default search action
Fei Tong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Fei Tong, Cheng Chen, Jianping Pan:
A Novel Detection and Localization Scheme for Wormhole Attack in Internet of Things. IEEE Internet Things J. 11(4): 7141-7152 (2024) - [j42]Fei Tong, Yun Zhang:
Active Learning-Based Spectral-Spatial Classification for Discriminating Tree Species in Hyperspectral Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 9403-9414 (2024) - [j41]Fei Tong, Bowen Ding, Yujian Zhang, Shibo He, Yuyang Peng:
A Single-Anchor Mobile Localization Scheme. IEEE Trans. Mob. Comput. 23(1): 56-69 (2024) - [j40]Yuanhang Zhou, Fei Tong, Shibo He:
Bi-Objective Incentive Mechanism for Mobile Crowdsensing With Budget/Cost Constraint. IEEE Trans. Mob. Comput. 23(1): 223-237 (2024) - [j39]Guanghui Wang, Yajie Li, Rui Liu, Fei Tong, Jianping Pan, Fang Zuo, Xin He:
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things. IEEE Trans. Netw. Serv. Manag. 21(2): 2445-2459 (2024) - [c46]Haitham Mahmoud, Adel Aneiba, Ziming He, Fei Tong, Liucheng Guo, A. Taufiq Asyhari, Ziwei Wang, Zhen Gao:
Intelligent Network Optimisation for Beyond 5G Networks Considering Packet Drop Rate. ICIT 2024: 1-6 - [c45]Fei Tong, Kaijing Hu, Wei Li, Shaohua Yu, Weihua Lian, Hanqi Zhao, Bin Wu, Danke Hong, Ming Luo, Qianggao Hu, Jian Xu:
Measurement of optical signal state of polarization in OPGW under lightning strike condition. OFC 2024: 1-3 - [c44]Xiaoyu Cheng, Fei Tong, Hongyu Wang, Zhe Zhou, Fang Jiang, Yuxing Mao:
SpecLFB: Eliminating Cache Side Channels in Speculative Executions. USENIX Security Symposium 2024 - [c43]Fei Tong, Jingtao Liu, Changzhan Gu, Junfa Mao:
Displacement Motion Sensing with Asynchronous Bandpass Sampling Using a Single-Channel Dual-PLL SSB low-IF Doppler Radar. WiSNeT 2024: 22-25 - [i7]Fang Jiang, Fei Tong, Hongyu Wang, Xiaoyu Cheng, Zhe Zhou, Ming Ling, Yuxing Mao:
PCG: Mitigating Conflict-based Cache Side-channel Attacks with Prefetching. CoRR abs/2405.03217 (2024) - 2023
- [j38]Yujian Zhang, Mingde Li, Fei Tong:
Energy-efficient load balancing for divisible tasks on heterogeneous clusters. Trans. Emerg. Telecommun. Technol. 34(10) (2023) - [j37]Fei Tong, Jie Yang, Chengzhi Zheng, Lin Cheng, XuFei Ma, Gaochao Li:
Research on the Comprehensive Evaluation of Grouting Quality Based on Fuzzy Rock Engineering System and Variable Fuzzy Set Theory. Int. J. Fuzzy Syst. 25(3): 1191-1212 (2023) - [j36]Fei Tong, Xing Chen, Cheng Huang, Yujian Zhang, Xuemin Shen:
Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of Things. IEEE Internet Things J. 10(9, May 1): 7761-7773 (2023) - [j35]Jiechen Tang, Hengjian Tong, Fei Tong, Yun Zhang, Weitao Chen:
Exploiting Superpixel-Based Contextual Information on Active Learning for High Spatial Resolution Remote Sensing Image Classification. Remote. Sens. 15(3): 715 (2023) - [j34]Yuwei Xu, Enze Yu, Yuxing Song, Fei Tong, Qiao Xiang, Liang He:
$\mathcal {R}$-Tracing: Consortium Blockchain-Based Vehicle Reputation Management for Resistance to Malicious Attacks and Selfish Behaviors. IEEE Trans. Veh. Technol. 72(6): 7095-7110 (2023) - [c42]Jiao Ma, Fei Tong:
SA-SWS: A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Linear Sensor Networks. ICCC 2023: 1-6 - [c41]Xia Deng, Guole Lin, Le Chang, Fei Tong:
Deep Reinforcement Learning for QoE-Aware Offloading in Space-Terrestrial Integrated Networks. MSN 2023: 246-253 - [c40]Iqra Akram, Yi Ma, Ziming He, Fei Tong:
Learning the Long-term Memory Effect of Power Amplifiers Using Temporal Convolutional Network. VTC Fall 2023: 1-6 - 2022
- [j33]Chaorong Zhang, Yuyang Peng, Jun Li, Fei Tong:
An IRS-Aided GSSK Scheme for Wireless Communication System. IEEE Commun. Lett. 26(6): 1398-1402 (2022) - [j32]Fei Tong, Tian Zhu, Yuyang Peng:
Interference and secrecy analysis based on randomly spacial model in clustered WSNs. IET Commun. 16(19): 2278-2292 (2022) - [j31]Fei Tong, Yun Zhang:
Exploiting Spectral-Spatial Information Using Deep Random Forest for Hyperspectral Imagery Classification. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j30]Yujian Zhang, Yuhao Luo, Xing Chen, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT. Secur. Commun. Networks 2022: 9686049:1-9686049:15 (2022) - [j29]Fei Tong, Yun Zhang:
Spectral-Spatial and Cascaded Multilayer Random Forests for Tree Species Classification in Airborne Hyperspectral Images. IEEE Trans. Geosci. Remote. Sens. 60: 1-11 (2022) - [j28]Fei Tong, Xing Chen, Kaiming Wang, Yujian Zhang:
CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things. IEEE Trans. Inf. Forensics Secur. 17: 3789-3800 (2022) - [j27]Ziming He, Fei Tong:
Residual RNN Models With Pruning for Digital Predistortion of RF Power Amplifiers. IEEE Trans. Veh. Technol. 71(9): 9735-9750 (2022) - [c39]Cheng Chen, Fei Tong, Yujian Zhang, Ziyan Zhu:
A Novel Detection and Localization Scheme of Wormhole Attack in IoT Network. ASCC 2022: 1983-1988 - [c38]Jinfei Wang, Yi Ma, Na Yi, Rahim Tafazolli, Fei Tong:
Constellation-Oriented Perturbation for Scalable-Complexity MIMO Nonlinear Precoding. GLOBECOM 2022: 2413-2418 - [c37]Yujian Zhang, Mingde Li, Fei Tong:
An Energy-Efficient Load Balancing Scheme in Heterogeneous Clusters by Linear Programming. ICCCN 2022: 1-10 - [c36]Qin Xiong, Yujian Zhang, Junhao Li, Fei Tong:
Enhancing Security of Certificate Authorities by Blockchain-based Domain Transparency. ICPADS 2022: 304-311 - [c35]Zhe Zhou, Xiaoyu Cheng, Yang Sun, Fang Jiang, Fei Tong, Yuxing Mao, Ruilin Wang:
Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM. TrustCom 2022: 1199-1204 - [c34]Kai Gao, Fei Tong, Yujian Zhang:
Intrusion Detection Based on Statistical Analysis for RPL-based Internet of Things. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 681-688 - 2021
- [j26]Yujian Zhang, Chuanyou Li, Fei Tong, Yuwei Xu:
A variable neighborhood search algorithm for energy conscious task scheduling in heterogeneous computing systems. Concurr. Comput. Pract. Exp. 33(24) (2021) - [j25]Zhentao Huang, Yuyang Peng, Jun Li, Fei Tong, Konglin Zhu, Limei Peng:
Secrecy Enhancing of SSK Systems for IoT Applications in Smart Cities. IEEE Internet Things J. 8(8): 6385-6392 (2021) - [j24]Haizhong Zhang, Ligang Wang, Fei Tong:
Large Remote Sensing Image Segmentation with Stitching Strategy Based on Dominant Color. J. Softw. 16(2): 67-79 (2021) - [j23]Fei Tong, Hengjian Tong, Rakesh Mishra, Yun Zhang:
Delineation of Individual Tree Crowns Using High Spatial Resolution Multispectral WorldView-3 Satellite Imagery. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14: 7751-7761 (2021) - [c33]Ziyan Zhu, Fei Tong, Cheng Chen:
Security Performance Analysis for Cellular Mobile Communication System with Randomly-Located Eavesdroppers. ICA3PP (3) 2021: 479-493 - [c32]Simeng Wang, Xing Chen, Fei Tong, Yujian Zhang:
RSU-Aided Authentication for VANET Based on Consortium Blockchain. ICPADS 2021: 324-331 - [c31]Megumi Nakao, Fei Tong, Mitsuhiro Nakamura, Tetsuya Matsuda:
Image-to-Graph Convolutional Network for Deformable Shape Reconstruction from a Single Projection Image. MICCAI (4) 2021: 259-268 - [c30]Ziming He, Fei Tong:
A Novel Time-Of-Arrival Estimation Approach with Channel Frequency Response Reconstruction in OFDM systems. PIMRC 2021: 1085-1090 - [c29]Ziming He, Fei Tong:
Spoofing Attack Detection Approaches based on Indoor Channel Continuity in IEEE 802.11 Wireless Local Area Networks. VTC Fall 2021: 1-6 - [c28]Fei Tong, Rucong Sui, Yujian Zhang, Wan Tang:
MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. WASA (2) 2021: 550-562 - [i6]Megumi Nakao, Fei Tong, Mitsuhiro Nakamura, Tetsuya Matsuda:
Image-to-Graph Convolutional Network for Deformable Shape Reconstruction from a Single Projection Image. CoRR abs/2108.12533 (2021) - [i5]Ziyan Zhu, Fei Tong:
The Distance Distribution between Mobile Node and Reference Node in Regular Hexagon. CoRR abs/2111.06553 (2021) - 2020
- [j22]Xiufang Shi, Fei Tong, Wen-An Zhang, Li Yu:
Resilient Privacy-Preserving Distributed Localization Against Dishonest Nodes in Internet of Things. IEEE Internet Things J. 7(9): 9214-9223 (2020) - [j21]Fei Tong, Yuyang Peng:
A Data-Gathering, Dynamic Duty-Cycling MAC Protocol for Large-Scale Wireless Sensor Networks. Sensors 20(15): 4071 (2020) - [j20]Quanwei Zhang, Dazhong Li, Yue Fei, Jiakang Zhang, Yu Chen, Fei Tong:
RDCPF: A Redundancy-Based Duty-Cycling Pipelined-Forwarding MAC for Linear Sensor Networks. Sensors 20(19): 5608 (2020) - [j19]Lei Shu, Yuanfang Chen, Zhihong Sun, Fei Tong, Mithun Mukherjee:
Detecting the Dangerous Area of Toxic Gases with Wireless Sensor Networks. IEEE Trans. Emerg. Top. Comput. 8(1): 137-147 (2020) - [c27]Toshiharu Sugie, Fei Tong, Brian D. O. Anderson, Zhiyong Sun:
On global convergence of area-constrained formations of hierarchical multi-agent systems. CDC 2020: 2805-2810 - [c26]Fei Tong, Megumi Nakao, Shuqiong Wu, Mitsuhiro Nakamura, Tetsuya Matsuda:
X-ray2Shape: Reconstruction of 3D Liver Shape from a Single 2D Projection Image. EMBC 2020: 1608-1611 - [c25]Fei Tong, Yun Zhang:
Delineation of Individual Tree Crowns in WorldView-3 Satellite Imagery with Multiscale Fitting Method. IGARSS 2020: 4159-4162 - [c24]Fei Tong, Yujian Zhang, Jun Tao, Guanghui Wang, Xiufang Shi, Guang Cheng:
EPDC: An Enhanced Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. VTC Fall 2020: 1-5 - [c23]Yujian Zhang, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain. VTC Fall 2020: 1-6 - [c22]Tian Zhu, Fei Tong:
A Cluster-based Cooperative Jamming Scheme for Secure Communication in Wireless Sensor Network. VTC Fall 2020: 1-5 - [i4]Toshiharu Sugie, Fei Tong, Brian D. O. Anderson, Zhiyong Sun:
On global convergence of area-constrained formations of hierarchical multi-agent systems. CoRR abs/2009.03048 (2020)
2010 – 2019
- 2019
- [j18]Fei Tong, Shibo He, Jianping Pan:
Modeling and Analysis for Data Collection in Duty-Cycled Linear Sensor Networks With Pipelined-Forwarding Feature. IEEE Internet Things J. 6(6): 9489-9502 (2019) - [j17]Hengjian Tong, Fei Tong, Wei Zhou, Yun Zhang:
Purifying SLIC Superpixels to Optimize Superpixel-Based Classification of High Spatial Resolution Remote Sensing Image. Remote. Sens. 11(22): 2627 (2019) - [j16]Fei Tong, Yuyi Sun, Shibo He:
On Positioning Performance for the Narrow-Band Internet of Things: How Participating eNBs Impact? IEEE Trans. Ind. Informatics 15(1): 423-433 (2019) - [j15]Fei Tong, Shibo He, Yuyang Peng, Zhiguo Shi:
A Tractable Analysis of Positioning Fundamentals in Low-Power Wide Area Internet of Things. IEEE Trans. Veh. Technol. 68(7): 7024-7034 (2019) - [c21]Jun Tao, Xiaoyan Li, Jinghao Li, Qian Fang, Zuyan Wang, Fei Tong:
Similarity-Guided Multimedia Recommendation in Heterogeneous Information Network. GLOBECOM 2019: 1-6 - [c20]Fei Tong, Guanghui Wang, Xiufang Shi:
A Novel Single Anchor Localization Mechanism Employing Target Movement. HPSR 2019: 1-5 - [c19]Guanghui Wang, Yifan Xu, Fei Tong, Jianping Pan, Subin Shen:
Modeling and Analyzing Single Anchor Localization for Internet of Things. ICC 2019: 1-6 - [i3]Ross Pure, Salman Durrani, Fei Tong, Jianping Pan:
Distance Distribution Between Two Random Nodes in Arbitrary Polygons. CoRR abs/1903.07757 (2019) - 2018
- [j14]Hua Chen, Shen Xu, Lulu Chu, Fei Tong, Lei Chen:
Finite-Time Switching Control of Nonholonomic Mobile Robots for Moving Target Tracking Based on Polar Coordinates. Complex. 2018: 7360643:1-7360643:9 (2018) - [j13]Yuyi Sun, Fei Tong, Zhikun Zhang, Shibo He:
Throughput Modeling and Analysis of Random Access in Narrowband Internet of Things. IEEE Internet Things J. 5(3): 1485-1493 (2018) - [c18]Sadia Batool, Fei Tong, Songyuan Li, Shibo He:
Direction Based Charging in Rechargeable Wireless Sensor Network. IoTaaS 2018: 401-408 - 2017
- [j12]Yuyang Peng, Fawaz AL-Hazemi, Raouf Boutaba, Fei Tong, Il-Sun Hwang, Chan-Hyun Youn:
Enhancing Energy Efficiency via Cooperative MIMO in Wireless Sensor Networks: State of the Art and Future Research Directions. IEEE Commun. Mag. 55(11): 47-53 (2017) - [j11]Jun Tao, Yifan Xu, Ziyi Zhang, Fuqin Feng, Fei Tong, Fang Dong:
A resource allocation game with restriction mechanism in VANET cloud. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j10]Fei Tong, Zheng Yan:
A hybrid approach of mobile malware detection in Android. J. Parallel Distributed Comput. 103: 22-31 (2017) - [j9]Fei Tong, Jianping Pan:
ADC: an Adaptive Data Collection Protocol with Free Addressing and Dynamic Duty-Cycling for Sensor Networks. Mob. Networks Appl. 22(5): 983-994 (2017) - [j8]Fei Tong, Hengjian Tong, Junjun Jiang, Yun Zhang:
Multiscale Union Regions Adaptive Sparse Representation for Hyperspectral Image Classification. Remote. Sens. 9(9): 872 (2017) - [j7]Fei Tong, Jianping Pan:
Random-to-Random Nodal Distance Distributions in Finite Wireless Networks. IEEE Trans. Veh. Technol. 66(11): 10070-10083 (2017) - [j6]Fei Tong, Ying Wan, Lei Zheng, Jianping Pan, Lin Cai:
A Probabilistic Distance-Based Modeling and Analysis for Cellular Networks With Underlaying Device-to-Device Communications. IEEE Trans. Wirel. Commun. 16(1): 451-463 (2017) - [c17]Fei Tong, Shibo He, Jianping Pan:
Distance Distribution-Based Modeling and Analysis for Pipelined-Forwarding Sensor Networks. GLOBECOM 2017: 1-6 - [c16]Lin Li, Fei Tong, Rustam Stolkin, Jinwen Hu, Feng Yang:
Joint sparse learning for classification ensemble. ICCA 2017: 1043-1048 - 2016
- [b1]Fei Tong:
Protocol design and performance evaluation for wireless ad hoc networks. University of Victoria, Canada, 2016 - [j5]Fei Tong, Lei Zheng, Maryam Ahmadi, Minming Ni, Jianping Pan:
Modeling and Analyzing Duty-Cycling Pipelined-Scheduling MAC for Linear Sensor Networks. IEEE Trans. Veh. Technol. 65(4): 2608-2620 (2016) - [c15]Fei Tong, Jianping Pan, Ruonan Zhang:
Distance Distributions in Finite Ad Hoc Networks: Approaches, Applications, and Directions. ADHOCNETS 2016: 167-179 - [c14]Fei Tong, Jianping Pan:
Adaptive Data Collection with Free Addressing and Dynamic Duty-Cycling for Sensor Networks. QSHINE 2016: 212-222 - [c13]Maryam Tanha, Seyed Dawood Sajjadi Torshizi, Fei Tong, Jianping Pan:
Disaster Management and Response for Modern Cellular Networks Using Flow-Based Multi-Hop Device-to-Device Communications. VTC Fall 2016: 1-7 - [i2]Fei Tong, Jianping Pan:
Random Distances Associated with Arbitrary Polygons: An Algorithmic Approach between Two Random Points. CoRR abs/1602.03407 (2016) - 2015
- [j4]Minming Ni, Lei Zheng, Fei Tong, Jianping Pan, Lin Cai:
A Geometrical-Based Throughput Bound Analysis for Device-to-Device Communications in Cellular Networks. IEEE J. Sel. Areas Commun. 33(1): 100-110 (2015) - [j3]Jinsong Gui, Maryam Ahmadi, Fei Tong:
Dynamically constructing and maintaining virtual access points in a macro cell with selfish nodes. J. Syst. Softw. 108: 1-22 (2015) - [c12]Jun Tao, Yaodan Hu, Fei Tong, Jianping Pan:
Data sweeping in deterministic trajectories-covered Wireless Sensor Networks. ICC 2015: 6312-6317 - [c11]Maryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan:
Performance analysis for two-tier cellular systems based on probabilistic distance models. INFOCOM 2015: 352-360 - 2014
- [j2]Lei Zhang, Lin Cai, Jianping Pan, Fei Tong:
A New Approach to the Directed Connectivity in Two-Dimensional Lattice Networks. IEEE Trans. Mob. Comput. 13(11): 2458-2472 (2014) - [c10]Tianli Dang, Zheng Yan, Fei Tong, Weidong Zhang, Peng Zhang:
Implementation of a Trust-Behavior Based Reputation System for Mobile Applications. BWCCA 2014: 221-228 - [c9]Fei Tong, Lei Zheng, Maryam Ahmadi, Minming Ni, Jianping Pan:
Modeling duty-cycling MAC protocols with pipelined scheduling for linear sensor networks. ICCC 2014: 813-817 - [c8]Maryam Ahmadi, Jianping Pan, Lei Zheng, Lin Cai, Fei Tong:
Poster: geometrical distance distribution for modeling performance metrics in wireless communication networks. MobiCom 2014: 341-344 - [i1]Minming Ni, Lei Zheng, Fei Tong, Jianping Pan, Lin Cai:
A Geometrical-Based Throughput Bound Analysis for Device-to-Device Communications in Cellular Networks. CoRR abs/1404.2366 (2014) - 2013
- [c7]Fei Tong, Minming Ni, Lei Shu, Jianping Pan:
A Pipelined-forwarding, Routing-integrated and effectively-Identifying MAC for large-scale WSN. GLOBECOM 2013: 225-230 - 2011
- [j1]Fei Tong, Rong Xie, Lei Shu, Young-Chon Kim:
A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks. Sensors 11(5): 5183-5201 (2011) - [c6]Fei Tong, Wan Tang, Rong Xie, Lei Shu, Young-Chon Kim:
P-MAC: A Cross-Layer Duty Cycle MAC Protocol Towards Pipelining for Wireless Sensor Networks. ICC 2011: 1-5 - [c5]Rong Xie, Fei Tong, Dong-Ki Kang, Young-Chon Kim:
A reconfigurable routing protocol for free space optical sensor network. ICOIN 2011: 165-170 - [c4]Rong Xie, Fei Tong, Won-Hyuk Yang, Young-Chon Kim:
An Energy Considered Routing Protocol of Free Space Optical Sensor Network. NTMS 2011: 1-5 - 2010
- [c3]Won-Hyuk Yang, Dong-Ki Kang, Fei Tong, Young-Chon Kim:
Performance Analysis of Energy Savings according to Traffic Patterns in Ethernet with Rate Adaptation. UKSim 2010: 619-624
2000 – 2009
- 2005
- [c2]Yufeng Chao, Fei Tong:
The problems in the implementation of e-government administration, the analysis and strategies. ICEC 2005: 529-531 - [c1]Fei Tong, Xiaohui Zhou, Siqing Liu:
The value chain of mobile e-payment. ICEC 2005: 880-882
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-15 23:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint