default search action
Elie Bursztein
Person information
- affiliation: Google
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang:
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 472-499 (2024) - [c58]Elie Bursztein, Karla J. Brown, Leonie M. Sanderson, Patrick Gage Kelley:
Leveraging Virtual Reality to Enhance Diversity, Equity and Inclusion training at Google. CHI Extended Abstracts 2024: 522:1-522:7 - [c57]Marina Zhang, Owen S. Vallis, Aysegul Bumin, Tanay Vakharia, Elie Bursztein:
RETSim: Resilient and Efficient Text Similarity. ICLR 2024 - [i11]Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaz Bratanic, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein:
Supporting Human Raters with the Detection of Harmful Content using Large Language Models. CoRR abs/2406.12800 (2024) - [i10]Jason Baldridge, Jakob Bauer, Mukul Bhutani, Nicole Brichtova, Andrew Bunner, Kelvin Chan, Yichang Chen, Sander Dieleman, Yuqing Du, Zach Eaton-Rosen, Hongliang Fei, Nando de Freitas, Yilin Gao, Evgeny Gladchenko, Sergio Gómez Colmenarejo, Mandy Guo, Alex Haig, Will Hawkins, Hexiang Hu, Huilian Huang, Tobenna Peter Igwe, Christos Kaplanis, Siavash Khodadadeh, Yelin Kim, Ksenia Konyushkova, Karol Langner, Eric Lau, Shixin Luo, Sona Mokrá, Henna Nandwani, Yasumasa Onoe, Aäron van den Oord, Zarana Parekh, Jordi Pont-Tuset, Hang Qi, Rui Qian, Deepak Ramachandran, Poorva Rane, Abdullah Rashwan, Ali Razavi, Robert Riachi, Hansa Srinivasan, Srivatsan Srinivasan, Robin Strudel, Benigno Uria, Oliver Wang, Su Wang, Austin Waters, Chris Wolff, Auriel Wright, Zhisheng Xiao, Hao Xiong, Keyang Xu, Marc van Zee, Junlin Zhang, Katie Zhang, Wenlei Zhou, Konrad Zolna, Ola Aboubakar, Canfer Akbulut, Oscar Akerlund, Isabela Albuquerque, Nina Anderson, Marco Andreetto, Lora Aroyo, Ben Bariach, David Barker, Sherry Ben, Dana Berman, Courtney Biles, Irina Blok, Pankil Botadra, Jenny Brennan, Karla Brown, John Buckley, Rudy Bunel, Elie Bursztein, Christina Butterfield, Ben Caine, Viral Carpenter, Norman Casagrande, Ming-Wei Chang, Solomon Chang, Shamik Chaudhuri, Tony Chen, John Choi, Dmitry Churbanau, Nathan Clement, Matan Cohen, Forrester Cole, Mikhail Dektiarev, Vincent Du, Praneet Dutta, Tom Eccles, Ndidi Elue, Ashley Feden, Shlomi Fruchter, Frankie Garcia, Roopal Garg:
Imagen 3. CoRR abs/2408.07009 (2024) - [i9]Yanick Fratantonio, Luca Invernizzi, Loua Farah, Kurt Thomas, Marina Zhang, Ange Albertini, Francois Galilee, Giancarlo Metitieri, Julien Cretin, Alex Petit-Bianco, David Tao, Elie Bursztein:
Magika: AI-Powered Content-Type Detection. CoRR abs/2409.13768 (2024) - 2023
- [j5]Clark W. Barrett, Brad Boyd, Elie Bursztein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. Found. Trends Priv. Secur. 6(1): 1-52 (2023) - [c56]Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein:
Hybrid Post-quantum Signatures in Hardware Security Keys. ACNS Workshops 2023: 480-499 - [c55]Elie Bursztein, Marina Zhang, Owen Vallis, Xinyu Jia, Alexey Kurakin:
RETVec: Resilient and Efficient Text Vectorizer. NeurIPS 2023 - [i8]Elie Bursztein, Marina Zhang, Owen Vallis, Xinyu Jia, Alexey Kurakin:
RetVec: Resilient and Efficient Text Vectorizer. CoRR abs/2302.09207 (2023) - [i7]Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang:
Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning. CoRR abs/2306.07249 (2023) - [i6]Marina Zhang, Owen Vallis, Aysegul Bumin, Tanay Vakharia, Elie Bursztein:
RETSim: Resilient and Efficient Text Similarity. CoRR abs/2311.17264 (2023) - 2022
- [c54]Kurt Thomas, Patrick Gage Kelley, Sunny Consolvo, Patrawat Samermit, Elie Bursztein:
"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online. CHI 2022: 121:1-121:15 - [i5]Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein:
Hybrid Post-Quantum Signatures in Hardware Security Keys. IACR Cryptol. ePrint Arch. 2022: 1225 (2022) - 2021
- [c53]Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:
Designing Toxic Content Classification for a Diversity of Perspectives. SOUPS @ USENIX Security Symposium 2021: 299-318 - [c52]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c51]Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, Elie Bursztein:
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns. USENIX Security Symposium 2021: 1181-1198 - [i4]Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, Elie Bursztein:
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns. CoRR abs/2106.00236 (2021) - [i3]Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:
Designing Toxic Content Classification for a Diversity of Perspectives. CoRR abs/2106.04511 (2021) - 2020
- [c50]Fabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Jennifer Pullman, Cecilia M. Procopiuc, David Tao, Borbala Benko, Elie Bursztein:
Spotlight: Malware Lead Generation at Scale. ACSAC 2020: 17-27 - [c49]Camelia Simoiu, Ali Zand, Kurt Thomas, Elie Bursztein:
Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk. Internet Measurement Conference 2020: 567-576 - [i2]Ivan Petrov, Luca Invernizzi, Elie Bursztein:
CoinPolice: Detecting Hidden Cryptojacking Attacks with Neural Networks. CoRR abs/2006.10861 (2020)
2010 – 2019
- 2019
- [j4]Nithya Sambasivan, Nova Ahmed, Amna Batool, Elie Bursztein, Elizabeth F. Churchill, Laura Sanely Gaytán-Lugo, Tara Matthews, David Nemer, Kurt Thomas, Sunny Consolvo:
Toward Gender-Equitable Privacy and Security in South Asia. IEEE Secur. Priv. 17(4): 71-77 (2019) - [c48]Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney:
Five Years of the Right to be Forgotten. CCS 2019: 959-972 - [c47]Nithya Sambasivan, Amna Batool, Nova Ahmed, Tara Matthews, Kurt Thomas, Laura Sanely Gaytán-Lugo, David Nemer, Elie Bursztein, Elizabeth F. Churchill, Sunny Consolvo:
"They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia. CHI 2019: 2 - [c46]Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein:
Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium 2019: 1556-1571 - [c45]Elie Bursztein, Einat Clarke, Michelle DeLaune, David M. Elifff, Nick Hsu, Lindsey Olson, John Shehan, Madhukar Thakur, Kurt Thomas, Travis Bright:
Rethinking the Detection of Child Sexual Abuse Imagery on the Internet. WWW 2019: 2601-2607 - 2018
- [c44]Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, Oxana Comanescu:
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data. SOUPS @ USENIX Security Symposium 2018: 217-234 - [c43]Danny Yuxing Huang, Maxwell Matthaios Aliapoulios, Vector Guo Li, Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin, Kirill Levchenko, Alex C. Snoeren, Damon McCoy:
Tracking Ransomware End-to-end. IEEE Symposium on Security and Privacy 2018: 618-631 - 2017
- [j3]Matthew Tischer, Zakir Durumeric, Elie Bursztein, Michael D. Bailey:
The Danger of USB Drives. IEEE Secur. Priv. 15(2): 62-69 (2017) - [c42]Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein:
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials. CCS 2017: 1421-1434 - [c41]Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov:
The First Collision for Full SHA-1. CRYPTO (1) 2017: 570-596 - [c40]Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael D. Bailey, J. Alex Halderman, Vern Paxson:
The Security Impact of HTTPS Interception. NDSS 2017 - [c39]Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - [c38]Danny Yuxing Huang, Doug Grundman, Kurt Thomas, Abhishek Kumar, Elie Bursztein, Kirill Levchenko, Alex C. Snoeren:
Pinning Down Abuse on Google Maps. WWW 2017: 1471-1479 - [i1]Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov:
The first collision for full SHA-1. IACR Cryptol. ePrint Arch. 2017: 190 (2017) - 2016
- [c37]Elie Bursztein, Artem Malyshev, Tadek Pietraszek, Kurt Thomas:
Picasso: Lightweight Device Class Fingerprinting for Web Clients. SPSM@CCS 2016: 93-102 - [c36]Elie Bursztein:
I am a legend: Hacking hearthstone using statistical learning methods. CIG 2016: 1-8 - [c35]Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey:
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. RAID 2016: 143-164 - [c34]Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec Mori, Elie Bursztein, Michael D. Bailey:
Users Really Do Plug in USB Drives They Find. IEEE Symposium on Security and Privacy 2016: 306-319 - [c33]Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein:
Cloak of Visibility: Detecting When Machines Browse a Different Web. IEEE Symposium on Security and Privacy 2016: 743-758 - [c32]Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy:
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. USENIX Security Symposium 2016: 721-739 - [c31]Frank Li, Grant Ho, Eric Kuan, Yuan Niu, Lucas Ballard, Kurt Thomas, Elie Bursztein, Vern Paxson:
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. WWW 2016: 1009-1019 - 2015
- [j2]Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane:
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction]. IEEE Secur. Priv. 13(2): 14-21 (2015) - [c30]Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael D. Bailey, J. Alex Halderman:
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security. Internet Measurement Conference 2015: 27-39 - [c29]Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. IEEE Symposium on Security and Privacy 2015: 151-167 - [c28]Kurt Thomas, Danny Yuxing Huang, David Y. Wang, Elie Bursztein, Chris Grier, Tom Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna:
Framing Dependencies Introduced by Underground Commoditization. WEIS 2015 - [c27]Joseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike Williamson:
Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google. WWW 2015: 141-150 - 2014
- [c26]Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy:
Dialing Back Abuse on Phone Verified Accounts. CCS 2014: 465-476 - [c25]Victoria Schwanda Sosik, Elie Bursztein, Sunny Consolvo, David A. Huffaker, Gueorgi Kossinets, Kerwell Liao, Paul McDonald, Aaron Sedley:
Online microsurveys for user experience research. CHI Extended Abstracts 2014: 889-892 - [c24]Elie Bursztein, Angelique Moscicki, Celine Fabry, Steven Bethard, John C. Mitchell, Dan Jurafsky:
Easy does it: more usable CAPTCHAs. CHI 2014: 2637-2646 - [c23]Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage:
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild. Internet Measurement Conference 2014: 347-358 - [c22]Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane:
Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity. IEEE Symposium on Security and Privacy 2014: 493-508 - [c21]Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell:
The End is Nigh: Generic Solving of Text-based CAPTCHAs. WOOT 2014 - 2012
- [c20]Elie Bursztein, Chinmay Soman, Dan Boneh, John C. Mitchell:
SessionJuggler: secure web login from an untrusted terminal using session hijacking. WWW 2012: 321-330 - [e2]Elie Bursztein, Thomas Dullien:
6th USENIX Workshop on Offensive Technologies, WOOT'12, August 6-7, 2012, Bellevue, WA, USA, Proceedings. USENIX Association 2012 [contents] - 2011
- [c19]Elie Bursztein, Matthieu Martin, John C. Mitchell:
Text-based CAPTCHA strengths and weaknesses. CCS 2011: 125-138 - [c18]Elie Bursztein, Baptiste Gourdin, John C. Mitchell:
Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. ESORICS 2011: 133-149 - [c17]Elie Bursztein, Romain Beauxis, Hristo S. Paskov, Daniele Perito, Celine Fabry, John C. Mitchell:
The Failure of Noise-Based Non-continuous Audio Captchas. IEEE Symposium on Security and Privacy 2011: 19-31 - [c16]Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh:
OpenConflict: Preventing Real Time Map Hacks in Online Games. IEEE Symposium on Security and Privacy 2011: 506-520 - [c15]Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein:
Toward Secure Embedded Web Interfaces. USENIX Security Symposium 2011 - 2010
- [j1]Hristo Bojinov, Elie Bursztein, Dan Boneh:
The emergence of cross channel scripting. Commun. ACM 53(8): 105-113 (2010) - [c14]Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh:
Kamouflage: Loss-Resistant Password Management. ESORICS 2010: 286-302 - [c13]Jason Bau, Elie Bursztein, Divij Gupta, John C. Mitchell:
State of the Art: Automated Black-Box Web Application Vulnerability Testing. IEEE Symposium on Security and Privacy 2010: 332-345 - [c12]Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell, Daniel Jurafsky:
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. IEEE Symposium on Security and Privacy 2010: 399-413 - [c11]Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh:
An Analysis of Private Browsing Modes in Modern Browsers. USENIX Security Symposium 2010: 79-94 - [c10]Elie Bursztein, Baptiste Gourdin, Celine Fabry, Jason Bau, Gustav Rydstedt, Hristo Bojinov, Dan Boneh, John C. Mitchell:
Webseclab Security Education Workbench. CSET 2010 - [c9]Elie Bursztein, Jean-Michel Picod:
Recovering Windows Secrets and EFS Certificates Offline. WOOT 2010 - [e1]Eiko Yoneki, Elie Bursztein, Tao Stein:
Proceedings of the 3rd Workshop on Social Network Systems, Paris, France, April 13, 2010. ACM 2010, ISBN 978-1-4503-0080-3 [contents]
2000 – 2009
- 2009
- [c8]Elie Bursztein, Peifung E. Lam, John C. Mitchell:
TrackBack spam: abuse and prevention. CCSW 2009: 3-10 - [c7]Hristo Bojinov, Elie Bursztein, Dan Boneh:
XCS: cross channel scripting and its impact on web applications. CCS 2009: 420-431 - [c6]Elie Bursztein, John C. Mitchell:
Using Strategy Objectives for Network Security Analysis. Inscrypt 2009: 337-349 - [c5]Elie Bursztein, Steven Bethard:
Decaptcha: Breaking 75% of eBay Audio CAPTCHAs. WOOT 2009: 1-7 - 2008
- [c4]Elie Bursztein:
NetQi: A Model Checker for Anticipation Game. ATVA 2008: 246-251 - [c3]Elie Bursztein:
Extending Anticipation Games with Location, Penalty and Timeline. Formal Aspects in Security and Trust 2008: 272-286 - [c2]Elie Bursztein:
Probabilistic Identification for Hard to Classify Protocol. WISTP 2008: 49-63 - 2007
- [c1]Elie Bursztein, Jean Goubault-Larrecq:
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. ASIAN 2007: 212-227
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint