default search action
Chen Wang 0011
Person information
- unicode name: 王琛
- affiliation: Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China
- affiliation (2013): Wuhan University, China
Other persons with the same name
- Chen Wang — disambiguation page
- Chen Wang 0001 — Mayo Clinic, Rochester, MN, USA
- Chen Wang 0002 — Beijing Normal University, College of Global Change and Earth System Science, China
- Chen Wang 0003 — University of Rochester, Department of Electrical and Computer Engineering, NY, USA
- Chen Wang 0004 — Lawrence Livermore National Laboratory, CA, USA (and 1 more)
- Chen Wang 0005 — Peking University, Intelligent Control Laboratory, Beijing, China (and 1 more)
- Chen Wang 0006 — Chinese Academy of Sciences, Key Laboratory of Electromagnetic Radiation and Sensing Technology, Beijing, China
- Chen Wang 0007 — Anhui University, School of Resources and Environmental Engineering, Hefei, China
- Chen Wang 0008 — CSIRO, Sydney, NSW, Australia (and 2 more)
- Chen Wang 0009 — Louisiana State University, Baton Rouge, LA, USA (and 2 more)
- Chen Wang 0010 — Google, Inc., Mountain View, CA, USA (and 1 more)
- Chen Wang 0012 — Xi'an Jiaotong University, Ministry of Education Key Lab for Intelligent Networks and Network Security, China (and 1 more)
- Chen Wang 0013 — National Institute of Water and Atmospheric Research Wellington, New Zealand (and 1 more)
- Chen Wang 0014 — Mentor Graphics Corporation, Wilsonville, OR, USA (and 1 more)
- Chen Wang 0015 — Nanjing University of Information Science and Technology, School of Computer and Software, China
- Chen Wang 0016 — Huaqiao University, College of Civil Engineering, Xiamen, China
- Chen Wang 0017 — Southeast University, College of Software Engineering, Nanjing, China
- Chen Wang 0018 — Tsinghua University, School of Software / National Engineering Laboratory for Big Data Software, Beijing, China
- Chen Wang 0019 — Hubei University of Automotive Technology, Department of Mechanical Engineering, Shiyan, China
- Chen Wang 0020 — IBM China Research Laboratory, Beijing, China
- Chen Wang 0021 — Xi'an Jiaotong University, School of Electronic and Information Engineering, China
- Chen Wang 0022 — Lanzhou University, School of Mathematics and Statistics, Gansu, China
- Chen Wang 0023 — Wuhan University, GNSS Research Center, China
- Chen Wang 0024 — University of Vienna, Faculty of Mathematics, Austria
- Chen Wang 0025 — Fudan University, School of Basic Medical Science / Shanghai Key Laboratory of Medical Imaging Computing and Computer Assisted Intervention, China
- Chen Wang 0026 — Beihang University, School of Computer Science and Engineering, Beijing Advanced Innovation Center for Big Data and Brain Computing, China
- Chen Wang 0027 — Rutgers University, Department of Computer Science, New Brunswick, NJ, USA (and 1 more)
- Chen Wang 0028 (aka: Chen (Mavis) Wang) — Tsinghua University, Department of Industrial Engineering, Beijing, China
- Chen Wang 0029 — University of Paris-Sud, Orsay, France
- Chen Wang 0030 — INSA, Rennes, France
- Chen Wang 0031 — Beihang University, Qingdao Research Institute, China
- Chen Wang 0032 — Shenzhen University, Shenzhen, China
- Chen Wang 0033 — State University of New York at Buffalo, NY, USA (and 2 more)
- Chen Wang 0034 — Centrum Wiskunde & Informatica, Amsterdam, The Netherlands
- Chen Wang 0035 — Fudan University, Department of Computing and Information Technology, Shanghai, China
- Chen Wang 0036 — Peking University, Institute of Computational Linguistics, Beijing, China
- Chen Wang 0037 — Peking University, College of Engineering, State Key Laboratory for turbulence and Complex Systems, Beijing, China
- Chen Wang 0038 — Ifremer Centre de Bretagne, Plouzane, France (and 2 more)
- Chen Wang 0039 — IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA (and 1 more)
- Chen Wang 0040 — KU Leuven, Belgium (and 1 more)
- Chen Wang 0041 — Suzhou University of Science and Technology, School of Electronic and Information Engineering, China (and 1 more)
- Chen Wang 0042 — Northeastern University, Software College, Shenyang, China
- Chen Wang 0043 — Beijing Technology and Business University, School of Computer and Artificial Intelligence, China (and 1 more)
- Chen Wang 0044 — Dominion Energy, Richmond, VA, USA (and 1 more)
- Chen Wang 0045 — Chang'an University, MOE Key Laboratory of Road Construction Technology and Equipment, Xi'an, China (and 1 more)
- Chen Wang 0046 — No. 722 Research Institute of CSIC, Wuhan, China
- Chen Wang 0047 — North China Electric Power University, Baoding, China
- Chen Wang 0048 — Nanjing University of Aeronautics and Astronautics, Nanjing University of Aeronautics and Astronautics, China
- Chen Wang 0049 — Tsinghua University, Beijing, China
- Chen Wang 0050 — Cornell University, USA
- Chen Wang 0051 — Nankai University, Tianjin, China
- Chen Wang 0052 — University of Illinois at Chicago, Department of Computer Science, IL, USA
- Chen Wang 0053 — Stanford University, School of Engineering, CA, USA
- Chen Wang 0054 — Shandong University, School of Software, Jinan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Gaoyang Liu, Tianlong Xu, Rui Zhang, Zixiong Wang, Chen Wang, Ling Liu:
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models. IEEE Trans. Inf. Forensics Secur. 19: 427-440 (2024) - [j40]Jian Chen, Yuan Gao, Gaoyang Liu, Ahmed M. Abdelmoniem, Chen Wang:
Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive Learning. IEEE Trans. Inf. Forensics Secur. 19: 2412-2424 (2024) - [j39]Haojun Huang, Fengxiang Ding, Hao Yin, Gaoyang Liu, Chen Wang, Dapeng Oliver Wu:
EgoMUIL: Enhancing Spatio-Temporal User Identity Linkage in Location-Based Social Networks With Ego-Mo Hypergraph. IEEE Trans. Mob. Comput. 23(8): 8341-8354 (2024) - 2023
- [j38]Lan Liu, Yi Wang, Gaoyang Liu, Kai Peng, Chen Wang:
Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity. IEEE Trans. Dependable Secur. Comput. 20(3): 2341-2347 (2023) - [j37]Zehao Tian, Zixiong Wang, Ahmed M. Abdelmoniem, Gaoyang Liu, Chen Wang:
Knowledge Representation of Training Data With Adversarial Examples Supporting Decision Boundary. IEEE Trans. Inf. Forensics Secur. 18: 4116-4127 (2023) - [j36]Gaoyang Liu, Zehao Tian, Jian Chen, Chen Wang, Jiangchuan Liu:
TEAR: Exploring Temporal Evolution of Adversarial Robustness for Membership Inference Attacks Against Federated Learning. IEEE Trans. Inf. Forensics Secur. 18: 4996-5010 (2023) - [j35]Jian Chen, Yuan Gao, Jinyong Shan, Kai Peng, Chen Wang, Hongbo Jiang:
Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks. IEEE Trans. Ind. Informatics 19(2): 1803-1813 (2023) - [j34]Xiaoqiang Ma, Fengxiang Ding, Kai Peng, Yang Yang, Chen Wang:
CP-Link: Exploiting Continuous Spatio-Temporal Check-In Patterns for User Identity Linkage. IEEE Trans. Mob. Comput. 22(8): 4594-4606 (2023) - [j33]Chen Wang, Mengting Yuan, Rui Zhang, Kai Peng, Ling Liu:
Efficient Point-of-Interest Recommendation Services With Heterogenous Hypergraph Embedding. IEEE Trans. Serv. Comput. 16(2): 1132-1143 (2023) - [c19]Chunming Liu, Daniyal M. Alghazzawi, Li Cheng, Gaoyang Liu, Chen Wang, Cheng Zeng, Yang Yang:
Disentangling Client Contributions: Improving Federated Learning Accuracy in the Presence of Heterogeneous Data. ISPA/BDCloud/SocialCom/SustainCom 2023: 381-387 - [c18]Zhen Wang, Daniyal M. Alghazzawi, Li Cheng, Gaoyang Liu, Chen Wang, Zeng Cheng, Yang Yang:
FedCSA: Boosting the Convergence Speed of Federated Unlearning under Data Heterogeneity. ISPA/BDCloud/SocialCom/SustainCom 2023: 388-393 - [c17]Yuying Li, Yang Yang, Chen Wang, Runqin Liu, Hongbo Jiang, Wenping Liu:
Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring. ISPA/BDCloud/SocialCom/SustainCom 2023: 648-655 - [c16]Min Chen, Weizhuo Gao, Gaoyang Liu, Kai Peng, Chen Wang:
Boundary Unlearning: Rapid Forgetting of Deep Networks via Shifting the Decision Boundary. CVPR 2023: 7766-7775 - [i4]Min Chen, Weizhuo Gao, Gaoyang Liu, Kai Peng, Chen Wang:
Boundary Unlearning. CoRR abs/2303.11570 (2023) - 2022
- [j32]Chen Wang, Jian Chen, Yang Yang, Xiaoqiang Ma, Jiangchuan Liu:
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects. Digit. Commun. Networks 8(2): 225-234 (2022) - [j31]Chen Wang, Xinkui Wu, Gaoyang Liu, Tianping Deng, Kai Peng, Shaohua Wan:
Safeguarding cross-silo federated learning with local differential privacy. Digit. Commun. Networks 8(4): 446-454 (2022) - [j30]Wenqing Cheng, Ruxue Wen, Haojun Huang, Wang Miao, Chen Wang:
OPTDP: Towards optimal personalized trajectory differential privacy for trajectory data publishing. Neurocomputing 472: 201-211 (2022) - [j29]Gaoyang Liu, Tianlong Xu, Xiaoqiang Ma, Chen Wang:
Your Model Trains on My Data? Protecting Intellectual Property of Training Data via Membership Fingerprint Authentication. IEEE Trans. Inf. Forensics Secur. 17: 1024-1037 (2022) - [j28]Haojun Huang, Wang Miao, Zhaoxi Li, Jialin Tian, Chen Wang, Geyong Min:
Enabling Energy Trading in Cooperative Microgrids: A Scalable Blockchain-Based Approach With Redundant Data Exchange. IEEE Trans. Ind. Informatics 18(10): 7077-7085 (2022) - [j27]Zichuan Liu, Rui Zhang, Chen Wang, Zhu Xiao, Hongbo Jiang:
Spatial-Temporal Conv-Sequence Learning With Accident Encoding for Traffic Flow Prediction. IEEE Trans. Netw. Sci. Eng. 9(3): 1765-1775 (2022) - [c15]Xuxin Zhang, Di Wang, Dehong Gao, Wen Jiang, Wei Ning, Yang Zhou, Chen Wang:
Revisiting Cold-Start Problem in CTR Prediction: Augmenting Embedding via GAN. CIKM 2022: 4702-4706 - [c14]Jian Chen, Yuan Gao, Yang Liu, Chen Wang, Kai Peng:
Leveraging Model Poisoning Attacks on License Plate Recognition Systems. TrustCom 2022: 827-834 - 2021
- [j26]Gaoyang Liu, Rui Zhang, Yang Yang, Chen Wang, Ling Liu:
GPS spoofed or not? Exploiting RSSI and TSS in crowdsourced air traffic control data. Distributed Parallel Databases 39(1): 231-257 (2021) - [j25]Kai Peng, Meijun Li, Haojun Huang, Chen Wang, Shaohua Wan, Kim-Kwang Raymond Choo:
Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey. IEEE Internet Things J. 8(15): 12004-12020 (2021) - [j24]Gaoyang Liu, Chen Wang, Xiaoqiang Ma, Yang Yang:
Keep Your Data Locally: Federated-Learning-Based Data Privacy Preservation in Edge Computing. IEEE Netw. 35(2): 60-66 (2021) - [j23]Jian Chen, Xuxin Zhang, Rui Zhang, Chen Wang, Ling Liu:
De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks. IEEE Trans. Inf. Forensics Secur. 16: 3412-3425 (2021) - [j22]Xuxin Zhang, Jian Chen, Rui Zhang, Chen Wang, Ling Liu:
Attacking Recommender Systems With Plausible Profile. IEEE Trans. Inf. Forensics Secur. 16: 4788-4800 (2021) - [c13]Gaoyang Liu, Xiaoqiang Ma, Yang Yang, Chen Wang, Jiangchuan Liu:
FedEraser: Enabling Efficient Client-Level Data Removal from Federated Learning Models. IWQoS 2021: 1-10 - [c12]Ruxue Wen, Rui Zhang, Kai Peng, Chen Wang:
Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries. TrustCom 2021: 379-386 - [c11]Gaoyang Liu, Shijie Wang, Borui Wan, Zekun Wang, Chen Wang:
ML-Stealer: Stealing Prediction Functionality of Machine Learning Models with Mere Black-Box Access. TrustCom 2021: 532-539 - [i3]Jian Chen, Xuxin Zhang, Rui Zhang, Chen Wang, Ling Liu:
De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks. CoRR abs/2105.03592 (2021) - [i2]Zichuan Liu, Rui Zhang, Chen Wang, Hongbo Jiang:
Spatial-Temporal Conv-sequence Learning with Accident Encoding for Traffic Flow Prediction. CoRR abs/2105.10478 (2021) - 2020
- [j21]Rui Zhang, Guifa Zhang, Lan Liu, Chen Wang, Shaohua Wan:
Anomaly detection in bitcoin information networks with multi-constrained meta path. J. Syst. Archit. 110: 101829 (2020) - [j20]Haojun Huang, Wang Miao, Geyong Min, Chengqiang Huang, Xu Zhang, Chen Wang:
Resilient Range-Based d-Dimensional Localization for Mobile Sensor Networks. IEEE/ACM Trans. Netw. 28(5): 2037-2050 (2020) - [j19]Chen Wang, Gaoyang Liu, Haojun Huang, Weijie Feng, Kai Peng, Lizhe Wang:
MIASec: Enabling Data Indistinguishability Against Membership Inference Attacks in MLaaS. IEEE Trans. Sustain. Comput. 5(3): 365-376 (2020) - [j18]Shaohua Wan, Meijun Li, Gaoyang Liu, Chen Wang:
Recent advances in consensus protocols for blockchain: a survey. Wirel. Networks 26(8): 5579-5593 (2020) - [c10]Ruxue Wen, Wenqing Cheng, Haojun Huang, Wang Miao, Chen Wang:
Privacy Preserving Trajectory Data Publishing with Personalized Differential Privacy. ISPA/BDCloud/SocialCom/SustainCom 2020: 313-320 - [c9]Fengxiang Ding, Xiaoqiang Ma, Yang Yang, Chen Wang:
User Identity Linkage across Location-Based Social Networks with Spatio- Temporal Check-in Patterns. ISPA/BDCloud/SocialCom/SustainCom 2020: 1278-1285 - [p1]Meijun Li, Gaoyang Liu, Jialin Tian, Chen Wang, Yang Yang, Shaohua Wan:
Blockchain consensuses and incentives. Blockchains for Network Security 2020: 39-63 - [i1]Gaoyang Liu, Yang Yang, Xiaoqiang Ma, Chen Wang, Jiangchuan Liu:
Federated Unlearning. CoRR abs/2012.13891 (2020)
2010 – 2019
- 2019
- [j17]Rui Zhang, Peng Xie, Chen Wang, Gaoyang Liu, Shaohua Wan:
Classifying transportation mode and speed from trajectory data via deep multi-scale learning. Comput. Networks 162 (2019) - [j16]Ping Zhao, Hongbo Jiang, Chen Wang, Haojun Huang, Gaoyang Liu, Yang Yang:
On the Performance of $k$ -Anonymity Against Inference Attacks With Background Information. IEEE Internet Things J. 6(1): 808-819 (2019) - [j15]Gaoyang Liu, Chen Wang, Kai Peng, Haojun Huang, Yutong Li, Wenqing Cheng:
SocInf: Membership Inference Attacks on Social Media Health Data With Machine Learning. IEEE Trans. Comput. Soc. Syst. 6(5): 907-921 (2019) - [c8]Rui Zhang, Jiming Guo, Yueqi Zhou, Hongbo Jiang, Chen Wang:
traj2bits: indexing trajectory data for efficient query. ACM TUR-C 2019: 17:1-17:5 - [c7]Rui Zhang, Jiming Guo, Hongbo Jiang, Peng Xie, Chen Wang:
Multi-Task Learning for Location Prediction with Deep Multi-Model Ensembles. HPCC/SmartCity/DSS 2019: 1093-1100 - [c6]Rui Zhang, Peng Xie, Hongbo Jiang, Zhu Xiao, Chen Wang, Ling Liu:
Clustering Noisy Trajectories via Robust Deep Attention Auto-Encoders. MDM 2019: 63-71 - [c5]Gaoyang Liu, Rui Zhang, Chen Wang, Ling Liu:
Synchronization-Free GPS Spoofing Detection with Crowdsourced Air Traffic Control Data. MDM 2019: 260-268 - 2018
- [j14]Ping Zhao, Jie Li, Fanzi Zeng, Fu Xiao, Chen Wang, Hongbo Jiang:
ILLIA: Enabling k-Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries. IEEE Internet Things J. 5(2): 1033-1042 (2018) - [j13]Ju Wang, Jie Xiong, Hongbo Jiang, Kyle Jamieson, Xiaojiang Chen, Dingyi Fang, Chen Wang:
Low Human-Effort, Device-Free Localization with Fine-Grained Subcarrier Information. IEEE Trans. Mob. Comput. 17(11): 2550-2563 (2018) - [j12]Yang Yang, Wenping Liu, Hongbo Jiang, Chen Wang, Desheng Wang, Hongzhi Lin:
SNP: A 1-Manifold Skeleton-Based Navigation Protocol in 3D Sensor Networks. IEEE Trans. Mob. Comput. 17(12): 2912-2924 (2018) - [j11]Hongbo Jiang, Ping Zhao, Chen Wang:
RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries. IEEE/ACM Trans. Netw. 26(2): 1018-1032 (2018) - [j10]Ping Zhao, Hongbo Jiang, John C. S. Lui, Chen Wang, Fanzi Zeng, Fu Xiao, Zhetao Li:
P3-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization. IEEE/ACM Trans. Netw. 26(6): 2856-2869 (2018) - [c4]Ping Zhao, Hongbo Jiang, Chen Wang, Haojun Huang:
Non-asymptotic Bound on the Performance of k-Anonymity against Inference Attacks. HPCC/SmartCity/DSS 2018: 570-577 - [c3]Rui Zhang, Peng Xie, Chen Wang, Gaoyang Liu, Shaohua Wan:
Understanding Mobility via Deep Multi-Scale Learning. IIKI 2018: 487-494 - 2017
- [j9]Chen Wang, Hongzhi Lin, Rui Zhang, Hongbo Jiang:
SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks. IEEE Trans. Mob. Comput. 16(4): 1149-1162 (2017) - 2016
- [j8]Chen Wang, Hongzhi Lin, Hongbo Jiang:
CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks. IEEE Trans. Mob. Comput. 15(5): 1077-1089 (2016) - [j7]Chen Wang, Hongbo Jiang, Tianlong Yu, John C. S. Lui:
SLICE: Enabling Greedy Routing in High Genus 3-D WSNs With General Topologies. IEEE/ACM Trans. Netw. 24(4): 2472-2484 (2016) - [j6]Chen Wang, Hongbo Jiang, Yan Dong:
Connectivity-Based Space Filling Curve Construction Algorithms in High Genus 3D Surface WSNs. ACM Trans. Sens. Networks 12(3): 22:1-22:29 (2016) - [j5]Chen Wang, Wei Wei, Hongzhi Lin, Hongbo Jiang, John C. S. Lui:
BLOW-UP: Toward Distributed and Scalable Space Filling Curve Construction in 3D Volumetric WSNs. ACM Trans. Sens. Networks 12(4): 30:1-30:20 (2016) - [j4]Wei Wei, Chen Wang, Hongzhi Lin, Rui Zhang, Hongbo Jiang:
A novel networking architecture for mobile content delivery in urban transport systems. Wirel. Networks 22(2): 427-438 (2016) - [j3]Tingwei Liu, Hongzhi Lin, Chen Wang, Kai Peng, Desheng Wang, Tianping Deng, Hongbo Jiang:
Chain-based barrier coverage in WSNs: toward identifying and repairing weak zones. Wirel. Networks 22(2): 523-536 (2016) - 2015
- [j2]Donghui Zhu, Qiangong Tao, Jing Xing, Yubao Wang, Wenping Liu, Tianping Deng, Hongzhi Lin, Chen Wang, Hongbo Jiang:
Boundary-free skeleton extraction and its evaluation in sensor networks. Wirel. Networks 21(1): 269-280 (2015) - [c2]Chen Wang, Hongbo Jiang:
SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs. INFOCOM 2015: 981-989 - 2014
- [j1]Chen Wang, Hongzhi Lin, Hongbo Jiang:
Trajectory-based multi-dimensional outlier detection in wireless sensor networks using Hidden Markov Models. Wirel. Networks 20(8): 2409-2418 (2014) - 2012
- [c1]Chen Wang, Yanjun Fang, Hongmei Zhang:
On optimizing the transmission power of multi-hop underwater acoustic networks. ICON 2012: 120-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint