default search action
Wei Tong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Wei Tong 0001 — Huazhong University of Science and Technology, Wuhan National Laboratory for Optoelectronics, China
- Wei Tong 0002 (aka: Kevin W. Tong 0002) — Nanjing University of Science and Technology, School of Mechanical Engineering, Jiangsu, China (and 1 more)
- Wei Tong 0003 — Xidian University, School of Computer Science and Technology, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j36]Wenjie Chen, Haoyu Chen, Tingxuan Han, Wei Tong, Sheng Zhong:
Secure Two-Party Frequent Itemset Mining With Guaranteeing Differential Privacy. IEEE Trans. Mob. Comput. 24(1): 276-292 (2025) - 2024
- [j35]Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
SGBA: A stealthy scapegoat backdoor attack against deep neural networks. Comput. Secur. 136: 103523 (2024) - [j34]Wei Tong, Qi-Ping Huang:
Detection method of abnormal state of power transformer based on SOM neural network. Int. J. Model. Identif. Control. 45(2/3): 154-163 (2024) - [j33]Wei Tong, Ruifang Yan, Guoxian Chen:
A class of bound-preserving MUSCL-Hancock schemes in two dimensions. J. Comput. Phys. 498: 112668 (2024) - [j32]Wei Tong, Weiqi Yue, Fangni Chen, Wei Shi, Lei Zhang, Jian Wan:
MSE-VGG: A Novel Deep Learning Approach Based on EEG for Rapid Ischemic Stroke Detection. Sensors 24(13): 4234 (2024) - [j31]Wei Tong, Jiacheng Niu, Jingyu Hua, Qun Li, Sheng Zhong:
Scalable Differentially Private Model Publishing Via Private Iterative Sample Selection. IEEE Trans. Dependable Secur. Comput. 21(4): 2494-2506 (2024) - [j30]Ying He, Zhili Shen, Jingyu Hua, Qixuan Dong, Jiacheng Niu, Wei Tong, Xu Huang, Chen Li, Sheng Zhong:
Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 748-763 (2024) - [c40]Yihong Hu, Nuo Xu, Chaochao Feng, Wei Tong, Kang Liu, Liang Fang:
LOSSS-Logic Synthesis based on Several Stateful logic gates for high time-efficient computing. ASPDAC 2024: 805-811 - [c39]Wei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong:
Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. CCS 2024: 3555-3569 - [i9]Zhili Shen, Zihang Xi, Ying He, Wei Tong, Jingyu Hua, Sheng Zhong:
The Fire Thief Is Also the Keeper: Balancing Usability and Privacy in Prompts. CoRR abs/2406.14318 (2024) - [i8]Wei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong:
Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. CoRR abs/2406.19466 (2024) - [i7]Fei Wang, Weibo Gao, Qi Liu, Jiatong Li, Guanhao Zhao, Zheng Zhang, Zhenya Huang, Mengxiao Zhu, Shijin Wang, Wei Tong, Enhong Chen:
A Survey of Models for Cognitive Diagnosis: New Developments and Future Directions. CoRR abs/2407.05458 (2024) - [i6]Songrui Wang, Yubo Zhu, Wei Tong, Sheng Zhong:
Detecting Dataset Abuse in Fine-Tuning Stable Diffusion Models for Text-to-Image Synthesis. CoRR abs/2409.18897 (2024) - [i5]Gang Li, Wendi Yu, Yao Yao, Wei Tong, Yingbin Liang, Qihang Lin, Tianbao Yang:
Model Developmental Safety: A Safety-Centric Method and Applications in Vision-Language Models. CoRR abs/2410.03955 (2024) - 2023
- [j29]Ruifang Yan, Wei Tong, Guoxian Chen:
An efficient invariant-region-preserving central scheme for hyperbolic conservation laws. Appl. Math. Comput. 436: 127500 (2023) - [j28]Ruifang Yan, Wei Tong, Guoxian Chen:
A mass conservative, well balanced and positivity-preserving central scheme for shallow water equations. Appl. Math. Comput. 443: 127778 (2023) - [j27]Wei Tong, Ruifang Yan, Guoxian Chen:
On a class of robust bound-preserving MUSCL-Hancock schemes. J. Comput. Phys. 474: 111805 (2023) - [j26]Wei Tong, Yinggang Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong:
Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses. IEEE Trans. Dependable Secur. Comput. 20(3): 2433-2449 (2023) - [j25]Tao Zhao, Wei Tong, Yao Mao:
Hybrid Nonsingleton Fuzzy Strong Tracking Kalman Filtering for High Precision Photoelectric Tracking System. IEEE Trans. Ind. Informatics 19(3): 2395-2408 (2023) - [j24]Wei Tong, Wenjie Chen, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage. IEEE Trans. Mob. Comput. 22(9): 5463-5478 (2023) - [c38]William C. Kwan, Emma K. Brunton, James M. Begeng, Rachael T. Richardson, Michael R. Ibbotson, Wei Tong:
Timing is Everything: Stochastic Optogenetic Stimulation Reduces Adaptation in Retinal Ganglion Cells. EMBC 2023: 1-4 - [c37]Wei Tong, Wenjie Chen, Tingxuan Han, Haoyu Chen, Sheng Zhong:
Differentially Private Two-Party Top-$k$ Frequent Item Mining. ICDCS 2023: 166-177 - [c36]Wei Tong, Ce Shen, Zesong Dong, Jian Li:
Interoperability Solution for Blockchain-Based Internet of Vehicles Driven by Multiple Oracles. ITSC 2023: 196-202 - [c35]Gang Li, Wei Tong, Tianbao Yang:
Maximization of Average Precision for Deep Learning with Adversarial Ranking Robustness. NeurIPS 2023 - [c34]Ruofan Yang, Dong Luo, Jing Sun, Hang Zhao, Qingsong Li, Qiong Tian, Wei Tong, Dianpeng Qi, Guanglin Li, Zhiyuan Liu:
A high-density stretchable electrode array for stable sEMG monitoring on dorsal hand. RCAR 2023: 481-485 - 2022
- [j23]Weitao Chen, Shubing Ouyang, Wei Tong, Xianju Li, Xiongwei Zheng, Lizhe Wang:
GCSANet: A Global Context Spatial Attention Deep Learning Network for Remote Sensing Scene Classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 1150-1162 (2022) - 2021
- [j22]Meng Li, Zhuang Tang, Wei Tong, Xianju Li, Weitao Chen, Lizhe Wang:
A Multi-Level Output-Based DBN Model for Fine Classification of Complex Geo-Environments Area Using Ziyuan-3 TMS Imagery. Sensors 21(6): 2089 (2021) - [c33]Wei Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong:
Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates. ICDCS 2021: 808-818 - [c32]Zhenya Huang, Xin Lin, Hao Wang, Qi Liu, Enhong Chen, Jianhui Ma, Yu Su, Wei Tong:
DisenQNet: Disentangled Representation Learning for Educational Questions. KDD 2021: 696-704 - [c31]Yuqiang Zhou, Qi Liu, Jinze Wu, Fei Wang, Zhenya Huang, Wei Tong, Hui Xiong, Enhong Chen, Jianhui Ma:
Modeling Context-aware Features for Cognitive Diagnosis in Student Learning. KDD 2021: 2420-2428 - [c30]Yixiao Ma, Shiwei Tong, Ye Liu, Likang Wu, Qi Liu, Enhong Chen, Wei Tong, Zi Yan:
Enhanced Representation Learning for Examination Papers with Hierarchical Document Structure. SIGIR 2021: 2156-2160 - [i4]Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
RABA: A Robust Avatar Backdoor Attack on Deep Neural Network. CoRR abs/2104.01026 (2021) - [i3]Wei Tong, Jiri Matas, Daniel Barath:
Deep MAGSAC++. CoRR abs/2111.14093 (2021) - 2020
- [j21]Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
Distributed K-Means clustering guaranteeing local differential privacy. Comput. Secur. 90: 101699 (2020) - [j20]Bin Liu, Zhongli Zhou, Qilin Dai, Wei Tong:
FastICA and total variation algorithm for geochemical anomaly extraction. Earth Sci. Informatics 13(1): 153-162 (2020) - [j19]Wei Tong, Weitao Chen, Wei Han, Xianju Li, Lizhe Wang:
Channel-Attention-Based DenseNet Network for Remote Sensing Image Scene Classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 4121-4132 (2020) - [c29]Detao Qi, Weijun Zeng, Wei Tong, Jian Yang:
Accelerated Elastic Network Regression via Random Projection. ICCT 2020: 1488-1493 - [c28]Wei Tong, Shiwei Tong, Wei Huang, Liyang He, Jianhui Ma, Qi Liu, Enhong Chen:
Exploiting Knowledge Hierarchy for Finding Similar Exercises in Online Education Systems. ICDM 2020: 1298-1303 - [c27]Chang Xia, Jingyu Hua, Wei Tong, Yayuan Xiong, Sheng Zhong:
A Privacy-Preserving Scheme For Convolutional Neural Network-Based Applications In Mobile Cloud. ICME 2020: 1-6 - [c26]Xinrui Li, Liang Zhao, Xi Yin, Yinxin Zhu, Jianping Shen, Wei Tong:
Time and Incentive-Aware Neural Networks for Life Insurance Premium Prediction. ICONIP (5) 2020: 813-821 - [i2]William Lemaire, Maher Benhouria, Konin Koua, Wei Tong, Gabriel Martin-Hardy, Melanie Stamp, Kumaravelu Ganesan, Louis-Philippe Gauthier, Marwan Besrour, Arman Ahnood, David John Garrett, Sébastien Roy, Michael R. Ibbotson, Steven Prawer, Réjean Fontaine:
Retinal Ganglion Cell Stimulation with an Optically Powered Retinal Prosthesis. CoRR abs/2010.12600 (2020)
2010 – 2019
- 2019
- [j18]Kun Wang, Zhiquan Song, Peng Fu, Wei Tong, Hua Li, Xiuqing Zhang:
Structure Optimization of Fast Discharge Resistor System for Quench Protection System. IEEE Access 7: 52122-52131 (2019) - [j17]Wei Tong, Hua Li, Peng Fu, Zhiquan Song, Kun Wang, Shusheng Wang, Xiuqing Zhang:
Parameter Optimization of Thyristor Snubber Circuit in LSTF Quench Protection System. IEEE Access 7: 81257-81265 (2019) - [j16]Fang-Dong Li, Wei Tong, En-Hua Xia, Chao-Ling Wei:
Optimized sequencing depth and de novo assembler for deeply reconstructing the transcriptome of the tea plant, an economically important plant species. BMC Bioinform. 20(1): 553:1-553:11 (2019) - [c25]Wei Tong, Melanie Stamp, Maryam Hejazi, David J. Garrett, Steven Prawer, Michael R. Ibbotson:
The Effects of Phase Durations on the Spatial Responses of Retinal Ganglion Cells to Epi- and Sub-Retinal Electrical Stimulation. EMBC 2019: 1795-1800 - [c24]Fang Xue, Shanjun Zhang, Wenchao Cui, Yuehong Gong, Wei Tong:
Biodegradation of n-Hexadecane by P. Aeruginosa with Treatment of Rhamnolipid Bio-Surfactant. ICBET 2019: 312-317 - [c23]Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. ICDCS 2019: 1007-1018 - [c22]Yu Yin, Qi Liu, Zhenya Huang, Enhong Chen, Wei Tong, Shijin Wang, Yu Su:
QuesNet: A Unified Representation for Heterogeneous Test Questions. KDD 2019: 1328-1336 - [c21]Kai Tang, Wei Tong, Jun Ma, Bo Liu:
DV-NVLLC: Efficiently guaranteeing crash consistency in persistent memory via dynamic versioning. NAS 2019: 1-8 - [i1]Yu Yin, Qi Liu, Zhenya Huang, Enhong Chen, Wei Tong, Shijin Wang, Yu Su:
QuesNet: A Unified Representation for Heterogeneous Test Questions. CoRR abs/1905.10949 (2019) - 2018
- [j15]Yang Chen, Yuehang Xu, Jinhai Quan, Wei Tong, Ruimin Xu:
A broadband GaAs high power millimeter wave amplifier with high gain and flatness. IEICE Electron. Express 15(10): 20180229 (2018) - [j14]Changhua Yao, Xueqiang Chen, Lei Wang, Wei Tong, Xinrong Wu, Yuli Zhang, Kailing Yao:
Coalition game based relay decision distributed learning in high dynamic heterogeneous intelligent UAV networks. J. Intell. Fuzzy Syst. 35(1): 133-140 (2018) - [j13]Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Trans. Inf. Forensics Secur. 13(5): 1155-1168 (2018) - 2017
- [j12]Yin Tian, Guangming Wang, Jie Yang, Wei Tong, Yu Cao, Yijun Chen, Guang Yang, Yexi Song:
A Ka-band TDD front-end chip with 24.7% bandwidth and temperature compensation technology. IEICE Electron. Express 14(9): 20170350 (2017) - [j11]Yin Tian, Guangming Wang, Yexi Song, Jie Yang, Yu Cao, Wei Tong, Yijun Chen, Shiwen Tang:
A compact Ka-band antenna-in-package for system-in-package application. IEICE Electron. Express 14(12): 20170444 (2017) - [j10]Wei Tong, Jingyu Hua, Sheng Zhong:
A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Trans. Inf. Forensics Secur. 12(10): 2444-2456 (2017) - 2016
- [j9]Wei Tong, Sheng Zhong:
A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems. IEEE Trans. Inf. Forensics Secur. 11(10): 2255-2267 (2016) - [j8]Yuan Zhang, Wei Tong, Sheng Zhong:
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy. IEEE Trans. Inf. Forensics Secur. 11(11): 2528-2541 (2016) - [c20]Wei Tong, Peng Gong:
iLearning: Mobile Training Platform. HCC 2016: 765-771 - 2015
- [j7]Yan Yan, Yi Yang, Deyu Meng, Gaowen Liu, Wei Tong, Alexander G. Hauptmann, Nicu Sebe:
Event Oriented Dictionary Learning for Complex Event Detection. IEEE Trans. Image Process. 24(6): 1867-1878 (2015) - [c19]Wei Tong, Sheng Zhong:
Resource allocation in pollution attack and defense: A game-theoretic perspective. ICC 2015: 3057-3062 - 2014
- [j6]Wei Tong, Yi Yang, Lu Jiang, Shoou-I Yu, Zhen-zhong Lan, Zhigang Ma, Waito Sze, Ehsan Younessian, Alexander G. Hauptmann:
E-LAMP: integration of innovative ideas for multimedia event detection. Mach. Vis. Appl. 25(1): 5-15 (2014) - [c18]Lu Jiang, Wei Tong, Deyu Meng, Alexander G. Hauptmann:
Towards Efficient Learning of Optimal Spatial Bag-of-Words Representations. ICMR 2014: 121 - [c17]Chenqiang Gao, Deyu Meng, Wei Tong, Yi Yang, Yang Cai, Haoquan Shen, Gaowen Liu, Shicheng Xu, Alexander G. Hauptmann:
Interactive Surveillance Event Detection through Mid-level Discriminative Representation. ICMR 2014: 305 - [c16]Gaowen Liu, Yan Yan, Chenqiang Gao, Wei Tong, Alexander G. Hauptmann, Nicu Sebe:
The Mystery of Faces: Investigating Face Contribution for Multimedia Event Detection. ICMR 2014: 467 - 2013
- [c15]Longfei Zhang, Yue Gao, Wei Tong, Gangyi Ding, Alexander G. Hauptmann:
Multi-camera Egocentric Activity Detection for Personal Assistant. MMM (2) 2013: 499-501 - [c14]Zhenzhong Lan, Lu Jiang, Shoou-I Yu, Chenqiang Gao, Shourabh Rawat, Yang Cai, Shicheng Xu, Haoquan Shen, Xuanchong Li, Yipei Wang, Waito Sze, Yan Yan, Zhigang Ma, Nicolas Ballas, Deyu Meng, Wei Tong, Yi Yang, Susanne Burger, Florian Metze, Rita Singh, Bhiksha Raj, Richard M. Stern, Teruko Mitamura, Eric Nyberg, Alexander G. Hauptmann:
Informedia@TRECVID 2013. TRECVID 2013 - 2012
- [j5]Bokui Chen, Chuanfei Dong, Yike Liu, Wei Tong, Wenyao Zhang, Jie Liu, Binghong Wang:
Real-time information feedback based on a sharp decay weighted function. Comput. Phys. Commun. 183(10): 2081-2088 (2012) - [j4]Jung-Eun Lee, Rong Jin, Anil K. Jain, Wei Tong:
Image Retrieval in Forensics: Tattoo Image Database Application. IEEE Multim. 19(1): 40-49 (2012) - [j3]Wei Tong, Fengjie Li, Rong Jin, Anil K. Jain:
Large-scale near-duplicate image retrieval by kernel density estimation. Int. J. Multim. Inf. Retr. 1(1): 45-58 (2012) - [j2]Jun Yang, Wei Tong, Alexander G. Hauptmann:
A Framework for Classifier Adaptation for Large-Scale Multimedia Data. Proc. IEEE 100(9): 2639-2657 (2012) - [c13]Hai-xin Jiang, Wei Tong:
New Lax-Friedrichs Scheme for Convective-Diffusion Equation. ICICA (LNCS) 2012: 269-276 - [c12]Wei Tong, Yun Wu:
Generalized Lax-Friedrichs Scheme for Convective-Diffusion Equation. ICICA (1) 2012: 321-328 - [c11]Hui Li, Yun-Min Zhao, Wei Tong:
The research of production engineering equipment simulation system. ICMLC 2012: 615-618 - [c10]Yang Cai, Wei Tong, Linjun Yang, Alexander G. Hauptmann:
Constrained keypoint quantization: towards better bag-of-words model for large-scale multimedia retrieval. ICMR 2012: 16 - [c9]Wei Tong, Orlando Moreira, Rick J. M. Nas, Kees van Berkel:
Hard-Real-Time Scheduling on a Weakly Programmable Multi-core Processor with Application to Multi-standard Channel Decoding. IEEE Real-Time and Embedded Technology and Applications Symposium 2012: 151-160 - [c8]Shoou-I Yu, Zhongwen Xu, Duo Ding, Waito Sze, Francisco Vicente, Zhenzhong Lan, Yang Cai, Shourabh Rawat, Peter F. Schulam, Nisarga Markandaiah, Sohail Bahmani, Antonio Juárez, Wei Tong, Yi Yang, Susanne Burger, Florian Metze, Rita Singh, Bhiksha Raj, Richard M. Stern, Teruko Mitamura, Eric Nyberg, Lu Jiang, Qiang Chen, Lisa M. Brown, Ankur Datta, Quanfu Fan, Rogério Schmidt Feris, Shuicheng Yan, Alexander G. Hauptmann, Sharath Pankanti:
Informedia @TRECVID 2012. TRECVID 2012 - 2011
- [c7]Yun Wu, Hai-xin Jiang, Wei Tong:
Generalized Lax-Friedrichs Schemes for Linear Advection Equation with Damping. ICICA (LNCS) 2011: 305-312 - [c6]Wei Tong, Fengjie Li, Tianbao Yang, Rong Jin, Anil K. Jain:
A kernel density based approach for large scale image retrieval. ICMR 2011: 28 - 2010
- [c5]Tianbao Yang, Rong Jin, Anil K. Jain, Yang Zhou, Wei Tong:
Unsupervised transfer classification: application to text categorization. KDD 2010: 1159-1168
2000 – 2009
- 2009
- [c4]Fengjie Li, Wei Tong, Rong Jin, Anil K. Jain, Jung-Eun Lee:
An efficient key point quantization algorithm for large scale image retrieval. LS-MMRM@ACM Multimedia 2009: 89-96 - 2008
- [c3]Min Huang, Guihua Bo, Wei Tong, W. H. Ip, Xingwei Wang:
A hybrid immune algorithm for solving Fourth-Party Logistics routing optimizing problem. IEEE Congress on Evolutionary Computation 2008: 286-291 - 2007
- [c2]Wei Tong, Rong Jin:
Semi-Supervised Learning by Mixed Label Propagation. AAAI 2007: 651-656 - 2006
- [c1]Min Huang, Wei Tong, Qing Wang, Xin Xu, Xingwei Wang:
Immune Algorithm Based Routing Optimization in Fourth-Party Logistics. IEEE Congress on Evolutionary Computation 2006: 3029-3034 - 2004
- [j1]Tzuu-Hseng S. Li, Shih-Jie Chang, Wei Tong:
Fuzzy target tracking control of autonomous mobile robots by using infrared sensors. IEEE Trans. Fuzzy Syst. 12(4): 491-501 (2004)
Coauthor Index
aka: Alexander G. Hauptmann
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 20:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint