default search action
Ihsan Ali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Adil Khan, Shabeer Ahmad, Sanam Shahla Rizvi, Ihsan Ali, Asad Ullah, Se Jin Kwon:
Joint Trust Analysis and Artificial Gorilla Troops Optimization for Performance Improvement in UAVs-Assisted Vehicular Network. IEEE Access 12: 105924-105938 (2024) - [j59]Hasniuj Zahan, Md Washik Al Azad, Ihsan Ali, Spyridon Mastorakis:
IoT-AD: A Framework to Detect Anomalies Among Interconnected IoT Devices. IEEE Internet Things J. 11(1): 478-489 (2024) - [j58]Ihsan Ali, Hasniuj Zahan, Spyridon Mastorakis:
Sensor Clouds: Recent Advancements, Use Cases and Open Challenges. IEEE Internet Things Mag. 7(1): 98-103 (2024) - 2023
- [j57]Syed Sajid Ullah, Saddam Hussain, Ihsan Ali, Spyridon Mastorakis:
A Secure Ndn-based Architecture For Electronic Voting In 6g. IEEE Commun. Stand. Mag. 7(4): 20-26 (2023) - [j56]Nauman Khan, Rosli Bin Salleh, Anis Koubaa, Zahid Khan, Muhammad Khurram Khan, Ihsan Ali:
Data plane failure and its recovery techniques in SDN: A systematic literature review. J. King Saud Univ. Comput. Inf. Sci. 35(3): 176-201 (2023) - [i1]Hasniuj Zahan, Md Washik Al Azad, Ihsan Ali, Spyridon Mastorakis:
IoT-AD: A Framework To Detect Anomalies Among Interconnected IoT Devices. CoRR abs/2306.06764 (2023) - 2022
- [j55]Ihsan Ali, Ismail Ahmedy, Abdullah Gani, Muhammad Umair Munir, Mohammad Hossein Anisi:
Data Collection in Studies on Internet of Things (IoT), Wireless Sensor Networks (WSNs), and Sensor Cloud (SC): Similarities and Differences. IEEE Access 10: 33909-33931 (2022) - [j54]Saddam Hussain, Syed Sajid Ullah, Ihsan Ali:
An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things. Clust. Comput. 25(3): 1749-1764 (2022) - [j53]Saddam Hussain, Syed Sajid Ullah, Ihsan Ali, Jiafeng Xie, Venkata N. Inukollu:
Certificateless signature schemes in Industrial Internet of Things: A comparative survey. Comput. Commun. 181: 116-131 (2022) - [j52]Rashid Jahangir, Ying Wah Teh, Ghulam Mujtaba, Roobaea Alroobaea, Zahid Hussain Shaikh, Ihsan Ali:
Convolutional neural network-based cross-corpus speech emotion recognition with data augmentation and features fusion. Mach. Vis. Appl. 33(3): 41 (2022) - [j51]M. A. Manazir Ahsan, Ihsan Ali, Muhammad Imran, Mohd Yamani Idna Bin Idris, Suleman Khan, Anwar Khan:
A Fog-Centric Secure Cloud Storage Scheme. IEEE Trans. Sustain. Comput. 7(2): 250-262 (2022) - [j50]Munsif Ali, Sahar Shah, Mahnoor Khan, Ihsan Ali, Roobaea Alroobaea, Abdullah M. Baqasah, Muneer Ahmad:
MuLSi-Co: Multilayer Sinks and Cooperation-Based Data Routing Techniques for Underwater Acoustic Wireless Sensor Networks (UA-WSNs). Wirel. Commun. Mob. Comput. 2022: 4840481:1-4840481:16 (2022) - 2021
- [j49]Usman Ali, Mohd Yamani Idna Bin Idris, Mohamad Nizam Bin Ayub, Insaf Ullah, Ihsan Ali, Tarak Nandy, Muktar Yahuza, Nauman Khan:
RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption. IEEE Access 9: 49942-49959 (2021) - [j48]Mirza Abdur Razzaq, Javed Ahmed Mahar, Muneer Ahmad, Ihsan Ali, Roobaea Alroobaea, Fahad M. Almansour, Kumarmangal Roy:
The 3-Axis Scalable Service-Cloud Resource Modeling for Burst Prediction Under Smart Campus Scenario. IEEE Access 9: 116927-116941 (2021) - [j47]Muhib Ahmad, Farrukh Zeeshan Khan, Zeshan Iqbal, Muneer Ahmad, Ihsan Ali, Sultan S. Alshamrani, Muhammad Talha, Muhammad Ahsan Raza:
Designing of a Simulation Tool for the Performance Analysis of Hybrid Data Center Networks (DCNs). Complex. 2021: 5520324:1-5520324:13 (2021) - [j46]Iftikhar Ahmad, Rafidah Md Noor, Roobaea Alroobaea, Muhammad Talha, Zaheed Ahmed, Umm-e-Habiba, Ihsan Ali:
Aiding Traffic Prediction Servers through Self-Localization to Increase Stability in Complex Vehicular Clustering. Complex. 2021: 6627539:1-6627539:11 (2021) - [j45]Kumarmangal Roy, Muneer Ahmad, Kinza Waqar, Kirthanaah Priyaah, Jamel Nebhen, Sultan S. Alshamrani, Muhammad Ahsan Raza, Ihsan Ali:
An Enhanced Machine Learning Framework for Type 2 Diabetes Classification Using Imbalanced Data with Missing Values. Complex. 2021: 9953314:1-9953314:21 (2021) - [j44]Rashid Jahangir, Ying Wah Teh, Henry Friday Nweke, Ghulam Mujtaba, Mohammed Ali Al-Garadi, Ihsan Ali:
Speaker identification through artificial intelligence techniques: A comprehensive review and research challenges. Expert Syst. Appl. 171: 114591 (2021) - [j43]Rahim Khan, Ihsan Ali, Mian Ahmad Jan, Muhammad Zakarya, Muazzam Ali Khan Khattak, Sultan S. Alshamrani, Mohsen Guizani:
A Hybrid Approach for Seamless and Interoperable Communication in the Internet of Things. IEEE Netw. 35(6): 202-208 (2021) - [j42]Muhammad Bux Laghari, Hamayoun Shahwani, Syed Attique Shah, Raja Asif Wagan, Zahid Rauf, Ihsan Ali, Sultan S. Alshamrani, Jaroslav Frnda:
Towards Enabling Multihop Wireless Local Area Networks for Disaster Communications. Wirel. Commun. Mob. Comput. 2021: 5540480:1-5540480:14 (2021) - [j41]Aroosa, Syed Sajid Ullah, Saddam Hussain, Roobaea Alroobaea, Ihsan Ali:
Securing NDN-Based Internet of Health Things through Cost-Effective Signcryption Scheme. Wirel. Commun. Mob. Comput. 2021: 5569365:1-5569365:13 (2021) - [j40]Sabeeh Ahmad Saeed, Farrukh Zeeshan Khan, Zeshan Iqbal, Roobaea Alroobaea, Muneer Ahmad, Muhammad Talha, Muhammad Ahsan Raza, Ihsan Ali:
An IoT-Based Network for Smart Urbanization. Wirel. Commun. Mob. Comput. 2021: 5584667:1-5584667:14 (2021) - [j39]Leow Wei Qin, Muneer Ahmad, Ihsan Ali, Rafia Mumtaz, Syed Mohammad Hassan Zaidi, Sultan S. Alshamrani, Muhammad Ahsan Raza, Muhammad Tahir:
Precision Measurement for Industry 4.0 Standards towards Solid Waste Classification through Enhanced Imaging Sensors and Deep Learning Model. Wirel. Commun. Mob. Comput. 2021: 9963999:1-9963999:10 (2021) - 2020
- [j38]Reza Mashayekhi, Mohd Yamani Idna Bin Idris, Mohammad Hossein Anisi, Ismail Ahmedy, Ihsan Ali:
Informed RRT*-Connect: An Asymptotically Optimal Single-Query Path Planning Method. IEEE Access 8: 19842-19852 (2020) - [j37]Rashid Jahangir, Ying Wah Teh, Nisar Ahmed Memon, Ghulam Mujtaba, Mahdi Zareei, Uzair Ishtiaq, Muhammad Zaheer Akhtar, Ihsan Ali:
Text-Independent Speaker Identification Through Feature Fusion and Deep Neural Network. IEEE Access 8: 32187-32202 (2020) - [j36]Ihsan Ali, Ismail Ahmedy, Abdullah Gani, Muhammad Talha, Muhammad Ahsan Raza, Mohammad Hossein Anisi:
Data Collection in Sensor-Cloud: A Systematic Literature Review. IEEE Access 8: 184664-184687 (2020) - [j35]Ihsan Ali, Abdelmuttlib Ibrahim Abdallaahmed, Ahmad Almogren, Muhammad Ahsan Raza, Syed Attique Shah, Anwar Khan, Abdullah Gani:
Systematic Literature Review on IoT-Based Botnet Attack. IEEE Access 8: 212220-212232 (2020) - [j34]Muhammad Sohaib Roomi, Muhammad Imran, Syed Attique Shah, Ahmad Almogren, Ihsan Ali, Mansour Zuair:
A Novel De-Ghosting Image Fusion Technique for Multi-Exposure, Multi-Focus Images Using Guided Image Filtering. IEEE Access 8: 219656-219671 (2020) - [j33]Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Ihsan Ali, Mohsen Guizani:
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutorials 22(3): 1646-1685 (2020) - [j32]Mohammed Sani Adam, Mohammad Hossein Anisi, Ihsan Ali:
Object tracking sensor networks in smart cities: Taxonomy, architecture, applications, research challenges and future directions. Future Gener. Comput. Syst. 107: 909-923 (2020) - [j31]M. A. Manazir Ahsan, Ihsan Ali, Mohd Yamani Idna Bin Idris, Muhammad Imran, Muhammad Shoaib:
Countering Statistical Attacks in Cloud-Based Searchable Encryption. Int. J. Parallel Program. 48(3): 470-495 (2020) - [j30]M. A. Manazir Ahsan, Ihsan Ali, Mohd Yamani Idna Bin Idris, Muhammad Imran, Muhammad Shoaib:
Correction to: Countering Statistical Attacks in Cloud-Based Searchable Encryption. Int. J. Parallel Program. 48(3): 580 (2020) - [j29]Lip Yee Por, Shahid Mehmood, Ahmad Almogren, Ihsan Ali, Mohammad Hossein Anisi:
Improving the performance of opportunistic routing using min-max range and optimum energy level for relay node selection in wireless sensor networks. PeerJ Comput. Sci. 6: e326 (2020) - [j28]Sahar Shah, Mahnoor Khan, Ahmad Almogren, Ihsan Ali, Lianwen Deng, Heng Luo, Muazzam Ali Khan:
Corrigendum to "Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions". Sci. Program. 2020: 3671835:1-3671835:1 (2020) - [j27]Sahar Shah, Mahnoor Khan, Ahmad Almogren, Ihsan Ali, Lianwen Deng, Heng Luo, Muazzam Ali Khan, Shah Nazir:
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions. Sci. Program. 2020: 8871315:1-8871315:31 (2020) - [c6]Ihsan Ali, Aftab Khan, Muhammad Waleed:
A Google Colab Based Online Platform for Rapid Estimation of Real Blur in Single-Image Blind Deblurring. ECAI 2020: 1-6
2010 – 2019
- 2019
- [j26]Mohammed Ali Al-Garadi, Mohammad Rashid Hussain, Nawsher Khan, Ghulam Murtaza, Henry Friday Nweke, Ihsan Ali, Ghulam Mujtaba, Haruna Chiroma, Hasan Ali Khattak, Abdullah Gani:
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges. IEEE Access 7: 70701-70718 (2019) - [j25]Abdelmuttlib Ibrahim Abdallaahmed, Abdullah Gani, Siti Hafizah Ab Hamid, Abdelzahir Abdelmaboud, Hassan Jamil Syed, Riyaz Ahamed Ariyaluran Habeeb, Ihsan Ali:
Service Management for IoT: Requirements, Taxonomy, Recent Advances and Open Research Challenges. IEEE Access 7: 155472-155488 (2019) - [j24]Hasan Ali Khattak, Munam Ali Shah, Sangeen Khan, Ihsan Ali, Muhammad Imran:
Perception layer security in Internet of Things. Future Gener. Comput. Syst. 100: 144-164 (2019) - [j23]Muhammad Usman Younus, Saif ul Islam, Ihsan Ali, Suleman Khan, Muhammad Khurram Khan:
A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases. J. Netw. Comput. Appl. 137: 62-77 (2019) - [j22]Rahim Khan, Ihsan Ali, Saleh M. Altowaijri, Muhammad Zakarya, Atiq Ur Rahman, Ismail Ahmedy, Anwar Khan, Abdullah Gani:
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data. Sensors 19(1): 166 (2019) - [j21]Munsif Ali, Anwar Khan, Khursheed Aurangzeb, Ihsan Ali, Hasan Mahmood, Syed Irtaza Haider, Naeem Bhatti:
CoSiM-RPO: Cooperative Routing with Sink Mobility for Reliable and Persistent Operation in Underwater Acoustic Wireless Sensor Networks. Sensors 19(5): 1101 (2019) - [j20]Mohammed Sani Adam, Lip Yee Por, Mohammad Rashid Hussain, Nawsher Khan, Tan Fong Ang, Mohammad Hossein Anisi, Zhirui Huang, Ihsan Ali:
An Adaptive Wake-Up-Interval to Enhance Receiver-Based Ps-Mac Protocol for Wireless Sensor Networks. Sensors 19(17): 3732 (2019) - [j19]Ubaid Ullah, Anwar Khan, Saleh M. Altowaijri, Ihsan Ali, Atiq Ur Rahman, Vijay Kumar V., Munsif Ali, Hasan Mahmood:
Cooperative and Delay Minimization Routing Schemes for Dense Underwater Wireless Sensor Networks. Symmetry 11(2): 195 (2019) - [j18]Anwar Khan, Saleh M. Altowaijri, Ihsan Ali, Atiq Ur Rahman:
Reliability-Aware Cooperative Routing with Adaptive Amplification for Underwater Acoustic Wireless Sensor Networks. Symmetry 11(3): 421 (2019) - [p2]Sardar Mehboob Hussain, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faheem Khan, Noor Ul Amin, Saba Arshad, Ihsan Ali:
Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 93-105 - [p1]Sidra Razzaq, Abdul Wahid, Faheem Khan, Noor Ul Amin, Munam Ali Shah, Adnan Akhunzada, Ihsan Ali:
Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 107-117 - 2018
- [j17]Rahim Khan, Ihsan Ali, Muhammad Zakarya, Ahmad M. Mustafa, Muhammad Imran, Muhammad Shoaib:
Technology-Assisted Decision Support System for Efficient Water Utilization: A Real-Time Testbed for Irrigation Using Wireless Sensor Networks. IEEE Access 6: 25686-25697 (2018) - [j16]Anwar Khan, Ihsan Ali, Atiq Ur Rahman, Muhammad Imran, Fazal-e-Amin, Hasan Mahmood:
Co-EEORS: Cooperative Energy Efficient Optimal Relay Selection Protocol for Underwater Wireless Sensor Networks. IEEE Access 6: 28777-28789 (2018) - [j15]Ali Safa Sadiq, Basem Y. Alkazemi, Seyedali Mirjalili, Ahmad Noraziah, Suleman Khan, Ihsan Ali, Al-Sakib Khan Pathan, Kayhan Zrar Ghafoor:
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs. IEEE Access 6: 29041-29053 (2018) - [j14]Ayesha Siddiqa, Munam Ali Shah, Hasan Ali Khattak, Adnan Akhunzada, Ihsan Ali, Zaidi Bin Razak, Abdullah Gani:
Social Internet of Vehicles: Complexity, Adaptivity, Issues and Beyond. IEEE Access 6: 62089-62106 (2018) - [j13]Anwar Khan, Mohammad Hossein Anisi, Ihsan Ali, Nadeem Javaid, Muhammad Qaisar Azeemi, Hasan Mahmood:
An Energy Efficient Interference and Route Aware Protocol for Underwater Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 41(1-2): 31-53 (2018) - [j12]Ihsan Ali, Abdullah Gani, Ismail Ahmedy, Ibrar Yaqoob, Suleman Khan, Mohammad Hossein Anisi:
Data Collection in Smart Communities Using Sensor Cloud: Recent Advances, Taxonomy, and Future Research Directions. IEEE Commun. Mag. 56(7): 192-197 (2018) - [j11]Sahrish Khan Tayyaba, Adnan Akhunzada, Noor Ul Amin, Munam Ali Shah, Faheem Khan, Ihsan Ali:
NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks. EAI Endorsed Trans. Mob. Commun. Appl. 4(13): e6 (2018) - [j10]Muhammad Saleem Khan, Saira Waris, Ihsan Ali, Majid I. Khan, Mohammad Hossein Anisi:
Mitigation of Packet Loss Using Data Rate Adaptation Scheme in MANETs. Mob. Networks Appl. 23(5): 1141-1150 (2018) - [j9]Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Ahsan Qureshi, Ihsan Ali, Rafidah Md Noor:
Coverage Differentiation Based Adaptive Tx-Power for Congestion and Awareness Control in VANETs. Mob. Networks Appl. 23(5): 1194-1205 (2018) - [j8]Anwar Khan, Ismail Ahmedy, Mohammad Hossein Anisi, Nadeem Javaid, Ihsan Ali, Nawsher Khan, Mohammed Alsaqer, Hasan Mahmood:
A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks. Sensors 18(1): 165 (2018) - [j7]Anwar Khan, Ihsan Ali, Abdullah Ghani, Nawsher Khan, Mohammed Alsaqer, Atiq Ur Rahman, Hasan Mahmood:
Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions. Sensors 18(5): 1619 (2018) - [j6]M. A. Manazir Ahsan, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Ihsan Ali, Nawsher Khan, Mohammed Ali Al-Garwi, Atiq Ur Rahman:
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme. Symmetry 10(5): 161 (2018) - [j5]Sahar Shah, Anwar Khan, Ihsan Ali, Kwang-Man Ko, Hasan Mahmood:
Localization Free Energy Efficient and Cooperative Routing Protocols for Underwater Wireless Sensor Networks. Symmetry 10(10): 498 (2018) - [j4]Syed Adeel Ali Shah, Ejaz Ahmed, Joel J. P. C. Rodrigues, Ihsan Ali, Rafidah Md Noor:
Shapely Value Perspective on Adapting Transmit Power for Periodic Vehicular Communications. IEEE Trans. Intell. Transp. Syst. 19(3): 977-986 (2018) - [c5]Pamir, Nadeem Javaid, Syed Muhammad Mohsin, Arshad Iqbal, Anila Yasmeen, Ihsan Ali:
A Hybrid Bat-Crow Search Algorithm Based Home Energy Management in Smart Grid. CISIS 2018: 75-88 - 2017
- [j3]Akande Sheriff Abiodun, Mohammad Hossein Anisi, Ihsan Ali, Adnan Akhunzada, Muhammad Khurram Khan:
Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique. IEEE Consumer Electron. Mag. 6(4): 38-47 (2017) - [j2]Iftikhar Ahmad, Rafidah Md Noor, Ihsan Ali, Muhammad Imran, Athanasios V. Vasilakos:
Characterizing the role of vehicular cloud computing in road traffic management. Int. J. Distributed Sens. Networks 13(5) (2017) - [j1]Anwar Khan, Nadeem Javaid, Ihsan Ali, Mohammad Hossein Anisi, Atiq Ur Rahman, Naeem Bhatti, Muhammad Zia, Hasan Mahmood:
An Energy Efficient Interference-aware Routing Protocol for Underwater WSNs. KSII Trans. Internet Inf. Syst. 11(10): 4844-4864 (2017) - [c4]Ihsan Ali, Sheraz Aslam, Kashif Khan, Waqas Ahmad, Hazrat Abubakar Sadiq, Nadeem Javaid:
Using Meta-Heuristic and Numerical Algorithm Inspired by Evolution Differential Equation and Strawberry Plant for Demand Side Management in Smart Grid. 3PGCIC 2017: 437-446 - [c3]Anwar Khan, Ihsan Ali, Hassan Mahmood:
A Localization Free Variable Transmit Power Routing Protocol for Underwater Wireless Sensor Networks. NBiS 2017: 136-147 - [c2]Hazrat Abubakar Sadiq, Muhammad Sufyan Khan, Ihsan Ali, Ishtiaq Ali, Pamir, Nadeem Javaid:
Demand Side Management Using Strawberry and Enhanced Differential Evolution Algorithms. NBiS 2017: 983-994
2000 – 2009
- 2008
- [c1]Noor Muhammad Khan, Ihsan Ali, Zubair Khalid, Ghufran Ahmed, Rodica Ramer, Alex A. Kavokin:
Quasi centralized clustering approach for an energy-efficient and vulnerability-aware routing in wireless sensor networks. HeterSanet 2008: 67-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint