default search action
Anjia Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Tao Li, Anjia Yang, Jian Weng, Min-Rong Chen, Xizhao Luo, Xiaohu Chen, Changkun Jiang:
Enabling Secure and Flexible Streaming Media With Blockchain Incentive. IEEE Internet Things J. 11(2): 1966-1980 (2024) - [j53]Yuan Chen, Jia-Nan Liu, Anjia Yang, Jian Weng, Min-Rong Chen, Zilin Liu, Ming Li:
PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace. IEEE Internet Things J. 11(8): 13424-13436 (2024) - [j52]Zhengyan Ding, Lu Han, Chao Zhang, Xizhao Luo, Bo Qin, Anjia Yang:
An Identity-Based Strong Designated Verifier Dual-Signature Scheme With Constrained Delegatability. IEEE Internet Things J. 11(10): 17552-17566 (2024) - [j51]Yinuo Chen, Wuzheng Tan, Yijian Zhong, Yulin Kang, Anjia Yang, Jian Weng:
Byzantine-Robust and Privacy-Preserving Federated Learning With Irregular Participants. IEEE Internet Things J. 11(21): 35193-35205 (2024) - [j50]Shuyuan Lin, Anjia Yang, Taotao Lai, Jian Weng, Hanzi Wang:
Multi-Motion Segmentation via Co-Attention-Induced Heterogeneous Model Fitting. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1786-1798 (2024) - [j49]Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin Shen:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 21(1): 353-371 (2024) - [j48]Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. IEEE Trans. Dependable Secur. Comput. 21(2): 961-974 (2024) - [j47]Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li:
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder. IEEE Trans. Dependable Secur. Comput. 21(4): 1785-1800 (2024) - [j46]Lulu Han, Weiqi Luo, Rongxing Lu, Yandong Zheng, Anjia Yang, Junzuo Lai, Yudan Cheng, Yongxin Zhang:
Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data. IEEE Trans. Intell. Transp. Syst. 25(10): 12999-13013 (2024) - [j45]Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin Shen:
PPRP: Preserving Location Privacy for Range-Based Positioning in Mobile Networks. IEEE Trans. Mob. Comput. 23(10): 9451-9468 (2024) - [j44]Axin Wu, Dengguo Feng, Min Zhang, Anjia Yang, Jialin Chi:
Privacy-Preserving Bilateral Multi-Receiver Matching With Revocability for Mobile Social Networks. IEEE Trans. Mob. Comput. 23(12): 11080-11090 (2024) - [j43]Axin Wu, Weiqi Luo, Anjia Yang, Yinghui Zhang, Jianhao Zhu:
Efficient Bilateral Privacy-Preserving Data Collection for Mobile Crowdsensing. IEEE Trans. Serv. Comput. 17(3): 865-877 (2024) - [c13]Huang Zeng, Anjia Yang, Jian Weng, Min-Rong Chen, Fengjun Xiao, Yi Liu, Ye Yao:
Enabling Privacy-Preserving and Publicly Auditable Federated Learning. ICC 2024: 5178-5183 - [i13]Huang Zeng, Anjia Yang, Jian Weng, Min-Rong Chen, Fengjun Xiao, Yi Liu, Ye Yao:
Enabling Privacy-Preserving and Publicly Auditable Federated Learning. CoRR abs/2405.04029 (2024) - [i12]Yu Mao, Xueping Liao, Wei Liu, Anjia Yang:
A Practical and Privacy-Preserving Framework for Real-World Large Language Model Services. CoRR abs/2411.01471 (2024) - 2023
- [j42]Lulu Han, Weiqi Luo, Anjia Yang, Yandong Zheng, Rongxing Lu, Junzuo Lai, Yudan Cheng:
Fully privacy-preserving location recommendation in outsourced environments. Ad Hoc Networks 141: 103077 (2023) - [j41]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Anjia Yang, Xinsheng Wen, Kefei Chen:
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts. IEEE Internet Things J. 10(16): 14269-14284 (2023) - [j40]Yaqing Song, Yuan Zhang, Chunxiang Xu, Shiyu Li, Anjia Yang, Nan Cheng:
Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers. IEEE Internet Things J. 10(17): 15563-15580 (2023) - [j39]Lisha Yao, Jian Weng, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou:
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing. Inf. Sci. 624: 777-795 (2023) - [j38]Axin Wu, Anjia Yang, Weiqi Luo, Jinghang Wen:
Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud. IEEE Trans. Cloud Comput. 11(2): 1886-1898 (2023) - [j37]Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 20(2): 1243-1257 (2023) - [j36]Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. IEEE Trans. Inf. Forensics Secur. 18: 2218-2233 (2023) - [j35]Axin Wu, Weiqi Luo, Jian Weng, Anjia Yang, Jinghang Wen:
Fuzzy Identity-Based Matchmaking Encryption and Its Application. IEEE Trans. Inf. Forensics Secur. 18: 5592-5607 (2023) - [j34]Xiaohu Chen, Anjia Yang, Jian Weng, Yao Tong, Cheng Huang, Tao Li:
A Blockchain-Based Copyright Protection Scheme With Proactive Defense. IEEE Trans. Serv. Comput. 16(4): 2316-2329 (2023) - [j33]Lulu Han, Weiqi Luo, Yaxi Yang, Anjia Yang, Rongxing Lu, Junzuo Lai, Yandong Zheng:
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments. IEEE Trans. Serv. Comput. 16(5): 3564-3577 (2023) - [j32]Tao Li, Anjia Yang, Jian Weng, Yao Tong, Qingfu Pei:
Concurrent and efficient IoT data trading based on probabilistic micropayments. Wirel. Networks 29(2): 607-622 (2023) - [c12]Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. ASIACRYPT (1) 2023: 272-301 - [c11]Cheng Huang, Anjia Yang, Dongxiao Liu, Rongxing Lu, Xuemin Sherman Shen:
Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth. ICCC 2023: 1-6 - [c10]Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu:
Fusion: Efficient and Secure Inference Resilient to Malicious Servers. NDSS 2023 - [i11]Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. IACR Cryptol. ePrint Arch. 2023: 1392 (2023) - 2022
- [j31]Xiaohu Chen, Anjia Yang, Yao Tong, Jian Weng, Jiasi Weng, Tao Li:
A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET. IEEE Internet Things J. 9(22): 23130-23141 (2022) - [j30]Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li, Xiaodong Lin:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(3): 1518-1531 (2022) - [j29]Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang:
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks. IEEE Trans. Dependable Secur. Comput. 19(5): 3183-3199 (2022) - [j28]Jingyi Zhang, Anjia Yang, Qiao Hu, Gerhard Petrus Hancke, Zhe Liu:
Revisiting Error-Correction in Precommitment Distance-Bounding Protocols. IEEE Trans. Ind. Informatics 18(10): 7097-7106 (2022) - [j27]Anjia Yang, Jian Weng, Kan Yang, Cheng Huang, Xuemin Shen:
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(2): 1284-1298 (2022) - [j26]Xizhao Luo, Feng Zhou, Chongben Tao, Anjia Yang, Peiyun Zhang, Yonghua Chen:
Dynamic Multitarget Detection Algorithm of Voxel Point Cloud Fusion Based on PointRCNN. IEEE Trans. Intell. Transp. Syst. 23(11): 20707-20720 (2022) - [i10]Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. CoRR abs/2201.09186 (2022) - [i9]Caiqin Dong, Jian Weng, Yao Tong, Jia-Nan Liu, Anjia Yang, Yudan Cheng, Shun Hu:
Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients. CoRR abs/2205.03040 (2022) - [i8]Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li:
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder. CoRR abs/2210.08418 (2022) - [i7]Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang:
Cross-Domain Identity-based Matchmaking Encryption. IACR Cryptol. ePrint Arch. 2022: 85 (2022) - [i6]Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang:
GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks. IACR Cryptol. ePrint Arch. 2022: 115 (2022) - 2021
- [j25]Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard P. Hancke, Xizhao Luo, Jian Weng, Keith Mayes, Konstantinos Markantonakis:
Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. IEEE Internet Things J. 8(14): 11607-11620 (2021) - [j24]Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert H. Deng:
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. KSII Trans. Internet Inf. Syst. 15(8): 2827-2848 (2021) - [j23]Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans. Cloud Comput. 9(1): 212-225 (2021) - [j22]Qiao Hu, Yuanzhen Liu, Anjia Yang, Gerhard P. Hancke:
Preventing Overshadowing Attacks in Self-Jamming Audio Channels. IEEE Trans. Dependable Secur. Comput. 18(1): 45-57 (2021) - [j21]Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang, Robert H. Deng:
Looking Back! Using Early Versions of Android Apps as Attack Vectors. IEEE Trans. Dependable Secur. Comput. 18(2): 652-666 (2021) - [j20]Xiang Liu, Anjia Yang, Cheng Huang, Yuxian Li, Tao Li, Ming Li:
Decentralized Anonymous Authentication With Fair Billing for Space-Ground Integrated Networks. IEEE Trans. Veh. Technol. 70(8): 7764-7777 (2021) - [c9]Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu:
Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE. ESORICS (2) 2021: 147-168 - [c8]Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen:
Efficient and Fully Secure Lattice-Based IBE with Equality Test. ICICS (2) 2021: 301-318 - [i5]Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu:
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE. IACR Cryptol. ePrint Arch. 2021: 613 (2021) - 2020
- [j19]Wenjie Yang, Jian Weng, Xinyi Huang, Anjia Yang:
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. Comput. J. 63(8): 1139-1147 (2020) - [j18]Yunhui Zhuang, Anjia Yang, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Energy-Efficient Distance-Bounding with Residual Charge Computation. IEEE Trans. Emerg. Top. Comput. 8(2): 365-376 (2020) - [j17]Jia-Nan Liu, Jian Weng, Anjia Yang, Yizhao Chen, Xiaodong Lin:
Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid. IEEE Trans. Smart Grid 11(1): 247-257 (2020) - [c7]Shanshan Li, Chunxiang Xu, Yuan Zhang, Anjia Yang, Xinsheng Wen, Kefei Chen:
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors. Inscrypt 2020: 202-220 - [i4]Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang:
DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks. CoRR abs/2005.08016 (2020) - [i3]Ming Li, Anjia Yang, Xinkai Chen:
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization. IACR Cryptol. ePrint Arch. 2020: 574 (2020)
2010 – 2019
- 2019
- [j16]Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng:
CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing. IEEE Trans. Parallel Distributed Syst. 30(6): 1251-1266 (2019) - [j15]Anjia Yang, Jian Weng, Nan Cheng, Jianbing Ni, Xiaodong Lin, Xuemin Shen:
DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation. IEEE Trans. Veh. Technol. 68(5): 4834-4845 (2019) - [j14]Ming Li, Jian Weng, Anjia Yang, Jia-Nan Liu, Xiaodong Lin:
Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks. IEEE Trans. Veh. Technol. 68(11): 11248-11259 (2019) - [c6]Jingyi Zhang, Anjia Yang, Qiao Hu, Gerhard P. Hancke:
Security Implications of Implementing Multistate Distance-Bounding Protocols. CPS-SPC@CCS 2019: 99-108 - 2018
- [j13]Wenjie Yang, Weiqi Luo, Xizhao Luo, Jian Weng, Anjia Yang:
Fully distributed certificateless threshold signature without random oracles. Sci. China Inf. Sci. 61(9): 098101:1-098101:3 (2018) - [j12]Elena Pagnin, Anjia Yang, Qiao Hu, Gerhard P. Hancke, Aikaterini Mitrokotsa:
HB+DB: Distance bounding meets human based authentication. Future Gener. Comput. Syst. 80: 627-639 (2018) - [j11]Anjia Yang, Yunhui Zhuang, Jian Weng, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models. Future Gener. Comput. Syst. 82: 315-326 (2018) - [j10]Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang:
Notes on a provably-secure certificate-based encryption against malicious CA attacks. Inf. Sci. 463-464: 86-91 (2018) - [j9]Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali A. Ghorbani:
OTP-IoT: An ownership transfer protocol for the Internet of Things. J. Inf. Secur. Appl. 43: 73-82 (2018) - [j8]Jiajie Zhang, Jian Weng, Weiqi Luo, Jia-Nan Liu, Anjia Yang, Jiancheng Lin, Zhijun Zhang, Hailiang Li:
REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks. IEEE Netw. 32(5): 118-123 (2018) - [j7]Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong:
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close. IEEE Trans. Mob. Comput. 17(7): 1723-1736 (2018) - 2017
- [j6]Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen:
Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers. Int. J. Bifurc. Chaos 27(10): 1750155:1-1750155:13 (2017) - [j5]Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang:
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. Secur. Commun. Networks 2017: 5704865:1-5704865:8 (2017) - [j4]Anjia Yang, Xiao Tan, Joonsang Baek, Duncan S. Wong:
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification. IEEE Trans. Serv. Comput. 10(2): 165-175 (2017) - [p1]Anjia Yang, Gerhard P. Hancke:
RFID and Contactless Technology. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 351-385 - [i2]Ming Li, Jian Weng, Anjia Yang, Wei Lu:
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing. IACR Cryptol. ePrint Arch. 2017: 444 (2017) - 2016
- [j3]Qiao Hu, Lavinia Mihaela Dinca, Anjia Yang, Gerhard P. Hancke:
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization. Comput. Networks 105: 224-236 (2016) - [c5]Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight Delegatable Proofs of Storage. ESORICS (1) 2016: 324-343 - 2015
- [j2]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j1]Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Secur. Commun. Networks 8(16): 2836-2849 (2015) - [c4]Elena Pagnin, Anjia Yang, Gerhard P. Hancke, Aikaterini Mitrokotsa:
HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding. WISEC 2015: 3:1-3:6 - 2014
- [i1]Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage. IACR Cryptol. ePrint Arch. 2014: 395 (2014) - 2013
- [c3]Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie:
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation. NSS 2013: 451-464 - [c2]Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang:
A New Unpredictability-Based RFID Privacy Model. NSS 2013: 479-492 - 2012
- [c1]Anjia Yang, Yunhui Zhuang, Duncan S. Wong:
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy. ICICS 2012: 285-292
Coauthor Index
aka: Gerhard Petrus Hancke
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint