default search action
Khin Mi Mi Aung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Jingwei Hu, Yongjun Zhao, Benjamin Hong Meng Tan, Khin Mi Mi Aung, Huaxiong Wang:
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 19: 6184-6196 (2024) - [c48]Hailin Li, Raghavendra Ramachandra, Mohamed Ragab, Soumik Mondal, Yong Kiam Tan, Khin Mi Mi Aung:
Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models. IJCB 2024: 1-10 - [c47]Sezin Kircali Ata, Zhi-Hui Kong, Anusha James, Lile Cai, Kiat Seng Yeo, Khin Mi Mi Aung, Chuan Sheng Foo, Ashish James:
The Initialization Factor: Understanding its Impact on Active Learning for Analog Circuit Design. ISCAS 2024: 1-5 - [c46]Sunpill Kim, Yong Kiam Tan, Bora Jeong, Soumik Mondal, Khin Mi Mi Aung, Jae Hong Seo:
Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems. SP 2024: 1684-1702 - [i13]Hailin Li, Raghavendra Ramachandra, Mohamed Ragab, Soumik Mondal, Yong Kiam Tan, Khin Mi Mi Aung:
Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models. CoRR abs/2409.18636 (2024) - 2023
- [j32]Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung, Zengpeng Li:
Decentralized Identity Authentication with Auditability and Privacy. Algorithms 16(1): 4 (2023) - [j31]Kexin Xu, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Threshold Homomorphic Encryption From Provably Secure NTRU. Comput. J. 66(12): 2861-2873 (2023) - [j30]Kexin Xu, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption. J. Inf. Secur. Appl. 77: 103582 (2023) - [j29]Kexin Xu, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping. Theor. Comput. Sci. 968: 114026 (2023) - [c45]Dee Meng Kang, Haadee Faahym, Souhail Meftah, Sye Loong Keoh, Khin Mi Mi Aung:
Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. Critical Infrastructure Protection 2023: 177-192 - 2022
- [j28]Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments. Algorithms 15(6): 183 (2022) - [j27]Jestine Paul, Benjamin Hong Meng Tan, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Non-Interactive Decision Trees and Applications with Multi-Bit TFHE. Algorithms 15(9): 333 (2022) - [j26]Souhail Meftah, Benjamin Hong Meng Tan, Khin Mi Mi Aung, Yuxiao Lu, Jie Lin, Bharadwaj Veeravalli:
Towards high performance homomorphic encryption for inference tasks on CPU: An MPI approach. Future Gener. Comput. Syst. 134: 13-21 (2022) - [j25]Ergute Bao, Yizheng Zhu, Xiaokui Xiao, Yin Yang, Beng Chin Ooi, Benjamin Hong Meng Tan, Khin Mi Mi Aung:
Skellam Mixture Mechanism: a Novel Approach to Federated Learning with Differential Privacy. Proc. VLDB Endow. 15(11): 2348-2360 (2022) - [j24]Jun Wang, Chao Jin, Qiang Tang, Zhe Liu, Khin Mi Mi Aung:
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy. IEEE Trans. Dependable Secur. Comput. 19(4): 2622-2634 (2022) - [c44]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. EUROCRYPT (1) 2022: 611-641 - [i12]Ergute Bao, Yizheng Zhu, Xiaokui Xiao, Yin Yang, Beng Chin Ooi, Benjamin Hong Meng Tan, Khin Mi Mi Aung:
Skellam Mixture Mechanism: a Novel Approach to Federated Learning with Differential Privacy. CoRR abs/2212.04371 (2022) - [i11]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. IACR Cryptol. ePrint Arch. 2022: 771 (2022) - 2021
- [j23]Jestine Paul, Meenatchi Sundaram Muthu Selva Annamalai, William Ming, Ahmad Al Badawi, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Privacy-Preserving Collective Learning With Homomorphic Encryption. IEEE Access 9: 132084-132096 (2021) - [j22]Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields. IEEE Trans. Dependable Secur. Comput. 18(6): 2861-2874 (2021) - [j21]Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff:
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IEEE Trans. Emerg. Top. Comput. 9(2): 941-956 (2021) - [j20]Ahmad Al Badawi, Chao Jin, Jie Lin, Chan Fook Mun, Sim Jun Jie, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar:
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs. IEEE Trans. Emerg. Top. Comput. 9(3): 1330-1343 (2021) - [j19]Souhail Meftah, Benjamin Hong Meng Tan, Chan Fook Mun, Khin Mi Mi Aung, Bharadwaj Veeravalli, Vijay Chandrasekhar:
DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 16: 3740-3752 (2021) - [j18]Ahmad Al Badawi, Bharadwaj Veeravalli, Jie Lin, Xiao Nan, Kazuaki Matsumura, Khin Mi Mi Aung:
Multi-GPU Design and Performance Evaluation of Homomorphic Encryption on GPU Clusters. IEEE Trans. Parallel Distributed Syst. 32(2): 379-391 (2021) - [c43]Chan Fook Mun, Ahmad Qaisar, Ahmad Al Badawi, Sim Jun Jie, Benjamin Hong Meng Tan, Foo Chuan Sheng, Khin Mi Mi Aung:
Genotype Imputation with Homomorphic Encryption. ICBIP 2021: 9-13 - [i10]Yuxiao Lu, Jie Lin, Chao Jin, Zhe Wang, Khin Mi Mi Aung, Xiaoli Li:
FFConv: Fast Factorized Neural Network Inference on Encrypted Data. CoRR abs/2102.03494 (2021) - [i9]Jun Wang, Chao Jin, Souhail Meftah, Khin Mi Mi Aung:
Popcorn: Paillier Meets Compression For Efficient Oblivious Neural Network Inference. CoRR abs/2107.01786 (2021) - 2020
- [j17]Ahmad Al Badawi, Louie Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung:
PrivFT: Private and Fast Text Classification With Homomorphic Encryption. IEEE Access 8: 226544-226556 (2020) - [j16]HeeWon Chung, Myungsun Kim, Ahmad Al Badawi, Khin Mi Mi Aung, Bharadwaj Veeravalli:
Homomorphic Comparison for Point Numbers with User-Controllable Precision and Its Applications. Symmetry 12(5): 788 (2020) - [c42]Chao Jin, Mohamed Ragab, Khin Mi Mi Aung:
Secure Transfer Learning for Machine Fault Diagnosis Under Different Operating Conditions. ProvSec 2020: 278-297
2010 – 2019
- 2019
- [j15]Khin Mi Mi Aung, Hyung Tae Lee, Benjamin Hong Meng Tan, Huaxiong Wang:
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem. Theor. Comput. Sci. 771: 49-70 (2019) - [i8]Jin Chao, Ahmad Al Badawi, Balagopal Unnikrishnan, Jie Lin, Chan Fook Mun, James M. Brown, J. Peter Campbell, Michael F. Chiang, Jayashree Kalpathy-Cramer, Vijay Ramaseshan Chandrasekhar, Pavitra Krishnaswamy, Khin Mi Mi Aung:
CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images. CoRR abs/1901.10074 (2019) - [i7]Sim Jun Jie, Chan Fook Mun, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung:
Achieving GWAS with Homomorphic Encryption. CoRR abs/1902.04303 (2019) - [i6]Ahmad Al Badawi, Luong Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung:
PrivFT: Private and Fast Text Classification with Homomorphic Encryption. CoRR abs/1908.06972 (2019) - [i5]Sim Jun Jie, Chan Fook Mun, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung:
Achieving GWAS with Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2019: 145 (2019) - [i4]Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. IACR Cryptol. ePrint Arch. 2019: 332 (2019) - 2018
- [j14]Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Dynamic scheduling strategy with efficient node availability prediction for handling divisible loads in multi-cloud systems. J. Parallel Distributed Comput. 113: 1-16 (2018) - [j13]Ahmad Al Badawi, Bharadwaj Veeravalli, Khin Mi Mi Aung, Brahim Hamadicharef:
Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs. J. Parallel Distributed Comput. 119: 179-190 (2018) - [j12]Quanqing Xu, Chao Jin, Mohamed Faruq Bin Mohamed Rasid, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Blockchain-based decentralized content trust for docker images. Multim. Tools Appl. 77(14): 18223-18248 (2018) - [j11]Ahmad Al Badawi, Bharadwaj Veeravalli, Chan Fook Mun, Khin Mi Mi Aung:
High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 70-95 (2018) - [c41]Ahmad Al Badawi, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography. SOLI 2018: 26-31 - [c40]Renuga Kanagavelu, Yongqing Zhu, Khin Mi Mi Aung:
TOSS: Traffic-aware distributed object-based storage using software-defined networks. SOLI 2018: 131-136 - [i3]Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Sim Jun Jie, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar:
The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs. CoRR abs/1811.00778 (2018) - [i2]Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff:
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2018: 589 (2018) - [i1]Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Sim Jun Jie, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar:
The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs. IACR Cryptol. ePrint Arch. 2018: 1056 (2018) - 2017
- [c39]Quanqing Xu, Chao Jin, Mohamed Faruq Bin Mohamed Rasid, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Decentralized Content Trust for Docker Images. IoTBDS 2017: 431-437 - 2016
- [j10]Shu Qin Ren, Benjamin Hong Meng Tan, Sivaraman Sundaram, Taining Wang, Yibin Ng, Victor Chang, Khin Mi Mi Aung:
Secure searching on cloud storage enhanced by homomorphic indexing. Future Gener. Comput. Syst. 65: 102-110 (2016) - [j9]Miguel Rodel Felipe, Sivaraman Sundaram, Donghong Wang, Khin Mi Mi Aung:
Secured Large Scale Shared Storage System. J. Commun. 11(1): 93-99 (2016) - [j8]Miguel Rodel Felipe, Sivaraman Sundaram, Khin Mi Mi Aung:
Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing. J. Comput. 11(3): 189-194 (2016) - [j7]Pham Nam Khanh, Akash Kumar, Amit Kumar Singh, Khin Mi Mi Aung:
Leakage aware resource management approach with machine learning optimization framework for partially reconfigurable architectures. Microprocess. Microsystems 47: 231-243 (2016) - [j6]Quanqing Xu, Khin Mi Mi Aung, Yongqing Zhu, Khai Leong Yong:
Building a large-scale object-based active storage platform for data analytics in the internet of things. J. Supercomput. 72(7): 2796-2814 (2016) - [c38]Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung:
A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems. BigDataSecurity/HPSC/IDS 2016: 327-332 - [c37]Seungmin Kang, Khin Mi Mi Aung, Bharadwaj Veeravalli:
Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds. SCC@AsiaCCS 2016: 59-66 - [c36]Shu Qin Ren, Benjamin Hong Meng Tan, Yibin Ng, Khin Mi Mi Aung:
Privacy-Preserved Multi-Party Data Merging with Secure Equality Evaluation. ICCCRI 2016: 34-41 - [c35]Rodel Felipe Miguel, Akankshita Dash, Khin Mi Mi Aung:
A study of secure DBaaS with encrypted data transactions. ICCIP 2016: 43-47 - [c34]Renuga Kanagavelu, Khin Mi Mi Aung:
Software-defined load balancer in cloud data centers. ICCIP 2016: 139-143 - [c33]Pham Nam Khanh, Khin Mi Mi Aung, Akash Kumar:
Automatic framework to generate reconfigurable accelerators for option pricing applications. ReConFig 2016: 1-8 - [c32]Pham Nam Khanh, Akash Kumar, Khin Mi Mi Aung:
Machine Learning Approach to Generate Pareto Front for List-scheduling Algorithms. SCOPES 2016: 127-134 - 2015
- [j5]Renuga Kanaga, Khin Mi Mi Aung:
SELDAC: Software-Defined Storage based Efficient Load Distribution and Auto Scaling in Cloud Data Centers. J. Commun. 10(12): 1020-1026 (2015) - [c31]Pham Nam Khanh, Amit Kumar Singh, Akash Kumar, Khin Mi Mi Aung:
Exploiting loop-array dependencies to accelerate the design space exploration with high level synthesis. DATE 2015: 157-162 - [c30]Wen Bing Chuan, Shu Qin Ren, Sye Loong Keoh, Khin Mi Mi Aung:
Flexible Yet Secure De-duplication Service for Enterprise Data on Cloud Storage. ICCCRI 2015: 37-44 - [c29]Renuga Kanagavelu, Khin Mi Mi Aung:
SDN Controlled Local Re-routing to Reduce Congestion in Cloud Data Center. ICCCRI 2015: 80-88 - [c28]Miguel Rodel Felipe, Khin Mi Mi Aung, Xia Ye, Yonggang Wen:
StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption. ICCCRI 2015: 97-105 - [c27]Quanqing Xu, Wilson Yonghong Wang, Khai Leong Yong, Khin Mi Mi Aung:
Building a Robust and Efficient Middleware for Geo-replicated Storage Systems. ICCCRI 2015: 148-155 - [c26]Miguel Rodel Felipe, Khin Mi Mi Aung, Mediana:
HEDup: Secure Deduplication with Homomorphic Encryption. NAS 2015: 215-223 - 2014
- [j4]Renuga Kanagavelu, Bu-Sung Lee, Le Nguyen The Dat, Luke Ng Mingjie, Khin Mi Mi Aung:
Virtual machine placement with two-path traffic routing for reduced congestion in data center networks. Comput. Commun. 53: 1-12 (2014) - [j3]Yang Yu, Shuo Fang, Khin Mi Mi Aung, Chuan Heng Foh, Hui Li, Yongqing Zhu:
A layer 2 multipath solution and its performance evaluation for Data Center Ethernets. Int. J. Commun. Syst. 27(11): 2555-2576 (2014) - [c25]Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung:
ESPRESSO: An Encryption as a Service for Cloud Storage Systems. AIMS 2014: 15-28 - [c24]Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung, Chao Jin:
An efficient scheme to ensure data availability for a cloud service provider. IEEE BigData 2014: 15-20 - [c23]Shu Qin Ren, Benjamin Hong Meng Tan, Sivaraman Sundaram, Taining Wang, Khin Mi Mi Aung:
Homomorphic Exclusive-Or Operation Enhance Secure Searching on Cloud Storage. CloudCom 2014: 989-994 - [c22]Pham Nam Khanh, Amit Kumar Singh, Akash Kumar, Khin Mi Mi Aung:
Design Space Exploration to Accelerate Nelder-Mead Algorithm Using FPGA. FCCM 2014: 100 - [c21]Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Scheduling Multiple Divisible Loads in a Multi-cloud System. UCC 2014: 371-378 - 2013
- [c20]Bu-Sung Lee, Renuga Kanagavelu, Khin Mi Mi Aung:
An efficient flow cache algorithm with improved fairness in Software-Defined Data Center Networks. CloudNet 2013: 18-24 - [c19]Pham Nam Khanh, Amit Kumar Singh, Akash Kumar, Khin Mi Mi Aung:
Incorporating Energy and Throughput Awareness in Design Space Exploration and Run-Time Mapping for Heterogeneous MPSoCs. DSD 2013: 513-521 - [c18]Yongzhen Chen, Miguel Rodel Felipe, Yi Wang, Yajun Ha, Shu Qin Ren, Khin Mi Mi Aung:
sAES: A high throughput and low latency secure cloud storage with pipelined DMA based PCIe interface. FPT 2013: 374-377 - [c17]Shuo Fang, Renuga Kanagavelu, Bu-Sung Lee, Chuan Heng Foh, Khin Mi Mi Aung:
Power-Efficient Virtual Machine Placement and Migration in Data Centers. GreenCom/iThings/CPScom 2013: 1408-1413 - 2012
- [c16]Shuo Fang, Hui Li, Chuan Heng Foh, Yonggang Wen, Khin Mi Mi Aung:
Energy optimizations for data center network: Formulation and its solution. GLOBECOM 2012: 3256-3261 - [c15]Shuo Fang, Chuan Heng Foh, Khin Mi Mi Aung:
Prompt congestion reaction scheme for data center network using multiple congestion points. ICC 2012: 2679-2683 - [c14]Renuga Kanagavelu, Luke Ng Mingjie, Khin Mi Mi Aung, Francis Bu-Sung Lee, Heryandi:
OpenFlow based control for re-routing with differentiated flows in Data Center Networks. ICON 2012: 228-233 - 2011
- [j2]Shuo Fang, Chuan Heng Foh, Khin Mi Mi Aung:
Differentiated Congestion Management of Data Traffic for Data Center Ethernet. IEEE Trans. Netw. Serv. Manag. 8(4): 322-333 (2011) - 2010
- [c13]Kyawt Kyawt Khaing, Khin Mi Mi Aung:
Secured Key Distribution Scheme for Cryptographic Key Management System. ARES 2010: 481-486 - [c12]Shu Qin Ren, Khin Mi Mi Aung, Jong Sou Park:
A Privacy Enhanced Data Aggregation Model. CIT 2010: 985-990 - [c11]Shuo Fang, Chuan Heng Foh, Khin Mi Mi Aung:
Differentiated Ethernet Congestion Management for Prioritized Traffic. ICC 2010: 1-5 - [c10]Yang Yu, Khin Mi Mi Aung, Edmund Kheng Kiat Tong, Chuan Heng Foh:
Dynamic Load Balancing Multipathing in Data Center Ethernet. MASCOTS 2010: 403-406
2000 – 2009
- 2006
- [j1]Khin Mi Mi Aung, Kiejin Park, Jong Sou Park:
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration. Int. J. Netw. Secur. 3(3): 271-278 (2006) - [c9]Khin Mi Mi Aung, Kiejin Park, Jong Sou Park:
Survival of the Internet Applications: A Cluster Recovery Model. CCGRID 2006: 33 - 2005
- [c8]Khin Mi Mi Aung, Kiejin Park, Jong Sou Park:
A rejuvenation methodology of cluster recovery. CCGRID 2005: 90-95 - [c7]Khin Mi Mi Aung, Kiejin Park, Jong Sou Park, Howon Kim, Byungil Lee:
A Survivability Model for Cluster System Under DoS Attacks. HPCC 2005: 567-572 - [c6]Khin Mi Mi Aung, Kiejin Park, Jong Sou Park:
A Survivability Model for Cluster System. ICA3PP 2005: 73-82 - [c5]Khin Mi Mi Aung, Kiejin Park, Jong Sou Park:
A Model of ITS Using Cold Standby Cluster. ICADL 2005: 1-10 - 2004
- [c4]Khin Mi Mi Aung, Jong Sou Park:
A Framework of Software Rejuvenation for Survivability. AINA (2) 2004: 507-510 - [c3]Jong Sou Park, Khin Mi Mi Aung:
Transient Time Analysis of Network Security Survivability Using DEVS. AIS 2004: 607-616 - [c2]Khin Mi Mi Aung:
The optimum time to perform software rejuvenation for survivability. IASTED Conf. on Software Engineering 2004: 292-296 - [c1]Khin Mi Mi Aung, Jong Sou Park:
Software Rejuvenation Approach to Security Engineering. ICCSA (4) 2004: 574-583
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint