default search action
Muhammad Usama
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Muhammad Usama, Muhammad Naveed Aman, Biplab Sikdar:
Runtime Self-Attestation of FPGA-Based IoT Devices. IEEE Internet Things J. 11(20): 33406-33417 (2024) - [j31]Muhammad Ahmad, Usman Ghous, Muhammad Usama, Manuel Mazzara:
WaveFormer: Spectral-Spatial Wavelet Transformer for Hyperspectral Image Classification. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j30]Muhammad Ahmad, Muhammad Usama, Adil Mehmood Khan, Salvatore Distefano, Hamad Ahmed Altuwaijri, Manuel Mazzara:
Spatial-Spectral Transformer With Conditional Position Encoding for Hyperspectral Image Classification. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j29]Farrukh Pervez, Moazzam Shoukat, Muhammad Usama, Moid Sandhu, Siddique Latif, Junaid Qadir:
Affective Computing and the Road to an Emotionally Intelligent Metaverse. IEEE Open J. Comput. Soc. 5: 195-214 (2024) - [j28]Farrukh Pervez, Moazzam Shoukat, Varsha Suresh, Muhammad Umar Bin Farooq, Moid Sandhu, Adnan Qayyum, Muhammad Usama, Anna M. Girardi, Siddique Latif, Junaid Qadir:
Medicine's New Rhythm: Harnessing Acoustic Sensing via the Internet of Audio Things for Healthcare. IEEE Open J. Comput. Soc. 5: 491-510 (2024) - [j27]Muhammad Ahmad, Muhammad Usama, Manuel Mazzara, Salvatore Distefano, Hamad Ahmed Altuwaijri, Silvia Liberata Ullo:
Fusing Transformers in a Tuning Fork Structure for Hyperspectral Image Classification Across Disjoint Samples. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 18167-18181 (2024) - [c21]Syed Waleed Hyder, Muhammad Usama, Anas Zafar, Muhammad Naufil, Fawad Javed Fateh, Andrey Konin, M. Zeeshan Zia, Quoc-Huy Tran:
Action Segmentation Using 2D Skeleton Heatmaps and Multi-Modality Fusion. ICRA 2024: 1048-1055 - [i32]Muhammad Usama, Zahid Masood, Shahroz Khan, Konstantinos V. Kostas, Panagiotis D. Kaklis:
Generative VS non-Generative Models in Engineering Shape Optimization. CoRR abs/2402.08540 (2024) - [i31]Muhammad Usama, Yunkyung Hwang, Jaehong Kim:
AI-driven, Model-Free Current Control: A Deep Symbolic Approach for Optimal Induction Machine Performance. CoRR abs/2405.08277 (2024) - [i30]Shahroz Khan, Zahid Masood, Muhammad Usama, Konstantinos V. Kostas, Panagiotis D. Kaklis, Wei Chen:
Physics-Informed Geometric Operators to Support Surrogate, Dimension Reduction and Generative Models for Engineering Design. CoRR abs/2407.07611 (2024) - [i29]Muhammad Ahmad, Muhammad Hassaan Farooq Butt, Muhammad Usama, Hamad Ahmed Altuwaijri, Manuel Mazzara, Salvatore Distefano:
Multi-head Spatial-Spectral Mamba for Hyperspectral Image Classification. CoRR abs/2408.01224 (2024) - [i28]Muhammad Ahmad, Muhammad Usama, Manual Mazzara:
WaveMamba: Spatial-Spectral Wavelet Mamba for Hyperspectral Image Classification. CoRR abs/2408.01231 (2024) - [i27]Muhammad Ahmad, Muhammad Hassaan Farooq Butt, Muhammad Usama, Adil Mehmood Khan, Manuel Mazzara, Salvatore Distefano, Hamad Ahmed Altuwaijri, Swalpa Kumar Roy, Jocelyn Chanussot, Danfeng Hong:
Spatial-Spectral Morphological Mamba for Hyperspectral Image Classification. CoRR abs/2408.01372 (2024) - 2023
- [j26]Irfan Ahmed Khan, Hazlie Mokhlis, Nurulafiqah Nadzirah Mansor, Hazlee Azil Illias, Muhammad Usama, Amil Daraz, Li Wang, Lilik Jamilatul Awalin:
Load Frequency Control Using Golden Eagle Optimization for Multi-Area Power System Connected Through AC/HVDC Transmission and Supported With Hybrid Energy Storage Devices. IEEE Access 11: 44672-44695 (2023) - [c20]Moazzam Shoukat, Muhammad Usama, Hafiz Shehbaz Ali, Siddique Latif:
Breaking Barriers: Can Multilingual Foundation Models Bridge the Gap in Cross-Language Speech Emotion Recognition? SNAMS 2023: 1-9 - [d1]Muhammad Usama, Muhammad Luqman:
Climatic, population and daily water consumption dataset of sub tropical humid region of Pakistan. IEEE DataPort, 2023 - [i26]Ibrahim Malik, Siddique Latif, Sanaullah Manzoor, Muhammad Usama, Junaid Qadir, Raja Jurdak:
Emotions Beyond Words: Non-Speech Audio Emotion Recognition With Edge Computing. CoRR abs/2305.00725 (2023) - [i25]Siddique Latif, Muhammad Usama, Mohammad Ibrahim Malik, Björn W. Schuller:
Can Large Language Models Aid in Annotating Speech Emotional Data? Uncovering New Frontiers. CoRR abs/2307.06090 (2023) - [i24]Siddique Latif, Moazzam Shoukat, Fahad Shamshad, Muhammad Usama, Yi Ren, Heriberto Cuayáhuitl, Wenwu Wang, Xulong Zhang, Roberto Togneri, Erik Cambria, Björn W. Schuller:
Sparks of Large Audio Models: A Survey and Outlook. CoRR abs/2308.12792 (2023) - [i23]Syed Waleed Hyder, Muhammad Usama, Anas Zafar, Muhammad Naufil, Fawad Javed Fateh, Andrey Konin, M. Zeeshan Zia, Quoc-Huy Tran:
Action Segmentation Using 2D Skeleton Heatmaps. CoRR abs/2309.06462 (2023) - 2022
- [j25]Muhammad Usama, Dong Eui Chang:
Learning Flexible and Fair Data Representations. IEEE Access 10: 99235-99242 (2022) - [j24]Muhammad Usama, Rui Ma, Jason Hart, Mikaela Wojcik:
Physics-Informed Neural Networks (PINNs)-Based Traffic State Estimation: An Application to Traffic Network. Algorithms 15(12): 447 (2022) - [j23]Bilal Yousaf, Muhammad Usama, Waqas Sultani, Arif Mahmood, Junaid Qadir:
Fake visual content detection using two-stream convolutional neural networks. Neural Comput. Appl. 34(10): 7991-8004 (2022) - [j22]Muhammad Usama, In-Young Lee:
Data-Driven Non-Linear Current Controller Based on Deep Symbolic Regression for SPMSM. Sensors 22(21): 8240 (2022) - [j21]Muhammad Usama, M. Asif Naeem, Farhaan Mirza:
Multi-Class Skin Lesions Classification Using Deep Features. Sensors 22(21): 8311 (2022) - [j20]Rana Tallal Javed, Muhammad Usama, Waleed Iqbal, Junaid Qadir, Gareth Tyson, Ignacio Castro, Kiran Garimella:
A deep dive into COVID-19-related messages on WhatsApp in Pakistan. Soc. Netw. Anal. Min. 12(1): 5 (2022) - [j19]Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala I. Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato:
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning. IEEE Trans. Artif. Intell. 3(2): 90-109 (2022) - [c19]Musa Muhammad, Muhammad Usama, Momin Uppal:
Extremism on Social Media: Lynching of Priyantha Kumara Diyawadana. ASONAM 2022: 508-509 - [c18]Archit Parnami, Muhammad Usama, Liyue Fan, Minwoo Lee:
Privacy Enhancement for Cloud-Based Few-Shot Learning. IJCNN 2022: 1-10 - [c17]Caner Kilinc, Mahesh K. Marina, Muhammad Usama, Salih Ergüt, Jon Crowcroft, Tugrul Gundogdu, Ilhan Akinci:
JADE: Data-Driven Automated Jammer Detection Framework for Operational Mobile Networks. INFOCOM 2022: 1139-1148 - [i22]Muhammad Usama, Hafeez Anwar, Muhammad Muaz Shahid, Abbas Anwar, Saeed Anwar:
Vehicle and License Plate Recognition with Novel Dataset for Toll Collection. CoRR abs/2202.05631 (2022) - [i21]Archit Parnami, Muhammad Usama, Liyue Fan, Minwoo Lee:
Privacy Enhancement for Cloud-Based Few-Shot Learning. CoRR abs/2205.07864 (2022) - [i20]Siddique Latif, Hafiz Shehbaz Ali, Muhammad Usama, Rajib Rana, Björn W. Schuller, Junaid Qadir:
AI-Based Emotion Recognition: Promise, Peril, and Prescriptions for Prosocial Path. CoRR abs/2211.07290 (2022) - 2021
- [j18]Muhammad Usama, Mahmoud Moghavvemi, Hazlie Mokhlis, Nurulafiqah Nadzirah Mansor, Haroon Farooq, Alireza Pourdaryaei:
Optimal Protection Coordination Scheme for Radial Distribution Network Considering ON/OFF-Grid. IEEE Access 9: 34921-34937 (2021) - [j17]Muhammad Usama, Hazlie Mokhlis, Mahmoud Moghavvemi, Nurulafiqah Nadzirah Mansor, Majed A. Alotaibi, Munir Azam Muhammad, Abdullah Akram Bajwa:
A Comprehensive Review on Protection Strategies to Mitigate the Impact of Renewable Energy Sources on Interconnected Distribution Networks. IEEE Access 9: 35740-35765 (2021) - [j16]Suzana Pil Ramli, Muhammad Usama, Hazlie Mokhlis, Wei Ru Wong, Muhamad Hatta Hussain, Munir Azam Muhammad, Nurulafiqah Nadzirah Mansor:
Optimal directional overcurrent relay coordination based on computational intelligence technique: a review. Turkish J. Electr. Eng. Comput. Sci. 29(3): 1284-1307 (2021) - [j15]Muhammad Usama, Jaehong Kim:
Performance improvement speed control of IPMSM drive based on nonlinear current control. Turkish J. Electr. Eng. Comput. Sci. 29(4): 1994-2011 (2021) - [j14]Muhammad Usama, Inaam Ilahi, Junaid Qadir, Rupendra Nath Mitra, Mahesh K. Marina:
Examining Machine Learning for 5G and Beyond Through an Adversarial Lens. IEEE Internet Comput. 25(2): 26-34 (2021) - [j13]Muhammad Usama, Qutaibah M. Malluhi, Nordin Zakaria, Imran Razzak, Waheed Iqbal:
An efficient secure data compression technique based on chaos and adaptive Huffman coding. Peer-to-Peer Netw. Appl. 14(5): 2651-2664 (2021) - [j12]Muhammad Usama, Jaehong Kim:
Robust adaptive observer-based finite control set model predictive current control for sensorless speed control of surface permanent magnet synchronous motor. Trans. Inst. Meas. Control 43(6) (2021) - [c16]Kai Xu, Rajkarn Singh, Marco Fiore, Mahesh K. Marina, Hakan Bilen, Muhammad Usama, Howard Benn, Cezary Ziemlicki:
SpectraGAN: spectrum based generation of city scale spatiotemporal mobile network traffic data. CoNEXT 2021: 243-258 - [i19]Bilal Yousaf, Muhammad Usama, Waqas Sultani, Arif Mahmood, Junaid Qadir:
Fake Visual Content Detection Using Two-Stream Convolutional Neural Networks. CoRR abs/2101.00676 (2021) - 2020
- [j11]Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala I. Al-Fuqaha:
Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward. IEEE Commun. Surv. Tutorials 22(2): 998-1026 (2020) - [j10]Adnan Qayyum, Aneeqa Ijaz, Muhammad Usama, Waleed Iqbal, Junaid Qadir, Yehia Elkhatib, Ala I. Al-Fuqaha:
Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security. Frontiers Big Data 3: 587139 (2020) - [j9]Muhammad Usama, Junaid Qadir, Ala I. Al-Fuqaha, Mounir Hamdi:
The Adversarial Machine Learning Conundrum: Can the Insecurity of ML Become the Achilles' Heel of Cognitive Networks? IEEE Netw. 34(1): 196-203 (2020) - [c15]Rana Tallal Javed, Mirza Elaaf Shuja, Muhammad Usama, Junaid Qadir, Waleed Iqbal, Gareth Tyson, Ignacio Castro, Kiran Garimella:
A First Look at COVID-19 Messages on WhatsApp in Pakistan. ASONAM 2020: 118-125 - [c14]Inaam Ilahi, Muhammad Usama, Muhammad Omer Farooq, Muhammad Umar Janjua, Junaid Qadir:
LoRaDRL: Deep Reinforcement Learning Based Adaptive PHY Layer Transmission Parameters Selection for LoRaWAN. LCN 2020: 457-460 - [i18]Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala I. Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato:
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning. CoRR abs/2001.09684 (2020) - [i17]Muhammad Usama, Jaehong Kim:
Vector Control Algorithm Based on Different Current Control Switching Techniques for Ac Motor Drives. CoRR abs/2005.04651 (2020) - [i16]Muhammad Usama, Rupendra Nath Mitra, Inaam Ilahi, Junaid Qadir, Mahesh K. Marina:
Examining Machine Learning for 5G and Beyond through an Adversarial Lens. CoRR abs/2009.02473 (2020) - [i15]Rana Tallal Javed, Mirza Elaaf Shuja, Muhammad Usama, Junaid Qadir, Waleed Iqbal, Gareth Tyson, Ignacio Castro, Kiran Garimella:
A First Look at COVID-19 Messages on WhatsApp in Pakistan. CoRR abs/2011.09145 (2020) - [i14]Inaam Ilahi, Muhammad Usama, Muhammad Omer Farooq, Muhammad Umar Janjua, Junaid Qadir:
Intelligent Resource Allocation in Dense LoRa Networks using Deep Reinforcement Learning. CoRR abs/2012.11867 (2020)
2010 – 2019
- 2019
- [j8]Muhammad Usama, Junaid Qadir, Aunn Raza, Hunain Arif, Kok-Lim Alvin Yau, Yehia Elkhatib, Amir Hussain, Ala I. Al-Fuqaha:
Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges. IEEE Access 7: 65579-65615 (2019) - [j7]Muhammad Usama, Osama Rehman, Imran Memon, Safdar Rizvi:
An efficient construction of key-dependent substitution box based on chaotic sine map. Int. J. Distributed Sens. Networks 15(12) (2019) - [j6]Mamdouh Alenezi, Muhammad Usama, Khaled Mohamad Almustafa, Waheed Iqbal, Muhammad Ali Raza, Tanveer Khan:
An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments. Int. J. Inf. Secur. Priv. 13(2): 14-31 (2019) - [j5]Muhammad Usama, Melike Erol-Kantarci:
A Survey on Recent Trends and Open Issues in Energy Efficiency of 5G. Sensors 19(14): 3126 (2019) - [j4]Siddique Latif, Adnan Qayyum, Muhammad Usama, Junaid Qadir, Andrej J. Zwitter, Muhammad Shahzad:
Caveat Emptor: The Risks of Using Big Data for Human Development. IEEE Technol. Soc. Mag. 38(3): 82-90 (2019) - [c13]Muhammad Usama, Yongjun Shen, Onaira Zahoor:
A free-floating bike repositioning problem with faulty bikes. ANT/EDI40 2019: 155-162 - [c12]Muhammad Ali Raza, Muhammad Usama, Waheed Iqbal, Faisal Bukhari:
Secure NoSQL Over Cloud Using Data Decomposition and Queryable Encryption. INTAP 2019: 409-421 - [c11]Onaira Zahoor, Yongjun Shen, Muhammad Usama, Qiong Bao, Amir Atlas, Tom Brijs:
Assessing Fitness to Drive among Older Adults using Random Forest. ISKE 2019: 648-653 - [c10]Muhammad Usama, Muhammad Asim, Siddique Latif, Junaid Qadir, Ala I. Al-Fuqaha:
Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. IWCMC 2019: 78-83 - [c9]Muhammad Usama, Adnan Qayyum, Junaid Qadir, Ala I. Al-Fuqaha:
Black-box Adversarial Machine Learning Attack on Network Traffic Classification. IWCMC 2019: 84-89 - [c8]Salah-ud-din Farooq, Muhammad Usama, Junaid Qadir, Muhammad Ali Imran:
Adversarial ML Attack on Self Organizing Cellular Networks. UCET 2019: 1-5 - [c7]Muhammad Usama, Muhammad Asim, Junaid Qadir, Ala I. Al-Fuqaha, Muhammad Ali Imran:
Adversarial Machine Learning Attack on Modulation Classification. UCET 2019: 1-4 - [i13]Siddique Latif, Adnan Qayyum, Muhammad Usama, Junaid Qadir, Andrej J. Zwitter, Muhammad Shahzad:
Caveat emptor: the risks of using big data for human development. CoRR abs/1905.00493 (2019) - [i12]Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala I. Al-Fuqaha:
Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward. CoRR abs/1905.12762 (2019) - [i11]Muhammad Usama, Junaid Qadir, Ala I. Al-Fuqaha, Mounir Hamdi:
The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks? CoRR abs/1906.00679 (2019) - [i10]Muhammad Usama, Dong Eui Chang:
Learning-Driven Exploration for Reinforcement Learning. CoRR abs/1906.06890 (2019) - [i9]Muhammad Usama, Dong Eui Chang:
Robotic Navigation using Entropy-Based Exploration. CoRR abs/1906.06969 (2019) - [i8]Muhammad Usama, Junaid Qadir, Ala I. Al-Fuqaha:
Black-box Adversarial ML Attack on Modulation Classification. CoRR abs/1908.00635 (2019) - [i7]Salah-ud-din Farooq, Muhammad Usama, Junaid Qadir, Muhammad Ali Imran:
Adversarial ML Attack on Self Organizing Cellular Networks. CoRR abs/1909.12161 (2019) - [i6]Muhammad Usama, Muhammad Asim, Junaid Qadir, Ala I. Al-Fuqaha, Muhammad Ali Imran:
Adversarial Machine Learning Attack on Modulation Classification. CoRR abs/1909.12167 (2019) - 2018
- [c6]Muhammad Usama, Dong Eui Chang:
Towards Robust Neural Networks with Lipschitz Continuity. IWDW 2018: 373-389 - [c5]Muhammad Usama, Junaid Qadir, Ala I. Al-Fuqaha:
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward. LCN Workshops 2018: 90-97 - [c4]Touseef Yaqoob, Muhammad Usama, Junaid Qadir, Gareth Tyson:
On Analyzing Self-Driving Networks: A Systems Thinking Approach. SelfDN@SIGCOMM 2018: 1-7 - [i5]Touseef Yaqoob, Muhammad Usama, Junaid Qadir, Gareth Tyson:
On Analyzing Self-Driving Networks: A Systems Thinking Approach. CoRR abs/1804.03116 (2018) - [i4]Muhammad Usama, Junaid Qadir, Ala I. Al-Fuqaha:
Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward. CoRR abs/1810.07242 (2018) - [i3]Muhammad Usama, Dong Eui Chang:
Towards Robust Neural Networks with Lipschitz Continuity. CoRR abs/1811.09008 (2018) - 2017
- [j3]Junaid Qadir, Arjuna Sathiaseelan, Umar Bin Farooq, Muhammad Usama, Muhammad Ali Imran, Muhammad Shafique:
Approximate Networking for Universal Internet Access. Future Internet 9(4): 94 (2017) - [i2]Siddiq Latif, Farrukh Pervez, Muhammad Usama, Junaid Qadir:
Artificial Intelligence as an Enabler for Cognitive Self-Organizing Future Networks. CoRR abs/1702.02823 (2017) - [i1]Muhammad Usama, Junaid Qadir, Aunn Raza, Hunain Arif, Kok-Lim Alvin Yau, Yehia Elkhatib, Amir Hussain, Ala I. Al-Fuqaha:
Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges. CoRR abs/1709.06599 (2017) - 2013
- [j2]Muhammad Usama, Fahad Bin Muhaya:
Framework for Secure Wireless Communication in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2010
- [j1]Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee:
Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2): 326-337 (2010)
2000 – 2009
- 2009
- [c3]Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan:
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. ICIC (1) 2009: 1014-1024 - 2007
- [c2]Muhammad Usama, Tad A. Kwasniewski:
A 40 GHz Quadrature LC VCO and Frequency Divider in 90-nm CMOS Technology. ISCAS 2007: 3047-3050 - 2004
- [c1]Muhammad Usama, Tad A. Kwasniewski:
Design and comparison of CMOS Current Mode Logic latches. ISCAS (4) 2004: 353-356
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint