default search action
Rakesh Kumar Jha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j67]Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain:
6G: Technology Evolution in Future Wireless Networks. IEEE Access 12: 57548-57573 (2024) - [j66]Preety D. Swami, Rakesh Kumar Jha, Anuradha Jat:
Enhanced fault feature extraction and bearing fault diagnosis using shearlet transform and deep learning. Signal Image Video Process. 18(12): 9285-9293 (2024) - [j65]Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain, Mantisha Gupta, Zeenat Zahra:
Safeguarding the Internet of Health Things: advancements, challenges, and trust-based solution. Telecommun. Syst. 87(3): 779-808 (2024) - [j64]Haneet Kour, Rakesh Kumar Jha, Sanjeev Jain:
Green and Safe 6G Wireless Networks: A Hybrid Approach. IEEE Trans. Green Commun. Netw. 8(4): 1729-1741 (2024) - [i16]Haneet Kour, Rakesh Kumar Jha, Sanjeev Jain:
Antenna Model for Safe Human Exposure in Future 6G Smartphones: A Network Perspective. CoRR abs/2407.17498 (2024) - [i15]Haneet Kour, Rakesh Kumar Jha, Sanjeev Jain, Shubha Jain:
Thermal Radiation (TR) mode: A Deployment Perspective for 5G NR. CoRR abs/2407.17511 (2024) - [i14]Haneet Kour, Rakesh Kumar Jha, Sanjeev Jain:
Green and Safe 6G Wireless Networks: A Hybrid Approach. CoRR abs/2407.17512 (2024) - 2023
- [j63]Himani Sharma, Rakesh Kumar Jha:
Successive Light Interference Cancellation and Allocation (SLICA) Algorithm for Indoor VLC System: A Backbone for 6G Network. IEEE Access 11: 12622-12634 (2023) - [j62]Mantisha Gupta, Rakesh Kumar Jha, Sanjeev Jain:
Tactile Based Intelligence Touch Technology in IoT Configured WCN in B5G/6G-A Survey. IEEE Access 11: 30639-30689 (2023) - [j61]Rakesh Kumar Jha, Mittal K. Pedhadiya, Anutusha Dogra, Haneet Kour, Puja:
Joint resource and power allocation for 5G enabled D2D networking with NOMA. Comput. Networks 222: 109536 (2023) - [j60]Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain:
Behavioral Model for Live Detection of Apps Based Attack. IEEE Trans. Comput. Soc. Syst. 10(3): 934-946 (2023) - [j59]Haneet Kour, Rakesh Kumar Jha, Sanjeev Jain:
Antenna Model for Safe Human Exposure in Future 6G Smartphones: A Network Perspective. IEEE Trans. Green Commun. Netw. 7(4): 2010-2024 (2023) - [j58]Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain:
LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G. IEEE Trans. Netw. Serv. Manag. 20(1): 658-671 (2023) - [j57]Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain:
Intelligent Trust Ranking Security Preserving Model for B5G/6G. IEEE Trans. Netw. Serv. Manag. 20(3): 3549-3561 (2023) - [c23]Mantisha Gupta, Rakesh Kumar Jha, Manish Sabraj:
Touch-Interfacing Middleware Network Design in 6G. COMSNETS 2023: 345-349 - [c22]Anutusha Dogra, Rakesh Kumar Jha, Kumud Ranjan Jha:
Intelligent routing for enabling haptic communication in 6G Network. COMSNETS 2023: 419-422 - [i13]Mantisha Gupta, Rakesh Kumar Jha, Sanjeev Jain:
Tactile based Intelligence Touch Technology in IoT configured WCN in B5G/6G-A Survey. CoRR abs/2301.04328 (2023) - 2022
- [j56]Rashika Raina, Rakesh Kumar Jha:
Intelligent and Interactive Healthcare System (I2HS) Using Machine Learning. IEEE Access 10: 116402-116424 (2022) - [j55]Misbah Shafi, Rakesh Kumar Jha:
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN. IEEE Trans. Netw. Sci. Eng. 9(6): 4001-4016 (2022) - [j54]Sakshi Popli, Rakesh Kumar Jha, Sanjeev Jain:
Green IoT: A Short Survey on Technical Evolution & Techniques. Wirel. Pers. Commun. 123(1): 525-553 (2022) - [j53]Himani Sharma, Rakesh Kumar Jha:
VLC Enabled Hybrid Wireless Network for B5G/6G Communications. Wirel. Pers. Commun. 124(2): 1741-1771 (2022) - [c21]Mantisha Gupta, Rakesh Kumar Jha, Manish Sabraj:
Touch-Technology Middleware Interfacing in 6G Network. ANTS 2022: 1-6 - [i12]Misbah Shafi, Rakesh Kumar Jha:
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN. CoRR abs/2207.06683 (2022) - [i11]Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain:
Behavioral Model For Live Detection of Apps Based Attack. CoRR abs/2207.06686 (2022) - [i10]Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain:
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G. CoRR abs/2210.03518 (2022) - 2021
- [j52]Anutusha Dogra, Rakesh Kumar Jha, Shubha Jain:
A Survey on Beyond 5G Network With the Advent of 6G: Architecture and Emerging Technologies. IEEE Access 9: 67512-67547 (2021) - [j51]Rakesh Kumar Jha, Puja, Haneet Kour, Manoj Kumar, Shubha Jain:
Layer based security in Narrow Band Internet of Things (NB-IoT). Comput. Networks 185: 107592 (2021) - [j50]Sakshi Popli, Rakesh Kumar Jha, Sanjeev Jain:
Green NOMA assisted NB-IoT based urban farming in multistory buildings. Comput. Networks 199: 108410 (2021) - [j49]Sakshi Popli, Rakesh Kumar Jha, Sanjeev Jain:
A comprehensive survey on Green ICT with 5G-NB-IoT: Towards sustainable planet. Comput. Networks 199: 108433 (2021) - [j48]Vinod Kumar, Rakesh Kumar Jha, Sanjeev Jain:
ANGUISH: Security attack in narrowband-Internet of Things (NB-IoT) using game theory and hardware analysis. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j47]Sakshi Popli, Rakesh Kumar Jha, Sanjeev Jain:
Adaptive Small Cell position algorithm (ASPA) for green farming using NB-IoT. J. Netw. Comput. Appl. 173: 102841 (2021) - [j46]Misbah Shafi, Rakesh Kumar Jha:
AR-Based Half-Duplex Attack in Beyond 5G Networks. IEEE Syst. J. 15(2): 1693-1704 (2021) - [j45]Arunima Sharma, Rakesh Kumar Jha:
A Comprehensive Survey on Security Issues in 5G Wireless Communication Network using Beamforming Approach. Wirel. Pers. Commun. 119(4): 3447-3501 (2021) - [c20]Vinod Kumar, Rakesh Kumar Jha, Sanjeev Jain:
Security Issues in Narrowband-IoT: Towards Green Communication. COMSNETS 2021: 369-371 - [i9]Misbah Shafi, Rakesh Kumar Jha:
Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication. CoRR abs/2104.03499 (2021) - [i8]Misbah Shafi, Rakesh Kumar Jha, Manish Sabraj:
A Survey on Security Issues of 5G NR: Perspective of Artificial Dust and Artificial Rain. CoRR abs/2104.03504 (2021) - [i7]Misbah Shafi, Rakesh Kumar Jha:
AR Based Half-Duplex Attack in Beyond 5G networks. CoRR abs/2104.03508 (2021) - [i6]Haneet Kour, Rakesh Kumar Jha:
Electromagnetic Radiation Reduction in 5G Networks and Beyond using Thermal Radiation Mode. CoRR abs/2104.03655 (2021) - 2020
- [j44]Haneet Kour, Rakesh Kumar Jha:
Half-Duplex Radio: Toward Green 5G NR. IEEE Consumer Electron. Mag. 9(6): 34-40 (2020) - [j43]Misbah Shafi, Rakesh Kumar Jha, Manish Sabraj:
A survey on security issues of 5G NR: Perspective of artificial dust and artificial rain. J. Netw. Comput. Appl. 160: 102597 (2020) - [j42]Amika Pal Sundan, Rakesh Kumar Jha, Akhil Gupta:
Energy and spectral efficiency optimization using probabilistic based spectrum slicing (PBSS) in different zones of 5G wireless communication network. Telecommun. Syst. 73(1): 59-73 (2020) - [j41]Haneet Kour, Rakesh Kumar Jha:
Electromagnetic Radiation Reduction in 5G Networks and Beyond Using Thermal Radiation Mode. IEEE Trans. Veh. Technol. 69(10): 11841-11856 (2020) - [j40]Akhil Gupta, Rakesh Kumar Jha:
Power optimization with low complexity using scaled beamforming approach for a massive MIMO and small cell scenario. Wirel. Networks 26(2): 1165-1176 (2020) - [j39]Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
Dispersed beamforming approach for secure communication in UDN. Wirel. Networks 26(5): 3227-3244 (2020) - [j38]Vinod Kumar, Rakesh Kumar Jha, Sanjeev Jain:
NB-IoT Security: A Survey. Wirel. Pers. Commun. 113(4): 2661-2708 (2020) - [c19]Haneet Kour, Rakesh Kumar Jha:
EM Radiation Reduction in WCN: Towards Safe Generations. COMSNETS 2020: 559-562 - [c18]Misbah Shafi, Rakesh Kumar Jha:
Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication. COMSNETS 2020: 879-881 - [i5]Sanjeev Singh, Rakesh Kumar Jha:
A Survey on Software Defined Networking: Architecture for Next Generation Network. CoRR abs/2001.10165 (2020)
2010 – 2019
- 2019
- [j37]Sakshi Popli, Rakesh Kumar Jha, Sanjeev Jain:
A Survey on Energy Efficient Narrowband Internet of Things (NBIoT): Architecture, Application and Challenges. IEEE Access 7: 16739-16776 (2019) - [j36]Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
RBA: Detection and Protection Analysis Using Region-Based Algorithm in Ultra-Dense Networks. IEEE Access 7: 52997-53011 (2019) - [j35]Suresh V. Limkar, Rakesh Kumar Jha:
A novel method for parallel indexing of real time geospatial big data generated by IoT devices. Future Gener. Comput. Syst. 97: 433-452 (2019) - [j34]Ishfaq Bashir Sofi, Akhil Gupta, Rakesh Kumar Jha:
Power and energy optimization with reduced complexity in different deployment scenarios of massive MIMO network. Int. J. Commun. Syst. 32(6) (2019) - [j33]Pimmy Gandotra, Rakesh Kumar Jha:
Energy-efficient device-to-device communication using adaptive resource-block allocation. Int. J. Commun. Syst. 32(8) (2019) - [j32]Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
Novel Beamforming Approach for Secure Communication in UDN to Maximize Secrecy Rate and Fairness Security Assessment. IEEE Internet Things J. 6(4): 5935-5947 (2019) - [j31]Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
RBA: Region Based Algorithm for secure harvesting in Ultra Dense Network. J. Netw. Comput. Appl. 125: 179-189 (2019) - [j30]Mittal K. Pedhadiya, Rakesh Kumar Jha, Hetal G. Bhatt:
Device to device communication: A survey. J. Netw. Comput. Appl. 129: 71-89 (2019) - [j29]Suresh V. Limkar, Rakesh Kumar Jha:
Computing over encrypted spatial data generated by IoT. Telecommun. Syst. 70(2): 193-229 (2019) - [j28]Haneet Kour, Rakesh Kumar Jha, Sanjeev Jain, Preetam Kumar:
Protocol design and resource allocation for power optimization using spectrum sharing for 5G networks. Telecommun. Syst. 72(1): 95-113 (2019) - [j27]Pimmy Gandotra, Rakesh Kumar Jha:
Zonal-Based GrEEn Algorithm for Augmenting the Battery Life in Spectrum Shared Networks via D2D Communication. IEEE Trans. Veh. Technol. 68(1): 405-419 (2019) - [j26]Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
Rank-Based Secrecy Rate Improvement Using NOMA for Ultra Dense Network. IEEE Trans. Veh. Technol. 68(11): 10687-10702 (2019) - [j25]Shakti Raj Chopra, Akhil Gupta, Rakesh Kumar Jha:
Performance Analysis of Grouped Multilevel Space-Time Trellis Coding Technique Using Cognitive Radio in Different Deployment Models. Wirel. Commun. Mob. Comput. 2019: 5280615:1-5280615:20 (2019) - [c17]Haneet Kour, Rakesh Kumar Jha:
Power Optimization using Spectrum Sharing for 5G Wireless Networks. COMSNETS 2019: 395-398 - [c16]Haneet Kour, Rakesh Kumar Jha:
Power Optimization using Spectrum Sharing for Next Generation Cellular Networks. COMSNETS 2019: 562-564 - 2018
- [j24]Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
TPA: Prediction of Spoofing Attack Using Thermal Pattern Analysis in Ultra Dense Network for High Speed Handover Scenario. IEEE Access 6: 66268-66284 (2018) - [j23]Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain:
E2ARC: Energy-efficient adaptive resource block allocation with low complexity in device-to-device communication. Trans. Emerg. Telecommun. Technol. 29(11) (2018) - [j22]Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain:
Prolonging User Battery Lifetime Using Green Communication in Spectrum Sharing Networks. IEEE Commun. Lett. 22(7): 1490-1493 (2018) - [j21]Haneet Kour, Rakesh Kumar Jha, Sanjeev Jain:
A comprehensive survey on spectrum sharing: Architecture, energy efficiency and security issues. J. Netw. Comput. Appl. 103: 29-57 (2018) - [j20]Akshita Abrol, Rakesh Kumar Jha, Sanjeev Jain, Preetam Kumar:
Joint power allocation and relay selection strategy for 5G network: a step towards green communication. Telecommun. Syst. 68(2): 201-215 (2018) - [j19]Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain:
Green NOMA With Multiple Interference Cancellation (MIC) Using Sector-Based Resource Allocation. IEEE Trans. Netw. Serv. Manag. 15(3): 1006-1017 (2018) - [j18]Akhil Gupta, Rakesh Kumar Jha, Pimmy Gandotra, Sanjeev Jain:
Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network. IEEE Trans. Veh. Technol. 67(1): 618-632 (2018) - [j17]Garima Chopra, Sanjeev Jain, Rakesh Kumar Jha:
Possible Security Attack Modeling in Ultradense Networks Using High-Speed Handover Management. IEEE Trans. Veh. Technol. 67(3): 2178-2192 (2018) - [j16]Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain:
Sector-Based Radio Resource Allocation (SBRRA) Algorithm for Better Quality of Service and Experience in Device-to-Device (D2D) Communication. IEEE Trans. Veh. Technol. 67(7): 5750-5765 (2018) - [c15]Pimmy Gandotra, Rakesh Kumar Jha:
Adaptive Resource Block Allocation for Green 5G Wireless Communication Networks. ANTS 2018: 1-6 - [c14]Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
Security issues in ultra dense network for 5G scenario. COMSNETS 2018: 510-512 - [c13]Pimmy Gandotra, Rakesh Kumar Jha:
Next generation cellular networks and green communication. COMSNETS 2018: 522-524 - [i4]Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain:
Sector-Based Radio Resource Allocation (SBRRA) Algorithm for Better Quality of Service and Experience in Device-to-Device (D2D) Communication. CoRR abs/1801.06866 (2018) - 2017
- [j15]Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain:
Green Communication in Next Generation Cellular Networks: A Survey. IEEE Access 5: 11727-11758 (2017) - [j14]Akhil Gupta, Rakesh Kumar Jha, Sanjeev Jain:
Attack modeling and intrusion detection system for 5G wireless communication network. Int. J. Commun. Syst. 30(10) (2017) - [j13]Akhil Gupta, Rakesh Kumar Jha:
Power optimization using optimal small cell arrangements in different deployment scenarios. Int. J. Commun. Syst. 30(13) (2017) - [j12]Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain:
A survey on device-to-device (D2D) communication: Architecture and security issues. J. Netw. Comput. Appl. 78: 9-29 (2017) - [j11]Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions. J. Netw. Comput. Appl. 95: 54-78 (2017) - [j10]Pimmy Gandotra, Rakesh Kumar Jha:
A survey on green communication and security challenges in 5G wireless communication networks. J. Netw. Comput. Appl. 96: 39-61 (2017) - [j9]Sanjeev Singh, Rakesh Kumar Jha:
A Survey on Software Defined Networking: Architecture for Next Generation Network. J. Netw. Syst. Manag. 25(2): 321-374 (2017) - [j8]Akhil Gupta, Rakesh Kumar Jha:
Power optimization using massive MIMO and small cells approach in different deployment scenarios. Wirel. Networks 23(3): 959-973 (2017) - 2016
- [j7]Akshita Abrol, Rakesh Kumar Jha:
Power Optimization in 5G Networks: A Step Towards GrEEn Communication. IEEE Access 4: 1355-1374 (2016) - [j6]Pimmy Gandotra, Rakesh Kumar Jha:
Device-to-Device Communication in Cellular Networks: A Survey. J. Netw. Comput. Appl. 71: 99-117 (2016) - [j5]Idris Zoher Bholebawa, Rakesh Kumar Jha, Upena D. Dalal:
Performance Analysis of Proposed OpenFlow-Based Network Architecture Using Mininet. Wirel. Pers. Commun. 86(2): 943-958 (2016) - [i3]Pimmy Gandotra, Rakesh Kumar Jha:
Device-to-Device Communication in Cellular Networks: A Survey. CoRR abs/1606.05749 (2016) - 2015
- [j4]Akhil Gupta, Rakesh Kumar Jha:
A Survey of 5G Network: Architecture and Emerging Technologies. IEEE Access 3: 1206-1232 (2015) - 2014
- [c12]Jahnvi Tiwari, Ashish Kumar Singh, Ashish Yadav, Rakesh Kumar Jha:
Sustainable power production and purification of water. ICACCI 2014: 2258-2263 - 2012
- [c11]Rakesh Kumar Jha, Upena D. Dalal:
Location based radio resource allocation (LBRRA) in WiMAX and WiMAX-WLAN interface network. COMSNETS 2012: 1-2 - [i2]Rakesh Kumar Jha, Upena D. Dalal, A. Vishal Wankhade:
Resource Allocation in Mobile WiMAX Network: An Optimal Approach. CoRR abs/1211.1782 (2012) - 2011
- [j3]Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal:
Location Based Performance of WiMAX Network for QoS with Optimal Base Stations (BS). Wirel. Eng. Technol. 2(3): 135-145 (2011) - [j2]Kalpana Chaudhari, Upena D. Dalal, Rakesh Kumar Jha:
E-Governance in Rural India: Need of Broadband Connectivity Using Wireless Technology. Wirel. Eng. Technol. 2(3): 212-220 (2011) - [c10]Rakesh Kumar Jha, Upena D. Dalal:
Location based radio resource allocation (LBRRA) for WiMAX networks. IEEE ANTS 2011: 1-6 - [c9]Rakesh Kumar Jha, Upena D. Dalal:
Location based WiMAX network optimization: power consumption with traffic load. ACWR 2011: 503-508 - [c8]Rakesh Kumar Jha, Upena D. Dalal:
Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology. ADCONS 2011: 279-288 - [c7]Rakesh Kumar Jha, A. Vishal Wankhade, Upena D. Dalal:
An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network. ADCONS 2011: 357-365 - [c6]A. Wankhede Vishal, Rakesh Kumar Jha, Upena D. Dalal:
Resource allocation for downlink OFDMA in WiMAX systems. ICCCS 2011: 82-85 - [c5]Rakesh Kumar Jha, Suresh V. Limkar, Upena D. Dalal:
A performance comparison for QoS with different WiMAX environment for video application. ICWET 2011: 785-790 - [c4]Suresh V. Limkar, Rakesh Kumar Jha, Shilpa Pimpalkar:
IPv6: issues and solution for next millennium of internet. ICWET 2011: 953-954 - [c3]Suresh V. Limkar, Rakesh Kumar Jha, Shilpa Pimpalkar, Santosh Darade:
Geo-Encryption - A New Direction to Secure Traditional SSL VPN. ITNG 2011: 1070-1071 - [c2]Suresh V. Limkar, Nivedita Kadam, Rakesh Kumar Jha:
Access Control Based on Location and Time. SPIT/IPC 2011: 102-107 - 2010
- [j1]Rakesh Kumar Jha, Hardik Patel, Upena D. Dalal, A. Wankhede Vishal:
WiMAX System Simulation and Performance Analysis under the Influence of Jamming. Wirel. Eng. Technol. 1(1): 20-26 (2010) - [c1]Rakesh Kumar Jha, Upena D. Dalal:
Performance comparison of Intelligent Jamming in RF (Physical) Layer with WLAN Ethernet Router and WLAN Ethernet Bridge. Kaleidoscope 2010: 1-6 - [i1]Rakesh Kumar Jha, A. Wankhede Vishal, Upena D. Dalal:
A Survey of Mobile WiMAX IEEE 802.16m Standard. CoRR abs/1005.0976 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint