default search action
Kevin Fu
Person information
- affiliation: University of Michigan, Ann Arbor, MI, USA
- affiliation (former): University of Massachusetts Amherst, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Yushi Cheng, Xiaoyu Ji, Wenjun Zhu, Shibo Zhang, Kevin Fu, Wenyuan Xu:
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors. IEEE Trans. Dependable Secur. Comput. 21(4): 3734-3750 (2024) - [c56]Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu:
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards. NDSS 2024 - [c55]Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu:
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras. NDSS 2024 - [c54]Xingli Zhang, Yazhou Tu, Yan Long, Liqun Shan, Mohamed A Elsaadani, Kevin Fu, Zhiqiang Lin, Xiali Hei:
From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover. SP 2024: 2366-2384 - [i16]Pierce Howell, Max Rudolph, Reza Torbati, Kevin Fu, Harish Ravichandar:
Generalization of Heterogeneous Multi-Robot Policies via Awareness and Communication of Capabilities. CoRR abs/2401.13127 (2024) - 2023
- [c53]Pierce Howell, Max Rudolph, Reza Joseph Torbati, Kevin Fu, Harish Ravichandar:
Generalization of Heterogeneous Multi-Robot Policies via Awareness and Communication of Capabilities. CoRL 2023: 2772-2790 - [c52]Eric Gustafson, Paul Grosen, Nilo Redini, Saagar Jha, Andrea Continella, Ruoyu Wang, Kevin Fu, Sara Rampazzi, Christopher Kruegel, Giovanni Vigna:
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images. RAID 2023: 32-45 - [c51]Connor Bolton, Yan Long, Jun Han, Josiah D. Hester, Kevin Fu:
Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors. RAID 2023: 164-178 - [c50]Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu:
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. SP 2023: 1857-1874 - [c49]Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. SP 2023: 3432-3449 - [c48]Benjamin Cyr, Yan Long, Takeshi Sugawara, Kevin Fu:
Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing. SpaceSec 2023 - [i15]Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu:
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. CoRR abs/2301.10056 (2023) - [i14]Yan Long, Kevin Fu:
Side Auth: Synthesizing Virtual Sensors for Authentication. CoRR abs/2301.11745 (2023) - 2022
- [j23]Yan Long, Alexander Curtiss, Sara Rampazzi, Josiah D. Hester, Kevin Fu:
VeriMask: Sensor Platform for Decontamination of N95 Masks. GetMobile Mob. Comput. Commun. 26(2): 25-28 (2022) - [j22]Kohei Yamashita, Benjamin Cyr, Kevin Fu, Wayne P. Burleson, Takeshi Sugawara:
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 463-489 (2022) - [c47]Yan Long, Kevin Fu:
Side Auth: Synthesizing Virtual Sensors for Authentication. NSPW 2022: 35-44 - [i13]Yan Long, Chen Yan, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. CoRR abs/2205.03971 (2022) - 2021
- [j21]Yan Long, Alexander Curtiss, Sara Rampazzi, Josiah D. Hester, Kevin Fu:
VeriMask: Facilitating Decontamination of N95 Masks in the COVID-19 Pandemic: Challenges, Lessons Learned, and Safeguarding the Future. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 119:1-119:29 (2021) - [c46]Benjamin Cyr, Takeshi Sugawara, Kevin Fu:
Why Lasers Inject Perceived Sound Into MEMS Microphones: Indications and Contraindications of Photoacoustic and Photoelectric Effects. IEEE SENSORS 2021: 1-4 - [c45]Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. SP 2021: 160-175 - [i12]Connor Bolton, Yan Long, Jun Han, Josiah D. Hester, Kevin Fu:
Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification. CoRR abs/2109.13834 (2021) - 2020
- [j20]Connor Bolton, Kevin Fu, Josiah D. Hester, Jun Han:
How to curtail oversensing in the home. Commun. ACM 63(6): 20-24 (2020) - [c44]Yan Long, Alexander Curtiss, Sara Rampazzi, Josiah D. Hester, Kevin Fu:
Automating decontamination of N95 masks for frontline workers in COVID-19 pandemic: poster abstract. SenSys 2020: 747-749 - [c43]Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. SP 2020: 233-248 - [c42]Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. USENIX Security Symposium 2020: 2631-2648 - [i11]Wayne P. Burleson, Kevin Fu, Denise L. Anthony, Jorge Guajardo, Carl A. Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanfar, Carl E. Landwehr, Susan Squires:
Grand Challenges for Embedded Security Research in a Connected World. CoRR abs/2005.06585 (2020) - [i10]Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. CoRR abs/2006.11946 (2020) - [i9]Kevin Fu, Tadayoshi Kohno, Daniel Lopresti, Elizabeth D. Mynatt, Klara Nahrstedt, Shwetak N. Patel, Debra J. Richardson, Benjamin G. Zorn:
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things. CoRR abs/2008.00017 (2020)
2010 – 2019
- 2019
- [j19]Chen Yan, Kevin Fu, Wenyuan Xu:
On Cuba, diplomats, ultrasound, and intermodulation distortion. Comput. Biol. Medicine 104: 250-266 (2019) - [c41]Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao:
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving. CCS 2019: 2267-2281 - [c40]Yazhou Tu, Sara Rampazzi, Bin Hao, Angel Rodriguez, Kevin Fu, Xiali Hei:
Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks. CCS 2019: 2301-2315 - [c39]Andrew Kwong, Wenyuan Xu, Kevin Fu:
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone. IEEE Symposium on Security and Privacy 2019: 905-919 - [i8]Yazhou Tu, Sara Rampazzi, Bin Hao, Angel Rodriguez, Kevin Fu, Xiali Hei:
Trick or Heat? Attack on Amplification Circuits to Abuse Critical Temperature Control Systems. CoRR abs/1904.07110 (2019) - [i7]Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao:
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving. CoRR abs/1907.06826 (2019) - 2018
- [j18]Kevin Fu, Wenyuan Xu:
Risks of trusting the physics of sensors. Commun. ACM 61(2): 20-23 (2018) - [c38]Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, Kevin Fu:
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems. IEEE Symposium on Security and Privacy 2018: 1048-1062 - 2017
- [c37]Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu:
WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. EuroS&P 2017: 3-18 - [i6]Kevin Fu, Ann W. Drobnis, Greg Morrisett, Elizabeth D. Mynatt, Shwetak N. Patel, Radha Poovendran, Benjamin G. Zorn:
Safety and Security for Intelligent Infrastructure. CoRR abs/1705.02002 (2017) - 2016
- [j17]Josiah D. Hester, Nicole Tobias, Amir Rahmati, Lanny Sitanayah, Daniel E. Holcomb, Kevin Fu, Wayne P. Burleson, Jacob Sorber:
Persistent Clocks for Batteryless Sensing Devices. ACM Trans. Embed. Comput. Syst. 15(4): 77:1-77:28 (2016) - [c36]Kevin Fu:
Medical Device Security: The First 165 Years. ACM Great Lakes Symposium on VLSI 2016: 5 - [i5]Rajeev Alur, Emery D. Berger, Ann W. Drobnis, Limor Fix, Kevin Fu, Gregory D. Hager, Daniel P. Lopresti, Klara Nahrstedt, Elizabeth D. Mynatt, Shwetak N. Patel, Jennifer Rexford, John A. Stankovic, Benjamin G. Zorn:
Systems Computing Challenges in the Internet of Things. CoRR abs/1604.02980 (2016) - 2015
- [j16]David Kotz, Kevin Fu, Carl A. Gunter, Aviel D. Rubin:
Security for mobile and cloud frontiers in healthcare. Commun. ACM 58(8): 21-23 (2015) - [j15]Xiaolin Xu, Amir Rahmati, Daniel E. Holcomb, Kevin Fu, Wayne P. Burleson:
Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 903-914 (2015) - [c35]Amir Rahmati, Matthew Hicks, Daniel E. Holcomb, Kevin Fu:
Probable cause: the deanonymizing effects of approximate DRAM. ISCA 2015: 604-615 - 2014
- [j14]Edward A. Lee, Björn Hartmann, John Kubiatowicz, Tajana Simunic Rosing, John Wawrzynek, David Wessel, Jan M. Rabaey, Kris Pister, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia, David T. Blaauw, Prabal Dutta, Kevin Fu, Carlos Guestrin, Ben Taskar, Roozbeh Jafari, Douglas L. Jones, Vijay Kumar, Rahul Mangharam, George J. Pappas, Richard M. Murray, Anthony Rowe:
The Swarm at the Edge of the Cloud. IEEE Des. Test 31(3): 8-20 (2014) - [c34]Daniel E. Holcomb, Kevin Fu:
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. CHES 2014: 510-526 - [e3]Kevin Fu, Jaeyeon Jung:
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. USENIX Association 2014 [contents] - [i4]Daniel E. Holcomb, Kevin Fu:
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. IACR Cryptol. ePrint Arch. 2014: 749 (2014) - 2013
- [j13]Kevin Fu, James Blum:
Controlling for cybersecurity risks of medical device software. Commun. ACM 56(10): 35-37 (2013) - [j12]Mastooreh Salajegheh, Yue Wang, Anxiao Jiang, Erik G. Learned-Miller, Kevin Fu:
Half-Wits: Software Techniques for Low-Voltage Probabilistic Storage on Microcontrollers with NOR Flash Memory. ACM Trans. Embed. Comput. Syst. 12(2s): 91:1-91:25 (2013) - [c33]Shane S. Clark, Hossen Asiful Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu:
Current Events: Identifying Webpages by Tapping the Electrical Outlet. ESORICS 2013: 700-717 - [c32]Denis Foo Kune, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu:
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. IEEE Symposium on Security and Privacy 2013: 145-159 - [c31]Shane S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, Kevin Fu:
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. HealthTech 2013 - [e2]Kevin Fu, Darren Lacey, Zachary N. J. Peterson:
2013 USENIX Workshop on Health Information Technologies, HealthTech '13, Washington, DC, USA, August 12, 2013. USENIX Association 2013 [contents] - 2012
- [c30]Wayne P. Burleson, Shane S. Clark, Benjamin Ransford, Kevin Fu:
Design challenges for secure implantable medical devices. DAC 2012: 12-17 - [c29]Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:
Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers. Financial Cryptography 2012: 239-253 - [c28]Daniel E. Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne P. Burleson, Kevin Fu:
DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. RFIDSec 2012: 165-179 - [c27]Shane S. Clark, Benjamin Ransford, Kevin Fu:
Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing. HotSec 2012 - [c26]Amir Rahmati, Mastooreh Salajegheh, Daniel E. Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu:
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks. USENIX Security Symposium 2012: 221-236 - 2011
- [c25]Benjamin Ransford, Jacob Sorber, Kevin Fu:
Mementos: system support for long-running computation on RFID-scale devices. ASPLOS 2011: 159-170 - [c24]Mastooreh Salajegheh, Yue Wang, Kevin Fu, Anxiao Jiang, Erik G. Learned-Miller:
Exploiting Half-Wits: Smarter Storage for Low-Power Devices. FAST 2011: 47-60 - [c23]Shane S. Clark, Kevin Fu:
Recent Results in Computer Security for Medical Devices. MobiHealth 2011: 111-118 - [c22]Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, Kevin Fu:
They can hear your heartbeats: non-invasive security for implantable medical devices. SIGCOMM 2011: 2-13 - [c21]Hong Zhang, Mastooreh Salajegheh, Kevin Fu, Jacob Sorber:
Ekho: bridging the gap between simulation and reality in tiny energy-harvesting sensors. HotPower@SOSP 2011: 9:1-9:5 - [c20]Steve Hanna, Rolf Rolles, Andres Molina-Markham, Pongsin Poosankam, Jeremiah Blocki, Kevin Fu, Dawn Song:
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices. HealthSec 2011 - [i3]Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers. IACR Cryptol. ePrint Arch. 2011: 544 (2011) - 2010
- [c19]Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak Ganesan:
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors. MobiSys 2010: 195-208 - [c18]Andres Molina-Markham, Prashant J. Shenoy, Kevin Fu, Emmanuel Cecchet, David E. Irwin:
Private memoirs of a smart meter. BuildSys@SenSys 2010: 61-66 - [e1]Kevin Fu, Tadayoshi Kohno, Aviel D. Rubin:
1st USENIX Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [j11]Kevin Fu:
Inside risks - Reducing risks of implantable medical devices. Commun. ACM 52(6): 25-27 (2009) - [j10]Daniel E. Holcomb, Wayne P. Burleson, Kevin Fu:
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Trans. Computers 58(9): 1198-1210 (2009) - [c17]Shane S. Clark, Jeremy Gummeson, Kevin Fu, Deepak Ganesan:
Hybrid-powered RFID sensor networks. SenSys 2009: 345-346 - [c16]Mastooreh Salajegheh, Shane S. Clark, Benjamin Ransford, Kevin Fu, Ari Juels:
CCCP: Secure Remote Storage for Computational RFIDs. USENIX Security Symposium 2009: 215-230 - 2008
- [j9]Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, William H. Maisel:
Security and Privacy for Implantable Medical Devices. IEEE Pervasive Comput. 7(1): 30-39 (2008) - [c15]Benjamin Ransford, Shane S. Clark, Mastooreh Salajegheh, Kevin Fu:
Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling. HotPower 2008 - [c14]Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel:
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. SP 2008: 129-142 - [c13]Tamara Denning, Kevin Fu, Tadayoshi Kohno:
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. HotSec 2008 - 2007
- [c12]Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare:
Vulnerabilities in First-Generation RFID-enabled Credit Cards. Financial Cryptography 2007: 2-14 - [c11]Kevin Fu:
Panel: RFID Security and Privacy. Financial Cryptography 2007: 45 - [c10]Benessa Defend, Kevin Fu, Ari Juels:
Cryptanalysis of Two Lightweight RFID Authentication Schemes. PerCom Workshops 2007: 211-216 - 2006
- [j8]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006) - [c9]Kevin Fu, Seny Kamara, Yoshi Kohno:
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. NDSS 2006 - [c8]Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu:
Privacy for Public Transportation. Privacy Enhancing Technologies 2006: 1-19 - [c7]Anthony Bellissimo, John Burgess, Kevin Fu:
Secure Software Updates: Disappointments and New Challenges. HotSec 2006 - 2005
- [b1]Kevin Fu:
Integrity and access control in untrusted content distribution networks. Massachusetts Institute of Technology, Cambridge, MA, USA, 2005 - [c6]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. NDSS 2005 - [i2]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. IACR Cryptol. ePrint Arch. 2005: 28 (2005) - [i1]Kevin Fu, Seny Kamara, Tadayoshi Kohno:
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. IACR Cryptol. ePrint Arch. 2005: 303 (2005) - 2004
- [c5]Michael Kaminsky, Eric Peterson, Daniel B. Giffin, Kevin Fu, David Mazières, M. Frans Kaashoek:
REX: Secure, Extensible Remote Execution. USENIX ATC, General Track 2004: 199-212 - 2003
- [c4]Mahesh Kallahalla, Erik Riedel, Ram Swaminathan, Qian Wang, Kevin Fu:
Plutus: Scalable Secure File Sharing on Untrusted Storage. FAST 2003 - 2002
- [j7]Kevin Fu, M. Frans Kaashoek, David Mazières:
Fast and secure distributed read-only file system. ACM Trans. Comput. Syst. 20(1): 1-24 (2002) - [j6]Kevin Fu, Michael Kaminsky, David Mazières:
Using SFS for a Secure Network File System. login Usenix Mag. 27(6) (2002) - 2001
- [j5]Emil Sit, Kevin Fu:
Web Cookies: Not Just a Privacy Risk. Commun. ACM 44(9): 120 (2001) - [c3]Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster:
The Dos and Don'ts of Client Authentication on the Web. USENIX Security Symposium 2001 - 2000
- [j4]Kevin Fu:
In Memory of David Huffman. ACM Crossroads 6(3) (2000) - [c2]Kevin Fu, M. Frans Kaashoek, David Mazières:
Fast and Secure Distributed Read-Only File System. OSDI 2000: 181-196
1990 – 1999
- 1999
- [j3]Kevin Fu:
RTLinux: an interview with Victor Yodaiken. XRDS 6(1) (1999) - [j2]Kevin Fu:
Introduction: format C. XRDS 6(1): 2 (1999) - 1998
- [j1]Kevin Fu:
Networks and distributed systems: introduction. XRDS 5(2): 2 (1998) - 1997
- [c1]Aviel D. Rubin, Dan Boneh, Kevin Fu:
Revocation of Unread E-mail in an Untrusted Network. ACISP 1997: 62-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint