default search action
Donghui Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Hui Wang, Zhenyu Yang, Run-Ran Liu, Donghui Hu, Ming Li:
Evaluate Node Importance by Decomposing Network with a Recursive Percolation Process. Adv. Complex Syst. 27(1&2): 2450002:1-2450002:16 (2024) - [j55]Xiangyu Cheng, Yaofei Wang, Chang Liu, Donghui Hu, Zhaopin Su:
HiFi-GANw: Watermarked Speech Synthesis via Fine-Tuning of HiFi-GAN. IEEE Signal Process. Lett. 31: 2440-2444 (2024) - [j54]Qing Wang, Donghui Hu, Meng Li, Guomin Yang:
Secure and Flexible Wildcard Queries. IEEE Trans. Inf. Forensics Secur. 19: 7374-7388 (2024) - [j53]Chen Gu, Xuande Cui, Xiaoling Zhu, Donghui Hu:
FL2DP: Privacy-Preserving Federated Learning Via Differential Privacy for Artificial IoT. IEEE Trans. Ind. Informatics 20(4): 5100-5111 (2024) - [j52]Chen Gu, Xiunian Weng, Donghui Hu:
A Decision Theoretic Framework for Message Prioritization via Machine Learning Algorithm in Vehicular Networks. IEEE Trans. Veh. Technol. 73(6): 7630-7643 (2024) - [c39]Yinyin Peng, Donghui Hu, Gang Pei, Yaofei Wang:
Image Steganography with Deep Orthogonal Fusion of Multi-Scale Channel Attention. ICASSP 2024: 4850-4854 - [c38]Yinyin Peng, Yaofei Wang, Donghui Hu, Kejiang Chen, Xianjin Rong, Weiming Zhang:
LDStega: Practical and Robust Generative Image Steganography based on Latent Diffusion Models. ACM Multimedia 2024: 3001-3009 - 2023
- [j51]Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Mamoun Alazab, Donghui Hu:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 225-241 (2023) - [j50]Donghui Hu, Qing Wang, Song Yan, Xiaojun Liu, Meng Li, Shuli Zheng:
Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing. ACM Trans. Database Syst. 48(2): 5:1-5:25 (2023) - [j49]Chen Gu, Xuande Cui, Meng Li, Donghui Hu:
An Efficient and Privacy-Preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks. IEEE Trans. Veh. Technol. 72(6): 7900-7913 (2023) - [c37]Yinyin Peng, Donghui Hu, Yaofei Wang, Kejiang Chen, Gang Pei, Weiming Zhang:
StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model. ACM Multimedia 2023: 7143-7151 - 2022
- [j48]Hui Wang, Xiaowei Zhang, Ming Li, Donghui Hu:
SRRS: A blockchain fast propagation protocol based on non-Markovian process. Comput. Networks 219: 109435 (2022) - [j47]Dadi Meng, Lijia Huang, Xiaolan Qiu, Guangzuo Li, Yuxin Hu, Bing Han, Donghui Hu:
A Novel Approach to Processing Very-High-Resolution Spaceborne SAR Data With Severe Spatial Dependence. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 7472-7482 (2022) - [j46]Meng Li, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1133-1148 (2022) - [c36]Hui Wang, Wei Xiao Zhang, Yu Zhen Yang, Lan Yan Hu, Donghui Hu:
MC Sharding: An Efficient Blockchain Sharding Based on Minimum Cut. ICBICC 2022: 10:1-10:4 - [c35]Chen Gu, Xuande Cui, Donghui Hu:
An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks. WASA (1) 2022: 3-14 - [i1]Donghui Hu, Yu Zhang, Cong Yu, Jian Wang, Yaofei Wang:
Image Steganography based on Style Transfer. CoRR abs/2203.04500 (2022) - 2021
- [j45]Donghui Hu, Yifan Li, Lixuan Pan, Meng Li, Shuli Zheng:
A blockchain-based trading system for big data. Comput. Networks 191: 107994 (2021) - [j44]Meng Li, Chhagan Lal, Mauro Conti, Donghui Hu:
LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Gener. Comput. Syst. 115: 406-420 (2021) - [j43]Yuqi Fan, Zhifeng Jin, Guangming Shen, Donghui Hu, Lei Shi, Xiaohui Yuan:
Three-stage Stackelberg game based edge computing resource management for mobile blockchain. Peer-to-Peer Netw. Appl. 14(3): 1431-1445 (2021) - [j42]Cong Yu, Donghui Hu, Shuli Zheng, Wenjie Jiang, Meng Li, Zhong-Qiu Zhao:
An improved steganography without embedding based on attention GAN. Peer-to-Peer Netw. Appl. 14(3): 1446-1457 (2021) - [j41]Donghui Hu, Chunya Hu, Yuqi Fan, Xintao Wu:
oGBAC - A Group Based Access Control Framework for Information Sharing in Online Social Networks. IEEE Trans. Dependable Secur. Comput. 18(1): 100-116 (2021) - [j40]Shuli Zheng, Yuzhao Wang, Donghui Hu:
Lossless Data Hiding Based on Homomorphic Cryptosystem. IEEE Trans. Dependable Secur. Comput. 18(2): 692-705 (2021) - [c34]Song Yan, Shuli Zheng, Baohong Ling, Donghui Hu:
Lossless Database Watermarking Based on Order-preserving Encryption. ACM TUR-C 2021: 216-223 - 2020
- [j39]Yuqi Fan, Bing Yang, Donghui Hu, Xiaohui Yuan, Xiong Xu:
Social- and Content-Aware Prediction for Video Content Delivery. IEEE Access 8: 29219-29227 (2020) - [j38]Hui Guo, Shuguang Huang, Cheng Huang, Min Zhang, Zulie Pan, Fan Shi, Hui Huang, Donghui Hu, Xiaoping Wang:
A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features. IEEE Access 8: 120501-120512 (2020) - [j37]Zhaopin Su, Wangwang Li, Guofu Zhang, Donghui Hu, Xianxian Zhou:
A steganographic method based on gain quantization for iLBC speech streams. Multim. Syst. 26(2): 223-233 (2020) - [j36]Fangfang Li, Chibiao Ding, Yueting Zhang, Donghui Hu:
Airborne InSAR Interferometric Phase Analysis, Unwrapping Method, and Fast Implementation in Low Coherence Areas. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 5241-5250 (2020) - [j35]Meng Li, Donghui Hu, Chhagan Lal, Mauro Conti, Zijian Zhang:
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(10): 6564-6574 (2020) - [c33]Wenjie Jiang, Donghui Hu, Cong Yu, Meng Li, Zhongqiu Zhao:
A New Steganography Without Embedding Based on Adversarial Training. ACM TUR-C 2020: 219-223 - [c32]Yuqi Fan, Guangming Shen, Zhifeng Jin, Donghui Hu, Lei Shi, Xiaohui Yuan:
Stackelberg Game Based Edge Computing Resource Management for Mobile Blockchain. ACM TUR-C 2020: 225-229 - [c31]Yuqi Fan, Chen Wang, Bei Zhang, Donghui Hu, Weili Wu, Ding-Zhu Du:
Latency-Aware Data Placements for Operational Cost Minimization of Distributed Data Centers. DASFAA (1) 2020: 37-53 - [c30]Pengfei Shi, Donghui Hu, Yuchen Li, Shuli Zheng, Zhongqiu Zhao:
A Novel Approach of Steganalysis to Deal with Steganographic Algorithm Mismatch. ICIC (1) 2020: 413-422 - [c29]Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. ICICS 2020: 350-365 - [c28]Shuli Zheng, Lixuan Pan, Donghui Hu, Meng Li, Yuqi Fan:
A Blockchain-Based Trading Platform for Big Data. INFOCOM Workshops 2020: 991-996
2010 – 2019
- 2019
- [j34]Donghui Hu, Shengnan Zhou, Qiang Shen, Shuli Zheng, Zhongqiu Zhao, Yuqi Fan:
Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning. IEEE Access 7: 25924-25935 (2019) - [j33]Donghui Hu, Xiaoxia Hu, Wenjie Jiang, Shuli Zheng, Zhong-Qiu Zhao:
Intelligent digital image firewall system for filtering privacy or sensitive images. Cogn. Syst. Res. 53: 85-97 (2019) - [j32]Donghui Hu, Zhongjin Ma, Yuqi Fan, Shuli Zheng, Dengpan Ye, Lina Wang:
Study on the interaction between the cover source mismatch and texture complexity in steganalysis. Multim. Tools Appl. 78(6): 7643-7666 (2019) - [j31]Donghui Hu, Dan Zhao, Shuli Zheng:
A New Robust Approach for Reversible Database Watermarking with Distortion Control. IEEE Trans. Knowl. Data Eng. 31(6): 1024-1037 (2019) - [c27]Fangfang Li, Yueting Zhang, Donghui Hu, Chibiao Ding, Jiayin Liu:
Interferometric Phase Characteristics Analysis and Unwrapping Method of Airborne Insar in Low Coherence Areas. IGARSS 2019: 1757-1760 - [c26]Hui Ge, Donghui Hu, Haiyan Xu, Meng Li, Shuli Zheng:
New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization. IWDW 2019: 337-351 - 2018
- [j30]Donghui Hu, Liang Wang, Wenjie Jiang, Shuli Zheng, Bin Li:
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks. IEEE Access 6: 38303-38314 (2018) - [j29]Xiaoxia Hu, Donghui Hu, Shuli Zheng, Wangwang Li, Fan Chen, Zhaopin Shu, Lina Wang:
How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control. Multim. Tools Appl. 77(14): 18163-18185 (2018) - [j28]Donghui Hu, Haiyan Xu, Zhongjin Ma, Shuli Zheng, Bin Li:
A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization. IEEE Signal Process. Lett. 25(9): 1364-1368 (2018) - [j27]Dadi Meng, Chibiao Ding, Donghui Hu, Xiaolan Qiu, Lijia Huang, Bing Han, Jiayin Liu, Ning Xu:
On the Processing of Very High Resolution Spaceborne SAR Data: A Chirp-Modulated Back Projection Approach. IEEE Trans. Geosci. Remote. Sens. 56(1): 191-201 (2018) - 2017
- [j26]Tingting Jin, Xiaolan Qiu, Donghui Hu, Chibiao Ding:
An ML-Based Radial Velocity Estimation Algorithm for Moving Targets in Spaceborne High-Resolution and Wide-Swath SAR Systems. Remote. Sens. 9(5): 404 (2017) - [j25]Donghui Hu, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, Lina Wang:
Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks. Secur. Commun. Networks 2017: 2314860:1-2314860:9 (2017) - [j24]Donghui Hu, Zhongjin Ma, Xiaotian Zhang, Peipei Li, Dengpan Ye, Baohong Ling:
The Concept Drift Problem in Android Malware Detection and Its Solution. Secur. Commun. Networks 2017: 4956386:1-4956386:13 (2017) - [j23]Tingting Jin, Xiaolan Qiu, Donghui Hu, Chibiao Ding:
Unambiguous Imaging of Static Scenes and Moving Targets with the First Chinese Dual-Channel Spaceborne SAR Sensor. Sensors 17(8): 1709 (2017) - [c25]Shuli Zheng, Liang Wang, Baohong Ling, Donghui Hu:
Coverless Information Hiding Based on Robust Image Hashing. ICIC (3) 2017: 536-547 - [c24]Zhan Wang, Ning Ling, Donghui Hu, Xiaoxia Hu, Tao Zhang, Zhong-Qiu Zhao:
Image Firewall for Filtering Privacy or Sensitive Image Content Based on Joint Sparse Representation. ICIC (3) 2017: 548-559 - [c23]Zhong-Qiu Zhao, Haiman Bian, Donghui Hu, Wenjuan Cheng, Hervé Glotin:
Pedestrian Detection Based on Fast R-CNN and Batch Normalization. ICIC (1) 2017: 735-746 - [c22]Dadi Meng, Chibiao Ding, Donghui Hu, Ning Xu:
Applying chirp-modulated back-projection to very high resolution spaceborne sliding spotlight SAR data processing. IGARSS 2017: 973-975 - 2016
- [j22]Donghui Hu, Xiaotian Zhang, Yuqi Fan, Zhong-Qiu Zhao, Lina Wang, Xintao Wu, Xindong Wu:
On digital image trustworthiness. Appl. Soft Comput. 48: 240-253 (2016) - [j21]Tingting Jin, Xiaolan Qiu, Donghui Hu, Chibiao Ding:
Estimation Accuracy and Cramér-Rao Lower Bounds for Errors in Multichannel HRWS SAR Systems. IEEE Geosci. Remote. Sens. Lett. 13(12): 1772-1776 (2016) - [j20]Shuli Zheng, Dandan Li, Donghui Hu, Dengpan Ye, Lina Wang, Jinwei Wang:
Lossless data hiding algorithm for encrypted images with high capacity. Multim. Tools Appl. 75(21): 13765-13778 (2016) - [c21]Donghui Hu, Fan Chen, Xintao Wu, Zhong-Qiu Zhao:
A Framework of Privacy Decision Recommendation for Image Sharing in Online Social Networks. DSC 2016: 243-251 - [c20]Xiaotian Zhang, Donghui Hu, Yuqi Fan, Kui Yu:
A Novel Android Malware Detection Method Based on Markov Blanket. DSC 2016: 347-352 - [c19]Yue Wang, Xintao Wu, Donghui Hu:
Using Randomized Response for Differential Privacy Preserving Data Collection. EDBT/ICDT Workshops 2016 - [c18]Xin Guan, Li-Hua Zhong, Donghui Hu, Chibiao Ding:
Doppler walk rectification based on KWT in passive radar. IGARSS 2016: 6110-6113 - [c17]Donghui Hu, Zhongjin Ma, Yuqi Fan, Lina Wang:
A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis. IWDW 2016: 601-615 - [c16]Xiaoling Zhu, Zhengfeng Hou, Donghui Hu, Jing Zhang:
Secure and Efficient Mobile Payment Using QR Code in an Environment with Dishonest Authority. SpaCCS 2016: 452-465 - 2015
- [j19]Xin Guan, Lihua Zhong, Donghui Hu, Chibiao Ding:
A Novel Processing Scheme of Dynamic Programming Based Track-Before-Detect in Passive Bistatic Radar. IEICE Trans. Commun. 98-B(5): 962-973 (2015) - [j18]Donghui Hu, Bin Su, Shuli Zheng, Zhong-Qiu Zhao, Xintao Wu, Xindong Wu:
Security and privacy protocols for perceptual image hashing. Int. J. Sens. Networks 17(3): 146-162 (2015) - [j17]Xin Guan, Donghui Hu, Li-Hua Zhong, Chi-Biao Ding:
Strong Echo Cancellation Based on Adaptive Block Notch Filter in Passive Radar. IEEE Geosci. Remote. Sens. Lett. 12(2): 339-343 (2015) - [j16]Lijia Huang, Xiaolan Qiu, Donghui Hu, Bing Han, Chibiao Ding:
Medium-Earth-Orbit SAR Focusing Using Range Doppler Algorithm With Integrated Two-Step Azimuth Perturbation. IEEE Geosci. Remote. Sens. Lett. 12(3): 626-630 (2015) - [j15]Xue Lin, Fangfang Li, Dadi Meng, Donghui Hu, Chibiao Ding:
Nonlocal SAR Interferometric Phase Filtering Through Higher Order Singular Value Decomposition. IEEE Geosci. Remote. Sens. Lett. 12(4): 806-810 (2015) - [j14]Dadi Meng, Donghui Hu, Chibiao Ding:
Precise Focusing of Airborne SAR Data With Wide Apertures Large Trajectory Deviations: A Chirp Modulated Back-Projection Approach. IEEE Trans. Geosci. Remote. Sens. 53(5): 2510-2519 (2015) - [c15]Xue Lin, Fangfang Li, Yueting Zhang, Dadi Meng, Donghui Hu, Chibiao Ding:
Study on effect factors of multisquint estimation of time-varying baseline errors in repeat-pass airborne SAR. IGARSS 2015: 4252-4255 - 2014
- [j13]Xin Guan, Li-Hua Zhong, Donghui Hu, Chi-Biao Ding:
An extended processing scheme for coherent integration and parameter estimation based on matched filtering in passive radar. J. Zhejiang Univ. Sci. C 15(11): 1071-1085 (2014) - [j12]Mingquan Ye, Xindong Wu, Xuegang Hu, Donghui Hu:
Knowledge reduction for decision tables with attribute value taxonomies. Knowl. Based Syst. 56: 68-78 (2014) - [c14]Fangfang Li, Donghui Hu, Jiayin Liu, Xiaolan Qiu, Chibiao Ding:
DEM reconstruction of mountainous area from two anti-parallel aspects of airborne InSAR data. IGARSS 2014: 386-389 - [c13]Dadi Meng, Xue Lin, Donghui Hu, Chibiao Ding, Jiayin Liu:
Topography- and aperture-dependent motion compensation for airborne SAR: A back projection approach. IGARSS 2014: 448-450 - [c12]Yuqi Fan, Hongli Ding, Donghui Hu:
Green latency-aware data deployment in data centers: balancing latency, energy in networks and servers. DCC@SIGCOMM 2014: 45-46 - 2013
- [j11]Mingquan Ye, Xindong Wu, Xuegang Hu, Donghui Hu:
Multi-level rough set reduction for decision rule mining. Appl. Intell. 39(3): 642-658 (2013) - [j10]Mingquan Ye, Xindong Wu, Xuegang Hu, Donghui Hu:
Anonymizing classification data using rough set theory. Knowl. Based Syst. 43: 82-94 (2013) - [j9]Fangfang Li, Donghui Hu, Chibiao Ding, Wenyi Zhang:
InSAR Phase Noise Reduction Based on Empirical Mode Decomposition. IEEE Geosci. Remote. Sens. Lett. 10(5): 1180-1184 (2013) - [c11]Zhuang Zhang, Donghui Hu, Yang Yang, Bin Su:
A Universal Digital Image Steganalysis Method Based on Sparse Representation. CIS 2013: 437-441 - [c10]Jiajia Zhang, Shuli Zheng, Donghui Hu, Yunling Zhang:
Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average Predictions. CIS 2013: 545-549 - [c9]Donghui Hu, Bin Su, Shuli Zheng, Zhuang Zhang:
Secure Architecture and Protocols for Robust Perceptual Hashing. CIS 2013: 550-554 - 2012
- [j8]Xiaolan Qiu, Florian Behner, Simon Reuter, Holger Nies, Otmar Loffeld, Lijia Huang, Donghui Hu, Chibiao Ding:
An imaging algorithm based on keystone transform for one-stationary bistatic SAR of spotlight mode. EURASIP J. Adv. Signal Process. 2012: 221 (2012) - [j7]Ruipeng Xu, Dandan Zhang, Donghui Hu, Xiaolan Qiu, Chibiao Ding:
A Novel Motion Parameter Estimation Algorithm of Fast Moving Targets via Single-Antenna Airborne SAR System. IEEE Geosci. Remote. Sens. Lett. 9(5): 920-924 (2012) - [c8]Zhengfeng Hou, Can Li, Donghui Hu:
Improvement of a Flow Classification Algorithm with Less Memory Consume. CIT 2012: 345-348 - [c7]Lijia Huang, Bing Han, Donghui Hu, Chibiao Ding, Lihua Zhong:
Medium-Earth-orbit SAR imaging based on keystone transform and azimuth perturbation. IGARSS 2012: 3608-3610 - [c6]Fangfang Li, Bing Han, Xue Lin, Donghui Hu, Chibiao Ding:
A method of airborne InSAR DEM reconstruction in layover areas. IGARSS 2012: 4030-4033 - 2011
- [j6]Lina Wang, Xiaqiu Jiang, Shiguo Lian, Donghui Hu, Dengpan Ye:
Image authentication based on perceptual hash using Gabor filters. Soft Comput. 15(3): 493-504 (2011) - [j5]Lijia Huang, Xiaolan Qiu, Donghui Hu, Chibiao Ding:
Focusing of Medium-Earth-Orbit SAR With Advanced Nonlinear Chirp Scaling Algorithm. IEEE Trans. Geosci. Remote. Sens. 49(1-2): 500-508 (2011) - 2010
- [j4]Xiaolan Qiu, Donghui Hu, Liangjiang Zhou, Chibiao Ding:
A Bistatic SAR Raw Data Simulator Based on Inverse omega-k Algorithm. IEEE Trans. Geosci. Remote. Sens. 48(3-2): 1540-1547 (2010)
2000 – 2009
- 2009
- [c5]Xiaolan Qiu, Donghui Hu, Chibiao Ding:
A New Calculation Method of NuSAR for Translational Variant Bistatic SAR. IGARSS (2) 2009: 45-48 - 2008
- [j3]Xiaolan Qiu, Donghui Hu, Chibiao Ding:
Some Reflections on Bistatic SAR of Forward-Looking Configuration. IEEE Geosci. Remote. Sens. Lett. 5(4): 735-739 (2008) - [j2]Xiaolan Qiu, Donghui Hu, Chibiao Ding:
An Omega-K Algorithm With Phase Error Compensation for Bistatic SAR of a Translational Invariant Case. IEEE Trans. Geosci. Remote. Sens. 46(8): 2224-2232 (2008) - [j1]Xiaolan Qiu, Donghui Hu, Chibiao Ding:
An Improved NLCS Algorithm With Capability Analysis for One-Stationary BiSAR. IEEE Trans. Geosci. Remote. Sens. 46(10): 3179-3186 (2008) - [c4]Donghui Hu, Lina Wang, Xiaqiu Jiang, Tingting Zhu, Yuntao Yue:
Detecting the MB1 with Higher-Order Statistics. CIS (2) 2008: 330-335 - [c3]Zhengfeng Hou, Jianghong Han, Donghui Hu:
A New Authentication Scheme Based on Verifiable Secret Sharing. CSSE (3) 2008: 1028-1030 - [c2]Xiaolan Qiu, Donghui Hu, Chibiao Ding, Daojing Li:
Influence and Dependent Parameters of Terrain Undulation to Bistatic SAR Imaging. IGARSS (3) 2008: 1205-1208 - 2005
- [c1]Donghui Hu, Huanxue Zhou, Wen Hong:
Correction method for saturated SAR data to improve radiometric accuracy. IGARSS 2005: 3344-3347
Coauthor Index
aka: Chi-Biao Ding
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint