default search action
Saqib Ali
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Nayab Fatima, Shazia Riaz, Saqib Ali, Rafiullah Khan, Mohib Ullah, Daehan Kwak:
Sensors Faults Classification and Faulty Signals Reconstruction Using Deep Learning. IEEE Access 12: 100544-100558 (2024) - [j45]Jan Lansky, Saqib Ali, Mokhtar Mohammadi, Mohammed Kamal Majeed, Sarkhel H. Taher Karim, Shima Rashidi, Mehdi Hosseinzadeh, Amir Masoud Rahmani:
Corrections to "Deep Learning-Based Intrusion Detection Systems: A Systematic Review". IEEE Access 12: 150940 (2024) - [j44]Saqib Ali, Qianmu Li, Abdullah Yousafzai:
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey. Ad Hoc Networks 152: 103320 (2024) - [j43]Mahawish Fatima, Osama M. Hussain Rehman, Saqib Ali, Moazzam Fareed Niazi:
ELIDS: Ensemble Feature Selection for Lightweight IDS against DDoS Attacks in Resource-Constrained IoT Environment. Future Gener. Comput. Syst. 159: 172-187 (2024) - [j42]Ahmad S. Ajina, Hafiz Muhammad Usama Javed, Saqib Ali, Ahmad M. A. Zamil:
Fake or Fact News? Investigating Users' Online Fake News Sharing Behavior: The Moderating Role of Social Networking Sites (SNS) Dependency. Int. J. Hum. Comput. Interact. 40(14): 3607-3621 (2024) - [j41]Mehdi Hosseinzadeh, Saqib Ali, Amir Masoud Rahmani, Jan Lansky, Vladimir Nulicek, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Aso Darwesh, Sang-Woong Lee:
A smart filtering-based adaptive optimized link state routing protocol in flying ad hoc networks for traffic monitoring. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102034 (2024) - [j40]Tariq Mahmood, Jianqiang Li, Tanzila Saba, Amjad Rehman, Saqib Ali:
Energy optimized data fusion approach for scalable wireless sensor network using deep learning-based scheme. J. Netw. Comput. Appl. 224: 103841 (2024) - [j39]Zeeshan Shaukat, Qurratul Ain Farooq, Chuangbai Xiao, Saqib Ali, Faheem Akhtar, Muhammad Azeem, Abdul Ahad Zulfiqar:
Efficient scheme to perform semantic segmentation on 3-D brain tumor using 3-D u-net architecture. Multim. Tools Appl. 83(9): 25121-25134 (2024) - [j38]Mehdi Hosseinzadeh, Saqib Ali, Husham Jawad Ahmad, Faisal Alanazi, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Aso Darwesh, Amir Masoud Rahmani, Sang-Woong Lee:
DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks. Veh. Commun. 47: 100778 (2024) - [j37]Mehdi Hosseinzadeh, Saqib Ali, Husham Jawad Ahmad, Faisal Alanazi, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Omed Hassan Ahmed, Amir Masoud Rahmani, Sang-Woong Lee:
A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks. Veh. Commun. 49: 100826 (2024) - [i4]Asila AlHarmali, Saqib Ali, Waqas Aman, Omar Hussain:
Cyber Risk Assessment for Cyber-Physical Systems: A Review of Methodologies and Recommendations for Improved Assessment Effectiveness. CoRR abs/2408.16841 (2024) - 2023
- [j36]Basim AlGhanboosi, Saqib Ali, Ali Tarhini:
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach. Comput. Hum. Behav. 144: 107702 (2023) - [j35]Shazia Riaz, Saqib Ali, Guojun Wang, Asad Anees:
Differentially private block coordinate descent. J. King Saud Univ. Comput. Inf. Sci. 35(1): 283-295 (2023) - [j34]Mehdi Hosseinzadeh, Saqib Ali, Liliana Ionescu-Feleaga, Bogdan-Stefan Ionescu, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Omed Hassan Ahmed, Amir Masoud Rahmani, Asif Mehmood:
A novel Q-learning-based routing scheme using an intelligent filtering algorithm for flying ad hoc networks (FANETs). J. King Saud Univ. Comput. Inf. Sci. 35(10): 101817 (2023) - [j33]Saqib Ali, Sana Sahiba, Muhammad Azeem, Zeeshan Shaukat, Tariq Mahmood, Zareen Sakhawat, Muhammad Saqlain Aslam:
A recognition model for handwritten Persian/Arabic numbers based on optimized deep convolutional neural network. Multim. Tools Appl. 82(10): 14557-14580 (2023) - [j32]Shazia Riaz, Saqib Ali, Guojun Wang, Muhammad Ahsan Latif, Muhammad Zafar Iqbal:
Membership inference attack on differentially private block coordinate descent. PeerJ Comput. Sci. 9: e1616 (2023) - 2022
- [j31]Zeeshan Shaukat, Qurat ul Ain Farooq, Shanshan Tu, Chuangbai Xiao, Saqib Ali:
A state-of-the-art technique to perform cloud-based semantic segmentation using deep learning 3D U-Net architecture. BMC Bioinform. 23(1): 251 (2022) - [j30]Raja Waseem Anwar, Saqib Ali:
Smart Cities Security Threat Landscape: A Review. Comput. Informatics 41(2): 405-423 (2022) - [j29]Ravi Sharma, Norita B. Ahmad, Saqib Ali, Adil Bilal, Samar Fatima, Nir Kshetri, Fatima Abu Salem, Prateek Sibal:
Technomoral Affordances of Artificial Intelligence in Data-Driven Systems. Computer 55(10): 76-81 (2022) - [j28]Raya Alabri, Abdul Khalique Shaikh, Saqib Ali, Ali Hamad Al-Badi:
Designing an E-Voting Framework Using Blockchain Technology: A Case Study of Oman. Int. J. Electron. Gov. Res. 18(2): 1-29 (2022) - [j27]Hasan Zahid, Saqib Ali, Emad Abu-Shanab, Hafiz Muhammad Usama Javed:
Determinants of intention to use e-government services: An integrated marketing relation view. Telematics Informatics 68: 101778 (2022) - [j26]Amir Masoud Rahmani, Saqib Ali, Efat Yousefpoor, Mohammad Sadegh Yousefpoor, Danial Javaheri, Pooia Lalbakhsh, Omed Hassan Ahmed, Mehdi Hosseinzadeh, Sang-Woong Lee:
OLSR+: A new routing method based on fuzzy logic in flying ad-hoc networks (FANETs). Veh. Commun. 36: 100489 (2022) - [c36]Saqib Ali, Jianqiang Li, Yan Pei, Khalil ur Rehman:
A Multi-module 3D U-Net Learning Architecture for Brain Tumor Segmentation. DMBD (2) 2022: 57-69 - [i3]Abdul Shaikh, Saqib Ali, Ramla Al-Maamari:
The Impact of Social Media in Learning and Teaching: A Bibliometric-based Citation Analysis. CoRR abs/2209.11284 (2022) - 2021
- [j25]Jan Lansky, Saqib Ali, Mokhtar Mohammadi, Mohammed Kamal Majeed, Sarkhel H. Taher Karim, Shima Rashidi, Mehdi Hosseinzadeh, Amir Masoud Rahmani:
Deep Learning-Based Intrusion Detection Systems: A Systematic Review. IEEE Access 9: 101574-101599 (2021) - [j24]Sang-Woong Lee, Saqib Ali, Mohammad Sadegh Yousefpoor, Efat Yousefpoor, Pooia Lalbakhsh, Danial Javaheri, Amir Masoud Rahmani, Mehdi Hosseinzadeh:
An Energy-Aware and Predictive Fuzzy Logic-Based Routing Scheme in Flying Ad Hoc Networks (FANETs). IEEE Access 9: 129977-130005 (2021) - [j23]Abdul Khalique Shaikh, Nisar Ahmad, Imran Khan, Saqib Ali:
E-Participation Within E-Government: A Bibliometric-Based Systematic Literature Review. Int. J. Electron. Gov. Res. 17(4): 15-39 (2021) - [j22]Saqib Ali:
Cybersecurity management for distributed control system: systematic approach. J. Ambient Intell. Humaniz. Comput. 12(11): 10091-10103 (2021) - [j21]Ali Mazaherinezhad, Aram Mahmood Ahmed, Marwan Yassin Ghafour, Omed Hassan Ahmed, Saqib Ali, Mehdi Hosseinzadeh:
A new model for investigating the role of knowledge management system on the mental health of employees. Kybernetes 50(12): 3269-3285 (2021) - [j20]Amir Masoud Rahmani, Elham Azhir, Saqib Ali, Mokhtar Mohammadi, Omed Hassan Ahmed, Marwan Yassin Ghafour, Sarkar Hasan Ahmed, Mehdi Hosseinzadeh:
Artificial intelligence approaches and mechanisms for big data analytics: a systematic study. PeerJ Comput. Sci. 7: e488 (2021) - [j19]Khalil ur Rehman, Jianqiang Li, Yan Pei, Anaa Yasin, Saqib Ali, Tariq Mahmood:
Computer Vision-Based Microcalcification Detection in Digital Mammograms Using Fully Connected Depthwise Separable Convolutional Neural Network. Sensors 21(14): 4854 (2021) - [j18]Mehdi Hosseinzadeh, Omed Hassan Ahmed, Marwan Yassin Ghafour, Fatemeh Safara, Hawkar Kamaran Hama, Saqib Ali, Bay Vo, Hsiu-Sen Chiang:
A multiple multilayer perceptron neural network with an adaptive learning algorithm for thyroid disease diagnosis in the internet of medical things. J. Supercomput. 77(4): 3616-3637 (2021) - [c35]Lamees Al-Alawi, Raiya Al-Busaidi, Saqib Ali:
Applying NIST SP 800-161 in Supply Chain Processes Empowered by Artificial Intelligence. ACIT 2021: 1-8 - [c34]Abir S. Al-Harrasi, Saqib Ali:
Investigating the Challenges Facing Composable/ Disaggregated Infrastructure Implementation: A Literature Review. ACIT 2021: 1-5 - 2020
- [j17]Fatemeh Safara, Amin Salih Mohammed, Moayad Yousif Potrus, Saqib Ali, Quan Thanh Tho, Alireza Souri, Fereshteh Janenia, Mehdi Hosseinzadeh:
An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network. IEEE Access 8: 48428-48437 (2020) - [j16]Mehdi Hosseinzadeh, Quan Thanh Tho, Saqib Ali, Amir Masoud Rahmani, Alireza Souri, Monire Norouzi, Bao Huynh:
A Hybrid Service Selection and Composition Model for Cloud-Edge Computing in the Internet of Things. IEEE Access 8: 85939-85949 (2020) - [j15]Saqib Ali, Tahir Nadeem Malik, Aamir Raza:
Risk-Averse Home Energy Management System. IEEE Access 8: 91779-91798 (2020) - [j14]Saqib Ali, Guojun Wang, Shazia Riaz:
Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering. IEEE Access 8: 173186-173196 (2020) - [j13]Taisira Al Balushi, Saqib Ali:
Theoretical Approach for Instrument Development in Measuring User-Perceived E-Government Service Quality: A Case of Oman E-Government Services. Int. J. Electron. Gov. Res. 16(1): 40-58 (2020) - [j12]Zeeshan Shaukat, Saqib Ali, Qurat ul Ain Farooq, Chuangbai Xiao, Sana Sahiba, Allah Ditta:
Cloud-based efficient scheme for handwritten digit recognition. Multim. Tools Appl. 79(39-40): 29537-29549 (2020) - [j11]Saqib Ali, Jianqiang Li, Yan Pei, Muhammad Saqlain Aslam, Zeeshan Shaukat, Muhammad Azeem:
An Effective and Improved CNN-ELM Classifier for Handwritten Digits Recognition and Classification. Symmetry 12(10): 1742 (2020) - [c33]Aqsa Younas, Raheela Nasim, Saqib Ali, Guojun Wang, Fang Qi:
Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches. CSE 2020: 66-71 - [c32]Aroma Tariq, Saqib Ali, Xiaofei Xing, Guojun Wang:
Intelligent Surveillance in Smart City Using 3D Road Monitoring. iSCI 2020: 31-36 - [c31]Saqib Ali, Osama Rehman, Kyung Jin Cha, Taisira Al Balushi, Zia Nadir:
Performance Analysis of ZigBee-based IoT Prototype for Remote Monitoring in Power Grid Systems. SMA 2020: 384-389 - [c30]Muhammad Sohaib Yousaf, Shazia Riaz, Saqib Ali, Shuhong Chen, Guojun Wang:
The Future Prospects of Adversarial Nets. SpaCCS Workshops 2020: 15-26 - [c29]Muhammad Shakeel Faridi, Saqib Ali, Guihua Duan, Guojun Wang:
Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0. SpaCCS 2020: 331-344
2010 – 2019
- 2019
- [c28]Kiran Naz Abbasi, Syed Fakhar Bilal, Saqib Ali, Muhammad Naeem:
To Explore the Factors that Affect Behavior of Employee Regarding Knowledge Sharing in IT Service Companies. INTAP 2019: 237-249 - [c27]Saqib Ali, Guojun Wang, Komal Fatima, Pin Liu:
Semantic Knowledge Based Graph Model in Smart Cities. iSCI 2019: 268-278 - [c26]Saqib Ali, Guojun Wang, Bebo White, Komal Fatima:
Libra Critique Towards Global Decentralized Financial System. iSCI 2019: 661-672 - [i2]Khalil ur Rehman, Anaa Yasin, Tariq Mahmood, Muhammad Azeem, Saqib Ali:
SEO: A unique approach to enhance the site rank by implementing Efficient Keywords Scheme. PeerJ Prepr. 7: e27609 (2019) - 2018
- [b1]Saqib Ali, Taiseera Al-Balushi, Zia Nadir, Omar Khadeer Hussain:
Cyber Security for Cyber Physical Systems. Studies in Computational Intelligence 768, Springer 2018, ISBN 978-3-319-75879-4 - [c25]Saqib Ali, Guojun Wang, Xiaofei Xing, Roger Leslie Cottrell:
Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors. DASC/PiCom/DataCom/CyberSciTech 2018: 919-926 - [c24]Wei Zhang, Xiaofei Xing, Saqib Ali, Guojun Wang:
Internet Performance Prediction Framework Based on PingER Dataset. ICA3PP (3) 2018: 118-131 - [c23]Xu Li, Guojun Wang, Saqib Ali, QiLin He:
Android Malware Detection Using Category-Based Permission Vectors. ICA3PP (4) 2018: 399-414 - [c22]Zeeshan Shaukat, Faheem Akhtar, Juan Fang, Saqib Ali, Muhammad Azeem:
Cloud Based Face Recognition for Google Glass. ICCAI 2018: 104-111 - [c21]Saqib Ali, Guojun Wang, Bebo White, Roger Leslie Cottrell:
A Blockchain-Based Decentralized Data Storage and Access Framework for PingER. TrustCom/BigDataSE 2018: 1303-1308 - [c20]Saqib Ali, Guojun Wang, Md. Zakirul Alam Bhuiyan, Hai Jiang:
Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 991-998 - 2017
- [j10]Saqib Ali, Taiseera Al-Balushi, Ali H. Al-Badi:
Guidelines and deployment of accessibility-aware framework approach. Int. J. Web Inf. Syst. 13(2): 114-139 (2017) - [c19]Saqib Ali, Guojun Wang, Roger Les Cottrell, Tayyba Anwar:
Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor. ISPA/IUCC 2017: 982-989 - [c18]Saqib Ali, Guojun Wang, Roger Les Cottrell, Sara Masood:
Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements. ISPA/IUCC 2017: 1319-1326 - [c17]Juan Fang, Zeeshan Shaukat, Saqib Ali, Abdul Ahad Zulfiqar:
Cloud Computing: Virtual Web Hosting on Infrastructure as a Service (IaaS). MSN 2017: 450-460 - 2016
- [j9]Taiseera Al-Balushi, Saqib Ali, Osama Rehman:
Economics of Cyber Security and the Way Forward. Int. J. Cyber Warf. Terror. 6(4): 41-57 (2016) - [j8]Saqib Ali, Md. Asri Ngadi:
Optimized interference aware joint channel assignment model for wireless mesh network. Telecommun. Syst. 62(1): 215-230 (2016) - [c16]Aqsa Hameed, Saqib Ali, Roger Les Cottrell, Bebo White:
Applying big data warehousing and visualization techniques on pingER data. BDCAT 2016: 67-72 - [c15]Tasira Al Balushi, Saqib Ali:
Exploring the Dimensions of Electronic Government Service Quality. SEKE 2016: 341-344 - 2015
- [c14]Fatma Al-Musawi, Ali H. Al-Badi, Saqib Ali:
A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in Oman. INCoS 2015: 417-422 - [c13]Amira M. AlZadjali, Ali H. Al-Badi, Saqib Ali:
An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman. INCoS 2015: 423-428 - 2014
- [j7]Saqib Ali, Anjum Naveed, Md. Asri Bin Ngadi, Junaid Ahsenali Chaudhry:
Interference Nomenclature in Wireless Mesh Networks. Wirel. Pers. Commun. 75(4): 1983-2003 (2014) - 2012
- [j6]Md. Asri Ngadi, Saqib Ali, Abdul Hanan Abdullah, Rashid Hafeez Khokhar:
A taxonomy of cross layer routing metrics for wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2012: 177 (2012) - [j5]Rashid Hafeez Khokhar, Md. Asri Ngadi, M. Shafie Latiff, Kayhan Zrar Ghafoor, Saqib Ali:
Multi-criteria Receiver Self-Election Scheme for Optimal Packet Forwarding in Vehicular Ad hoc Networks. Int. J. Comput. Commun. Control 7(5): 865-878 (2012) - [j4]Ali H. Al-Badi, Saqib Ali, Taiseera Al-Balushi:
Ergonomics of usability/accessibility-ready websites: Tools and guidelines. Webology 9(2) (2012) - [c12]Saqib Ali, Maitham H. Al Lawati, Syed J. Naqvi:
Unified Threat Management System Approach for Securing SME's Network Infrastructure. ICEBE 2012: 170-176 - 2011
- [j3]F. Richard Yu, Bo Sun, Vikram Krishnamurthy, Saqib Ali:
Application layer QoS optimization for multimedia transmission over cognitive radio networks. Wirel. Networks 17(2): 371-383 (2011) - [i1]F. Richard Yu, Bo Sun, Vikram Krishnamurthy, Saqib Ali:
QoS Provisioning for Multimedia Transmission in Cognitive Radio Networks. CoRR abs/1104.5534 (2011) - 2010
- [c11]Noura Al Hosni, Saqib Ali, Rafi Ashrafi:
The key success factors to mobile commerce for Arab countries in Middle East. iiWAS 2010: 787-790
2000 – 2009
- 2009
- [j2]Bamidele Adebisi, Saqib Ali, Bahram Honary:
A Hopping Code for MMFSK in a Power-line Channel. J. Commun. 4(6): 429-436 (2009) - [c10]Saqib Ali, Garik Markarian, Erdal Arikan:
Novel Predistortion Algorithm for OFDMA. VTC Spring 2009 - [c9]Saqib Ali, F. Richard Yu:
Cross-layer QoS provisioning for multimedia transmissions in cognitive radio networks. WCNC 2009: 2978-2982 - 2008
- [c8]Torab Torabi, Saqib Ali, Hassan Ali:
A Mobile Business Process Deployment Framework for Device Independence and Context-Aware Environments. ICE-B 2008: 209-216 - 2007
- [c7]Saqib Ali, Torab Torabi, Ben Soh:
Rule component specification for business process deployment. DEXA Workshops 2007: 595-599 - [c6]Hassan Ali, Saqib Ali, Torab Torabi:
Mobile Business Process Deployment in Device Independence & Context-aware Environment. iiWAS 2007: 191-202 - 2006
- [j1]Saqib Ali, Ben Soh, Torab Torabi:
A novel approach toward integration of rules into business processes using an agent-oriented framework. IEEE Trans. Ind. Informatics 2(3): 145-154 (2006) - [c5]Saqib Ali, Torab Torabi, Hassan Ali:
Location Aware Business Process Deployment. ICCSA (4) 2006: 217-225 - [c4]Adil M. Hammadi, Saqib Ali, Fei Liu:
A New Modelling Approach to Enhance Reliability of Transactional Oriented Web-Services. iiWAS 2006: 203-212 - 2005
- [c3]Saqib Ali, Ben Soh, Torab Torabi:
Design and Implementation of a Model for Business Rules Automation. ICITA (1) 2005: 40-45 - [c2]Saqib Ali, Ben Soh, Torab Torabi:
A New Adaptive Business Model for E-Commerce. ICITA (1) 2005: 99-102 - 2002
- [c1]Wasif Latif, Aniq Shahid, Faisal Saud, Saqib Ali, Shoab Ahmed Khan:
Exploring Multiple Levels of Parallelism for Regular and Irregular Algorithms using BOPS'DSP. CATA 2002: 335-338
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint