default search action
Yan Zhu 0010
Person information
- affiliation: University of Science and Technology Beijing, China
- affiliation (2012): University of Michigan-Dearborn, MI, USA
- affiliation (2007 - 2012): Peking University, Beijing Key Laboratory of Internet Security Technology, China
- affiliation (PhD 2005): Harbin Engineering University, China
Other persons with the same name
- Yan Zhu — disambiguation page
- Yan Zhu 0001 — University of Macau, Analog and Mixed Signal VLSI Laboratory, Macao, China
- Yan Zhu 0002 — Stanford University, CA, USA
- Yan Zhu 0003 — Northwestern University, Evanston, IL, USA
- Yan Zhu 0004 — University of Sydney, Department of Electrical Engineering, Australia
- Yan Zhu 0005 — Nanjing Agricultural University, China
- Yan Zhu 0006 — Monash University, Department of Medicinal Chemistry, Melbourne, Australia
- Yan Zhu 0007 — Southwest Jiaotong University, Chengdu, China (and 1 more)
- Yan Zhu 0008 — East China University of Science and Technology, Department of Mathematics, Shanghai, China (and 2 more)
- Yan Zhu 0009 — Facebook, Applied Machine Learning, USA (and 2 more)
- Yan Zhu 0011 — Tsinghua University, Department of Management Science & Engineering, Beijing, China
- Yan Zhu 0012 — Beijing Jiaotong University, China
- Yan Zhu 0013 — New Mexico University, Albuquerque, NM, USA
- Yan Zhu 0014 — University of California, Riverside, CA, USA (and 1 more)
- Yan Zhu 0015 — Shanghai Jiao Tong University, School of Mathematical Sciences, China
- Yan Zhu 0016 — Chinese Academy of Sciences, State Key Laboratory of Computer Architecture, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Hai Lu, Yan Zhu, Cecilia E. Chen, Rongquan Feng, Lejun Zhang, Di Ma:
Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing. IEEE Internet Things J. 11(2): 1893-1909 (2024) - [j43]Guanglai Guo, Yan Zhu, Cecilia E. Chen, Lejun Zhang, Rongquan Feng, Di Ma:
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT. IEEE Internet Things J. 11(7): 11353-11367 (2024) - [j42]Hai Lu, Yan Zhu, Cecilia E. Chen, Di Ma:
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation Generation. IEEE Trans. Inf. Forensics Secur. 19: 4301-4315 (2024) - [j41]Hongjian Yin, Yan Zhu, Guanglai Guo, William Cheng-Chung Chu:
Privacy-Preserving Smart Contracts for Confidential Transactions Using Dual-Mode Broadcast Encryption. IEEE Trans. Reliab. 73(2): 1090-1103 (2024) - [j40]Guanglai Guo, Yan Zhu, E. Chen, Stephen S. Yau:
Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting. IEEE Trans. Serv. Comput. 17(1): 1-17 (2024) - 2023
- [j39]E. Chen, Yan Zhu, Kaitai Liang, Hongjian Yin:
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization. IEEE Trans. Cloud Comput. 11(1): 579-594 (2023) - [j38]Guanglai Guo, Yan Zhu, E. Chen, Ruyun Yu, Lejun Zhang, Kewei Lv, Rongquan Feng:
Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining. IEEE Trans. Reliab. 72(4): 1308-1323 (2023) - [j37]E. Chen, Shengdian Wang, Yuqing Fan, Yan Zhu, Stephen S. Yau:
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts. IEEE Trans. Serv. Comput. 16(5): 3665-3681 (2023) - [c44]Chengxin Zhou, Xianbin Xue, Khaled Riad, Yan Zhu, William Cheng-Chung Chu:
Remotely Controllable Data Self-Destruction for Privacy-Preserving Sensitive Data Services. HPCC/DSS/SmartCity/DependSys 2023: 860-867 - 2022
- [j36]E. Chen, Yan Zhu, Zhiyuan Zhou, Shou-Yu Lee, W. Eric Wong, William Cheng-Chung Chu:
Policychain: A Decentralized Authorization Service With Script-Driven Policy on Blockchain for Internet of Things. IEEE Internet Things J. 9(7): 5391-5409 (2022) - [j35]Hongjian Yin, E. Chen, Yan Zhu, Chengwei Zhao, Rongquan Feng, Stephen S. Yau:
Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things. IEEE Internet Things J. 9(13): 10625-10639 (2022) - [j34]Hai Lu, Ruyun Yu, Yan Zhu, Xiao He, Kaitai Liang, William Cheng-Chung Chu:
Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership. J. Syst. Softw. 188: 111271 (2022) - [j33]Guanglai Guo, Yan Zhu, E. Chen, Guizhen Zhu, Di Ma, William Cheng-Chung Chu:
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols. Peer-to-Peer Netw. Appl. 15(1): 304-323 (2022) - [j32]E. Chen, Bohan Qin, Yan Zhu, Weijing Song, Shengdian Wang, William Cheng-Chung Chu, Stephen S. Yau:
SPESC-Translator: Towards Automatically Smart Legal Contract Conversion for Blockchain-Based Auction Services. IEEE Trans. Serv. Comput. 15(5): 3061-3076 (2022) - 2021
- [j31]E. Chen, Yan Zhu, Guizhen Zhu, Kaitai Liang, Rongquan Feng:
How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors. Comput. Secur. 107: 102318 (2021) - [j30]Yan Zhu, Qian Guo, Hongjian Yin, Kaitai Liang, Stephen S. Yau:
Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts. Computer 54(12): 72-80 (2021) - [j29]Yan Zhu, Weijing Song, Di Wang, Di Ma, William Cheng-Chung Chu:
TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain. IEEE Trans. Reliab. 70(3): 1255-1270 (2021) - [c43]E. Chen, Bohan Qin, Yan Zhu, Weijing Song, Shengdian Wang, William Cheng-Chung Chu, Stephen S. Yau:
SPESC-Translator: Towards Automatically Smart Legal Contract Conversion for Blockchain-based Auction Services. SERVICES 2021: 3 - 2020
- [j28]Guohua Gan, E. Chen, Zhiyuan Zhou, Yan Zhu:
Token-Based Access Control. IEEE Access 8: 54189-54199 (2020) - [j27]Guanglai Guo, Yan Zhu, Ruyun Yu, William Cheng-Chung Chu, Di Ma:
A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks. IEEE Access 8: 157116-157129 (2020) - [j26]Di Wang, Yan Zhu, Yi Zhang, Guowei Liu:
Security Assessment of Blockchain in Chinese Classified Protection of Cybersecurity. IEEE Access 8: 203440-203456 (2020) - [j25]Enhong Chen, Yan Zhu, Changlu Lin, Kewei Lv:
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature. Frontiers Comput. Sci. 14(4): 144806 (2020)
2010 – 2019
- 2019
- [j24]Yan Zhu, Khaled Riad, Ruiqi Guo, Guohua Gan, Rongquan Feng:
New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain. Frontiers Comput. Sci. 13(6): 1182-1197 (2019) - [j23]Yan Zhu, Ruyun Yu, Di Ma, William Cheng-Chung Chu:
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens. IEEE Trans. Reliab. 68(4): 1330-1346 (2019) - [c42]Yan Zhu, Shuai Yang, William Cheng-Chung Chu, Rongquan Feng:
FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table. SCC 2019: 90-99 - [c41]Yan Zhu, Yi Zhang, Jing Wang, Weijing Song, William Cheng-Chung Chu, Guowei Liu:
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era. COMPSAC (2) 2019: 103-109 - [c40]Yihan Jiang, Yong Li, Yan Zhu:
Auditable zerocoin scheme with user awareness. ICCSP 2019: 28-32 - 2018
- [j22]Qianwen Wang, Rongquan Feng, Yan Zhu:
Verifiable random functions with Boolean function constraints. Sci. China Inf. Sci. 61(3): 039105:1-039105:3 (2018) - [j21]Yan Zhu, Ruyun Yu, E. Chen, Dijiang Huang:
Dual-mode broadcast encryption. Sci. China Inf. Sci. 61(11): 118101:1-118101:3 (2018) - [j20]Yan Zhu, Guohua Gan, Ruiqi Guo, Dijiang Huang:
PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud. IEEE Trans. Cloud Comput. 6(4): 1110-1124 (2018) - [j19]Bing Li, Dijiang Huang, Zhijie Wang, Yan Zhu:
Attribute-based Access Control for ICN Naming Scheme. IEEE Trans. Dependable Secur. Comput. 15(2): 194-206 (2018) - [j18]Hongke Zhao, Qi Liu, Hengshu Zhu, Yong Ge, Enhong Chen, Yan Zhu, Junping Du:
A Sequential Approach to Market State Modeling and Analysis in Online P2P Lending. IEEE Trans. Syst. Man Cybern. Syst. 48(1): 21-33 (2018) - [c39]Yan Zhu, Yao Qin, Zhiyuan Zhou, Xiaoxu Song, Guowei Liu, William Cheng-Chung Chu:
Digital Asset Management with Distributed Permission over Blockchain and Attribute-Based Access Control. SCC 2018: 193-200 - [c38]Xiao He, Bohan Qin, Yan Zhu, Xing Chen, Yi Liu:
SPESC: A Specification Language for Smart Contracts. COMPSAC (1) 2018: 132-137 - [c37]Yan Zhu, Yao Qin, Guohua Gan, Yang Shuai, William Cheng-Chung Chu:
TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization. COMPSAC (1) 2018: 535-544 - [c36]Yan Zhu, Shuai Yang, Guohua Gan, Xiao He:
An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash Table. COMPSAC (1) 2018: 914-919 - [c35]Yan Zhu, Xiaoxu Song, Shuai Yang, Yao Qin, Qiong Zhou:
Secure Smart Contract System Built on SMPC Over Blockchain. iThings/GreenCom/CPSCom/SmartData 2018: 1539-1544 - [c34]Yan Zhu, Ruyun Yu, Yao Qin, Di Ma, William Cheng-Chung Chu:
Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy. QRS 2018: 277-288 - 2017
- [j17]Khaled Riad, Yan Zhu:
Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud. Int. J. Cooperative Inf. Syst. 26(4): 1750003:1-1750003:33 (2017) - [c33]Yan Zhu, Guhua Gan, Khaled Riad:
BC-PDS: Protecting Privacy and Self-Sovereignty through BlockChains for OpenPDS. SOSE 2017: 138-144 - 2016
- [c32]Yan Zhu, Ruiqi Guo, Guohua Gan, Wei-Tek Tsai:
Interactive Incontestable Signature for Transactions Confirmation in Bitcoin Blockchain. COMPSAC 2016: 443-448 - [c31]Yan Zhu, Hengshu Zhu, Qi Liu, Enhong Chen, Hong Li, Hongke Zhao:
Exploring the Procrastination of College Students: A Data-Driven Behavioral Perspective. DASFAA (1) 2016: 258-273 - [c30]Wei-Tek Tsai, Robert Blower, Yan Zhu, Lian Yu:
A System View of Financial Blockchains. SOSE 2016: 450-457 - 2015
- [j16]Huijun Wu, Dijiang Huang, Yan Zhu:
Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications. Mob. Networks Appl. 20(3): 297-307 (2015) - [j15]Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, Chun-Jen Chung:
Efficient Attribute-Based Comparable Data Access Control. IEEE Trans. Computers 64(12): 3430-3443 (2015) - [j14]Babins Shrestha, Di Ma, Yan Zhu, Haoyu Li, Nitesh Saxena:
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Trans. Inf. Forensics Secur. 10(11): 2270-2283 (2015) - [j13]Yan Zhu, Dijiang Huang, Chang-Jyun Hu, Xin Wang:
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services. IEEE Trans. Serv. Comput. 8(4): 601-616 (2015) - [c29]Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. AsiaCCS 2015: 191-202 - [c28]Changlu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu:
A Provable Data Possession Scheme with Data Hierarchy in Cloud. Inscrypt 2015: 301-321 - [c27]Khaled Riad, Yan Zhu, Hongxin Hu, Gail-Joon Ahn:
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing. CIC 2015: 28-35 - [c26]Yan Zhu, Feng Pu, Guohua Gan, Ruiqi Guo, Shuqing Zhang:
Traitor Tracing and Revocation for Secure Decoders in File Syncing-and-Sharing Service. COMPSAC 2015: 504-509 - [c25]Yan Zhu, Liguang Yang, Di Ma:
Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services. IEEE MS 2015: 142-149 - [i5]Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. IACR Cryptol. ePrint Arch. 2015: 342 (2015) - 2014
- [j12]Shan-Biao Wang, Yan Zhu, Di Ma, Rong-Quan Feng:
Lattice-based key exchange on small integer solution problem. Sci. China Inf. Sci. 57(11): 1-12 (2014) - [j11]Yan Zhu, Di Ma, Changjun Hu, Gail-Joon Ahn, Hongxin Hu:
Secure and efficient random functions with variable-length output. J. Netw. Comput. Appl. 45: 121-133 (2014) - [c24]Bing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, Yan Zhu:
Attribute-based access control for ICN naming scheme. CNS 2014: 391-399 - [c23]Yan Zhu, Dandan Li, Liguang Yang:
Traitor Tracing Based on Partially-Ordered Hierarchical Encryption. INTRUST 2014: 278-293 - 2013
- [j10]Di Ma, Nitesh Saxena, Tuo Xiang, Yan Zhu:
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing. IEEE Trans. Dependable Secur. Comput. 10(2): 57-69 (2013) - [j9]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shan-Biao Wang:
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy. IEEE Trans. Inf. Forensics Secur. 8(12): 2138-2153 (2013) - [j8]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, Changjun Hu:
Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Trans. Serv. Comput. 6(2): 227-238 (2013) - [c22]Yan Zhu, Changjun Hu, Di Ma, Jin Li:
Cryptographic Spatio-temporal Predicates for Location-Based Services. 3PGCIC 2013: 84-91 - [c21]Yan Zhu, Di Ma, Changjun Hu, Dijiang Huang:
How to use attribute-based encryption to implement role-based access control in the cloud. SCC@ASIACCS 2013: 33-40 - [c20]Di Ma, Yan Zhu, Mengyang Yu:
End-to-end aggregate authentication of time-series data. AsiaPKC@AsiaCCS 2013: 51-56 - [c19]Yan Zhu, Di Ma, Dijiang Huang, Changjun Hu:
Enabling secure location-based services in mobile cloud computing. MCC@SIGCOMM 2013: 27-32 - [c18]Yan Zhu, Di Ma, Shan-Biao Wang, Rong-Quan Feng:
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices. WASA 2013: 42-53 - [c17]Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu:
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures. WISEC 2013: 25-30 - [i4]Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu:
Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones Using Intuitive Human Gestures. CoRR abs/1302.4010 (2013) - 2012
- [j7]Yan Zhu, Mengyang Yu, Hongxin Hu, Gail-Joon Ahn, Hong-Jia Zhao:
Efficient construction of provably secure steganography under ordinary covert channels. Sci. China Inf. Sci. 55(7): 1639-1649 (2012) - [j6]Yan Zhu, Shan-Biao Wang, Hongxin Hu, Gail-Joon Ahn, Di Ma:
Secure Collaborative Integrity Verification for Hybrid Cloud Environments. Int. J. Cooperative Inf. Syst. 21(3): 165-198 (2012) - [j5]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau:
Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5): 1083-1095 (2012) - [j4]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu:
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Trans. Parallel Distributed Syst. 23(12): 2231-2244 (2012) - [c16]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hong-Jia Zhao:
Comparison-based encryption for fine-grained access control in clouds. CODASPY 2012: 105-116 - [c15]Yan Zhu, Shan-Biao Wang, Di Ma, Hongxin Hu, Gail-Joon Ahn:
Secure and efficient constructions of hash, MAC and PRF for mobile devices. GLOBECOM 2012: 949-954 - [c14]Yan Zhu, Di Ma, Shan-Biao Wang:
Secure Data Retrieval of Outsourced Data with Complex Query Support. ICDCS Workshops 2012: 481-490 - [c13]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shan-Biao Wang:
Towards temporal access control in cloud computing. INFOCOM 2012: 2576-2580 - 2011
- [j3]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu:
Zero-knowledge proofs of retrievability. Sci. China Inf. Sci. 54(8): 1608-1617 (2011) - [j2]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huaixi Wang, Shan-Biao Wang:
Provably Secure Role-Based Encryption with Revocation Mechanism. J. Comput. Sci. Technol. 26(4): 697-710 (2011) - [c12]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong, Shimin Chen:
Poster: temporal attribute-based encryption in clouds. CCS 2011: 881-884 - [c11]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han, Shimin Chen:
Collaborative integrity verification in hybrid clouds. CollaborateCom 2011: 191-200 - [c10]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Dynamic audit services for integrity verification of outsourced storages in clouds. SAC 2011: 1550-1557 - 2010
- [j1]Huaixi Wang, Yan Zhu, Rong-Quan Feng, Stephen S. Yau:
Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 25(6): 1293-1304 (2010) - [c9]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic role-based security mechanisms based on role-key hierarchy. AsiaCCS 2010: 314-319 - [c8]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. CCS 2010: 756-758 - [c7]Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn:
A collaborative framework for privacy protection in online social networks. CollaborateCom 2010: 1-10 - [c6]Dijiang Huang, Zhibin Zhou, Yan Zhu:
Gradual Identity Exposure Using Attribute-Based Encryption. SocialCom/PASSAT 2010: 881-888 - [i3]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy. IACR Cryptol. ePrint Arch. 2010: 188 (2010) - [i2]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. IACR Cryptol. ePrint Arch. 2010: 234 (2010) - [i1]Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn:
A Collaborative Framework for Privacy Protection in Online Social Networks. IACR Cryptol. ePrint Arch. 2010: 491 (2010)
2000 – 2009
- 2007
- [c5]Yan Zhu, Chang-Tsun Li, Hong-Jia Zhao:
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. IAS 2007: 478-483 - 2006
- [c4]Xinshan Zhu, Yong Gao, Yan Zhu:
Image-adaptive watermarking based on perceptually shaping watermark blockwise. AsiaCCS 2006: 175-181 - [c3]Yan Zhu, Wei Zou, Xinshan Zhu:
Collusion secure convolutional fingerprinting information codes. AsiaCCS 2006: 266-274 - [c2]Xianhai Zhang, Yongtian Yang, Yan Zhu:
A Secure Hierarchical Fragile Watermarking Method with Tamper Localization. IMSCCS (2) 2006: 69-74 - 2005
- [c1]Yan Zhu, Dengguo Feng, Wei Zou:
Collusion Secure Convolutional Spread Spectrum Fingerprinting. IWDW 2005: 67-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint