default search action
Kassem Fawaz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Harrison Rosenberg, Shimaa Ahmed, Guruprasad V. Ramesh, Kassem Fawaz, Ramya Korlakai Vinayak:
Limitations of Face Image Generation. AAAI 2024: 14838-14846 - [c44]Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash:
PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails. ACL (1) 2024: 10960-10976 - [c43]René Walendy, Markus Weber, Jingjie Li, Steffen Becker, Carina Wiesen, Malte Elson, Younghyun Kim, Kassem Fawaz, Nikol Rummel, Christof Paar:
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering. CHI 2024: 831:1-831:20 - [c42]Ashish Hooda, Mihai Christodorescu, Miltiadis Allamanis, Aaron Wilson, Kassem Fawaz, Somesh Jha:
Do Large Code Models Understand Programming Concepts? Counterfactual Analysis for Code Predicates. ICML 2024 - [c41]Jack West, Lea Thiemt, Shimaa Ahmed, Maggie Bartig, Kassem Fawaz, Suman Banerjee:
A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok. SP 2024: 369-387 - [c40]Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz:
Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section. USENIX Security Symposium 2024 - [c39]Jingjie Li, Sunpreet Singh Arora, Kassem Fawaz, Younghyun Kim, Can Liu, Sebastian Meiser, Mohsen Minaei, Maliheh Shirvanian, Kim Wagner:
Exploring the Interplay Between Interaction Experience and Security Perception of Payment Authentication in Virtual Reality. VR Workshops 2024: 1043-1044 - [c38]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles. WACV 2024: 3800-3810 - [c37]Asmit Nayak, Rishabh Khandelwal, Earlence Fernandes, Kassem Fawaz:
Experimental Security Analysis of Sensitive Data Access by Browser Extensions. WWW 2024: 1283-1294 - [i34]Ashish Hooda, Mihai Christodorescu, Miltiadis Allamanis, Aaron Wilson, Kassem Fawaz, Somesh Jha:
Do Large Code Models Understand Programming Concepts? A Black-box Approach. CoRR abs/2402.05980 (2024) - [i33]René Walendy, Markus Weber, Jingjie Li, Steffen Becker, Carina Wiesen, Malte Elson, Younghyun Kim, Kassem Fawaz, Nikol Rummel, Christof Paar:
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering. CoRR abs/2402.15452 (2024) - [i32]Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash:
PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails. CoRR abs/2402.15911 (2024) - [i31]Jack West, Lea Thiemt, Shimaa Ahmed, Maggie Bartig, Kassem Fawaz, Suman Banerjee:
A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok. CoRR abs/2403.19717 (2024) - [i30]Guruprasad V. Ramesh, Harrison Rosenberg, Ashish Hooda, Shimaa Ahmed, Kassem Fawaz:
Synthetic Counterfactual Faces. CoRR abs/2407.13922 (2024) - [i29]Ashish Hooda, Rishabh Khandelwal, Prasad Chalasani, Kassem Fawaz, Somesh Jha:
PolicyLR: A Logic Representation For Privacy Policies. CoRR abs/2408.14830 (2024) - 2023
- [c36]Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash:
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks. CCS 2023: 786-800 - [c35]Jingjie Li, Kaiwen Sun, Brittany Skye Huff, Anna Marie Bierley, Younghyun Kim, Florian Schaub, Kassem Fawaz:
"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit. SP 2023: 2850-2866 - [c34]Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz:
Tubes Among Us: Analog Attack on Automatic Speaker Identification. USENIX Security Symposium 2023: 265-282 - [c33]Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz:
Automated Cookie Notice Analysis and Enforcement. USENIX Security Symposium 2023: 1109-1126 - [c32]Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha:
Fairness Properties of Face Recognition and Obfuscation Systems. USENIX Security Symposium 2023: 7231-7248 - [c31]Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz:
Comparing Privacy Labels of Applications in Android and iOS. WPES@CCS 2023: 61-73 - [i28]Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash:
Investigating Stateful Defenses Against Black-Box Adversarial Examples. CoRR abs/2303.06280 (2023) - [i27]Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz:
The Overview of Privacy Labels and their Compatibility with Privacy Policies. CoRR abs/2303.08213 (2023) - [i26]Jingjie Li, Sunpreet Singh Arora, Kassem Fawaz, Younghyun Kim, Can Liu, Sebastian Meiser, Mohsen Minaei, Maliheh Shirvanian, Kim Wagner:
"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality. CoRR abs/2303.11575 (2023) - [i25]Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz:
Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section. CoRR abs/2306.08111 (2023) - [i24]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks. CoRR abs/2307.16331 (2023) - [i23]Yue Gao, Ilia Shumailov, Kassem Fawaz:
SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks. CoRR abs/2308.11845 (2023) - [i22]Asmit Nayak, Rishabh Khandelwal, Kassem Fawaz:
Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields. CoRR abs/2308.16321 (2023) - [i21]Harrison Rosenberg, Shimaa Ahmed, Guruprasad V. Ramesh, Ramya Korlakai Vinayak, Kassem Fawaz:
Unbiased Face Synthesis With Diffusion Models: Are We There Yet? CoRR abs/2309.07277 (2023) - [i20]David Khachaturov, Yue Gao, Ilia Shumailov, Robert D. Mullins, Ross J. Anderson, Kassem Fawaz:
Human-Producible Adversarial Examples. CoRR abs/2310.00438 (2023) - 2022
- [j18]Ashish Hooda, Matthew Wallace, Kushal Jhunjhunwalla, Earlence Fernandes, Kassem Fawaz:
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(1): 16:1-16:26 (2022) - [j17]Kyuin Lee, Yucheng Yang, Omkar Prabhune, Aishwarya Lekshmi Chithra, Jack West, Kassem Fawaz, Neil Klingensmith, Suman Banerjee, Younghyun Kim:
AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(1): 20:1-20:29 (2022) - [j16]Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz:
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps. Proc. Priv. Enhancing Technol. 2022(3): 373-393 (2022) - [c30]Brian Tang, Dakota Sullivan, Bengisu Cagiltay, Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu:
CONFIDANT: A Privacy Controller for Social Robots. HRI 2022: 205-214 - [c29]Yue Gao, Ilia Shumailov, Kassem Fawaz:
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems. ICML 2022: 7102-7121 - [c28]Yue Gao, Jack W. Stokes, Manoj Ajith Prasad, Andrew T. Marshall, Kassem Fawaz, Emre Kiciman:
I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation. MILCOM 2022: 442-449 - [c27]Yue Gao, Ilia Shumailov, Kassem Fawaz, Nicolas Papernot:
On the Limitations of Stochastic Pre-processing Defenses. NeurIPS 2022 - [c26]Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes:
Experimental Security Analysis of the App Model in Business Collaboration Platforms. USENIX Security Symposium 2022: 2011-2028 - [c25]Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz:
Towards More Robust Keyword Spotting for Voice Assistants. USENIX Security Symposium 2022: 2655-2672 - [i19]Brian Tang, Dakota Sullivan, Bengisu Cagiltay, Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu:
CONFIDANT: A Privacy Controller for Social Robots. CoRR abs/2201.02712 (2022) - [i18]Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz:
Pipe Overflow: Smashing Voice Authentication for Fun and Profit. CoRR abs/2202.02751 (2022) - [i17]Harrison Rosenberg, Robi Bhattacharjee, Kassem Fawaz, Somesh Jha:
An Exploration of Multicalibration Uniform Convergence Bounds. CoRR abs/2202.04530 (2022) - [i16]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
Towards Adversarially Robust Deepfake Detection: An Ensemble Approach. CoRR abs/2202.05687 (2022) - [i15]Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes:
Analyzing the Security of the Business Collaboration Platform App Model. CoRR abs/2203.04427 (2022) - [i14]Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz:
CookieEnforcer: Automated Cookie Notice Analysis and Enforcement. CoRR abs/2204.04221 (2022) - [i13]Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz:
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps. CoRR abs/2204.06128 (2022) - [i12]Yue Gao, Ilia Shumailov, Kassem Fawaz, Nicolas Papernot:
On the Limitations of Stochastic Pre-processing Defenses. CoRR abs/2206.09491 (2022) - [i11]Ashish Hooda, Matthew Wallace, Kushal Jhunjhunwalla, Earlence Fernandes, Kassem Fawaz:
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks. CoRR abs/2212.08738 (2022) - 2021
- [j15]Varun Chandrasekaran, Chuhan Gao, Brian Tang, Kassem Fawaz, Somesh Jha, Suman Banerjee:
Face-Off: Adversarial Face Obfuscation. Proc. Priv. Enhancing Technol. 2021(2): 369-390 (2021) - [j14]Suman Banerjee, Remzi H. Arpaci-Dusseau, Shenghong Dai, Kassem Fawaz, Mohit Gupta, Kangwook Lee, Shivaram Venkataraman:
The Roaming Edge and its Applications. GetMobile Mob. Comput. Commun. 25(4): 5-11 (2021) - [c24]Yucheng Yang, Kyuin Lee, Younghyun Kim, Kassem Fawaz:
PEDRO: Secure Pedestrian Mobility Verification in V2P Communication using Commercial Off-the-shelf Mobile Devices. CPSIOTSEC@CCS 2021: 41-46 - [c23]Varun Chandrasekaran, Suman Banerjee, Bilge Mutlu, Kassem Fawaz:
PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Smart Speakers. SOUPS @ USENIX Security Symposium 2021: 535-552 - [c22]Rishabh Khandelwal, Thomas Linden, Hamza Harkous, Kassem Fawaz:
PriSEC: A Privacy Settings Enforcement Controller. USENIX Security Symposium 2021: 465-482 - [c21]Jingjie Li, Amrita Roy Chowdhury, Kassem Fawaz, Younghyun Kim:
Kalεido: Real-Time Privacy Control for Eye-Tracking Systems. USENIX Security Symposium 2021: 1793-1810 - [i10]Yue Gao, Kassem Fawaz:
Scale-Adv: A Joint Attack on Image-Scaling and Machine Learning Classifiers. CoRR abs/2104.08690 (2021) - [i9]Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha:
Fairness Properties of Face Recognition and Obfuscation Systems. CoRR abs/2108.02707 (2021) - 2020
- [j13]Thomas Linden, Rishabh Khandelwal, Hamza Harkous, Kassem Fawaz:
The Privacy Policy Landscape After the GDPR. Proc. Priv. Enhancing Technol. 2020(1): 47-64 (2020) - [c20]Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan:
Preech: A System for Privacy-Preserving Speech Transcription. USENIX Security Symposium 2020: 2703-2720 - [i8]Yue Gao, Harrison Rosenberg, Kassem Fawaz, Somesh Jha, Justin Hsu:
Analyzing Accuracy Loss in Randomized Smoothing Defenses. CoRR abs/2003.01595 (2020) - [i7]Chuhan Gao, Varun Chandrasekaran, Kassem Fawaz, Somesh Jha:
Face-Off: Adversarial Face Obfuscation. CoRR abs/2003.08861 (2020)
2010 – 2019
- 2019
- [j12]Kassem Fawaz, Kang G. Shin:
Security and Privacy in the Internet of Things. Computer 52(4): 40-49 (2019) - [j11]Chuhan Gao, Kassem Fawaz, Sanjib Sur, Suman Banerjee:
Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries. Proc. Priv. Enhancing Technol. 2019(2): 146-165 (2019) - [c19]Jingjie Li, Kassem Fawaz, Younghyun Kim:
Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication. CCS 2019: 1201-1213 - [c18]Kassem Fawaz, Thomas Linden, Hamza Harkous:
Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice. COMSNETS 2019: 118-124 - [i6]Varun Chandrasekaran, Brian Tang, Varsha Pendyala, Kassem Fawaz, Somesh Jha, Xi Wu:
Enhancing ML Robustness Using Physical-World Constraints. CoRR abs/1905.10900 (2019) - [i5]Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan:
Prεεch: A System for Privacy-Preserving Speech Transcription. CoRR abs/1909.04198 (2019) - 2018
- [j10]Huan Feng, Kassem Fawaz, Kang G. Shin:
Wearable Technology brings Security to Alexa and Siri. GetMobile Mob. Comput. Commun. 22(1): 35-38 (2018) - [j9]Rola Naja, Nadia Mouawad, Ali J. Ghandour, Kassem Fawaz:
Speed Trap Optimal Patrolling: STOP Playing Stackelberg Security Games. Wirel. Pers. Commun. 98(4): 3563-3582 (2018) - [c17]Chuhan Gao, Varun Chandrasekaran, Kassem Fawaz, Suman Banerjee:
Traversing the Quagmire that is Privacy in your Smart Home. IoT S&P@SIGCOMM 2018: 22-28 - [c16]Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer:
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. USENIX Security Symposium 2018: 531-548 - [i4]Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer:
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. CoRR abs/1802.02561 (2018) - [i3]Thomas Linden, Hamza Harkous, Kassem Fawaz:
The Privacy Policy Landscape After the GDPR. CoRR abs/1809.08396 (2018) - [i2]Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu, Suman Banerjee:
Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study. CoRR abs/1812.00263 (2018) - 2017
- [b1]Kassem Fawaz:
Location Privacy Protection in the Mobile Era and Beyond. University of Michigan, USA, 2017 - [c15]Huan Feng, Kassem Fawaz, Kang G. Shin:
Continuous Authentication for Voice Assistants. MobiCom 2017: 343-355 - [i1]Huan Feng, Kassem Fawaz, Kang G. Shin:
Continuous Authentication for Voice Assistants. CoRR abs/1701.04507 (2017) - 2016
- [j8]Kassem Fawaz, Kyu-Han Kim, Kang G. Shin:
Privacy vs. Reward in Indoor Location-Based Services. Proc. Priv. Enhancing Technol. 2016(4): 102-122 (2016) - [c14]Krishna C. Garikipati, Kassem Fawaz, Kang G. Shin:
RT-OPEX: Flexible Scheduling for Cloud-RAN Processing. CoNEXT 2016: 267-280 - [c13]Hamza Harkous, Kassem Fawaz, Kang G. Shin, Karl Aberer:
PriBots: Conversational Privacy with Chatbots. WSF@SOUPS 2016 - [c12]Kassem Fawaz, Kyu-Han Kim, Kang G. Shin:
Protecting Privacy of BLE Device Users. USENIX Security Symposium 2016: 1205-1221 - 2015
- [j7]Kassem Fawaz, Fadi A. Zaraket, Wes Masri, Hamza Harkous:
PBCOV: a property-based coverage criterion. Softw. Qual. J. 23(1): 171-202 (2015) - [j6]Kassem Fawaz, Abdalla Artail, Rasha Al-Khansa, Hassan Artail, Haïdar Safa:
Replication enabled distributed cache invalidation method: replication enabled distributed cache management system for wireless mobile networks. Wirel. Commun. Mob. Comput. 15(13): 1711-1728 (2015) - [c11]Kassem Fawaz, Huan Feng, Kang G. Shin:
Anatomization and Protection of Mobile Apps' Location Privacy Threats. USENIX Security Symposium 2015: 753-768 - [c10]Huan Feng, Kassem Fawaz, Kang G. Shin:
LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors. USENIX Security Symposium 2015: 769-783 - 2014
- [c9]Kassem Fawaz, Kang G. Shin:
Location Privacy Protection for Smartphone Users. CCS 2014: 239-250 - 2013
- [j5]Ali J. Ghandour, Kassem Fawaz, Hassan Artail, Marco Di Felice, Luciano Bononi:
Improving vehicular safety message delivery through the implementation of a cognitive vehicular network. Ad Hoc Networks 11(8): 2408-2422 (2013) - [j4]Kassem Fawaz, Hassan Artail:
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks. IEEE Trans. Mob. Comput. 12(4): 680-693 (2013) - 2012
- [j3]Hassan Artail, Kassem Fawaz, Ali J. Ghandour:
A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices. IEEE Trans. Serv. Comput. 5(1): 99-115 (2012) - [c8]Kassem Fawaz, Hassan Artail:
A two-layer cache replication scheme for dense mobile ad hoc networks. GLOBECOM 2012: 464-469 - [c7]Kassem Fawaz, Noor Abbani, Hassan Artail:
A privacy-preserving cache management system for MANETs. ICT 2012: 1-6 - 2011
- [c6]Mehiar Dabbagh, Ali J. Ghandour, Kassem Fawaz, Wassim El-Hajj, Hazem M. Hajj:
Slow port scanning detection. IAS 2011: 228-233 - [c5]Ali J. Ghandour, Kassem Fawaz, Hassan Artail:
Data delivery guarantees in congested Vehicular ad hoc networks using cognitive networks. IWCMC 2011: 871-876 - [c4]Ali J. Ghandour, Kassem Fawaz, Hassan Artail, Ramsey F. Hamade:
Extending the DSRC's control channel using cognitive networking concepts and Fuzzy Logic. PIMRC 2011: 799-803 - [c3]Ali J. Ghandour, Kassem Fawaz, Hassan Artail:
Fuzzy cognitive Vehicular Ad hoc Networks. WiMob 2011: 9-16 - 2010
- [c2]Kassem Fawaz, Ali J. Ghandour, Majd Olleik, Hassan Artail:
Improving reliability of safety applications in vehicle ad hoc networks through the implementation of a cognitive network. ICT 2010: 798-805
2000 – 2009
- 2009
- [j2]Hassan Artail, Rula Antoun, Kassem Fawaz:
CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces. Ad Hoc Networks 7(6): 1064-1081 (2009) - [c1]Wei Wang, Thomas Jost, Christian Mensing, Armin Dammann, Kassem Fawaz:
Indoor Propagation Effects on ToA Bias for Joint GNSS and Terrestrial Radio Based Localization. VTC Spring 2009 - 2008
- [j1]Hassan Artail, Kassem Fawaz:
A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations. Data Knowl. Eng. 66(2): 326-337 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint