Остановите войну!
for scientists:
default search action
Jelena V. Misic
- > Home > Persons > Jelena V. Misic
Publications
- 2024
- [j185]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu:
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. Cybersecur. 7(1): 5 (2024) - [j184]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yixiang Wang:
PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack. IEEE Internet Things J. 11(1): 1374-1384 (2024) - [j182]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lei Han, Zhi Chen:
Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network. IEEE Trans. Netw. Sci. Eng. 11(3): 2586-2595 (2024) - [j181]Soosan Naderi Mighan, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus. IEEE Trans. Netw. Serv. Manag. 21(1): 507-516 (2024) - [j180]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake. IEEE Trans. Netw. Serv. Manag. 21(2): 1777-1790 (2024) - 2023
- [j179]Runkai Yang, Jelena V. Misic, Vojislav B. Misic, Xiao Liang, Shenshen Zhou, Xiaolin Chang:
Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach. Comput. J. 66(10): 2339-2354 (2023) - [j177]Hongyue Kang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Junchao Fan, Yating Liu:
Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach. IEEE Internet Things J. 10(12): 10497-10509 (2023) - [j176]Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism. IEEE Internet Things J. 10(13): 11440-11452 (2023) - [j174]Shiyuan Tong, Yun Liu, Jelena V. Misic, Xiaolin Chang, Zhenjiang Zhang, Chunyan Wang:
Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm. IEEE Trans. Intell. Transp. Syst. 24(11): 12933-12948 (2023) - [j173]Shiyuan Tong, Yun Liu, Xiaolin Chang, Jelena V. Misic, Zhenjiang Zhang:
Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model. IEEE Trans. Veh. Technol. 72(2): 2202-2215 (2023) - [j172]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Design of Proof-of-Stake PBFT Algorithm for IoT Environments. IEEE Trans. Veh. Technol. 72(2): 2497-2510 (2023) - [c195]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yingying Yao, Liwei Wang:
SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data. GLOBECOM 2023: 2190-2195 - [c194]Soosan Naderi Mighan, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Analytical evaluation of three attacks on Ethereum. GLOBECOM 2023: 3191-3196 - [c193]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
PBFT with Gated Prioritized Block Cycles. ICC 2023: 609-614 - [c192]Jelena V. Misic, Vojislav B. Misic, Elham Amini, Zahra Mohtajollah, Xiaolin Chang:
Fast Cycle Multiple Entry PBFT Consensus. ICC 2023: 3658-3663 - [c191]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic:
DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse. ICC 2023: 6318-6323 - [c190]Haoran Zhu, Zhi Chen, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Jing Bai:
Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain. ICC 2023: 6553-6558 - [c189]Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Trust and Rewards in a Two-Tier Consensus Architecture. ICNC 2023: 95-100 - [i12]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lei Han, Zhi Chen:
Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis. CoRR abs/2302.00210 (2023) - [i11]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu:
Practical Solutions in Fully Homomorphic Encryption - A Survey Analyzing Existing Acceleration Methods. CoRR abs/2303.10877 (2023) - [i10]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network. CoRR abs/2304.06963 (2023) - [i9]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lin Li, Yingying Yao:
CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning. CoRR abs/2306.00674 (2023) - [i8]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Zhi Chen, Junchao Fan:
PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning. CoRR abs/2309.13864 (2023) - [i7]Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yingying Yao:
RSMS: Towards Reliable and Secure Metaverse Service Provision. CoRR abs/2310.05033 (2023) - 2022
- [j169]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated gradient-based white-box attacks for fooling deep neural networks. Int. J. Intell. Syst. 37(7): 4253-4276 (2022) - [j168]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Scalable Self-Sovereign Identity Architecture. IEEE Netw. 36(3): 114-121 (2022) - [j167]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Reducing the number of transaction messages in bitcoin. Peer-to-Peer Netw. Appl. 15(1): 768-782 (2022) - [j166]Lili Jiang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jing Bai:
Understanding MEC empowered vehicle task offloading performance in 6G networks. Peer-to-Peer Netw. Appl. 15(2): 1090-1104 (2022) - [j165]Junchao Fan, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics. Peer-to-Peer Netw. Appl. 15(5): 2376-2389 (2022) - [j164]Haoran Zhu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Runkai Yang:
Revisiting FAW attack in an imperfect PoW blockchain system. Peer-to-Peer Netw. Appl. 15(5): 2430-2443 (2022) - [j163]Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
A high performance two-layer consensus architecture for blockchain-based IoT systems. Peer-to-Peer Netw. Appl. 15(5): 2444-2456 (2022) - [j162]Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment. IEEE Trans. Green Commun. Netw. 6(3): 1660-1670 (2022) - [j161]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack. IEEE Trans. Netw. Serv. Manag. 19(2): 1142-1158 (2022) - [j160]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT. IEEE Trans. Veh. Technol. 71(3): 2293-2304 (2022) - [j158]Hongyue Kang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Junchao Fan, Jing Bai:
Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization. IEEE Trans. Veh. Technol. 71(10): 10570-10583 (2022) - [c186]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Haoran Zhu:
Evaluating fork after withholding (FAW) attack in Bitcoin. CF 2022: 67-74 - [c184]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting. GLOBECOM 2022: 6253-6258 - [c183]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Proof of Stake Voting in Multiple Entry PBFT System. ICC 2022: 38-43 - [c181]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems. ICC 2022: 3418-3423 - [c180]Haorao Zhu, Runkai Yang, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach. ICC 2022: 4199-4204 - [c179]Hongyue Kang, Wei Li, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Dual-UAV Aided Secure Dynamic G2U Communication. ISCC 2022: 1-6 - [c178]Minghao Fu, Haoran Zhu, Jelena V. Misic, Vojislav B. Misic, Jing Bai, Xiaolin Chang:
Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain. ISPA/BDCloud/SocialCom/SustainCom 2022: 937-944 - [c177]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic:
Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2421-2427 - 2021
- [j157]Yingying Yao, Xiaolin Chang, Jianhua Wang, Jelena V. Misic, Vojislav B. Misic, Hong Wang:
LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X. Ad Hoc Networks 123: 102695 (2021) - [j156]Lili Jiang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Runkai Yang:
Performance analysis of heterogeneous cloud-edge services: A modeling approach. Peer-to-Peer Netw. Appl. 14(1): 151-163 (2021) - [j155]Yipin Zhang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yutong Cai:
Cost-effective migration-based dynamic platform defense technique: a CTMDP approach. Peer-to-Peer Netw. Appl. 14(3): 1207-1217 (2021) - [j153]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Hongyue Kang:
On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. IEEE Trans. Netw. Sci. Eng. 8(4): 3073-3086 (2021) - [j152]Hongyue Kang, Xiaolin Chang, Runkai Yang, Jelena V. Misic, Vojislav B. Misic:
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks. IEEE Trans. Netw. Serv. Manag. 18(3): 3079-3091 (2021) - [j151]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Haytham Qushtom:
Adapting PBFT for Use With Blockchain-Enabled IoT Systems. IEEE Trans. Veh. Technol. 70(1): 33-48 (2021) - [c176]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
The Impact of Vote Counting Policy on the Performance of PBFT: Invited Paper. CCECE 2021: 1-6 - [c175]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Priyanka Sarode:
Voting control in multiple entry PBFT blockchain systems for IoT. CCECE 2021: 1-6 - [c173]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Trade-offs in large blockchain-based IoT system design. GLOBECOM 2021: 1-6 - [c172]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications. GLOBECOM 2021: 1-6 - [c171]Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yixiang Wang, Jianan Zhang:
Mal-LSGAN: An Effective Adversarial Malware Example Generation Model. GLOBECOM 2021: 1-6 - [c169]Haytham Qushtom, Jelena V. Misic, Xiaolin Chang, Vojislav B. Misic:
A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording. ICC 2021: 1-6 - [c168]Yingying Yao, Zhendong Zhao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang:
A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System. ICC 2021: 1-6 - [c167]Hongyue Kang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Junchao Fan:
Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven. ICSOC 2021: 663-671 - [i5]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks. CoRR abs/2102.02128 (2021) - [i4]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum. CoRR abs/2112.02588 (2021) - 2020
- [j148]Yipin Zhang, Xiaolin Chang, Yuzhou Lin, Jelena V. Misic, Vojislav B. Misic:
Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification. IEEE Access 8: 44652-44660 (2020) - [j147]Lili Jiang, Xiaolin Chang, Jing Bai, Jelena V. Misic, Vojislav B. Misic, Zhi Chen:
Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives. IEEE Access 8: 89562-89574 (2020) - [j146]Lili Jiang, Xiaolin Chang, Runkai Yang, Jelena V. Misic, Vojislav B. Misic:
Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies. Comput. J. 63(10): 1564-1583 (2020) - [j145]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Comput. Secur. 97: 101956 (2020) - [j144]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Performance Modeling of Linux Network System with Open vSwitch. Peer-to-Peer Netw. Appl. 13(1): 151-162 (2020) - [j143]Lili Jiang, Xiaolin Chang, Yuhang Liu, Jelena V. Misic, Vojislav B. Misic:
Performance analysis of Hyperledger Fabric platform: A hierarchical model approach. Peer-to-Peer Netw. Appl. 13(3): 1014-1025 (2020) - [j141]Yingying Yao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks. IEEE Trans. Cogn. Commun. Netw. 6(2): 597-606 (2020) - [j140]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Saeideh Gholamrezazadeh Motlagh, M. Zulfiker Ali:
Modeling of Bitcoin's Blockchain Delivery Network. IEEE Trans. Netw. Sci. Eng. 7(3): 1368-1381 (2020) - [j138]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks. IEEE Trans. Netw. Sci. Eng. 7(4): 3135-3147 (2020) - [j137]Yingying Yao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing. IEEE Trans. Veh. Technol. 69(2): 2185-2194 (2020) - [c165]Zhi Chen, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yang Yang, Zhen Han:
Model-based Performance Evaluation of a Moving Target Defense System. GLOBECOM 2020: 1-6 - [c164]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin. GLOBECOM 2020: 1-6 - [c163]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Haytham Qushtom:
Multiple entry point PBFT for IoT systems. GLOBECOM 2020: 1-6 - [c161]Haoran Zhu, Jing Bai, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yang Yang:
Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability. ICA3PP (2) 2020: 619-632 - [c160]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
On the Benefits of Compact Blocks in Bitcoin. ICC 2020: 1-6 - [c159]Hongyue Kang, Bo Liu, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks. ICNC 2020: 513-517 - [c156]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Comparison of single- and multiple entry point PBFT for IoT blockchain systems. VTC Fall 2020: 1-6 - [c155]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Haytham Qushtom:
PBFT-based ordering service for IoT domains. VTC Fall 2020: 1-6 - [i3]Hongyue Kang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yingying Yao, Zhi Chen:
Stochastic Modeling Approaches for Analyzing Blockchain: A Survey. CoRR abs/2009.05945 (2020) - 2019
- [j136]Yixiang Wang, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic, ShaoHua Lv, Xiaolin Chang:
Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples. IEEE Access 7: 152766-152776 (2019) - [j134]Yingying Yao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Reliable and Secure Vehicular Fog Service Provision. IEEE Internet Things J. 6(1): 734-743 (2019) - [j132]Yingying Yao, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Lin Li:
BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services. IEEE Internet Things J. 6(2): 3775-3784 (2019) - [j130]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Data Lifetime Estimation in a Multicast-Based CoAP Proxy. Open J. Internet Things 5(1): 150-162 (2019) - [c154]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
On Forks and Fork Characteristics in a Bitcoin-Like Distribution Network. Blockchain 2019: 212-219 - [c153]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. GLOBECOM 2019: 1-6 - [c152]Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Zhi Chen, Bo Liu:
Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF. GLOBECOM 2019: 1-6 - [c150]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang, Saeideh Gholamrezazadeh Motlagh, M. Zulfiker Ali:
Block Delivery Time in Bitcoin Distribution Network. ICC 2019: 1-7 - [c149]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Towards a Blockchain-Based Healthcare Information System : Invited Paper. ICCC 2019: 13-18 - 2018
- [c147]Vojislav B. Misic, Jelena V. Misic, Xiaolin Chang:
Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh. GLOBECOM 2018: 1-6 - [c146]Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Kernel Based Estimation of Domain Parameters at IoT Proxy. GLOBECOM 2018: 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-09 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint