default search action
Adam J. Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Pranut Jain, Andrew Xu, Thomas Downes, Injung Kim, Talha Khan, Jacob T. Biehl, Adam J. Lee:
Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive Exposure. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-32 (2024) - [j16]Andrew Xu, Jacob T. Biehl, Adam J. Lee:
Getting it Just Right: Towards Balanced Utility, Privacy, and Equity in Shared Space Sensing. ACM Trans. Internet Things 5(2): 14:1-14:26 (2024) - [c81]Injung Kim, Adam J. Lee:
"I know what you did last semester": Understanding Privacy Expectations and Preferences in the Smart Campus. CHI 2024: 980:1-980:15 - 2023
- [j15]Pranut Jain, Rosta Farzan, Adam J. Lee:
Co-Designing with Users the Explanations for a Proactive Auto-Response Messaging Agent. Proc. ACM Hum. Comput. Interact. 7(MHCI): 1-23 (2023) - 2022
- [j14]Imtiaz Ahmad, Taslima Akter, Zachary Buher, Rosta Farzan, Apu Kapadia, Adam J. Lee:
Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-31 (2022) - [j13]Sabid Bin Habib Pias, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, Adam J. Lee:
Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-30 (2022) - [j12]Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise:
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud. ACM Trans. Priv. Secur. 25(1): 2:1-2:37 (2022) - [c80]Pranut Jain, Rosta Farzan, Adam J. Lee:
Laila is in a Meeting: Design and Evaluation of a Contextual Auto-Response Messaging Agent. Conference on Designing Interactive Systems 2022: 1457-1471 - 2021
- [j11]Pranut Jain, Rosta Farzan, Adam J. Lee:
Context-based Automated Responses of Unavailability in Mobile Messaging. Comput. Support. Cooperative Work. 30(3): 307-349 (2021) - [c79]Jacob T. Biehl, Ravi Patel, Adam J. Lee:
Improving Medication Adherence Behaviors Through Personalized, Technology-Powered Interventions. IUI Workshops 2021 - 2020
- [j10]Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, Adam J. Lee:
Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum. Comput. Interact. 4(CSCW2): 116:1-116:28 (2020) - [j9]Jacob T. Biehl, Adam J. Lee, Gerry Filby:
Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial use. Pers. Ubiquitous Comput. 24(5): 551-569 (2020) - [c78]Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise:
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization. AsiaCCS 2020: 208-221 - [c77]Marian Zaki, Adam J. Lee, Panos K. Chrysanthis:
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems. DBSec 2020: 118-136 - [c76]Pranut Jain, Henrique Pötter, Adam J. Lee, Daniel Mossé:
MAFIA: Multi-layered Architecture For IoT-based Authentication. TPS-ISA 2020: 199-208
2010 – 2019
- 2019
- [c75]Pranut Jain, Rosta Farzan, Adam J. Lee:
Are You There?: Identifying Unavailability in Mobile Messaging. CHI Extended Abstracts 2019 - [c74]Cory Thoma, Adam J. Lee, Alexandros Labrinidis:
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems. CODASPY 2019: 243-254 - [c73]Cory Thoma, Alexandros Labrinidis, Adam J. Lee:
Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems. DBSec 2019: 261-280 - [c72]Judicael Briand Djoko, Jack Lange, Adam J. Lee:
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX. DSN 2019: 401-413 - [c71]Ekaterina B. Dimitrova, Panos K. Chrysanthis, Adam J. Lee:
Authorization-aware optimization for multi-provider queries. SAC 2019: 431-438 - [c70]Pranut Jain, Rosta Farzan, Adam J. Lee:
Adaptive Modelling of Attentiveness to Messaging: A Hybrid Approach. UMAP 2019: 261-270 - [e3]Florian Kerschbaum, Atefeh Mashatan, Jianwei Niu, Adam J. Lee:
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019. ACM 2019, ISBN 978-1-4503-6753-0 [contents] - 2018
- [c69]Lauren Thomson, Adam J. Lee, Rosta Farzan:
Ephemeral Communication and Communication Places - What Influences College-Aged Negotiation of Instant Messaging Usage Within App Ecosystems? iConference 2018: 132-138 - [c68]Adam J. Lee, Jacob T. Biehl, Conor Curry:
Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms. SACMAT 2018: 105-116 - 2017
- [c67]Adam J. Lee:
16th Workshop on Privacy in the Electronic Society (WPES 2017). CCS 2017: 2643-2644 - [c66]Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J. Lee, Kami Vaniea:
Was my message read?: Privacy and Signaling on Facebook Messenger. CHI 2017: 3838-3842 - [c65]Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J. Lee, Kami Vaniea:
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks. CSCW 2017: 555-566 - [e2]Bhavani Thuraisingham, Adam J. Lee:
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017. ACM 2017, ISBN 978-1-4503-5175-1 [contents] - 2016
- [c64]Judicael Briand Djoko, Brandon Jennings, Adam J. Lee:
TPRIVEXEC: Private Execution in Virtual Memory. CODASPY 2016: 285-294 - [c63]Jianwei Niu, Yier Jin, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang:
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. SACMAT 2016: 49-50 - [c62]Cory Thoma, Adam J. Lee, Alexandros Labrinidis:
PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing. SACMAT 2016: 227-238 - [c61]William C. Garrison III, Adam Shull, Steven A. Myers, Adam J. Lee:
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud. IEEE Symposium on Security and Privacy 2016: 819-838 - [i5]William C. Garrison III, Adam Shull, Adam J. Lee, Steven A. Myers:
Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version). CoRR abs/1602.09069 (2016) - 2015
- [c60]Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, Adam J. Lee:
Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback. CHI 2015: 1415-1418 - [c59]Cory Thoma, Adam J. Lee, Alexandros Labrinidis:
CryptStream: Cryptographic Access Controls for Streaming Data. CODASPY 2015: 163-165 - [c58]William C. Garrison III, Adam J. Lee:
Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations. CSF 2015: 18-32 - [c57]Jacob T. Biehl, Adam J. Lee, Gerry Filby, Matthew Cooper:
You're where? prove it!: towards trusted indoor location estimation of mobile devices. UbiComp 2015: 909-919 - [c56]N. R. Ong, S. E. Rojcewicz, Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
Interactive preference-aware query optimization. ICDE 2015: 1512-1515 - [c55]Adam J. Lee, Konstantinos Pelechrinis, Demetrios Zeinalipour-Yazti:
Human Mobility Computing and Privacy: Fad or Reality? MDM (2) 2015: 42-43 - [c54]Nick R. Katsipoulakis, Cory Thoma, Eric A. Gratta, Alexandros Labrinidis, Adam J. Lee, Panos K. Chrysanthis:
CE-Storm: Confidential Elastic Processing of Data Streams. SIGMOD Conference 2015: 859-864 - [e1]Edgar R. Weippl, Florian Kerschbaum, Adam J. Lee:
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015. ACM 2015, ISBN 978-1-4503-3556-0 [contents] - [i4]William C. Garrison III, Adam J. Lee:
Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations (Extended Version). CoRR abs/1504.07948 (2015) - 2014
- [j8]Eleanor Gilbert Rieffel, Jacob T. Biehl, Adam J. Lee, William van Melle:
Private aggregation for presence streams. Future Gener. Comput. Syst. 31: 169-181 (2014) - [j7]Marian Kamal Iskander, Tucker Trainor, Dave W. Wilkinson, Adam J. Lee, Panos K. Chrysanthis:
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions. IEEE Trans. Parallel Distributed Syst. 25(2): 417-426 (2014) - [c53]Sameer Patil, Roman Schlegel, Apu Kapadia, Adam J. Lee:
Reflection or action?: how feedback and control affect location sharing decisions. CHI 2014: 101-110 - [c52]William C. Garrison III, Yechen Qiao, Adam J. Lee:
On the suitability of dissemination-centric access control systems for group-centric sharing. CODASPY 2014: 1-12 - [c51]Cory Thoma, Alexandros Labrinidis, Adam J. Lee:
Automated operator placement in distributed Data Stream Management Systems subject to user constraints. ICDE Workshops 2014: 310-316 - [c50]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
PAQO: Preference-aware query optimization for decentralized database systems. ICDE 2014: 424-435 - [c49]William C. Garrison III, Adam J. Lee, Timothy L. Hinrichs:
An actor-based, application-aware access control evaluation framework. SACMAT 2014: 199-210 - 2013
- [j6]Jacob T. Biehl, Eleanor Gilbert Rieffel, Adam J. Lee:
When privacy and utility are in harmony: towards better design of presence technologies. Pers. Ubiquitous Comput. 17(3): 503-518 (2013) - [j5]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
PAQO: A Preference-Aware Query Optimizer for PostgreSQL. Proc. VLDB Endow. 6(12): 1334-1337 (2013) - [c48]Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao:
Insured access: an approach to ad-hoc information sharing for virtual organizations. CODASPY 2013: 301-308 - [c47]Timothy L. Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee, Alessandro Panebianco, Lenore D. Zuck:
Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness. CSF 2013: 145-160 - [c46]Andrew K. Adams, Adam J. Lee:
Combining social authentication and untrusted clouds for private location sharing. SACMAT 2013: 15-24 - [c45]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
Enabling intensional access control via preference-aware query optimization. SACMAT 2013: 189-192 - [c44]Xi Gong, Ting Yu, Adam J. Lee:
Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems. WAIM 2013: 643-648 - [i3]William C. Garrison III, Adam J. Lee, Timothy L. Hinrichs:
The Design and Demonstration of an Actor-Based, Application-Aware Access Control Evaluation Framework. CoRR abs/1302.1134 (2013) - 2012
- [c43]Sameer Patil, Gregory Norcie, Apu Kapadia, Adam J. Lee:
"Check out where I am!": location-sharing motivations, preferences, and practices. CHI Extended Abstracts 2012: 1997-2002 - [c42]Xi Gong, Ting Yu, Adam J. Lee:
Bounding trust in reputation systems with incomplete information. CODASPY 2012: 125-132 - [c41]Marian Kamal Iskander, Adam J. Lee, Daniel Mossé:
Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs. CollaborateCom 2012: 107-116 - [c40]Sameer Patil, Yann Le Gall, Adam J. Lee, Apu Kapadia:
My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules. Financial Cryptography Workshops 2012: 86-97 - [c39]Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone:
Policy Administration in Tag-Based Authorization. FPS 2012: 162-179 - [c38]William C. Garrison III, Adam J. Lee, Timothy L. Hinrichs:
The need for application-aware access control evaluation. NSPW 2012: 115-126 - [c37]Yann Le Gall, Adam J. Lee, Apu Kapadia:
PlexC: a policy language for exposure control. SACMAT 2012: 219-228 - [c36]Sameer Patil, Gregory Norcie, Apu Kapadia, Adam J. Lee:
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. SOUPS 2012: 5 - 2011
- [c35]Kazuhiro Minami, Nikita Borisov, Marianne Winslett, Adam J. Lee:
Confidentiality-preserving proof theories for distributed proof systems. AsiaCCS 2011: 145-154 - [c34]Andrew K. Adams, Adam J. Lee, Daniel Mossé:
Receipt-mode trust negotiation: efficient authorization through outsourced interactions. AsiaCCS 2011: 430-434 - [c33]Xi Gong, Ting Yu, Adam J. Lee:
Poster: on trust evaluation with missing information in reputation systems. CCS 2011: 773-776 - [c32]Eleanor Gilbert Rieffel, Jacob T. Biehl, Bill van Melle, Adam J. Lee:
Secured histories for presence systems. CTS 2011: 446-456 - [c31]Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu:
Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. ESORICS 2011: 628-647 - [c30]Marian Kamal Iskander, Dave W. Wilkinson, Adam J. Lee, Panos K. Chrysanthis:
Enforcing Policy and Data Consistency of Cloud Transactions. ICDCS Workshops 2011: 253-262 - [c29]Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders, John C. Mitchell:
TBA : A Hybrid of Logic and Extensional Access Control Systems. Formal Aspects in Security and Trust 2011: 198-213 - [c28]Roman Schlegel, Apu Kapadia, Adam J. Lee:
Eyeing your exposure: quantifying and controlling information sharing for improved privacy. SOUPS 2011: 14 - [r2]Adam J. Lee:
Credential-Based Access Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 271-272 - [r1]Brian Wongchaowart, Adam J. Lee:
Trust Management. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1320-1323 - 2010
- [j4]Adam J. Lee, Kazuhiro Minami, Marianne Winslett:
On the consistency of distributed proofs with hidden subtrees. ACM Trans. Inf. Syst. Secur. 13(3): 25:1-25:32 (2010) - [c27]Adam J. Lee, Ting Yu, Yann Le Gall:
Effective trust management through a hybrid logical and relational approach. AsiaCCS 2010: 169-179 - [c26]Brian Wongchaowart, Adam J. Lee:
Oblivious enforcement of hidden information release policies. AsiaCCS 2010: 324-327 - [c25]Marian Kamal Iskander, Adam J. Lee, Daniel Mossé:
Privacy and robustness for data aggregation in wireless sensor networks. CCS 2010: 699-701 - [c24]Adam J. Lee, Ting Yu:
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. CSF 2010: 139-153 - [c23]Lujo Bauer, Adam J. Lee:
Solving the access-control puzzle: finding the pieces and putting them together. SACMAT 2010: 159-160 - [c22]Nicholas L. Farnan, Adam J. Lee, Ting Yu:
Investigating privacy-aware distributed query evaluation. WPES 2010: 43-52 - [i2]Eleanor Gilbert Rieffel, Jacob T. Biehl, William van Melle, Adam J. Lee:
Secured histories: computing group statistics on encrypted data while preserving individual privacy. CoRR abs/1012.2152 (2010)
2000 – 2009
- 2009
- [c21]Adam J. Lee, Kazuhiro Minami, Nikita Borisov:
Confidentiality-preserving distributed proofs of conjunctive queries. AsiaCCS 2009: 287-297 - [c20]Marianne Winslett, Adam J. Lee, Kenneth J. Perano:
Trust negotiation: authorization for virtual organizations. CSIIRW 2009: 43 - [c19]Adam J. Lee, Marianne Winslett, Kenneth J. Perano:
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation. IFIPTM 2009: 176-195 - [c18]Adam J. Lee, Ting Yu:
Towards a dynamic and composable model of trust. SACMAT 2009: 217-226 - 2008
- [b1]Adam J. Lee:
Towards Practical and Secure Decentralized Attribute -Based Authorization Systems. University of Illinois Urbana-Champaign, USA, 2008 - [j3]Adam J. Lee, Ting Yu:
Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007). SIGMOD Rec. 37(1): 56-58 (2008) - [j2]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
The Traust Authorization Service. ACM Trans. Inf. Syst. Secur. 11(1): 2:1-2:33 (2008) - [j1]Adam J. Lee, Marianne Winslett:
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems. ACM Trans. Inf. Syst. Secur. 12(2): 8:1-8:33 (2008) - [c17]Adam J. Lee, Marianne Winslett:
Towards an efficient and language-agnostic compliance checker for trust negotiation systems. AsiaCCS 2008: 228-239 - [c16]Adam J. Lee, Marianne Winslett:
Towards Standards-Compliant Trust Negotiation for Web Services. IFIPTM 2008: 311-326 - [c15]Kazuhiro Minami, Adam J. Lee, Marianne Winslett, Nikita Borisov:
Secure aggregation in a publish-subscribe system. WPES 2008: 95-104 - 2007
- [c14]Adam J. Lee, Kazuhiro Minami, Marianne Winslett:
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. SACMAT 2007: 101-110 - [p1]Adam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu:
Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258 - 2006
- [c13]Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter:
Defeasible security policy composition for web services. FMSE 2006: 45-54 - [c12]Adam J. Lee, Marianne Winslett:
Safety and consistency in policy-based authorization systems. CCS 2006: 124-133 - [c11]Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee, S. Lennart Johnsson:
Toward an On-Demand Restricted Delegation Mechanism for Grids. GRID 2006: 152-159 - [c10]Adam J. Lee, Marianne Winslett:
Virtual Fingerprinting as a Foundation for Reputation in Open Systems. iTrust 2006: 236-251 - [c9]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: A Trust Negotiation Based Authorization Service. iTrust 2006: 458-462 - [c8]Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: a trust negotiation-based authorization service for open systems. SACMAT 2006: 39-48 - [c7]Adam J. Lee, Parisa Tabriz, Nikita Borisov:
A privacy-preserving interdomain audit framework. WPES 2006: 99-108 - 2005
- [c6]Gregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster, Nadir Kiyanclar, William Yurcik:
Cluster security with NVisionCC: process monitoring by leveraging emergent properties. CCGRID 2005: 121-132 - [c5]Adam J. Lee, Gregory A. Koenig, Xin Meng, William Yurcik:
Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. CCGRID 2005: 146-151 - [c4]Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell:
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. SPC 2005: 134-150 - [c3]Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik:
Toward a threat model for storage systems. StorageSS 2005: 94-102 - [i1]Dmitry Mogilevsky, Adam J. Lee, William Yurcik:
Defining a Comprehensive Threat Model for High Performance Computational Clusters. CoRR abs/cs/0510046 (2005) - 2004
- [c2]Kiran Lakkaraju, William Yurcik, Ratna Bearavolu, Adam J. Lee:
NVisionIP: an interactive network flow visualization tool for security. SMC (3) 2004: 2675-2680 - [c1]Kiran Lakkaraju, William Yurcik, Adam J. Lee:
NVisionIP: netflow visualizations of system state for security situational awareness. VizSEC 2004: 65-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint