default search action
Guiyi Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Feng Li, Junyi Yang, Kwok-Yan Lam, Bowen Shen, Guiyi Wei:
Dynamic spectrum access for Internet-of-Things with joint GNN and DQN. Ad Hoc Networks 163: 103596 (2024) - [j59]Mande Xie, Xuekang Yang, Haibo Hong, Guiyi Wei, Zhen Zhang:
A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments. Future Gener. Comput. Syst. 153: 287-300 (2024) - [j58]Yunguo Guan, Rongxing Lu, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei:
Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs. IEEE Trans. Big Data 10(2): 146-157 (2024) - [j57]Ruixuan Li, Zhenyong Zhang, Jun Shao, Rongxing Lu, Xiaoqi Jia, Guiyi Wei:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. IEEE Trans. Dependable Secur. Comput. 21(1): 125-138 (2024) - [j56]Yi Zhang, Xiaofeng Jia, Bianjing Pan, Jun Shao, Liming Fang, Rongxing Lu, Guiyi Wei:
Anonymous Multi-Hop Payment for Payment Channel Networks. IEEE Trans. Dependable Secur. Comput. 21(1): 476-485 (2024) - [j55]Yunguo Guan, Rongxing Lu, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei:
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data. IEEE Trans. Dependable Secur. Comput. 21(4): 2750-2765 (2024) - [j54]Anding Wang, Guiyi Wei:
Equilibrium-Equation-Based Fast Recursive Principal Component Tracking With an Adaptive Forgetting Factor for Joint Spatial Division and Multiplexing Systems. IEEE Trans. Wirel. Commun. 23(10): 12904-12916 (2024) - [i2]Liangzhi Wang, Jie Zhang, Yuan Gao, Jiliang Zhang, Guiyi Wei, Haibo Zhou, Bin Zhuge, Zitian Zhang:
Hyper-parameter Optimization for Wireless Network Traffic Prediction Models with A Novel Meta-Learning Framework. CoRR abs/2409.14535 (2024) - 2023
- [j53]Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao, Guiyi Wei:
A domain name management system based on account-based consortium blockchain. Peer Peer Netw. Appl. 16(2): 1211-1226 (2023) - [j52]Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud. IEEE Trans. Dependable Secur. Comput. 20(3): 1979-1993 (2023) - [j51]Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries. IEEE Trans. Dependable Secur. Comput. 20(3): 2097-2110 (2023) - [j50]Xiaofeng Jia, Zhe Yu, Jun Shao, Rongxing Lu, Guiyi Wei, Zhenguang Liu:
Cross-Chain Virtual Payment Channels. IEEE Trans. Inf. Forensics Secur. 18: 3401-3413 (2023) - [j49]Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei:
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy. IEEE/ACM Trans. Netw. 31(6): 2793-2808 (2023) - [j48]Zitian Zhang, Jinbo Hou, Xiaoli Chu, Haibo Zhou, Guiyi Wei, Jie Zhang:
Multi-Agent Deep Reinforcement Learning Based Downlink Beamforming in Heterogeneous Networks. IEEE Trans. Wirel. Commun. 22(6): 4247-4263 (2023) - [c31]Chao He, Tom H. Luan, Nan Cheng, Guiyi Wei, Zhou Su, Yiliang Liu:
Federated Learning based Vehicular Threat Sharing: A Multi-Dimensional Contract Incentive Approach. VTC Fall 2023: 1-5 - 2022
- [j47]Haibo Hong, Jun Shao, Licheng Wang, Mande Xie, Guiyi Wei, Yixian Yang, Song Han, Jianhong Lin:
A CCA secure public key encryption scheme based on finite groups of Lie type. Sci. China Inf. Sci. 65(1) (2022) - [j46]Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks. IEEE Internet Things J. 9(20): 20492-20502 (2022) - [j45]Jun Shao, Rongxing Lu, Yunguo Guan, Guiyi Wei:
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud. IEEE Trans. Serv. Comput. 15(1): 124-137 (2022) - [j44]Yunguo Guan, Hui Zheng, Jun Shao, Rongxing Lu, Guiyi Wei:
Fair Outsourcing Polynomial Computation Based on the Blockchain. IEEE Trans. Serv. Comput. 15(5): 2795-2808 (2022) - [j43]Feng Li, Bowen Shen, Jiale Guo, Kwok-Yan Lam, Guiyi Wei, Li Wang:
Dynamic Spectrum Access for Internet-of-Things Based on Federated Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 71(7): 7952-7956 (2022) - [j42]Anding Wang, Guiyi Wei:
Principal Component Tracking for Massive MIMO Channels in High Mobility Scenarios With Diagonal Step Size Matrix. IEEE Trans. Wirel. Commun. 21(12): 11139-11150 (2022) - 2021
- [j41]Guiyi Wei, Xiaohang Mao, Rongxing Lu, Jun Shao, Yunguo Guan, Genhua Lu:
Achieve space-efficient key management in lightning network. Comput. Networks 197: 108346 (2021) - [j40]Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei:
Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities. IEEE Internet Things J. 8(18): 14219-14231 (2021) - [j39]Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era. IEEE Internet Things J. 8(22): 16243-16255 (2021) - [j38]Haijiang Wang, Jianting Ning, Xinyi Huang, Guiyi Wei, Geong Sen Poh, Ximeng Liu:
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1307-1319 (2021) - 2020
- [j37]Hui Zheng, Jun Shao, Guiyi Wei:
Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw. Appl. 13(5): 1643-1655 (2020) - [c30]Zhihao Xuan, Guiyi Wei, Zhengwei Ni, Jifa Zhang:
Decoupling Offloading Decision and Resource Allocation via Deep Reinforcement Learning and Sequential Least Squares Programming. ChinaCom 2020: 554-566 - [c29]Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei:
Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities. GLOBECOM 2020: 1-6 - [c28]Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei:
Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data. ICC 2020: 1-6 - [i1]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei:
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2020: 1357 (2020)
2010 – 2019
- 2019
- [j36]Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. Comput. J. 62(12): 1840-1848 (2019) - [c27]Hui Zheng, Jun Shao, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao:
Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption. NSS 2019: 552-566 - [c26]Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou:
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost. NSS 2019: 567-580 - 2018
- [j35]Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji:
CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78: 730-738 (2018) - [j34]Zhe Peng, Shang Gao, Bin Xiao, Guiyi Wei, Songtao Guo, Yuanyuan Yang:
Indoor Floor Plan Construction Through Sensing Data Collected From Smartphones. IEEE Internet Things J. 5(6): 4351-4364 (2018) - [j33]Jun Shao, Guiyi Wei:
Secure Outsourced Computation in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 36-41 (2018) - [j32]Abdulrahman Alamer, Yong Deng, Guiyi Wei, Xiaodong Lin:
Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View. IEEE Netw. 32(3): 72-77 (2018) - [j31]Shang Gao, Zecheng Li, Bin Xiao, Guiyi Wei:
Security Threats in the Data Plane of Software-Defined Networks. IEEE Netw. 32(4): 108-113 (2018) - [j30]Yunguo Guan, Jun Shao, Guiyi Wei, Mande Xie:
Data Security and Privacy in Fog Computing. IEEE Netw. 32(5): 106-111 (2018) - [j29]Cong Zuo, Jun Shao, Joseph K. Liu, Guiyi Wei, Yun Ling:
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 13(1): 186-196 (2018) - 2017
- [j28]Mande Xie, Urmila Bhanja, Jun Shao, Guoping Zhang, Guiyi Wei:
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants. Inf. Sci. 420: 37-48 (2017) - [c25]Cong Zuo, Jun Shao, Zhe Liu, Yun Ling, Guiyi Wei:
Hidden-Token Searchable Public-Key Encryption. TrustCom/BigDataSE/ICESS 2017: 248-254 - [e2]Song Guo, Guiyi Wei, Yang Xiang, Xiaodong Lin, Pascal Lorenz:
Testbeds and Research Infrastructures for the Development of Networks and Communities - 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 177, Springer 2017, ISBN 978-3-319-49579-8 [contents] - 2016
- [j27]Yuxin Mao, Ping Zhu, Guiyi Wei, Mohammad Mehedi Hassan, M. Anwar Hossain:
A game-based incentive model for service cooperation in VANETs. Concurr. Comput. Pract. Exp. 28(3): 674-687 (2016) - [j26]Yong Deng, Guiyi Wei, Mande Xie, Jun Shao:
Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications. Mob. Inf. Syst. 2016: 8686945:1-8686945:10 (2016) - [c24]Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji:
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption. ACISP (1) 2016: 495-508 - 2015
- [j25]Mande Xie, Urmila Bhanja, Guoping Zhang, Guiyi Wei, Yun Ling:
Social role-based secure large data objects dissemination in mobile sensing environment. Comput. Commun. 65: 27-34 (2015) - [j24]Yang Xiang, Mukaddim Pathan, Guiyi Wei, Giancarlo Fortino:
Availability, resilience, and fault tolerance of internet and distributed computing systems. Concurr. Comput. Pract. Exp. 27(10): 2503-2505 (2015) - [j23]Jinlin Zhang, Jun Shao, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying:
Efficient multiple sources network coding signature in the standard model. Concurr. Comput. Pract. Exp. 27(10): 2616-2636 (2015) - [j22]Mande Xie, Urmila Bhanja, Guiyi Wei, Yun Ling, Mohammad Mehedi Hassan, Atif Alamri:
SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks. Concurr. Comput. Pract. Exp. 27(10): 2668-2680 (2015) - [j21]Guiyi Wei, Jun Shao, Yang Xiang, Pingping Zhu, Rongxing Lu:
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption. Inf. Sci. 318: 111-122 (2015) - [j20]Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou, Guiyi Wei:
Detecting stepping stones by abnormal causality probability. Secur. Commun. Networks 8(10): 1831-1844 (2015) - 2014
- [j19]Guiyi Wei, Yong Qiu, Min Ji:
Scheduling with Position-Based deteriorating jobs and Multiple deteriorating rate-Modifying Activities. Asia Pac. J. Oper. Res. 31(1) (2014) - [j18]Ke Chen, Min Ji, Jiaojiao Ge, Guiyi Wei:
Scheduling Position-Based deteriorating jobs with Multiple rate-Modifying Activities and Past-sequence-dependent Delivery times. Asia Pac. J. Oper. Res. 31(3) (2014) - [j17]Guiyi Wei, Yang Xiang, Min Ji, Ping Zhu:
An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs. Comput. Networks 74: 71-80 (2014) - [j16]Guiyi Wei, Rongxing Lu, Jun Shao:
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. J. Comput. Syst. Sci. 80(8): 1549-1562 (2014) - [j15]Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Guiyi Wei, Laurence T. Yang:
Internet Traffic Classification Using Constrained Clustering. IEEE Trans. Parallel Distributed Syst. 25(11): 2932-2943 (2014) - 2013
- [j14]Yuxin Mao, Ping Zhu, Guiyi Wei:
A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks. Int. J. Distributed Sens. Networks 9 (2013) - [j13]Guiyi Wei, Ping Zhu, Athanasios V. Vasilakos, Yuxin Mao, Jun Luo, Yun Ling:
Cooperation Dynamics on Collaborative Social Networks of Heterogeneous Population. IEEE J. Sel. Areas Commun. 31(6): 1135-1146 (2013) - [j12]Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Inf. Forensics Secur. 8(3): 429-439 (2013) - [c23]Ping Zhu, Tian Ling, Guiyi Wei, Bishan Ying:
Minimizing Nested Interrupts of Secondary Users in Multi-Priority Cognitive Radio Networks. IDCS 2013: 16-29 - [c22]Jun Shao, Jinlin Zhang, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying:
Multiple Sources Network Coding Signature in the Standard Model. IDCS 2013: 195-208 - [c21]Guiyi Wei, Min Ji, Ping Zhu, Jun Xia:
Optimal Spectrum Leasing with the Constraints of User Admission Rate and Quality of Service. MASS 2013: 429-430 - [e1]Mukaddim Pathan, Guiyi Wei, Giancarlo Fortino:
Internet and Distributed Computing Systems - 6th International Conference, IDCS 2013, Hangzhou, China, October 28-30, 2013, Proceedings. Lecture Notes in Computer Science 8223, Springer 2013, ISBN 978-3-642-41427-5 [contents] - 2012
- [j11]Mande Xie, Guiyi Wei, Yujia Ge, Yun Ling:
Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks. Comput. Electr. Eng. 38(1): 116-127 (2012) - [j10]Guiyi Wei, Xianbo Yang, Jun Shao:
Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol. KSII Trans. Internet Inf. Syst. 6(12): 3352-3365 (2012) - [j9]Jun Shao, Peng Liu, Guiyi Wei, Yun Ling:
Anonymous proxy re-encryption. Secur. Commun. Networks 5(5): 439-449 (2012) - [c20]Yun Ling, Jian Liu, Ping Zhu, Guiyi Wei:
Rigorous Punishment Promotes Cooperation in Prisoners' Dilemma Game. BIONETICS 2012: 312-321 - 2011
- [j8]Guiyi Wei, Yun Ling, Binfeng Guo, Bin Xiao, Athanasios V. Vasilakos:
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. Comput. Commun. 34(6): 793-802 (2011) - [j7]Naixue Xiong, Laurence Tianruo Yang, Y. Yang, Jong Hyuk Park, Guiyi Wei:
Design of QoS in Intelligent Communication Environments Based on Neural Network. Wirel. Pers. Commun. 56(1): 97-115 (2011) - [c19]Haiyong Bao, Guiyi Wei, Jun Shao, Zhenfu Cao:
Efficient and secure electronic resume using smart cards. FSKD 2011: 2271-2274 - [c18]Haiyong Bao, Guiyi Wei, Jun Shao, Zhenfu Cao:
Novel conic-based group signature scheme with revocation. FSKD 2011: 2623-2627 - [c17]Jun Shao, Peng Liu, Zhenfu Cao, Guiyi Wei:
Multi-Use Unidirectional Proxy Re-Encryption. ICC 2011: 1-5 - [c16]Jun Shao, Guiyi Wei, Yun Ling, Mande Xie:
Identity-Based Conditional Proxy Re-Encryption. ICC 2011: 1-5 - [c15]Jun Shao, Guiyi Wei, Yun Ling, Mande Xie:
Unidirectional Identity-Based Proxy Re-Signature. ICC 2011: 1-5 - 2010
- [j6]Guiyi Wei, Yun Ling, Athanasios V. Vasilakos, Bin Xiao, Yao Zheng:
PIVOT: An adaptive information discovery framework for computational grids. Inf. Sci. 180(23): 4543-4556 (2010) - [j5]Guiyi Wei, Yun Ling, Ye Gu, Yujia Ge:
A Dependable Cluster Based Topology in P2P Networks. J. Commun. 5(1): 57-62 (2010) - [j4]Yuxin Mao, Guiyi Wei:
A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection. Sensors 10(10): 9529-9540 (2010) - [j3]Guiyi Wei, Athanasios V. Vasilakos, Yao Zheng, Naixue Xiong:
A game-theoretic method of fair resource allocation for cloud computing services. J. Supercomput. 54(2): 252-269 (2010) - [c14]Ping Zhu, Guiyi Wei, Athanasios V. Vasilakos, Hung-Yu Wei:
Knowledge Sharing in Social Network Using Game Theory. BIONETICS 2010: 542-553
2000 – 2009
- 2009
- [j2]Yong Tang, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Concept, Characteristics and Defending Mechanism of Worms. IEICE Trans. Inf. Syst. 92-D(5): 799-809 (2009) - [c13]Guiyi Wei, Haiping Liu:
LD-BSCA: A local-density based spatial clustering algorithm. CIDM 2009: 291-298 - [c12]Guiyi Wei, Mande Xie, Yuxin Mao, Athanasios V. Vasilakos:
A Budget-Based Cost-Effective Incentive Model. ICPP Workshops 2009: 449-456 - [c11]Yuxin Mao, Guiyi Wei:
Sub-Ontology Modularization for Large-Scale Web Ontologies. IRI 2009: 145-150 - 2008
- [c10]Mande Xie, Yun Ling, Guiyi Wei:
An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping. CSSE (3) 2008: 116-120 - 2007
- [j1]Guiyi Wei, Hanxiao Shi, Yun Ling:
A mobile cache model with semantic locality. Int. J. Intell. Inf. Database Syst. 1(2): 216-227 (2007) - [c9]Hanxiao Shi, Guiyi Wei:
Research and Design of Multimedia NSS for E-Commerce. I3E (1) 2007: 126-133 - [c8]Hongxia Shi, Guiyi Wei, Yun Pan:
Multi-Level Text Classification Method Based on Latent Semantic Analysis. ICEIS (4) 2007: 320-326 - 2006
- [c7]Guiyi Wei, Jun Yu, Hanxiao Shi, Yun Ling:
A Semantic-Driven Cache Management Approach for Mobile Applications. International Conference on Computational Science (3) 2006: 184-191 - [c6]Guiyi Wei, Jun Yu, Yun Ling, Jun Liu:
Design and Implementation of an Ontology Algorithm for Web Documents Classification. ICCSA (4) 2006: 649-658 - 2005
- [c5]Cuiju Luan, Guanghua Song, Yao Zheng, Guiyi Wei:
User-Oriented Job Management in a Grid Environment. CIT 2005: 346-350 - [c4]Guiyi Wei, Guangming Wang, Yao Zheng, Wei Wang:
The Design and Implementation of Extensible Information Services. International Conference on Computational Science (1) 2005: 987-994 - 2004
- [c3]Guiyi Wei, Guanghua Song, Yao Zheng, Cuiju Luan, Chaoyan Zhu, Wei Wang:
MASSIVE: A Multidisciplinary Applications-Oriented Simulation and Visualization Environment. IEEE SCC 2004: 583-587 - 2003
- [c2]Guiyi Wei, Yao Zheng, Jifa Zhang, Guanghua Song:
An Engineering Computation Oriented Visual Grid Framework. GCC (1) 2003: 51-58 - [c1]Guiyi Wei, Yao Zheng, Jifa Zhang:
Grid Service-Based Parallel Finite Element Analysis. GCC (1) 2003: 123-130
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint