default search action
Linna Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Jianguo Zhao, Chunyu Yang, Weinan Gao, Linna Zhou, Xiaomin Liu:
Adaptive Optimal Output Regulation of Interconnected Singularly Perturbed Systems with Application to Power Systems. IEEE CAA J. Autom. Sinica 11(3): 595-607 (2024) - [j54]Yaotian Yang, Yu Yang, Linna Zhou, Jixin Zou:
A lightweight multi-task learning network based on key area guidance for counterfeit detection. Signal Image Video Process. 18(5): 4675-4685 (2024) - [j53]Yao Xu, Linna Zhou, Jianguo Zhao, Lei Ma, Chunyu Yang:
Direct Data-Driven Optimal Set-Point Tracking Control of Linear Discrete-Time Systems. IEEE Trans. Circuits Syst. II Express Briefs 71(8): 3795-3799 (2024) - [j52]Xiaomin Liu, Gonghe Li, Linna Zhou, Chunyu Yang, Xinkai Chen:
Reinforcement Learning Reduced H∞ Output Tracking Control of Nonlinear Two-Time-Scale Industrial Systems. IEEE Trans. Ind. Informatics 20(2): 2465-2476 (2024) - [j51]Xiaomin Liu, Mengjun Yu, Chunyu Yang, Linna Zhou, Haoyu Wang, Huaichun Zhou:
Value Distribution DDPG With Dual-Prioritized Experience Replay for Coordinated Control of Coal-Fired Power Generation Systems. IEEE Trans. Ind. Informatics 20(6): 8181-8194 (2024) - [j50]Haoqin Tu, Zhongliang Yang, Jinshuai Yang, Linna Zhou, Yongfeng Huang:
FET-LM: Flow-Enhanced Variational Autoencoder for Topic-Guided Language Modeling. IEEE Trans. Neural Networks Learn. Syst. 35(8): 11180-11193 (2024) - 2023
- [j49]Chunpeng Wang, Qinghua Zhang, Zhiqiu Xia, Linna Zhou, Ziqi Wei, Hao Zhang, Bin Ma:
Multi-dimensional hypercomplex continuous orthogonal moments for light-field images. Expert Syst. Appl. 217: 119553 (2023) - [j48]Bin Ma, Kaixin Du, Jian Xu, Chunpeng Wang, Jian Li, Linna Zhou:
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition. J. Inf. Secur. Appl. 78: 103605 (2023) - [j47]Linna Zhou, Zhigao Lu, Weike You, Xiaofei Fang:
Reversible data hiding using a transformer predictor and an adaptive embedding strategy. Frontiers Inf. Technol. Electron. Eng. 24(8): 1143-1155 (2023) - [j46]Yao Xu, Chunyu Yang, Linna Zhou, Lei Ma, Song Zhu:
Adaptive event-triggered synchronization of neural networks under stochastic cyber-attacks with application to Chua's circuit. Neural Networks 166: 11-21 (2023) - [j45]Ying Zhang, Lei Ma, Chunyu Yang, Linna Zhou, Guoqing Wang, Wei Dai:
Formation Control for Multiple Quadrotors Under DoS Attacks via Singular Perturbation. IEEE Trans. Aerosp. Electron. Syst. 59(4): 4753-4762 (2023) - [j44]Jianguo Zhao, Chunyu Yang, Weinan Gao, Linna Zhou:
Reinforcement Learning and Optimal Control of PMSM Speed Servo System. IEEE Trans. Ind. Electron. 70(8): 8305-8313 (2023) - [j43]Xiaomin Liu, Chen Zhu, Chunyu Yang, Linna Zhou:
FSFM: A Feature Square Tower Fusion Module for Multimodal Object Detection. IEEE Trans. Instrum. Meas. 72: 1-11 (2023) - [j42]Hao Wang, Chunyu Yang, Xiaomin Liu, Linna Zhou:
Neural-Network-Based Adaptive Control of Uncertain MIMO Singularly Perturbed Systems With Full-State Constraints. IEEE Trans. Neural Networks Learn. Syst. 34(7): 3764-3774 (2023) - [c39]Jianguo Zhao, Chunyu Yang, Linna Zhou, Weinan Gao:
Adaptive Dynamic Programming and Decentralized Optimal Output Regulation of Two-Time-Scale Interconnected Systems. ICCAIS 2023: 278-283 - [c38]Qingran Lin, Xiang Li, Beilin Chu, Renying Wang, Xianhao Chen, Yuzhe Mao, Zhen Yang, Linna Zhou, Weike You:
SHIELD: A Specialized Dataset for Hybrid Blind Forensics of World Leaders. ICDF2C (2) 2023: 79-91 - [c37]Yuzhe Mao, Weike You, Linna Zhou, Zhigao Lu:
Fixing Domain Bias for Generalized Deepfake Detection. ICME 2023: 2225-2230 - [c36]Weichuan Xing, Weike You, Linna Zhou, Zhongliang Yang:
Efficient Chinese Relation Extraction with Multi-entity Dependency Tree Pruning and Path-Fusion. ICONIP (12) 2023: 585-598 - [c35]Yongjin Xian, Ruihe Ma, Pengyu Liu, Linna Zhou:
Image Encryption Scheme Based on New 1D Chaotic System and Blockchain. IWDW 2023: 3-17 - [c34]Zhuang Wang, Jinyi Xia, Kaibo Huang, Shengnan Guo, Chenwei Huang, Zhongliang Yang, Linna Zhou:
DNA Steganalysis Based on Multi-dimensional Feature Extraction and Fusion. IWDW 2023: 277-291 - [c33]Xuan Xu, Shengnan Guo, Zhengyang Fang, Pengcheng Zhou, Zhongliang Yang, Linna Zhou:
VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice. IWDW 2023: 292-303 - [c32]Shengnan Guo, Xuekai Chen, Zhuang Wang, Zhongliang Yang, Linna Zhou:
Linguistic Steganalysis Based on Clustering and Ensemble Learning in Imbalanced Scenario. IWDW 2023: 304-318 - [c31]Xianhao Chen, Kuan Chen, Yuzhe Mao, Linna Zhou, Weike You:
Facial Parameter Splicing: A Novel Approach to Efficient Talking Face Generation. MMAsia 2023: 91:1-91:5 - [i1]Beilin Chu, Xuan Xu, Weike You, Linna Zhou:
Unearthing Common Inconsistency for Generalisable Deepfake Detection. CoRR abs/2311.11549 (2023) - 2022
- [j41]Shanshan Yang, Yu Yang, Linna Zhou, Rui Zhan, Yufei Man:
Intermediate-Layer Transferable Adversarial Attack With DNN Attention. IEEE Access 10: 95451-95461 (2022) - [j40]Yifang Yan, Chunyu Yang, Lei Ma, Linna Zhou:
Asynchronous event-triggered H... control problem for two-time-scale systems based on double-rate sampled-data. J. Frankl. Inst. 359(16): 8848-8868 (2022) - [j39]Wei Dai, Yanshuang Ao, Linna Zhou, Ping Zhou, Xuesong Wang:
Incremental learning paradigm with privileged information for random vector functional-link networks: IRVFL+. Neural Comput. Appl. 34(9): 6847-6859 (2022) - [j38]Renying Wang, Zhen Yang, Weike You, Linna Zhou, Beilin Chu:
Fake Face Images Detection and Identification of Celebrities Based on Semantic Segmentation. IEEE Signal Process. Lett. 29: 2018-2022 (2022) - [j37]Beilin Chu, Weike You, Zhen Yang, Linna Zhou, Renying Wang:
Protecting World Leader Using Facial Speaking Pattern Against Deepfakes. IEEE Signal Process. Lett. 29: 2078-2082 (2022) - [j36]Jianguo Zhao, Chunyu Yang, Weinan Gao, Linna Zhou:
Reinforcement Learning and Optimal Setpoint Tracking Control of Linear Systems With External Disturbances. IEEE Trans. Ind. Informatics 18(11): 7770-7779 (2022) - [j35]Lei Ma, Hongyu Liu, Linna Zhou, Chunyu Yang, Wei Dai, Guoqing Wang:
Security Control for Multi-Time-Scale CPSs Under DoS Attacks: An Improved Dynamic Event-Triggered Mechanism. IEEE Trans. Netw. Sci. Eng. 9(3): 1813-1826 (2022) - [c30]Ying Zhang, Lei Ma, Chunyu Yang, Linna Zhou:
Formation Control for Quadrotor Swarms with Deception Attacks Via Singular Perturbation. ROBIO 2022: 189-194 - 2021
- [j34]Xiaomin Liu, Chunyu Yang, Zhiyuan Che, Linna Zhou:
A Novel Equivalent Input Disturbance-Based Adaptive Sliding Mode Control for Singularly Perturbed Systems. IEEE Access 9: 12463-12472 (2021) - [j33]Yifang Yan, Chunyu Yang, Xiaoping Ma, Linna Zhou:
Event-triggered H ∞ filtering for singularly perturbed systems with external disturbance. Int. J. Syst. Sci. 52(2): 407-421 (2021) - [j32]Lei Ma, Ying Zhang, Chunyu Yang, Linna Zhou:
Security control for two-time-scale cyber physical systems with multiple transmission channels under DoS attacks: The input-to-state stability. J. Frankl. Inst. 358(12): 6309-6325 (2021) - [j31]Xin Tang, Linna Zhou, Bingwei Hu, Haowen Wu:
Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack. Secur. Commun. Networks 2021: 6686281:1-6686281:15 (2021) - [j30]Ying Zhang, Lei Ma, Guoqing Wang, Chunyu Yang, Linna Zhou, Wei Dai:
Observer-Based Control for the Two-Time-Scale Cyber-Physical Systems: The Dual-Scale DoS Attacks Case. IEEE Trans. Netw. Sci. Eng. 8(4): 3369-3379 (2021) - [c29]Xin Tang, Linna Zhou, Guang Tang, Yixuan Cheng:
Reversible Data Hiding Based on Improved Block Selection Strategy and Pixel Value Ordering. DASC/PiCom/CBDCom/CyberSciTech 2021: 619-627 - [c28]Xin Tang, Linna Zhou, Guang Tang, Yuchen Wen, Yixuan Cheng:
Improved Fluctuation Derived Block Selection Strategy in Pixel Value Ordering Based Reversible Data Hiding. IWDW 2021: 163-177 - 2020
- [j29]Xin Tang, Linna Zhou, Dan Liu, Weijie Shan, Yi Zhang:
Border following-based reversible watermarking algorithm for images with resistance to histogram overflowing. Int. J. Distributed Sens. Networks 16(5) (2020) - [j28]Linna Zhou, Jianguo Zhao, Lei Ma, Chunyu Yang:
Decentralized composite suboptimal control for a class of two-time-scale interconnected networks with unknown slow dynamics. Neurocomputing 382: 71-79 (2020) - [c27]Xin Tang, Dan Liu, Linna Zhou, Yi Zhang:
A High Capacity Reversible Watermarking Algorithm Based on Block-Level Prediction Error Histogram Shifting. AIPR 2020: 133-139 - [c26]Linna Zhou, Weijie Shan, Xin Tang, Bingwei Hu, Xiaomei Liu:
Reversible Data Hiding Algorithm with High Imperceptibility Based on Histogram Shifting. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 628-633 - [c25]Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xinyi Lü:
Reversible data hiding based on improved rhombus predictor and prediction error expansion. TrustCom 2020: 13-21
2010 – 2019
- 2019
- [j27]Xin Tang, Yongfeng Huang, Chin-Chen Chang, Linna Zhou:
Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System. IEEE Access 7: 33009-33023 (2019) - [j26]Chunyu Yang, Zhiyuan Che, Linna Zhou:
Integral Sliding Mode Control for Singularly Perturbed Systems with Mismatched Disturbances. Circuits Syst. Signal Process. 38(4): 1561-1582 (2019) - [j25]Linna Zhou, Leping Shen, Chunyu Yang:
Disturbance-observer based sliding mode control for fuzzy singularly perturbed systems. J. Intell. Fuzzy Syst. 37(1): 1055-1064 (2019) - [j24]Chunyu Yang, Zhiyuan Che, Jun Fu, Linna Zhou:
Passivity-Based Integral Sliding Mode Control and $\varepsilon$ - Bound Estimation for Uncertain Singularly Perturbed Systems With Disturbances. IEEE Trans. Circuits Syst. II Express Briefs 66-II(2): 452-456 (2019) - [c24]Linna Zhou, Derui Liao:
Study of Chinese Text Steganography using Typos. APSIPA 2019: 1351-1357 - [c23]Linna Zhou, Derui Liao:
Information Hiding Based on Typing Errors. IWDW 2019: 221-230 - 2018
- [j23]Chunyu Yang, Tingting Ma, Zhiyuan Che, Linna Zhou:
An Adaptive-Gain Sliding Mode Observer for Sensorless Control of Permanent Magnet Linear Synchronous Motors. IEEE Access 6: 3469-3478 (2018) - [j22]Linna Zhou, Zhiyuan Che, Chunyu Yang:
Disturbance Observer-Based Integral Sliding Mode Control for Singularly Perturbed Systems With Mismatched Disturbances. IEEE Access 6: 9854-9861 (2018) - [j21]Chunyu Yang, Yiming Xu, Linna Zhou, Yongzheng Sun:
Model-Free Composite Control of Flexible Manipulators Based on Adaptive Dynamic Programming. Complex. 2018: 9720309:1-9720309:9 (2018) - [j20]Junfeng Xu, Linna Zhou:
A dynamic online protection framework for Android applications. Comput. Syst. Sci. Eng. 33(2) (2018) - [j19]Junfeng Xu, Linna Zhou:
A Dynamic Online Protection Framework for Android Applications. Comput. Syst. Sci. Eng. 33(5): 361-368 (2018) - [j18]Xiaomin Liu, Chunyu Yang, Linna Zhou:
Global asymptotic stability analysis of two-time-scale competitive neural networks with time-varying delays. Neurocomputing 273: 357-366 (2018) - [j17]Yifang Yan, Chunyu Yang, Xiaoping Ma, Linna Zhou:
Sampled-data H∞ filtering for Markovian jump singularly perturbed systems with time-varying delay and missing measurements. Int. J. Syst. Sci. 49(3): 464-478 (2018) - [j16]Linna Zhou, Congcong Wang, Qianjin Wang, Chunyu Yang:
Anti-windup control for nonlinear singularly perturbed switched systems with actuator saturation. Int. J. Syst. Sci. 49(10): 2187-2201 (2018) - [c22]Linkai Huang, Linna Zhou, Yunbiao Guo:
Detecting Technology of Network Storage Covert Channel Based on OPTICS Algorithm. APSIPA 2018: 891-896 - [c21]Xin Tang, Linna Zhou, Yongfeng Huang, Chin-Chen Chang:
Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption. TrustCom/BigDataSE 2018: 897-904 - 2017
- [j15]Linna Zhou, Yuchen Han, Chunyu Yang:
Finite-time control of linear systems subject to time-varying disturbances. IMA J. Math. Control. Inf. 34(3): 765-777 (2017) - [j14]Yifang Yan, Chunyu Yang, Xiaoping Ma, Jun Fu, Linna Zhou:
H∞ sampled-data control for T-S fuzzy singularly perturbed systems with actuator saturation. J. Intell. Fuzzy Syst. 33(2): 779-790 (2017) - [j13]Han-Zhou Wu, Yun-Qing Shi, Hong-Xia Wang, Lin-Na Zhou:
Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification. IEEE Trans. Circuits Syst. Video Technol. 27(8): 1620-1631 (2017) - [c20]Yifang Yan, Xiaoping Ma, Chunyu Yang, Jinna Li, Linna Zhou:
Sampled-data control for singularly perturbed systems with actuator saturation. ACC 2017: 5756-5761 - [c19]Yu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou:
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization. IWDW 2017: 163-176 - [c18]Kun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou:
Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. IWDW 2017: 202-216 - [c17]Binyang Li, Kaiming Zhou, Wei Gao, Xu Han, Linna Zhou:
Attention-based LSTM-CNNs for uncertainty identification on Chinese social media texts. SPAC 2017: 609-614 - 2016
- [j12]Chunyu Yang, Linna Zhou:
H∞ Control and ε-Bound Estimation of Discrete-Time Singularly Perturbed Systems. Circuits Syst. Signal Process. 35(7): 2640-2654 (2016) - [j11]Qing Qian, Hong-Xia Wang, Yi Hu, Lin-Na Zhou, Jin-Feng Li:
A dual fragile watermarking scheme for speech authentication. Multim. Tools Appl. 75(21): 13431-13450 (2016) - [c16]Xiaoping Ma, Jian Cheng, Chunyu Yang, Qianjin Wang, Yi-Nan Guo, Linna Zhou:
Controller design for T-S fuzzy singularly perturbed switched systems. FUZZ-IEEE 2016: 1159-1166 - 2015
- [c15]Dongmei Niu, Hongxia Wang, Minquan Cheng, Linna Zhou:
Self-Embedding Watermarking Scheme Based on MDS Codes. IWDW 2015: 250-258 - 2014
- [j10]YunJie Wu, Yu Deng, Haibin Duan, Linna Zhou:
Dual tree complex wavelet transform approach to copy-rotate-move forgery detection. Sci. China Inf. Sci. 57(1): 1-12 (2014) - [c14]Yan-Li Huang, Shao-Zhang Liu, Jian-Cheng Zou, Lin-Na Zhou:
Forensics of image tampering based on the consistency of illuminant chromaticity. APSIPA 2014: 1-4 - [c13]Haiyan Fu, Xiangwei Kong, Yanqing Guo, Xingang You, Linna Zhou:
Binary Code Reranking Method Based on Bit Importance. ICPR 2014: 2679-2684 - [c12]Hanzhou Wu, Hongxia Wang, Yi Hu, Linna Zhou:
Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding. IWDW 2014: 455-469 - 2013
- [j9]Hongxia Wang, Bangxu Yin, Linna Zhou:
Geometrically Invariant Image Watermarking using Connected Objects and Gravity Centers. KSII Trans. Internet Inf. Syst. 7(11): 2893-2912 (2013) - [c11]Hongxia Wang, Linna Zhou, Wei Zhang, Shuang Liu:
Watermarking-Based Perceptual Hashing Search Over Encrypted Speech. IWDW 2013: 423-434 - 2012
- [c10]Fusuijing Cheng, Chenghui Yan, Yongfeng Huang, Linna Zhou:
Algorithm of identifying opinion leaders in BBS. CCIS 2012: 1149-1152 - 2011
- [j8]Jiafa Mao, Ru Zhang, Xinxin Niu, Yixian Yang, Linna Zhou:
Research of Spatial Domain Image Digital Watermarking Payload. EURASIP J. Inf. Secur. 2011 (2011) - [c9]Lin-Na Zhou, Yunbiao Guo, Xingang You:
Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor. IWDW 2011: 257-267 - 2010
- [j7]Lin-Na Zhou, Chunyu Yang, Qingling Zhang:
Observers for descriptor systems with slope-restricted nonlinearities. Int. J. Autom. Comput. 7(4): 472-478 (2010)
2000 – 2009
- 2009
- [c8]Minhao Liu, Yunbiao Guo, Linna Zhou:
Text Steganography Based on Online Chat. IIH-MSP 2009: 807-810 - 2008
- [j6]Chunyu Yang, Xin Jing, Qingling Zhang, Lin-Na Zhou:
Practical stability analysis and synthesis of linear descriptor systems with disturbances. Int. J. Autom. Comput. 5(2): 138-144 (2008) - [j5]Chunyu Yang, Qingling Zhang, Linna Zhou:
Strongly absolute stability problem of descriptor systems: Circle criterion. J. Frankl. Inst. 345(5): 437-451 (2008) - 2007
- [j4]Chunyu Yang, Qingling Zhang, Linna Zhou:
Strongly Absolute Stability Problem of Descriptor Systems. Informatica 18(2): 305-320 (2007) - [j3]Chunyu Yang, Qingling Zhang, Yanping Lin, Linna Zhou:
Positive Realness and Absolute Stability Problem of Descriptor Systems. IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(5): 1142-1149 (2007) - [c7]Linna Zhou, Dongming Wang, Yunbiao Guo, Jingfei Zhang:
Blur Detection of Digital Forgery Using Mathematical Morphology. KES-AMSTA 2007: 990-998 - 2006
- [j2]Chunyu Yang, Qingling Zhang, Yanping Lin, Linna Zhou:
Practical stability of closed-loop descriptor systems. Int. J. Syst. Sci. 37(14): 1059-1067 (2006) - [j1]Chunyu Yang, Qingling Zhang, Linna Zhou:
Practical stability of descriptor systems with time delays in terms of two measurements. J. Frankl. Inst. 343(6): 635-646 (2006) - [c6]Linna Zhou, Qingling Zhang, Chunyu Yang:
Practical Stability Analysis and Synthesis of a Class of Uncertain T-S Fuzzy Systems. FSKD 2006: 11-20 - [c5]Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li:
A New Watermarking Protocol of Copyright Protection. IIH-MSP 2006: 83-88 - [c4]Cui-Qing Liu, Xijian Ping, Tao Zhang, Linna Zhou, Yun-He Wang:
A Research on Steganography Method Based on Error-Correcting Codes. IIH-MSP 2006: 377-380 - [c3]Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, Xiamu Niu:
Focus on the Generalized Information Hiding Technology. IIH-MSP 2006: 605-608 - [c2]Linna Zhou, Cui-Qing Liu, Xijian Ping, Tao Zhang, Yun-He Wang:
Information Hiding Method in Digital Audio Signal Based on Perfect Codes. IIH-MSP 2006: 609-612 - 2005
- [c1]Yunbiao Guo, Daimao Lin, Xiamu Niu, Lan Hu, Linna Zhou:
A Secure Steganographic Scheme in Binary Image. KES (3) 2005: 1093-1100
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint