default search action
Benedetta Tondi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Omran Alamayreh, Carmelo Fascella, Sara Mandelli, Benedetta Tondi, Paolo Bestagini, Mauro Barni:
Just Dance: detection of human body reenactment fake videos. EURASIP J. Image Video Process. 2024(1): 21 (2024) - [j28]Lydia Abady, Jun Wang, Benedetta Tondi, Mauro Barni:
A siamese-based verification system for open-set architecture attribution of synthetic images. Pattern Recognit. Lett. 180: 75-81 (2024) - [j27]Wei Guo, Benedetta Tondi, Mauro Barni:
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis. IEEE Trans. Inf. Forensics Secur. 19: 970-984 (2024) - [j26]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs. IEEE Trans. Inf. Forensics Secur. 19: 8322-8337 (2024) - [j25]Kaiqing Lin, Bin Li, Weixiang Li, Mauro Barni, Benedetta Tondi, Xulong Liu:
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment. IEEE Trans. Inf. Forensics Secur. 19: 9390-9405 (2024) - [c38]Nischay Purnekar, Lydia Abady, Benedetta Tondi, Mauro Barni:
Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation. IH&MMSec 2024: 65-73 - [i40]Benedetta Tondi, Wei Guo, Mauro Barni:
JMA: a General Algorithm to Craft Nearly Optimal Targeted Adversarial Example. CoRR abs/2401.01199 (2024) - [i39]Jun Wang, Benedetta Tondi, Mauro Barni:
BOSC: A Backdoor-based Framework for Open Set Synthetic Image Attribution. CoRR abs/2405.11491 (2024) - [i38]Dongdong Lin, Yue Li, Benedetta Tondi, Bin Li, Mauro Barni:
An Efficient Watermarking Method for Latent Diffusion Models via Low-Rank Adaptation. CoRR abs/2410.20202 (2024) - 2023
- [j24]Wei Guo, Benedetta Tondi, Mauro Barni:
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection. IEEE Trans. Dependable Secur. Comput. 20(6): 4752-4762 (2023) - [c37]Jun Wang, Omran Alamayreh, Benedetta Tondi, Mauro Barni:
Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture. CVPR Workshops 2023: 953-962 - [c36]Omran Alamayreh, Jun Wang, Giovanna Maria Dimitri, Benedetta Tondi, Mauro Barni:
A Siamese Based System for City Verification. ECAI 2023: 69-76 - [c35]Omran Alamayreh, Giovanna Maria Dimitri, Jun Wang, Benedetta Tondi, Mauro Barni:
Which Country is This Picture From? New Data and Methods For Dnn-Based Country Recognition. ICASSP 2023: 1-5 - [c34]Jun Wang, Benedetta Tondi, Mauro Barni:
Classification of Synthetic Facial Attributes by Means of Hybrid Classification/Localization Patch-Based Analysis. ICASSP 2023: 1-5 - [c33]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Robust Retraining-free GAN Fingerprinting via Personalized Normalization. WIFS 2023: 1-6 - [i37]Wei Guo, Benedetta Tondi, Mauro Barni:
Universal Detection of Backdoor Attacks via Density-based Clustering and Centroids Analysis. CoRR abs/2301.04554 (2023) - [i36]Jun Wang, Omran Alamayreh, Benedetta Tondi, Mauro Barni:
Open Set Classification of GAN-based Image Manipulations via a ViT-based Hybrid Architecture. CoRR abs/2304.05212 (2023) - [i35]Lydia Abady, Jun Wang, Benedetta Tondi, Mauro Barni:
A Siamese-based Verification System for Open-set Architecture Attribution of Synthetic Images. CoRR abs/2307.09822 (2023) - [i34]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs. CoRR abs/2310.16919 (2023) - [i33]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Robust Retraining-free GAN Fingerprinting via Personalized Normalization. CoRR abs/2311.05478 (2023) - 2022
- [c32]Dongdong Lin, Benedetta Tondi, Bin Li, Mauro Barni:
Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors. IJCB 2022: 1-8 - [c31]Jun Wang, Omran Alamayreh, Benedetta Tondi, Mauro Barni:
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities. IVMSP 2022: 1-5 - [c30]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Supervised GAN Watermarking for Intellectual Property Protection. WIFS 2022: 1-6 - [e1]B. S. Manjunath, Jan Butora, Benedetta Tondi, Claus Vielhauer:
IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022. ACM 2022, ISBN 978-1-4503-9355-3 [contents] - [i32]Jun Wang, Omran Alamayreh, Benedetta Tondi, Mauro Barni:
An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities. CoRR abs/2205.07073 (2022) - [i31]Wei Guo, Benedetta Tondi, Mauro Barni:
A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection. CoRR abs/2206.01102 (2022) - [i30]Benedetta Tondi, Andrea Costanzo, Mauro Barni:
Robust DNN Watermarking via Fixed Embedding Weights with Optimized Distribution. CoRR abs/2208.10973 (2022) - [i29]Omran Alamayreh, Giovanna Maria Dimitri, Jun Wang, Benedetta Tondi, Mauro Barni:
Which country is this picture from? New data and methods for DNN-based country recognition. CoRR abs/2209.02429 (2022) - [i28]Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Supervised GAN Watermarking for Intellectual Property Protection. CoRR abs/2209.03466 (2022) - [i27]Lydia Abady, Edoardo Daniele Cannas, Paolo Bestagini, Benedetta Tondi, Stefano Tubaro, Mauro Barni:
An Overview on the Generation and Detection of Synthetic and Manipulated Satellite Images. CoRR abs/2209.08984 (2022) - 2021
- [b1]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
Information Fusion in Distributed Sensor Networks with Byzantines. Springer 2021, ISBN 978-981-32-9000-6, pp. 1-104 - [j23]Benedetta Tondi, Andrea Costanzo, Dequ Huang, Bin Li:
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture. EURASIP J. Inf. Secur. 2021(1): 5 (2021) - [j22]Yue Li, Benedetta Tondi, Mauro Barni:
Spread-Transform Dither Modulation Watermarking of Deep Neural Network. J. Inf. Secur. Appl. 63: 103004 (2021) - [j21]Wei Guo, Benedetta Tondi, Mauro Barni:
A Master Key backdoor for universal impersonation attack against DNN-based face verification. Pattern Recognit. Lett. 144: 61-67 (2021) - [j20]Mauro Barni, Quoc-Tin Phan, Benedetta Tondi:
Copy Move Source-Target Disambiguation Through Multi-Branch CNNs. IEEE Trans. Inf. Forensics Secur. 16: 1825-1840 (2021) - [j19]Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni:
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering. IEEE Trans. Inf. Forensics Secur. 16: 5397-5412 (2021) - [c29]Mauro Barni, Fernando Pérez-González, Benedetta Tondi:
DNN Watermarking: Four Challenges and a Funeral. IH&MMSec 2021: 189-196 - [c28]Wei Guo, Benedetta Tondi, Mauro Barni:
MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification. IWDW 2021: 178-193 - [i26]Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni:
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering. CoRR abs/2102.01439 (2021) - [i25]Wei Guo, Benedetta Tondi, Mauro Barni:
A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification. CoRR abs/2105.00249 (2021) - [i24]Wei Guo, Benedetta Tondi, Mauro Barni:
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences. CoRR abs/2111.08429 (2021) - 2020
- [j18]Bowen Zhang, Benedetta Tondi, Mauro Barni:
Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability. Comput. Vis. Image Underst. 197-198: 102988 (2020) - [j17]Mauro Barni, Benedetta Tondi:
Theoretical Foundations of Adversarial Binary Detection. Found. Trends Commun. Inf. Theory 18(1): 1-172 (2020) - [j16]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi:
Improving the security of image manipulation detection through one-and-a-half-class multiple classification. Multim. Tools Appl. 79(3-4): 2383-2408 (2020) - [j15]Bowen Zhang, Benedetta Tondi, Xixiang Lv, Mauro Barni:
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes. Secur. Commun. Networks 2020: 8882494:1-8882494:11 (2020) - [j14]Xiaoyu Shi, Benedetta Tondi, Bin Li, Mauro Barni:
CNN-based steganalysis and parametric adversarial embedding: A game-theoretic framework. Signal Process. Image Commun. 89: 115992 (2020) - [j13]Yakun Niu, Benedetta Tondi, Yao Zhao, Mauro Barni:
Primary Quantization Matrix Estimation of Double Compressed JPEG Images via CNN. IEEE Signal Process. Lett. 27: 191-195 (2020) - [c27]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi, Bowen Zhang:
Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples. ICASSP 2020: 2977-2981 - [c26]Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni:
Increased-Confidence Adversarial Examples for Deep Learning Counter-Forensics. ICPR Workshops (6) 2020: 411-424 - [c25]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis. WIFS 2020: 1-6 - [i23]Bowen Zhang, Benedetta Tondi, Mauro Barni:
On the adversarial robustness of DNNs based on error correcting output codes. CoRR abs/2003.11855 (2020) - [i22]Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni:
Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks. CoRR abs/2005.06023 (2020) - [i21]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis. CoRR abs/2007.12909 (2020) - [i20]Benedetta Tondi, Andrea Costanzo, Dequ Huang, Bin Li:
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture. CoRR abs/2012.00468 (2020) - [i19]Yue Li, Benedetta Tondi, Mauro Barni:
Spread-Transform Dither Modulation Watermarking of Deep Neural Network. CoRR abs/2012.14171 (2020)
2010 – 2019
- 2019
- [j12]Benedetta Tondi, Neri Merhav, Mauro Barni:
Detection Games under Fully Active Adversaries. Entropy 21(1): 23 (2019) - [j11]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
Secure Detection of Image Manipulation by Means of Random Feature Selection. IEEE Trans. Inf. Forensics Secur. 14(9): 2454-2469 (2019) - [c24]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
On the Transferability of Adversarial Examples against CNN-based Image Forensics. ICASSP 2019: 8286-8290 - [c23]Mauro Barni, Kassem Kallas, Benedetta Tondi:
A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning. ICIP 2019: 101-105 - [c22]Abhir Bhalerao, Kassem Kallas, Benedetta Tondi, Mauro Barni:
Luminance-based video backdoor attack against anti-spoofing rebroadcast detection. MMSP 2019: 1-6 - [c21]Mauro Barni, Dequ Huang, Bin Li, Benedetta Tondi:
Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach. WIFS 2019: 1-6 - [i18]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi:
Improving the Security of Image Manipulation Detection through One-and-a-half-class Multiple Classification. CoRR abs/1902.08446 (2019) - [i17]Mauro Barni, Kassem Kallas, Benedetta Tondi:
A new Backdoor Attack in CNNs by training set corruption without label poisoning. CoRR abs/1902.11237 (2019) - [i16]Xiaoyu Shi, Benedetta Tondi, Bin Li, Mauro Barni:
CNN-based Steganalysis and Parametric Adversarial Embedding: a Game-Theoretic Framework. CoRR abs/1906.00697 (2019) - [i15]Bowen Zhang, Benedetta Tondi, Mauro Barni:
Attacking CNN-based anti-spoofing face authentication in the physical domain. CoRR abs/1910.00327 (2019) - [i14]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi, Bowen Zhang:
Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples. CoRR abs/1910.12392 (2019) - [i13]Mauro Barni, Quoc-Tin Phan, Benedetta Tondi:
Copy Move Source-Target Disambiguation through Multi-Branch CNNs. CoRR abs/1912.12640 (2019) - 2018
- [j10]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
A message passing approach for decision fusion in adversarial multi-sensor networks. Inf. Fusion 40: 101-111 (2018) - [j9]Mauro Barni, Hector Santoyo-Garcia, Benedetta Tondi:
An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack. IEEE Signal Process. Lett. 25(10): 1435-1439 (2018) - [j8]Mauro Barni, Benedetta Tondi:
Adversarial Source Identification Game With Corrupted Training. IEEE Trans. Inf. Theory 64(5): 3894-3915 (2018) - [c20]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach. APSIPA 2018: 1160-1167 - [c19]Mauro Barni, Matthew C. Stamm, Benedetta Tondi:
Adversarial Multimedia Forensics: Overview and Challenges Ahead. EUSIPCO 2018: 962-966 - [c18]Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi:
Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing. ICIP 2018: 3803-3807 - [c17]Mauro Barni, Ehsan Nowroozi, Benedetta Tondi:
Detection of adaptive histogram equalization robust against JPEG compression. IWBF 2018: 1-8 - [c16]Mauro Barni, Mariko Nakano-Miyatake, Hector Santoyo-Garcia, Benedetta Tondi:
Countering the Pooled Triangle Test for PRNU-based camera identification. WIFS 2018: 1-8 - [i12]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
Secure Detection of Image Manipulation by means of Random Feature Selection. CoRR abs/1802.00573 (2018) - [i11]Benedetta Tondi, Neri Merhav, Mauro Barni:
Detection Games Under Fully Active Adversaries. CoRR abs/1802.02850 (2018) - [i10]Mauro Barni, Hector Santoyo-Garcia, Benedetta Tondi:
An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack. CoRR abs/1805.02899 (2018) - [i9]Mauro Barni, Andrea Costanzo, Ehsan Nowroozi, Benedetta Tondi:
CNN-Based Detection of Generic Constrast Adjustment with JPEG Post-processing. CoRR abs/1805.11318 (2018) - [i8]Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi:
On the Transferability of Adversarial Examples Against CNN-Based Image Forensics. CoRR abs/1811.01629 (2018) - 2017
- [j7]Mauro Barni, Luca Bondi, Nicolò Bonettini, Paolo Bestagini, Andrea Costanzo, Marco Maggini, Benedetta Tondi, Stefano Tubaro:
Aligned and non-aligned double JPEG detection using convolutional neural networks. J. Vis. Commun. Image Represent. 49: 153-163 (2017) - [j6]Benedetta Tondi, Pedro Comesaña Alfaro, Fernando Pérez-González, Mauro Barni:
Smart Detection of Line-Search Oracle Attacks. IEEE Trans. Inf. Forensics Secur. 12(3): 588-603 (2017) - [c15]Mauro Bami, Ehsan Nowroozi, Benedetta Tondi:
Higher-order, adversary-aware, double JPEG-detection via selected training on attacked samples. EUSIPCO 2017: 281-285 - [c14]Mauro Barni, Benedetta Tondi:
Threat Models and Games for Adversarial Multimedia Forensics. MFSec@ICMR 2017: 11-15 - [c13]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
A gradient-based pixel-domain attack against SVM detection of global image manipulations. WIFS 2017: 1-6 - [i7]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor Networks. CoRR abs/1702.08357 (2017) - [i6]Mauro Barni, Benedetta Tondi:
Adversarial Source Identification Game with Corrupted Training. CoRR abs/1703.09244 (2017) - [i5]Mauro Barni, Luca Bondi, Nicolò Bonettini, Paolo Bestagini, Andrea Costanzo, Marco Maggini, Benedetta Tondi, Stefano Tubaro:
Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks. CoRR abs/1708.00930 (2017) - 2016
- [j5]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines. IEEE Trans. Inf. Forensics Secur. 11(6): 1333-1345 (2016) - [j4]Mauro Barni, Benedetta Tondi:
Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective. IEEE Trans. Inf. Forensics Secur. 11(10): 2145-2159 (2016) - [c12]Kassem Kallas, Benedetta Tondi, Riccardo Lazzeretti, Mauro Barni:
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach. GameSec 2016: 455-466 - [c11]Mauro Barni, Zhipeng Chen, Benedetta Tondi:
Adversary-aware, data-driven detection of double JPEG compression: How to make counter-forensics harder. WIFS 2016: 1-6 - 2015
- [c10]Benedetta Tondi, Pedro Comesaña Alfaro, Fernando Pérez-González, Mauro Barni:
On the effectiveness of meta-detection for countering oracle attacks in watermarking. WIFS 2015: 1-6 - [c9]Benedetta Tondi, Mauro Barni, Neri Merhav:
Detection games with a fully active attacker. WIFS 2015: 1-6 - [i4]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks. CoRR abs/1503.05829 (2015) - [i3]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines. CoRR abs/1507.00400 (2015) - 2014
- [j3]Mauro Barni, Benedetta Tondi:
Binary Hypothesis Testing Game With Training Data. IEEE Trans. Inf. Theory 60(8): 4848-4866 (2014) - [c8]Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi:
Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach. CDC 2014: 505-510 - [c7]Mauro Barni, Marco Fontani, Benedetta Tondi:
Universal Counterforensics of Multiple Compressed JPEG Images. IWDW 2014: 31-46 - [c6]Mauro Barni, Pedro Comesaña Alfaro, Fernando Pérez-González, Benedetta Tondi:
Are you threatening me?: Towards smart detectors in watermarking. Media Watermarking, Security, and Forensics 2014: 902806 - [c5]Mauro Barni, Benedetta Tondi:
Source distinguishability under corrupted training. WIFS 2014: 197-202 - [i2]Mauro Barni, Benedetta Tondi:
Source Distinguishability under Distortion-Limited Attack: an Optimal Transport Perspective. CoRR abs/1407.3704 (2014) - 2013
- [j2]Mauro Barni, Marco Fontani, Benedetta Tondi:
A Universal Attack Against Histogram-Based Image Forensics. Int. J. Digit. Crime Forensics 5(3): 35-52 (2013) - [j1]Mauro Barni, Benedetta Tondi:
The Source Identification Game: An Information-Theoretic Perspective. IEEE Trans. Inf. Forensics Secur. 8(3): 450-463 (2013) - [c4]Mauro Barni, Benedetta Tondi:
The Security Margin: A measure of source distinguishability under adversarial conditions. GlobalSIP 2013: 225-228 - [c3]Mauro Barni, Benedetta Tondi:
Multiple-observation hypothesis testing under adversarial conditions. WIFS 2013: 91-96 - [i1]Mauro Barni, Benedetta Tondi:
Binary Hypothesis Testing Game with Training Data. CoRR abs/1304.2172 (2013) - 2012
- [c2]Mauro Barni, Marco Fontani, Benedetta Tondi:
A universal technique to hide traces of histogram-based image manipulations. MM&Sec 2012: 97-104 - [c1]Mauro Barni, Benedetta Tondi:
Optimum forensic and counter-forensic strategies for source identification with training data. WIFS 2012: 199-204
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint