default search action
Rui Xue 0001
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- affiliation (PhD): Beijing Normal University, Department of Mathematics, China
- not to be confused with: Rui Xue 0005
Other persons with the same name
- Rui Xue — disambiguation page
- Rui Xue 0002 — Harbin Engineering University, College of Information and Communication Engineering, China
- Rui Xue 0003 — Beihang University, School of Electronics and Information Engineering, Beijing, China
- Rui Xue 0004 — Beijing University of Technology, College of Economics and Management, China (and 1 more)
- Rui Xue 0005 — Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Zhaoxuan Li, Ziming Zhao, Rui Zhang, Haoyang Lu, Wenhao Li, Fan Zhang, Siqi Lu, Rui Xue:
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm. Comput. Networks 250: 110563 (2024) - [j51]Cheng-Jun Lin, Rui Xue, Xinyi Huang, Shao-Jun Yang:
New tag-based signatures and their applications on linearly homomorphic signatures. Comput. Stand. Interfaces 88: 103804 (2024) - [j50]Shimin Li, Xin Wang, Rui Xue:
$\mathsf {moKHS}$moKHS: A More Lightweight Model for Multi-Client Delegatable Computation. IEEE Trans. Dependable Secur. Comput. 21(4): 1902-1917 (2024) - [i15]Jiangxia Ge, Heming Liao, Rui Xue:
Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2024: 777 (2024) - 2023
- [j49]Baolong Jin, Rui Xue:
Improved lower bound for the complexity of unique shortest vector problem. Cybersecur. 6(1): 38 (2023) - [j48]Qianqian Su, Rui Zhang, Rui Xue, You Sun, Sheng Gao:
Distributed Attribute-Based Signature With Attribute Dynamic Update for Smart Grid. IEEE Trans. Ind. Informatics 19(9): 9424-9435 (2023) - [j47]Zhaoxuan Li, Siqi Lu, Rui Zhang, Ziming Zhao, Rujin Liang, Rui Xue, Wenhao Li, Fan Zhang, Sheng Gao:
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning. IEEE Trans. Software Eng. 49(11): 4886-4916 (2023) - [c45]Jiangxia Ge, Tianshu Shan, Rui Xue:
Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. CRYPTO (5) 2023: 292-324 - [c44]Tianshu Shan, Jiangxia Ge, Rui Xue:
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. Public Key Cryptography (1) 2023: 36-64 - [i14]Jiangxia Ge, Tianshu Shan, Rui Xue:
On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security. IACR Cryptol. ePrint Arch. 2023: 792 (2023) - [i13]Jiangxia Ge, Tianshu Shan, Rui Xue:
Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2023: 862 (2023) - 2022
- [j46]Shimin Li, Xin Wang, Rui Xue:
Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications. Comput. J. 65(4): 1020-1028 (2022) - [j45]Shujiao Cao, Rui Xue:
The (Im)Possibility on Constructing Verifiable Random Functions. Comput. J. 65(7): 1826-1845 (2022) - [j44]Jinyong Chang, Qiaochuan Ren, Yanyan Ji, Maozhi Xu, Rui Xue:
Secure medical data management with privacy-preservation and authentication properties in smart healthcare system. Comput. Networks 212: 109013 (2022) - [j43]Zhaoxuan Li, Siqi Lu, Rui Zhang, Rui Xue, Wenqiu Ma, Rujin Liang, Ziming Zhao, Sheng Gao:
SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts. Empir. Softw. Eng. 27(7): 197 (2022) - [j42]Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu, Rui Xue:
Identity-based remote data checking with a designated verifier. J. Cloud Comput. 11: 7 (2022) - [j41]Jinyong Chang, Maozhi Xu, Rui Xue:
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications. Peer-to-Peer Netw. Appl. 15(4): 2021-2036 (2022) - [j40]Huiqun Wang, Luqiang Feng, Yanyan Ji, Bilin Shao, Rui Xue:
Toward Usable Cloud Storage Auditing, Revisited. IEEE Syst. J. 16(1): 693-700 (2022) - [j39]Rui Zhang, Rui Xue, Ling Liu:
Security and Privacy for Healthcare Blockchains. IEEE Trans. Serv. Comput. 15(6): 3668-3686 (2022) - [c43]Shujiao Cao, Rui Xue:
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions. CRYPTO (3) 2022: 564-595 - [i12]Shujiao Cao, Rui Xue:
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions. IACR Cryptol. ePrint Arch. 2022: 671 (2022) - [i11]Tianshu Shan, Jiangxia Ge, Rui Xue:
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2022: 1235 (2022) - [i10]Shujiao Cao, Rui Xue:
On Constructing One-Way Quantum State Generators, and More. IACR Cryptol. ePrint Arch. 2022: 1323 (2022) - 2021
- [j38]Jinyong Chang, Bilin Shao, Yanyan Ji, Maozhi Xu, Rui Xue:
Secure network coding from secure proof of retrievability. Sci. China Inf. Sci. 64(12) (2021) - [j37]Chunling Han, Rui Xue:
Differentially private GANs by adding noise to Discriminator's loss. Comput. Secur. 107: 102322 (2021) - [j36]Shimin Li, Bei Liang, Aikaterini Mitrokotsa, Rui Xue:
Homomorphic signcryption with public plaintext-result checkability. IET Inf. Secur. 15(5): 333-350 (2021) - [j35]Shujiao Cao, Rui Xue:
Being a permutation is also orthogonal to one-wayness in quantum world: Impossibilities of quantum one-way permutations from one-wayness primitives. Theor. Comput. Sci. 855: 16-42 (2021) - [j34]You Sun, Rui Xue, Rui Zhang, Qianqian Su, Sheng Gao:
RTChain: A Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain. ACM Trans. Internet Techn. 21(1): 15:1-15:24 (2021) - [c42]Cheng-Jun Lin, Rui Xue, Xinyi Huang:
Linearly Homomorphic Signatures with Designated Combiner. ProvSec 2021: 327-345 - [i9]Rui Zhang, Rui Xue, Ling Liu:
Security and Privacy for Healthcare Blockchains. CoRR abs/2106.06136 (2021) - [i8]Tianci Peng, Shujiao Cao, Rui Xue:
On Quantum Query Complexities of Collision-Finding in Non-Uniform Random Functions. IACR Cryptol. ePrint Arch. 2021: 1578 (2021) - 2020
- [j33]Qianqian Su, Rui Zhang, Rui Xue, Pengchao Li:
Revocable Attribute-Based Signature for Blockchain-Based Healthcare System. IEEE Access 8: 127884-127896 (2020) - [j32]Qianqian Su, Rui Zhang, Rui Xue:
Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud. Comput. J. 63(8): 1271 (2020) - [j31]Cheng-Jun Lin, Rui Xue, Shao-Jun Yang, Xinyi Huang, Shimin Li:
Linearly Homomorphic Signatures from Lattices. Comput. J. 63(12): 1871-1885 (2020) - [j30]Muhua Liu, Ying Wu, Rui Xue, Rui Zhang:
Verifiable outsourcing computation for modular exponentiation from shareable functions. Clust. Comput. 23(1): 43-55 (2020) - [j29]Chunling Han, Rui Xue:
Aggregation for Privately Trained Different Types of Local Models. EAI Endorsed Trans. Security Safety 7(26): e2 (2020) - [j28]Jinyong Chang, Yanyan Ji, Bilin Shao, Maozhi Xu, Rui Xue:
Certificateless Homomorphic Signature Scheme for Network Coding. IEEE/ACM Trans. Netw. 28(6): 2615-2628 (2020) - [j27]Menghao Li, Pei Wang, Wei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo, Wei Zou:
Large-Scale Third-Party Library Detection in Android Markets. IEEE Trans. Software Eng. 46(9): 981-1003 (2020) - [c41]Kelly Yun, Rui Xue:
Chosen Ciphertext Attacks Secure Inner-Product Functional Encryption from Learning with Errors Assumption. Inscrypt 2020: 133-147 - [c40]You Sun, Rui Zhang, Rui Xue, Qianqian Su, Pengchao Li:
A Reputation Based Hybrid Consensus for E-Commerce Blockchain. ICWS 2020: 1-16 - [c39]Chunling Han, Rui Xue:
Private Global Generator Aggregation from Different Types of Local Models. SecureComm (2) 2020: 324-335
2010 – 2019
- 2019
- [j26]Jinyong Chang, Hui Ma, Anling Zhang, Maozhi Xu, Rui Xue:
RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE Access 7: 50858-50868 (2019) - [j25]Xueqing Wang, Biao Wang, Bei Liang, Rui Xue:
A more compact multi-id identity-based FHE scheme in the standard model and its applications. Sci. China Inf. Sci. 62(3): 39101:1-39101:3 (2019) - [j24]Rui Zhang, Rui Xue, Ling Liu:
Security and Privacy on Blockchain. ACM Comput. Surv. 52(3): 51:1-51:34 (2019) - [j23]Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue:
General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. Future Gener. Comput. Syst. 91: 416-425 (2019) - [c38]Xin Wang, Shimin Li, Rui Xue:
Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs. ICICS 2019: 463-481 - [c37]Qianqian Su, Rui Zhang, Rui Xue, You Sun:
An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain. ICWS 2019: 110-125 - [c36]Xin Wang, Shimin Li, Rui Xue:
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). IWSEC 2019: 273-283 - [i7]Rui Zhang, Rui Xue, Ling Liu:
Security and Privacy on Blockchain. CoRR abs/1903.07602 (2019) - 2018
- [j22]Biao Wang, Xueqing Wang, Rui Xue, Xinyi Huang:
Matrix FHE and Its Application in Optimizing Bootstrapping. Comput. J. 61(12): 1845-1861 (2018) - [j21]Biao Wang, Xueqing Wang, Rui Xue:
CCA1 secure FHE from PIO, revisited. Cybersecur. 1(1): 11 (2018) - [j20]Ying Wu, Muhua Liu, Rui Xue, Rui Zhang:
Attribute-based multi-function verifiable computation. Future Gener. Comput. Syst. 78: 995-1004 (2018) - [j19]Chunling Han, Rui Xue, Rui Zhang, Xueqing Wang:
A new audio steganalysis method based on linear prediction. Multim. Tools Appl. 77(12): 15431-15455 (2018) - [j18]Rui Zhang, Rui Xue, Ling Liu:
Searchable Encryption for Healthcare Clouds: A Survey. IEEE Trans. Serv. Comput. 11(6): 978-996 (2018) - [c35]Shimin Li, Bei Liang, Rui Xue:
Private Functional Signatures: Definition and Construction. ACISP 2018: 284-303 - [c34]Kelly Yun, Xin Wang, Rui Xue:
Identity-Based Functional Encryption for Quadratic Functions from Lattices. ICICS 2018: 409-425 - [c33]Xin Wang, Bei Liang, Shimin Li, Rui Xue:
On Constructing Pairing-Free Identity-Based Encryptions. ISC 2018: 308-327 - 2017
- [j17]Qiuyan Wang, Kelan Ding, Dongdai Lin, Rui Xue:
A kind of three-weight linear codes. Cryptogr. Commun. 9(3): 315-322 (2017) - [j16]Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang:
Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size. Comput. J. 60(12): 1785-1800 (2017) - [c32]Biao Wang, Xueqing Wang, Rui Xue:
Leveled FHE with Matrix Message Space. Inscrypt 2017: 260-277 - [c31]Xueqing Wang, Biao Wang, Rui Xue:
Two Efficient Tag-Based Encryption Schemes on Lattices. ICICS 2017: 118-131 - [c30]Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo:
LibD: scalable and precise third-party library detection in android markets. ICSE 2017: 335-346 - [c29]Rui Zhang, Rui Xue, Ling Liu, Lijuan Zheng:
Oblivious Multi-Keyword Search for Secure Cloud Storage Service. ICWS 2017: 269-276 - [c28]Ying Wu, Rui Zhang, Rui Xue, Ling Liu:
Multi-Client Verifiable Computation Service for Outsourced Data. ICWS 2017: 556-563 - 2016
- [j15]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system. Secur. Commun. Networks 9(16): 3309-3313 (2016) - [j14]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Separations in circular security for arbitrary length key cycles, revisited. Secur. Commun. Networks 9(18): 5392-5400 (2016) - [j13]Rui Zhang, Rui Xue, Ting Yu, Ling Liu:
Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data. ACM Trans. Internet Techn. 16(3): 21:1-21:20 (2016) - [c27]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model. ICISC 2016: 239-253 - [c26]Rui Zhang, Rui Xue, Ting Yu, Ling Liu:
PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data. ICWS 2016: 428-435 - [c25]Muhua Liu, Ying Wu, Rui Xue:
Verifiable Computation for Randomized Algorithm. INDOCRYPT 2016: 99-118 - 2015
- [j12]Qiuyan Wang, Kelan Ding, Rui Xue:
Binary Linear Codes With Two Weights. IEEE Commun. Lett. 19(7): 1097-1100 (2015) - [j11]Jinyong Chang, Rui Xue, Anling Zhang:
The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(4): 1032-1037 (2015) - [j10]Jinyong Chang, Rui Xue:
A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding. J. Commun. 10(1): 43-47 (2015) - [j9]Jinyong Chang, Rui Xue:
Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions. Secur. Commun. Networks 8(8): 1525-1536 (2015) - [c24]Menghao Li, Liang Yang, Zimu Yuan, Rui Zhang, Rui Xue:
An Approach for Mitigating Potential Threats in Practical SSO Systems. Inscrypt 2015: 209-226 - [c23]Muhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo:
Verifiable Proxy Re-encryption from Indistinguishability Obfuscation. ICICS 2015: 363-378 - [c22]Rui Zhang, Rui Xue:
Efficient keyword search for public-key setting. MILCOM 2015: 1236-1241 - 2014
- [j8]Jinyong Chang, Rui Xue:
On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2267-2271 (2014) - [j7]Jinyong Chang, Rui Xue:
General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications. J. Softw. 9(10): 2557-2563 (2014) - [j6]Rui Zhang, Ling Liu, Rui Xue:
Role-based and time-bound access and management of EHR data. Secur. Commun. Networks 7(6): 994-1015 (2014) - [c21]Jinyong Chang, Rui Xue:
KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. SECRYPT 2014: 299-306 - [i6]Xiang Xie, Rui Xue:
Bounded Fully Homomorphic Signature Schemes. IACR Cryptol. ePrint Arch. 2014: 420 (2014) - 2013
- [j5]Rui Xue:
IK-CPA security implies IE-CCA security in the random oracle model. Sci. China Inf. Sci. 56(3): 1-11 (2013) - [c20]Xiang Xie, Rui Xue, Minqian Wang:
Zero Knowledge Proofs from Ring-LWE. CANS 2013: 57-73 - [c19]Wei Wei, Ting Yu, Rui Xue:
iBigTable: practical data integrity for bigtable in public cloud. CODASPY 2013: 341-352 - [i5]Xiang Xie, Rui Xue:
Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices. IACR Cryptol. ePrint Arch. 2013: 342 (2013) - 2012
- [c18]Xiang Xie, Rui Xue, Rui Zhang:
Inner-Product Lossy Trapdoor Functions and Applications. ACNS 2012: 188-205 - [c17]Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. SCN 2012: 1-18 - [i4]Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. IACR Cryptol. ePrint Arch. 2012: 463 (2012) - 2011
- [c16]Fubiao Xia, Guilin Wang, Rui Xue:
On the invisibility of designated confirmer signatures. AsiaCCS 2011: 268-276 - [c15]Ping Yu, Rui Xue:
Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption. Financial Cryptography Workshops 2011: 3-12 - [c14]Xinfeng Lei, Rui Xue, Ting Yu:
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles. ICICS 2011: 29-41 - [c13]Qinggang Yue, Feng Liu, Rui Xue:
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks. INTRUST 2011: 84-101 - [c12]Xiang Xie, Rui Xue, Rui Zhang:
Efficient Threshold Encryption from Lossy Trapdoor Functions. PQCrypto 2011: 163-178 - 2010
- [c11]Ping Yu, Rui Xue:
A Short Signature Scheme from the RSA Family. ISC 2010: 307-318 - [i3]Xinfeng Lei, Rui Xue, Ting Yu:
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles. IACR Cryptol. ePrint Arch. 2010: 467 (2010) - [i2]Xinfeng Lei, Rui Xue, Ting Yu:
A Timed Logic for Modeling and Reasoning about Security Protocols. IACR Cryptol. ePrint Arch. 2010: 645 (2010)
2000 – 2009
- 2009
- [c10]Manoj Prabhakaran, Rui Xue:
Statistically Hiding Sets. CT-RSA 2009: 100-116 - 2008
- [j4]Rui Xue, Ninghui Li, Jiangtao Li:
Algebraic Construction for Zero-Knowledge Sets. J. Comput. Sci. Technol. 23(2): 166-175 (2008) - 2007
- [c9]Jiangtao Li, Ninghui Li, Rui Xue:
Universal Accumulators with Efficient Nonmembership Proofs. ACNS 2007: 253-269 - [c8]Rui Xue, Dengguo Feng:
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. ICICS 2007: 239-253 - [i1]Manoj Prabhakaran, Rui Xue:
Statistically Hiding Sets. IACR Cryptol. ePrint Arch. 2007: 349 (2007) - 2006
- [j3]Tianjie Cao, Dongdai Lin, Rui Xue:
Security Analysis of Some Batch Verifying Signatures from Pairings. Int. J. Netw. Secur. 3(2): 138-143 (2006) - 2005
- [j2]Tianjie Cao, Dongdai Lin, Rui Xue:
A randomized RSA-based partially blind signature scheme for electronic cash. Comput. Secur. 24(1): 44-49 (2005) - [c7]Tianjie Cao, Dongdai Lin, Rui Xue:
An Efficient ID-Based Deniable Authentication Protocol from Pairings. AINA 2005: 388-391 - [c6]Tianjie Cao, Dongdai Lin, Rui Xue:
ID-Based Ring Authenticated Encryption. AINA 2005: 591-596 - [c5]Tianjie Cao, Dongdai Lin, Rui Xue:
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. CIS (2) 2005: 1036-1041 - [c4]Rui Xue, Dawn Song, Zhenfeng Zhang, Dengguo Feng:
A Generic Scheme for Zero-Knowledge Sets. IWAP 2005: 249-263 - 2004
- [j1]Rui Xue, Dengguo Feng:
New Semantic Model for Authentication Protocols in ASMs. J. Comput. Sci. Technol. 19(4): 555-563 (2004) - [c3]Tianjie Cao, Dongdai Lin, Rui Xue:
Security Analysis of User Efficient Blind Signatures. AWCC 2004: 167-172 - [c2]Tianjie Cao, Dongdai Lin, Rui Xue:
Improved Privacy-Protecting Proxy Signature Scheme. AWCC 2004: 208-213 - [c1]Zhongwei Sun, Dengguo Feng, Rui Xue:
Optimum Detection of MultiplicativeWatermarks for Digital Images in the DWT Domain. Eurographics Multimedia Workshop 2004: 173-179
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint