
Lihua Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j42]Lihua Liu
, Jutao Li, Ling Huang, Xiaojun Liu, Guangyou Fang:
Double Clamping Current Inverter With Adjustable Turn-off Time for Bucking Coil Helicopter Transient Electromagnetic Surveying. IEEE Trans. Ind. Electron. 68(6): 5405-5414 (2021) - 2020
- [j41]Lihua Liu
, Jianguo Zhu
, Linfeng Zheng
:
An Effective Method for Estimating State of Charge of Lithium-Ion Batteries Based on an Electrochemical Model and Nernst Equation. IEEE Access 8: 211738-211749 (2020) - [j40]Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen:
A Note On One Secure Data Self-Destructing Scheme In Cloud Computing. Int. J. Netw. Secur. 22(1): 36-40 (2020) - [j39]Zhengjun Cao, Zhen Chen, Ruizhong Wei, Lihua Liu:
Run-based Modular Reduction Method. Int. J. Netw. Secur. 22(2): 331-336 (2020) - [j38]Zhengjun Cao, Xiqi Wang, Lihua Liu:
A Note on One Popular Non-Interactive Zero-Knowledge Proof System. Int. J. Netw. Secur. 22(4): 681-685 (2020) - [j37]Zhi Geng
, Lihua Liu
, Jutao Li, Fubo Liu, Qimao Zhang, Xiaojun Liu, Guangyou Fang:
A Constant-Current Transmission Converter for Semi-airborne Transient Electromagnetic Surveying. IEEE Trans. Ind. Electron. 67(1): 542-550 (2020) - [c25]Hongjiang Liu, Mao Wang, Lihua Liu, Jibing Wu, Hongbin Huang:
Hull Number Detection for Ship Images Based on Image Super-Resolution. CISP-BMEI 2020: 339-344 - [c24]Tongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, Lihua Liu:
A Deep Learning Approach to Detection of Warping Forgery in Images. ICAIS (2) 2020: 109-118 - [c23]Xindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu:
Precfix: large-scale patch recommendation by mining defect-patch pairs. ICSE (SEIP) 2020: 41-50 - [c22]Xindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu:
Large-scale patch recommendation at Alibaba. ICSE (Companion Volume) 2020: 252-253 - [i44]Zhengjun Cao, Lihua Liu:
Factoring Algorithm Based on Parameterized Newton Method. IACR Cryptol. ePrint Arch. 2020: 1142 (2020) - [i43]Zhengjun Cao, Lihua Liu, Leming Hong:
Evaluation Methods for Chebyshev Polynomials. IACR Cryptol. ePrint Arch. 2020: 1365 (2020)
2010 – 2019
- 2019
- [j36]Lihua Liu
, Shangping Wang, Bintao He, Duo Zhang
:
A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment. IEEE Access 7: 109038-109053 (2019) - [j35]Lihua Liu, David R. Damerell, Leonidas Koukouflis, Yufeng Tong
, Brian D. Marsden, Matthieu Schapira:
UbiHub: a data hub for the explorers of ubiquitination pathways. Bioinform. 35(16): 2882-2884 (2019) - [j34]Jinluan Ren, Wen Cao, Bo Li, Lihua Liu, Lin Cai, Ruben Xing:
Big-Data Based Analysis for Communication Effect of Science-Technology Public Accounts on Social Media. Int. J. Inf. Syst. Serv. Sect. 11(3): 56-69 (2019) - [j33]Zhengjun Cao
, Lihua Liu
, Olivier Markowitch:
Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud". IEEE Trans. Cloud Comput. 7(3): 893 (2019) - 2018
- [j32]Shangping Wang, Duo Zhang
, Yaling Zhang
, Lihua Liu:
Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage. IEEE Access 6: 30444-30457 (2018) - [j31]Jibing Wu
, Lianfei Yu, Qun Zhang, Peiteng Shi, Lihua Liu, Su Deng, Hongbin Huang
:
Multityped Community Discovery in Time-Evolving Heterogeneous Information Networks Based on Tensor Decomposition. Complex. 2018: 9653404:1-9653404:16 (2018) - [j30]Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang:
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. Int. J. Netw. Secur. 20(4): 683-688 (2018) - [i42]Zhengjun Cao, Lihua Liu:
A Note on "New techniques for noninteractive zero-knowledge". CoRR abs/1805.06351 (2018) - [i41]Zhengjun Cao, Zhen Chen, Lihua Liu:
Analysis of Nederlof's algorithm for subset sum. CoRR abs/1807.02075 (2018) - [i40]Zhengjun Cao, Lihua Liu:
New Algorithms for Subset Sum Problem. CoRR abs/1807.02611 (2018) - [i39]Zhengjun Cao, Lihua Liu:
Remarks on Bell's Inequality. IACR Cryptol. ePrint Arch. 2018: 231 (2018) - [i38]Zhengjun Cao, Jeffrey Uhlmann, Lihua Liu:
Analysis of Deutsch-Jozsa Quantum Algorithm. IACR Cryptol. ePrint Arch. 2018: 249 (2018) - [i37]Zhengjun Cao, Lihua Liu:
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System. IACR Cryptol. ePrint Arch. 2018: 327 (2018) - [i36]Zhengjun Cao, Lihua Liu:
A Note On Clauser-Horne-Shimony-Holt Inequality. IACR Cryptol. ePrint Arch. 2018: 410 (2018) - 2017
- [j29]Lihua Liu, Shangping Wang, Qiao Yan:
A Multi-Authority Key-Policy ABE Scheme from Lattices in Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 37(1-4): 117-143 (2017) - [j28]Jinluan Ren, Liping Zhao
, Bo Li, Lihua Liu, Ruben Xing:
Measuring Service Utilities in Service Value Networks. Int. J. Inf. Syst. Serv. Sect. 9(2): 1-26 (2017) - [j27]Zhengjun Cao, Lihua Liu:
The Paillier's Cryptosystem and Some Variants Revisited. Int. J. Netw. Secur. 19(1): 91-98 (2017) - [j26]Zhengjun Cao, Lihua Liu:
A Note on Two Schemes for Secure Outsourcing of Linear Programming. Int. J. Netw. Secur. 19(2): 323-326 (2017) - [j25]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates. Int. J. Netw. Secur. 19(6): 950-954 (2017) - [j24]Lihua Liu, Qiang Zhang
, Dong Zhao, Aoqun Jian, Jianlong Ji, Qianqian Duan, Wendong Zhang
, Shengbo Sang
:
Preparation and Property Research of Strain Sensor Based on PDMS and Silver Nanomaterials. J. Sensors 2017: 7843052:1-7843052:8 (2017) - [j23]Jibing Wu
, Zhifei Wang, Yahui Wu, Lihua Liu, Su Deng, Hongbin Huang
:
A Tensor CP Decomposition Method for Clustering Heterogeneous Information Networks via Stochastic Gradient Descent Algorithms. Sci. Program. 2017: 2803091:1-2803091:13 (2017) - [j22]Yuting Chen
, Lihua Liu, Zhiqiang Gong
, Ping Zhong
:
Learning CNN to Pair UAV Video Image Patches. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 10(12): 5752-5768 (2017) - [j21]Lihua Liu
, Zongyang Shi, Kai Wu, Zhi Geng, Guangyou Fang:
A Bipolar Half-Sine Current Inverter for Airship-Borne Electromagnetic (AEM) Surveying. IEEE Trans. Ind. Electron. 64(12): 9477-9486 (2017) - 2016
- [j20]Zhengjun Cao, Lihua Liu, Zhenzhen Yan:
An Improved Lindell-Waisbard Private Web Search Scheme. Int. J. Netw. Secur. 18(3): 538-543 (2016) - [j19]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
On Two Kinds of Flaws in Some Server-Aided Verification Schemes. Int. J. Netw. Secur. 18(6): 1054-1059 (2016) - [j18]Xiao Jia, Lihua Liu, Guangyou Fang:
The Finite-Conducting Ground's Effect on the Inductance of a Rectangular Loop. J. Sensors 2016: 2765812:1-2765812:11 (2016) - [j17]Zhengjun Cao, Lihua Liu:
Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations". IEEE Trans. Parallel Distributed Syst. 27(5): 1551-1552 (2016) - [c21]Bo Li, Lihua Liu, Rui Huang, Jinluan Ren:
Analyzing the Impact of OWOM on Box Office Revenue in the World of Big Data. BigMM 2016: 166-169 - [i35]Zhengjun Cao, Lihua Liu:
A Note on "Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization". CoRR abs/1601.01079 (2016) - [i34]Zhengjun Cao, Lihua Liu:
A note on "achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud". CoRR abs/1603.07399 (2016) - [i33]Zhengjun Cao, Lihua Liu:
A Note on the Alon-Kleitman Argument for Sum-free Subset Theorem. CoRR abs/1606.07823 (2016) - [i32]Zhengjun Cao, Lihua Liu:
A Note On One Realization of a Scalable Shor Algorithm. CoRR abs/1611.00028 (2016) - [i31]Zhengjun Cao, Lihua Liu:
A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud". IACR Cryptol. ePrint Arch. 2016: 448 (2016) - [i30]Zhengjun Cao, Lihua Liu:
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud. IACR Cryptol. ePrint Arch. 2016: 698 (2016) - [i29]Zhengjun Cao, Lihua Liu:
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IACR Cryptol. ePrint Arch. 2016: 699 (2016) - [i28]Zhengjun Cao, Lihua Liu:
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented. IACR Cryptol. ePrint Arch. 2016: 979 (2016) - 2015
- [j16]Shangping Wang
, Lihua Liu, Jin Sun, Yaling Zhang:
Multi-party concurrent signatures scheme from lattice. Int. J. Inf. Commun. Technol. 7(2/3): 247-262 (2015) - [j15]Zhengjun Cao, Lihua Liu:
Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review. Int. J. Netw. Secur. 17(4): 454-462 (2015) - [c20]Zhengjun Cao, Zhenzhen Yan, Lihua Liu:
A fast string matching algorithm based on lowlight characters in the pattern. ICACI 2015: 179-182 - [i27]Zhengjun Cao, Lihua Liu:
A Note On Boneh-Gentry-Waters Broadcast Encryption Scheme and Its Like. CoRR abs/1502.04544 (2015) - [i26]Zhengjun Cao, Lihua Liu:
On the Weakness of Fully Homomorphic Encryption. CoRR abs/1511.05341 (2015) - [i25]Zhengjun Cao, Lihua Liu:
The Paillier's Cryptosystem and Some Variants Revisited. CoRR abs/1511.05787 (2015) - [i24]Zhengjun Cao, Lihua Liu:
Comment on Two schemes for Secure Outsourcing of Linear Programming. CoRR abs/1511.06470 (2015) - [i23]Lihua Liu, Zhengjun Cao:
A Note on "Efficient Algorithms for Secure Outsourcing of Bilinear Pairings". CoRR abs/1512.05413 (2015) - [i22]Zhengjun Cao, Lihua Liu:
On the Disadvantages of Pairing-based Cryptography. IACR Cryptol. ePrint Arch. 2015: 84 (2015) - [i21]Zhengjun Cao, Lihua Liu:
A Note on the Lindell-Waisbard Private Web Search Scheme. IACR Cryptol. ePrint Arch. 2015: 299 (2015) - [i20]Zhengjun Cao, Lihua Liu:
Comment on "Realization of a scalable Shor algorithm". IACR Cryptol. ePrint Arch. 2015: 1133 (2015) - [i19]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Comment on Demonstrations of Shor's Algorithm in the Past Decades. IACR Cryptol. ePrint Arch. 2015: 1207 (2015) - 2014
- [j14]Muhammad A. Shah, Emily Denton, Lihua Liu, Matthieu Schapira:
ChromoHub V2: cancer genomics. Bioinform. 30(4): 590-592 (2014) - [j13]Xinfan Xia, Lihua Liu, Shengbo Ye, Hongfei Guan, Guangyou Fang:
A Novel Subnanosecond Monocycle Pulse Generator for UWB Radar Applications. J. Sensors 2014: 150549:1-150549:4 (2014) - [i18]Zhengjun Cao, Lihua Liu:
A Fast String Matching Algorithm Based on Lowlight Characters in the Pattern. CoRR abs/1401.7110 (2014) - [i17]Zhengjun Cao, Lihua Liu:
Remarks on AKS Primality Testing Algorithm and A Flaw in the Definition of P. CoRR abs/1402.0146 (2014) - [i16]Zhengjun Cao, Lihua Liu:
A Note on the Bellare-Rivest Protocol for Translucent Cryptography. CoRR abs/1408.3452 (2014) - [i15]Zhengjun Cao, Lihua Liu:
Remarks on the Cryptographic Primitive of Attribute-based Encryption. CoRR abs/1408.4846 (2014) - [i14]Zhengjun Cao, Lihua Liu:
A Note on the Quantum Modular Exponentiation Method Used in Shor's Factoring Algorithm. CoRR abs/1408.6252 (2014) - [i13]Zhengjun Cao, Lihua Liu:
The Barth-Boneh-Waters Private Broadcast Encryption Scheme Revisited. CoRR abs/1408.6610 (2014) - [i12]Zhengjun Cao, Lihua Liu:
A Note on the Bellare-Rivest Protocol for Translucent Cryptography. IACR Cryptol. ePrint Arch. 2014: 679 (2014) - [i11]Zhengjun Cao, Lihua Liu:
Remarks on the Cryptographic Primitive of Attribute-based Encryption. IACR Cryptol. ePrint Arch. 2014: 680 (2014) - [i10]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm. IACR Cryptol. ePrint Arch. 2014: 828 (2014) - [i9]Zhengjun Cao, Lihua Liu:
Analysis of Lewko-Sahai-Waters Revocation System. IACR Cryptol. ePrint Arch. 2014: 937 (2014) - 2013
- [j12]Caisheng Chen, Jincheng Huang, Lihua Liu:
Multiple solutions to the nonhomogeneous p-Kirchhoff elliptic equation with concave-convex nonlinearities. Appl. Math. Lett. 26(7): 754-759 (2013) - [c19]Jinluan Ren, Lihua Liu, Bo Li, Liping Zhao, Hu Liu, Xiaolong Liu, Cuiying Wei, Chuanzhen Wang:
Measuring the Utility of Mobile Phone Video Service Based on A Service Value Network Model. AMCIS 2013 - [c18]Lihua Liu, Zhengjun Cao, Qian Sha:
Improved Randomized Algorithm for Square Root Extraction. ICICA (2) 2013: 527-535 - [c17]Shangping Wang
, Lihua Liu, Juanjuan Chen, Jin Sun, Xinwen Zhang, Yaling Zhang:
Lattice-Based Multi-party Concurrent Signatures Scheme. INCoS 2013: 568-572 - [i8]Zhengjun Cao, Lihua Liu:
Ordered Probability Mass Function. CoRR abs/1309.1432 (2013) - [i7]Zhengjun Cao, Lihua Liu:
Improvement of One Anonymous Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2013: 505 (2013) - [i6]Zhengjun Cao, Lihua Liu:
Improvement of One Adaptive Oblivious Transfer Scheme. IACR Cryptol. ePrint Arch. 2013: 517 (2013) - [i5]Zhengjun Cao, Lihua Liu:
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis. IACR Cryptol. ePrint Arch. 2013: 788 (2013) - [i4]Zhengjun Cao, Lihua Liu:
A Note on Bilinear Groups of a Large Composite Order. IACR Cryptol. ePrint Arch. 2013: 812 (2013) - 2012
- [j11]Lihua Liu, Xi Ting Zhen, Emily Denton, Brian D. Marsden, Matthieu Schapira:
ChromoHub: a data hub for navigators of chromatin-mediated signalling. Bioinform. 28(16): 2205-2206 (2012) - [j10]Lihua Liu, Desmond C. McLernon, Mounir Ghogho, Weidong Hu, Jian Huang:
Ballistic missile detection via micro-Doppler frequency estimation from radar return. Digit. Signal Process. 22(1): 87-95 (2012) - [j9]Lihua Liu, Xiaoyong Du, Mounir Ghogho, Weidong Hu, Desmond C. McLernon:
Precession missile feature extraction using sparse component analysis of radar measurements. EURASIP J. Adv. Signal Process. 2012: 24 (2012) - [j8]Lihua Liu, Mounir Ghogho, Desmond C. McLernon, Weidong Hu:
Pseudo-Maximum Likelihood Estimation of ballistic missile precession frequency. Signal Process. 92(9): 2018-2028 (2012) - [c16]Tao Zhou, Huiling Lu, Lihua Liu, Longquan Yong
, Shouheng Tuo:
A new classification algorithm based on ensemble PSO_SVM and clustering analysis. GrC 2012: 673-677 - [c15]Zhigang Wen, Zibo Meng, Qing Wang, Lihua Liu, Junwei Zou, Li Wang:
An FPGA Real-Time Spectrum Sensing for Cognitive Radio in Very High Throughput WLAN. ICPCA/SWS 2012: 606-616 - [c14]Jinluan Ren, Hu Liu, Lihua Liu:
Mobile Phone TV Services Business Model Based on Value Co-creation. SRII Global Conference 2012: 435-439 - 2011
- [c13]Lihua Liu, Mounir Ghogho, Desmond C. McLernon, Weidong Hu:
Pseudo Maximum Likelihood Estimations of ballistic missile precession frequency. ICASSP 2011: 3796-3799 - 2010
- [j7]Lihua Liu, Yuzhen Bai
:
Erratum to: "New oscillation criteria for second-order nonlinear neutral delay differential equations" [J. Comput. Appl. Math. 231(2009) 657-663]. J. Comput. Appl. Math. 233(10): 2755 (2010) - [j6]Lihua Liu, Guangyou Fang:
A Novel UWB Sampling Receiver and Its Applications for Impulse GPR Systems. IEEE Geosci. Remote. Sens. Lett. 7(4): 690-693 (2010) - [c12]Lihua Liu, Mounir Ghogho, Desmond C. McLernon, Weidong Hu:
Ballistic missile precessing frequency extraction based on maximum likelihood estimation. EUSIPCO 2010: 1562-1566 - [c11]Lihua Liu, Desmond C. McLernon, Mounir Ghogho, Weidong Hu:
Micro-Doppler extraction from ballistic missile radar returns using time-frequency analysis. ISWCS 2010: 780-784 - [c10]Lihua Liu, Zhengjun Cao:
Improvement of one escrow-free identity-based signature. WCNIS 2010: 602-606
2000 – 2009
- 2009
- [j5]Lihua Liu, Yuzhen Bai
:
New oscillation criteria for second-order nonlinear neutral delay differential equations. J. Comput. Appl. Math. 231(2): 657-663 (2009) - [c9]Zhengjun Cao, Lihua Liu:
A General Attack against Several Group Signatures. ACIS-ICIS 2009: 635-640 - [c8]Lihua Liu, Zhengjun Cao:
Analysis of Two Signature Schemes from CIS'2006. CIS (1) 2009: 405-408 - [c7]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Generalized Greedy Algorithm for Shortest Superstring. Complex (2) 2009: 1526-1531 - 2008
- [c6]Zhengjun Cao, Lihua Liu:
A Group Key Agreement Scheme Revisited. IAS 2008: 95-98 - [c5]Lihua Liu, Mingyu Li, Qiong Li, Yan Liang:
Perceptually Transparent Information Hiding in G.729 Bitstream. IIH-MSP 2008: 406-409 - [p1]Lihua Liu, Zhengjun Cao:
Security Analysis of One Verifiable Encryption Scheme. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 181-187 - 2007
- [c4]Zhengjun Cao, Lihua Liu:
Boudot's Range-Bounded Commitment Scheme Revisited. ICICS 2007: 230-238 - [c3]Zhengjun Cao, Lihua Liu:
A Strong RSA Signature Scheme and Its Application. SNPD (1) 2007: 111-115 - 2006
- [j4]Lihua Liu, Hao Shen:
Explicit constructions of separating hash families from algebraic curves over finite fields. Des. Codes Cryptogr. 41(2): 221-233 (2006) - [j3]Lihua Liu, Zhengjun Cao:
On computing ordN(2) and its application. Inf. Comput. 204(7): 1173-1178 (2006) - [c2]Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun:
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. Inscrypt 2006: 1-12 - 2005
- [j2]Fang Zhao, Zhenyu Xuan, Lihua Liu, Michael Q. Zhang:
TRED: a Transcriptional Regulatory Element Database and a platform for in silico gene regulation studies. Nucleic Acids Res. 33(Database-Issue): 103-107 (2005) - [i3]Lihua Liu, Zhengjun Cao:
On the Security of a Group Signature Scheme with Strong Separability. IACR Cryptol. ePrint Arch. 2005: 41 (2005) - 2004
- [i2]Lihua Liu, Zhengjun Cao:
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. IACR Cryptol. ePrint Arch. 2004: 262 (2004) - [i1]Zhengjun Cao, Lihua Liu:
Untraceability of Wang-Fu Group Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 268 (2004) - 2000
- [j1]Jianer Chen, Lihua Liu, Weijia Jia:
Improvement on vertex cover for low-degree graphs. Networks 35(4): 253-259 (2000) - [c1]Jianer Chen, Lihua Liu, Songqiao Chen, Weijia Jia:
An Intuitive and Effective New Representation for Interconnection Network Structures. ISAAC 2000: 350-361
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-03-02 23:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint