default search action
Yizhi Ren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Ye Yao, Tingfeng Han, Xudong Gao, Yizhi Ren, Weizhi Meng:
Deep video inpainting detection and localization based on ConvNeXt dual-stream network. Expert Syst. Appl. 247: 123331 (2024) - [j53]Ye Yao, Junyu Wang, Qi Chang, Yizhi Ren, Weizhi Meng:
High invisibility image steganography with wavelet transform and generative adversarial network. Expert Syst. Appl. 249: 123540 (2024) - [j52]Qiuhua Wang, Chengyu Li, Tianyu Xia, Yizhi Ren, Dong Wang, Guoyan Zhang, Kim-Kwang Raymond Choo:
Optimal Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 19: 835-850 (2024) - [j51]Rongke Liu, Dong Wang, Yizhi Ren, Zhen Wang, Kaitian Guo, Qianqian Qin, Xiaolei Liu:
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. IEEE Trans. Inf. Forensics Secur. 19: 3958-3973 (2024) - [j50]Ye Yao, Chen Wang, Hui Wang, Ke Wang, Yizhi Ren, Weizhi Meng:
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer. IEEE Trans. Inf. Forensics Secur. 19: 4406-4419 (2024) - [j49]Weifeng Yin, Lifeng Yuan, Yizhi Ren, Weizhi Meng, Dong Wang, Qiuhua Wang:
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Trans. Inf. Forensics Secur. 19: 6665-6678 (2024) - [j48]Qiuyun Lyu, Yilong Zhou, Yizhi Ren, Zhen Wang, Yunchuan Guo:
Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System. IEEE Trans. Inf. Forensics Secur. 19: 9760-9774 (2024) - [j47]Ye Yao, Linchao Huang, Hui Wang, Qi Chang, Yizhi Ren, Fengjun Xiao:
Robust Adaptive Steganography Based on Adaptive STC-ECC. IEEE Trans. Multim. 26: 5477-5489 (2024) - [i2]Qiuyun Lyu, Yilong Zhou, Yizhi Ren, Zheng Wang, Yunchuan Guo:
Towards Personal Data Sharing Autonomy:A Task-driven Data Capsule Sharing System. CoRR abs/2409.18449 (2024) - 2023
- [j46]Qiuhua Wang, Rui Zhang, Chuangchuang Li, Chengyu Li, Yeru Wang, Yizhi Ren, Kim-Kwang Raymond Choo:
S-DeepTrust: A deep trust prediction method based on sentiment polarity perception. Inf. Sci. 633: 104-121 (2023) - [j45]Siyu Yao, Yizhi Ren, Dong Wang, Yeru Wang, Weifeng Yin, Lifeng Yuan:
SNN-PPRL: A secure record matching scheme based on siamese neural network. J. Inf. Secur. Appl. 76: 103529 (2023) - [j44]Qisen Xi, Yizhi Ren, Liang Kou, Yongrui Cui, Zuohua Chen, Lifeng Yuan, Dong Wang:
EABERT: An Event Annotation Enhanced BERT Framework for Event Extraction. Mob. Networks Appl. 28(5): 1818-1830 (2023) - [j43]Qiuyun Lyu, Hao Li, Zhining Deng, Jingyu Wang, Yizhi Ren, Ning Zheng, Junliang Liu, Huaping Liu, Kim-Kwang Raymond Choo:
A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services. IEEE Trans. Cloud Comput. 11(3): 2546-2561 (2023) - [c29]Yumiao Gao, Yizhi Ren, Jiawei Rao, Zuohua Chen, Qisen Xi, Haoda Wang, Dong Wang, Lifeng Yuan:
Chinese Event Causality Identification Based on Retrieval Enhancement. NLPCC (1) 2023: 159-170 - 2022
- [j42]Qiuhua Wang, Hui Yang, Guohua Wu, Kim-Kwang Raymond Choo, Zheng Zhang, Gongxun Miao, Yizhi Ren:
Black-box adversarial attacks on XSS attack detection model. Comput. Secur. 113: 102554 (2022) - [j41]Guojun Wang, Yizhi Ren:
Foreword. IEICE Trans. Inf. Syst. 105-D(2): 193-194 (2022) - [j40]Yizhi Ren, Zelong Li, Lifeng Yuan, Zhen Zhang, Chunhua Su, Yujuan Wang, Guohua Wu:
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems. IEICE Trans. Inf. Syst. 105-D(2): 289-299 (2022) - [j39]Xinyu Tang, Cheng Guo, Yizhi Ren, Cong Wang, Kim-Kwang Raymond Choo:
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems. IEEE Syst. J. 16(2): 1717-1728 (2022) - [j38]Qiuhua Wang, Tianyu Xia, Dong Wang, Yizhi Ren, Gongxun Miao, Kim-Kwang Raymond Choo:
SDoS: Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 17: 3335-3349 (2022) - [c28]Zuohua Chen, Guohua Wu, Qiuhua Wang, Zhen Zhang, Qisen Xi, Yizhi Ren, Lifeng Yuan:
Label Semantic Extension for Chinese Event Extraction. NLPCC (1) 2022: 197-208 - 2021
- [j37]Jiyuan Zhou, Xing Jin, Lanping Yu, Limin Xue, Yizhi Ren:
TruthTrust: Truth Inference-Based Trust Management Mechanism on a Crowdsourcing Platform. Sensors 21(8): 2578 (2021) - [p1]Qisen Xi, Yizhi Ren, Siyu Yao, Guohua Wu, Gongxun Miao, Zhen Zhang:
Chinese Named Entity Recognition: Applications and Challenges. MDATA: A New Knowledge Representation Model 2021: 51-81 - 2020
- [j36]Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren:
Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things. IEEE Access 8: 20920-20930 (2020) - [j35]Yan Zhang, Jianhua He, Javier Lopez, Min Sheng, Hassnaa Moustafa, Yizhi Ren, Nirwan Ansari:
IEEE Access Special Section Editorial: Mobile Edge Computing. IEEE Access 8: 106071-106074 (2020) - [j34]Yizhi Ren, Mengjin Jiang, Ting Wu, Ye Yao, Kim-Kwang Raymond Choo, Zhen Wang:
An eigenvalue-based immunization scheme for node attacks in networks with uncertainty. Sci. China Inf. Sci. 63(3) (2020) - [j33]Yizhi Ren, Qi Zhou, Zhen Wang, Ting Wu, Guohua Wu, Kim-Kwang Raymond Choo:
Query-efficient label-only attacks against black-box machine learning models. Comput. Secur. 90: 101698 (2020) - [j32]Nijia Lu, Guohua Wu, Zhen Zhang, Yitao Zheng, Yizhi Ren, Kim-Kwang Raymond Choo:
Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts. Concurr. Comput. Pract. Exp. 32(23) (2020) - [j31]Qiuhua Wang, Mingyang Kang, Guohua Wu, Yizhi Ren, Chunhua Su:
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks. IEICE Trans. Inf. Syst. 103-D(2): 230-238 (2020)
2010 – 2019
- 2019
- [j30]Qiuhua Wang, Jiacheng Zhan, Xiaoqin Ouyang, Yizhi Ren:
SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks. Sensors 19(9): 2074 (2019) - [j29]Jie Ji, Guohua Wu, Jinguo Shuai, Zhen Zhang, Zhen Wang, Yizhi Ren:
Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks. Sensors 19(18): 3886 (2019) - [c27]Chenjian Duan, Zhen Wang, Hong Ding, Mengting Jiang, Yizhi Ren, Ting Wu:
A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory. ICA3PP (2) 2019: 391-398 - [c26]Qi Zhou, Yizhi Ren, Tianyu Xia, Lifeng Yuan, Linqiang Chen:
Data Poisoning Attacks on Graph Convolutional Matrix Completion. ICA3PP (2) 2019: 427-439 - [c25]Jie Ji, Guohua Wu, Chenjian Duan, Yizhi Ren, Zhen Wang:
Greedily Remove k Links to Hide Important Individuals in Social Network. SocialSec 2019: 223-237 - [e1]Guojun Wang, Md. Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren:
Dependability in Sensor, Cloud, and Big Data Systems and Applications - 5th International Conference, DependSys 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1123, Springer 2019, ISBN 978-981-15-1303-9 [contents] - 2018
- [j28]Yizhi Ren, Xiangyu Chen, Zhen Wang, Benyun Shi, Guanghai Cui, Ting Wu, Kim-Kwang Raymond Choo:
Neighbor-considered migration facilitates cooperation in prisoner's dilemma games. Appl. Math. Comput. 323: 95-105 (2018) - [j27]Yan Hu, Shanshan Wang, Yizhi Ren, Kim-Kwang Raymond Choo:
User influence analysis for Github developer social networks. Expert Syst. Appl. 108: 108-118 (2018) - [j26]Yizhi Ren, Gang Wang, Lanping Yu, Benyun Shi, Weitong Hu, Zhen Wang:
Rigorous or tolerant: The effect of different reputation attitudes in complex networks. Future Gener. Comput. Syst. 83: 476-484 (2018) - [j25]Xiaohong Huang, Tingting Yuan, Guanhua Qiao, Yizhi Ren:
Deep Reinforcement Learning for Multimedia Traffic Control in Software Defined Networking. IEEE Netw. 32(6): 35-41 (2018) - [j24]Hong Ding, Yao Zhang, Yizhi Ren, Benyun Shi, Kim-Kwang Raymond Choo:
Heterogeneous investment in spatial public goods game with mixed strategy. Soft Comput. 22(4): 1287-1294 (2018) - [c24]Mengjin Jiang, Yizhi Ren, Ye Yao, Lifeng Yuan, Ting Wu, Zhen Wang:
CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks. DASC/PiCom/DataCom/CyberSciTech 2018: 334-337 - [c23]Guanghai Cui, Yizhi Ren, Shengwen Tian, Ting Wu, Kim-Kwang Raymond Choo:
Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks. ICCCN 2018: 1-9 - [c22]Jia-Hao Xu, Zhen Wang, Guanghai Cui, Yizhi Ren, Hong Ding, Kim-Kwang Raymond Choo:
An Extended Exploration to the Epidemic Containment Game. ICCCN 2018: 1-7 - [c21]Yizhi Ren, Mengjin Jiang, Ye Yao, Ting Wu, Zhen Wang, Mengkun Li, Kim-Kwang Raymond Choo:
Node Immunization in Networks with Uncertainty. TrustCom/BigDataSE 2018: 1392-1397 - 2017
- [j23]Yan Hu, Weiqiang Kong, Yizhi Ren, Kim-Kwang Raymond Choo:
A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution. IEEE Access 5: 8752-8762 (2017) - [j22]Jingyu Hua, An Tang, Qingyun Pan, Kim-Kwang Raymond Choo, Hong Ding, Yizhi Ren:
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party. Secur. Commun. Networks 2017: 9532163:1-9532163:10 (2017) - [c20]Yuanfang Chen, Falin Chen, Yizhi Ren, Ting Wu, Ye Yao:
Poster: DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction. MobiCom 2017: 537-539 - [c19]Xiaoming Zhan, Yanming Ye, Yaoxin Zhuo, Benyun Shi, Yizhi Ren, Weitong Hu:
Spatial-temporal analysis on bird habitat discovery in China. SPAC 2017: 573-578 - [i1]Yuanfang Chen, Falin Chen, Yizhi Ren, Ting Wu, Ye Yao:
DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction. CoRR abs/1710.01695 (2017) - 2016
- [j21]Cheng Guo, Ruhan Zhuang, Yingmo Jie, Yizhi Ren, Ting Wu, Kim-Kwang Raymond Choo:
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds. J. Medical Syst. 40(11): 235:1-235:8 (2016) - [c18]Hong Ding, Xiangyu Chen, Benyun Shi, Yanming Ye, Yizhi Ren:
Effect of Different Migration Strategies on Evolution of Cooperation in Spatial Prisoner's Dilemma Game. DASC/PiCom/DataCom/CyberSciTech 2016: 442-447 - 2015
- [c17]Hong Ding, Junyao Huang, Yuangfang Chen, Yizhi Ren:
Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation Game. CIT/IUCC/DASC/PICom 2015: 1954-1959 - [c16]Hong Ding, Yao Zhang, Haiyang Hu, Lei Shu, Yizhi Ren:
Insurance Strategy Can Promote Cooperation in the Presence of Antisocial Punishment in Public Goods Game. IIKI 2015: 86-89 - [c15]Hong Ding, Lin Cao, Hongjun Qiu, Zhangbing Zhou, Lei Shu, Yizhi Ren:
Reputation-Based Conditional Investment Enhances the Evolution of Cooperation in Spatial Public Goods Game. IIKI 2015: 90-93 - 2014
- [j20]Xia Wang, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A Location Inferring Model Based on Tweets and Bilateral Follow Friends. J. Comput. 9(2): 315-321 (2014) - [j19]Tantan Xu, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A File Fragment Classification Method Based on Grayscale Image. J. Comput. 9(8): 1863-1870 (2014) - [j18]Ming Xu, Jun Yao, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng, Shiyue Ling:
A Reconstructing Android User Behavior Approach based on YAFFS2 and SQLite. J. Comput. 9(10): 2294-2302 (2014) - [j17]Ming Xu, Xiaowei Xu, Jian Xu, Yizhi Ren, Haiping Zhang, Ning Zheng:
A Forensic Analysis Method for Redis Database based on RDB and AOF File. J. Comput. 9(11): 2538-2544 (2014) - [j16]Haiyang Hu, Yizhi Ren, Xu Xu, Liguo Huang, Hua Hu:
Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments. J. Netw. Comput. Appl. 40: 21-30 (2014) - 2013
- [j15]Dong Jiao, Mingchu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui:
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management. IET Inf. Secur. 7(4): 343-348 (2013) - [j14]Laiping Zhao, Yizhi Ren, Kouichi Sakurai:
Reliable workflow scheduling with less resource redundancy. Parallel Comput. 39(10): 567-585 (2013) - [j13]Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai:
Evolution of cooperation in reputation system by group-based scheme. J. Supercomput. 63(1): 171-190 (2013) - [j12]Ming Xu, Lingfei Wu, Shuhui Qi, Jian Xu, Haiping Zhang, Yizhi Ren, Ning Zheng:
A similarity metric method of obfuscated malware using function-call graph. J. Comput. Virol. Hacking Tech. 9(1): 35-47 (2013) - [c14]Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng:
A Recovery Approach for SQLite History Recorders from YAFFS2. ICT-EurAsia 2013: 295-299 - [c13]Fei Kong, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A Webmail Reconstructing Method from Windows XP Memory Dumps. MUE 2013: 211-217 - 2012
- [j11]Yongrui Cui, Mingchu Li, Yang Xiang, Yizhi Ren, Silvio Cesare:
A QoS-based fine-grained reputation system in the grid environment. Concurr. Comput. Pract. Exp. 24(17): 1990-2006 (2012) - [j10]Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, Jonathan Z. Sun, Fengying Wang:
A Finite Equivalence of Verifiable Multi-secret Sharing. Int. J. Comput. Intell. Syst. 5(1): 1-12 (2012) - [j9]Xinxin Fan, Mingchu Li, Jianhua Ma, Yizhi Ren, Hui Zhao, Zhiyuan Su:
Behavior-based reputation management in P2P file-sharing networks. J. Comput. Syst. Sci. 78(6): 1737-1750 (2012) - [j8]Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:
Flexible service selection with user-specific QoS support in service-oriented architecture. J. Netw. Comput. Appl. 35(3): 962-973 (2012) - [j7]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. J. Networks 7(1): 88-100 (2012) - [j6]Wei-Tong Hu, Mingchu Li, Cheng Guo, Yizhi Ren:
Reversible secret image sharing with steganography and dynamic embedding. Secur. Commun. Networks 5(11): 1267-1276 (2012) - 2011
- [j5]Jingyu Hua, Mingchu Li, Yizhi Ren, Kouichi Sakurai:
Efficient Context-Sensitive Intrusion Detection Based on State Transition Table. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 255-264 (2011) - [j4]Yizhi Ren, Lanping Yu, Wei Yang, Bin Feng:
PPS: A Scheme of Predicting User Preference based on Multivariate. J. Next Gener. Inf. Technol. 2(3): 112-121 (2011) - [j3]Yizhi Ren, Mingchu Li, Kouichi Sakurai:
FineTrust: a fine-grained trust model for peer-to-peer networks. Secur. Commun. Networks 4(1): 61-69 (2011) - [c12]Laiping Zhao, Yizhi Ren, Kouichi Sakurai:
A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems. AINA 2011: 275-282 - [c11]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
A generic evaluation method for key management schemes in wireless sensor network. ICUIMC 2011: 55 - [c10]Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. TrustCom 2011: 1739-1744 - 2010
- [c9]Laiping Zhao, Yizhi Ren, Yang Xiang, Kouichi Sakurai:
Fault tolerant scheduling with dynamic number of replicas in heterogeneous system. HPCC 2010: 434-441 - [c8]Dong Hao, Yizhi Ren, Kouichi Sakurai:
A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress). INTRUST 2010: 237-252 - [c7]Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:
SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid. IPDPS Workshops 2010: 1-8 - [c6]Xinxin Fan, Mingchu Li, Yizhi Ren, Jianhua Ma:
Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks. UIC/ATC Workshops 2010: 358-363
2000 – 2009
- 2009
- [j2]Yongrui Cui, Mingchu Li, Yizhi Ren, Kouichi Sakurai:
An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(5): 1339-1346 (2009) - [j1]Yizhi Ren, Mingchu Li, Kouichi Sakurai:
Modeling Security Bridge Certificate Authority Architecture. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(6): 1544-1547 (2009) - [c5]Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Security Analysis for P2P Routing Protocols. ARES 2009: 899-904 - [c4]Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren:
Efficient Intrusion Detection Based on Static Analysis and Stack Walks. IWSEC 2009: 158-173 - 2008
- [c3]Mingchu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Zhi-Hui Wang:
Granularity Considering in a Trust Model for P2P Networks. AINA Workshops 2008: 307-312 - [c2]Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai:
Trust Similarity Measure in Trust Model for P2P Networks. EUC (2) 2008: 107-112 - [c1]Mingchu Li, Yongrui Cui, Yizhi Ren, Yuan Tian:
Intelligent Security Multi-agent Framework in Grid Computing. ICNSC 2008: 1142-1147
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint