default search action
Yu-Guang Yang 0001
Person information
- affiliation: Beijing University of Technology, College of Computer Science and Technology, China
Other persons with the same name
- Yuguang Yang 0002 — Johns Hopkins University, Department of Chemical and Biomolecular Engineering, Baltimore, MD, USA
- Yuguang Yang 0003 — Delft University of Technology, Department of Engineering Structures, The Netherlands
- Yuguang Yang 0004 — Amazon Alexa AI, Sunnyvale, CA, USA
- Yuguang Yang 0005 — Ximalaya Inc., Shanghai, China (and 1 more)
- Yuguang Yang 0006 — Tsinghua University, Institute of Biomechanics and Medical Engineering, Department of Engineering Mechanics, Beijing, China
- Yuguang Yang 0007 — Beihang University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j88]Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding. Comput. J. 67(9): 2739-2748 (2024) - [j87]Yi-Hua Zhou, Bin Tang, Yu-Guang Yang:
A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j86]Yu-Guang Yang, Zi-Jia Wang, Bao-Pu Wang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system. Multim. Tools Appl. 83(2): 3621-3655 (2024) - [j85]Yu-Guang Yang, Ming-Xin Niu, Yihua Zhou, Wei-Min Shi, Dong-Hua Jiang, Xin Liao:
A visually secure image encryption algorithm based on block compressive sensing and deep neural networks. Multim. Tools Appl. 83(10): 29777-29803 (2024) - [j84]Wei-Min Shi, Qing-Tian Zhuang, Xue-Zhang, Yi-Hua Zhou, Yu-Guang Yang:
An image reranking algorithm based on discrete-time quantum walk. Multim. Tools Appl. 83(12): 34979-34994 (2024) - [j83]Songshou Dong, Yanqing Yao, Yihua Zhou, Yu-Guang Yang:
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system. Peer Peer Netw. Appl. 17(1): 284-296 (2024) - [j82]Wei-Min Shi, Meng-Xuan Bai, Yi-Hua Zhou, Yu-Guang Yang:
Hierarchical quantum rotation operation sharing with multiparty users. Quantum Inf. Process. 23(5): 196 (2024) - [j81]Bing-Xin Liu, Guang-Bao Xu, Yu-Guang Yang:
Complete Security Solution for Practical Quantum Network Coding. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(9): 2692-2704 (2024) - 2023
- [j80]Shang Gao, Shijie Pan, Yuguang Yang:
Quantum algorithm for kernelized correlation filter. Sci. China Inf. Sci. 66(2) (2023) - [j79]Yu-Guang Yang, Bao-Pu Wang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Efficient color image encryption by color-grayscale conversion based on steganography. Multim. Tools Appl. 82(7): 10835-10866 (2023) - [j78]Yu-Guang Yang, Bao-Pu Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system. Multim. Tools Appl. 82(14): 22033-22062 (2023) - [j77]Wei-Min Shi, Meng-Xuan Bai, Yi-Hua Zhou, Yu-Guang Yang:
Controlled quantum teleportation based on quantum walks. Quantum Inf. Process. 22(1): 34 (2023) - [j76]Shang Gao, Shijie Pan, Guang-Bao Xu, Yu-Guang Yang:
Quantum average neighborhood margin maximization for feature extraction. Quantum Inf. Process. 22(3): 152 (2023) - [j75]Dan Li, Jiani Huang, Yuqian Zhou, Yu-Guang Yang:
A high-fidelity quantum state transfer algorithm on the complete bipartite graph. Quantum Inf. Process. 22(6): 245 (2023) - [j74]Dan Li, Panpan Ding, Yuqian Zhou, Yu-Guang Yang:
Controlled alternate quantum walk-based block hash function. Quantum Inf. Process. 22(10): 363 (2023) - [j73]Yu-Guang Yang, Rui-Chen Huang, Guang-Bao Xu, Yi-Hua Zhou, Wei-Min Shi, Dan Li:
Measurement-device-independent quantum key agreement based on entanglement swapping. Quantum Inf. Process. 22(12): 438 (2023) - [j72]Yu-Guang Yang, Bing-Xin Liu, Guang-Bao Xu, Yi-Hua Zhou, Wei-Min Shi:
Practical Quantum Anonymous Private Information Retrieval Based on Quantum Key Distribution. IEEE Trans. Inf. Forensics Secur. 18: 4034-4045 (2023) - [c5]Dan Li, Panpan Ding, Yuqian Zhou, Yuguang Yang, Chenting Li:
Secure, Efficient, and Privacy-Protecting One-to-Many Cross-Chain Shared Data Consistency Audit. ISPA/BDCloud/SocialCom/SustainCom 2023: 64-71 - [c4]Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem). ICDF2C (2) 2023: 54-62 - [c3]Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang:
Improvement of an Identity-Based Aggregate Signature Protocol from Lattice. ICDF2C (2) 2023: 258-263 - 2022
- [j71]Yongli Yang, Yu-Guang Yang, Yi-Hua Zhou, Wei-Min Shi:
Discrimination of two nonorthogonal states against amplitude-damping noise via feed-forward control. Concurr. Comput. Pract. Exp. 34(10) (2022) - [j70]Songshou Dong, Yihua Zhou, Yu-Guang Yang, Yanqing Yao:
A certificateless ring signature scheme based on lattice. Concurr. Comput. Pract. Exp. 34(28) (2022) - [j69]Yihua Zhou, Songshou Dong, Yu-Guang Yang:
A unidirectional certificateless proxy re-signature scheme based on lattice. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j68]Yu-Guang Yang, Hong-Mei Fu, Shang Gao, Yi-Hua Zhou, Wei-Min Shi:
Intrusion detection: A model based on the improved vision transformer. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j67]Yihua Zhou, Songshou Dong, Yuguang Yang:
Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting. KSII Trans. Internet Inf. Syst. 16(1): 287-304 (2022) - [j66]Wei-Min Shi, Bin-Bin Chen, Yi-Hua Zhou, Yu-Guang Yang:
Image two-classification algorithm based on continuous-time quantum walk. J. Electronic Imaging 31(4) (2022) - [j65]Jie Li, Yu-Guang Yang, Jian Li, Yue-Chao Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi:
Deterministic secure quantum communication based on spatial encoding. Quantum Inf. Process. 21(1): 2 (2022) - [j64]Yong-Li Yang, Yuguang Yang, Yi-Hua Zhou, Wei-Min Shi, Dan Li:
Measurement-device-independent quantum wireless network communication. Quantum Inf. Process. 21(1) (2022) - [j63]Dan Li, Ling Qian, Yuqian Zhou, Yu-Guang Yang:
Quantum partial search algorithm with smaller oracles for multiple target items. Quantum Inf. Process. 21(4): 160 (2022) - [j62]Yu-Guang Yang, Guo-Dong Cao, Rui-Chen Huang, Shang Gao, Yi-Hua Zhou, Wei-Min Shi, Guang-Bao Xu:
Multiparty anonymous quantum communication without multipartite entanglement. Quantum Inf. Process. 21(6): 196 (2022) - [j61]Yan-Ying Zhu, Dong-Huan Jiang, Xiang-Qian Liang, Guang-Bao Xu, Yu-Guang Yang:
Nonlocal sets of orthogonal product states with the less amount of elements in tripartite quantum systems. Quantum Inf. Process. 21(7): 252 (2022) - [j60]Yi-Hua Zhou, Shu-Fen Qin, Wei-Min Shi, Yu-Guang Yang:
Measurement-device-independent continuous variable semi-quantum key distribution protocol. Quantum Inf. Process. 21(8): 303 (2022) - 2021
- [j59]Yu-Guang Yang, Bao-Pu Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Visually meaningful image encryption based on universal embedding model. Inf. Sci. 562: 304-324 (2021) - [j58]Yu-Guang Yang, Bao-Pu Wang, Shuai-Kang Pei, Yi-Hua Zhou, Wei-Min Shi, Xin Liao:
Using M-ary decomposition and virtual bits for visually meaningful image encryption. Inf. Sci. 580: 174-201 (2021) - [j57]Jian Li, Hengji Li, Na Wang, Chaoyang Li, Yanyan Hou, Xiubo Chen, Yu-Guang Yang:
A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation. Mob. Networks Appl. 26(2): 620-628 (2021) - [j56]Yu-Guang Yang, Bowen Guan, Yi-Hua Zhou, Wei-Min Shi:
Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach. Multim. Tools Appl. 80(1): 691-710 (2021) - [j55]Yu-Guang Yang, Bao-Pu Wang, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi:
Dual embedding model: a new framework for visually meaningful image encryption. Multim. Tools Appl. 80(6): 9055-9074 (2021) - [j54]Yu-Guang Yang, Xiao-Xiao Liu, Shang Gao, Yihua Zhou, Wei-Min Shi, Jian Li, Dan Li:
Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement. Quantum Eng. 3(3) (2021) - [j53]Yong-Li Yang, Yu-Guang Yang, Yihua Zhou, Wei-Min Shi, Jian Li:
Efficient quantum multi-hop communication based on Greenberger-Horne-Zeilinger states and Bell states. Quantum Inf. Process. 20(5): 189 (2021) - [j52]Yu-Guang Yang, Jingru Dong, Yong-Li Yang, Jian Li, Yi-Hua Zhou, Wei-Min Shi:
High-capacity measurement-device-independent deterministic secure quantum communication. Quantum Inf. Process. 20(6): 203 (2021) - [j51]Yu-Guang Yang, Xiao-Xiao Liu, Shang Gao, Xiu-Bo Chen, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing. Quantum Inf. Process. 20(7): 1-12 (2021) - [j50]Yu-Guang Yang, Yue-Chao Wang, Jian Li, Yi-Hua Zhou, Wei-Min Shi:
Semi-device-independent quantum key agreement protocol. Quantum Inf. Process. 20(11): 376 (2021) - 2020
- [j49]Xiaoping Lou, Yu Wang, Hu Long, Yuguang Yang, Jian Li:
Sequential Quantum Multiparty Signature Based on Quantum Fourier Transform and Chaotic System. IEEE Access 8: 13218-13227 (2020) - [j48]Leilei Li, Jian Li, Yan Chang, Yuguang Yang, Xiubo Chen:
Quantum key distribution based on single-particle and EPR entanglement. Sci. China Inf. Sci. 63(6) (2020) - [j47]Dan Li, Ying Liu, Yu-Guang Yang, Juan Xu, Jia-Bin Yuan:
Szegedy quantum walks with memory on regular graphs. Quantum Inf. Process. 19(1): 32 (2020) - [j46]Yu-Guang Yang, Ning Chen, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi:
Discriminating two non-orthogonal states against decoherence by feedback control. Quantum Inf. Process. 19(2): 69 (2020) - [j45]Yi-Hua Zhou, Mao-Feng Wang, Wei-Min Shi, Yu-Guang Yang, Jing Zhang:
Two-party quantum key agreement against collective noisy channel. Quantum Inf. Process. 19(3): 100 (2020) - [j44]Yu-Guang Yang, Ning Chen, Yong-Li Yang, Yi-Hua Zhou, Wei-Min Shi:
Better quantum control does not imply better discrimination effect. Quantum Inf. Process. 19(6): 168 (2020) - [j43]Jian Li, Leilei Li, Hengji Li, Na Wang, Xiubo Chen, Yuguang Yang:
Simulation algorithm on the quantum BB84 protocol based on Monte Carlo method in classical computer environment. Quantum Inf. Process. 19(9): 335 (2020)
2010 – 2019
- 2019
- [j42]Leilei Li, Jian Li, Chao-Yang Li, Hengji Li, Yuan Tian, Yan Zheng, Yuguang Yang:
Deterministic Quantum Secure Direct Communication Protocol Based on Omega State. IEEE Access 7: 6915-6921 (2019) - [j41]Na Li, Jian Li, Xiubo Chen, Yuguang Yang:
Quantum Private Query With Perfect Performance Universally Applicable Against Collective-Noise. IEEE Access 7: 29313-29319 (2019) - [j40]Na Li, Jian Li, Xiubo Chen, Yuguang Yang:
Quantum Wireless Network Private Query With Multiple Third Parties. IEEE Access 7: 33964-33969 (2019) - [j39]Jian Li, Zhengyan Zhou, Na Wang, Yuan Tian, Yu-Guang Yang, Yan Zheng:
Deterministic Quantum Secure Direct Communication Protocol Based on Hyper-Entangled State. IEEE Access 7: 43948-43955 (2019) - [j38]Xiaoping Lou, Hu Long, Wensheng Tang, Yuguang Yang, Jian Li:
Continuous-Variable Arbitrated Quantum Signature Based on Dense Coding and Teleportation. IEEE Access 7: 85719-85726 (2019) - [j37]Yan-Yan Hou, Jian Li, Hengji Li, Chao-Yang Li, Yuguang Yang, Na Wang, Zhengyan Zhou:
One Step Quantum Key Distribution Protocol Based on the Hyperentangled Bell State. IEEE Access 7: 120006-120013 (2019) - [j36]Yu-Guang Yang, Xue-Pei Guo, Gang Xu, Xiu-Bo Chen, Jian Li, Yi-Hua Zhou, Wei-Min Shi:
Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability. Comput. Secur. 81: 15-24 (2019) - [j35]Yihua Zhou, Guanghui Li, Yuguang Yang, Weimin Shi:
基于GeoHash的近邻查询位置隐私保护方法 (Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash). 计算机科学 46(8): 212-216 (2019) - [j34]Yihua Zhou, Bing Zhang, Yuguang Yang, Weimin Shi:
基于聚类的社交网络隐私保护方法 (Cluster-based Social Network Privacy Protection Method). 计算机科学 46(10): 154-160 (2019) - [j33]Yu-Guang Yang, Shang Gao, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
Two-party quantum key agreement over a collective noisy channel. Quantum Inf. Process. 18(3): 74 (2019) - [j32]Yu-Guang Yang, Bo-Ran Li, Shuang-Yong Kang, Xiu-Bo Chen, Yi-Hua Zhou, Wei-Min Shi:
New quantum key agreement protocols based on cluster states. Quantum Inf. Process. 18(3): 77 (2019) - [j31]Chaoyang Li, Xiubo Chen, Hengji Li, Yuguang Yang, Jian Li:
Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state. Quantum Inf. Process. 18(5): 158 (2019) - [j30]Yu-Guang Yang, Shang Gao, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
Three-party quantum secret sharing against collective noise. Quantum Inf. Process. 18(7): 215 (2019) - [j29]Hengji Li, Jian Li, Nan Xiang, Yan Zheng, Yu-Guang Yang, Mosayeb Naseri:
A new kind of universal and flexible quantum information splitting scheme with multi-coin quantum walks. Quantum Inf. Process. 18(10): 316 (2019) - [j28]Yu-Guang Yang, Bo-Ran Li, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
New quantum key agreement protocols based on Bell states. Quantum Inf. Process. 18(10): 322 (2019) - [c2]Leilei Li, Jian Li, Hengji Li, Chaoyang Li, Yan Zheng, Yuguang Yang:
Design and Simulation of a Quantum Key Distribution Protocol Based on Single-Particle and EPR Entanglement. SimuTools 2019: 278-287 - [c1]Jian Li, Hengji Li, Chaoyang Li, Leilei Li, Yanyan Hou, Xiubo Chen, Yuguang Yang:
A Quantum Key Distribution Protocol Based on the EPR Pairs and Its Simulation. SimuTools 2019: 288-301 - 2018
- [j27]Yu-Guang Yang, Jiajie Yang, Yi-Hua Zhou, Wei-Min Shi, Xiubo Chen, Jian Li, Huijuan Zuo:
Quantum network communication: a discrete-time quantum-walk approach. Sci. China Inf. Sci. 61(4): 042501:1-042501:10 (2018) - [j26]Leilei Li, Hengji Li, Chao-Yang Li, Xiubo Chen, Yan Chang, Yuguang Yang, Jian Li:
The security analysis of E91 protocol in collective-rotation noise channel. Int. J. Distributed Sens. Networks 14(5) (2018) - [j25]Yu-Guang Yang, Yong-Ce Zhang, Xiu-Bo Chen, Yi-Hua Zhou, Wei-Min Shi:
Eliminating the texture features in visually meaningful cipher images. Inf. Sci. 429: 102-119 (2018) - [j24]Wei-Feng Cao, Yong-Ce Zhang, Yu-Guang Yang, Dan Li, Yi-Hua Zhou, Wei-Min Shi:
Constructing quantum Hash functions based on quantum walks on Johnson graphs. Quantum Inf. Process. 17(7): 156 (2018) - [j23]Yu-Guang Yang, Jing-Lin Bi, Xiu-Bo Chen, Zheng Yuan, Yi-Hua Zhou, Wei-Min Shi:
Simple hash function using discrete-time quantum walks. Quantum Inf. Process. 17(8): 189 (2018) - 2017
- [j22]Yu-Guang Yang, Zhi-Chao Liu, Jian Li, Xiu-Bo Chen, Huijuan Zuo, Yi-Hua Zhou, Wei-Min Shi:
Theoretically extensible quantum digital signature with starlike cluster states. Quantum Inf. Process. 16(1): 12 (2017) - 2016
- [j21]Yu-Guang Yang, Ju Tian, He Lei, Yi-Hua Zhou, Wei-Min Shi:
Novel quantum image encryption using one-dimensional quantum cellular automata. Inf. Sci. 345: 257-270 (2016) - [j20]Yu-Guang Yang, Yan Wang, Qian-Qian Zhao:
Letter to the Editor regarding "Dynamic watermarking scheme for quantum images based on Hadamard transform" by Song et al. Multim. Syst. 22(2): 271-272 (2016) - [j19]Yu-Guang Yang, He Lei, Zhi-Chao Liu, Yi-Hua Zhou, Wei-Min Shi:
Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15(6): 2487-2497 (2016) - [j18]Yu-Guang Yang, Zhi-Chao Liu, Xiu-Bo Chen, Wei-Feng Cao, Yi-Hua Zhou, Wei-Min Shi:
Novel classical post-processing for quantum key distribution-based quantum private query. Quantum Inf. Process. 15(9): 3833-3840 (2016) - 2015
- [j17]Yu-Guang Yang, Si-Jia Sun, Qian-Qian Zhao:
Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf. Process. 14(2): 681-686 (2015) - [j16]Yu-Guang Yang, Ming-Ou Zhang, Rui Yang:
Private database queries using one quantum state. Quantum Inf. Process. 14(3): 1017-1024 (2015) - [j15]Si-Jia Sun, Yu-Guang Yang, Ming-Ou Zhang:
Relativistic quantum private database queries. Quantum Inf. Process. 14(4): 1443-1450 (2015) - [j14]Wei-Min Shi, Jian-biao Zhang, Yi-Hua Zhou, Yu-Guang Yang:
A novel quantum deniable authentication protocol without entanglement. Quantum Inf. Process. 14(6): 2183-2193 (2015) - [j13]Wei-Min Shi, Jian-biao Zhang, Yi-Hua Zhou, Yu-Guang Yang:
A new quantum blind signature with unlinkability. Quantum Inf. Process. 14(8): 3019-3030 (2015) - [j12]Yu-Guang Yang, Rui Yang, He Lei, Wei-Min Shi, Yi-Hua Zhou:
Quantum oblivious transfer with relaxed constraints on the receiver. Quantum Inf. Process. 14(8): 3031-3040 (2015) - 2014
- [j11]Yu-Guang Yang, Xin Jia, Si-Jia Sun, Qing-Xiang Pan:
Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding. Inf. Sci. 277: 445-457 (2014) - [j10]Yi-Hua Zhou, Wei-Min Shi, Yu-Guang Yang:
Comment on "efficient and feasible quantum private comparison of equality against the collective amplitude damping noise". Quantum Inf. Process. 13(2): 573-585 (2014) - [j9]Yu-Guang Yang, Si-Jia Sun, Peng Xu, Ju Tian:
Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13(3): 805-813 (2014) - [j8]Wei-Min Shi, Yi-Hua Zhou, Yu-Guang Yang:
Comment on "The enhanced quantum blind signature protocol". Quantum Inf. Process. 13(6): 1305-1312 (2014) - [j7]Wei-Min Shi, Yi-Hua Zhou, Yu-Guang Yang:
Quantum deniable authentication protocol. Quantum Inf. Process. 13(7): 1501-1510 (2014) - [j6]Yu-Guang Yang, Peng Xu, Ju Tian, Hua Zhang:
Analysis and improvement of the dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 13(9): 1931-1936 (2014) - 2013
- [j5]Yu-Guang Yang, Juan Xia, Xin Jia, Hua Zhang:
Comment on quantum private comparison protocols with a semi-honest third party. Quantum Inf. Process. 12(2): 877-885 (2013) - [j4]Yu-Guang Yang, Xin Jia, Peng Xu, Ju Tian:
Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. 12(8): 2765-2769 (2013) - [j3]Yu-Guang Yang, Juan Xia, Xin Jia, Hua Zhang:
Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. Quantum Inf. Process. 12(11): 3477-3493 (2013) - 2012
- [j2]Yu-Guang Yang, Xin Jia, Hong-Yang Wang, Hua Zhang:
Verifiable quantum (k, n)-threshold secret sharing. Quantum Inf. Process. 11(6): 1619-1625 (2012) - 2011
- [j1]Yu-Guang Yang, Yi-Wei Teng, Hai-Ping Chai, Qiao-Yan Wen:
Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]. Quantum Inf. Process. 10(3): 317-323 (2011)
Coauthor Index
aka: Xiu-Bo Chen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint