default search action
Weichao Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Wenju Yan, Weichao Wang, Hailong Li, Hao Chen, Fengyuan Yu, Dong Zhang, Hongwei Yang, Qing Wang:
Investigation on Different Stator Structures of the Axial-Radial Flux Switched Reluctance Motors. IEEE Trans. Ind. Electron. 71(6): 5474-5484 (2024) - [c61]Hongru Wang, Boyang Xue, Baohang Zhou, Rui Wang, Fei Mi, Weichao Wang, Yasheng Wang, Kam-Fai Wong:
UniRetriever: Multi-task Candidates Selection for Various Context-Adaptive Conversational Retrieval. LREC/COLING 2024: 17074-17086 - [c60]Md. Morshed Alam, A. B. M. Mohaimenur Rahman, Weichao Wang:
IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms. LANMAN 2024: 15-20 - [c59]Md. Morshed Alam, Israt Jahan, Weichao Wang:
IoTWarden: A Deep Reinforcement Learning Based Real-Time Defense System to Mitigate Trigger-Action IoT Attacks. WCNC 2024: 1-6 - [i11]Md. Morshed Alam, Israt Jahan, Weichao Wang:
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks. CoRR abs/2401.08141 (2024) - [i10]Boyang Xue, Hongru Wang, Weichao Wang, Rui Wang, Sheng Wang, Zeming Liu, Kam-Fai Wong:
A Comprehensive Study of Multilingual Confidence Estimation on Large Language Models. CoRR abs/2402.13606 (2024) - [i9]Hongru Wang, Boyang Xue, Baohang Zhou, Rui Wang, Fei Mi, Weichao Wang, Yasheng Wang, Kam-Fai Wong:
UniRetriever: Multi-task Candidates Selection for Various Context-Adaptive Conversational Retrieval. CoRR abs/2402.16261 (2024) - 2023
- [j27]Ganapathy Mani, Marina Haliem, Bharat K. Bhargava, Indu Manickam, Kevin Kochpatcharin, Myeongsu Kim, Eric D. Vugrin, Weichao Wang, Chris Jenkins, Pelin Angin, Meng Yu:
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense. IEEE Trans. Dependable Secur. Comput. 20(6): 4853-4867 (2023) - [c58]Bin Sun, Yitong Li, Fei Mi, Weichao Wang, Yiwei Li, Kan Li:
Towards Diverse, Relevant and Coherent Open-Domain Dialogue Generation via Hybrid Latent Variables. AAAI 2023: 13600-13608 - [c57]Prasad Calyam, Mayank Kejriwal, Praveen Rao, Jianlin Cheng, Weichao Wang, Linquan Bai, V. Sriram Siddhardh Nadendla, Sanjay Madria, Sajal K. Das, Rohit Chadha, Khaza Anuarul Hoque, Kannappan Palaniappan, Kiran Neupane, Roshan Lal Neupane, Sankeerth Gandhari, Mukesh Singhal, Lotfi Ben Othmane, Meng Yu, Vijay Anand, Bharat K. Bhargava, Brett Robertson, Kerk F. Kee, Patrice Buzzanell, Natalie A. Bolton, Harsh Taneja:
Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents. AIPR 2023: 1-8 - [c56]Boyang Xue, Weichao Wang, Hongru Wang, Fei Mi, Rui Wang, Yasheng Wang, Lifeng Shang, Xin Jiang, Qun Liu, Kam-Fai Wong:
Improving Factual Consistency for Knowledge-Grounded Dialogue Systems via Knowledge Enhancement and Alignment. EMNLP (Findings) 2023: 7829-7844 - [c55]Hongru Wang, Minda Hu, Yang Deng, Rui Wang, Fei Mi, Weichao Wang, Yasheng Wang, Wai-Chung Kwan, Irwin King, Kam-Fai Wong:
Large Language Models as Source Planner for Personalized Knowledge-grounded Dialogues. EMNLP (Findings) 2023: 9556-9569 - [c54]Sultan Alasmari, Weichao Wang, Aidong Lu, Yu Wang:
Protection of Network Security Selector Secrecy in Outsourced Network Testing. ICCCN 2023: 1-10 - [i8]Xiaozhe Ren, Pingyi Zhou, Xinfan Meng, Xinjing Huang, Yadao Wang, Weichao Wang, Pengfei Li, Xiaoda Zhang, Alexander Podolskiy, Grigory Arshinov, Andrey Bout, Irina Piontkovskaya, Jiansheng Wei, Xin Jiang, Teng Su, Qun Liu, Jun Yao:
PanGu-Σ: Towards Trillion Parameter Language Model with Sparse Heterogeneous Computing. CoRR abs/2303.10845 (2023) - [i7]Jianqiao Lu, Wanjun Zhong, Wenyong Huang, Yufei Wang, Fei Mi, Baojun Wang, Weichao Wang, Lifeng Shang, Qun Liu:
SELF: Language-Driven Self-Evolution for Large Language Model. CoRR abs/2310.00533 (2023) - [i6]Boyang Xue, Weichao Wang, Hongru Wang, Fei Mi, Rui Wang, Yasheng Wang, Lifeng Shang, Xin Jiang, Qun Liu, Kam-Fai Wong:
Improving Factual Consistency for Knowledge-Grounded Dialogue Systems via Knowledge Enhancement and Alignment. CoRR abs/2310.08372 (2023) - [i5]Hongru Wang, Minda Hu, Yang Deng, Rui Wang, Fei Mi, Weichao Wang, Yasheng Wang, Wai-Chung Kwan, Irwin King, Kam-Fai Wong:
Large Language Models as Source Planner for Personalized Knowledge-grounded Dialogue. CoRR abs/2310.08840 (2023) - 2022
- [j26]Weichao Wang, Wei Yang, Peng Zhou, Yulu Cui, Dong Wang, Minzan Li:
Development and performance test of a vehicle-mounted total nitrogen content prediction system based on the fusion of near-infrared spectroscopy and image information. Comput. Electron. Agric. 192: 106613 (2022) - [j25]Weichao Wang, Shi Feng, Kaisong Song, Daling Wang, Shifeng Li:
Informative and diverse emotional conversation generation with variational recurrent pointer-generator. Frontiers Comput. Sci. 16(5): 165326 (2022) - [j24]Akshay Ayyanchira, Elias Mahfoud, Weichao Wang, Aidong Lu:
Toward cross-platform immersive visualization for indoor navigation and collaboration with augmented reality. J. Vis. 25(6): 1249-1266 (2022) - [j23]Weichao Wang, Lei Jiang, Shiran Lin, Hui Fang, Qinggang Meng:
Imitation learning based decision-making for autonomous vehicle control at traffic roundabouts. Multim. Tools Appl. 81(28): 39873-39889 (2022) - [c53]Bin Sun, Shaoxiong Feng, Yiwei Li, Weichao Wang, Fei Mi, Yitong Li, Kan Li:
Modeling Complex Dialogue Mappings via Sentence Semantic Segmentation Guided Conditional Variational Auto-Encoder. EMNLP (Findings) 2022: 4140-4153 - [c52]Sultan Alasmari, Weichao Wang, Yu Wang:
Incentivisation of Outsourced Network Testing: View from Platform Perspective. ICISSP 2022: 499-506 - [c51]A. B. M. Mohaimenur Rahman, Pu Wang, Weichao Wang, Yu Wang:
PaWLA: PPG-based Weight Lifting Assessment. IPCCC 2022: 130-137 - [c50]Shahin Doroudian, Zekun Wu, Weichao Wang, Alexia Galati, Aidong Lu:
A Study of Real-time Information on User Behaviors during Search and Rescue (SAR) Training of Firefighters. VR Workshops 2022: 387-394 - [c49]Md. Morshed Alam, Md Sajidul Islam Sajid, Weichao Wang, Jinpeng Wei:
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms. WCNC 2022: 1695-1700 - [i4]Md. Morshed Alam, Md Sajidul Islam Sajid, Weichao Wang, Jinpeng Wei:
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms. CoRR abs/2202.04620 (2022) - [i3]Bin Sun, Shaoxiong Feng, Yiwei Li, Weichao Wang, Fei Mi, Yitong Li, Kan Li:
Modeling Complex Dialogue Mappings via Sentence Semantic Segmentation Guided Conditional Variational Auto-Encoder. CoRR abs/2212.00231 (2022) - [i2]Bin Sun, Yitong Li, Fei Mi, Weichao Wang, Yiwei Li, Kan Li:
Towards Diverse, Relevant and Coherent Open-Domain Dialogue Generation via Hybrid Latent Variables. CoRR abs/2212.01145 (2022) - 2021
- [j22]Md. Morshed Alam, Weichao Wang:
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement. J. Comput. Secur. 29(4): 423-446 (2021) - [j21]Weichao Wang, Shi Feng, Ling Chen, Daling Wang, Yifei Zhang:
Learning to improve persona consistency in conversation generation with information augmentation. Knowl. Based Syst. 228: 107246 (2021) - [j20]Peng Zhou, Wei Yang, Minzan Li, Weichao Wang:
A New Coupled Elimination Method of Soil Moisture and Particle Size Interferences on Predicting Soil Total Nitrogen Concentration through Discrete NIR Spectral Band Data. Remote. Sens. 13(4): 762 (2021) - [j19]Ting Li, Zhijin Qiu, Lijuan Cao, Dazhao Cheng, Weichao Wang, Xinghua Shi, Yu Wang:
Privacy-Preserving Participant Grouping for Mobile Social Sensing Over Edge Clouds. IEEE Trans. Netw. Sci. Eng. 8(2): 865-880 (2021) - [c48]Weichao Wang, Wei Gao, Shi Feng, Ling Chen, Daling Wang:
Adaptive Posterior Knowledge Selection for Improving Knowledge-Grounded Dialogue Generation. CIKM 2021: 1989-1998 - [c47]Weichao Wang, Naoto Yorino, Yutaka Sasaki, Yoshifumi Zoka, Ahmed Bedawy, Seiji Kawauchi:
Adaptive Model Predictive-Based Load Frequency Controller using Unscented Kalman Filter. ISGT Asia 2021: 1-5 - [c46]Akshay Murari, Elias Mahfoud, Weichao Wang, Aidong Lu:
Cross-Platform Immersive Visualization and Navigation with Augmented Reality. VINCI 2021: 12:1-12:9 - [i1]Md. Morshed Alam, Weichao Wang:
A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement. CoRR abs/2107.01678 (2021) - 2020
- [j18]Sultan Alasmari, Weichao Wang, Tuanfa Qin, Yu Wang:
Proof of outsourced encryption: cross verification of security service level agreement. CCF Trans. Netw. 3(3-4): 229-244 (2020) - [j17]Weichao Wang, Tuanfa Qin, Yu Wang:
Encryption-free data transmission and hand-over in two-tier body area networks. Comput. Methods Programs Biomed. 192: 105411 (2020) - [c45]Sultan Alasmari, Weichao Wang, Yu Wang:
Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing. ICCNS 2020: 52-59 - [c44]Shifeng Li, Shi Feng, Daling Wang, Kaisong Song, Yifei Zhang, Weichao Wang:
EmoElicitor: An Open Domain Response Generation Model with User Emotional Reaction Awareness. IJCAI 2020: 3637-3643 - [c43]Weichao Wang, Lei Jiang, Shiran Lin, Hui Fang, Qinggang Meng:
Deep Learning-Based Decision Making for Autonomous Vehicle at Roundabout. TAROS 2020: 134-137 - [c42]Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang:
A Cue Adaptive Decoder for Controllable Neural Response Generation. WWW 2020: 2570-2576
2010 – 2019
- 2019
- [j16]Weichao Wang, Zhaopeng Meng, Zan Wang, Shuang Liu, Jianye Hao:
LoopFix: an approach to automatic repair of buggy loops. J. Syst. Softw. 156: 100-112 (2019) - [j15]Hanshang Li, Ting Li, Weichao Wang, Yu Wang:
Dynamic Participant Selection for Large-Scale Mobile Crowd Sensing. IEEE Trans. Mob. Comput. 18(12): 2842-2855 (2019) - [c41]Wubin Ma, Rui Wang, Weichao Wang, Su Deng, Hongbin Huang, Tao Zhang, Jibin Wu:
Inverted-file R-tree Index Nodes Clustering Based on Multi-objective Optimization. CEC 2019: 3341-3347 - [c40]Sultan Alasmari, Weichao Wang, Tuanfa Qin, Yu Wang:
Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing. DSC 2019: 1-8 - [c39]Weichao Wang, Shi Feng, Daling Wang, Yifei Zhang:
Answer-guided and Semantic Coherent Question Generation in Open-domain Conversation. EMNLP/IJCNLP (1) 2019: 5065-5075 - [c38]Liping Xie, Weichao Wang, Yu Wang:
Equipment Contention Attack in Cloud Manufacturing Environments and Its Defense. ICC 2019: 1-6 - [c37]Weichao Wang, Quang A. Nguyen, Wubin Ma, Jiefei Wei, Paul Wai Hing Chung, Qinggang Meng:
Multi-Grid based decision making at Roundabout for Autonomous Vehicles. ICVES 2019: 1-6 - 2018
- [j14]Florence Martin, Chuang Wang, Teresa M. Petty, Weichao Wang, Patti Wilkins:
Middle School Students' Social Media Use. J. Educ. Technol. Soc. 21(1): 213-224 (2018) - [c36]Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang:
Personalized Microblog Sentiment Classification via Adversarial Cross-lingual Multi-task Learning. EMNLP 2018: 338-348 - [c35]Weichao Wang, Qinggang Meng, Paul Wai Hing Chung:
Camera Based Decision Making at Roundabouts for Autonomous Vehicles. ICARCV 2018: 1460-1465 - 2017
- [c34]Penglin Dong, Weichao Wang, Xinghua Shi, Tuanfa Qin:
Lightweight Key Management for Group Communication in Body Area Networks through Physical Unclonable Functions. CHASE 2017: 102-107 - [c33]Liping Xie, Weichao Wang, Xinghua Shi, Tuanfa Qin:
Lightweight mutual authentication among sensors in body area networks through Physical Unclonable Functions. ICC 2017: 1-6 - [c32]Ting Li, Taeho Jung, Hanshang Li, Lijuan Cao, Weichao Wang, Xiang-Yang Li, Yu Wang:
Scalable privacy-preserving participant selection in mobile crowd sensing. PerCom 2017: 59-68 - 2016
- [c31]Xiongwei Xie, Weichao Wang:
Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware. SCC@AsiaCCS 2016: 10-16 - [c30]Liping Xie, Weichao Wang, Tuanfa Qin:
Lightweight Detection of On-Body Sensor Impersonator in Body Area Networks. CHASE 2016: 95-100 - [c29]Zhen Feng, Mingwei Xu, Yuan Yang, Yu Wang, Qing Li, Weichao Wang:
Optimizing content delivery in ICN networks by the supply chain model. IPCCC 2016: 1-8 - [c28]Hanshang Li, Ting Li, Fan Li, Weichao Wang, Yu Wang:
Enhancing participant selection through caching in mobile crowd sensing. IWQoS 2016: 1-10 - 2015
- [c27]Xiongwei Xie, Weichao Wang, Tuanfa Qin:
Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines. ICCCN 2015: 1-8 - 2014
- [j13]Xiongwei Xie, Weichao Wang:
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding. J. Ubiquitous Syst. Pervasive Networks 5(1): 1-8 (2014) - [j12]Weichao Wang, Yishan Wu, Yuntao Pan:
An investigation of collaborations between top Chinese universities: a new quantitative approach. Scientometrics 98(2): 1535-1545 (2014) - 2013
- [c26]Xiongwei Xie, Weichao Wang:
Rootkit detection on virtual machines through deep information extraction at hypervisor-level. CNS 2013: 498-503 - [c25]Xiongwei Xie, Weichao Wang:
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding. EUSPN/ICTH 2013: 430-435 - [c24]Rodney Owens, Weichao Wang:
Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing. ICCCN 2013: 1-5 - [c23]Long Li, Haiyan Zhao, Wei Zhang, Weichao Wang:
An Action-Stack Based Selective-Undo Method in Feature Model Customization. ICSR 2013: 295-301 - 2012
- [j11]Zhiwei Li, Weichao Wang:
Node localization through physical layer network coding: Bootstrap, security, and accuracy. Ad Hoc Networks 10(7): 1267-1277 (2012) - [c22]Zhiwei Li, Weichao Wang:
Towards the attacker's view of protocol narrations (or, how to compile security protocols). AsiaCCS 2012: 44-45 - 2011
- [j10]Aidong Lu, Weichao Wang, Abhishek Dnyate, Xianlin Hu:
Sybil Attack Detection through Global Topology Pattern Visualization. Inf. Vis. 10(1): 32-46 (2011) - [j9]Li Yu, Lane Harrison, Aidong Lu, Zhiwei Li, Weichao Wang:
3D Digital Legos for Teaching Security Protocols. IEEE Trans. Learn. Technol. 4(2): 125-137 (2011) - [c21]Zhiwei Li, Weichao Wang:
Rethinking about guessing attacks. AsiaCCS 2011: 316-325 - [c20]Julio J. Valdés, Catherine Cheung, Weichao Wang:
Evolutionary computation methods for helicopter loads estimation. IEEE Congress on Evolutionary Computation 2011: 1589-1596 - [c19]Julio J. Valdés, Catherine Cheung, Weichao Wang:
Computational intelligence methods for helicopter loads estimation. IJCNN 2011: 1864-1871 - [c18]Rodney Owens, Weichao Wang:
Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines. IPCCC 2011: 1-8 - [c17]Rodney Owens, Weichao Wang:
Non-normalizable functions: A new method to generate metamorphic malware. MILCOM 2011: 1279-1284 - [c16]Rodney Owens, Weichao Wang:
Fingerprinting large data sets through memory de-duplication technique in virtual machines. MILCOM 2011: 1363-1368 - 2010
- [c15]Weichao Wang, Di Pu, Alexander M. Wyglinski:
Detecting Sybil nodes in wireless networks with physical layer network coding. DSN 2010: 21-30 - [c14]Zhiwei Li, Di Pu, Weichao Wang, Alexander M. Wyglinski:
Node Localization in Wireless Networks through Physical Layer Network Coding. GLOBECOM 2010: 1-5 - [c13]Zhiwei Li, Weichao Wang:
Rethinking about Type-Flaw Attacks. GLOBECOM 2010: 1-5 - [c12]Zhiwei Li, Weichao Wang:
Deciding Recognizability under Dolev-Yao Intruder Model. ISC 2010: 416-429 - [c11]Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang, Xintao Wu:
Interactive detection of network anomalies via coordinated multiple views. VizSEC 2010: 91-101
2000 – 2009
- 2009
- [j8]Kang Zhang, Weichao Wang, Jae-Ho Han, Jin U. Kang:
A Surface Topology and Motion Compensation System for Microsurgery Guidance and Intervention Based on Common-Path Optical Coherence Tomography. IEEE Trans. Biomed. Eng. 56(9): 2318-2321 (2009) - [c10]Weichao Wang, Zhiwei Li, Rodney Owens, Bharat K. Bhargava:
Secure and efficient access to outsourced data. CCSW 2009: 55-66 - 2008
- [j7]Weichao Wang, Jiejun Kong, Bharat K. Bhargava, Mario Gerla:
Visualisation of wormholes in underwater sensor networks: a distributed approach. Int. J. Secur. Networks 3(1): 10-23 (2008) - [c9]Weichao Wang, Yu Wang:
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks. ICC 2008: 1695-1699 - 2007
- [j6]Weichao Wang, Tylor Stransky:
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network. Comput. Networks 51(15): 4303-4321 (2007) - [j5]Weichao Wang, Aidong Lu:
Interactive wormhole detection and evaluation. Inf. Vis. 6(1): 3-17 (2007) - 2006
- [j4]Joseph B. Evans, Weichao Wang, Benjamin J. Ewy:
Wireless networking security: open issues in trust, management, interoperation and measurement. Int. J. Secur. Networks 1(1/2): 84-94 (2006) - [j3]Yi Lu, Weichao Wang, Bharat K. Bhargava, Dongyan Xu:
Trust-based privacy preservation for peer-to-peer data sharing. IEEE Trans. Syst. Man Cybern. Part A 36(3): 498-502 (2006) - [j2]Weichao Wang, Bharat K. Bhargava, Yi Lu, Xiaoxin Wu:
Defending against wormhole attacks in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6: 483-503 (2006) - [c8]Jianxue Wang, Weichao Wang, Xifan Wang, Haoyong Chen, Xiuli Wang:
Cooperative Co-evolutionary Approach Applied in Reactive Power Optimization of Power System. ICNC (1) 2006: 620-628 - [c7]Weichao Wang, Aidong Lu:
Interactive Wormhole Detection in Large Scale Wireless Networks. IEEE VAST 2006: 99-106 - [c6]Weichao Wang, Aidong Lu:
Visualization assisted detection of sybil attacks in wireless networks. VizSEC 2006: 51-60 - 2005
- [b1]Weichao Wang:
Securing wireless network topology and routing. Purdue University, USA, 2005 - [c5]Weichao Wang, Bharat K. Bhargava:
Key distribution and update for secure inter-group multicast communication. SASN 2005: 43-52 - [c4]Jiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive L. Bagrodia, Bharat K. Bhargava:
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. Workshop on Wireless Security 2005: 87-96 - 2004
- [j1]Bharat K. Bhargava, Xiaoxin Wu, Yi Lu, Weichao Wang:
Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA). Mob. Networks Appl. 9(4): 393-408 (2004) - [c3]Weichao Wang, Bharat K. Bhargava:
Visualization of wormholes in sensor networks. Workshop on Wireless Security 2004: 51-60 - 2003
- [c2]Weichao Wang, Yi Lu, Bharat K. Bhargava:
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks. PerCom 2003: 179-186 - [c1]Yi Lu, Weichao Wang, Yuhui Zhong, Bharat K. Bhargava:
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks. PerCom 2003: 187-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint