default search action
Ben Niu 0001
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- affiliation (PhD 2014): Xidian University, Xi'an, China
- affiliation (2011 - 2013): Pennsylvania State University, State College, PA, USA
Other persons with the same name
- Ben Niu — disambiguation page
- Ben Niu 0002 — Shenzhen University, College of Management / Institute for Cultural Industries, China (and 3 more)
- Ben Niu 0003 — Shandong Normal University, School of Information Science and Engineering, Jinan, China (and 2 more)
- Ben Niu 0004 — Harbin Institute of Technology, Department of Mathematics, Weihai, China
- Ben Niu 0005 — Purdue University, School of Electrical and Computer Engineering and Birck Nanotechnology Center, West Lafayette, IN, USA
- Ben Niu 0006 — Jinling Institute of Technology, School of Electronic and Information Engineering, Nanjing, China
- Ben Niu 0007 — Microsoft Research, Redmond, WA, USA (and 1 more)
- Ben Niu 0008 — Chinese Academy of Sciences, Aerospace Information Research Institute, Key Laboratory of Technology in Geo-Spatial Information Processing and Application System, Beijing, China (and 1 more)
- Ben Niu 0009 — Illinois Institute of Technology, Department of Applied Mathematics, Chicago, IL, USA
- Ben Niu 0010 — Shenzhen Power Supply Bureau Co. Ltd., Shenzhen, China
- Ben Niu 0011 — Northeastern University, College of Computer Science and Engineering, Shenyang, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Zhenyang Guo, Jin Cao, Xinyi Wang, Yinghui Zhang, Ben Niu, Hui Li:
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks. IEEE Internet Things J. 11(12): 22091-22106 (2024) - [j30]Chao Shang, Jin Cao, Tong Zhu, Yinghui Zhang, Ben Niu, Hui Li:
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices. IEEE Syst. J. 18(1): 590-599 (2024) - [j29]Chao Shang, Jin Cao, Jiajia Liu, Yinghui Zhang, Ben Niu, Hui Li:
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network. IEEE Trans. Intell. Transp. Syst. 25(7): 6780-6795 (2024) - [j28]Yunqing Sun, Jin Cao, Xiongpeng Ren, Canhui Tang, Ben Niu, Yinghui Zhang, Hui Li:
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks. IEEE Trans. Intell. Transp. Syst. 25(8): 9733-9748 (2024) - [j27]Ruhui Ma, Jin Cao, Shiyang He, Yinghui Zhang, Ben Niu, Hui Li:
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network. IEEE Trans. Netw. Serv. Manag. 21(2): 2426-2444 (2024) - [c52]Likun Zhang, Jingwei Sun, Shoukun Guo, Fenghua Li, Jin Cao, Ben Niu:
Interpreting Memorization in Deep Learning from Data Distribution. ICASSP 2024: 5565-5569 - [c51]Yanbo Zhang, Mi Wen, Weiwei Li, Ben Niu, Weidong Qiu, Fenghua Li:
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning. ICC 2024: 5184-5189 - [i5]Zuquan Peng, Yuanyuan He, Jianbing Ni, Ben Niu:
Bypassing DARCY Defense: Indistinguishable Universal Adversarial Triggers. CoRR abs/2409.03183 (2024) - [i4]Likun Zhang, Hao Wu, Lingcui Zhang, Fengyuan Xu, Jin Cao, Fenghua Li, Ben Niu:
Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine? CoRR abs/2409.15781 (2024) - 2023
- [j26]Yuanyuan Yang, Jin Cao, Xiongpeng Ren, Ben Niu, Yinghui Zhang, Hui Li:
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication. Comput. Commun. 197: 214-229 (2023) - [j25]Yuanyuan Yang, Jin Cao, Ruhui Ma, Lifu Cheng, Lilan Chen, Ben Niu, Hui Li:
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks. IEEE Internet Things J. 10(15): 13959-13973 (2023) - [j24]Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng:
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. IEEE Trans. Dependable Secur. Comput. 20(5): 3572-3587 (2023) - [c50]Ben Niu, Xindi Wang, Likun Zhang, Shoukun Guo, Jin Cao, Fenghua Li:
A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning. GLOBECOM 2023: 4259-4264 - [c49]Likun Zhang, Yahong Chen, Ang Li, Binghui Wang, Yiran Chen, Fenghua Li, Jin Cao, Ben Niu:
Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation. WACV 2023: 4690-4698 - 2022
- [j23]Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang, Hui Li, Ben Niu:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. IEEE Trans. Dependable Secur. Comput. 19(1): 370-387 (2022) - [j22]Ben Niu, Yahong Chen, Zhibo Wang, Fenghua Li, Boyang Wang, Hui Li:
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks. IEEE Trans. Mob. Comput. 21(1): 125-138 (2022) - [j21]Ben Niu, Qinghua Li, Hanyi Wang, Guohong Cao, Fenghua Li, Hui Li:
A Framework for Personalized Location Privacy. IEEE Trans. Mob. Comput. 21(9): 3071-3083 (2022) - [j20]Wei Du, Ang Li, Pan Zhou, Ben Niu, Dapeng Wu:
PrivacyEye: A Privacy-Preserving and Computationally Efficient Deep Learning-Based Mobile Video Analytics System. IEEE Trans. Mob. Comput. 21(9): 3263-3279 (2022) - [c48]Zuquan Peng, Yuanyuan He, Zhe Sun, Jianbing Ni, Ben Niu, Xianjun Deng:
Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection. ICC 2022: 3118-3123 - [c47]Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Yuhang Xie, Chunhao Zheng:
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. INFOCOM Workshops 2022: 1-6 - [c46]Haiyang Luo, Zhe Sun, Yunqing Sun, Ang Li, Binghui Wang, Jin Cao, Ben Niu:
SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2340-2347 - [c45]Ben Niu, Zejun Zhou, Yahong Chen, Jin Cao, Fenghua Li:
DP-Opt: Identify High Differential Privacy Violation by Optimization. WASA (2) 2022: 406-416 - 2021
- [j19]Yilin Kang, Yong Liu, Ben Niu, Weiping Wang:
Weighted distributed differential privacy ERM: Convex and non-convex. Comput. Secur. 106: 102275 (2021) - [j18]Rongna Xie, Hui Li, Guozhen Shi, Yunchuan Guo, Ben Niu, Mang Su:
Provenance-based data flow control mechanism for Internet of things. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j17]Pan Zhou, Yulai Xie, Ben Niu, Lingjun Pu, Zichuan Xu, Hao Jiang, Huawei Huang:
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing. IEEE Trans. Netw. Sci. Eng. 8(1): 419-433 (2021) - [c44]Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li, Jin Cao:
AdaPDP: Adaptive Personalized Differential Privacy. INFOCOM 2021: 1-10 - 2020
- [j16]Weihao Li, Ben Niu, Jin Cao, Yurong Luo, Hui Li:
A personalized range-sensitive privacy-preserving scheme in LBSs. Concurr. Comput. Pract. Exp. 32(5) (2020) - [j15]Fenghua Li, Xinyu Wang, Ben Niu, Hui Li, Chao Li, Lihua Chen:
Exploiting location-related behaviors without the GPS data on smartphones. Inf. Sci. 527: 444-459 (2020) - [j14]Yuanyuan He, Jianbing Ni, Ben Niu, Fenghua Li, Xuemin (Sherman) Shen:
Privbus: A privacy-enhanced crowdsourced bus service via fog computing. J. Parallel Distributed Comput. 135: 156-168 (2020) - [j13]Fenghua Li, Peijie Yin, Yahong Chen, Ben Niu, Hui Li:
Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs. IEEE Wirel. Commun. 27(3): 31-37 (2020) - [j12]Hanyi Wang, Kun He, Ben Niu, Lihua Yin, Fenghua Li:
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission. Wirel. Commun. Mob. Comput. 2020: 8836351:1-8836351:10 (2020) - [c43]Ben Niu, Yahong Chen, Likun Zhang, Fenghua Li:
Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster. CNS 2020: 1-2 - [c42]Ben Niu, Likun Zhang, Yahong Chen, Ang Li, Wei Du, Jin Cao, Fenghua Li:
A Framework to Preserve User Privacy for Machine Learning as a Service. GLOBECOM 2020: 1-6 - [c41]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang, Ben Niu:
Towards compression-resistant privacy-preserving photo sharing on social networks. MobiHoc 2020: 81-90 - [c40]Haipeng Li, Ben Niu, Boyang Wang:
SmartSwitch: Efficient Traffic Obfuscation Against Stream Fingerprinting. SecureComm (1) 2020: 255-275 - [c39]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Ben Niu, Fenghua Li, Lihua Yin:
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. WCNC 2020: 1-7 - [c38]Ben Niu, Yahong Chen, Boyang Wang, Jin Cao, Fenghua Li:
Utility-aware Exponential Mechanism for Personalized Differential Privacy. WCNC 2020: 1-6 - [i3]Yilin Kang, Yong Liu, Ben Niu, Xinyi Tong, Likun Zhang, Weiping Wang:
Input Perturbation: A New Paradigm between Central and Local Differential Privacy. CoRR abs/2002.08570 (2020)
2010 – 2019
- 2019
- [j11]Jinbo Xiong, Jun Ren, Lei Chen, Zhiqiang Yao, Mingwei Lin, Dapeng Wu, Ben Niu:
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT. IEEE Internet Things J. 6(2): 1530-1540 (2019) - [c37]Fenghua Li, Zhe Sun, Ben Niu, Jin Cao, Hui Li:
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. ICNC 2019: 390-394 - [c36]Yurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. ICNC 2019: 418-424 - [c35]Yunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. ICNC 2019: 425-431 - [c34]Fenghua Li, Zhe Sun, Ang Li, Ben Niu, Hui Li, Guohong Cao:
HideMe: Privacy-Preserving Photo Sharing on Social Networks. INFOCOM 2019: 154-162 - [c33]Pu Yu, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. WCNC 2019: 1-7 - 2018
- [j10]Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Ben Niu:
HAC: Hybrid Access Control for Online Social Networks. Secur. Commun. Networks 2018: 7384194:1-7384194:11 (2018) - [j9]Yuanyuan He, Jianbing Ni, Xinyu Wang, Ben Niu, Fenghua Li, Xuemin Shen:
Privacy-Preserving Partner Selection for Ride-Sharing Services. IEEE Trans. Veh. Technol. 67(7): 5994-6005 (2018) - [c32]Fenghua Li, Yahong Chen, Ben Niu, Yuanyuan He, Kui Geng, Jin Cao:
Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services. GLOBECOM 2018: 1-6 - [c31]Yuanyuan He, Jianbing Ni, Ben Niu, Fenghua Li, Xuemin Sherman Shen:
Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach. WiOpt 2018: 1-8 - [i2]Fenghua Li, Hui Li, Ben Niu, Jinjun Chen:
Privacy Computing: Concept, Computing Framework And Future Development Trends. IACR Cryptol. ePrint Arch. 2018: 1145 (2018) - 2017
- [j8]En Zhang, Fenghua Li, Ben Niu, Yanchao Wang:
Server-aided private set intersection based on reputation. Inf. Sci. 387: 180-194 (2017) - [j7]Fenghua Li, Yuanyuan He, Ben Niu, Hui Li:
Small-world: Secure friend matching over physical world and social networks. Inf. Sci. 387: 205-220 (2017) - [c30]Weihao Li, Ben Niu, Hui Li:
Privacy Preservation Strategy in Time-Sensitive LBSs. DSC 2017: 488-493 - [c29]Fenghua Li, Xinyu Wang, Ben Niu, Hui Li, Chao Li, Lihua Chen:
TrackU: Exploiting User's Mobility Behavior via WiFi List. GLOBECOM 2017: 1-6 - [c28]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li:
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks. ICC 2017: 1-6 - [c27]Yuanyuan He, Kuan Zhang, Hanyi Wang, Fenghua Li, Ben Niu, Hui Li:
Impact factor-based group recommendation scheme with privacy preservation in MSNs. ICC 2017: 1-6 - [c26]Fenghua Li, Jiawen Liu, Liang Fang, Ben Niu, Kui Geng, Hui Li:
Pricing Privacy Leakage in Location-Based Services. WASA 2017: 406-418 - 2016
- [j6]Xiuguang Li, Yuanyuan He, Ben Niu, Kai Yang, Hui Li:
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks. Int. J. Technol. Hum. Interact. 12(2): 36-47 (2016) - [c25]Yuanyuan He, Fenghua Li, Ben Niu, Jiafeng Hua:
Achieving secure and accurate friend discovery based on friend-of-friend's recommendations. ICC 2016: 1-6 - [c24]Fenghua Li, Yuanyuan He, Ben Niu, Hui Li, Hanyi Wang:
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation. ICNC 2016: 1-6 - [c23]Ben Niu, Sheng Gao, Fenghua Li, Hui Li, Zongqing Lu:
Protection of location privacy in continuous LBSs against adversaries with background information. ICNC 2016: 1-6 - [c22]Yanchao Wang, Fenghua Li, Ben Niu, Rongna Xie:
Achieving lightweight, time-specific and secure access control in cloud storage. ICNC 2016: 1-5 - [c21]Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li:
Hunting abnormal configurations for permission-sensitive role mining. MILCOM 2016: 1004-1009 - [c20]Fenghua Li, Hanyi Wang, Ben Niu, Yuanyuan He, Jiafeng Hua, Hui Li:
A practical group matching scheme for privacy-aware users in mobile social networks. WCNC 2016: 1-6 - [c19]Fenghua Li, Sheng Wan, Ben Niu, Hui Li, Yuanyuan He:
Time obfuscation-based privacy-preserving scheme for location-based services. WCNC 2016: 1-6 - [c18]Fenghua Li, Sheng Wan, Ben Niu, Hui Li, Yuanyuan He:
Time obfuscation-based privacy-preserving scheme for Location-Based Services. WCNC Workshops 2016: 465-470 - 2015
- [j5]Ben Niu, Xiaoyan Zhu, Qinghua Li, Jie Chen, Hui Li:
A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49: 125-132 (2015) - [c17]Weihao Li, Ben Niu, Hui Li, Fenghua Li:
Privacy-preserving strategies in service quality aware Location-Based Services. ICC 2015: 7328-7334 - [c16]Ben Niu, Xiaoyan Zhu, Weihao Li, Hui Li, Yingjuan Wang, Zongqing Lu:
A personalized two-tier cloaking scheme for privacy-aware location-based services. ICNC 2015: 94-98 - [c15]Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Enhancing privacy through caching in location-based services. INFOCOM 2015: 1017-1025 - [c14]Ben Niu, Yuanyuan He, Fenghua Li, Hui Li:
Achieving secure friend discovery in social strength-aware PMSNs. MILCOM 2015: 947-953 - [c13]Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, Fangfang Shan:
Achieving Lightweight and Secure Access Control in Multi-authority Cloud. TrustCom/BigDataSE/ISPA (1) 2015: 459-466 - 2014
- [j4]Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li:
Privacy and Authentication Protocol for Mobile RFID Systems. Wirel. Pers. Commun. 77(3): 1713-1731 (2014) - [c12]Ben Niu, Zhengyan Zhang, Xiaoqing Li, Hui Li:
Privacy-area aware dummy generation algorithms for Location-Based Services. ICC 2014: 957-962 - [c11]Ben Niu, Qinghua Li, Xiaoyan Zhu, Hui Li:
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services. ICCCN 2014: 1-8 - [c10]Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Achieving k-anonymity in privacy-aware location-based services. INFOCOM 2014: 754-762 - [c9]Ben Niu, Xiaoyan Zhu, Weihao Li, Hui Li:
EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs. MASS 2014: 398-406 - [c8]Ben Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li, Hui Li:
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks. SecureComm (2) 2014: 33-40 - [i1]Ben Niu, Tanran Zhang, Xiaoyan Zhu, Hui Li, Zongqing Lu:
Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks. CoRR abs/1401.8064 (2014) - 2013
- [c7]Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, Hui Li:
MobiCache: When k-anonymity meets cache. GLOBECOM 2013: 820-825 - [c6]Ben Niu, Xiaoyan Zhu, Xiaosan Lei, Weidong Zhang, Hui Li:
EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services. GLOBECOM 2013: 2139-2144 - [c5]Ben Niu, Xiaoyan Zhu, Jie Liu, Zan Li, Hui Li:
Weight-aware private matching scheme for Proximity-based Mobile Social Networks. GLOBECOM 2013: 3170-3175 - [c4]Ben Niu, Xiaoyan Zhu, Tanran Zhang, Haotian Chi, Hui Li:
P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks. MASS 2013: 351-355 - [c3]Ben Niu, Xiaoyan Zhu, Hui Li:
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems. WCNC 2013: 1864-1869 - [c2]Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li:
3PLUS: Privacy-preserving pseudo-location updating system in location-based services. WCNC 2013: 4564-4569 - 2012
- [j3]Chao Lv, Hui Li, Jianfeng Ma, Ben Niu:
Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems. Int. J. Radio Freq. Identif. Technol. Appl. 4(1): 3-12 (2012) - [j2]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
A security enhanced authentication and key distribution protocol for wireless networks. Secur. Commun. Networks 5(4): 343-352 (2012) - [j1]Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
Security enhancement of the communication-efficient AUTHMAC_DH protocols. Secur. Commun. Networks 5(6): 674-680 (2012) - 2011
- [c1]Ben Niu, Hui Li, Xiaoyan Zhu, Chao Lv:
Security Analysis of Some Recent Authentication Protocols for RFID. CIS 2011: 665-669
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint