default search action
Hua Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Hua Ma 0001 — University Medical Center Rotterdam, Erasmus MC, Biomedical Imaging Group Rotterdam, Netherlands
- Hua Ma 0002 — Hunan Normal University, Department of Computer, Changsha, China (and 2 more)
- Hua Ma 0003 — University of Pittsburgh, Department of Biostatistics, Graduate School of Public Health, PA, USA
- Hua Ma 0004 — Air Force Engineering University, College of Science, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Lingnan Xia, Hua Ma:
Enhancing LoRA Model Serving Capacity via Adaptive Operator Scheduling for Multi-Tenancy on GPU. IEEE Access 12: 160441-160449 (2024) - [j39]Yifan Zhu, Huaibing Peng, Anmin Fu, Wei Yang, Hua Ma, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
Towards robustness evaluation of backdoor defense on quantized deep learning models. Expert Syst. Appl. 255: 124599 (2024) - [j38]Guohong Wang, Hua Ma, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Wei Kang, Said F. Al-Sarawi, Gongxuan Zhang, Derek Abbott:
One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning. Knowl. Based Syst. 288: 111456 (2024) - [j37]Yan Chen, Qiuling Tang, Hua Ma:
Multi-source adaptive meta-learning framework for domain generalization person re-identification. Soft Comput. 28(6): 4799-4820 (2024) - [j36]Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Jiliang Zhang, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Commercial Frameworks. IEEE Trans. Dependable Secur. Comput. 21(3): 1155-1172 (2024) - [j35]Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. IEEE Trans. Inf. Forensics Secur. 19: 104-119 (2024) - [j34]Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. IEEE Trans. Inf. Forensics Secur. 19: 455-468 (2024) - [j33]Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. IEEE Trans. Inf. Forensics Secur. 19: 2356-2369 (2024) - [c28]Hua Ma, Chengwen Zhao, Jun Ma:
Exploration of the effect of CDC20 in the diagnosis and prognosis of gastric cancer patients from a statistical and bioinformatics-based approach. BIC 2024 - [c27]Hua Ma, Shang Wang, Yansong Gao, Zhi Zhang, Huming Qiu, Minhui Xue, Alsharif Abuadbba, Anmin Fu, Surya Nepal, Derek Abbott:
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense. CCS 2024: 4465-4479 - [c26]Shishuai Wang, Hua Ma, Juan Antonio Hernández Tamames, Stefan Klein, Dirk H. J. Poot:
qMRI Diffuser: Quantitative T1 Mapping of the Brain Using a Denoising Diffusion Probabilistic Model. DGM4MICCAI@MICCAI 2024: 129-138 - [c25]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. SP 2024: 3311-3326 - [i16]Shishuai Wang, Hua Ma, Juan Antonio Hernández Tamames, Stefan Klein, Dirk H. J. Poot:
qMRI Diffusor: Quantitative T1 Mapping of the Brain using a Denoising Diffusion Probabilistic Model. CoRR abs/2407.16477 (2024) - 2023
- [j32]Wei Lu, Tien-Ping Tan, Hua Ma:
Bi-Branch Vision Transformer Network for EEG Emotion Recognition. IEEE Access 11: 36233-36243 (2023) - [j31]Hua Ma, Lingnan Xia:
Atrial Fibrillation Detection Algorithm Based on Graph Convolution Network. IEEE Access 11: 67191-67200 (2023) - [j30]Hua Ma, Xu Sun, Glyn Lawson, Qingfeng Wang, Yaorun Zhang:
Visualising emotion in support of patient-physician communication: an empirical study. Behav. Inf. Technol. 42(11): 1782-1800 (2023) - [j29]Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott:
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning. Comput. Secur. 133: 103406 (2023) - [j28]Huming Qiu, Hua Ma, Zhi Zhang, Yansong Gao, Yifeng Zheng, Anmin Fu, Pan Zhou, Derek Abbott, Said F. Al-Sarawi:
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network With IP Protection for Internet of Things. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1185-1198 (2023) - [c24]Danny Hynds, Dingding Zheng, Yilin Zhang, Hua Ma, Kirill Ragozin, George Chernyshov, Jamie A. Ward, Tatsuya Saito, Kai Kunze, Kouta Minamizawa:
Phantom Undulations: Remote Physiological Sensing in Abstract Installation Works. AHs 2023: 367-370 - [c23]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World. SRDS 2023: 82-92 - [i15]Qun Li, Chandra Thapa, Lawrence Ong, Yifeng Zheng, Hua Ma, Seyit Ahmet Çamtepe, Anmin Fu, Yansong Gao:
Vertical Federated Learning: Taxonomies, Threats, and Prospects. CoRR abs/2302.01550 (2023) - [i14]Wei Lu, Hua Ma, Tien-Ping Tan:
CIT-EmotionNet: CNN Interactive Transformer Network for EEG Emotion Recognition. CoRR abs/2305.05548 (2023) - [i13]Guohong Wang, Hua Ma, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Wei Kang, Said F. Al-Sarawi, Gongxuan Zhang, Derek Abbott:
One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning. CoRR abs/2309.04036 (2023) - [i12]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. CoRR abs/2309.11894 (2023) - [i11]Hua Ma, Shang Wang, Yansong Gao:
Horizontal Class Backdoor to Deep Learning. CoRR abs/2310.00542 (2023) - 2022
- [c22]Ayesha Nabila, Hua Ma, Junichi Yamaoka:
4D Embroidery: Implementing Parametric Structures in Textiles for Sculptural Embroidery. UbiComp/ISWC Adjunct 2022: 88-90 - [c21]Hua Ma, Junichi Yamaoka:
Smart Textile Using 3D Printed Conductive Sequins. TEI 2022: 73:1-73:7 - [c20]Hua Ma, Junichi Yamaoka:
SenSequins: Smart Textile Using 3D Printed Conductive Sequins. UIST 2022: 85:1-85:13 - [i10]Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World. CoRR abs/2201.08619 (2022) - [i9]Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. CoRR abs/2204.06273 (2022) - [i8]Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott:
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning. CoRR abs/2207.09080 (2022) - [i7]Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World. CoRR abs/2209.02339 (2022) - 2021
- [j27]Yufang He, Guochang Xu, Hermann Kaufmann, Jingtao Wang, Hua Ma, Tong Liu:
Integration of InSAR and LiDAR Technologies for a Detailed Urban Subsidence and Hazard Assessment in Shenzhen, China. Remote. Sens. 13(12): 2366 (2021) - [i6]Huming Qiu, Hua Ma, Zhi Zhang, Yifeng Zheng, Anmin Fu, Pan Zhou, Yansong Gao, Derek Abbott, Said F. Al-Sarawi:
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things. CoRR abs/2105.03822 (2021) - [i5]Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Models. CoRR abs/2108.09187 (2021) - [i4]Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Backdoor Detection. CoRR abs/2111.11157 (2021) - 2020
- [j26]Hua Ma, Guohua Tian, Linchao Zhang:
Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing. Int. J. Netw. Secur. 22(1): 24-35 (2020) - [j25]Qianlong Dang, Hua Ma, Zhenhua Liu, Ying Xie:
Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage. Int. J. Netw. Secur. 22(3): 460-473 (2020) - [j24]Guohua Tian, Hua Ma, Ying Xie, Zhenhua Liu:
Randomized deduplication with ownership management and data sharing in cloud storage. J. Inf. Secur. Appl. 51: 102432 (2020)
2010 – 2019
- 2019
- [j23]Hua Ma, Ying Xie, Jianfeng Wang, Guohua Tian, Zhenhua Liu:
Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems. IEEE Access 7: 89205-89217 (2019) - [j22]Enting Dong, Jianfeng Wang, Zhenhua Liu, Hua Ma:
Large universe multi-authority attribute-based PHR sharing with user revocation. Int. J. Comput. Sci. Eng. 19(3): 376-386 (2019) - [j21]Hua Ma, Linchao Zhang, Zhenhua Liu, Enting Dong:
Secure deduplication of encrypted data in online and offline environments. Int. J. High Perform. Comput. Netw. 14(3): 294-303 (2019) - 2018
- [j20]Lili Zhang, Yuqing Zhang, Hua Ma:
Privacy-Preserving and Dynamic Multi-Attribute Conjunctive Keyword Search Over Encrypted Cloud Data. IEEE Access 6: 34214-34225 (2018) - [j19]Ying Dong, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, Wenjie Wang:
An adaptive system for detecting malicious queries in web attacks. Sci. China Inf. Sci. 61(3): 032114:1-032114:16 (2018) - [j18]Hua Ma, Xiaoyu Han, Ting Peng, Linchao Zhang:
Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing. Int. J. Netw. Secur. 20(6): 1074-1084 (2018) - [j17]Yansong Gao, Hua Ma, Said F. Al-Sarawi, Derek Abbott, Damith Chinthana Ranasinghe:
PUF-FSM: A Controlled Strong PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(5): 1104-1108 (2018) - [c19]Hua Ma, Guohua Tian, Zhenhua Liu, Linchao Zhang:
Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage. FCS 2018: 168-176 - 2017
- [j16]Cuicui Bai, Yinghui Zhang, Hua Ma, Zhenhua Liu:
Expressive ciphertext-policy attribute-based encryption with direct user revocation. Int. J. Embed. Syst. 9(6): 495-504 (2017) - [j15]Hua Ma, Ting Peng, Zhenhua Liu:
Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe. Int. J. Netw. Secur. 19(2): 272-284 (2017) - [j14]Yansong Gao, Hua Ma, Derek Abbott, Said F. Al-Sarawi:
PUF Sensor: Exploiting PUF Unreliability for Secure Wireless Sensing. IEEE Trans. Circuits Syst. I Regul. Pap. 64-I(9): 2532-2543 (2017) - [c18]Hua Ma, Enting Dong, Zhenhua Liu, Linchao Zhang:
Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation. BWCCA 2017: 811-820 - [c17]Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma:
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. NSS 2017: 450-463 - [c16]Hua Ma, Yansong Gao, Omid Kavehei, Damith Chinthana Ranasinghe:
A PUF sensor: Securing physical measurements. PerCom Workshops 2017: 648-653 - [i3]Yansong Gao, Hua Ma, Gefei Li, Shaza Zeitouni, Said F. Al-Sarawi, Derek Abbott, Ahmad-Reza Sadeghi, Damith Chinthana Ranasinghe:
Exploiting PUF Models for Error Free Response Generation. CoRR abs/1701.08241 (2017) - [i2]Yansong Gao, Hua Ma, Said F. Al-Sarawi, Derek Abbott, Damith Chinthana Ranasinghe:
Detecting Recycled Commodity SoCs: Exploiting Aging-Induced SRAM PUF Unreliability. CoRR abs/1705.07375 (2017) - 2016
- [c15]Xuewei Yan, Hua Ma, Zhenhua Liu, Ting Peng:
Large Universe Revocable Fine-Grained Encryption with Public Auditing. BWCCA 2016: 823-830 - [c14]Linchao Zhang, Hua Ma, Zhenhua Liu, Enting Dong:
Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. BWCCA 2016: 839-846 - [c13]Yansong Gao, Gefei Li, Hua Ma, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott, Damith Chinthana Ranasinghe:
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices. PerCom Workshops 2016: 1-6 - 2015
- [j13]Qiang Tang, Hua Ma, Xiaofeng Chen:
Extend the Concept of Public Key Encryption with Delegated Search. Comput. J. 58(4): 724-734 (2015) - [j12]Yansheng Feng, Hua Ma, Xiaofeng Chen:
Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons. Intell. Autom. Soft Comput. 21(1): 51-63 (2015) - 2014
- [j11]Keying Li, Hua Ma:
Outsourcing Decryption of Multi-Authority ABE Ciphertexts. Int. J. Netw. Secur. 16(4): 286-294 (2014) - [j10]Keying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma:
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme. J. Internet Serv. Inf. Secur. 4(2): 70-82 (2014) - [c12]Haixin Nie, Hua Ma, Jianfeng Wang, Xiaofeng Chen:
Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution. BWCCA 2014: 572-577 - [c11]Pengliang Liu, Jianfeng Wang, Hua Ma, Haixin Nie:
Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE. BWCCA 2014: 584-589 - 2013
- [j9]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2): 667-684 (2013) - [j8]Lanhua Zhang, Hua Ma, Jing Sun, Wuli Song, Peng Zheng, Shaowei Xue:
Dynamic generating algorithm on path selection and optimisation in travel planning. Int. J. Comput. Appl. Technol. 48(3): 203-211 (2013) - [j7]Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen:
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing. J. Univers. Comput. Sci. 19(16): 2349-2367 (2013) - [c10]Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu:
Secure and Verifiable Outsourcing of Sequence Comparisons. ICT-EurAsia 2013: 243-252 - [c9]Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen:
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation. ICT-EurAsia 2013: 373-382 - [c8]Keying Li, Yinghui Zhang, Hua Ma:
Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure. INCoS 2013: 46-50 - 2012
- [j6]Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, Hui Zhu:
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. J. Internet Serv. Inf. Secur. 2(1/2): 49-58 (2012) - [j5]Yuanjie Zhao, Xiaofeng Chen, Hua Ma, Qiang Tang, Hui Zhu:
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 72-81 (2012) - [j4]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 61-71 (2012) - [i1]Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma:
Refine the Concept of Public Key Encryption with Delegated Search. IACR Cryptol. ePrint Arch. 2012: 654 (2012) - 2011
- [j3]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Provably secure multi-proxy signature scheme with revocation in the standard model. Comput. Commun. 34(3): 494-501 (2011) - 2010
- [j2]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Certificateless signcryption scheme in the standard model. Inf. Sci. 180(3): 452-464 (2010) - [c7]Fengrong Zhang, Yupu Hu, Hua Ma, Min Xie:
Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree. CIS 2010: 315-319
2000 – 2009
- 2009
- [c6]Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng:
Distributed Event-Triggered Trust Management for Wireless Sensor Networks. IAS 2009: 291-294 - [c5]Cui-e Chen, Shulin Wang, Ying Chen, Yang Meng, Hua Ma:
Analysis of Enterprise Workflow Solutions. ICIC (2) 2009: 680-687 - 2008
- [c4]Zhenhua Liu, Yupu Hu, Hua Ma:
Secure Proxy Multi-signature Scheme in the Standard Model. ProvSec 2008: 127-140 - 2007
- [j1]Bo Yang, Hua Ma, Shenglin Zhu:
A Traitor Tracing Scheme Based on the RSA System. Int. J. Netw. Secur. 5(2): 182-186 (2007) - 2005
- [c3]Hua Ma, Susan Darling Urban, Yang Xiao, Suzanne W. Dietrich:
GridPML: A Process Modeling Language and History Capture System for Grid Service Composition. ICEBE 2005: 433-440 - [c2]Suzanne W. Dietrich, Susan Darling Urban, Hua Ma, Yang Xiao, Shama Patel:
Exploring XML for data exchange in the context of an undergraduate database curriculum. SIGCSE 2005: 53-57 - 2001
- [c1]Hua Ma, Ashok K. Goel:
Simulation of GaAs MESFET devices using TCAD tools. CATA 2001: 458-461
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint