Lejun Zhang
Applied Filters
- Lejun Zhang
- AuthorRemove filter
People
Colleagues
- Lejun Zhang (14)
- Zilong Jin (5)
- Yansen Su (4)
- Huiling Chen (3)
- Jing Qiu (3)
- Zhihong Tian (3)
- Guangxia Xu (2)
- Ran Guo (2)
- Shen Su (2)
- Alex X Liu (1)
- Endong Tong (1)
- Intae Ryoo (1)
- Jiqiang Liu (1)
- Mohsen H Guizani (1)
- Sami Bourouis (1)
- Tie Qiu (1)
- Wenjia Niu (1)
- Xiaojiang Du (1)
- Xuehua Zhao (1)
- Zhen Han (1)
Publication
Journal/Magazine Names
- Computer Networks: The International Journal of Computer and Telecommunications Networking (2)
- Computers in Biology and Medicine (2)
- IEEE Wireless Communications (2)
- Security and Communication Networks (2)
- Transactions on Emerging Telecommunications Technologies (2)
- Expert Systems with Applications: An International Journal (1)
- IEEE Network: The Magazine of Global Internetworking (1)
- International Journal of Intelligent Systems (1)
- Wireless Communications & Mobile Computing (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation
Yalun Wu
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China
,Yingxiao Xiang
Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
,Endong Tong
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China
,Yuqi Ye
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China
,Zhibo Cui
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China
,Yunzhe Tian
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China
,Lejun Zhang
Cyberspace Institute Advanced Technology, Guangzhou University, Guangzhou, China
,Jiqiang Liu
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China
,Zhen Han
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China
,Wenjia Niu
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China
IEEE Network: The Magazine of Global Internetworking, Volume 38, Issue 3•May 2024, pp 63-69 • https://doi.org/10.1109/MNET.2024.3366232Pedestrian detection plays a crucial role in autonomous driving by identifying the position, size, orientation, and dynamic features of pedestrians in images or videos, assisting autonomous vehicles in making better decisions and controls. It’s ...
- 1Citation
MetricsTotal Citations1
- research-article
ICRB: An improved consensus‐based redactable blockchain considering contextual consistency
Lejun Zhang
College of Information Engineering Yangzhou University Yangzhou China
Research and Development Center for E‐Learning Ministry of Education Beijing China
Cyberspace Institute Advanced Technology Guangzhou University Guangzhou China
Pazhou Lab Guangzhou China
,Chendong Zhu
College of Information Engineering Yangzhou University Yangzhou China
,Zhihong Tian
Cyberspace Institute Advanced Technology Guangzhou University Guangzhou China
,Yuan Liu
Cyberspace Institute Advanced Technology Guangzhou University Guangzhou China
,Jing Qiu
Cyberspace Institute Advanced Technology Guangzhou University Guangzhou China
,Shen Su
Cyberspace Institute Advanced Technology Guangzhou University Guangzhou China
,Guangxia Xu
Cyberspace Institute Advanced Technology Guangzhou University Guangzhou China
,Ran Guo
School of Physics and Materials Science Guangzhou University Guangzhou China
Transactions on Emerging Telecommunications Technologies, Volume 35, Issue 1•January 2024 • https://doi.org/10.1002/ett.4906AbstractBlockchain is a distributed ledger proposed by Satoshi Nakamoto. It has become one of the most important networks for humans in the world. With the rapid development of blockchain technology, an increasing number of criminals are engaging in ...
We proposed an improved consensus‐based redactable blockchain considering contextual consistency. In our scheme, we introduce security deposit into the architecture of blockchain to maintain the contextual consistency. Verifiable Secret Sharing and ...
- 0Citation
MetricsTotal Citations0
- research-article
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning
Ximing Chen
Guangzhou University,China
,Jing Qiu
Guangzhou University,China
,Fasheng Zhou
Guangzhou University,China
,Hui Lu
Guangzhou University,China
,Lejun Zhang
Guangzhou University,China
,Zhihong Tian
Guangzhou University,China
,Xiaojiang Du
Stevens Institute of Technology,USA
,Mohsen Guizani
Mohamed Bin Zayed University of Artificial Intelligence,UAE
IEEE Wireless Communications, Volume 30, Issue 5•October 2023, pp 96-103 • https://doi.org/10.1109/MWC.008.2300006Metaverse is a multidimensional virtual world that integrates digital twin space technology. It is an interactive and integrative process with the physical world, involving virtualization and digitization of the real world. The high demands of the ...
- 0Citation
MetricsTotal Citations0
- research-article
A Quantum-Behaved Heterogeneous Topology Optimization Model For Optical Wireless Communication Networks
Songwei Zhang
Tianjin University,China
,Fu Xiao
Nanjing University of Posts and Tele-communications,China
,Lejun Zhang
Guangzhou University,China
,Fengbiao Zan
Qinghai Nationalities University,China
,Tie Qiu
Tianjin University,China
IEEE Wireless Communications, Volume 30, Issue 5•October 2023, pp 68-73 • https://doi.org/10.1109/MWC.005.2300073Optical wireless communication technology has become an effective supplementary access method in the future 6G communication due to its advantages of high bandwidth and low cost. However, the limited communication distance and unfavorable weather ...
- 0Citation
MetricsTotal Citations0
- research-article
Dispersed differential hunger games search for high dimensional gene data feature selection
Zhiqing Chen
School of Intelligent Manufacturing, Wenzhou Polytechnic, Wenzhou, 325035, China
,Li Xinxian
Wenzhou Vocational College of Science and Technology, Wenzhou, 325006, China
,Ran Guo
Cyberspace Institute Advanced Technology, Guangzhou University, Guangzhou, 510006, China
,Lejun Zhang
Cyberspace Institute Advanced Technology, Guangzhou University, Guangzhou, 510006, China
College of Information Engineering, Yangzhou University, Yangzhou, 225127, China
Research and Development Center for E-Learning, Ministry of Education, Beijing, 100039, China
,Sami Dhahbi
Department of Computer Science, College of Science and Art at Mahayil, King Khalid University, Muhayil, Aseer, 62529, Saudi Arabia
,Sami Bourouis
Department of Information Technology, College of Computers and Information Technology, Taif University, P.O.Box 11099, Taif, 21944, Saudi Arabia
,Lei Liu
College of Computer Science, Sichuan University, Chengdu, Sichuan, 610065, China
,Xianchuan Wang
Information Technology Center, Wenzhou Medical University, Wenzhou, 325035, China
Computers in Biology and Medicine, Volume 163, Issue C•Sep 2023 • https://doi.org/10.1016/j.compbiomed.2023.107197AbstractThe realms of modern medicine and biology have provided substantial data sets of genetic roots that exhibit a high dimensionality. Clinical practice and associated processes are primarily dependent on data-driven decision-making. However, the ...
Highlights- We propose a novel method based on HGS with disperse foraging and differential crossover mechanisms named DDHGS.
- The history trajectory, balance and diversity analysis test demonstrate the effect of DDHGS.
- The new method ...
- 0Citation
MetricsTotal Citations0
- research-article
A covert channel over blockchain based on label tree without long waiting times
Zhujun Wang
College of Information Engineering, Yangzhou University, Yangzhou, 225127, China
,Lejun Zhang
College of Information Engineering, Yangzhou University, Yangzhou, 225127, China
The Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Research and Development Center for ELearning, Ministry of Education, Beijing, 100039, China
Quanzhou Normal University, Quanzhou 362000, China
,Ran Guo
School of Physics and Materials Science, Guangzhou University, Guangzhou 510006, China
,Guopeng Wang
Research and Development Center for ELearning, Ministry of Education, Beijing, 100039, China
,Jing Qiu
The Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
,Shen Su
The Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
,Yuan Liu
The Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
,Guangxia Xu
The Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
,Zhihong Tian
The Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 232, Issue C•Aug 2023 • https://doi.org/10.1016/j.comnet.2023.109843AbstractBlockchain, as a decentralized database, provides natural anonymity and tamper-resistance, safeguarding the identity of both parties in covert communication and preventing malicious third parties from tampering with secret messages. Compared to ...
- 0Citation
MetricsTotal Citations0
- research-article
Dual-scale similarity-guided cycle generative adversarial network for unsupervised low-dose CT denoising
Feixiang Zhao
College of Nuclear Technology and Automation Engineering, Chengdu University of Technology, Chengdu, 610000, China
,Mingzhe Liu
College of Nuclear Technology and Automation Engineering, Chengdu University of Technology, Chengdu, 610000, China
School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325000, China
,Zhihong Gao
Department of Big Data in Health Science, First Affiliated Hospital of Wenzhou Medical University, Wenzhou, 325000, China
,Xin Jiang
School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325000, China
,Ruili Wang
School of Mathematical and Computational Science, Massey University, Auckland, 0632, New Zealand
,Lejun Zhang
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, 510006, China
College of Information Engineering, Yangzhou University, Yangzhou, 225127, China
Computers in Biology and Medicine, Volume 161, Issue C•Jul 2023 • https://doi.org/10.1016/j.compbiomed.2023.107029AbstractRemoving the noise in low-dose CT (LDCT) is crucial to improving the diagnostic quality. Previously, many supervised or unsupervised deep learning-based LDCT denoising algorithms have been proposed. Unsupervised LDCT denoising algorithms are more ...
Highlights- For high-quality unsupervised LDCT denoising, we propose dual-scale similarity-guided cycle generative adversarial network. We design the similarity-guided discrimination loss for the network, which can guarantee effective removal of noise ...
- 3Citation
MetricsTotal Citations3
- research-article
Smart contract vulnerability detection combined with multi-objective detection
Lejun Zhang
Cyberspace Institute Advanced Technology, Guangzhou University, Guangzhou, 510006, China
College of Information Engineering, Yangzhou University, Yangzhou, 225127, China
Research and Development Center for E-Learning, Ministry of Education, Beijing, 100039, China
,Jinlong Wang
College of Information Engineering, Yangzhou University, Yangzhou, 225127, China
,Weizheng Wang
Computer Science Department, City University of Hong Kong, Hong Kong
,Zilong Jin
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, 21004, China
,Yansen Su
Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei 230601, China
,Huiling Chen
Department of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou 325035, China
Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 217, Issue C•Nov 2022 • https://doi.org/10.1016/j.comnet.2022.109289AbstractBlockchains have been booming in recent years. As a decentralized system architecture, smart contracts give blockchains a user-defined logic. A smart contract is an executable program that can automatically carry out transactions on ...
- 12Citation
MetricsTotal Citations12
- research-article
Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing
Lejun Zhang
College of Information Engineering Yangzhou University Yangzhou China
School of Mathematics & Computer Science Quanzhou Normal University Quanzhou China
,Minghui Peng
College of Information Engineering Yangzhou University Yangzhou China
,Weizheng Wang
Computer Science Department City University of Hong Kong Hong Kong Hong Kong
,Zilong Jin
School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
,Yansen Su
Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology Anhui University Hefei China
,Huiling Chen
Department of Computer Science and Artificial Intelligence Wenzhou University Wenzhou China
Transactions on Emerging Telecommunications Technologies, Volume 32, Issue 10•October 2021 • https://doi.org/10.1002/ett.4315AbstractWith the rapid development of Internet of Things (IoT) technology, IoT devices have been widely used to collect physiological health data and provide diversified services to the terminal users. However, traditional data storage and sharing scheme ...
IoT devices submit data and share of keys. Trusted proxy nodes implement data signatures and homomorphic encryption to ensure data integrity and protect privacy, at the same time, this scheme reduces the burden of resource‐constrained IoT devices. ...
- 8Citation
MetricsTotal Citations8
- research-article
An approach of covert communication based on the Ethereum whisper protocol in blockchain
Lejun Zhang
College of Information Engineering Yangzhou University Yangzhou China
School Mathematics and Computer Science Quanzhou Normal University Quanzhou China
,Zhijie Zhang
College of Information Engineering Yangzhou University Yangzhou China
,Zilong Jin
School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
,Yansen Su
Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology Anhui University Hefei China
,Zhuzhu Wang
School of Cyber Engineering Xidian University Xi'an China
International Journal of Intelligent Systems, Volume 36, Issue 2•February 2021, pp 962-996 • https://doi.org/10.1002/int.22327AbstractThe traditional covert communication that relies on a central node is vulnerable to detection and attack. Applying blockchain to covert communication can improve the channel's anti‐interference and antitampering. Whisper is the communication ...
- 5Citation
MetricsTotal Citations5
- research-article
A Research on Traceability Technology of Agricultural Products Supply Chain Based on Blockchain and IPFS
- Xiu-Bo Chen,
- Lejun Zhang
College of Information EngineeringYangzhou UniversityYangzhou 225127Chinayzu.edu.cn
Cyberspace Institute Advanced TechnologyGuangzhou UniversityGuangzhou 510006Chinagzhu.edu.cn
, - Weimin Zeng
College of Information EngineeringYangzhou UniversityYangzhou 225127Chinayzu.edu.cn
, - Zilong Jin
School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjing 21004Chinanuist.edu.cn
, - Yansen Su
Key Laboratory of Intelligent Computing and Signal Processing of Ministry of EducationSchool of Computer Science and TechnologyAnhui UniversityHefei 230601Chinaahu.edu.cn
, - Huiling Chen
Department of Computer Science and Artificial IntelligenceWenzhou UniversityWenzhou 325035Chinawzu.edu.cn
Blockchain technology, the fundamental technology of Bitcoin, is featured with high transparency, decentralization, traceability, tamperproof nature, and anonymousness. In this thesis, a case study of the traceability of agricultural products is to ...
- 1Citation
MetricsTotal Citations1
- research-article
Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies
Hao Chen
College of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou 325035, China
,Ali Asghar Heidari
School of Surveying and Geospatial Engineering, College of Engineering, University of Tehran, Tehran, Iran
Department of Computer Science, School of Computing, National University of Singapore, Singapore, Singapore
,Xuehua Zhao
School of Digital Media, Shenzhen Institute of Information Technology, Shenzhen, 518172, China
,Lejun Zhang
College of Information Engineering, Yangzhou University, Yangzhou, 225127, China
,Huiling Chen
College of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou 325035, China
Expert Systems with Applications: An International Journal, Volume 144, Issue C•Apr 2020 • https://doi.org/10.1016/j.eswa.2019.113113Highlights- Orthogonal learning, multi-population, and greedy selection are embedded into sine cosine algorithm.
AbstractSine cosine algorithm (SCA) is a widely used nature-inspired algorithm that is simple in structure and involves only a few parameters. For some complex tasks, especially high-dimensional problems and multimodal problems, the basic ...
- 23Citation
MetricsTotal Citations23
- research-article
An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment
Xiaolong Xu,
Sa Math
Department of Software ConvergenceSoonchunhyang UniversityAsan-siChungcheongnam-do 31538Republic of Koreasch.ac.kr
,Lejun Zhang
Department of Information EngineeringYangzhou UniversityYangzhou 225127Chinayzu.edu.cn
,Seokhoon Kim
Department of Computer Software EngineeringSoonchunhyang UniversityAsan-siChungcheongnam-do 31538Republic of Koreasch.ac.kr
,Intae Ryoo
Department of Computer EngineeringKyung Hee UniversityGwangju-si17104 Gyeonggi-DoRepublic of Koreakhu.ac.kr
The existence of Mobile Edge Computing (MEC) provides a novel and great opportunity to enhance user quality of service (QoS) by enabling local communication. The 5th generation (5G) communication is consisting of massive connectivity at the Radio Access ...
- 2Citation
MetricsTotal Citations2
- research-article
EESS: An Energy-Efficient Spectrum Sensing Method by Optimizing Spectrum Sensing Node in Cognitive Radio Sensor Networks
Naixue Xiong,
Alex Liu
Dept. of Computer Science and Engineering Michigan State University 428 S Shaw Ln MI 48824 USA msu.edu
,Lejun Zhang
College of Information Engineering Yangzhou University 196 Huayang West Rd Yangzhou 225127 China yzu.edu.cn
,Yu Qiao
School of Computer and Software Nanjing University of Information Science and Technology 219 Ningliu Rd Nanjing 210044 China nuist.edu.cn
,Zilong Jin
School of Computer and Software Nanjing University of Information Science and Technology 219 Ningliu Rd Nanjing 210044 China nuist.edu.cn
Dept. of Computer Science and Engineering Michigan State University 428 S Shaw Ln MI 48824 USA msu.edu
In cognitive radio sensor networks (CRSNs), the sensor devices which are enabled to perform dynamic spectrum access have to frequently sense the licensed channel to find idle channels. The behavior of spectrum sensing will consume a lot of battery power ...
- 1Citation
MetricsTotal Citations1
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner