default search action
Jie Yu 0008
Person information
- affiliation: National University of Defense Technology, College of Computer, Changsha, China
- not to be confused with: Jie Yu 0006
Other persons with the same name
- Jie Yu — disambiguation page
- Jie Yu 0001 — Canon Innovation Center, San Jose, CA, USA (and 3 more)
- Jie Yu 0002 (aka: Jie (Joseph) Yu) — University of Nottingham Ningbo, Nottingham University Business School China, Ningbo, China (and 1 more)
- Jie Yu 0003 — Wuhan University, Office of Scientific Research and Development, China
- Jie Yu 0004 — Southeast University, School of Electrical Engineering, Nanjing, China
- Jie Yu 0005 — Zhejiang University, College of Electrical Engineering, Hangzhou, China
- Jie Yu 0006 — China Aerodynamics Research and Development Center, Mianyang, China (and 1 more)
- Jie Yu 0007 — Hangzhou Dianzi University, School of Computer Science and Engineering, China
- Jie Yu 0009 — Shanghai University, School of Computer Engineering and Science, China (and 1 more)
- Jie Yu 0010 — Drexel University, Department of Electrical and Computer Engineering, Philadelphia, PA, USA
- Jie Yu 0011 — McMaster University, Department of Chemical Engineering, Hamilton, ON, Canada
- Jie Yu 0012 — Tongji University, College of Environmental Science and Engineering, Shanghai, China
- Jie Yu 0013 — Robert Bosch GmbH, Computer Vision Research Lab, Hildesheim, Germany
- Jie Yu 0014 — Xiangtan University, MOE Key Laboratory of Intelligent Computing and Information Processing, China
- Jie Yu 0015 — Northeastern University, Faculty of Software, Shenyang, China
- Jie Yu 0016 — Twitter, Inc. (and 1 more)
- Jie Yu 0017 — Shandong Agricultural University, College of Information Science and Engineering, Agricultural Big Data Research Center, Tai'an, China
- Jie Yu 0018 — Tongji University, College of Surveying and Geo-Informatics, Shanghai, China
- Jie Yu 0019 — Zhengzhou University, School of Computer and Artificial Intelligence, Cooperative Innovation Center of Internet Healthcare of Henan Province, Zhengzhou, China
- Jie Yu 0020 — Tianjin Open University, School of Economics and Management, Tianjin, China
- Jie Yu 0021 — Nanjing University of Science and Technology, Nanjing, China
- Jie Yu 0022 — University of Electronic Science and Technology of China, School of Life Science and Technology, Chengdu, China (and 1 more)
- Jie Yu 0023 — Hohai University, Business School, Nanjing, China
- Jie Yu 0024 — Changsha University of Science and Technology, School of Traffic and Transportation Engineering, Changsha, China (and 1 more)
- Jie Yu 0025 — Fujian University of Technology, College of Mechanical and Automotive Engineering, Fuzhou, China
- Jie Yu 0026 — Beihang University, Institute of Artificial Intelligence, Beijing, China
- Jie Yu 0027 — Chinese Academy of Sciences, Institute of Microelectronics, Key Laboratory of Microelectronics Devices & Integrated Technology, Beijing, China
- Jie Yu 0028 — McMaster University, Department of Chemical Engineering, Hamilton, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Bin Ji, Shasha Li, Hao Xu, Jie Yu, Jun Ma, Huijun Liu, Jing Yang:
Span-based joint entity and relation extraction augmented with sequence tagging mechanism. Sci. China Inf. Sci. 67(5) (2024) - [j17]Huijun Liu, Bin Ji, Jie Yu, Shasha Li, Jun Ma, Zibo Yi, Mengxue Du, Miaomiao Li, Jie Liu, Zeyao Mo:
A More Context-Aware Approach for Textual Adversarial Attacks Using Probability Difference-Guided Beam Search. IEEE Trans. Knowl. Data Eng. 36(6): 2316-2328 (2024) - [c46]Xiaopeng Li, Shasha Li, Shezheng Song, Jing Yang, Jun Ma, Jie Yu:
PMET: Precise Model Editing in a Transformer. AAAI 2024: 18564-18572 - [c45]Jin Zhang, Jiangjie Huang, Long Peng, Xiaodong Liu, Jie Yu, Wenzhu Wang:
A Learning-Based and Network-Aware Power Management for Mobile Devices. COMPSAC 2024: 894-899 - [c44]Yongtao Tang, Shasha Li, Jie Yu, Jun Ma:
CAW: Confidence-Based Adaptive Weighted Model for Multi-modal Entity Linking. ICANN (6) 2024: 34-51 - [c43]Huijun Liu, Bin Ji, Jie Yu, Shasha Li, Jun Ma, Miaomiao Li, Xi Wang:
Offline Textual Adversarial Attacks against Large Language Models. IJCNN 2024: 1-9 - [c42]Shezheng Song, Shasha Li, Jie Yu, Shan Zhao, Xiaopeng Li, Jun Ma, Xiaodong Liu, Zhuo Li, Xiaoguang Mao:
DIM: Dynamic Integration of Multimodal Entity Linking with Large Language Model. PRCV (5) 2024: 187-200 - [c41]Miaomiao Li, Jun Ma, Jie Yu, Shasha Li, Jing Wang, Zhuo Li, Huijun Liu, Xi Wang:
FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework. WASA (2) 2024: 167-179 - [i16]Xiaopeng Li, Shasha Li, Bin Ji, Shezheng Song, Xi Wang, Jun Ma, Jie Yu, Xiaodong Liu, Jing Wang, Weimin Zhang:
SWEA: Changing Factual Knowledge in Large Language Models via Subject Word Embedding Altering. CoRR abs/2401.17809 (2024) - [i15]Shezheng Song, Shasha Li, Shan Zhao, Xiaopeng Li, Chengyu Wang, Jie Yu, Jun Ma, Tianwei Yan, Bin Ji, Xiaoguang Mao:
DWE+: Dual-Way Matching Enhanced Framework for Multimodal Entity Linking. CoRR abs/2404.04818 (2024) - [i14]Shezheng Song, Shasha Li, Shan Zhao, Chengyu Wang, Xiaopeng Li, Jie Yu, Qian Wan, Jun Ma, Tianwei Yan, Wentao Ma, Xiaoguang Mao:
PTA: Enhancing Multimodal Sentiment Analysis through Pipelined Prediction and Translation-based Alignment. CoRR abs/2406.00017 (2024) - [i13]Shezheng Song, Shasha Li, Jie Yu, Shan Zhao, Xiaopeng Li, Jun Ma, Xiaodong Liu, Zhuo Li, Xiaoguang Mao:
DIM: Dynamic Integration of Multimodal Entity Linking with Large Language Model. CoRR abs/2407.12019 (2024) - [i12]Xiaopeng Li, Shangwen Wang, Shezheng Song, Bin Ji, Huijun Liu, Shasha Li, Jun Ma, Jie Yu:
Identifying Knowledge Editing Types in Large Language Models. CoRR abs/2409.19663 (2024) - 2023
- [c40]Mengxue Du, Shasha Li, Jie Yu, Jun Ma, Huijun Liu, Miaomiao Li, Bin Ji:
DADR: A Denoising Approach for Dense Retrieval Model Training. APWeb/WAIM (3) 2023: 159-173 - [c39]Xi Deng, Shasha Li, Jie Yu, Jun Ma:
HM-Transformer: Hierarchical Multi-modal Transformer for Long Document Image Understanding. APWeb/WAIM (4) 2023: 232-245 - [c38]Huijun Liu, Jie Yu, Jun Ma, Shasha Li:
A Novel Ranking Method for Textual Adversarial Attack. MLNLP 2023: 73-77 - [c37]Miaomiao Li, Jie Yu, Jun Ma, Shasha Li, Huijun Liu, Mengxue Du, Bin Ji:
QAE: A Hard-Label Textual Attack Considering the Comprehensive Quality of Adversarial Examples. NLPCC (2) 2023: 520-532 - [c36]Jing Yang, Bin Ji, Shasha Li, Jun Ma, Long Peng, Jie Yu:
Dynamic Multi-View Fusion Mechanism for Chinese Relation Extraction. PAKDD (1) 2023: 405-417 - [i11]Jing Yang, Bin Ji, Shasha Li, Jun Ma, Long Peng, Jie Yu:
Dynamic Multi-View Fusion Mechanism For Chinese Relation Extraction. CoRR abs/2303.05082 (2023) - [i10]Xiaopeng Li, Shasha Li, Shezheng Song, Jing Yang, Jun Ma, Jie Yu:
PMET: Precise Model Editing in a Transformer. CoRR abs/2308.08742 (2023) - 2022
- [j16]Zibo Yi, Jie Yu, Yusong Tan, Qingbo Wu:
Fine-tuning more stable neural text classifiers for defending word level adversarial attacks. Appl. Intell. 52(10): 11948-11965 (2022) - [j15]Huijun Liu, Jie Yu, Jun Ma, Shasha Li, Bin Ji, Zibo Yi, Miaomiao Li, Long Peng, Xiaodong Liu:
Textual adversarial attacks by exchanging text-self words. Int. J. Intell. Syst. 37(12): 12212-12234 (2022) - [j14]Zibo Yi, Shasha Li, Jun Ma, Jie Yu, Yusong Tan, Qingbo Wu:
Towards an Efficient and Robust Adversarial Attack Against Neural Text Classifier. Int. J. Pattern Recognit. Artif. Intell. 36(11): 2253007:1-2253007:22 (2022) - [j13]Bin Ji, Yalong Xie, Jie Yu, Shasha Li, Jun Ma, Yun Ji, Huijun Liu:
A novel bundling learning paradigm for named entity recognition. Knowl. Based Syst. 248: 108825 (2022) - [j12]Jie Yu, Bin Ji, Shasha Li, Jun Ma, Huijun Liu, Hao Xu:
S-NER: A Concise and Efficient Span-Based Model for Named Entity Recognition. Sensors 22(8): 2852 (2022) - [c35]Wuhang Lin, Shasha Li, Chen Zhang, Bin Ji, Jie Yu, Jun Ma, Zibo Yi:
SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder. APWeb/WAIM (2) 2022: 69-84 - [c34]Bin Ji, Shasha Li, Shaoduo Gan, Jie Yu, Jun Ma, Huijun Liu, Jing Yang:
Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes. COLING 2022: 1842-1854 - [c33]Mengxue Du, Shasha Li, Jie Yu, Jun Ma, Bin Ji, Huijun Liu, Wuhang Lin, Zibo Yi:
Topic-Grained Text Representation-Based Model for Document Retrieval. ICANN (3) 2022: 776-788 - [c32]Hao Xu, Long Peng, Xiaodong Liu, Menglin Zhang, Jun Ma, Jie Yu, Zibo Yi:
KylinTune: DQN-based Energy-efficient Model for Browser in Mobile Devices. IPCCC 2022: 254-262 - [i9]Bin Ji, Shasha Li, Jie Yu, Jun Ma, Huijun Liu:
Win-Win Cooperation: Bundling Sequence and Span Models for Named Entity Recognition. CoRR abs/2207.03300 (2022) - [i8]Mengxue Du, Shasha Li, Jie Yu, Jun Ma, Bin Ji, Huijun Liu, Wuhang Lin, Zibo Yi:
Topic-Grained Text Representation-based Model for Document Retrieval. CoRR abs/2207.04656 (2022) - [i7]Wuhang Lin, Shasha Li, Chen Zhang, Bin Ji, Jie Yu, Jun Ma, Zibo Yi:
SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder. CoRR abs/2207.04660 (2022) - [i6]Bin Ji, Shasha Li, Shaoduo Gan, Jie Yu, Jun Ma, Huijun Liu:
Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes. CoRR abs/2208.08023 (2022) - [i5]Huijun Liu, Jie Yu, Shasha Li, Jun Ma, Bin Ji:
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search. CoRR abs/2208.08029 (2022) - [i4]Bin Ji, Hao Xu, Jie Yu, Shasha Li, Jun Ma, Yuke Ji, Huijun Liu:
A Two-Phase Paradigm for Joint Entity-Relation Extraction. CoRR abs/2208.08659 (2022) - [i3]Bin Ji, Shasha Li, Hao Xu, Jie Yu, Jun Ma, Huijun Liu, Jing Yang:
Span-based joint entity and relation extraction augmented with sequence tagging mechanism. CoRR abs/2210.12720 (2022) - 2021
- [j11]Zibo Yi, Jie Yu, Yusong Tan, Qingbo Wu:
A Multimodal Adversarial Attack Framework Based on Local and Random Search Algorithms. Int. J. Comput. Intell. Syst. 14(1): 1934-1947 (2021) - [c31]Jianling Li, Wuhang Lin, Shasha Li, Jie Yu, Jun Ma:
Hierarchical Encoder-Decoder Summary Model with an Instructor for Long Academic Papers. ICCCS 2021: 536-540 - [c30]Wuhang Lin, Jianling Li, Zibo Yi, Bin Ji, Shasha Li, Jie Yu, Jun Ma:
A Unified Summarization Model with Semantic Guide and Keyword Coverage Mechanism. ICANN (5) 2021: 333-344 - [c29]Yijia Liu, Shasha Li, Jie Yu, Yusong Tan, Jun Ma, Qingbo Wu:
Many-To-Many Chinese ICD-9 Terminology Standardization Based on Neural Networks. ICIC (2) 2021: 430-441 - [c28]Yongtao Tang, Jie Yu, Shasha Li, Bin Ji, Yusong Tan, Qingbo Wu:
Span Representation Generation Method in Entity-Relation Joint Extraction. ICIC (2) 2021: 465-476 - [c27]Xiaohu Du, Jie Yu, Shasha Li, Zibo Yi, Hai Liu, Jun Ma:
Combating Word-level Adversarial Text with Robust Adversarial Training. IJCNN 2021: 1-8 - [i2]Bin Ji, Shasha Li, Jie Yu, Jun Ma, Huijun Liu:
Boosting Span-based Joint Entity and Relation Extraction via Squence Tagging Mechanism. CoRR abs/2105.10080 (2021) - 2020
- [j10]Bin Ji, Shasha Li, Jie Yu, Jun Ma, Jintao Tang, Qingbo Wu, Yusong Tan, Huijun Liu, Yun Ji:
Research on Chinese medical named entity recognition based on collaborative cooperation of multiple neural network models. J. Biomed. Informatics 104: 103395 (2020) - [j9]Zhaoyun Chen, Wei Quan, Mei Wen, Jianbin Fang, Jie Yu, Chunyuan Zhang, Lei Luo:
Deep Learning Research and Development Platform: Characterizing and Scheduling with QoS Guarantees on GPU Clusters. IEEE Trans. Parallel Distributed Syst. 31(1): 34-50 (2020) - [c26]Bin Ji, Jie Yu, Shasha Li, Jun Ma, Qingbo Wu, Yusong Tan, Huijun Liu:
Span-based Joint Entity and Relation Extraction with Attention-based Span-specific and Contextual Semantic Representations. COLING 2020: 88-99 - [c25]Xiaohu Du, Zibo Yi, Shasha Li, Jun Ma, Jie Yu, Yusong Tan, Qinbo Wu:
Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification. ICAIS (1) 2020: 422-433
2010 – 2019
- 2019
- [j8]Bin Ji, Rui Liu, Shasha Li, Jie Yu, Qingbo Wu, Yusong Tan, Jiaju Wu:
A hybrid approach for named entity recognition in Chinese electronic medical record. BMC Medical Informatics Decis. Mak. 19-S(2): 149-158 (2019) - [c24]Zhaoyun Chen, Lei Luo, Haoduo Yang, Jie Yu, Mei Wen, Chunyuan Zhang:
GENIE: QoS-guided Dynamic Scheduling for CNN-based Tasks on SME Clusters. DATE 2019: 1599-1602 - [c23]Zibo Yi, Jie Yu, Shasha Li, Yusong Tan, Qingbo Wu:
Incremental Learning of GAN for Detecting Multiple Adversarial Attacks. ICANN (3) 2019: 673-684 - [c22]Jianling Li, Shiwen Yu, Shasha Li, Jie Yu:
Multi-classification of Theses to Disciplines Based on Metadata. NLPCC (2) 2019: 476-485 - 2018
- [c21]Bin Ji, Rui Liu, Shasha Li, Jintao Tang, Jie Yu, Qian Li, WeiSang Xu:
A BiLSTM-CRF Method to Chinese Electronic Medical Record Named Entity Recognition. ACAI 2018: 48:1-48:6 - [c20]Dongyang Liang, Shasha Li, Bing Ji, Zibo Yi, Jie Yu, Jianfeng Zhang, Yusong Tan, Qingbo Wu:
Research on Matrix Multiplication Based WeChat Group Tagging Technology. AIKE 2018: 41-45 - [c19]Zhaoyun Chen, Lei Luo, Wei Quan, Yang Shi, Jie Yu, Mei Wen, Chunyuan Zhang:
Multiple CNN-based Tasks Scheduling across Shared GPU Platform in Research and Development Scenarios. HPCC/SmartCity/DSS 2018: 578-585 - [c18]Zibo Yi, Shasha Li, Jie Yu, Yusong Tan, Qingbo Wu:
A Novel Misclassification Attack Against Black Box Neural Network Classifiers. SKG 2018: 38-45 - 2017
- [j7]Qintao Shen, Li Zhang, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu:
上下文敏感的控制流完整性保护的改进方法 (Improved Method of Context-sensitive Control Flow Integrity Protection). 计算机科学 44(11): 87-90 (2017) - [c17]Zibo Yi, Shasha Li, Jie Yu, Yusong Tan, Qingbo Wu, Hong Yuan, Ting Wang:
Drug-Drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers. ADMA 2017: 554-566 - [c16]Jie Lin, Qingbo Wu, Yusong Tan, Jie Yu, Qi Zhang, Xiaoling Li, Lei Luo:
MicRun: A framework for scale-free graph algorithms on SIMD architecture of the Xeon Phi. ASAP 2017: 127-136 - [c15]Jie Lin, Yusong Tan, Qingbo Wu, Xiaoling Li, Jie Yu, Qi Zhang:
An Optimization and Auto-Tuning Method for Scale-Free Graph Algorithms on SIMD Architectures. ISPA/IUCC 2017: 533-541 - [i1]Zibo Yi, Shasha Li, Jie Yu, Qingbo Wu:
Drug-drug Interaction Extraction via Recurrent Neural Network with Multiple Attention Layers. CoRR abs/1705.03261 (2017) - 2016
- [c14]Qi Zhang, Shasha Li, Qingbo Wu, Jie Yu:
Improving DHT Load Balance Using the Churn. CIT 2016: 354-360 - [c13]Shaoduo Gan, Jiexin Zhang, Jie Yu, Xiaoling Li, Jun Ma, Lei Luo, Qingbo Wu:
A novel optimization scheme for caching in locality-aware P2P networks. ISCC 2016: 1024-1031 - [c12]Qi Zhang, Jie Yu, Lei Luo, Jun Ma, Qingbo Wu, Shasha Li:
An Optimized DHT for Linux Package Distribution. ISPDC 2016: 298-305 - [c11]Lu Si, Jie Yu, Lei Luo, Jun Ma, Qingbo Wu, Shasha Li:
ROP-Hunt: Detecting Return-Oriented Programming Attacks in Applications. SpaCCS 2016: 131-144 - [c10]Zibo Yi, Jun Ma, Lei Luo, Jie Yu, Qingbo Wu:
Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization. Trustcom/BigDataSE/ISPA 2016: 1734-1740 - [c9]Shaoduo Gan, Jie Yu, Xiaoling Li, Jun Ma, Lei Luo, Qingbo Wu, Shasha Li:
ERPC: An Edge-Resources Based Framework to Reduce Bandwidth Cost in the Personal Cloud. WAIM (2) 2016: 444-456 - 2015
- [j6]Weihua Zhang, Xiaoyong Li, Jun Ma, Jie Yu:
REPS: 一种高效的容错并行概率流Skyline查询方法 (REPS: An Efficient Fault-tolerant Approach for Parallel Skyline Queries over Probabilistic Data Streams). 计算机科学 42(8): 225-230 (2015) - [j5]Jie Yu, Qiang Li, Shasha Li, Jun Ma, Zhoujun Li:
基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks). 计算机科学 42(Z6): 263-265 (2015) - 2014
- [c8]Qiang Li, Jie Yu, Zhoujun Li:
Routing table status influence of Monitoring Kad. ICPADS 2014: 837-841 - [c7]Qiang Li, Jie Yu, Zhoujun Li:
An Enhanced Kad Protocol Resistant to Eclipse Attacks. NAS 2014: 83-87 - 2011
- [j4]Jie Yu, Zhoujun Li, Peng Xiao, Chengfang Fang, Jia Xu, Ee-Chien Chang:
ID Repetition in Structured P2P Networks. Comput. J. 54(6): 962-975 (2011) - [j3]Jie Yu, Liming Lu, Peng Xiao, Zhoujun Li, Yuan Zhou:
Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT. Comput. Commun. 34(13): 1622-1629 (2011) - [j2]Jie Yu, Peng Xiao, Zhoujun Li, Yuan Zhou:
Toward an Accurate Snapshot of DHT Networks. IEEE Commun. Lett. 15(1): 97-99 (2011) - [j1]Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing host security using external environment sensors. Int. J. Inf. Sec. 10(5): 285-299 (2011) - 2010
- [c6]Jie Yu, Liming Lu, Zhoujun Li, Xiaofeng Wang, Jinshu Su:
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks. ICPP 2010: 680-689 - [c5]Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu:
Enhancing Host Security Using External Environment Sensors. SecureComm 2010: 362-379
2000 – 2009
- 2009
- [c4]Jie Yu, Zhoujun Li:
Active Measurement of Routing Table in Kad. CCNC 2009: 1-5 - [c3]Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li:
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. Infoscale 2009: 175-191 - [c2]Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zhoujun Li:
ID Repetition in Kad. Peer-to-Peer Computing 2009: 111-120 - 2007
- [c1]Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen:
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. ICNS 2007: 54
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-18 18:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint