default search action
Yuting Chen 0001
Person information
- affiliation: Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, Shanghai, China
- affiliation (PhD 2007): Hosei University, Faculty of Computer and Information Sciences, Tokyo, Japan
Other persons with the same name
- Yuting Chen (aka: Yu-Ting Chen) — disambiguation page
- Yuting Chen 0002 (aka: Yu-Ting Chen 0002) — Google Research, Mountain View, CA, USA (and 1 more)
- Yuting Chen 0003 (aka: Yu-Ting Chen 0003) — University of California, Computer Science Department, Los Angeles, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Xuan Li, Shuai Yuan, Xiaodong Gu, Yuting Chen, Beijun Shen:
Few-shot code translation via task-adapted prompt learning. J. Syst. Softw. 212: 112002 (2024) - [j24]Bochuan Chen, Xiao Guo, Yuting Chen, Xiaofeng Yu, Lei Bu:
Constructing exception handling chains for testing Java virtual machine implementations. J. Softw. Evol. Process. 36(4) (2024) - [j23]Dong Liu, He Jiang, Shikai Guo, Yuting Chen, Lei Qiao:
What's Wrong With Low-Code Development Platforms? An Empirical Study of Low-Code Development Platform Bugs. IEEE Trans. Reliab. 73(1): 695-709 (2024) - [c76]Jinming Ma, Xiuhong Li, Zihan Wang, Xingcheng Zhang, Shengen Yan, Yuting Chen, Yueqian Zhang, Minxi Jin, Lijuan Jiang, Yun Liang, Chao Yang, Dahua Lin:
A Holistic Functionalization Approach to Optimizing Imperative Tensor Programs in Deep Learning. DAC 2024: 200:1-200:6 - 2023
- [j22]Wenhui Jiang, Xiaodong Gu, Yuting Chen, Beijun Shen:
DuReSE: Rewriting Incomplete Utterances via Neural Sequence Editing. Neural Process. Lett. 55(7): 8713-8730 (2023) - [j21]Pengbo Nie, Chengcheng Wan, Jiayu Zhu, Ziyi Lin, Yuting Chen, Zhendong Su:
Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS Implementations. ACM Trans. Softw. Eng. Methodol. 32(1): 3:1-3:32 (2023) - [c75]Lingtong Meng, Yuting Chen:
DFairNAS: A Dataflow Fairness Approach to Training NAS Neural Networks. CISP-BMEI 2023: 1-6 - [c74]Xinyuan Miao, Ziyi Lin, Shaojun Wang, Lei Yu, Sanhong Li, Zihan Wang, Pengbo Nie, Yuting Chen, Beijun Shen, He Jiang:
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGX. ICSE 2023: 1648-1660 - [c73]Zihan Wang, Pengbo Nie, Xinyuan Miao, Yuting Chen, Chengcheng Wan, Lei Bu, Jianjun Zhao:
GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing. ISSTA 2023: 904-916 - [c72]Shuai Zhang, Xiaodong Gu, Yuting Chen, Beijun Shen:
InfeRE: Step-by-Step Regex Generation via Chain of Inference. ASE 2023: 1505-1515 - [i2]Shuai Zhang, Xiaodong Gu, Yuting Chen, Beijun Shen:
InfeRE: Step-by-Step Regex Generation via Chain of Inference. CoRR abs/2308.04041 (2023) - 2022
- [j20]Yuting Chen, Dongcheng Li, W. Eric Wong, Zhao Man, Dengfeng Mo:
Multi-UAV Collaborative Path Planning using Hierarchical Reinforcement Learning and Simulated Annealing. Int. J. Perform. Eng. 18(7): 463 (2022) - [j19]Dangwei Wu, Beijun Shen, Yuting Chen, He Jiang, Lei Qiao:
Automatically repairing tensor shape faults in deep learning programs. Inf. Softw. Technol. 151: 107027 (2022) - [j18]Zhide Zhou, He Jiang, Zhilei Ren, Yuting Chen, Lei Qiao:
LocSeq: Automated Localization for Compiler Optimization Sequence Bugs of LLVM. IEEE Trans. Reliab. 71(2): 896-910 (2022) - [c71]Zihan Wang, Chengcheng Wan, Yuting Chen, Ziyi Lin, He Jiang, Lei Qiao:
Hierarchical memory-constrained operator scheduling of neural architecture search networks. DAC 2022: 493-498 - [c70]Jingyu Wang, Shengan Zheng, Ziyi Lin, Yuting Chen, Linpeng Huang:
Zebra: An Efficient, RDMA-Enabled Distributed Persistent Memory File System. DASFAA (1) 2022: 341-349 - 2021
- [j17]Yiyang Fu, Benjun Shen, Yuting Chen, Linpeng Huang:
TDMatcher: A topic-based approach to task-developer matching with predictive intelligence for recommendation. Appl. Soft Comput. 110: 107720 (2021) - [j16]Mingxin Zhao, Qinyue Wu, Enze Ma, Beijun Shen, Yuting Chen:
Context-Aware Conversational Recommendation of Trigger-Action Rules in IoT Programming. Int. J. Softw. Eng. Knowl. Eng. 31(10): 1517-1538 (2021) - [j15]Yuetian Mao, Shuai Yuan, Nan Cui, Tianjiao Du, Beijun Shen, Yuting Chen:
DeFiHap: Detecting and Fixing HiveQL Anti-Patterns. Proc. VLDB Endow. 14(12): 2671-2674 (2021) - [c69]Nan Cui, Chunqi Chen, Beijun Shen, Yuting Chen:
Learning to Match Workers and Tasks via a Multi-View Graph Attention Network. COMPSAC 2021: 176-185 - [c68]Xintian Yu, Enze Ma, Pengbo Nie, Beijun Shen, Yuting Chen, Ziyi Lin:
ApproxiFuzzer: Fuzzing towards Deep Code Snippets in Java Programs. COMPSAC 2021: 1149-1156 - [c67]Litong You, Tianxiao Gu, Shengan Zheng, Jianmei Guo, Sanhong Li, Yuting Chen, Linpeng Huang:
JPDHeap: A JVM Heap Design for PM-DRAM Memories. DAC 2021: 31-36 - [c66]Rulin Huang, Kaixin Huang, Jingyu Wang, Yuting Chen:
Reno: An RDMA-Enabled, Non-Volatile Memory-Optimized Key-Value Store. ICPADS 2021: 466-473 - [c65]Dangwei Wu, Beijun Shen, Yuting Chen, He Jiang, Lei Qiao:
Tensfa: Detecting and Repairing Tensor Shape Faults in Deep Learning Systems. ISSRE 2021: 11-21 - [c64]Diwei Chen, Beijun Shen, Yuting Chen:
ConLAR: Learning to Allocate Resources to Docker Containers under Time-Varying Workloads. QRS 2021: 458-469 - [i1]Dangwei Wu, Beijun Shen, Yuting Chen:
An Empirical Study on Tensor Shape Faults in Deep Learning Systems. CoRR abs/2106.02887 (2021) - 2020
- [j14]Shuhan Yan, Tianjiao Du, Beijun Shen, Yuting Chen, Zhilei Ren:
Feedback2Code: A Deep Learning Approach to Identifying User-Feedback-Related Source Code Files. Int. J. Softw. Eng. Knowl. Eng. 30(1): 1-22 (2020) - [j13]Qinyue Wu, Duankang Fu, Beijun Shen, Yuting Chen:
Semantic Service Search in IT Crowdsourcing Platform: A Knowledge Graph-Based Approach. Int. J. Softw. Eng. Knowl. Eng. 30(6): 765-783 (2020) - [c63]Wei Li, Haozhe Qin, Shuhan Yan, Beijun Shen, Yuting Chen:
Learning Code-Query Interaction for Enhancing Code Searches. ICSME 2020: 115-126 - [c62]Jiayu Zhu, Chengcheng Wan, Pengbo Nie, Yuting Chen, Zhendong Su:
Guided, Deep Testing of X.509 Certificate Validation via Coverage Transfer Graphs. ICSME 2020: 243-254 - [c61]Qinyue Wu, Beijun Shen, Yuting Chen:
Learning to Recommend Trigger-Action Rules for End-User Development - A Knowledge Graph Based Approach. ICSR 2020: 190-207 - [c60]Haibo Yu, Qiang Sun, Kejun Xiao, Yuting Chen, Tsunenori Mine, Jianjun Zhao:
Parallelizing Flow-Sensitive Demand-Driven Points-to Analysis. QRS Companion 2020: 91-97 - [c59]Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen, Lingxiao Jiang:
Are the Code Snippets What We Are Searching for? A Benchmark and an Empirical Study on Code Search with Natural-Language Queries. SANER 2020: 344-354
2010 – 2019
- 2019
- [j12]Weizhao Yuan, Hoang H. Nguyen, Lingxiao Jiang, Yuting Chen, Jianjun Zhao, Haibo Yu:
API recommendation for event-driven Android application development. Inf. Softw. Technol. 107: 30-47 (2019) - [j11]Litong You, Hao Xu, Qipeng Zhang, Tianyou Li, Chen Li, Yuting Chen, Linpeng Huang:
JDap: Supporting in-memory data persistence in javascript using Intel's PMDK. J. Syst. Archit. 101 (2019) - [c58]Wei Li, Shuhan Yan, Beijun Shen, Yuting Chen:
Reinforcement Learning of Code Search Sessions. APSEC 2019: 458-465 - [c57]Yanru Peng, Yuting Chen, Beijun Shen:
An Adaptive Approach to Recommending Obfuscation Rules for Java Bytecode Obfuscators. COMPSAC (1) 2019: 97-106 - [c56]Shunfeng Peng, Yanyan Shen, Yanmin Zhu, Yuting Chen:
A Frequency-Aware Spatio-Temporal Network for Traffic Flow Prediction. DASFAA (2) 2019: 697-712 - [c55]Yuting Chen, Ting Su, Zhendong Su:
Deep differential testing of JVM implementations. ICSE 2019: 1257-1268 - [c54]Tianjiao Du, Junming Cao, Qinyue Wu, Wei Li, Beijun Shen, Yuting Chen:
CocoQa: Question Answering for Coding Conventions Over Knowledge Graphs. ASE 2019: 1086-1089 - [c53]Junming Cao, Tianjiao Du, Beijun Shen, Wei Li, Qinyue Wu, Yuting Chen:
Constructing a Knowledge Base of Coding Conventions from Online Resources. SEKE 2019: 5-14 - [c52]Duankang Fu, Shufan Zhou, Beijun Shen, Yuting Chen:
Enhancing Semantic Search of Crowdsourcing IT Services using Knowledge Graph. SEKE 2019: 307-409 - [c51]Zeyu Ni, Beijun Shen, Yuting Chen, Zhangyuan Meng, Junming Cao:
CrowDevBot: A Task-Oriented Conversational Bot for Software Crowdsourcing Platform (S). SEKE 2019: 410-522 - [c50]Chunqi Chen, Yunxiang Xiong, Beijun Shen, Yuting Chen:
Generating SQL Statements from Natural Language Queries: A Multitask Learning Approach (S). SEKE 2019: 518-674 - 2018
- [j10]Anil Kumar Karna, Yuting Chen, Haibo Yu, Hao Zhong, Jianjun Zhao:
The role of model checking in software engineering. Frontiers Comput. Sci. 12(4): 642-668 (2018) - [c49]Qipeng Zhang, Tianyou Li, Pan Deng, Yuting Chen, Linpeng Huang, Andy Rudoff:
SPMP: A JavaScript Support for Shared Persistent Memory on Node.js. ICA3PP (2) 2018: 354-366 - [c48]Hao Xu, Yanmin Zhu, Yuting Chen, Linpeng Huang, Tianyou Li, Pan Deng:
JSNVM: Supporting Data Persistence in JavaScript Using Non-Volatile Memory. ICPADS 2018: 457-464 - [c47]Weizhao Yuan, Hoang H. Nguyen, Lingxiao Jiang, Yuting Chen:
LibraryGuru: API recommendation for Android developers. ICSE (Companion Volume) 2018: 364-365 - 2017
- [j9]Ting Su, Ke Wu, Weikai Miao, Geguang Pu, Jifeng He, Yuting Chen, Zhendong Su:
A Survey on Data-Flow Testing. ACM Comput. Surv. 50(1): 5:1-5:35 (2017) - [j8]Ziyi Lin, Yilei Zhou, Hao Zhong, Yuting Chen, Haibo Yu, Jianjun Zhao:
SPDebugger: A Fine-Grained Deterministic Debugger for Concurrency Code. IEICE Trans. Inf. Syst. 100-D(3): 473-482 (2017) - [c46]Yingyi Wang, Yuting Chen, Beijun Shen, Hao Zhong:
CRSearcher: Searching Code Database for Repairing Bugs. Internetware 2017: 16:1-16:6 - [c45]Yu Yang, Wenkai Mo, Beijun Shen, Yuting Chen:
Cold-Start Developer Recommendation in Software Crowdsourcing: A Topic Sampling Approach. SEKE 2017: 376-381 - [c44]Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, Zhendong Su:
Guided, stochastic model-based GUI testing of Android apps. ESEC/SIGSOFT FSE 2017: 245-256 - 2016
- [c43]Shensi Tong, Qing He, Yuting Chen, Ye Yang, Beijun Shen:
Heterogeneous Cross-Company Effort Estimation through Transfer Learning. APSEC 2016: 169-176 - [c42]Xuyang Cai, Jiangang Zhu, Beijun Shen, Yuting Chen:
GRETA: Graph-Based Tag Assignment for GitHub Repositories. COMPSAC 2016: 63-72 - [c41]Zhenzheng Qian, Beijun Shen, Wenkai Mo, Yuting Chen:
SatiIndicator: Leveraging User Reviews to Evaluate User Satisfaction of SourceForge Projects. COMPSAC 2016: 93-102 - [c40]Qing He, Beijun Shen, Yuting Chen:
Software Defect Prediction Using Semi-Supervised Learning with Change Burst Information. COMPSAC 2016: 113-122 - [c39]Peng Yu, Renke Wu, Haojie Zhou, Haibo Yu, Yuting Chen, Hao Zhong:
Multicast routing tree for sequenced packet transmission in software-defined networks. Internetware 2016: 27-35 - [c38]Chengcheng Wan, Zece Zhu, Yuchen Zhang, Yuting Chen:
Multi-perspective change impact analysis using linked data of software engineering. Internetware 2016: 95-98 - [c37]Xiao Cheng, Hao Zhong, Yuting Chen, Zhenjiang Hu, Jianjun Zhao:
Rule-directed code clone synchronization. ICPC 2016: 1-10 - [c36]Ziyi Lin, Hao Zhong, Yuting Chen, Jianjun Zhao:
LockPeeker: detecting latent locks in Java APIs. ASE 2016: 368-378 - [c35]Yuting Chen, Ting Su, Chengnian Sun, Zhendong Su, Jianjun Zhao:
Coverage-directed differential testing of JVM implementations. PLDI 2016: 85-99 - [c34]Zhenzheng Qian, Chengcheng Wan, Yuting Chen:
Evaluating quality-in-use of FLOSS through analyzing user reviews. SNPD 2016: 547-552 - [c33]Xiao Cheng, Yuting Chen, Zhenjiang Hu, Tao Zan, Mengyu Liu, Hao Zhong, Jianjun Zhao:
Supporting Selective Undo for Refactoring. SANER 2016: 13-23 - 2015
- [c32]Wenkai Mo, Beijun Shen, Yuting Chen, Jiangang Zhu:
TBIL: A Tagging-Based Approach to Identity Linkage Across Software Communities. APSEC 2015: 56-63 - [c31]Christoph Bockisch, Marnix van 't Riet, Haihan Yin, Mehmet Aksit, Ziyi Lin, Yuting Chen, Jianjun Zhao:
Trace-based debugging for advanced-dispatching programming languages. ICOOOLPS@ECOOP 2015: 3:1-3:10 - [c30]Ziyi Lin, Darko Marinov, Hao Zhong, Yuting Chen, Jianjun Zhao:
JaConTeBe: A Benchmark Suite of Real-World Java Concurrency Bugs (T). ASE 2015: 178-189 - [c29]Shixiong Zhao, Beijun Shen, Yuting Chen, Hao Zhong:
Towards Effective Developer Recommendation in Software Crowdsourcing. SEKE 2015: 326-329 - [c28]Yuting Chen, Zhendong Su:
Guided differential testing of certificate validation in SSL/TLS implementations. ESEC/SIGSOFT FSE 2015: 793-804 - 2014
- [j7]Qiang Sun, Yuting Chen, Jianjun Zhao:
A constraint-weaving approach to points-to analysis for AspectJ. Frontiers Comput. Sci. 8(1): 52-68 (2014) - [c27]Yu Zhang, Beijun Shen, Yuting Chen:
Mining Developer Mailing List to Predict Software Defects. APSEC (1) 2014: 383-390 - [c26]Biwen Li, Beijun Shen, Jun Wang, Yuting Chen, Tao Zhang, Jinshuang Wang:
A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 Model. COMPSAC 2014: 406-415 - [c25]Jingzhou Liu, Yuting Chen, Chen Li, Jianjun Zhao:
AspectBreeze: integrating trustworthiness aspects into graph grammar supported architecture description language. Internetware 2014: 80-88 - [c24]Yuting Chen, Qiuwei Shi, Weikai Miao:
Incremental Points-to Analysis for Java via Edit Propagation. SOFL+MSVL 2014: 164-178 - 2013
- [j6]Yuting Chen:
Platform Independent Analysis of Probabilities on Multithreaded Programs. Int. J. Softw. Innov. 1(3): 48-65 (2013) - [j5]Cheng Zhang, Juyuan Yang, Dacong Yan, Shengqian Yang, Yuting Chen:
Automated Breakpoint Generation for Debugging. J. Softw. 8(3): 603-616 (2013) - [c23]Yuting Chen:
Platform independent analysis of probabilities on execution paths of multithreaded programs. ICIS 2013: 397-404 - [c22]Anil Kumar Karna, Yuting Chen:
Anticrasher: Predicting and preventing impending crashes on runtime at user end. ICACCI 2013: 448-453 - [c21]Qiang Sun, Yuting Chen, Jianjun Zhao:
Constraint-based locality analysis for X10 programs. PEPM 2013: 137-146 - [c20]Qi Wang, Jingyu Zhou, Yuting Chen, Yizhou Zhang, Jianjun Zhao:
Extracting URLs from JavaScript via program analysis. ESEC/SIGSOFT FSE 2013: 627-630 - [c19]Yuting Chen:
Checking Internal Consistency of SOFL Specification: A Hybrid Approach. SOFL+MSVL 2013: 175-191 - 2012
- [j4]Shaoying Liu, Yuting Chen, Fumiko Nagoya, John A. McDermid:
Formal Specification-Based Inspection for Verification of Programs. IEEE Trans. Software Eng. 38(5): 1100-1122 (2012) - [c18]Jun Wang, Beijun Shen, Yuting Chen:
Compressed C4.5 Models for Software Defect Prediction. QSIC 2012: 13-16 - 2011
- [c17]Qiang Sun, Jianjun Zhao, Yuting Chen:
Probabilistic Points-to Analysis for Java. CC 2011: 62-81 - [c16]Cheng Zhang, Hao Xu, Sai Zhang, Jianjun Zhao, Yuting Chen:
Frequency Estimation of Virtual Call Targets for Object-Oriented Programs. ECOOP 2011: 510-532 - 2010
- [j3]Shaoying Liu, John A. McDermid, Yuting Chen:
A Rigorous Method for Inspection of Model-Based Formal Specifications. IEEE Trans. Reliab. 59(4): 667-684 (2010) - [c15]Cheng Zhang, Dacong Yan, Jianjun Zhao, Yuting Chen, Shengqian Yang:
BPGen: an automated breakpoint generator for debugging. ICSE (2) 2010: 271-274 - [c14]Yuting Chen, Shaoying Liu, Linzhang Wang:
An Extension to Data-Flow-Oriented Formal Specification Language for Specifying Concurrent Software Systems. QSIC 2010: 214-219
2000 – 2009
- 2009
- [c13]Yu Lin, Xucheng Tang, Yuting Chen, Jianjun Zhao:
A Divergence-Oriented Approach to Adaptive Random Testing of Java Programs. ASE 2009: 221-232 - 2008
- [j2]Yuting Chen, Shaoying Liu, W. Eric Wong:
A Review Approach to Detecting Violations of Consistency between Specification and Program Structures. Int. J. Softw. Eng. Knowl. Eng. 18(8): 1013-1042 (2008) - [j1]Shaoying Liu, Yuting Chen:
A relation-based method combining functional and structural testing for test case generation. J. Syst. Softw. 81(2): 234-248 (2008) - [c12]Yuting Chen, Shaoying Liu, W. Eric Wong:
A Method Combining Review and Testing for Verifying Software Systems. BMEI (2) 2008: 827-831 - [c11]Omar el Ariss, Dianxiang Xu, W. Eric Wong, Yuting Chen, Yann-Hang Lee:
A Systematic Approach for Integrating Fault Trees into System Statecharts. COMPSAC 2008: 120-123 - 2006
- [c10]Fumiko Nagoya, Yuting Chen, Shaoying Liu:
An Empirical Study on a Specification-Based Program Review Approach. DepCoS-RELCOMEX 2006: 199-206 - [c9]Yuting Chen, Shaoying Liu, Fumiko Nagoya:
A Tool-Supported Review Approach to Detecting Structural Consistency Violations. ICECCS 2006: 121-130 - 2005
- [c8]Yuting Chen, Shaoying Liu, Fumiko Nagoya:
A Review Approach to Detecting Structural Consistency Violations in Programs. ACIS-ICIS 2005: 61-66 - [c7]Fumiko Nagoya, Shaoying Liu, Yuting Chen:
A Tool and Case Study for Specification-Based Program Review. COMPSAC (1) 2005: 375-380 - [c6]Yuting Chen, Shaoying Liu, Fumiko Nagoya:
A Framework for SOFL-Based Program Review. ICECCS 2005: 6-7 - [c5]Fumiko Nagoya, Shaoying Liu, Yuting Chen:
Design of a Tool for Specification-Based Program Review. ICECCS 2005: 10-11 - [c4]Shaoying Liu, Fumiko Nagoya, Yuting Chen, Masashi Goya, John A. McDermid:
An Automated Approach to Specification-Based Program Inspection. ICFEM 2005: 421-434 - 2004
- [c3]Yuting Chen, Shaoying Liu:
An Approach to Detecting Domain Errors Using Formal Specification-Based Testing. APSEC 2004: 276-283 - [c2]Fumiko Nagoya, Shaoying Liu, Yuting Chen:
An Investigation of the Approach to Specification-Based Program Review through Case Studies. ICECCS 2004: 249-258 - [c1]Yuting Chen, Shaoying Liu, Fumiko Nagoya:
An Approach to Integration Testing Based on Data Flow Specifications. ICTAC 2004: 235-249
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint