default search action
Yongjian Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Muhammad Ahmad Amin, Yongjian Hu, Yu Guan, Muhammad Zain Amin:
Exploring varying color spaces through representative forgery learning to improve deepfake detection. Digit. Signal Process. 147: 104426 (2024) - [j37]Zitong Yu, Rizhao Cai, Yawen Cui, Xin Liu, Yongjian Hu, Alex C. Kot:
Rethinking Vision Transformer and Masked Autoencoder in Multimodal Face Anti-Spoofing. Int. J. Comput. Vis. 132(11): 5217-5238 (2024) - [j36]Xuzhou Zhan, Bohui Ban, Yongjian Hu:
On the quasi-stability criteria of monic matrix polynomials. J. Comput. Appl. Math. 438: 115560 (2024) - [j35]Bohui Ban, Xuzhou Zhan, Yongjian Hu:
The two-point Padé approximation problem and its Hankel vector. J. Comput. Appl. Math. 448: 115911 (2024) - [j34]Siyuan Yang, Jun Liu, Shijian Lu, Meng Hwa Er, Yongjian Hu, Alex C. Kot:
Self-Supervised 3D Action Representation Learning With Skeleton Cloud Colorization. IEEE Trans. Pattern Anal. Mach. Intell. 46(1): 509-524 (2024) - [j33]Jicheng Li, Yongjian Hu, Beibei Liu, Zhaolong Gong, Xiangui Kang:
Boosting Deepfake Feature Extractors Using Unsupervised Domain Adaptation. IEEE Signal Process. Lett. 31: 2010-2014 (2024) - [j32]Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 19: 1168-1182 (2024) - [j31]Rizhao Cai, Zitong Yu, Chenqi Kong, Haoliang Li, Changsheng Chen, Yongjian Hu, Alex C. Kot:
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing With Statistical Tokens. IEEE Trans. Inf. Forensics Secur. 19: 8385-8397 (2024) - [j30]Huimin She, Yongjian Hu, Beibei Liu, Jicheng Li, Chang-Tsun Li:
Using Graph Neural Networks to Improve Generalization Capability of the Models for Deepfake Detection. IEEE Trans. Inf. Forensics Secur. 19: 8414-8427 (2024) - 2023
- [j29]Xuzhou Zhan, Yongjian Hu:
On the relation between Hurwitz stability of matrix polynomials and matrix-valued Stieltjes functions. J. Comput. Appl. Math. 417: 114614 (2023) - [j28]Xufeng Lin, Chang-Tsun Li, Scott D. Adams, Abbas Z. Kouzani, Richard Jiang, Ligang He, Yongjian Hu, Michael Vernon, Egan H. Doeven, Lawrence Webb, Todd Mcclellan, Adam Guskic:
Self-Supervised Leaf Segmentation under Complex Lighting Conditions. Pattern Recognit. 135: 109021 (2023) - [j27]Huimin She, Yongjian Hu, Beibei Liu, Jicheng Li, Chang-Tsun Li:
Learnable Information-Preserving Image Resizer for Face Forgery Detection. IEEE Signal Process. Lett. 30: 1657-1661 (2023) - [j26]Zhi Li, Haoliang Li, Xin Luo, Yongjian Hu, Kwok-Yan Lam, Alex C. Kot:
Asymmetric Modality Translation for Face Presentation Attack Detection. IEEE Trans. Multim. 25: 62-76 (2023) - [c51]Rizhao Cai, Yawen Cui, Zhi Li, Zitong Yu, Haoliang Li, Yongjian Hu, Alex C. Kot:
Rehearsal-Free Domain Continual Face Anti-Spoofing: Generalize More and Forget Less. ICCV 2023: 8003-8014 - [c50]Hongjie Zhao, Beibei Liu, Yongjian Hu, Jicheng Li, Chang-Tsun Li:
Hybrid Domain Meta-Learning Network for Face Forgery Detection and Localization in Deepfakes. IJCNN 2023: 1-8 - [c49]Muhammad Ahmad Amin, Yongjian Hu, Huimin She, Jicheng Li, Yu Guan, Muhammad Zain Amin:
Exposing Deepfake Frames through Spectral Analysis of Color Channels in Frequency Domain. IWBF 2023: 1-6 - [c48]Kai Zeng, Xiangyu Yu, Beibei Liu, Yu Guan, Yongjian Hu:
Detecting Deepfakes in Alternative Color Spaces to Withstand Unseen Corruptions. IWBF 2023: 1-6 - [i12]Zitong Yu, Rizhao Cai, Yawen Cui, Xin Liu, Yongjian Hu, Alex C. Kot:
Rethinking Vision Transformer and Masked Autoencoder in Multimodal Face Anti-Spoofing. CoRR abs/2302.05744 (2023) - [i11]Rizhao Cai, Yawen Cui, Zhi Li, Zitong Yu, Haoliang Li, Yongjian Hu, Alex C. Kot:
Rehearsal-Free Domain Continual Face Anti-Spoofing: Generalize More and Forget Less. CoRR abs/2303.09914 (2023) - [i10]Siyuan Yang, Jun Liu, Shijian Lu, Meng Hwa Er, Yongjian Hu, Alex C. Kot:
Self-Supervised 3D Action Representation Learning with Skeleton Cloud Colorization. CoRR abs/2304.08799 (2023) - [i9]Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. CoRR abs/2304.12489 (2023) - [i8]Shuangpeng Han, Rizhao Cai, Yawen Cui, Zitong Yu, Yongjian Hu, Alex C. Kot:
Hyperbolic Face Anti-Spoofing. CoRR abs/2308.09107 (2023) - [i7]Rizhao Cai, Zitong Yu, Chenqi Kong, Haoliang Li, Changsheng Chen, Yongjian Hu, Alex C. Kot:
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens. CoRR abs/2309.04038 (2023) - [i6]Chenhao Xu, Chang-Tsun Li, Yongjian Hu, Chee Peng Lim, Douglas C. Creighton:
Deep Learning Techniques for Video Instance Segmentation: A Survey. CoRR abs/2310.12393 (2023) - 2022
- [j25]Rizhao Cai, Zhi Li, Renjie Wan, Haoliang Li, Yongjian Hu, Alex C. Kot:
Learning Meta Pattern for Face Anti-Spoofing. IEEE Trans. Inf. Forensics Secur. 17: 1201-1213 (2022) - [j24]Zhi Li, Rizhao Cai, Haoliang Li, Kwok-Yan Lam, Yongjian Hu, Alex C. Kot:
One-Class Knowledge Distillation for Face Presentation Attack Detection. IEEE Trans. Inf. Forensics Secur. 17: 2137-2150 (2022) - [i5]Xufeng Lin, Chang-Tsun Li, Scott D. Adams, Abbas Z. Kouzani, Richard Jiang, Ligang He, Yongjian Hu, Michael Vernon, Egan H. Doeven, Lawrence Webb, Todd Mcclellan, Adam Guskic:
Self-Supervised Leaf Segmentation under Complex Lighting Conditions. CoRR abs/2203.15943 (2022) - [i4]Zhi Li, Rizhao Cai, Haoliang Li, Kwok-Yan Lam, Yongjian Hu, Alex C. Kot:
One-Class Knowledge Distillation for Face Presentation Attack Detection. CoRR abs/2205.03792 (2022) - 2021
- [j23]Nguyen Tuan Anh, Yongjian Hu, Qianhua He, Tran Thi Ngoc Linh, Hoang Thi Kim Dung, Chen Guang:
LIS-Net: An end-to-end light interior search network for speech command recognition. Comput. Speech Lang. 65: 101131 (2021) - [j22]Shuowei Liu, Yongjian Hu, Beibei Liu, Chang-Tsun Li:
An HEVC steganalytic approach against motion vector modification using local optimality in candidate list. Pattern Recognit. Lett. 146: 23-30 (2021) - [j21]Shuowei Liu, Beibei Liu, Yongjian Hu, Xianfeng Zhao:
Non-Degraded Adaptive HEVC Steganography by Advanced Motion Vector Prediction. IEEE Signal Process. Lett. 28: 1843-1847 (2021) - [c47]Wen-Feng Pang, Qian-Hua He, Yongjian Hu, Yan-Xiong Li:
Violence Detection in Videos Based on Fusing Visual and Audio Information. ICASSP 2021: 2260-2264 - [c46]Meng Li, Beibei Liu, Yongjian Hu, Liepiao Zhang, Shiqi Wang:
Deepfake Detection Using Robust Spatial and Temporal Features from Facial Landmarks. IWBF 2021: 1-6 - [c45]Beibei Liu, Yifei Gao, Yongjian Hu, Jingjing Guo, Yufei Wang:
Double-Stream Segmentation Network with Temporal Self-attention for Deepfake Video Detection. IWDW 2021: 32-46 - [c44]Yongjian Hu, Hongjie Zhao, Zeqiong Yu, Beibei Liu, Xiangyu Yu:
Exposing Deepfake Videos with Spatial, Frequency and Multi-scale Temporal Artifacts. IWDW 2021: 47-57 - [i3]Rizhao Cai, Zhi Li, Renjie Wan, Haoliang Li, Yongjian Hu, Alex ChiChung Kot:
Learning Meta Pattern for Face Anti-Spoofing. CoRR abs/2110.06753 (2021) - [i2]Zhi Li, Haoliang Li, Xin Luo, Yongjian Hu, Kwok-Yan Lam, Alex C. Kot:
Asymmetric Modality Translation For Face Presentation Attack Detection. CoRR abs/2110.09108 (2021) - 2020
- [j20]Yufei Wang, Yongjian Hu, Alan Wee-Chung Liew, Chang-Tsun Li:
ENF Based Video Forgery Detection Algorithm. Int. J. Digit. Crime Forensics 12(1): 131-156 (2020) - [j19]Yanzhun Ma, Wei Wei, Yongjian Hu, Gongning Chen:
The multipoint Padé approximation problem and its Hankel vector. J. Comput. Appl. Math. 375: 112807 (2020) - [c43]Xiongbo Huang, Yongjian Hu, Yufei Wang, Beibei Liu, Shuowei Liu:
Deep Learning-based Quantitative Steganalysis to Detect Motion Vector Embedding of HEVC Videos. DSC 2020: 150-155 - [c42]Yuanyuan Ren, Yongjian Hu, Beibei Liu, Yixiang Xie, Yufei Wang:
Face Anti-spoofing with a Noise-Attention Network Using Color-Channel Difference Images. ICANN (1) 2020: 517-526 - [c41]Haocong Zheng, Yongjian Hu, Beibei Liu, Guang Chen, Alex C. Kot:
A New Efficient Finger-Vein Verification Based on Lightweight Neural Network Using Multiple Schemes. ICANN (1) 2020: 748-758 - [c40]Meng Li, Beibei Liu, Yongjian Hu, Yufei Wang:
Exposing Deepfake Videos by Tracking Eye Movements. ICPR 2020: 5184-5189 - [c39]Xiongbo Huang, Yongjian Hu, Yufei Wang, Beibei Liu, Shuowei Liu:
Selection-Channel-Aware Deep Neural Network to Detect Motion Vector Embedding of HEVC Videos. ICSPCC 2020: 1-6
2010 – 2019
- 2019
- [j18]Saghir Ahmed Saghir Alfasly, Beibei Liu, Yongjian Hu, Yufei Wang, Chang-Tsun Li:
Auto-Zooming CNN-Based Framework for Real-Time Pedestrian Detection in Outdoor Surveillance Videos. IEEE Access 7: 105816-105826 (2019) - [j17]Saghir Ahmed Saghir Alfasly, Yongjian Hu, Haoliang Li, Tiancai Liang, Xiaofeng Jin, Beibei Liu, Qingli Zhao:
Multi-Label-Based Similarity Learning for Vehicle Re-Identification. IEEE Access 7: 162605-162616 (2019) - [j16]Jichen Yang, Qianhua He, Yongjian Hu, Weiqiang Pan:
CBC-Based Synthetic Speech Detection. Int. J. Digit. Crime Forensics 11(2): 63-74 (2019) - [j15]Huanzhou Zhu, Ligang He, Songling Fu, Rui Li, Xie Han, Zhangjie Fu, Yongjian Hu, Chang-Tsun Li:
WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU. Int. J. Parallel Program. 47(4): 644-667 (2019) - [c38]Saghir Ahmed Saghir Alfasly, Yongjian Hu, Tiancai Liang, Xiaofeng Jin, Qingli Zhao, Beibei Liu:
Variational Representation Learning for Vehicle Re-Identification. ICIP 2019: 3118-3122 - [c37]Yongjian Hu, Oriana Riva, Suman Nath, Iulian Neamtiu:
Elix: Path-Selective Taint Analysis for Extracting Mobile App Links. MobiSys 2019: 193-206 - [i1]Saghir Ahmed Saghir Alfasly, Yongjian Hu, Tiancai Liang, Xiaofeng Jin, Qingli Zhao, Beibei Liu:
Variational Representation Learning for Vehicle Re-Identification. CoRR abs/1905.02343 (2019) - 2018
- [j14]Bin Wang, Chao Chen, Ligang He, Bo Gao, Jiadong Ren, Zhangjie Fu, Songling Fu, Yongjian Hu, Chang-Tsun Li:
Modelling and developing conflict-aware scheduling on large-scale data centres. Future Gener. Comput. Syst. 86: 995-1007 (2018) - [c36]Yongjian Hu, Iulian Neamtiu:
Static Detection of Event-based Races in Android Apps. ASPLOS 2018: 257-270 - [c35]Sanjay Kumar Rouniyar, Yu Yingjuan, Yongjian Hu:
Channel Response Based Multi-Feature Audio Splicing Forgery Detection and Localization. EBIMCS 2018: 46-53 - 2017
- [b1]Yongjian Hu:
Detecting and Verifying Event-Driven Races in Mobile Apps. University of California, Riverside, USA, 2017 - [j13]Iulian Neamtiu, Xuetao Wei, Michalis Faloutsos, Lorenzo Gomez, Tanzirul Azim, Yongjian Hu, Zhiyong Shan:
Improving Smartphone Security and Reliability. J. Interconnect. Networks 17(1): 1740002:1-1740002:67 (2017) - [c34]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - 2016
- [j12]Yaling Liang, Chang-Tsun Li, Yu Guan, Yongjian Hu:
Gait recognition based on the golden ratio. EURASIP J. Image Video Process. 2016: 22 (2016) - [c33]Thi Thu Thuy Nguyen, Tien Thanh Nguyen, Xuan Cuong Pham, Alan Wee-Chung Liew, Yongjian Hu, Tiancai Liang, Chang-Tsun Li:
A Novel Online Bayes Classifier. DICTA 2016: 1-6 - [c32]Yongjian Hu, Iulian Neamtiu:
Fuzzy and cross-app replay for smartphone apps. AST@ICSE 2016: 50-56 - [c31]Yongjian Hu, Iulian Neamtiu:
VALERA: an effective and efficient record-and-replay tool for android. MOBILESoft 2016: 285-286 - [c30]Yongjian Hu, Iulian Neamtiu, Arash Alavi:
Automatically verifying and reproducing event-based races in Android apps. ISSTA 2016: 377-388 - 2015
- [j11]Yongjian Hu, Chang-Tsun Li, Zhimao Lai:
Fast source camera identification using matching signs between query and reference fingerprints. Multim. Tools Appl. 74(18): 7405-7428 (2015) - [c29]Yongjian Hu, Tanzirul Azim, Iulian Neamtiu:
Improving the Android development lifecycle with the VALERA record-and-replay approach. MobileDeLi 2015: 7-8 - [c28]Yongjian Hu, Tanzirul Azim, Iulian Neamtiu:
Versatile yet lightweight record-and-replay for Android. OOPSLA 2015: 349-366 - 2014
- [j10]Junxiang Wang, Jiangqun Ni, Yongjian Hu:
An efficient reversible data hiding scheme using prediction and optimal side information selection. J. Vis. Commun. Image Represent. 25(6): 1425-1431 (2014) - 2013
- [j9]Kan Wang, Zhe-Ming Lu, Yongjian Hu:
A high capacity lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(7): 1965-1975 (2013) - [j8]Yongjian Hu, Kan Wang, Zhe-Ming Lu:
An improved VLC-based lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(8): 2166-2173 (2013) - [c27]Zhisheng Lv, Yongjian Hu, Chang-Tsun Li, Bei-Bei Liu:
Audio forensic authentication based on MOCC between ENF and reference signals. ChinaSIP 2013: 427-431 - [c26]Xingjie Wei, Chang-Tsun Li, Yongjian Hu:
Face recognition with occlusion using Dynamic Image-to-Class Warping (DICW). FG 2013: 1-6 - [c25]Xufeng Lin, Chang-Tsun Li, Yongjian Hu:
Exposing image forgery through the detection of contrast enhancement. ICIP 2013: 4467-4471 - [c24]Xingjie Wei, Chang-Tsun Li, Yongjian Hu:
Robust face recognition with occlusions in both reference and query images. IWBF 2013: 1-4 - 2012
- [j7]Yongjian Hu, Chang-Tsun Li, Yufei Wang, Bei-Bei Liu:
An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery. Int. J. Digit. Crime Forensics 4(3): 20-32 (2012) - [c23]Xingjie Wei, Chang-Tsun Li, Yongjian Hu:
Robust Face Recognition under Varying Illumination and Occlusion Considering Structured Sparsity. DICTA 2012: 1-7 - [c22]Yu Guan, Chang-Tsun Li, Yongjian Hu:
Random Subspace Method for Gait Recognition. ICME Workshops 2012: 284-289 - [c21]Kan Wang, Yongjian Hu, Zhe-Ming Lu:
Reversible Data Hiding for Block Truncation Coding Compressed Images Based on Prediction-Error Expansion. IIH-MSP 2012: 317-320 - [c20]Yu Guan, Chang-Tsun Li, Yongjian Hu:
Robust Clothing-Invariant Gait Recognition. IIH-MSP 2012: 321-324 - [c19]Yongjian Hu, Chang-Tsun Li, Xufeng Lin, Bei-Bei Liu:
An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces. IIH-MSP 2012: 325-330 - [c18]Yongjian Hu, Chang-Tsun Li, Zhimao Lai, Shangfan Zhang:
Fast camera fingerprint search algorithm for source camera identification. ISCCSP 2012: 1-5 - [c17]Yongjian Hu, Chang-Tsun Li, Zhisheng Lv, Bei-Bei Liu:
Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal. IWDW 2012: 253-266 - [c16]Yu Guan, Chang-Tsun Li, Yongjian Hu:
An adaptive system for gait recognition in multi-view environments. MM&Sec 2012: 139-144 - 2011
- [j6]Yongjian Hu, Chang-Tsun Li, Changhui Zhou, Xufeng Lin:
Source Camera Identification Issues: Forensic Features Selection and Robustness. Int. J. Digit. Crime Forensics 3(4): 1-15 (2011) - [c15]Ying-Chu Chen, Yongjian Hu, Chang-Tsun Li:
Further studies on forensic features for source camera identification. ICDP 2011: 1-6 - [c14]Yongjian Hu, Chang-Tsun Li, Changhui Zhou, Xufeng Lin:
Issues on Selecting Image Features for Robust Source Camera Identification. WDFIA 2011: 149-159 - 2010
- [c13]Bei-Bei Liu, Yongjian Hu, Heung-Kyu Lee:
Source camera identification from significant noise residual regions. ICIP 2010: 1749-1752 - [c12]Yongjian Hu, Chao Jian, Chang-Tsun Li:
Using improved imaging sensor pattern noise for source camera identification. ICME 2010: 1481-1486 - [c11]Yongjian Hu, Chang-Tsun Li, Chao Jian:
Building fingerprints with information from three color bands for source camera identification. MiFor@MM 2010: 111-116 - [c10]Bei-Bei Liu, Heung-Kyu Lee, Yongjian Hu, Chang-Hee Choi:
On classification of source cameras: A graph based approach. WIFS 2010: 1-5
2000 – 2009
- 2009
- [j5]Yongjian Hu, Heung-Kyu Lee, Jianwei Li:
DE-Based Reversible Data Hiding With Improved Overflow Location Map. IEEE Trans. Circuits Syst. Video Technol. 19(2): 250-260 (2009) - 2008
- [j4]Yongjian Hu, Heung-Kyu Lee, Kaiying Chen, Jianwei Li:
Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions. IEEE Trans. Multim. 10(8): 1500-1512 (2008) - [c9]Yongjian Hu, Heung-Kyu Lee, Huafei Zeng:
Curve Watermarking Technique for Fingerprinting Digital Maps. IIH-MSP 2008: 223-226 - [c8]Xiaohui Cheng, Yongjian Hu, Youmin Gong:
Design Methodology of Control System with Mutual Exclusion. PACIIA (2) 2008: 403-407 - 2007
- [c7]Yongjian Hu, Heung-Kyu Lee, Jianwei Li, Kaiying Chen:
Reversible Data Hiding Using Prediction Error Values Embedding. IWDW 2007: 244-253 - 2006
- [j3]Yongjian Hu, Sam Kwong, Jiwu Huang:
An algorithm for removable visible watermarking. IEEE Trans. Circuits Syst. Video Technol. 16(1): 129-133 (2006) - [j2]Yongjian Hu, Byeungwoo Jeon:
Reversible Visible Watermarking and Lossless Recovery of Original Images. IEEE Trans. Circuits Syst. Video Technol. 16(11): 1423-1429 (2006) - [c6]Yongjian Hu, Byeungwoo Jeon:
Reversible Visible Watermarking Technique for Images. ICIP 2006: 2577-2580 - [c5]Yongjian Hu, Byeungwoo Jeon, Zhiquan Lin, Hui Yang:
Analysis and Comparison of Typical Reversible Watermarking Methods. IWDW 2006: 333-347 - 2004
- [j1]ZhengHong Yang, Yongjian Hu:
A generalized Bezoutian matrix with respect to a polynomial sequence of interpolatory type. IEEE Trans. Autom. Control. 49(10): 1783-1792 (2004) - [c4]Yongjian Hu, Sam Kwong, Jiwu Huang:
Using invisible watermarks to protect visibly watermarked images. ISCAS (5) 2004: 584-587 - 2003
- [c3]Yongjian Hu, Sam Kwong:
An image fusion based visible watermarking algorithm. ISCAS (3) 2003: 794-797 - [c2]Yongjian Hu, Jiwu Huang, Sam Kwong, Yiu-Keung Chan:
Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform. IWDW 2003: 86-100 - 2002
- [c1]Yongjian Hu, Sam Kwong, Yiu-Keung Chan:
The Design and Application of DWT-Domain Optimum Decoders. IWDW 2002: 22-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint