default search action
Chun-Ying Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c58]Jian-Syue Huang, Tsung-Han Liu, Yi-Hsien Chen, Hsuan-Yu Peng, Tse-Wei Huang, Chin-Laung Lei, Chun-Ying Huang:
Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor. CCSW@CCS 2024: 66-79 - [c57]Wei-Jia Chen, Chia-Yi Hsu, Wei-Bin Lee, Chia-Mu Yu, Chun-Ying Huang:
Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns. DSN-S 2024: 133-140 - [c56]Sian-Yao Huang, Cheng-Lin Yang, Che-Yu Lin, Chun-Ying Huang:
CmdCaliper: A Semantic-Aware Command-Line Embedding Model and Dataset for Security Research. EMNLP 2024: 20188-20206 - [c55]Yuan-Chun Sun, Yuang Shi, Wei Tsang Ooi, Chun-Ying Huang, Cheng-Hsin Hsu:
Multi-frame Bitrate Allocation of Dynamic 3D Gaussian Splatting Streaming Over Dynamic Networks. EMS@SIGCOMM 2024 - [c54]Yu-Lin Tsai, Chia-Yi Hsu, Chulin Xie, Chih-Hsun Lin, Jia-You Chen, Bo Li, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Ring-A-Bell! How Reliable are Concept Removal Methods For Diffusion Models? ICLR 2024 - [c53]Yu-Szu Wei, Yuan-Chun Sun, Shin-Yi Zheng, Hsun-Fu Hsu, Chun-Ying Huang, Cheng-Hsin Hsu:
Mitigating Privacy Threats Without Degrading Visual Quality of VR Applications: Using Re-Identification Attack as a Case Study. MIPR 2024: 214-220 - [c52]Charlie Hsu, Yuan-Chun Sun, Kuan-Yu Lee, Chun-Ying Huang:
Will Neural 3D Object Representations be the Silver Bullet for Improving VR Experience in HMDs? MIPR 2024: 231-234 - [i5]Chia-Yi Hsu, Yu-Lin Tsai, Chih-Hsun Lin, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models. CoRR abs/2405.16833 (2024) - 2023
- [j30]Yi-Hsien Chen, Si-Chen Lin, Szu-Chun Huang, Chin-Laung Lei, Chun-Ying Huang:
Guided Malware Sample Analysis Based on Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 18: 4128-4143 (2023) - [c51]Yuan-Chun Sun, I-Chun Huang, Yuang Shi, Wei Tsang Ooi, Chun-Ying Huang, Cheng-Hsin Hsu:
A Dynamic 3D Point Cloud Dataset for Immersive Applications. MMSys 2023: 376-383 - [i4]Chih-Hsun Lin, Chia-Yi Hsu, Chia-Mu Yu, Yang Cao, Chun-Ying Huang:
DPAF: Image Synthesis via Differentially Private Aggregation in Forward Phase. CoRR abs/2304.12185 (2023) - [i3]Yu-Lin Tsai, Chia-Yi Hsu, Chulin Xie, Chih-Hsun Lin, Jia-You Chen, Bo Li, Pin-Yu Chen, Chia-Mu Yu, Chun-Ying Huang:
Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models? CoRR abs/2310.10012 (2023) - 2022
- [j29]Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, Yung-Tien Chu, Chin-Laung Lei, Chun-Ying Huang:
Building Machine Learning-based Threat Hunting System from Scratch. DTRAP 3(3): 20:1-20:21 (2022) - [j28]Chih-Fan Hsu, Yu-Lun Chang, Chun-Ying Huang, Xin Liu:
Measuring Objective Visual Quality of Real-Time Communication Systems in the Wild. Int. J. Semantic Comput. 16(2): 257-280 (2022) - [j27]Chih-Hsun Lin, Chia-Mu Yu, Chun-Ying Huang:
DPView: Differentially Private Data Synthesis Through Domain Size Information. IEEE Internet Things J. 9(17): 15886-15900 (2022) - [c50]Ping-Jui Chuang, Chih-Fan Hsu, Yung-Tien Chu, Szu-Chun Huang, Chun-Ying Huang:
Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms. AsiaCCS 2022: 479-493 - 2021
- [j26]Ching-Ling Fan, Shou-Cheng Yen, Chun-Ying Huang, Cheng-Hsin Hsu:
On the Optimal Encoding Ladder of Tiled 360° Videos for Head-Mounted Virtual Reality. IEEE Trans. Circuits Syst. Video Technol. 31(4): 1632-1647 (2021) - [j25]Chi-Yu Li, Hsin-Yi Wang, Wei-Ching Wang, Chun-Ying Huang:
Privacy Leakage and Protection of InputConnection Interface in Android. IEEE Trans. Netw. Serv. Manag. 18(3): 3309-3323 (2021) - [j24]Chun-Ying Huang, Yun-chen Cheng, Guan-Zhang Huang, Ching-Ling Fan, Cheng-Hsin Hsu:
On the Performance Comparisons of Native and Clientless Real-Time Screen-Sharing Technologies. ACM Trans. Multim. Comput. Commun. Appl. 17(2): 54:1-54:26 (2021) - [c49]Chih-Fan Hsu, Chun-Ying Huang, Xin Liu:
Measuring Objective Visual Quality of Real-time Communication Systems in the Wild. BigMM 2021: 9-16 - 2020
- [j23]Ching-Ling Fan, Shou-Cheng Yen, Chun-Ying Huang, Cheng-Hsin Hsu:
Optimizing Fixation Prediction Using Recurrent Neural Networks for 360$^{\circ }$ Video Streaming in Head-Mounted Virtual Reality. IEEE Trans. Multim. 22(3): 744-759 (2020) - [c48]Yi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, Chun-Ying Huang:
POSTER: Construct macOS Cyber Range for Red/Blue Teams. AsiaCCS 2020: 934-936 - [i2]Hsu-Chun Hsiao, Chun-Ying Huang, Bing-Kai Hong, Shin-Ming Cheng, Hsin-Yuan Hu, Chia-Chien Wu, Jian-Sin Lee, Shih-Hong Wang, Wei Jeng:
An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds. CoRR abs/2011.04322 (2020)
2010 – 2019
- 2019
- [c47]Chung-Yi Lin, Chun-Ying Huang, Chia-Wei Tien:
Boosting Fuzzing Performance with Differential Seed Scheduling. AsiaJCIS 2019: 72-79 - 2018
- [j22]Pablo César, Cheng-Hsin Hsu, Chun-Ying Huang, Pan Hui:
Best Papers of the ACM Multimedia Systems (MMSys) Conference 2017 and the ACM Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) 2017. ACM Trans. Multim. Comput. Commun. Appl. 14(3s): 60:1-60:3 (2018) - [c46]Wei-Chieh Chao, Si-Chen Lin, Yi-Hsien Chen, Chin-Wei Tien, Chun-Ying Huang:
Design and Implement Binary Fuzzing Based on Libfuzzer. DSC 2018: 1-2 - [c45]Shang-Pin Ma, Yen Chuang, Ci-Wei Lan, Hsi-Min Chen, Chun-Ying Huang, Chia-Yu Li:
Scenario-Based Microservice Retrieval Using Word2Vec. ICEBE 2018: 239-244 - [p1]Kuan-Ta Chen, Wei Cai, Ryan Shea, Chun-Ying Huang, Jiangchuan Liu, Victor C. M. Leung, Cheng-Hsin Hsu:
Cloud gaming. Frontiers of Multimedia Research 2018: 287-314 - 2017
- [c44]Chih-Fan Hsu, Anthony Chen, Cheng-Hsin Hsu, Chun-Ying Huang, Chin-Laung Lei, Kuan-Ta Chen:
Is Foveated Rendering Perceivable in Virtual Reality?: Exploring the Efficiency and Consistency of Quality Assessment Methods. ACM Multimedia 2017: 55-63 - [c43]Wen-Chih Lo, Ching-Ling Fan, Jean Lee, Chun-Ying Huang, Kuan-Ta Chen, Cheng-Hsin Hsu:
360° Video Viewing Dataset in Head-Mounted Virtual Reality. MMSys 2017: 211-216 - [c42]Ching-Ling Fan, Jean Lee, Wen-Chih Lo, Chun-Ying Huang, Kuan-Ta Chen, Cheng-Hsin Hsu:
Fixation Prediction for 360° Video Streaming in Head-Mounted Virtual Reality. NOSSDAV 2017: 67-72 - 2016
- [j21]Wei Cai, Ryan Shea, Chun-Ying Huang, Kuan-Ta Chen, Jiangchuan Liu, Victor C. M. Leung, Cheng-Hsin Hsu:
A Survey on Cloud Gaming: Future of Computer Games. IEEE Access 4: 7605-7620 (2016) - [j20]Pin-Yu Chen, Ching-Chao Lin, Shin-Ming Cheng, Hsu-Chun Hsiao, Chun-Ying Huang:
Decapitation via digital epidemics: a bio-inspired transmissive attack. IEEE Commun. Mag. 54(6): 75-81 (2016) - [j19]Chun-Nan Lu, Chun-Ying Huang, Ying-Dar Lin, Yuan-Cheng Lai:
High performance traffic classification based on message size sequence and distribution. J. Netw. Comput. Appl. 76: 60-74 (2016) - [j18]Wei Cai, Ryan Shea, Chun-Ying Huang, Kuan-Ta Chen, Jiangchuan Liu, Victor C. M. Leung, Cheng-Hsin Hsu:
The Future of Cloud Gaming [Point of View]. Proc. IEEE 104(4): 687-691 (2016) - [j17]Chih-Fan Hsu, Ching-Ling Fan, Tsung-Han Tsai, Chun-Ying Huang, Cheng-Hsin Hsu, Kuan-Ta Chen:
Toward an Adaptive Screencast Platform: Measurement and Optimization. ACM Trans. Multim. Comput. Commun. Appl. 12(5s): 79:1-79:23 (2016) - [c41]Chun-Ying Huang, Iwen Huang:
Effects of Online Peer Feedback on Dancers at Different Levels. IIAI-AAI 2016: 391-396 - [c40]Pin-Chun Wang, Ching-Ling Fan, Chun-Ying Huang, Kuan-Ta Chen, Cheng-Hsin Hsu:
Towards Ultra-Low-Bitrate Video Conferencing Using Facial Landmarks. ACM Multimedia 2016: 561-565 - [c39]Chun-Ying Huang, Ching-Ling Fan, Chih-Fan Hsu, Hsin-Yu Chang, Tsung-Han Tsai, Kuan-Ta Chen, Cheng-Hsin Hsu:
Smart Beholder: An Extensible Smart Lens Platform. ACM Multimedia 2016: 1164-1168 - [i1]Pin-Yu Chen, Ching-Chao Lin, Shin-Ming Cheng, Hsu-Chun Hsiao, Chun-Ying Huang:
Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack. CoRR abs/1603.00588 (2016) - 2015
- [j16]Tsung-Teng Chen, Chun-Ying Huang, Chen-Chi Wu, Kuan-Ta Chen:
Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled. J. Inf. Sci. Eng. 31(3): 943-963 (2015) - [j15]Chun-Ying Huang, Chuang-Chun Chiou, Tai-Hsi Wu, Sheng-Chih Yang:
An integrated DEA-MODM methodology for portfolio optimization. Oper. Res. 15(1): 115-136 (2015) - [j14]Chun-Ying Huang, Ying-Dar Lin, Peng-Yu Liao, Yuan-Cheng Lai:
Stateful traffic replay for web application proxies. Secur. Commun. Networks 8(6): 970-981 (2015) - [j13]Hua-Jun Hong, De-Yu Chen, Chun-Ying Huang, Kuan-Ta Chen, Cheng-Hsin Hsu:
Placing Virtual Machines to Optimize Cloud Gaming Experience. IEEE Trans. Cloud Comput. 3(1): 42-53 (2015) - [j12]Hua-Jun Hong, Chih-Fan Hsu, Tsung-Han Tsai, Chun-Ying Huang, Kuan-Ta Chen, Cheng-Hsin Hsu:
Enabling Adaptive Cloud Gaming in an Open-Source Cloud Gaming Platform. IEEE Trans. Circuits Syst. Video Technol. 25(12): 2078-2091 (2015) - [c38]Chun-Ying Huang, Chih-Fan Hsu, Tsung-Han Tsai, Ching-Ling Fan, Cheng-Hsin Hsu, Kuan-Ta Chen:
Smart Beholder: An Open-Source Smart Lens for Mobile Photography. ACM Multimedia 2015: 351-360 - [c37]Chih-Fan Hsu, Tsung-Han Tsai, Chun-Ying Huang, Cheng-Hsin Hsu, Kuan-Ta Chen:
Screencast dissected: performance measurements and design considerations. MMSys 2015: 177-188 - [c36]Chun-Ying Huang, Yu-Ling Huang, Yu-Hsuan Chi, Kuan-Ta Chen, Cheng-Hsin Hsu:
To Cloud or Not to Cloud: Measuring the Performance of Mobile Gaming. MobiGames@MobiSys 2015: 19-24 - [c35]Chun-Ying Huang, Ching-Hsiang Chiu, Chih-Hung Lin, Han-Wei Tzeng:
Code Coverage Measurement for Android Dynamic Analysis Tools. IEEE MS 2015: 209-216 - [c34]Chun-Ying Huang, Po-Tsang Huang, Chih-Chao Yang, Ching-Te Chuang, Wei Hwang:
Energy-efficient gas recognition system with event-driven power control. SoCC 2015: 245-250 - [c33]Chih-Chao Yang, Po-Tsang Huang, Chun-Ying Huang, Ching-Te Chuang, Wei Hwang:
Low power algorithm-architecture co-design of fast Independent Component Analysis (FICA) for multi-gas sensor applications. VLSI-DAT 2015: 1-4 - 2014
- [j11]Ying-Dar Lin, Chun-Ying Huang, Matthew K. Wright, Georgios Kambourakis:
Mobile Application Security. Computer 47(6): 21-23 (2014) - [j10]Kuochen Wang, Chun-Ying Huang, Li-Yang Tsai, Ying-Dar Lin:
Behavior-based botnet detection in parallel. Secur. Commun. Networks 7(11): 1849-1859 (2014) - [j9]Kuan-Ta Chen, Yu-Chun Chang, Hwai-Jung Hsu, De-Yu Chen, Chun-Ying Huang, Cheng-Hsin Hsu:
On the Quality of Service of Cloud Gaming Systems. IEEE Trans. Multim. 16(2): 480-495 (2014) - [j8]Chun-Ying Huang, Kuan-Ta Chen, De-Yu Chen, Hwai-Jung Hsu, Cheng-Hsin Hsu:
GamingAnywhere: The first open source cloud gaming system. ACM Trans. Multim. Comput. Commun. Appl. 10(1s): 10:1-10:25 (2014) - [c32]Kuan-Ta Chen, Chun-Ying Huang, Cheng-Hsin Hsu:
Cloud gaming onward: research opportunities and outlook. ICME Workshops 2014: 1-4 - [c31]Chih-Fan Hsu, De-Yu Chen, Chun-Ying Huang, Cheng-Hsin Hsu, Kuan-Ta Chen:
Screencast in the Wild: Performance and Limitations. ACM Multimedia 2014: 813-816 - [c30]Chun-Ying Huang, Cheng-Hsin Hsu, De-Yu Chen, Kuan-Ta Chen:
Quantifying User Satisfaction in Mobile Cloud Games. MoVid@MMSys 2014: 4:1-4:6 - [c29]Hua-Jun Hong, Tao-Ya Fan-Chiang, Che-Run Lee, Kuan-Ta Chen, Chun-Ying Huang, Cheng-Hsin Hsu:
GPU consolidation for cloud games: Are we there yet? NETGAMES 2014: 1-6 - [c28]Chun-Ying Huang, Po-Han Chen, Yu-Ling Huang, Kuan-Ta Chen, Cheng-Hsin Hsu:
Measuring the client performance and energy consumption in mobile cloud gaming. NETGAMES 2014: 1-3 - 2013
- [j7]Chun-Ying Huang:
Effective bot host detection based on network failure models. Comput. Networks 57(2): 514-525 (2013) - [c27]Chun-Ying Huang, De-Yu Chen, Cheng-Hsin Hsu, Kuan-Ta Chen:
GamingAnywhere: an open-source cloud gaming testbed. ACM Multimedia 2013: 827-830 - [c26]Chun-Ying Huang, Cheng-Hsin Hsu, Yu-Chun Chang, Kuan-Ta Chen:
GamingAnywhere: an open cloud gaming system. MMSys 2013: 36-47 - [c25]Hua-Jun Hong, De-Yu Chen, Chun-Ying Huang, Kuan-Ta Chen, Cheng-Hsin Hsu:
QoE-Aware Virtual Machine Placement for Cloud Games. NetGames 2013: 12:1-12:2 - 2012
- [j6]Chun-Nan Lu, Chun-Ying Huang, Ying-Dar Lin, Yuan-Cheng Lai:
Session level flow classification by packet size distribution and session grouping. Comput. Networks 56(1): 260-272 (2012) - [c24]Chun-Nan Lu, Ying-Dar Lin, Chun-Ying Huang, Yuan-Cheng Lai:
Session Level Flow Classification by Packet Size Distribution and Session Grouping. AINA Workshops 2012: 221-226 - 2011
- [j5]Kuochen Wang, Chun-Ying Huang, Shang-Jyh Lin, Ying-Dar Lin:
A fuzzy pattern-based filtering algorithm for botnet detection. Comput. Networks 55(15): 3275-3286 (2011) - [j4]Chun-Ying Huang, Shang-Pin Ma, Kuan-Ta Chen:
Using one-time passwords to prevent password phishing attacks. J. Netw. Comput. Appl. 34(4): 1292-1301 (2011) - [c23]Shang-Pin Ma, Chia-Hsueh Li, Chun-Ying Huang, Yong-Yi Fanjiang, Jong-Yih Kuo:
Semantic web service discovery based on business rule annotation. ICMLC 2011: 932-937 - [c22]Kuan-Ta Chen, Yu-Chun Chang, Po-Han Tseng, Chun-Ying Huang, Chin-Laung Lei:
Measuring the latency of cloud gaming systems. ACM Multimedia 2011: 1269-1272 - 2010
- [c21]Shang-Pin Ma, Jong-Yih Kuo, Yong-Yi Fanjiang, Chin-Pin Tung, Chun-Ying Huang:
Optimal service selection for composition based on weighted service flow and Genetic Algorithm. ICMLC 2010: 3252-3256 - [c20]Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen:
Fast-Flux Bot Detection in Real Time. RAID 2010: 464-483
2000 – 2009
- 2009
- [c19]Chen-Chi Wu, Kuan-Ta Chen, Chun-Ying Huang, Chin-Laung Lei:
An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger. NOSSDAV 2009: 97-102 - 2008
- [j3]Shu-Hsing Chung, Amy H. I. Lee, Chun-Ying Huang, Chia-Chien Chuang:
Capacity pricing mechanism for wafer fabrication. Comput. Ind. Eng. 55(3): 647-662 (2008) - [j2]Shu-Hsing Chung, Chun-Ying Huang, Amy H. I. Lee:
Heuristic algorithms to solve the capacity allocation problem in photolithography area (CAPPA). OR Spectr. 30(3): 431-452 (2008) - [c18]Chun-Ying Huang, Amy Hsin-I Lee, Tzu-Yun Chang:
A MIP model for IC final testing order selection problem. MSV 2008: 238-241 - 2007
- [j1]Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
Secure multicast in dynamic environments. Comput. Networks 51(10): 2805-2817 (2007) - [c17]Chun-Ying Huang, Chin-Laung Lei:
Bounding Peer-to-Peer Upload Traffic in Client Networks. DSN 2007: 759-769 - [c16]Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-Laung Lei:
Design and Implementation of Secure Communication Channels over UPnP Networks. MUE 2007: 307-312 - 2006
- [c15]Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei:
An empirical evaluation of TCP performance in online games. Advances in Computer Entertainment Technology 2006: 5 - [c14]Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
A distributed key assignment protocol for secure multicast based on proxy cryptography. AsiaCCS 2006: 359 - [c13]Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei:
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. DSN 2006: 403-412 - [c12]Shu-Hsing Chung, Chun-Ying Huang, Amy Hsin-I Lee:
Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area. ICCSA (3) 2006: 610-620 - [c11]Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, Chin-Laung Lei:
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. ICSNC 2006: 7 - [c10]Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang:
Confessible Threshold Ring Signatures. ICSNC 2006: 25 - [c9]Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei:
The Impact of Network Variabilities on TCP Clocking Schemes. INFOCOM 2006 - [c8]Kuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Ying Huang, Chin-Laung Lei:
On the Sensitivity of Online Game Playing Time to Network QoS. INFOCOM 2006 - [c7]Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei:
Quantifying Skype user satisfaction. SIGCOMM 2006: 399-410 - 2005
- [c6]Pan-Lung Tsai, Chun-Ying Huang, Yun-Yin Huang, Chia-Chang Hsu, Chin-Laung Lei:
A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs. HiPC 2005: 432-443 - [c5]Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang:
Secure Multicast Using Proxy Encryption. ICICS 2005: 280-290 - [c4]Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei:
The impact of network variabilities on TCP clocking schemes. INFOCOM 2005: 2770-2775 - [c3]Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, Chin-Laung Lei:
Secure Content Delivery using Key Composition. LCN 2005: 484-485 - [c2]Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei:
Game traffic analysis: an MMORPG perspective. NOSSDAV 2005: 19-24 - [c1]Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai:
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. PRDC 2005: 133-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint