default search action
Mohit Tiwari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]C. P. Shirley, Jaydip Kumar, Kantilal Pitambar Rane, Narendra Kumar, Deevi Radha Rani, Kuntamukkula Harshitha, Mohit Tiwari:
IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security. J. High Speed Networks 30(2): 191-201 (2024) - [c57]Alexander Cathis, Ge Li, Shijia Wei, Michael Orshansky, Mohit Tiwari, Andreas Gerstlauer:
SoK Paper: Power Side-Channel Malware Detection. HASP@MICRO 2024: 1-9 - [c56]Wenxi Wang, Yang Hu, Mohit Tiwari, Sarfraz Khurshid, Kenneth L. McMillan, Risto Miikkulainen:
NeuroBack: Improving CDCL SAT Solving using Graph Neural Networks. ICLR 2024 - [c55]Shijia Wei, Austin Harris, Yongye Zhu, Prakash Ramrakhyani, Calvin Lin, Mohit Tiwari:
Tail Victims in Termination Timing Channel Defenses Beyond Cryptographic Kernels. SEED 2024: 11-22 - [i16]Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar:
Leveraging AI Planning For Detecting Cloud Security Vulnerabilities. CoRR abs/2402.10985 (2024) - [i15]Ayush RoyChowdhury, Mulong Luo, Prateek Sahu, Sarbartha Banerjee, Mohit Tiwari:
ConfusedPilot: Confused Deputy Risks in RAG-based LLMs. CoRR abs/2408.04870 (2024) - [i14]Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari:
Obsidian: Cooperative State-Space Exploration for Performant Inference on Secure ML Accelerators. CoRR abs/2409.02817 (2024) - 2023
- [c54]P. T. Devadarshini, B. Chandrashekar, Sumit Pundir, Mohit Tiwari, Ravikiran Madala, E. Indhuma:
Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model. IC3I 2023: 1361-1366 - [c53]Vamsi Krishna Chidipothu, Lakshman kumar Kanulla, Chaitanya Kiran Pandey, Sandeep Kumar Davuluri, Mohit Tiwari, Devesh Pratap Singh:
Design and Implementation of Block Chain with Cybersecurity Scheme for Fog Based Internet of Things. IC3I 2023: 1409-1415 - [c52]Sreenivas Mekala, Sushant Bhushan, Puja Shashi, J. Ananda Lavanya, Mohit Tiwari, Shilpa Narlagiri:
Enhancing Image Quality through Deep Learning-based Super-Resolution Techniques. IC3I 2023: 1741-1745 - [c51]Bhavya K. R, Dharmaraj A, Prakash Pareek, Manoj Ashok Sathe, Mohit Tiwari, Geetha Manoharan:
Application of Soft Computing Techniques for Predictive Analytics in Financial Markets. IC3I 2023: 1756-1760 - [c50]Narayana Swamy Ramaiah, S. Kevin Andrews, A. Shenbagharaman, M. S. Gowtham, Bandi Bhaskar, Mohit Tiwari:
Enhancing IoT Security Through AI-Based Anomaly Detection and Intrusion Prevention. IC3I 2023: 1786-1790 - [c49]Yerrolla Chanti, M. Chalapathi Rao, Ch. Srinivasa Reddy, Mohd. Yaseen Wani, Abdullah Samdani, Mohit Tiwari:
The Empirical Analysis of Machine Learning-Based Techniques for Improving Cyber Security. IC3I 2023: 2248-2252 - [c48]Koushik Chakraborty, Sweety Singhal, Nancy Arya, Mohit Tiwari, Aasiya Khatoon, Ashish Tiwari:
Multilevel Cloud resource Scheduling approach based on imagebased signature system. ICIMMI 2023: 33:1-33:7 - [c47]Mohit Tiwari, Tripti Tiwari, Amrita Ticku, Himanshu Dadhwal, Tushar Singh:
Methodologies and Challenges of Cybersecurity Techniques in Cloud Computing Environment. ICIMMI 2023: 182:1-182:7 - [c46]Yang Hu, Wenxi Wang, Sarfraz Khurshid, Kenneth L. McMillan, Mohit Tiwari:
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks. ASE 2023: 104-115 - [i13]Yang Hu, Wenxi Wang, Mohit Tiwari:
Greybox Penetration Testing on Cloud Access Control with IAM Modeling and Deep Reinforcement Learning. CoRR abs/2304.14540 (2023) - [i12]Prateek Sahu, Lucy Zheng, Marco Bueso, Shijia Wei, Neeraja J. Yadwadkar, Mohit Tiwari:
Sidecars on the Central Lane: Impact of Network Proxies on Microservices. CoRR abs/2306.15792 (2023) - 2022
- [j15]Yongye Zhu, Shijia Wei, Mohit Tiwari:
Revisiting Browser Performance Benchmarking From an Architectural Perspective. IEEE Comput. Archit. Lett. 21(2): 113-116 (2022) - [j14]Ge Li, Mohit Tiwari, Michael Orshansky:
Power-based Attacks on Spatial DNN Accelerators. ACM J. Emerg. Technol. Comput. Syst. 18(3): 58:1-58:18 (2022) - [j13]Hemant B. Mahajan, Aparna A. Junnarkar, Mohit Tiwari, Tripti Tiwari, Makarand Upadhyaya:
LCIPA: Lightweight clustering protocol for industry 4.0 enabled precision agriculture. Microprocess. Microsystems 94: 104633 (2022) - [c45]Antonio M. Espinoza, Riley Wood, Stephanie Forrest, Mohit Tiwari:
Back to the future: N-Versioning of Microservices. DSN 2022: 415-427 - [c44]M. Meenaakumari, P. Jayasuriya, Nasa Dhanraj, Seema Sharma, Geetha Manoharan, Mohit Tiwari:
Loan Eligibility Prediction using Machine Learning based on Personal Information. IC3I 2022: 1383-1387 - [c43]Pallavi Shetty, Kapil Joshi, Ramakrishnan Raman, K. Naga Venkateshwara Rao, A. Vijaya Kumar, Mohit Tiwari:
A Framework of Artificial Intelligence for the Manufacturing and Image Classification system. IC3I 2022: 1504-1508 - [c42]Shaikh Abdul Hannan, Preeti Gupta, P. Vanitha, Rajesh Singh, Dimple Saini, Mohit Tiwari:
Analysis of blockchain technology based on digital management systems and data mining technology. IC3I 2022: 1608-1613 - [c41]Shubhendu Shekher Shukla, Mohit Tiwari, Arti Chudamanrao Lokhande, Tripti Tiwari, Rajesh Singh, Anoop Beri:
A Comparative Study of Cyber Security Awareness, Competence and Behavior. IC3I 2022: 1704-1709 - [c40]Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar:
Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies. IJCAI 2022: 1850-1858 - [i11]Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar:
Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies. CoRR abs/2205.01240 (2022) - 2021
- [j12]Jais Jose, Neha Gautam, Mohit Tiwari, Tripti Tiwari, Arjun Suresh, Vinu Sundararaj, Rejeesh M. R:
An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion. Biomed. Signal Process. Control. 66: 102480 (2021) - [j11]Lauren Biernacki, Mark Gallagher, Zhixing Xu, Misiker Tadesse Aga, Austin Harris, Shijia Wei, Mohit Tiwari, Baris Kasikci, Sharad Malik, Todd M. Austin:
Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses. ACM J. Emerg. Technol. Comput. Syst. 17(3): 42:1-42:38 (2021) - [j10]Furkan Aydin, Aydin Aysu, Mohit Tiwari, Andreas Gerstlauer, Michael Orshansky:
Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols. ACM Trans. Embed. Comput. Syst. 20(6): 110:1-110:22 (2021) - [c39]Austin Harris, Tarunesh Verma, Shijia Wei, Lauren Biernacki, Alex Kisil, Misiker Tadesse Aga, Valeria Bertacco, Baris Kasikci, Mohit Tiwari, Todd M. Austin:
Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware. HOST 2021: 226-238 - [c38]Todd M. Austin, Austin Harris, Tarunesh Verma, Shijia Wei, Alex Kisil, Misiker Tadesse Aga, Valeria Bertacco, Baris Kasikci, Mohit Tiwari:
Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware. HCS 2021: 1-18 - [c37]Yang Hu, Wenxi Wang, Casen Hunger, Riley Wood, Sarfraz Khurshid, Mohit Tiwari:
ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilities. ESEC/SIGSOFT FSE 2021: 316-327 - [i10]Edward C. Schrom II, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. De Boer, Adam Doupé, Roya Ensafi, Stuart I. Feldman, Bryan T. Grenfell, J. Alex Halderman, Silvie Huijben, Carlo C. Maley, Melanie E. Moses, Alan S. Perelson, Charles Perrings, Joshua B. Plotkin, Jennifer Rexford, Mohit Tiwari:
Challenges in cybersecurity: Lessons from biological defense systems. CoRR abs/2107.10344 (2021) - [i9]Ge Li, Mohit Tiwari, Michael Orshansky:
Power-Based Attacks on Spatial DNN Accelerators. CoRR abs/2108.12579 (2021) - [i8]Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari:
Bandwidth Utilization Side-Channel on ML Inference Accelerators. CoRR abs/2110.07157 (2021) - [i7]Wenxi Wang, Yang Hu, Mohit Tiwari, Sarfraz Khurshid, Kenneth L. McMillan, Risto Miikkulainen:
NeuroComb: Improving SAT Solving with Graph Neural Networks. CoRR abs/2110.14053 (2021) - 2020
- [i6]Sarbartha Banerjee, Prakash Ramrakhyani, Shijia Wei, Mohit Tiwari:
SESAME: Software defined Enclaves to Secure Inference Accelerators with Multi-tenant Execution. CoRR abs/2007.06751 (2020) - [i5]Raghav Puri, Archit Gupta, Manas Sikri, Mohit Tiwari, Nitish Pathak, Shivendra Goel:
Emotion Detection using Image Processing in Python. CoRR abs/2012.00659 (2020)
2010 – 2019
- 2019
- [j9]Simha Sethumadhavan, Mohit Tiwari:
Secure Architectures. IEEE Micro 39(4): 6-7 (2019) - [c36]Mark Gallagher, Lauren Biernacki, Shibo Chen, Zelalem Birhanu Aweke, Salessawi Ferede Yitbarek, Misiker Tadesse Aga, Austin Harris, Zhixing Xu, Baris Kasikci, Valeria Bertacco, Sharad Malik, Mohit Tiwari, Todd M. Austin:
Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn. ASPLOS 2019: 469-484 - [c35]Chandrasekhar Nagarajan, Ali Shafiee, Rajeev Balasubramonian, Mohit Tiwari:
ρ: Relaxed Hierarchical ORAM. ASPLOS 2019: 659-671 - [c34]Shijia Wei, Aydin Aysu, Michael Orshansky, Andreas Gerstlauer, Mohit Tiwari:
Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems. HOST 2019: 111-120 - [c33]Austin Harris, Shijia Wei, Prateek Sahu, Pranav Kumar, Todd M. Austin, Mohit Tiwari:
Cyclone: Detecting Contention-Based Cache Information Leaks Through Cyclic Interference. MICRO 2019: 57-72 - 2018
- [j8]Pavel Lifshits, Roni Forte, Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, Mark Silberstein:
Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices. Proc. Priv. Enhancing Technol. 2018(4): 141-158 (2018) - [c32]Casen Hunger, Lluís Vilanova, Charalampos Papamanthou, Yoav Etsion, Mohit Tiwari:
DATS - Data Containers for Web Applications. ASPLOS 2018: 722-736 - [c31]Aydin Aysu, Michael Orshansky, Mohit Tiwari:
Binary Ring-LWE hardware with power side-channel countermeasures. DATE 2018: 1253-1258 - [c30]Aydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer, Michael Orshansky:
Horizontal side-channel vulnerabilities of post-quantum key exchange protocols. HOST 2018: 81-88 - [c29]Ali Shafiee, Rajeev Balasubramonian, Mohit Tiwari, Feifei Li:
Secure DIMM: Moving ORAM Primitives Closer to Memory. HPCA 2018: 428-440 - [c28]Todd M. Austin, Valeria Bertacco, Baris Kasikci, Sharad Malik, Mohit Tiwari:
Vulnerability-tolerant secure architectures. ICCAD 2018: 46 - [i4]Mikhail Kazdagli, Constantine Caramanis, Sanjay Shakkottai, Mohit Tiwari:
The Shape of Alerts: Detecting Malware Using Distributed Detectors by Robustly Amplifying Transient Correlations. CoRR abs/1803.00883 (2018) - 2017
- [i3]Mikhail Kazdagli, Constantine Caramanis, Sanjay Shakkottai, Mohit Tiwari:
Exploiting Latent Attack Semantics for Intelligent Malware Detection. CoRR abs/1708.01864 (2017) - 2016
- [j7]Mohit Tiwari, Todd M. Austin:
On Architectural Support for Systems Security. IEEE Micro 36(5): 6-7 (2016) - [c27]Wayne P. Burleson, Onur Mutlu, Mohit Tiwari:
Invited - Who is the major threat to tomorrow's security?: you, the hardware designer. DAC 2016: 145:1-145:5 - [c26]Mikhail Kazdagli, Vijay Janapa Reddi, Mohit Tiwari:
Quantifying and improving the efficiency of hardware-based mobile malware detectors. MICRO 2016: 37:1-37:13 - [c25]Ashay Rane, Calvin Lin, Mohit Tiwari:
Secure, Precise, and Fast Floating-Point Operations on x86 Processors. USENIX Security Symposium 2016: 71-86 - [i2]Mikhail Kazdagli, Ling Huang, Vijay Janapa Reddi, Mohit Tiwari:
EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses. CoRR abs/1603.03086 (2016) - 2015
- [c24]Chang Liu, Austin Harris, Martin Maas, Michael W. Hicks, Mohit Tiwari, Elaine Shi:
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation. ASPLOS 2015: 87-101 - [c23]Casen Hunger, Mikhail Kazdagli, Ankit Singh Rawat, Alexandros G. Dimakis, Sriram Vishwanath, Mohit Tiwari:
Understanding contention-based channels and using them for defense. HPCA 2015: 639-650 - [c22]Ali Shafiee, Akhila Gundu, Manjunath Shevgoor, Rajeev Balasubramonian, Mohit Tiwari:
Avoiding information leakage in the memory controller with fixed service policies. MICRO 2015: 89-101 - [c21]Ashay Rane, Calvin Lin, Mohit Tiwari:
Raccoon: Closing Digital Side-Channels through Obfuscated Execution. USENIX Security Symposium 2015: 431-446 - 2014
- [j6]Wei Hu, Dejun Mu, Jason Oberg, Baolei Mao, Mohit Tiwari, Timothy Sherwood, Ryan Kastner:
Gate-Level Information Flow Tracking for Security Lattices. ACM Trans. Design Autom. Electr. Syst. 20(1): 2:1-2:25 (2014) - [c20]Xun Li, Vineeth Kashyap, Jason K. Oberg, Mohit Tiwari, Vasanth Ram Rajarathinam, Ryan Kastner, Timothy Sherwood, Ben Hardekopf, Frederic T. Chong:
Sapper: a language for hardware-level security policy enforcement. ASPLOS 2014: 97-112 - [c19]Mikhail Kazdagli, Ling Huang, Vijay Janapa Reddi, Mohit Tiwari:
Morpheus: benchmarking computational diversity in mobile malware. HASP@ISCA 2014: 3:1-3:8 - [c18]Akhila Gundu, Gita Sreekumar, Ali Shafiee, Seth H. Pugsley, Hardik B. Jain, Rajeev Balasubramonian, Mohit Tiwari:
Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller. HASP@ISCA 2014: 11:1-11:5 - 2013
- [c17]Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, Dawn Song:
PHANTOM: practical oblivious computation in a secure processor. CCS 2013: 311-324 - [c16]Xun Li, Vineeth Kashyap, Jason K. Oberg, Mohit Tiwari, Vasanth Ram Rajarathinam, Ryan Kastner, Timothy Sherwood, Ben Hardekopf, Frederic T. Chong:
Position paper: Sapper - a language for provable hardware policy enforcement. PLAS 2013: 39-44 - 2012
- [j5]Hassan M. G. Wassel, Daoxin Dai, Mohit Tiwari, Jonathan Valamehr, Luke Theogarajan, Jennifer A. Dionne, Frederic T. Chong, Timothy Sherwood:
Opportunities and Challenges of Using Plasmonic Components in Nanophotonic Architectures. IEEE J. Emerg. Sel. Topics Circuits Syst. 2(2): 154-168 (2012) - [j4]Bita Mazloom, Shashidhar Mysore, Mohit Tiwari, Banit Agrawal, Timothy Sherwood:
Dataflow Tomography: Information Flow Tracking For Understanding and Visualizing Full Systems. ACM Trans. Archit. Code Optim. 9(1): 3:1-3:26 (2012) - [j3]Wei Hu, Jason Oberg, Ali Irturk, Mohit Tiwari, Timothy Sherwood, Dejun Mu, Ryan Kastner:
On the Complexity of Generating Gate Level Information Flow Tracking Logic. IEEE Trans. Inf. Forensics Secur. 7(3): 1067-1080 (2012) - [c15]Peiyou Song, Anhei Shu, David Phipps, Mohit Tiwari, Dan S. Wallach, Jedidiah R. Crandall, George F. Luger:
Language without words: A pointillist model for natural language processing. SCIS&ISIS 2012: 11-15 - [c14]Mohit Tiwari, Prashanth Mohan, Andrew Osheroff, Hilfi Alkaff, Elaine Shi, Eric Love, Dawn Song, Krste Asanovic:
Context-centric Security. HotSec 2012 - [i1]Peiyou Song, Anhei Shu, David Phipps, Dan S. Wallach, Mohit Tiwari, Jedidiah R. Crandall, George F. Luger:
Language Without Words: A Pointillist Model for Natural Language Processing. CoRR abs/1212.3228 (2012) - 2011
- [j2]Wei Hu, Jason Oberg, Ali Irturk, Mohit Tiwari, Timothy Sherwood, Dejun Mu, Ryan Kastner:
Theoretical Fundamentals of Gate Level Information Flow Tracking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 30(8): 1128-1140 (2011) - [c13]Jason Oberg, Wei Hu, Ali Irturk, Mohit Tiwari, Timothy Sherwood, Ryan Kastner:
Information flow isolation in I2C and USB. DAC 2011: 254-259 - [c12]Mohit Tiwari, Jason Oberg, Xun Li, Jonathan Valamehr, Timothy E. Levin, Ben Hardekopf, Ryan Kastner, Frederic T. Chong, Timothy Sherwood:
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security. ISCA 2011: 189-200 - [c11]Susmit Biswas, Mohit Tiwari, Timothy Sherwood, Luke Theogarajan, Frederic T. Chong:
Fighting fire with fire: modeling the datacenter-scale effects of targeted superlattice thermal management. ISCA 2011: 331-340 - [c10]Xun Li, Mohit Tiwari, Jason Oberg, Vineeth Kashyap, Frederic T. Chong, Timothy Sherwood, Ben Hardekopf:
Caisson: a hardware description language for secure information flow. PLDI 2011: 109-120 - 2010
- [j1]Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Bita Mazloom, Shashidhar Mysore, Frederic T. Chong, Timothy Sherwood:
Gate-Level Information-Flow Tracking for Secure Architectures. IEEE Micro 30(1): 92-100 (2010) - [c9]Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin:
Hardware assistance for trustworthy systems through 3-D integration. ACSAC 2010: 199-210 - [c8]Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T. Chong:
Function flattening for lease-based, information-leak-free systems. ASAP 2010: 349-352 - [c7]Ted Huffmire, Timothy E. Levin, Michael Bilzor, Cynthia E. Irvine, Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner:
Hardware trust implications of 3-D integration. WESS 2010: 1 - [c6]Jason Oberg, Wei Hu, Ali Irturk, Mohit Tiwari, Timothy Sherwood, Ryan Kastner:
Theoretical analysis of gate level information flow tracking. DAC 2010: 244-247 - [c5]Xun Li, Mohit Tiwari, Ben Hardekopf, Timothy Sherwood, Frederic T. Chong:
Secure information flow analysis for hardware design: using the right abstraction for the job. PLAS 2010: 8
2000 – 2009
- 2009
- [c4]Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood:
Quantifying the Potential of Program Analysis Peripherals. PACT 2009: 53-63 - [c3]Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, Shashidhar Mysore, Frederic T. Chong, Timothy Sherwood:
Complete information flow tracking from the gates up. ASPLOS 2009: 109-120 - [c2]Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederic T. Chong, Timothy Sherwood:
Execution leases: a hardware-supported mechanism for enforcing strong non-interference. MICRO 2009: 493-504 - 2008
- [c1]Mohit Tiwari, Banit Agrawal, Shashidhar Mysore, Jonathan Valamehr, Timothy Sherwood:
A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags. MICRO 2008: 94-105
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint