


Остановите войну!
for scientists:
Jun Li 0001
Person information

- affiliation: University of Oregon, Eugene, OR, USA
- affiliation (PhD 2002): University of California at Los Angeles, CA, USA
Other persons with the same name
- Jun Li — disambiguation page
- Jun Li 0002
— Chinese Academy of Sciences, Computer Network Information Center, Beijing, China (and 1 more)
- Jun Li 0003 — Tsinghua University, RIIT / TNList, Beijing, China
- Jun Li 0004
— Nanjing University of Science and Technology, School of Electronic and Optical Engineering, China (and 5 more)
- Jun Li 0005 — Institute for Infocomm Research, Singapore (and 1 more)
- Jun Li 0006 — Communications Research Centre Canada
- Jun Li 0007 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China (and 1 more)
- Jun Li 0008 — HP Laboratories, Palo Alto
- Jun Li 0009
— Sun Yat-sen University, School of Geography and Planning, Guangzhou, China (and 2 more)
- Jun Li 0010
— University of Technology Sydney, Centre for Quantum Computation and Intelligent Systems / Faculty of Engineering and Information Technology, Ultimo, NSW, Australia (and 1 more)
- Jun Li 0011
— Southeast University, School of Automation, Nanjing, China (and 3 more)
- Jun Li 0012
— China West Normal University, School of Mathematics and Information, Nanchong, China
- Jun Li 0013 — Department of Land Economy, University of Cambridge
- Jun Li 0014
— Communication University of China, School of Science, Beijing, China
- Jun Li 0015 — CAS Research Center on Fictitious Economy & Data Science
- Jun Li 0016 — CAS Research Center on Fictitious Economy & Data Science
- Jun Li 0017
— City University of New York, Queens College, Department of Computer Science, NY, USA (and 3 more)
- Jun Li 0018 — Nanjing University of Technology, College of Automation, China
- Jun Li 0019 — Nanjing University of Posts and Telecommunication
- Jun Li 0020 — National University of Defense Technology, College of Electronic Science, Changsha, China
- Jun Li 0021
— China University of Mining and Technology, College of Geoscience and Surveying Engineering, Beijing, China (and 1 more)
- Jun Li 0022 — Nanjing University, State Key Laboratory for Novel Software Technology, China
- Jun Li 0023
— University of California Riverside, Department of Statistics, CA, USA (and 1 more)
- Jun Li 0024 — University of California, San Diego
- Jun Li 0025 — University of Hertfordshire, UK
- Jun Li 0026
— University of Wisconsin-Madison, Cooperative Institute for Meteorological Satellite Studies, Madison, WI, USA
- Jun Li 0027
— Northeastern University, Department of Electrical and Computer Engineering, Boston, MA, USA (and 1 more)
- Jun Li 0028
— Huawei Technologies Co., Ltd., Qingshuihe, Shenzhen, China
- Jun Li 0030
— Kansas State University, Department of Chemistry, Manhattan, KS, USA (and 1 more)
- Jun Li 0032
— Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China
- Jun Li 0033
— Southeast University, School of Automation, Nanjing, China (and 1 more)
- Jun Li 0034 — Rutgers University, WINLAD, New Brunswick, NJ, USA
- Jun Li 0035
— Dalian University of Technology, Faculty of Electronic Information and Electrical Engineering, China (and 2 more)
- Jun Li 0036
— Guangzhou University, School of Mechanical and Electrical Engineering, China (and 1 more)
- Jun Li 0037 — Zhejiang University, Institute of Information and Communication Engineering, Hangzhou, China
- Jun Li 0038 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Jun Li 0039 — China Electronics Technology Group Corporation, Second Research Institute, Taiyuan, China
- Jun Li 0040 — Nanjing University, Collaborative Innovation Center of Advanced Microstructures, School of Physics, National Laboratory of Solid State Microstructures, China
- Jun Li 0041 — Philips Research North America, Cambridge, MA, USA
- Jun Li 0042 — National University of Defense Technology, School of Computer Science, China (and 1 more)
- Jun Li 0043 — LMU Munich, Germany
- Jun Li 0045
— Beihang University, School of Computer Science and Engineering, Beijing, China
- Jun Li 0046 — Jiangsu Yitong High-tech Co., Ltd., China
- Jun Li 0047 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Jun Li 0048 — Anhui University, School of Computer Science and Technology, Hefei, China
- Jun Li 0049
— University of Michigan, Ross School of Business, Ann Arbor, MI, USA (and 1 more)
- Jun Li 0050
— China Industrial Control Systems Cyber Emergency Response Team, Informatization Standard Research Division, Beijing, China (and 1 more)
- Jun Li 0051
— City University of Hong Kong, Department of Infectious Diseases and Public Health, Hong Kong (and 2 more)
- Jun Li 0052
— University of Notre Dame, Department of Applied and Computational Mathematics and Statistics, IN, USA
- Jun Li 0053
— Curtin University, Department of Civil Engineering, Perth, WA, Australia (and 1 more)
- Jun Li 0054
— Lanzhou University of Technology, School of Science, China
- Jun Li 0055
— Tsinghua University, Department of Chemistry, Beijing, China (and 3 more)
- Jun Li 0056
— Wuhan University of Technology, School of Logistics Engineering, China
- Jun Li 0057
— University of Science and Technology of China, Laboratory for Future Networks, Hefei, China
- Jun Li 0058
— University of Science and Technology of China, School of Management, Hefei, China
- Jun Li 0059
— KTH Royal Institute of Technology, Optical Networks Laboratory, Stockholm, Sweden
- Jun Li 0060
— Xinxiang Medical University, Modern Educational Technology Center, China
- Jun Li 0061
— Wenzhou University, School of Mathematical and Electronic Information Engineering, China
- Jun Li 0062
— Southwest University, College of Computer and Information Science, Chongqing, China
- Jun Li 0063
— Guilin University of Electronic Technology, School of Information and Communication, China
- Jun Li 0064
— Shanghai Maritime University, Institute of Logistics Science & Engineering, China
- Jun Li 0065
— Nanjing University of Information Science and Technology, Binjiang College, Wuxi, China (and 3 more)
- Jun Li 0066 — University of Arizona Tucson, Department of Electrical and Computer Engineering, Tucson, AZ, USA
- Jun Li 0067 — Wuhan University of Science and Technology, School of Computer Science and Technology, China (and 1 more)
- Jun Li 0068
— University of Texas, MD Anderson Cancer Center, Houston, TX, USA (and 1 more)
- Jun Li 0069
— Chang'an University, School of Geological Engineering and Geomatics, Xi'an, China
- Jun Li 0070
— Chongqing University of Posts and Telecommunications, School of Computer Science and Technology, China
- Jun Li 0071
— Hunan University, Changsha, China
- Jun Li 0072
— Beihang University, State Key Lab of Software Development Environment, Beijing, China
- Jun Li 0073
— Tianjin Normal University, School of Mathematics, China
- Jun Li 0074
— Qilu University of Technology (Shandong Academy of Sciences), School of Electrical Engineering and Automation, Jinan, China (and 1 more)
- Jun Li 0075
— Sun Yat-sen University, School of Intelligent Systems Engineering, Guangzhou, China (and 1 more)
- Jun Li 0076
— Beijing Information Science and Technology University, China (and 1 more)
- Jun Li 0077
— Hubei Minzu University, School of Information Engineering, Enshi, China
- Jun Li 0078
— Ningbo University of Technology, School of Electronic and Information Engineering, China (and 1 more)
- Jun Li 0079
— Wuhan University, School of Electrical Engineering and Automation, China (and 1 more)
- Jun Li 0080
— South China Normal University, School of Physics and Telecommunication Engineering, Guangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j23]Lumin Shi
, Jun Li
, Mingwei Zhang
, Peter L. Reiher
:
On Capturing DDoS Traffic Footprints on the Internet. IEEE Trans. Dependable Secur. Comput. 19(4): 2755-2770 (2022) - [c51]Zhangxiang Hu, Jun Li, Samuel Mergendahl, Christopher Wilson:
Toward a Resilient Key Exchange Protocol for IoT. CODASPY 2022: 214-225 - [i2]Jelena Mirkovic, Yebo Feng, Jun Li:
Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures. CoRR abs/2203.00742 (2022) - 2021
- [j22]Yebo Feng
, Jun Li
, Lei Jiao
, Xintao Wu
:
Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic. IEEE Trans. Dependable Secur. Comput. 18(5): 2149-2163 (2021) - [j21]Lin Wang
, Lei Jiao
, Ting He
, Jun Li
, Henri E. Bal
:
Service Placement for Collaborative Edge Applications. IEEE/ACM Trans. Netw. 29(1): 34-47 (2021) - [j20]Jianzhen Luo, Jun Li, Lei Jiao, Jun Cai:
On the Effective Parallelization and Near-Optimal Deployment of Service Function Chains. IEEE Trans. Parallel Distributed Syst. 32(5): 1238-1255 (2021) - 2020
- [c50]Devkishen Sisodia, Jun Li, Lei Jiao:
In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection. AsiaCCS 2020: 153-164 - [c49]Yebo Feng
, Devkishen Sisodia, Jun Li:
POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic. AsiaCCS 2020: 907-909 - [c48]Samuel Mergendahl, Jun Li:
Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things. CNS 2020: 1-9 - [c47]Thomas Cilloni
, Xiyu Cai, Charles Fleming, Jun Li:
Understanding and Detecting Majority Attacks. DAPPS 2020: 11-21 - [c46]Yebo Feng
, Jun Li, Thanh Nguyen:
Application-Layer DDoS Defense with Reinforcement Learning. IWQoS 2020: 1-10 - [c45]Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li:
Bridging Missing Gaps in Evaluating DDoS Research. CSET @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [j19]Lin Wang
, Lei Jiao
, Jun Li
, Julien Gedeon
, Max Mühlhäuser
:
MOERA: Mobility-Agnostic Online Resource Allocation for Edge Computing. IEEE Trans. Mob. Comput. 18(8): 1843-1856 (2019) - [c44]Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
One-Class Adversarial Nets for Fraud Detection. AAAI 2019: 1286-1293 - [c43]Yebo Feng
, Jun Li, Lei Jiao, Xintao Wu
:
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows. CNS 2019: 169-177 - [c42]Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, Peter L. Reiher:
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic. IM 2019: 180-188 - 2018
- [j18]Congjie Chen
, Dan Li, Jun Li
, Konglin Zhu
:
SVDC: A Highly Scalable Isolation Architecture for Virtualized Layer-2 Data Center Networks. IEEE Trans. Cloud Comput. 6(4): 1178-1190 (2018) - [c41]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things. ICCCN 2018: 1-9 - [c40]Lin Wang, Lei Jiao, Ting He, Jun Li, Max Mühlhäuser:
Service Entity Placement for Social Virtual Reality Applications in Edge Computing. INFOCOM 2018: 468-476 - [c39]Lei Jiao, Antonia Maria Tulino
, Jaime Llorca
, Yue Jin, Alessandra Sala, Jun Li:
Online Control of Cloud and Edge Resources Using Inaccurate Predictions. IWQoS 2018: 1-6 - [c38]Lumin Shi, Mingwei Zhang, Jun Li, Peter L. Reiher:
PathFinder: Capturing DDoS Traffic Footprints on the Internet. Networking 2018: 10-18 - [c37]Lei Jiao, Lingjun Pu, Lin Wang, Xiaojun Lin, Jun Li:
Multiple Granularity Online Control of Cloudlet Networks for Edge Computing. SECON 2018: 406-414 - [c36]Devkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam:
Securing the Smart Home via a Two-Mode Security Framework. SecureComm (1) 2018: 22-42 - [i1]Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
One-Class Adversarial Nets for Fraud Detection. CoRR abs/1803.01798 (2018) - 2017
- [j17]Joshua Stein, Han Hee Song, Mario Baldi, Jun Li:
On the most representative summaries of network user activities. Comput. Networks 113: 205-217 (2017) - [j16]David Koll, Jun Li, Xiaoming Fu
:
The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks. Comput. Commun. 108: 36-51 (2017) - [j15]Mingwei Zhang
, Jun Li
, Scott Brooks:
I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes. IEEE/ACM Trans. Netw. 25(6): 3411-3426 (2017) - [j14]Yang Chen, Shining Wu, Jun Li, Xiaoming Fu
:
NCShield: Protecting Decentralized, Matrix Factorization-Based Network Coordinate Systems. IEEE Trans. Serv. Comput. 10(2): 244-257 (2017) - [c35]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
Source-End DDoS Defense in IoT Environments. IoT S&P@CCS 2017: 63-64 - [c34]Shuhan Yuan, Xintao Wu
, Jun Li, Aidong Lu:
Spectrum-based Deep Neural Networks for Fraud Detection. CIKM 2017: 2419-2422 - [c33]Lin Wang, Lei Jiao, Jun Li, Max Mühlhäuser:
Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds. ICDCS 2017: 1281-1290 - [c32]David Koll, Martin Schwarzmaier, Jun Li, Xiang-Yang Li, Xiaoming Fu
:
Thank You For Being A Friend: An Attacker View on Online-Social-Network-Based Sybil Defenses. ICDCS Workshops 2017: 157-162 - 2016
- [j13]Lei Jiao, Jun Li, Tianyin Xu, Wei Du, Xiaoming Fu
:
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds. IEEE/ACM Trans. Netw. 24(1): 99-112 (2016) - [c31]Jun Li, Joshua Stein, Mingwei Zhang, Olaf Maennel
:
An expectation-based approach to policy-based security of the Border Gateway Protocol. INFOCOM Workshops 2016: 340-345 - 2015
- [j12]Bingshuang Liu, Jun Li, Tao Wei, Skyler Berg, Jiayi Ye, Chen Li, Chao Zhang, Jianyu Zhang, Xinhui Han:
SF-DRDoS: The store-and-flood distributed reflective denial of service attack. Comput. Commun. 69: 107-115 (2015) - [j11]Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang:
Improving lookup reliability in Kad. Peer-to-Peer Netw. Appl. 8(1): 156-170 (2015) - 2014
- [j10]Ghulam Memon, Jun Li, Reza Rejaie:
Tsunami: A parasitic, indestructible botnet on Kad. Peer-to-Peer Netw. Appl. 7(4): 444-455 (2014) - [c30]Bingshuang Liu, Shidong Wu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang, Yu Chen, Chen Li:
Splider: A split-based crawler of the BT-DHT network and its applications. CCNC 2014: 327-335 - [c29]Jun Li, Shad Stafford:
Detecting smart, self-propagating Internet worms. CNS 2014: 193-201 - [c28]Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, Xinhui Han:
The store-and-flood distributed reflective denial of service attack. ICCCN 2014: 1-8 - [c27]Lei Jiao, Jun Li, Wei Du, Xiaoming Fu
:
Multi-objective data placement for multi-cloud socially aware services. INFOCOM 2014: 28-36 - [c26]Joshua Stein, Han Hee Song, Mario Baldi, Jun Li:
Toward the most representative summaries of network user activities. IWQoS 2014: 111-116 - [c25]David Koll, Jun Li, Xiaoming Fu
:
SOUP: an online social network by the people, for the people. Middleware 2014: 193-204 - [c24]David Koll, Jun Li, Joshua Stein, Xiaoming Fu
:
On the state of OSN-based Sybil defenses. Networking 2014: 1-9 - [c23]David Koll, Jun Li, Xiaoming Fu
:
SOUP: an online social network by the people, for the people. SIGCOMM 2014: 143-144 - [c22]Jun Li, Skyler Berg, Mingwei Zhang, Peter L. Reiher, Tao Wei:
Drawbridge: software-defined DDoS-resistant traffic engineering. SIGCOMM 2014: 591-592 - 2013
- [c21]David Koll, Jun Li, Joshua Stein, Xiaoming Fu
:
On the effectiveness of sybil defenses based on online social networks. ICNP 2013: 1-2 - [c20]Lei Jiao, Jun Li, Xiaoming Fu
:
Optimizing data center traffic of Online Social Networks. LANMAN 2013: 1-6 - 2012
- [c19]Jun Li, Dongting Yu, Luke Maurer:
A resource management approach to web browser security. ICNC 2012: 697-701 - [c18]Jun Li, Toby Ehrenkranz, Paul Elliott:
Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies. ICNP 2012: 1-10 - [c17]Lei Jiao, Jun Li, Tianyin Xu, Xiaoming Fu
:
Cost optimization for Online Social Networks on geo-distributed clouds. ICNP 2012: 1-10 - [c16]Shining Wu, Yang Chen, Xiaoming Fu
, Jun Li:
NCShield: Securing decentralized, matrix factorization-based network coordinate systems. IWQoS 2012: 1-9 - [c15]Bingshuang Liu, Tao Wei, Jianyu Zhang, Jun Li, Wei Zou, Mo Zhou:
Revisiting why Kad lookup fails. P2P 2012: 37-42 - 2011
- [j9]Jun Li:
mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients. Peer-to-Peer Netw. Appl. 4(4): 325-345 (2011) - [c14]Jun Li, Scott Brooks:
I-seismograph: Observing and measuring Internet earthquakes. INFOCOM 2011: 2624-2632 - 2010
- [c13]Shad Stafford, Jun Li:
Behavior-Based Worm Detectors Compared. RAID 2010: 38-57 - [c12]Toby Ehrenkranz, Jun Li, Patrick D. McDaniel:
Realizing a Source Authentic Internet. SecureComm 2010: 217-234
2000 – 2009
- 2009
- [j8]Toby Ehrenkranz, Jun Li:
On the state of IP spoofing defense. ACM Trans. Internet Techn. 9(2): 6:1-6:29 (2009) - [c11]Paul Knickerbocker, Dongting Yu, Jun Li:
Humboldt: A distributed phishing disruption system. eCrime 2009: 1-12 - 2008
- [j7]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
Learning the valid incoming direction of IP packets. Comput. Networks 52(2): 399-417 (2008) - 2007
- [j6]Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, Toby Ehrenkranz:
BGP routing dynamics revisited. Comput. Commun. Rev. 37(2): 5-16 (2007) - [j5]Jun Li, Paul Knickerbocker:
Functional similarities between computer worms and biological pathogens. Comput. Secur. 26(4): 338-347 (2007) - [j4]Shad Stafford, Jun Li, Toby Ehrenkranz:
Enhancing SWORD to Detect Zero-Day-Worm-Infected Hosts. Simul. 83(2): 199-212 (2007) - [c10]Yibo Wang, Jun Li:
Is your IP address prefix well-served by internet routing? CoNEXT 2007: 69 - [c9]Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li:
Investigating the Impact of Real-World Factors on Internet Worm Propagation. ICISS 2007: 10-24 - [c8]Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang:
On Knowledge-Based Classification of Abnormal BGP Events. ICISS 2007: 267-271 - [c7]Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong:
Understanding and Utilizing the Hierarchy of Abnormal BGP Events. SDM 2007: 467-472 - 2006
- [c6]Jun Li, Zhen Wu, Eric Purpus:
Toward Understanding the Behavior of BGP During Large-Scale Power Outages. GLOBECOM 2006 - 2005
- [j3]Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal:
An internet routing forensics framework for discovering rules of abnormal BGP events. Comput. Commun. Rev. 35(5): 55-66 (2005) - [c5]Jun Li, Xun Kang:
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. ACSAC 2005: 397-408 - [c4]Jun Li, Xun Kang:
Proof of Service in a Hybrid P2P Environment. ISPA Workshops 2005: 64-73 - [c3]Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher:
Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269 - 2004
- [j2]Jun Li, Peter L. Reiher, Gerald J. Popek:
Resilient self-organizing overlay networks for security update delivery. IEEE J. Sel. Areas Commun. 22(1): 189-202 (2004) - 2002
- [b1]Jun Li, Peter L. Reiher, Gerald J. Popek:
Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144 - [j1]Jun Li, Mark Yarvis, Peter L. Reiher:
Securing distributed adaptation. Comput. Networks 38(3): 347-371 (2002) - [c2]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002: 1557-1566
1990 – 1999
- 1999
- [c1]Jun Li, Peter L. Reiher, Gerald J. Popek:
Securing information transmission by redundancy. NSPW 1999: 112-117
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-08-07 03:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint