default search action
Micah Sherr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Micah Sherr, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2024(1): 1-4 (2024) - [j23]Micah Sherr, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2024(2): 1-4 (2024) - [j22]Micah Sherr, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2024(3): 1-3 (2024) - [j21]Micah Sherr, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2024(4): 1-4 (2024) - [c73]Lucy Simko, Adryana Hutchinson, Alvin Isaac, Evan Fries, Micah Sherr, Adam J. Aviv:
"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion. CCS 2024: 2681-2695 - [c72]Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen:
On Precisely Detecting Censorship Circumvention in Real-World Networks. NDSS 2024 - [c71]Rahel A. Fainchtein, Micah Sherr:
You Can Find Me Here: A Study of the Early Adoption of Geofeeds. PAM (2) 2024: 228-245 - [c70]Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka:
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts. SOUPS @ USENIX Security Symposium 2024: 353-372 - [c69]Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich:
NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge. SP 2024: 3497-3514 - [c68]Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung:
SpotProxy: Rediscovering the Cloud for Censorship Circumvention. USENIX Security Symposium 2024 - [i8]Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Alivia Castor, Micah Sherr, Muthuramakrishnan Venkitasubramaniam:
SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security. IACR Cryptol. ePrint Arch. 2024: 1821 (2024) - 2023
- [j20]Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2023(1): 1-4 (2023) - [j19]Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2023(2): 1-4 (2023) - [j18]Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2023(3): 1-4 (2023) - [j17]Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2023(4): 1-4 (2023) - [c67]Harel Berger, Micah Sherr, Adam J. Aviv:
Cadence: A Simulator for Human Movement-based Communication Protocols. CSET @ USENIX Security Symposium 2023: 26-31 - [c66]David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr:
Educators' Perspectives of Using (or Not Using) Online Exam Proctoring. USENIX Security Symposium 2023: 5091-5108 - [i7]David G. Balash, Rahel A. Fainchtein, Elena Korkes, Miles Grant, Micah Sherr, Adam J. Aviv:
Educators' Perspectives of Using (or Not Using) Online Exam Proctoring. CoRR abs/2302.12936 (2023) - 2022
- [j16]Ryan Wails, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, Micah Sherr:
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs. Proc. Priv. Enhancing Technol. 2022(3): 179-199 (2022) - [j15]Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr:
Accountable Private Set Cardinality for Distributed Measurement. ACM Trans. Priv. Secur. 25(4): 25:1-25:35 (2022) - [c65]Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr:
User Perceptions of the Privacy and Usability of Smart DNS. ACSAC 2022: 591-604 - [i6]Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr:
Accountable Private Set Cardinality for Distributed Measurement. CoRR abs/2206.15068 (2022) - 2021
- [j14]Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr, Stephen Ribaudo, Armaan Khullar:
Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proc. Priv. Enhancing Technol. 2021(2): 151-172 (2021) - [j13]Logan Arkema, Micah Sherr:
Residue-Free Computing. Proc. Priv. Enhancing Technol. 2021(4): 389-405 (2021) - [c64]David G. Balash, Dongkun Kim, Darikia Shaibekova, Rahel A. Fainchtein, Micah Sherr, Adam J. Aviv:
Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services. SOUPS @ USENIX Security Symposium 2021: 633-652 - [i5]David G. Balash, Dongkun Kim, Darikia Shaibekova, Rahel A. Fainchtein, Micah Sherr, Adam J. Aviv:
Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services. CoRR abs/2106.05917 (2021) - 2020
- [c63]Zhao Zhang, Wenchao Zhou, Micah Sherr:
Bypassing Tor Exit Blocking with Exit Bridge Onion Services. CCS 2020: 3-16 - [c62]Zhao Zhang, Tavish Vaidya, Kartik Subramanian, Wenchao Zhou, Micah Sherr:
Ephemeral Exit Bridges for Tor. DSN 2020: 253-265 - [i4]Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr, Stephen Ribaudo, Armaan Khullar:
Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. CoRR abs/2012.07944 (2020)
2010 – 2019
- 2019
- [j12]Rob Jansen, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson:
KIST: Kernel-Informed Socket Transport for Tor. ACM Trans. Priv. Secur. 22(1): 3:1-3:37 (2019) - [c61]Tavish Vaidya, Tim Walsh, Micah Sherr:
Whisper: a unilateral defense against VoIP traffic re-identification attacks. ACSAC 2019: 286-296 - [c60]Tavish Vaidya, Daniel Votipka, Michelle L. Mazurek, Micah Sherr:
Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility. CHI 2019: 525 - [c59]Tavish Vaidya, Micah Sherr:
You Talk Too Much: Limiting Privacy Exposure Via Voice Input. IEEE Symposium on Security and Privacy Workshops 2019: 84-91 - [c58]Rob Jansen, Tavish Vaidya, Micah Sherr:
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. USENIX Security Symposium 2019: 1823-1840 - 2018
- [c57]Akshaya Mani, Tavish Vaidya, David Dworken, Micah Sherr:
An Extensive Evaluation of the Internet's Open Proxies. ACSAC 2018: 252-265 - [c56]Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
DeDoS: Defusing DoS with Dispersion Oriented Software. ACSAC 2018: 712-722 - [c55]Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr:
Understanding Tor Usage with Privacy-Preserving Measurement. Internet Measurement Conference 2018: 175-187 - [i3]Akshaya Mani, Tavish Vaidya, David Dworken, Micah Sherr:
An Extensive Evaluation of the Internet's Open Proxies. CoRR abs/1806.10258 (2018) - [i2]Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr:
Understanding Tor Usage with Privacy-Preserving Measurement. CoRR abs/1809.08481 (2018) - 2017
- [j11]Yuankai Zhang, Adam O'Neill, Micah Sherr, Wenchao Zhou:
Privacy-preserving Network Provenance. Proc. VLDB Endow. 10(11): 1550-1561 (2017) - [c54]Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr:
Distributed Measurement with Private Set-Union Cardinality. CCS 2017: 2295-2312 - [c53]Akshaya Mani, Micah Sherr:
HisTorε: Differentially Private and Robust Statistics Collection for Tor. NDSS 2017 - [c52]Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers. SIGCOMM Posters and Demos 2017: 71-73 - [c51]Tavish Vaidya, Eric William Burger, Micah Sherr, Clay Shields:
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers. CSET @ USENIX Security Symposium 2017 - 2016
- [j10]Dong Lin, Micah Sherr, Boon Thau Loo:
Scalable and Anonymous Group Communication with MTor. Proc. Priv. Enhancing Technol. 2016(2): 22-39 (2016) - [j9]Henry Tan, Micah Sherr, Wenchao Zhou:
Data-plane Defenses against Routing Attacks on Tor. Proc. Priv. Enhancing Technol. 2016(4): 276-293 (2016) - [j8]Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo:
Private and Verifiable Interdomain Routing Decisions. IEEE/ACM Trans. Netw. 24(2): 1011-1024 (2016) - [c50]Janet Zhu, Sicong Zhang, Lisa Singh, Grace Hui Yang, Micah Sherr:
Generating risk reduction recommendations to decrease vulnerability of public online profiles. ASONAM 2016: 411-416 - [c49]Brendan Sheridan, Micah Sherr:
On Manufacturing Resilient Opaque Constructs Against Static Analysis. ESORICS (2) 2016: 39-58 - [c48]Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
Dispersing Asymmetric DDoS Attacks with SplitStack. HotNets 2016: 197-203 - [c47]Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, Wenchao Zhou:
Hidden Voice Commands. USENIX Security Symposium 2016: 513-530 - 2015
- [j7]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. J. Comput. Secur. 23(2): 167-195 (2015) - [c46]Lisa Singh, Grace Hui Yang, Micah Sherr, Andrew Hian-Cheong, Kevin Tian, Janet Zhu, Sicong Zhang:
Public Information Exposure Detection: Helping Users Understand Their Web Footprints. ASONAM 2015: 153-161 - [c45]W. Brad Moore, Henry Tan, Micah Sherr, Marcus A. Maloof:
Multi-class Traffic Morphing for Encrypted VoIP Communication. Financial Cryptography 2015: 65-85 - [c44]Tavish Vaidya, Micah Sherr:
Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones. Security Protocols Workshop 2015: 80-90 - [c43]Tavish Vaidya, Micah Sherr:
Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion). Security Protocols Workshop 2015: 91-104 - [c42]Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields:
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. WOOT 2015 - [c41]Lisa Singh, Grace Hui Yang, Micah Sherr, Yifang Wei, Andrew Hian-Cheong, Kevin Tian, Janet Zhu, Sicong Zhang, Tavish Vaidya, Elchin Asgarli:
Helping Users Understand Their Web Footprints. WWW (Companion Volume) 2015: 117-118 - 2014
- [j6]Micah Sherr, Harjot Gill, Taher Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
The design and implementation of the A3 application-aware anonymity platform. Comput. Networks 58: 206-227 (2014) - [j5]Adam J. Aviv, Matt Blaze, Micah Sherr, Jonathan M. Smith:
Privacy-aware message exchanges for HumaNets. Comput. Commun. 48: 30-43 (2014) - [c40]Jeremy T. Fineman, Calvin C. Newport, Micah Sherr, Tonghe Wang:
Fair Maximal Independent Sets. IPDPS 2014: 712-721 - [c39]Henry Tan, Chris Wacek, Calvin C. Newport, Micah Sherr:
A Disruption-Resistant MAC Layer for Multichannel Wireless Networks. OPODIS 2014: 202-216 - [c38]Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, Wenchao Zhou:
Detecting Covert Timing Channels with Time-Deterministic Replay. OSDI 2014: 541-554 - [c37]Henry Tan, Micah Sherr:
Censorship Resistance as a Side-Effect. Security Protocols Workshop 2014: 221-226 - [c36]Henry Tan, Micah Sherr:
Censorship Resistance as a Side-Effect (Transcript of Discussion). Security Protocols Workshop 2014: 227-238 - [c35]Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul F. Syverson:
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport. USENIX Security Symposium 2014: 127-142 - [e2]Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, Micah Sherr:
Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014. ACM 2014, ISBN 978-1-4503-3005-3 [contents] - 2013
- [c34]Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou:
Validating web content with senser. ACSAC 2013: 339-348 - [c33]Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul F. Syverson:
Users get routed: traffic correlation on tor by realistic adversaries. CCS 2013: 337-348 - [c32]Chris Wacek, Henry Tan, Kevin S. Bauer, Micah Sherr:
An Empirical Evaluation of Relay Selection in Tor. NDSS 2013 - [c31]John Ferro, Lisa Singh, Micah Sherr:
Identifying individual vulnerability based on public data. PST 2013: 119-126 - [c30]W. Brad Moore, Yifang Wei, Adam Orshefsky, Micah Sherr, Lisa Singh, Hui Yang:
Understanding Site-Based Inference Potential for Identifying Hidden Attributes. SocialCom 2013: 570-577 - [e1]Chris Kanich, Micah Sherr:
6th Workshop on Cyber Security Experimentation and Test, CSET '13, Washington, D.C., USA, August 12, 2013. USENIX Association 2013 [contents] - 2012
- [j4]Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr:
Distributed Time-aware Provenance. Proc. VLDB Endow. 6(2): 49-60 (2012) - [c29]Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith:
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. ESORICS 2012: 181-198 - [c28]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. NDSS 2012 - [c27]Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao, William R. Marczak, Micah Sherr, Anduo Wang, Wenchao Zhou:
Recent Advances in Declarative Networking. PADL 2012: 1-16 - [c26]Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo:
Private and verifiable interdomain routing decisions. SIGCOMM 2012: 383-394 - [c25]Henry Tan, Nazli Goharian, Micah Sherr:
$100, 000 prize jackpot. call now!: identifying the pertinent features of SMS spam. SIGIR 2012: 1175-1176 - [c24]Sandy Clark, Chris Wacek, Matt Blaze, Boon Thau Loo, Micah Sherr, Clay Shields, Jonathan M. Smith:
Collaborative Red Teaming for Anonymity System Evaluation. CSET 2012 - 2011
- [c23]W. Brad Moore, Chris Wacek, Micah Sherr:
Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise. ACSAC 2011: 207-216 - [c22]Alexander J. T. Gurney, Andreas Haeberlen, Wenchao Zhou, Micah Sherr, Boon Thau Loo:
Having your cake and eating it too: routing security with privacy protections. HotNets 2011: 15 - [c21]Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr:
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems. SIGMOD Conference 2011: 1323-1326 - [c20]Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, Micah Sherr:
Secure network provenance. SOSP 2011: 295-310 - [c19]Kevin S. Bauer, Micah Sherr, Dirk Grunwald:
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. CSET 2011 - [r1]Micah Sherr:
Eavesdropping. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 378-379 - 2010
- [c18]Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, Insup Lee:
Towards a data-centric view of cloud security. CloudDB@CIKM 2010: 25-32 - [c17]Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
A3: An Extensible Platform for Application-Aware Anonymity. NDSS 2010 - [c16]Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo, Yun Mao:
Efficient querying and maintenance of network provenance at internet-scale. SIGMOD Conference 2010: 615-626 - [c15]William R. Marczak, Shan Shan Huang, Martin Bravenboer, Micah Sherr, Boon Thau Loo, Molham Aref:
SecureBlox: customizable secure distributed data processing. SIGMOD Conference 2010: 723-734 - [c14]Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith:
Evading Cellular Data Monitoring with Human Movement Networks. HotSec 2010
2000 – 2009
- 2009
- [c13]Micah Sherr, Matt Blaze:
Application containers without virtual machines. VMSec@CCS 2009: 39-42 - [c12]Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, Matt Blaze:
Can they hear me now?: a security analysis of law enforcement wiretaps. CCS 2009: 512-523 - [c11]Micah Sherr, Matt Blaze, Boon Thau Loo:
Scalable Link-Based Relay Selection for Anonymous Routing. Privacy Enhancing Technologies 2009: 73-93 - [c10]Micah Sherr, Matt Blaze, Boon Thau Loo:
Veracity: Practical Secure Network Coordinates via Vote-based Agreements. USENIX ATC 2009 - 2008
- [j3]Eric Cronin, Micah Sherr, Matt Blaze:
On the (un)reliability of eavesdropping. Int. J. Secur. Networks 3(2): 103-113 (2008) - [c9]Micah Sherr, Boon Thau Loo, Matt Blaze:
Veracity: a fully decentralized service for securing network coordinate systems. IPTPS 2008: 15 - [c8]Adam J. Aviv, Pavol Cerný, Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Matt Blaze:
Security Evaluation of ES&S Voting Machines and Election Management System. EVT 2008 - 2007
- [c7]Micah Sherr, Eric Cronin, Matt Blaze:
Measurable Security through Isotropic Channels. Security Protocols Workshop 2007: 3-12 - [c6]Micah Sherr:
Measurable Security through Isotropic Channels (Transcript of Discussion). Security Protocols Workshop 2007: 13-19 - [c5]Micah Sherr, Boon Thau Loo, Matt Blaze:
Towards Application-Aware Anonymous Routing. HotSec 2007 - 2006
- [c4]Eric Cronin, Micah Sherr, Matt Blaze:
On the Reliability of Network Eavesdropping Tools. IFIP Int. Conf. Digital Forensics 2006: 199-213 - [c3]Madhukar Anand, Eric Cronin, Micah Sherr, Zachary G. Ives, Insup Lee:
Sensor Network Security: More Interesting Than You Think. HotSec 2006 - [i1]Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan:
Security Protocols with Isotropic Channels. IACR Cryptol. ePrint Arch. 2006: 396 (2006) - 2005
- [j2]Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze:
Signaling Vulnerabilities in Wiretapping Systems. IEEE Secur. Priv. 3(6): 13-25 (2005) - [c2]Eric Cronin, Micah Sherr, Matt Blaze:
Listen Too Closely and You May Be Confused. Security Protocols Workshop 2005: 245-249 - 2002
- [j1]Mark G. Weiner, Micah Sherr, Abigail Cohen:
Metadata tables to enable dynamic data modeling and web interface design: the SEER example. Int. J. Medical Informatics 65(1): 51-58 (2002) - 2001
- [c1]Mark G. Weiner, Micah Sherr, Abigail Cohen:
Metadata Tables to Enable Dynamic Data Modeling and Web Interface Design: The SEER Example. AMIA 2001
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint