default search action
Sattar Hashemi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j57]Fatemeh Alavi, Sattar Hashemi:
An element-wise kernel learning framework. Appl. Intell. 53(8): 9531-9547 (2023) - [j56]Fatemeh Alavi, Sattar Hashemi:
Data-adaptive kernel clustering with half-quadratic-based neighborhood relationship preservation. Knowl. Based Syst. 265: 110373 (2023) - [j55]Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian:
Using word embedding and convolution neural network for bug triaging by considering design flaws. Sci. Comput. Program. 228: 102945 (2023) - 2022
- [j54]Lida Abdi, Sattar Hashemi:
Correction to: Binary domain adaptation with independence maximization. Int. J. Mach. Learn. Cybern. 13(6): 1795 (2022) - [j53]Fatemeh Alavi, Sattar Hashemi:
A bi-level formulation for multiple kernel learning via self-paced training. Pattern Recognit. 129: 108770 (2022) - [i6]Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian:
Using Word Embedding and Convolution Neural Network for Bug Triaging by Considering Design Flaws. CoRR abs/2209.09553 (2022) - 2021
- [j52]Lida Abdi, Sattar Hashemi:
Unsupervised Domain Adaptation Based on Correlation Maximization. IEEE Access 9: 127054-127067 (2021) - [j51]Zahra Moti, Sattar Hashemi, Hadis Karimipour, Ali Dehghantanha, Amir Namavar Jahromi, Lida Abdi, Fatemeh Alavi:
Generative adversarial network to detect unseen Internet of Things malware. Ad Hoc Networks 122: 102591 (2021) - [j50]Reyhane Attarian, Sattar Hashemi:
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions. Comput. Networks 190: 107976 (2021) - 2020
- [j49]Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Hadis Karimipour, David Ellis Newton, Reza M. Parizi:
An improved two-hidden-layer extreme learning machine for malware hunting. Comput. Secur. 89 (2020) - [j48]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Sajad Homayoun, Kim-Kwang Raymond Choo:
An opcode-based technique for polymorphic Internet of Things malware detection. Concurr. Comput. Pract. Exp. 32(6) (2020) - [j47]Hamid Darabian, Sajad Homayoun, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M. Parizi, Kim-Kwang Raymond Choo:
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. J. Grid Comput. 18(2): 293-303 (2020) - [j46]Reza Sepahvand, Reza Akbari, Sattar Hashemi:
Predicting the bug fixing time using word embedding and deep long short term memories. IET Softw. 14(3): 203-212 (2020) - [j45]Seyed Mehdi Hazrati Fard, Sattar Hashemi:
Proposing a sparse representational based face verification system to run in a shortage of memory. Multim. Tools Appl. 79(3-4): 2965-2985 (2020) - [j44]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. IEEE Trans. Emerg. Top. Comput. 8(2): 341-351 (2020) - [j43]Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 630-640 (2020) - [j42]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi:
A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web 23(2): 1241-1260 (2020) - [c37]Zahra Moti, Sattar Hashemi, Amir Namavar Jahromi:
A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data. ISCISC 2020: 48-53 - [c36]Shahrouz Sotoudeh, Sattar Hashemi, Hossein Gharaee Garakani:
Security Framework of IoT-Based Smart Home. IST 2020: 251-256 - [p1]Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi, Sattar Hashemi, Bahram Gharabaghi, Gautam Srivastava:
Active Spectral Botnet Detection Based on Eigenvalue Weighting. Handbook of Big Data Privacy 2020: 385-397
2010 – 2019
- 2019
- [j41]Reyhane Attarian, Lida Abdi, Sattar Hashemi:
AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm. Comput. Commun. 148: 74-85 (2019) - [j40]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami, Kim-Kwang Raymond Choo, David Ellis Newton:
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer. Future Gener. Comput. Syst. 90: 94-104 (2019) - [c35]Reyhane Attarian, Sattar Hashemi:
Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology. ISCISC 2019: 33-38 - 2018
- [j39]Esmaeel Radkani, Sattar Hashemi, Alireza Keshavarz-Haddad, Maryam Amir Haeri:
An entropy-based distance measure for analyzing and detecting metamorphic malware. Appl. Intell. 48(6): 1536-1546 (2018) - [j38]Zeinab Khorshidpour, Jafar Tahmoresnezhad, Sattar Hashemi, Ali Hamzeh:
Domain invariant feature extraction against evasion attack. Int. J. Mach. Learn. Cybern. 9(12): 2093-2104 (2018) - [i5]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. CoRR abs/1808.01957 (2018) - 2017
- [j37]Zeinab Khorshidpour, Sattar Hashemi, Ali Hamzeh:
Evaluation of random forest classifier in security domain. Appl. Intell. 47(2): 558-569 (2017) - [j36]Jafar Tahmoresnezhad, Sattar Hashemi:
Exploiting kernel-based feature weighting and instance clustering to transfer knowledge across domains. Turkish J. Electr. Eng. Comput. Sci. 25: 292-307 (2017) - [j35]Fatemeh Jahedpari, Talal Rahwan, Sattar Hashemi, Tomasz P. Michalak, Marina De Vos, Julian A. Padget, Wei Lee Woon:
Online Prediction via Continuous Artificial Prediction Markets. IEEE Intell. Syst. 32(1): 61-68 (2017) - [j34]Zeinab Khorshidpour, Jafar Tahmoresnezhad, Sattar Hashemi, Ali Hamzeh:
Using domain adaptation in adversarial environment. Int. J. Data Min. Model. Manag. 9(3): 201-219 (2017) - [j33]Niloofar Mozafari, Ali Hamzeh, Sattar Hashemi:
Multi-objective perception model for diffusion of information in social networks. Int. J. Data Min. Model. Manag. 9(3): 249-273 (2017) - [j32]Hamed Haddad Pajouh, Gholamhossein Dastghaibyfard, Sattar Hashemi:
Two-tier network anomaly detection model: a machine learning approach. J. Intell. Inf. Syst. 48(1): 61-74 (2017) - [j31]Niloofar Mozafari, Ali Hamzeh, Sattar Hashemi:
Modelling information diffusion based on non-dominated friends in social networks. J. Inf. Sci. 43(6): 801-815 (2017) - [j30]Jafar Tahmoresnezhad, Sattar Hashemi:
Visual domain adaptation via transfer feature learning. Knowl. Inf. Syst. 50(2): 585-605 (2017) - [j29]Hashem Hashemi, Amin Azmoodeh, Ali Hamzeh, Sattar Hashemi:
Graph embedding as a new approach for unknown malware detection. J. Comput. Virol. Hacking Tech. 13(3): 153-166 (2017) - [c34]Marzieh Bitaab, Sattar Hashemi:
Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model. ISCISC 2017: 8-12 - 2016
- [j28]Jafar Tahmoresnezhad, Sattar Hashemi:
An Efficient yet Effective Random Partitioning and Feature Weighting Approach for Transfer Learning. Int. J. Pattern Recognit. Artif. Intell. 30(2): 1651003:1-1651003:23 (2016) - [j27]Lida Abdi, Sattar Hashemi:
To Combat Multi-Class Imbalanced Problems by Means of Over-Sampling Techniques. IEEE Trans. Knowl. Data Eng. 28(1): 238-251 (2016) - [c33]Sina Famouri, Sattar Hashemi, Mohammad Taheri:
Artificial Prediction Markets for Clustering. Australasian Conference on Artificial Intelligence 2016: 365-377 - [c32]Zeinab Khorshidpour, Sattar Hashemi, Ali Hamzeh:
Learning a Secure Classifier against Evasion Attack. ICDM Workshops 2016: 295-302 - 2015
- [j26]Mahsa Badami, Niloofar Mozafari, Ali Hamzeh, Sattar Hashemi:
An ensemble game theoretic approach for multi-objective optimization. AI Commun. 28(3): 553-566 (2015) - [j25]Maryam Sorkhi, Sattar Hashemi:
Effective team formation in collaboration networks using vertex and proficiency similarity measures. AI Commun. 28(4): 637-654 (2015) - [j24]Fatemeh Alavi, Sattar Hashemi:
DFP-SEPSF: A dynamic frequent pattern tree to mine strong emerging patterns in streamwise features. Eng. Appl. Artif. Intell. 37: 54-70 (2015) - [j23]Kamyab Tahernezhad, Kimia Bazargan Lari, Ali Hamzeh, Sattar Hashemi:
HC-MOEA: A hierarchical clustering approach for increasing the solution's diversity in multiobjective evolutionary algorithms. Intell. Data Anal. 19(1): 187-208 (2015) - [j22]Hedayatollah Dallaki, Kimia Bazargan Lari, Ali Hamzeh, Sattar Hashemi, Ashkan Sami:
Scaling up the hybrid Particle Swarm Optimization algorithm for nominal data-sets. Intell. Data Anal. 19(4): 825-844 (2015) - [j21]Lida Abdi, Sattar Hashemi:
To combat multi-class imbalanced problems by means of over-sampling and boosting techniques. Soft Comput. 19(12): 3369-3385 (2015) - [c31]Yasaman Sarlati, Sattar Hashemi, Niloofar Mozafari:
Adopting Community Features to Detect Social Spammers. EISIC 2015: 153-156 - [i4]Farzaneh Shoeleh, Mahshid Majd, Ali Hamzeh, Sattar Hashemi:
Knowledge Representation in Learning Classifier Systems: A Review. CoRR abs/1506.04002 (2015) - [i3]Fatemeh Jahedpari, Marina De Vos, Sattar Hashemi, Benjamin Hirsch, Julian A. Padget:
Artificial Prediction Markets for Online Prediction of Continuous Variables-A Preliminary Report. CoRR abs/1508.02681 (2015) - 2014
- [j20]Niloofar Mozafari, Sattar Hashemi, Ali Hamzeh:
A statistical approach for clustering in streaming data. Artif. Intell. Res. 3(1): 38-45 (2014) - [j19]Mina Sohrabi, Mohammad Masoud Javidi, Sattar Hashemi:
Detecting intrusion transactions in database systems: a novel approach. J. Intell. Inf. Syst. 42(3): 619-644 (2014) - [c30]Borhan Samei, Marzieh Estiagh, Fazel Keshtkar, Sattar Hashemi:
Multi-Document Summarization Using Graph-Based Iterative Ranking Algorithms and Information Theoretical Distortion Measures. FLAIRS 2014 - 2013
- [j18]Hamidreza Alvari, Sattar Hashemi, Ali Hamzeh:
Discovering overlapping communities in social networks: A novel game-theoretic approach. AI Commun. 26(2): 161-177 (2013) - [j17]Mahsa Badami, Ali Hamzeh, Sattar Hashemi:
An enriched game-theoretic framework for multi-objective clustering. Appl. Soft Comput. 13(4): 1853-1868 (2013) - [j16]Seyed Mehdi Hazrati Fard, Ali Hamzeh, Sattar Hashemi:
Using reinforcement learning to find an optimal set of features. Comput. Math. Appl. 66(10): 1892-1904 (2013) - [j15]Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi:
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection. J. Comput. Virol. Hacking Tech. 9(2): 77-93 (2013) - [c29]Narjes Zarei, Mohammad Ali Ghayour, Sattar Hashemi:
Road Traffic Prediction Using Context-Aware Random Forest Based on Volatility Nature of Traffic Flows. ACIIDS (1) 2013: 196-205 - [c28]Lida Abdi, Sattar Hashemi:
GAB-EPA: A GA Based Ensemble Pruning Approach to Tackle Multiclass Imbalanced Problems. ACIIDS (1) 2013: 246-254 - [c27]Amin Azmoodeh, Sattar Hashemi:
To Boost Graph Clustering Based on Power Iteration by Removing Outliers. DaEng 2013: 249-258 - [c26]Fatemeh Alavi, Sattar Hashemi:
Mining Jumping Emerging Patterns by Streaming Feature Selection. KSE (2) 2013: 337-349 - [c25]Lida Abdi, Sattar Hashemi:
An Ensemble Pruning Approach Based on Reinforcement Learning in Presence of Multi-class Imbalanced Data. SocProS (1) 2013: 589-600 - 2012
- [j14]Mahmood Deypir, Mohammad Hadi Sadreddini, Sattar Hashemi:
Towards a variable size sliding window model for frequent itemset mining over data streams. Comput. Ind. Eng. 63(1): 161-172 (2012) - [j13]Mina Alibeigi, Sattar Hashemi, Ali Hamzeh:
DBFS: An effective Density Based Feature Selection scheme for small sample size and high dimensional imbalanced data sets. Data Knowl. Eng. 81-82: 67-103 (2012) - [j12]Farnoush Farhadi, Maryam Sorkhi, Sattar Hashemi, Ali Hamzeh:
An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method. J. Comput. Sci. Technol. 27(3): 577-590 (2012) - [j11]Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
SPCF: a stepwise partitioning for collaborative filtering to alleviate sparsity problems. J. Inf. Sci. 38(6): 578-592 (2012) - [j10]Mojtaba Eskandari, Sattar Hashemi:
ECFGM: enriched control flow graph miner for unknown vicious infected code detection. J. Comput. Virol. 8(3): 99-108 (2012) - [j9]Mojtaba Eskandari, Sattar Hashemi:
A graph mining approach for detecting unknown malwares. J. Vis. Lang. Comput. 23(3): 154-162 (2012) - [c24]M. Javad Zomorodian, Ali Adeli, Mehrnoosh Sinaee, Sattar Hashemi:
Improving Nearest Neighbor Classification by Elimination of Noisy Irrelevant Features. ACIIDS (2) 2012: 11-21 - [c23]Ali Mashhoori, Sattar Hashemi:
Incorporating Hierarchical Information into the Matrix Factorization Model for Collaborative Filtering. ACIIDS (3) 2012: 504-513 - [c22]Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
Link Prediction in Social Network Using Co-clustering Based Approach. AINA Workshops 2012: 795-800 - [c21]Alireza Hajibagheri, Hamidreza Alvari, Ali Hamzeh, Sattar Hashemi:
Community Detection in Social Networks Using Information Diffusion. ASONAM 2012: 702-703 - [c20]Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi:
To Incorporate Sequential Dynamic Features in Malware Detection Engines. EISIC 2012: 46-52 - [c19]Seyed Emad Armoun, Sattar Hashemi:
A General Paradigm for Normalizing Metamorphic Malwares. FIT 2012: 348-353 - [c18]Seyed Mehdi Hazrati Fard, Ali Hamzeh, Sattar Hashemi:
A game theoretic framework for feature selection. FSKD 2012: 845-850 - [c17]Maryam Sorkhi, Hamidreza Alvari, Sattar Hashemi, Ali Hamzeh:
A Game-Theoretic Framework to Identify Top-K Teams in Social Networks. KDIR 2012: 252-257 - [c16]Farnoush Farhadi, Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
TeamFinder: A Co-clustering based Framework for Finding an Effective Team of Experts in Social Networks. ICDM Workshops 2012: 107-114 - [c15]Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
A levelwise spectral co-clustering algorithm for collaborative filtering. ICUIMC 2012: 6:1-6:6 - [i2]Shervan Fekri Ershad, Sattar Hashemi:
Dispelling Classes Gradually to Improve Quality of Feature Reduction Approaches. CoRR abs/1206.1458 (2012) - [i1]Mahsa Badami, Ali Hamzeh, Sattar Hashemi:
A Novel Strategy Selection Method for Multi-Objective Clustering Algorithms Using Game Theory. CoRR abs/1208.3432 (2012) - 2011
- [j8]Niloofar Mozafari, Sattar Hashemi, Ali Hamzeh:
A Precise Statistical approach for concept change detection in unlabeled data streams. Comput. Math. Appl. 62(4): 1655-1669 (2011) - [j7]Zeinab Khorshidpour, Sattar Hashemi, Ali Hamzeh:
CBDL: Context-based distance learning for categorical attributes. Int. J. Intell. Syst. 26(11): 1076-1100 (2011) - [c14]Lida Rashidi, Sattar Hashemi, Ali Hamzeh:
Anomaly Detection in Categorical Datasets Using Bayesian Networks. AICI (2) 2011: 610-619 - [c13]Hamidreza Alvari, Sattar Hashemi, Ali Hamzeh:
Detecting Overlapping Communities in Social Networks by Game Theory and Structural Equivalence Concept. AICI (2) 2011: 620-630 - [c12]Kaveh Ahmadi Abhari, Ali Hamzeh, Sattar Hashemi:
Voting based learning classifier system for multi-label classification. GECCO (Companion) 2011: 355-360 - [c11]Farzaneh Shoeleh, Ali Hamzeh, Sattar Hashemi:
Towards final rule set reduction in XCS: a fuzzy representation approach. GECCO 2011: 1211-1218 - [c10]Farnoush Farhadi, Maryam Sorkhi, Sattar Hashemi, Ali Hamzeh:
An Effective Expert Team Formation in Social Networks Based on Skill Grading. ICDM Workshops 2011: 366-372 - 2010
- [c9]Ashkan Sami, Babak Yadegari, Hossein Rahimi, Naser Peiravian, Sattar Hashemi, Ali Hamzeh:
Malware detection based on mining API calls. SAC 2010: 1020-1025 - [c8]Mahshid Majd, Farzaneh Shoeleh, Ali Hamzeh, Sattar Hashemi:
Towards Efficient and Effective Negative Selection Algorithm: A Convex Hull Representation Scheme. SEAL 2010: 45-54 - [c7]Farzaneh Shoeleh, Ali Hamzeh, Sattar Hashemi:
To Handle Real Valued Input in XCS: Using Fuzzy Hyper-trapezoidal Membership in Classifier Condition. SEAL 2010: 55-64
2000 – 2009
- 2009
- [j6]Sattar Hashemi, Ying Yang:
Flexible decision tree for data stream classification in the presence of concept change, noise and missing values. Data Min. Knowl. Discov. 19(1): 95-131 (2009) - [j5]Ali Hamzeh, Sattar Hashemi, Ashkan Sami, Adel Rahmani:
A Recursive Classifier System for Partially Observable Environments. Fundam. Informaticae 97(1-2): 15-40 (2009) - [j4]Mohsen Rahmani, Sattar Hashemi, Ali Hamzeh, Ashkan Sami:
Agent Based Decision Tree Learning: a Novel Approach. Int. J. Softw. Eng. Knowl. Eng. 19(7): 1015-1022 (2009) - [j3]Sattar Hashemi, Ying Yang, Zahra Mirzamomen, Mohammad Reza Kangavari:
Adapted One-versus-All Decision Trees for Data Stream Classification. IEEE Trans. Knowl. Data Eng. 21(5): 624-637 (2009) - [c6]Sattar Hashemi, M. R. ZadMiralvad:
Automatic Refinement of Platform Independent Models Using Graph Transformation System. FCST 2009: 424-428 - 2008
- [j2]Sattar Hashemi, Ying Yang, Davoud Zabihzadeh, Mohammad Reza Kangavari:
Detecting intrusion transactions in databases using data item dependencies and anomaly analysis. Expert Syst. J. Knowl. Eng. 25(5): 460-473 (2008) - [j1]Sattar Hashemi, Mohammad Reza Kangavari, Ying Yang:
Class Specific Fuzzy Decision Trees for Mining High Speed Data Streams. Fundam. Informaticae 88(1-2): 135-160 (2008) - 2007
- [c5]Sattar Hashemi, Ying Yang, Majid Pourkashani, Mohammad Reza Kangavari:
To Better Handle Concept Change and Noise: A Cellular Automata Approach to Data Stream Classification. Australian Conference on Artificial Intelligence 2007: 669-674 - [c4]Mashall Aryan, Sattar Hashemi, Morteza Analoui:
Flexible Classifier Selection for Accuracy-Based Classifier Systems. IMECS 2007: 162-165 - 2006
- [c3]Zahra Farzanyar, Mohammad Reza Kangavari, Sattar Hashemi:
Effect of Similar Behaving Attributes in Mining of Fuzzy Association Rules in the Large Databases. ICCSA (1) 2006: 1100-1109 - [c2]Zahra Farzanyar, Mohammad Reza Kangavari, Sattar Hashemi:
A New Algorithm for Mining Fuzzy Association Rules in the Large Databases Based on Ontology. ICDM Workshops 2006: 65-69 - [c1]Zahra Farzanyar, Mohammad Reza Kangavari, Sattar Hashemi:
An Efficient Distributed Algorithm for Mining Association Rules. ISPA 2006: 383-393
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint