default search action
Yiqiao Cai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j72]Jianjun Deng, Junjie Wang, Xiaojun Wang, Yiqiao Cai, Peizhong Liu:
Multi-Task Multi-Objective Evolutionary Search Based on Deep Reinforcement Learning for Multi-Objective Vehicle Routing Problems with Time Windows. Symmetry 16(8): 1030 (2024) - 2022
- [j71]Chi Shao, Yiqiao Cai, Shunkai Fu, Jing Li, Wei Luo:
An enhanced utilization mechanism of population information for Differential evolution. Evol. Intell. 15(4): 2247-2259 (2022) - [j70]Kaikai Zhang, Yiqiao Cai, Shunkai Fu, Huizhen Zhang:
Multiobjective memetic algorithm based on adaptive local search chains for vehicle routing problem with time windows. Evol. Intell. 15(4): 2283-2294 (2022) - [j69]Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin-Chen Chang, Yiqiao Cai, Yonghong Chen:
Towards blind detection of steganography in low-bit-rate speech streams. Int. J. Intell. Syst. 37(12): 12085-12112 (2022) - [j68]Yiqiao Cai, Meiqin Cheng, Ying Zhou, Peizhong Liu, Jing-Ming Guo:
A hybrid evolutionary multitask algorithm for the multiobjective vehicle routing problem with time windows. Inf. Sci. 612: 168-187 (2022) - 2021
- [j67]Yiqiao Cai, Duanwei Wu, Shunkai Fu, Shengming Zeng:
Self-regulated differential evolution for real parameter optimization. Appl. Intell. 51(8): 5873-5897 (2021) - [j66]Yiqiao Cai, Deming Peng, Peizhong Liu, Jing-Ming Guo:
Evolutionary multi-task optimization with hybrid knowledge transfer strategy. Inf. Sci. 580: 874-896 (2021) - 2020
- [j65]Hui Tian, Jie Liu, Chin-Chen Chang, Yongfeng Huang, Yiqiao Cai:
Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency. IEEE Access 8: 6117-6129 (2020) - [j64]Yiqiao Cai, Duanwei Wu, Shaopeng Liu, Shunkai Fu, Peizhong Liu:
Enhancing Differential Evolution on Continuous Optimization Problems by Detecting Promising Leaders. IEEE Access 8: 226557-226578 (2020) - [j63]Tian Wang, Jiandian Zeng, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Data collection from WSNs to the cloud based on mobile Fog elements. Future Gener. Comput. Syst. 105: 864-872 (2020) - [j62]Hui Tian, Zhao-Hua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
StegoNote: Steganography in Guitar Music Using Note Modulation. Int. J. Netw. Secur. 22(1): 68-79 (2020) - [j61]Ying Zhou, Lingjing Kong, Yiqiao Cai, Ziyan Wu, Shaopeng Liu, Jiaming Hong, Keke Wu:
A Decomposition-Based Local Search for Large-Scale Many-Objective Vehicle Routing Problems With Simultaneous Delivery and Pickup and Time Windows. IEEE Syst. J. 14(4): 5253-5264 (2020) - [j60]Yiqiao Cai, Duanwei Wu, Ying Zhou, Shunkai Fu, Hui Tian, Yongqian Du:
Self-organizing neighborhood-based differential evolution for global optimization. Swarm Evol. Comput. 56: 100699 (2020)
2010 – 2019
- 2019
- [j59]Yiqiao Cai, Chi Shao, Huizhen Zhang, Shunkai Fu, Hui Tian, Yonghong Chen:
A Neighborhood-Assisted Framework for Differential Evolution. IEEE Access 7: 44338-44358 (2019) - [j58]Yiqiao Cai, Chi Shao, Ying Zhou, Shunkai Fu, Huizhen Zhang, Hui Tian:
Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic Rules. IEEE Access 7: 58023-58040 (2019) - [j57]Ying Zhou, Lingjing Kong, Ziyan Wu, Shaopeng Liu, Yiqiao Cai, Ye Liu:
Ensemble of multi-objective metaheuristic algorithms for multi-objective unconstrained binary quadratic programming problem. Appl. Soft Comput. 81 (2019) - [j56]Guo Sun, Yiqiao Cai:
Differential evolution with dynamic neighbourhood learning strategy-based mutation operators. Int. J. Comput. Sci. Eng. 19(1): 140-151 (2019) - [j55]Fulin Nan, Hui Tian, Tian Wang, Yiqiao Cai, Yonghong Chen:
A collusion-resistant public auditing scheme for shared cloud data. Int. J. Inf. Technol. Manag. 18(2/3): 195-212 (2019) - [j54]Bowen Zhu, Yonghong Chen, Yiqiao Cai:
Three Kinds of Network Security Situation Awareness Model Based on Big Data. Int. J. Netw. Secur. 21(1): 115-121 (2019) - [j53]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network. Int. J. Netw. Secur. 21(4): 648-660 (2019) - [j52]Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Zheng-an Huang, Yiqiao Cai, Yonghong Chen:
Public audit for operation behavior logs with error locating in cloud storage. Soft Comput. 23(11): 3779-3792 (2019) - [c21]Deming Peng, Yiqiao Cai, Shunkai Fu, Wei Luo:
Experimental Analysis of Selective Imitation for Multifactorial Differential Evolution. BIC-TA (1) 2019: 15-26 - [c20]Yiqiao Cai, Deining Peng, Shunkai Fu, Hui Tian:
Multitasking differential evolution with difference vector sharing mechanism. SSCI 2019: 3039-3046 - 2018
- [j51]Tian Wang, Jiandian Zeng, Md. Zakirul Alam Bhuiyan, Yonghong Chen, Yiqiao Cai, Hui Tian, Mande Xie:
Energy-efficient relay tracking with multiple mobile camera sensors. Comput. Networks 133: 130-140 (2018) - [j50]Meng Zhao, Yiqiao Cai:
Intelligent selection of parents for mutation in differential evolution. Int. J. Comput. Sci. Eng. 17(2): 133-145 (2018) - [j49]Yiqiao Cai, Jingliang Liao, Tian Wang, Yonghong Chen, Hui Tian:
Social learning differential evolution. Inf. Sci. 433-434: 464-509 (2018) - [j48]Guo Sun, Yiqiao Cai, Tian Wang, Hui Tian, Cheng Wang, Yonghong Chen:
Differential evolution with individual-dependent topology adaptation. Inf. Sci. 450: 1-38 (2018) - [j47]Zhao-Hua Zhu, Hui Tian, Chin-Chen Chang, Yonghong Chen, Tian Wang, Yiqiao Cai:
StegTab: Steganography in Guitar Tablatures. J. Inf. Hiding Multim. Signal Process. 9(4): 904-917 (2018) - [j46]Qing Lei, Hongbo Zhang, Minghai Xin, Yiqiao Cai:
A hierarchical representation for human action recognition in realistic scenes. Multim. Tools Appl. 77(9): 11403-11423 (2018) - [j45]Jie Liu, Hui Tian, Chin-Chen Chang, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test. Symmetry 10(8): 336 (2018) - [c19]Chi Shao, Yiqiao Cai, Wei Luo, Jing Li:
Differential Evolution with Proximity-Based Replacement Strategy and Elite Archive Mechanism for Global Optimization. ICA3PP (2) 2018: 76-89 - [c18]Jing Lu, Yuxiang Chen, Hui Tian, Yonghong Chen, Tian Wang, Yiqiao Cai:
Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data. ICA3PP (Workshops) 2018: 185-191 - [c17]Duanwei Wu, Yiqiao Cai, Jing Li, Wei Luo:
Enhanced Differential Evolution with Self-organizing Map for Numerical Optimization. ICA3PP (2) 2018: 308-318 - 2017
- [j44]Tian Wang, Jiandian Zeng, Md. Zakirul Alam Bhuiyan, Hui Tian, Yiqiao Cai, Yonghong Chen, Bineng Zhong:
Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services. IEEE Access 5: 7692-7701 (2017) - [j43]Yu-Xiang Lei, Jin Gou, Cheng Wang, Wei Luo, Yiqiao Cai:
Improved Differential Evolution With a Modified Orthogonal Learning Strategy. IEEE Access 5: 9699-9716 (2017) - [j42]Tao Zou, Wenzheng Xu, Weifa Liang, Jian Peng, Yiqiao Cai, Tian Wang:
Improving charging capacity for wireless sensor networks by deploying one mobile vehicle with multiple removable chargers. Ad Hoc Networks 63: 79-90 (2017) - [j41]Tian Wang, Wenhua Wang, Yongxuan Lai, Sheng Wen, Hui Tian, Yiqiao Cai, Yonghong Chen, Baowei Wang:
The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security. Ad Hoc Sens. Wirel. Networks 37(1-4): 95-115 (2017) - [j40]Jin Gou, Yu-Xiang Lei, Wang-Ping Guo, Cheng Wang, Yiqiao Cai, Wei Luo:
A novel improved particle swarm optimization algorithm based on individual difference evolution. Appl. Soft Comput. 57: 468-481 (2017) - [j39]Yiqiao Cai, Guo Sun, Tian Wang, Hui Tian, Yonghong Chen, Jiahai Wang:
Neighborhood-adaptive differential evolution for global numerical optimization. Appl. Soft Comput. 59: 659-706 (2017) - [j38]Tian Wang, Wenhua Wang, Jiannong Cao, Md. Zakirul Alam Bhuiyan, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Interoperable localization for mobile group users. Comput. Commun. 105: 53-65 (2017) - [j37]Tian Wang, Yang Li, Yonghong Chen, Hui Tian, Yiqiao Cai, Weijia Jia, Baowei Wang:
Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System. IEEE Commun. Lett. 21(11): 2532-2535 (2017) - [j36]Tian Wang, Zhen Peng, Sheng Wen, Yongxuan Lai, Weijia Jia, Yiqiao Cai, Hui Tian, Yonghong Chen:
Reliable wireless connections for fast-moving rail users based on a chained fog structure. Inf. Sci. 379: 160-176 (2017) - [j35]Weipeng Guo, Yonghong Chen, Yiqiao Cai, Tian Wang, Hui Tian:
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. KSII Trans. Internet Inf. Syst. 11(11): 5574-5591 (2017) - [j34]Hui Tian, Jun Sun, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate. Mob. Inf. Syst. 2017: 5418978:1-5418978:18 (2017) - [j33]Tian Wang, Qun Wu, Sheng Wen, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks. Sensors 17(1): 139 (2017) - [j32]Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen, Tian Wang, Yiqiao Cai, Jin Liu:
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134: 9-22 (2017) - [j31]Hui Tian, Yanpeng Wu, Yiqiao Cai, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Jing Lu:
Distributed steganalysis of compressed speech. Soft Comput. 21(3): 795-804 (2017) - [j30]Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, Tian Wang:
Enabling public auditability for operation behaviors in cloud storage. Soft Comput. 21(8): 2175-2187 (2017) - [j29]Yiqiao Cai, Meng Zhao, Jingliang Liao, Tian Wang, Hui Tian, Yonghong Chen:
Neighborhood guided differential evolution. Soft Comput. 21(16): 4769-4812 (2017) - [c16]Qun Wu, Tian Wang, Yiqiao Cai, Hui Tian, Yonghong Chen:
Rumor restraining based on propagation prediction with limited observations in large-scale social networks. ACSW 2017: 1:1-1:8 - [c15]Zhaoyi Chen, Hui Tian, Jing Lu, Wenqi Chen, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage. CSE/EUC (2) 2017: 51-57 - [c14]Chi Shao, Guo Sun, Meng Zhao, Yiqiao Cai:
Adaptive Differential Evolution with Landscape Modality Detection for Global Optimization. CSE/EUC (1) 2017: 204-209 - [c13]Zhaoyi Chen, Hui Tian, Jing Lu, Fulin Nan, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Logging and Public Audit for Operation Behavior in Cloud Storage. CSE/EUC (1) 2017: 444-450 - [c12]Guo Sun, Yiqiao Cai:
A Novel Neighborhood-Dependent Mutation Operator for Differential Evolution. CSE/EUC (1) 2017: 837-841 - 2016
- [j28]Yalan Zhou, Jiahai Wang, Yuren Zhou, Zhanyan Qiu, Zhisheng Bi, Yiqiao Cai:
Differential evolution with guiding archive for global numerical optimization. Appl. Soft Comput. 43: 424-440 (2016) - [j27]Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian:
Improving differential evolution with a new selection method of parents for mutation. Frontiers Comput. Sci. 10(2): 246-269 (2016) - [j26]Yonghong Chen, Ning Zhang, Hui Tian, Tian Wang, Yiqiao Cai:
A Novel Connection Correlation Scheme Based on Threshold Secret Sharing. IEEE Commun. Lett. 20(12): 2414-2417 (2016) - [j25]Tian Wang, Zhen Peng, Cheng Wang, Yiqiao Cai, Yonghong Chen, Hui Tian, Junbin Liang, Bineng Zhong:
Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(2): 5831471:1-5831471:11 (2016) - [j24]Wei Guan, Cheng Wang, Yiqiao Cai, Huizhen Zhang:
Design and implementation of wireless monitoring network for temperature-humidity measurement. J. Ambient Intell. Humaniz. Comput. 7(1): 131-138 (2016) - [j23]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
两层无线传感网中节能的安全范围查询方法 (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks). 计算机科学 43(Z11): 393-397 (2016) - [j22]Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
一种可检测数据完整性的安全数据聚合协议 (Integrity-checking Security Data Aggregation Protocol). 计算机科学 43(Z6): 353-356 (2016) - [j21]Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics. Secur. Commun. Networks 9(15): 2934-2944 (2016) - [j20]Yiqiao Cai, Jiahai Wang, Yonghong Chen, Tian Wang, Hui Tian, Wei Luo:
Adaptive direction information in differential evolution for numerical optimization. Soft Comput. 20(2): 465-494 (2016) - [j19]Jingliang Liao, Yiqiao Cai, Tian Wang, Hui Tian, Yonghong Chen:
Cellular direction information based differential evolution for numerical optimization: an empirical study. Soft Comput. 20(7): 2801-2827 (2016) - [j18]Tian Wang, Zhen Peng, Junbin Liang, Sheng Wen, Md. Zakirul Alam Bhuiyan, Yiqiao Cai, Jiannong Cao:
Following Targets for Mobile Tracking in Wireless Sensor Networks. ACM Trans. Sens. Networks 12(4): 31:1-31:24 (2016) - [c11]Zhaoyi Chen, Hui Tian, Jing Lu, Yiqiao Cai, Tian Wang, Yonghong Chen:
Operational-Behavior Auditing in Cloud Storage. CloudComp 2016: 162-172 - [c10]Xinling Kong, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai, Xin Chen:
A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering. CyberC 2016: 42-45 - [c9]Wenhua Wang, Tian Wang, Md. Zakirul Alam Bhuiyan, Yiqiao Cai, Hui Tian, Yonghong Chen:
Improving the Localization Probability and Decreasing Communication Cost for Mobile Users. SpaCCS Workshops 2016: 197-207 - 2015
- [j17]Jin Gou, Wang-Ping Guo, Feng Hou, Cheng Wang, Yiqiao Cai:
Adaptive differential evolution with directional strategy and cloud model. Appl. Intell. 42(2): 369-388 (2015) - [j16]Tian Wang, Yiqiao Cai, Weijia Jia, Sheng Wen, Guojun Wang, Hui Tian, Yonghong Chen, Bineng Zhong:
Maximizing real-time streaming services based on a multi-servers networking framework. Comput. Networks 93: 199-212 (2015) - [j15]Hui Tian, Jie Qin, Shuting Guo, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Improved adaptive partial-matching steganography for Voice over IP. Comput. Commun. 70: 95-108 (2015) - [j14]Hui Tian, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai:
A High-Capacity Covering Code for Voice-Over-IP Steganography. Int. J. Inf. Technol. Web Eng. 10(3): 46-63 (2015) - [j13]Yiqiao Cai, Jiahai Wang:
Differential evolution with hybrid linkage crossover. Inf. Sci. 320: 244-287 (2015) - [j12]Ye-Wang Chen, Jiong-Liang Wang, Yiqiao Cai, Ji-Xiang Du:
A method for Chinese text classification based on apparent semantics and latent aspects. J. Ambient Intell. Humaniz. Comput. 6(4): 473-480 (2015) - [j11]Zewu Peng, Jingliang Liao, Yiqiao Cai:
Differential evolution with distributed direction information based mutation operators: an optimization technique for big data. J. Ambient Intell. Humaniz. Comput. 6(4): 481-494 (2015) - [j10]Hui Tian, Jie Qin, Yongfeng Huang, Yonghong Chen, Tian Wang, Jin Liu, Yiqiao Cai:
Optimal matrix embedding for Voice-over-IP steganography. Signal Process. 117: 33-43 (2015) - [j9]Jiahai Wang, Yiqiao Cai:
Multiobjective evolutionary algorithm for frequency assignment problem in satellite communications. Soft Comput. 19(5): 1229-1253 (2015) - [c8]Jie Qin, Hui Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang:
An Efficient VoIP Steganography Based on Random Binary Matrix. 3PGCIC 2015: 462-465 - [c7]Hui Tian, Yanpeng Wu, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai:
Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions. ARES 2015: 455-460 - [c6]Tian Wang, Zhen Peng, Junbin Liang, Yiqiao Cai, Yonghong Chen, Hui Tian, Bineng Zhong:
Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks. WASA 2015: 836-844 - 2014
- [j8]Yiqiao Cai, Ji-Xiang Du, Weibin Chen:
Enhancing the search ability of differential evolution through competent leader. Int. J. High Perform. Syst. Archit. 5(1): 50-62 (2014) - [j7]Jiahai Wang, Jianjun Liao, Ying Zhou, Yiqiao Cai:
Differential Evolution Enhanced With Multiobjective Sorting-Based Mutation Operators. IEEE Trans. Cybern. 44(12): 2792-2805 (2014) - [c5]Jingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian:
Improving Differential Evolution with Ring Topology-Based Mutation Operators. 3PGCIC 2014: 103-109 - [c4]Yiqiao Cai, Ji-Xiang Du:
Enhanced differential evolution with adaptive direction information. IEEE Congress on Evolutionary Computation 2014: 305-312 - [c3]Tian Wang, Zhen Peng, Yonghong Chen, Yiqiao Cai, Hui Tian:
Continuous tracking for mobile targets with mobility nodes in WSNs. SMARTCOMP 2014: 261-268 - 2013
- [j6]Yiqiao Cai, Jiahai Wang:
Differential Evolution With Neighborhood and Direction Information for Numerical Optimization. IEEE Trans. Cybern. 43(6): 2202-2215 (2013) - [c2]Yiqiao Cai, Weibin Chen:
Adaptive Differential Evolution with Competent Leaders. EIDWT 2013: 204-210 - 2012
- [j5]Yiqiao Cai, Jiahai Wang, Jian Yin:
Learning-enhanced differential evolution for numerical optimization. Soft Comput. 16(2): 303-330 (2012) - [j4]Jiahai Wang, Ying Zhou, Yiqiao Cai, Jian Yin:
Learnable tabu search guided by estimation of distribution for maximum diversity problems. Soft Comput. 16(4): 711-728 (2012) - 2011
- [j3]Jiahai Wang, Yiqiao Cai, Yalan Zhou, Rong Long Wang, Caiwei Li:
Discrete particle swarm optimization based on estimation of distribution for terminal assignment problems. Comput. Ind. Eng. 60(4): 566-575 (2011) - [j2]Jiahai Wang, Yiqiao Cai, Jian Yin:
Multi-start stochastic competitive Hopfield neural network for frequency assignment problem in satellite communications. Expert Syst. Appl. 38(1): 131-145 (2011) - [j1]Yiqiao Cai, Jiahai Wang, Jian Yin, Yalan Zhou:
Memetic clonal selection algorithm with EDA vaccination for unconstrained binary quadratic programming problems. Expert Syst. Appl. 38(6): 7817-7827 (2011)
2000 – 2009
- 2009
- [c1]Yiqiao Cai, Jiahai Wang, Jian Yin, Caiwei Li, Yunong Zhang:
Multi-start Stochastic Competitive Hopfield Neural Network for p-Median Problem. ISNN (1) 2009: 75-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint