Sutdy on Rasa. ICSME 2023: 258-270 - [c44]Shenglin Bao, Chaofeng Sha, Bihuan Chen, Xin Peng, Wenyun Zhao:
In Defense of Simple Techniques for Neural Network Test Case Selection. ISSTA 2023: 501-513 - [c43]Xuezhi Song, Yijian Wu, Junming Cao, Bihuan Chen, Yun Lin, Zhengjie Lu, Dingji Wang, Xin Peng:
BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining. ASE 2023: 1919-1929 - [c42]Kaifeng Huang, Bihuan Chen, Susheng Wu, Junming Cao, Lei Ma, Xin Peng:
Demystifying Dependency Bugs in Deep Learning Stack. ESEC/SIGSOFT FSE 2023: 450-462 - [c41]Fengyi Zhang, Bihuan Chen, Yufei Zhao, Xin Peng:
Slice-Based Code Change Representation Learning. SANER 2023: 319-330 - [i15]Junming Cao, Bihuan Chen, Longjie Hu, Jie Gao, Kaifeng Huang, Xin Peng:
Understanding the Complexity and Its Impact on Testing in ML-Enabled Systems. CoRR abs/2301.03837 (2023) - [i14]Yixuan Yan, Kaifeng Huang, Bihuan Chen, Zixin Tao, Xin Peng:
Scalable Demand-Driven Call Graph Generation for Python. CoRR abs/2305.05949 (2023) - [i13]Junan Zhang, Kaifeng Huang, Bihuan Chen, Chong Wang, Zhenhao Tian, Xin Peng:
Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence. CoRR abs/2309.02637 (2023) - [i12]Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. CoRR abs/2309.08221 (2023) - [i11]Kaifeng Huang, Yingfeng Xia, Bihuan Chen, Zhuotong Zhou, Jin Guo, Xin Peng:
Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking. CoRR abs/2310.07991 (2023) - 2022
- [j14]Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao:
"More Than Deep Learning": post-processing for API sequence recommendation. Empir. Softw. Eng. 27(1): 15 (2022) - [j13]Kaifeng Huang, Bihuan Chen, Congying Xu, Ying Wang, Bowen Shi, Xin Peng, Yijian Wu, Yang Liu:
Characterizing usages, updates and risks of third-party libraries in Java projects. Empir. Softw. Eng. 27(4): 90 (2022) - [c40]Chen Zhang, Bihuan Chen, Xin Peng, Wenyun Zhao:
Buildsheriff: Change-Aware Test Failure Triage for Continuous Integration Builds. ICSE 2022: 312-324 - [c39]Chengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu, Xin Peng:
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem. ICSE 2022: 672-684 - [c38]Chen Zhang, Bihuan Chen, Junhao Hu, Xin Peng, Wenyun Zhao:
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration Builds. ASE 2022: 18:1-18:13 - [c37]Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu:
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing. ASE 2022: 51:1-51:12 - [c36]Junming Cao, Bihuan Chen, Chao Sun, Longjie Hu, Shuaihong Wu, Xin Peng:
Understanding performance problems in deep learning systems. ESEC/SIGSOFT FSE 2022: 357-369 - [c35]Congying Xu, Bihuan Chen, Chenhao Lu, Kaifeng Huang, Xin Peng, Yang Liu:
Tracking patches for open source software vulnerabilities. ESEC/SIGSOFT FSE 2022: 860-871 - [c34]Rongfan Li, Bihuan Chen, Fengyi Zhang, Chao Sun, Xin Peng:
Detecting Runtime Exceptions by Deep Code Representation Learning with Attention-Based Graph Neural Networks. SANER 2022: 373-384 - [c33]Yi Liu, Yadong Yan, Chaofeng Sha, Xin Peng, Bihuan Chen, Chong Wang:
DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse Detection. SANER 2022: 685-696 - [i10]Chengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu, Xin Peng:
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem. CoRR abs/2201.03981 (2022) - [i9]Kaifeng Huang, Bihuan Chen, Susheng Wu, Junmin Cao, Lei Ma, Xin Peng:
Demystifying Dependency Bugs in Deep Learning Stack. CoRR abs/2207.10347 (2022) - [i8]Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu:
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing. CoRR abs/2209.00393 (2022) - 2021
- [j12]Wenjian Liu, Bihuan Chen, Xin Peng, Qinghao Sun, Wenyun Zhao:
Identifying change patterns of API misuses from code changes. Sci. China Inf. Sci. 64(3) (2021) - [j11]Fengyi Zhang, Bihuan Chen, Rongfan Li, Xin Peng:
A hybrid code representation learning approach for predicting method names. J. Syst. Softw. 180: 111011 (2021) - [j10]Kun Cheng, Yuan Zhou, Bihuan Chen, Rui Wang, Yuebin Bai, Yang Liu:
Guardauto: A Decentralized Runtime Protection System for Autonomous Driving. IEEE Trans. Computers 70(10): 1569-1581 (2021) - [c32]Kaifeng Huang, Bihuan Chen, Linghao Pan, Shuai Wu, Xin Peng:
REPFINDER: Finding Replacements for Missing APIs in Library Update. ASE 2021: 266-278 - [i7]Junming Cao, Bihuan Chen, Chao Sun, Longjie Hu, Xin Peng:
Characterizing Performance Bugs in Deep Learning Systems. CoRR abs/2112.01771 (2021) - [i6]Congying Xu, Bihuan Chen, Chenhao Lu, Kaifeng Huang, Xin Peng, Yang Liu:
TRACER: Finding Patches for Open Source Software Vulnerabilities. CoRR abs/2112.02240 (2021) - 2020
- [c31]Xiao Wang, Lu Xiao, Kaifeng Huang, Bihuan Chen, Yutong Zhao, Yang Liu:
DesignDiff: Continuously Modeling Software Design Difference from Code Revisions. ICSA 2020: 179-190 - [c30]Yutong Zhao, Lu Xiao, Xiao Wang, Zhifei Chen, Bihuan Chen, Yang Liu:
Butterfly Space: An Architectural Approach for Investigating Performance Issues. ICSA 2020: 202-213 - [c29]Ying Wang, Bihuan Chen, Kaifeng Huang, Bowen Shi, Congying Xu, Xin Peng, Yijian Wu, Yang Liu:
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects. ICSME 2020: 35-45 - [c28]Yifei Xu, Zhengzi Xu, Bihuan Chen, Fu Song, Yang Liu, Ting Liu:
Patch based vulnerability matching for binary programs. ISSTA 2020: 376-387 - [c27]Zhifei Chen, Yanhui Li, Bihuan Chen, Wanwangying Ma, Lin Chen, Baowen Xu:
An Empirical Study on Dynamic Typing Related Practices in Python Systems. ICPC 2020: 83-93 - [c26]Bihuan Chen, Linlin Chen, Chen Zhang, Xin Peng:
BUILDFAST: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration. ASE 2020: 42-53 - [c25]Kaifeng Huang, Bihuan Chen, Bowen Shi, Ying Wang, Congying Xu, Xin Peng:
Interactive, effort-aware library version harmonization. ESEC/SIGSOFT FSE 2020: 518-529 - [c24]Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi:
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. USENIX Security Symposium 2020: 1165-1182 - [c23]Yutong Zhao, Lu Xiao, Xiao Wang, Lei Sun, Bihuan Chen, Yang Liu, Andre B. Bondi:
How Are Performance Issues Caused and Resolved?-An Empirical Study from a Design Perspective. ICPE 2020: 181-192 - [i5]Ying Wang, Bihuan Chen, Kaifeng Huang, Bowen Shi, Congying Xu, Xin Peng, Yang Liu, Yijian Wu:
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects. CoRR abs/2002.11028 (2020) - [i4]Kaifeng Huang, Bihuan Chen, Bowen Shi, Ying Wang, Congying Xu, Xin Peng:
Interactive, Effort-Aware Library Version Harmonization. CoRR abs/2002.11066 (2020) - [i3]Kun Cheng, Yuan Zhou, Bihuan Chen, Rui Wang, Yuebin Bai, Yang Liu:
Guardauto: A Decentralized Runtime Protection System for Autonomous Driving. CoRR abs/2003.12359 (2020)
2010 – 2019
- 2019
- [j9]Hang Ruan, Bihuan Chen, Xin Peng, Wenyun Zhao:
DeepLink: Recovering issue-commit links based on deep learning. J. Syst. Softw. 158 (2019) - [j8]Chenyu Wang, Bihuan Chen, Yang Liu, Hongjun Wu:
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense. IEEE Trans. Inf. Forensics Secur. 14(3): 693-708 (2019) - [j7]Bihuan Chen, Xin Peng, Yang Liu, Songzheng Song, Jiahuan Zheng, Wenyun Zhao:
Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints. IEEE Trans. Serv. Comput. 12(1): 73-87 (2019) - [j6]Xiaofei Xie, Bihuan Chen, Liang Zou, Yang Liu, Wei Le, Xiaohong Li:
Automatic Loop Summarization via Path Dependency Analysis. IEEE Trans. Software Eng. 45(6): 537-557 (2019) - [c22]Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang:
Leopard: identifying vulnerable code for vulnerability assessment through program metrics. ICSE 2019: 60-71 - [c21]Yutong Zhao, Lu Xiao, Xiao Wang, Bihuan Chen, Yang Liu:
Localized or architectural: an empirical study of performance issues dichotomy. ICSE (Companion Volume) 2019: 316-317 - [c20]Junjie Wang, Bihuan Chen, Lei Wei, Yang Liu:
Superion: grammar-aware greybox fuzzing. ICSE 2019: 724-735 - [c19]Chen Zhang, Bihuan Chen, Linlin Chen, Xin Peng, Wenyun Zhao:
A large-scale empirical study of compiler errors in continuous integration. ESEC/SIGSOFT FSE 2019: 176-187 - [i2]Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang:
LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics. CoRR abs/1901.11479 (2019) - 2018
- [j5]Sanjeev Das, Bihuan Chen, Mahinthan Chandramohan, Yang Liu, Wei Zhang:
ROPSentry: Runtime defense against ROP attacks using hardware performance counters. Comput. Secur. 73: 374-388 (2018) - [c18]Hongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen, Xiaofei Xie, Xiuheng Wu, Yang Liu:
Hawkeye: Towards a Desired Directed Grey-box Fuzzer. CCS 2018: 2095-2108 - [c17]Zhifei Chen, Bihuan Chen, Lu Xiao, Xiao Wang, Lin Chen, Yang Liu, Baowen Xu:
Speedoo: prioritizing performance optimization opportunities. ICSE 2018: 811-821 - [c16]Yu Wang, Fengjuan Gao, Lingyun Situ, Lingzhang Wang, Bihuan Chen, Yang Liu, Jianhua Zhao, Xuandong Li:
DangDone: Eliminating Dangling Pointers via Intermediate Pointers. Internetware 2018: 6:1-6:10 - [c15]Kaifeng Huang, Bihuan Chen, Xin Peng, Daihong Zhou, Ying Wang, Yang Liu, Wenyun Zhao:
ClDiff: generating concise linked code differences. ASE 2018: 679-690 - [c14]Hongxu Chen, Yuekang Li, Bihuan Chen, Yinxing Xue, Yang Liu:
FOT: a versatile, configurable, extensible fuzzing framework. ESEC/SIGSOFT FSE 2018: 867-870 - [i1]Junjie Wang, Bihuan Chen, Lei Wei, Yang Liu:
Superion: Grammar-Aware Greybox Fuzzing. CoRR abs/1812.01197 (2018) - 2017
- [c13]Zhengzi Xu, Bihuan Chen, Mahinthan Chandramohan, Yang Liu, Fu Song:
SPAIN: security patch analysis for binaries towards understanding the pain and pills. ICSE 2017: 462-472 - [c12]Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li:
Loopster: static loop termination analysis. ESEC/SIGSOFT FSE 2017: 84-94 - [c11]Yuekang Li, Bihuan Chen, Mahinthan Chandramohan, Shang-Wei Lin, Yang Liu, Alwen Tiu:
Steelix: program-state based binary fuzzing. ESEC/SIGSOFT FSE 2017: 627-637 - [c10]Junjie Wang, Bihuan Chen, Lei Wei, Yang Liu:
Skyfire: Data-Driven Seed Generation for Fuzzing. IEEE Symposium on Security and Privacy 2017: 579-594 - 2016
- [c9]Bihuan Chen, Yang Liu, Wei Le:
Generating performance distributions via probabilistic symbolic execution. ICSE 2016: 49-60 - [c8]Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li:
Proteus: computing disjunctive loop summary via path dependency analysis. SIGSOFT FSE 2016: 61-72 - 2015
- [j4]Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, Wenyun Zhao:
Rationalism with a dose of empiricism: combining goal reasoning and case-based reasoning for self-adaptive software systems. Requir. Eng. 20(3): 233-252 (2015) - [j3]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Requirements-Driven Self-Optimization of Composite Services Using Feedback Control. IEEE Trans. Serv. Comput. 8(1): 107-120 (2015) - 2014
- [j2]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Uncertainty handling in goal-driven self-optimization - Limiting the negative effect on adaptation. J. Syst. Softw. 90: 114-127 (2014) - [c7]Bihuan Chen, Xin Peng, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
Self-adaptation through incremental generative model transformations at runtime. ICSE 2014: 676-687 - [c6]Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, Wenyun Zhao:
Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation. RE 2014: 113-122 - 2012
- [j1]Xin Peng, Bihuan Chen, Yijun Yu, Wenyun Zhao:
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop. J. Syst. Softw. 85(12): 2707-2719 (2012) - [c5]Richang Lin, Bihuan Chen, Yi Xie, Xin Peng, Wenyun Zhao:
Learning-Based Multi-controller Coordination for Self-Optimization. COMPSAC Workshops 2012: 164-169 - 2011
- [c4]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Are your sites down? Requirements-driven self-tuning for the survivability of Web systems. RE 2011: 219-228 - [c3]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Survivability-oriented self-tuning of web systems. WWW (Companion Volume) 2011: 23-24 - 2010
- [c2]Xin Peng, Bihuan Chen, Yijun Yu, Wenyun Zhao:
Self-Tuning of Software Systems Through Goal-based Feedback Loop Control. RE 2010: 104-107
2000 – 2009
- 2009
- [c1]Bihuan Chen, Xin Peng, Wenyun Zhao:
Towards runtime optimization of software quality based on feedback control theory. Internetware 2009: 10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint