default search action
Qi Xiong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Qi Xiong, Gui-Xian Tian, Shu-Yu Cui:
More on minors of Hermitian (quasi-)Laplacian matrix of the second kind for mixed graphs. Comput. Appl. Math. 43(1): 62 (2024) - [j30]Qi Xiong, Jiangying Wei, Shougui Luo:
RCEP and China: An Application of GE-PPML Model to Goods, Services, and Value Chains. J. Adv. Comput. Intell. Intell. Informatics 28(3): 727-738 (2024) - [c44]Longhai Zhao, Yunchuan Yang, Qi Xiong, He Wang, Bin Yu, Feifei Sun, Chengjun Sun:
A Signature Based Approach towards Global Channel Charting with Ultra Low Complexity. ICC Workshops 2024: 667-672 - [i8]Longhai Zhao, Yunchuan Yang, Qi Xiong, He Wang, Bin Yu, Feifei Sun, Chengjun Sun:
A Signature Based Approach Towards Global Channel Charting with Ultra Low Complexity. CoRR abs/2403.20091 (2024) - [i7]Qi Xiong, Kai Tang, Minbo Ma, Jie Xu, Tianrui Li:
TDT Loss Takes It All: Integrating Temporal Dependencies among Targets into Non-Autoregressive Time Series Forecasting. CoRR abs/2406.04777 (2024) - [i6]Qi Xiong, Xinman Zhang, Jun Shen:
A Prior Embedding-Driven Architecture for Long Distance Blind Iris Recognition. CoRR abs/2408.00210 (2024) - 2023
- [j29]Xueyuan Wen, Kaiyan Dai, Qi Xiong, Lili Chen, Jian Zhang, Zhen Wang:
An approach to internal threats detection based on sentiment analysis and network analysis. J. Inf. Secur. Appl. 77: 103557 (2023) - [j28]Jianjian Xiang, Jia Liu, Du Chen, Qi Xiong, Chongjiu Deng:
CTFuseNet: A Multi-Scale CNN-Transformer Feature Fused Network for Crop Type Segmentation on UAV Remote Sensing Imagery. Remote. Sens. 15(4): 1151 (2023) - [j27]Qi Xiong, Jincheng She, Jinkun Xiong:
A New Pelican Optimization Algorithm for the Parameter Identification of Memristive Chaotic System. Symmetry 15(6): 1279 (2023) - [c43]Heye Wang, Xiongjun Shang, Qi Xiong, Jiahao Liang, Yangyang Huang:
An Innovative Approach to Multi-Objective Infrared Temperature Measurement for Electrical Power Equipment Using K-Means. CRC 2023: 165-171 - [c42]Longhai Zhao, Yunchuan Yang, Qi Xiong, He Wang, Bin Yu, Chengjun Sun:
Enabling Light-Weight AI-Based Positioning by Log Signature Transform of Wireless Channels. GLOBECOM 2023: 3934-3939 - [c41]Wei Huang, Zhiyuan Wen, Qi Xiong, Duanlian Wang:
Design and Implementation of a Control System for Atmospheric Pressure Microwave Plasma Torch Based on PLC. ICRSA 2023 - [c40]Duanlian Wang, Wei Huang, Qi Xiong, Zhiyuan Wen:
Load Prediction of Exhaust Gas Treatment System Based on Genetic Algorithm Optimization Neural Network. ICRSA 2023 - [c39]Weipeng Fuzzy Huang, Junjie Tao, Changbo Deng, Ming Fan, Wenqiang Wan, Qi Xiong, Guangyuan Piao:
Rényi Divergence Deep Mutual Learning. ECML/PKDD (2) 2023: 156-172 - [c38]Hyoungju Ji, Younsun Kim, Bin Yu, Qi Xiong, Shadi Abu-Surra, Chance Tarver, Kyungjun Choi, Jaeyeon Shim, Gary Xu:
5G-Advanced Duplex Evolution for Massive MIMO and Multi-Beam Operations. WCNC 2023: 1-6 - [i5]Yin Wang, Ming Fan, Junfeng Liu, Junjie Tao, Wuxia Jin, Qi Xiong, Yuhao Liu, Qinghua Zheng, Ting Liu:
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. CoRR abs/2302.13860 (2023) - [i4]Qi Xiong, Nasrin Sohrabi, Hai Dong, Chenhao Xu, Zahir Tari:
AICons: An AI-Enabled Consensus Algorithm Driven by Energy Preservation and Fairness. CoRR abs/2304.08128 (2023) - 2022
- [j26]Yao Chen, Qi Xiong, Yina Guo:
Session-based recommendation: Learning multi-dimension interests via a multi-head attention graph neural network. Appl. Soft Comput. 131: 109744 (2022) - [j25]Chao Jin, Xiangning Zhao, Qi Xiong, Yina Guo:
Blind Image Quality Assessment for Multiple Distortion Image. Circuits Syst. Signal Process. 41(10): 5807-5826 (2022) - [j24]Meisen Pan, Qi Xiong:
An improved iris localization method. Int. Arab J. Inf. Technol. 19(2): 173-185 (2022) - [j23]Qi Xiong, Xinman Zhang, Shaobo He, Jun Shen:
Data Augmentation for Small Sample Iris Image Based on a Modified Sparrow Search Algorithm. Int. J. Comput. Intell. Syst. 15(1): 110 (2022) - [j22]Qi Xiong, Xinman Zhang, Xingzhu Wang, Naosheng Qiao, Jun Shen:
Robust Iris-Localization Algorithm in Non-Cooperative Environments Based on the Improved YOLO v4 Model. Sensors 22(24): 9913 (2022) - [j21]Yilin Wan, Qi Xiong, Zhiwei Qiu, Yaohan Xie:
K-Means Clustering Algorithm Based on Memristive Chaotic System and Sparrow Search Algorithm. Symmetry 14(10): 2029 (2022) - [c37]Bin Yu, Chen Qian, Peng Lin, Shihai Shao, Wensheng Pan, Ying Shen, Su Hu, Di Su, Chengjun Sun, Qi Xiong, Juho Lee:
Full Duplex Communication with Practical Self-Interference Cancellation Implementation. ICC 2022: 1100-1105 - [c36]Jinbin Huang, Shuang Liang, Qi Xiong, Yu Gao, Chao Mei, Yi Xu, Chris Bryan:
SPARVIS: Combining Smartphone and Augmented Reality for Visual Data Analytics. ISMAR Adjunct 2022: 111-117 - [c35]Longhai Zhao, Qi Xiong, Yunchuan Yang, Pengru Li, Bin Yu, Feifei Sun, Chengjun Sun, Peng Xue:
Enabling Accurate Positioning in NLOS Scenarios by Hybrid Machine Learning with Denoising and Inpainting. VTC Fall 2022: 1-5 - [i3]Weipeng Huang, Junjie Tao, Changbo Deng, Ming Fan, Wenqiang Wan, Qi Xiong, Guangyuan Piao:
Rényi Divergence Deep Mutual Learning. CoRR abs/2209.05732 (2022) - 2021
- [j20]Xiaofei Zhang, Tao Wang, Qi Xiong, Yina Guo:
A Dense Long Short-Term Memory Model for Enhancing the Imagery-Based Brain-Computer Interface. Comput. Intell. Neurosci. 2021: 6614677:1-6614677:10 (2021) - [c34]Shifu Hou, Yujie Fan, Mingxuan Ju, Yanfang Ye, Wenqiang Wan, Kui Wang, Yinming Mei, Qi Xiong, Fudong Shao:
Disentangled Representation Learning in Heterogeneous Information Network for Large-scale Android Malware Detection in the COVID-19 Era and Beyond. AAAI 2021: 7754-7761 - [c33]Yujie Fan, Mingxuan Ju, Shifu Hou, Yanfang Ye, Wenqiang Wan, Kui Wang, Yinming Mei, Qi Xiong:
Heterogeneous Temporal Graph Transformer: An Intelligent System for Evolving Android Malware Detection. KDD 2021: 2831-2839 - [c32]Qi Xiong, Min Wu, Bin Yu, Feifei Sun, Chen Qian, Chengjun Sun:
TRIDENT Schemes for Small Data Transmission in Industrial IoT System. VTC Fall 2021: 1-5 - 2020
- [j19]Li Qiu, Chenglin Wang, Ahmed Abu-Siada, Qi Xiong, Wang Zhang, Bin Wang, Ningxuan Yi, Yantao Li, Quanliang Cao:
Coil Temperature Rise and Workpiece Forming Efficiency of Electromagnetic Forming Based on Half-Wave Current Method. IEEE Access 8: 9371-9379 (2020) - [j18]Li Qiu, Ningxuan Yi, Ahmed Abu-Siada, Jinpeng Tian, Yuwei Fan, Kui Deng, Qi Xiong, Jinbo Jiang:
Electromagnetic Force Distribution and Forming Performance in Electromagnetic Forming With Discretely Driven Rings. IEEE Access 8: 16166-16173 (2020) - [j17]Li Qiu, Bin Wang, Ahmed Abu-Siada, Qi Xiong, Wang Zhang, Weikang Ge, Chang Liu, Lan Jiang, Chenglin Wang:
Research on Forming Efficiency in Double-Sheet Electromagnetic Forming Process. IEEE Access 8: 19248-19255 (2020) - [j16]Li Qiu, Quanliang Cao, Wang Zhang, Ahmed Abu-Siada, Qi Xiong, Chenglin Wang, Yao Xiao, Bin Wang, Yantao Li, Jinbo Jiang:
Electromagnetic Force Distribution and Wall Thickness Reduction of Three-Coil Electromagnetic Tube Bulging With Axial Compression. IEEE Access 8: 21665-21675 (2020) - [j15]Qi Xiong, Meng Yang, Xin Liu, Xianqi Song, Li Qiu, Jinbo Jiang, Kun Yu:
A Dual-Coil Method for Electromagnetic Attraction Forming of Sheet Metals. IEEE Access 8: 92708-92717 (2020) - [j14]Qi Xiong, Meng Yang, Hongtao Tang, Hao Huang, Xianqi Song, Li Qiu, Kun Yu, Quanliang Cao:
Flaring Forming of Small Tube Based on Electromagnetic Attraction. IEEE Access 8: 104753-104761 (2020) - [j13]Meng Yang, Jiaying Yan, Xianqi Song, Li Qiu, Jinbo Jiang, Kun Yu, Qi Xiong, Chistear Ahmed Khan:
Optimization of the Attractive Electromagnetic Bulging of Small Tubes Based on Non-Uniform Solenoid Coils. IEEE Access 8: 113121-113130 (2020) - [j12]Li Qiu, Kui Deng, Ahmed Abu-Siada, Qi Xiong, Ningxuan Yi, Yuwei Fan, Jinpeng Tian, Jinbo Jiang:
Construction and Analysis of Two-Dimensional Axisymmetric Model of Electromagnetic Tube Bulging With Field Shaper. IEEE Access 8: 113713-113719 (2020) - [j11]Li Qiu, Kui Deng, Xinsen Yang, Ahmed Abu-Siada, Qi Xiong, Ningxuan Yi, Jinbo Jiang, Li Xiao:
Electromagnetic Force Distribution and Forming Performance in Electromagnetic Tube Expansion with Axial Compression. IEEE Access 8: 134514-134523 (2020) - [j10]Qi Xiong, Xinman Zhang, Wen-Feng Wang, Yuhong Gu:
A Parallel Algorithm Framework for Feature Extraction of EEG Signals on MPI. Comput. Math. Methods Medicine 2020: 9812019:1-9812019:10 (2020) - [j9]Xinman Zhang, Qi Xiong, Yixuan Dai, Xuebin Xu, Guokun Song:
An ECoG-Based Binary Classification of BCI Using Optimized Extreme Learning Machine. Complex. 2020: 2913019:1-2913019:13 (2020) - [c31]Yiming Zhang, Yiyue Qian, Yujie Fan, Yanfang Ye, Xin Li, Qi Xiong, Fudong Shao:
dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets. ACSAC 2020: 669-680 - [c30]Yujie Fan, Yanfang Ye, Qian Peng, Jianfei Zhang, Yiming Zhang, Xusheng Xiao, Chuan Shi, Qi Xiong, Fudong Shao, Liang Zhao:
Metagraph Aggregated Heterogeneous Graph Neural Network for Illicit Traded Product Identification in Underground Market. ICDM 2020: 132-141
2010 – 2019
- 2019
- [j8]Li Qiu, Yantao Li, Yijie Yu, Ahmed Abu-Siada, Qi Xiong, Xiaoxiang Li, Liang Li, Pan Su, Quanliang Cao:
Electromagnetic Force Distribution and Deformation Homogeneity of Electromagnetic Tube Expansion With a New Concave Coil Structure. IEEE Access 7: 117107-117114 (2019) - [c29]Shifu Hou, Yujie Fan, Yiming Zhang, Yanfang Ye, Jingwei Lei, Wenqiang Wan, Jiabin Wang, Qi Xiong, Fudong Shao:
αCyber: Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model. CIKM 2019: 609-618 - [c28]Xinman Zhang, Qi Xiong, Xuebin Xu:
A Multimodal Biometric Recognition Algorithm Based on Second Generation Curvelet and 2D Gabor Filter. CRC 2019: 114-117 - [c27]Yanfang Ye, Shifu Hou, Lingwei Chen, Jingwei Lei, Wenqiang Wan, Jiabin Wang, Qi Xiong, Fudong Shao:
Out-of-sample Node Representation Learning for Heterogeneous Graph in Real-time Android Malware Detection. IJCAI 2019: 4150-4156 - [c26]Qi Xiong, Chen Qian, Bin Yu, Chengjun Sun:
An Evolved Non-Orthogonal Multiple Access for User Multiplexing with Small-Data Transmission. VTC Fall 2019: 1-5 - [c25]Yiming Zhang, Yujie Fan, Wei Song, Shifu Hou, Yanfang Ye, Xin Li, Liang Zhao, Chuan Shi, Jiabin Wang, Qi Xiong:
Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network. WWW 2019: 3448-3454 - 2018
- [j7]Yan Chen, Alireza Bayesteh, Yiqun Wu, Bin Ren, Shaoli Kang, Shaohui Sun, Qi Xiong, Chen Qian, Bin Yu, Zhiguo Ding, Sen Wang, Shuangfeng Han, Xiaolin Hou, Hao Lin, Raphaël Visoz, Razieh Razavi:
Toward the Standardization of Non-Orthogonal Multiple Access for Next Generation Wireless Networks. IEEE Commun. Mag. 56(3): 19-27 (2018) - [j6]Su Hu, Bin Yu, Chen Qian, Yue Xiao, Qi Xiong, Chengjun Sun, Yuan Gao:
Nonorthogonal Interleave-Grid Multiple Access Scheme for Industrial Internet of Things in 5G Network. IEEE Trans. Ind. Informatics 14(12): 5436-5446 (2018) - [c24]Yanfang Ye, Shifu Hou, Lingwei Chen, Xin Li, Liang Zhao, Shouhuai Xu, Jiabin Wang, Qi Xiong:
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. ACSAC 2018: 542-552 - [c23]Qi Xiong, Bin Yu, Chen Qian, Xiaojiao Li, Chengjun Sun:
Random Access Preamble Generation and Procedure Design for 5G-NR System. GLOBECOM Workshops 2018: 1-5 - [c22]Yiming Zhang, Yujie Fan, Yanfang Ye, Liang Zhao, Jiabin Wang, Qi Xiong, Fudong Shao:
KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network. ICBK 2018: 154-161 - [c21]Xinman Zhang, Qi Xiong, Xuebin Xu, Zhiyuan Ma:
Single Biometric Recognition Research: A Summary. ICIT 2018: 209-213 - [i2]Yan Chen, Alireza Bayesteh, Yiqun Wu, Bin Ren, Shaoli Kang, Shaohui Sun, Qi Xiong, Chen Qian, Bin Yu, Zhiguo Ding, Sen Wang, Shuangfeng Han, Xiaolin Hou, Hao Lin, Raphaël Visoz, Razieh Razavi:
Towards the Standardization of Non-orthogonal Multiple Access for Next Generation Wireless Networks. CoRR abs/1802.03880 (2018) - [i1]Yanfang Ye, Shifu Hou, Lingwei Chen, Jingwei Lei, Wenqiang Wan, Jiabin Wang, Qi Xiong, Fudong Shao:
AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection. CoRR abs/1811.01027 (2018) - 2017
- [c20]Qi Xiong, Chen Qian, Bin Yu, Chengjun Sun:
Advanced NoMA Scheme for 5G Cellular Network: Interleave-Grid Multiple Access. GLOBECOM Workshops 2017: 1-5 - [c19]Qi Xiong, Yuan Xu, Baofeng Zhang, Feng Wang:
Overview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting Devices. HASE 2017: 146-152 - [c18]Qi Xiong, Guiming Chen, Zhaojun Mao, Tianjun Liao, Leilei Chang:
Computational requirments analysis on the conjunctive and disjunctive assumptions for The Belief Rule Base. ICMLC 2017: 236-240 - [c17]Baofeng Zhang, Qi Xiong, Yuan Xu, Huayi Rao, Junjie Mao:
SNR-based adaptive computing resource allocation in centralized baseband pool. ISCIT 2017: 1-4 - [c16]Feng Li, Li Jia, Qi Xiong:
Identification Approach of Hammerstein-Wiener Model Corrupted by Colored Process Noise. LSMS/ICSEE (1) 2017: 432-441 - [c15]Chen Qian, Qi Xiong, Bin Yu, Chengjun Sun:
Low Complexity Detection Algorithm for Low PAPR Interleaving Based NOMA Schemes. VTC Fall 2017: 1-5 - 2016
- [j5]Qi Xiong, Ying-Chang Liang, Kwok Hung Li, Yi Gong, Shiying Han:
Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme. IEEE Trans. Inf. Forensics Secur. 11(5): 1017-1026 (2016) - 2015
- [j4]Zhi-wu Dou, Hongwei Li, Qi Xiong:
基于熵权法和神经网络的口岸物流综合能力评价方法研究 (Evaluation of Port-logistics Capability Based on Entropy Weight and BP Neural Network). 计算机科学 42(Z11): 554-556 (2015) - [j3]Qi Xiong, Ying-Chang Liang, Kwok Hung Li, Yi Gong:
An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems. IEEE Trans. Inf. Forensics Secur. 10(5): 932-940 (2015) - [c14]Qi Xiong, Hui Liu, Yuan Xu, Huayi Rao, Shengwei Yi, Baofeng Zhang, Wei Jia, Hui Deng:
A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism. EIT 2015: 404-409 - [c13]Qi Xiong, Ying-Chang Liang, Kwok Hung Li, Yi Gong:
Detection of pilot spoofing attack in multi-antenna systems via energy-ratio comparison. ICASSP 2015: 1747-1751 - [c12]Qi Xiong, Ying-Chang Liang, Kwok Hung Li, Yi Gong:
A two-way training method for defending against pilot spoofing attack in MISO systems. ICC 2015: 1880-1885 - 2014
- [j2]Qi Xiong, Yi Gong, Ying-Chang Liang, Kwok Hung Li:
Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information. IEEE Wirel. Commun. Lett. 3(4): 357-360 (2014) - 2013
- [c11]Shengwei Yi, Jize Xu, Yong Peng, Qi Xiong, Ting Wang, Shilong Ma:
Mining Frequent Rooted Ordered Tree Generators Efficiently. CyberC 2013: 132-139 - [c10]Qi Xiong, Kwok Hung Li, Ying-Chang Liang, Yi Gong:
Secure Transmission with Hybrid Relay Scheme: Relaying and Jamming. EMS 2013: 220-224 - [c9]Ting Wang, Qi Xiong, Haihui Gao, Yong Peng, Zhonghua Dai, Shengwei Yi:
Design and Implementation of Fuzzing Technology for OPC Protocol. IIH-MSP 2013: 424-428 - [c8]Qi Xiong, Yi Gong, Ying-Chang Liang:
Achieving secrecy capacity of MISO fading wiretap channels with artificial noise. WCNC 2013: 2452-2456 - 2012
- [c7]Haihui Gao, Yong Peng, Qingtang Zheng, Xi Chen, Zhonghua Dai, Yang Gao, Feng Xie, Wei Zhao, Qi Xiong:
The research and implementation of intelligent mobile video supervising system based on DSP. CCIS 2012: 657-660 - [c6]Qi Xiong, Qinghai Yang, Fenglin Fu, Kyung Sup Kwak:
Fair resource allocation for relay aided OFDMA systems under outage constraints. ICTC 2012: 30-34 - [c5]Zhonghua Dai, Qi Xiong, Yong Peng, Haihui Gao:
Research on the Large Scale Image Steganalysis Technology Based on Cloud Computing and BP Neutral Network. IIH-MSP 2012: 415-419 - 2011
- [c4]Jin Yi, Runpu Wu, Juan Li, Qi Xiong, Fajiang Yu, Tao Peng, Zhenyu Yang, Bo Han:
Similar vulnerability query based on text mining. ISCIT 2011: 339-342
2000 – 2009
- 2009
- [j1]Mei-Sen Pan, Qi Xiong, Jun-Biao Yan:
A new method for correcting vehicle license plate tilt. Int. J. Autom. Comput. 6(2): 210-216 (2009) - [c3]Yanxiang He, Tao Liu, Hai Zhong, Qi Xiong:
EA-CPNsim: A CPN-Based Simulation Platform for Analysis and Defense Design of Internet End-Systems Targeted Attacks. FCST 2009: 548-552 - 2008
- [c2]Rongwei Ye, Yinglin Wang, Jianmei Guo, Qi Xiong:
A Method to Guarantee Ontology Consistency on Property Range Changes. NPC Workshops 2008: 516-521 - [c1]Qi Xiong, Yinglin Wang, Jianmei Guo, Guilin Wu:
A Searchable Knowledge Map Based on Ontology. SKG 2008: 457-460
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint