


default search action
Hahn-Ming Lee
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j34]Gao-Yu Lin
, Po-Yuan Wang
, Shin-Ming Cheng
, Hahn-Ming Lee
:
Improving Robustness in IoT Malware Detection through Execution Order Analysis. ACM Trans. Embed. Comput. Syst. 24(1): 4:1-4:17 (2025) - 2023
- [c65]Gao-Yu Lin, Shin-Ming Cheng, Hahn-Ming Lee:
A Framework for Robustness Evaluation in AI-Based Malware Detectors. ICCE-Taiwan 2023: 287-288
2010 – 2019
- 2019
- [j33]Te-En Wei, Hahn-Ming Lee, Albert B. Jeng, Hemank Lamba, Christos Faloutsos:
WebHound: a data-driven intrusion detection from real-world web access logs. Soft Comput. 23(22): 11947-11965 (2019) - [c64]Chia-Yu Huang, Hahn-Ming Lee, Jiunn-Chin Wang, Ching-Hao Mao:
Identifying HID-based attacks through process event graph using guilt-by-association analysis. ICCSP 2019: 273-278 - 2018
- [j32]Fu-Yuan Hsu
, Hahn-Ming Lee, Tao-Hsing Chang, Yao-Ting Sung:
Automated estimation of item difficulty for multiple-choice tests: An application of word embedding techniques. Inf. Process. Manag. 54(6): 969-984 (2018) - [c63]Chia-Min Lai, Bo-Ching Huang, Shin-Ying Huang, Ching-Hao Mao, Hahn-Ming Lee:
Detection of DNS Tunneling by Feature-Free Mechanism. DSC 2018: 1-2 - [c62]Chia-Min Lai, Chia-Yu Lu, Hahn-Ming Lee:
Implementation of adversarial scenario to malware analytic. ICMLSC 2018: 127-132 - 2017
- [c61]Tzu-Hsien Chuang, Shin-Ying Huang, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee:
Ziffersystem: A novel malware distribution detection system. DSC 2017: 509-515 - 2016
- [c60]Han-Chao Lee
, Shin-Ming Cheng, Kuo-Ping Wu, Hahn-Ming Lee:
A responsive probing approach to detect dynamic intrusion in a MANET. IISA 2016: 1-6 - 2015
- [j31]Ismail Adel Al-Taharwa
, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho, Shyi-Ming Chen
:
JSOD: JavaScript obfuscation detector. Secur. Commun. Networks 8(6): 1092-1107 (2015) - [c59]Ru Ko, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei:
Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking. ICITCS 2015: 1-7 - [c58]Ismail Adel Al-Taharwa
, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, Shyi-Ming Chen:
Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction. TrustCom/BigDataSE/ISPA (1) 2015: 334-343 - [c57]Yen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei:
DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps. TrustCom/BigDataSE/ISPA (1) 2015: 1014-1021 - 2014
- [j30]Kuo-Ping Wu, Yung-Piao Wu, Hahn-Ming Lee:
Stock Trend Prediction by Using K-Means and AprioriAll Algorithm for Sequential Chart Pattern Mining. J. Inf. Sci. Eng. 30(3): 669-686 (2014) - [c56]Pei-Chen Yeh, Hahn-Ming Lee, Hsiao-Rong Tyan, Kuo-Ping Wu:
Heap Spraying Revelation: Heap-spraying Detection based on Minimal Length Sequence and Argument Analysis. ICS 2014: 811-820 - [c55]Pei-Chi Chen, Hahn-Ming Lee, Hsiao-Rong Tyan, Jain-Shing Wu, Te-En Wei:
Detecting Spam on Twitter via Message-Passing Based on Retweet-Relation. TAAI 2014: 56-65 - 2013
- [j29]Chia-Chen Tan, Chih-Ming Chen, Hahn-Ming Lee:
Using a Paper-based Digital Pen for Supporting English Courses in Regular Classrooms to Improve Reading Fluency. Int. J. Humanit. Arts Comput. 7(Supplement): 234-246 (2013) - [c54]Ke-Wei Su, Kuo-Ping Wu, Hahn-Ming Lee, Te-En Wei:
Suspicious URL Filtering Based on Logistic Regression with Multi-view Analysis. AsiaJCIS 2013: 77-84 - [c53]Horng-Tzer Wang, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee:
Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison. COMPSAC 2013: 349-358 - [c52]Rinardi B. Sarean, Albert B. Jeng, Hahn-Ming Lee:
Larbac: enforcement of location constraints for location-aware RBAC system in mobile environment. ICMLC 2013: 1195-1200 - [c51]Quan-Bin Ye, Te-En Wei, Albert B. Jeng, Hahn-Ming Lee, Kuo-Ping Wu:
DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks. TAAI 2013: 158-163 - 2012
- [j28]William Cheng-Chung Chu, Chao-Tung Yang
, Chih-Wei Lu, Chih-Hung Chang
, Juei-Nan Chen, Pao-Ann Hsiung
, Hahn-Ming Lee:
Cloud Computing in Taiwan. Computer 45(6): 48-56 (2012) - [j27]Hsing-Kuo Pao, Ching-Hao Mao, Hahn-Ming Lee, Chi-Dong Chen, Christos Faloutsos:
An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection. J. Inf. Sci. Eng. 28(2): 243-262 (2012) - [c50]Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu:
DroidMat: Android Malware Detection through Manifest and API Calls Tracing. AsiaJCIS 2012: 62-69 - [c49]Horng-Tzer Wang, Ching-Hao Mao, Kuo-Ping Wu, Hahn-Ming Lee:
Real-Time Fast-Flux Identification via Localized Spatial Geolocation Detection. COMPSAC 2012: 244-252 - [c48]Szu-Yu Lin, Te-En Wei, Hahn-Ming Lee, Albert B. Jeng, Chien-Tsung Liu:
A novel approach for re-authentication protocol using personalized information. ICMLC 2012: 1826-1829 - [c47]Te-En Wei, Albert B. Jeng, Hahn-Ming Lee, Chih-How Chen, Chin-Wei Tien:
Android privacy. ICMLC 2012: 1830-1837 - [c46]Te-En Wei, Albert B. Jeng, Hahn-Ming Lee:
GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack. IPCCC 2012: 392-399 - [c45]Yung-Piao Wu, Kuo-Ping Wu, Hahn-Ming Lee:
Stock Trend Prediction by Sequential Chart Pattern via K-Means and AprioriAll Algorithm. TAAI 2012: 176-181 - [c44]Te-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu:
Android Malware Detection via a Latent Network Behavior Analysis. TrustCom 2012: 1251-1258 - [c43]Ismail Adel Al-Taharwa
, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen:
RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. TrustCom 2012: 1370-1375 - [c42]Jen-Ming Chung, Ya-Huei Lin, Hahn-Ming Lee, Jan-Ming Ho:
Mining Publication Records on Personal Publication Web Pages Based on Conditional Random Fields. Web Intelligence 2012: 319-326 - 2011
- [j26]Ching-Hao Mao, Hahn-Ming Lee, Che-Fu Yeh:
Adaptive e-mails intention finding system based on words social networks. J. Netw. Comput. Appl. 34(5): 1615-1622 (2011) - [c41]Cheng-Yu Lu, Shou-Wei Ho, Jen-Ming Chung, Fu-Yuan Hsu, Hahn-Ming Lee, Jan-Ming Ho:
Mining Fuzzy Domain Ontology Based on Concept Vector from Wikipedia Category Network. Web Intelligence/IAT Workshops 2011: 249-252 - [c40]Hong-Jhe Li, Chia-Wei Tien, Chin-Wei Tien, Chih-Hung Lin, Hahn-Ming Lee, Albert B. Jeng:
AOS: An optimized sandbox method used in behavior-based malware detection. ICMLC 2011: 404-409 - [c39]Albert B. Jeng, Li-Chung Chang, Hahn-Ming Lee, Te-En Wei, Szu-Yu Lin:
How to solve collision and authentication issues using RFID protocol technology. ICMLC 2011: 454-460 - [c38]Te-En Wei, Zhi-Wei Chen, Chin-Wei Tien, Jain-Shing Wu, Hahn-Ming Lee, Albert B. Jeng:
RePEF - A system for Restoring Packed Executable File for malware analysis. ICMLC 2011: 519-527 - [c37]Jen-Ming Chung, Fu-Yuan Hsu, Cheng-Yu Lu, Hahn-Ming Lee, Jan-Ming Ho:
Automatic English-Chinese name translation by using Web-Mining and phonetic similarity. IRI 2011: 283-287 - [c36]Chiung-Yi Wu, Kuo-Ping Wu, Jason Shih, Hahn-Ming Lee:
VoIPS: VoIP Secure Encryption VoIP Solution. SUComS 2011: 84-93 - [c35]Chi-Jen Wu
, Jen-Ming Chung, Cheng-Yu Lu, Hahn-Ming Lee, Jan-Ming Ho:
Using Web-Mining for Academic Measurement and Scholar Recommendation in Expert Finding System. Web Intelligence 2011: 288-291 - 2010
- [c34]Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee:
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. AsiaCCS 2010: 101-111 - [c33]Tao-Hsing Chang, Fu-Yuan Hsu, Chia-Hoang Lee, Hahn-Ming Lee:
Part-of-speech tagging for Chinese unknown words in a domain-specific small corpus using morphological and contextual rules. NLPKE 2010: 1-6 - [c32]Ching-Hao Mao, Hsing-Kuo Pao, Christos Faloutsos
, Hahn-Ming Lee:
SBAD: Sequence Based Attack Detection via Sequence Comparison. PSDML 2010: 78-91 - [c31]Yi-Hsun Wang, Ching-Hao Mao, Hahn-Ming Lee:
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks. TAV-WEB 2010: 15-26
2000 – 2009
- 2009
- [j25]Chih-Ming Chen
, Hahn-Ming Lee, Yu-Jung Chang:
Two novel feature selection approaches for web page classification. Expert Syst. Appl. 36(1): 260-272 (2009) - [j24]Chia-Hsin Huang, Tyng-Ruey Chuang
, Dong-Po Deng
, Hahn-Ming Lee:
Building GML-native web-based geographic information systems. Comput. Geosci. 35(9): 1802-1816 (2009) - [c30]Wei-Yi Yu, Hahn-Ming Lee:
An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods. PAISI 2009: 155-160 - [c29]Ching-Hao Mao, Hahn-Ming Lee, Devi Parikh, Tsuhan Chen
, Si-Yu Huang:
Semi-supervised co-training and active learning based approach for multi-view intrusion detection. SAC 2009: 2042-2048 - [c28]Kai-Hsiang Yang, Tai-Liang Kuo, Hahn-Ming Lee, Jan-Ming Ho:
A Reviewer Recommendation System Based on Collaborative Intelligence. Web Intelligence 2009: 564-567 - 2008
- [c27]Kai-Hsiang Yang, Hsin-Tsung Peng, Jian-Yi Jiang, Hahn-Ming Lee, Jan-Ming Ho:
Author Name Disambiguation for Citations Using Topic and Web Correlation. ECDL 2008: 185-196 - [c26]Kai-Hsiang Yang, Chun-Yu Chen, Hahn-Ming Lee, Jan-Ming Ho:
EFS: Expert Finding System based on Wikipedia link pattern analysis. SMC 2008: 631-635 - 2007
- [j23]Hahn-Ming Lee, Chi-Chun Huang, Wei-Tang Hung:
Mining Navigation Behaviors for Term Suggestion of Search Engines. J. Inf. Sci. Eng. 23(2): 387-401 (2007) - [j22]Hahn-Ming Lee, Chi-Chun Huang, Chun-Yen Chao:
Association Thesaurus Construction for Interactive Query Expansion Based on Association Rule Mining. J. Inf. Sci. Eng. 23(2): 617-627 (2007) - [c25]Kai-Hsiang Yang, Wei-Da Chen, Hahn-Ming Lee, Jan-Ming Ho:
Mining Translations of Chinese Names from Web Corpora Using a Query Expansion Technique and Support Vector Machine. Web Intelligence/IAT Workshops 2007: 530-533 - [c24]Che-Fu Yeh, Ching-Hao Mao, Hahn-Ming Lee, Tsuhan Chen
:
Adaptive e-mail intention finding mechanism based on e-mail words social networks. LSAD@SIGCOMM 2007: 113-120 - 2006
- [j21]Chi-Chun Huang, Hahn-Ming Lee:
An instance-based learning approach based on grey relational structure. Appl. Intell. 25(3): 243-251 (2006) - [j20]Chih-Ming Chen
, Hahn-Ming Lee, Chia-Chen Tan:
An intelligent web-page classifier with fair feature-subset selection. Eng. Appl. Artif. Intell. 19(8): 967-978 (2006) - [c23]Guo-Hsing Lee, Nai-Yu Chuang, Wen-Dar Lin, Chung-Der Hsiao
, Hahn-Ming Lee, Jan-Ming Ho:
E2D: A Novel Tool for Annotating Protein Domains in Expressed Sequence Tags. CIBCB 2006: 1-6 - [c22]Chia-Hsin Huang, Tyng-Ruey Chuang, Dong-Po Deng, Hahn-Ming Lee:
Efficient GML-native processors for web-based GIS: techniques and tools. GIS 2006: 91-98 - [c21]Ching-Hao Mao, Ta-Wei Hung, Jan-Ming Ho, Hahn-Ming Lee:
Semantic Similarity Measurement of Chinese Financial News Titles Based on Event Frame Extracting. ICEBE 2006: 229-236 - [c20]Ming-Yu Lee, Chiung-Wei Huang, Hahn-Ming Lee:
Associating Expertized Information to Alleviate Sparsity Problem in Personalization. ICEBE 2006: 479-482 - [c19]Chia-Hsin Huang, Po-Yi Yen, Yi-Chan Hung, Tyng-Ruey Chuang
, Hahn-Ming Lee:
Enhancing Entropy-based Informative Block Identification Using Block Preclustering Technology. SMC 2006: 2640-2645 - [c18]Chiung-Wei Huang, Ching-Chung Yu, Ching-Hao Mao, Hahn-Ming Lee:
Network Motif Model: An Efficient Approach for Extracting Features from Relational Data. SMC 2006: 5141-5146 - [c17]Chia-Hsin Huang, Tyng-Ruey Chuang, James J. Lu, Hahn-Ming Lee:
XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques. VLDB 2006: 1215-1218 - [c16]Kai-Hsiang Yang, Kun-Yan Chiou, Hahn-Ming Lee, Jan-Ming Ho:
Web Appearance Disambiguation of Personal Names Based on Network Motif. Web Intelligence 2006: 386-389 - 2005
- [j19]Hahn-Ming Lee, Chi-Chun Huang, Tzu-Ting Kao:
Personalized Course Navigation Based on Grey Relational Analysis. Appl. Intell. 22(2): 83-92 (2005) - [j18]Chih-Ming Chen
, Hahn-Ming Lee, Cheng-Wei Hwang:
A Hierarchical Neural Network Document Classifier with Linguistic Feature Selection. Appl. Intell. 23(3): 277-294 (2005) - [j17]Chih-Ming Chen
, Hahn-Ming Lee, Ya-Hui Chen:
Personalized e-learning system using Item Response Theory. Comput. Educ. 44(3): 237-255 (2005) - [c15]Chia-Hsin Huang, Tyng-Ruey Chuang, Hahn-Ming Lee:
Prefiltering techniques for efficient XML document processing. ACM Symposium on Document Engineering 2005: 149-158 - [c14]Hsin-Tsung Peng, Hahn-Ming Lee, Jan-Ming Ho:
Trading Decision Maker: Stock Trading Decision by Price Series Smoothing and Tendency Transition Inference. EEE 2005: 359-362 - 2004
- [j16]Chi-Chun Huang, Hahn-Ming Lee:
A Grey-Based Nearest Neighbor Approach for Missing Attribute Value Prediction. Appl. Intell. 20(3): 239-252 (2004) - [c13]Chia-Hsin Huang, Tyng-Ruey Chuang, Hahn-Ming Lee:
Fast structural query with application to chinese treebank sentence retrieval. ACM Symposium on Document Engineering 2004: 11-20 - [c12]Po-Hsiang Wang, Jung-Ying Wang, Hahn-Ming Lee:
QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement. EEE 2004: 299-304 - [c11]Peng-Wei Chen, Jung-Ying Wang, Hahn-Ming Lee:
Model selection of SVMs using GA approach. IJCNN 2004: 2035-2040 - [c10]Chin-Ming Chen, Hahn-Ming Lee, Ming-Tyan Kao:
Multi-class SVM with negative data selection for Web page classification. IJCNN 2004: 2047-2052 - 2003
- [j15]Hahn-Ming Lee, Chih-Ming Chen
, Yung-Feng Lu:
A self-organizing HCMAC neural-network classifier. IEEE Trans. Neural Networks 14(1): 15-27 (2003) - [c9]Chi-Chun Huang, Hahn-Ming Lee:
A Novel Partial-Memory Learning Algorithm Based on Grey Relational Structure. IDA 2003: 68-75 - 2002
- [j14]Chih-Ming Chen
, Hahn-Ming Lee:
An Efficient Gradient Forecasting Search Method Utilizing the Discrete Difference Equation Prediction Model. Appl. Intell. 16(1): 43-58 (2002) - [j13]Hahn-Ming Lee, Jyh-Ming Chen, Chun-Lin Liu:
Inconsistency Resolution and Rule Insertion for Fuzzy Rule-Based Systems. J. Inf. Sci. Eng. 18(2): 187-210 (2002) - 2001
- [j12]Hahn-Ming Lee, Chih-Ming Chen
, Tzong-Ching Huang:
Learning efficiency improvement of back-propagation algorithm by error saturation prevention method. Neurocomputing 41(1-4): 125-143 (2001) - [j11]Hahn-Ming Lee, Chih-Ming Chen
, Jyh-Ming Chen, Yu-Lu Jou:
An efficient fuzzy classifier with feature selection based on fuzzy entropy. IEEE Trans. Syst. Man Cybern. Part B 31(3): 426-432 (2001) - [c8]Hahn-Ming Lee, Sheng-Kang Lin, Chiung-Wei Huang:
Interactive Query Expansion Based on Fuzzy Association Thesaurus for Web Information Retrieval. FUZZ-IEEE 2001: 724-727 - 2000
- [c7]Hahn-Ming Lee, Chih-Ming Chen, Cheng-Wei Hwang:
A Neural Network Document Classifier with Linguistic Feature Selection. IEA/AIE 2000: 555-560
1990 – 1999
- 1999
- [c6]Hahn-Ming Lee, Tzong-Ching Huang, Chih-Ming Chen:
Learning efficiency improvement of back propagation algorithm by error saturation prevention method. IJCNN 1999: 1737-1742 - 1998
- [j10]Hahn-Ming Lee, Chung-Chieh Sheu, Jyh-Ming Chen:
Handwritten Chinese Character Recognition Based on Primitive and Fuzzy Features via the SEART Neural Net Model. Appl. Intell. 8(3): 269-285 (1998) - [j9]Hahn-Ming Lee, Chiung-Wei Huang, Chung-Chieh Sheu:
A fuzzy rule-based system for handwritten Chinese characters recognition based on radical extraction. Fuzzy Sets Syst. 100(1-3): 59-70 (1998) - [j8]Hahn-Ming Lee, Chin-Chou Lin, Jyh-Ming Chen:
A preclassification Method for Handwritten Chinese Character Recognition via Fuzzy Rules and Seart Neural Net. Int. J. Pattern Recognit. Artif. Intell. 12(6): 743-761 (1998) - [j7]Hahn-Ming Lee, Kuo-Hsiu Chen, I-Feng Jiang:
A neural network classifier with disjunctive fuzzy information. Neural Networks 11(6): 1113-1125 (1998) - [c5]Hahn-Ming Lee, Jyh-Ming Chen, En-Chieh Chang:
Efficiency validation of fuzzy domain theories using a neural network model. ICTAI 1998: 81-88 - 1997
- [j6]Kuo-Hsiu Chen, Hong-Ling Chen, Hahn-Ming Lee:
A multiclass neural network classifier with fuzzy teaching inputs. Fuzzy Sets Syst. 91(1): 15-35 (1997) - [j5]Hahn-Ming Lee, Fu-Tyan Lin, Jyh-Ming Chen:
A Fuzzy Neural Network Model for Fuzzy Rule Verification, Refinement and Generation. J. Inf. Sci. Eng. 13(2): 311-333 (1997) - 1996
- [j4]Hahn-Ming Lee, Chia-Shing Lai:
Supervised Extended ART: A Fast Neural Network Classifier Trained by Combining Supervised and Unsupervised Learning. Appl. Intell. 6(2): 117-128 (1996) - 1995
- [j3]Chih-Cheng Chien, Cheng-Seen Ho, Hahn-Ming Lee:
mwKAT: A Meta-Tool-Generated Knowledge Acquisition Tool for Multimedia Workstations Development. Appl. Intell. 5(1): 51-72 (1995) - [j2]Hahn-Ming Lee, Bing-Hui Lu, Fu-Tyan Lin:
A fuzzy neural network model for revising imperfect fuzzy rules. Fuzzy Sets Syst. 76(1): 25-45 (1995) - 1993
- [c4]Hahn-Ming Lee, Chia-Shing Lai:
Supervised fuzzy ART: training of a neural network for pattern classification via combining supervised and unsupervised learning. ICNN 1993: 323-328 - [c3]Hahn-Ming Lee, Weng-Tang Wang:
Training of neural network classifier by combining hyperplane with exemplar approach. ICNN 1993: 494-499 - [c2]Hahn-Ming Lee, Weng-Tang Wang:
An Architecture of Neural Network for Fuzzy Teaching Inputs. ICTAI 1993: 285-288
1980 – 1989
- 1989
- [j1]Hahn-Ming Lee, Ching-Chi Hsu:
A Neural Network Processing Methodology for Zero-One Knapsack Problems. J. Inf. Sci. Eng. 5(2): 167-177 (1989) - [c1]Hahn-Ming Lee, Ching-Chi Hsu:
Neural network processing through energy minimization with learning ability to the multiconstraint zero-one knapsack problem. TAI 1989: 548-555
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 03:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint