default search action
Syed Rafay Hasan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Jonathan J. Sanderson, Syed Rafay Hasan:
System Integration of Xilinx DPU and HDMI for Real-Time Inference in PYNQ Environment With Image Enhancement. ISCAS 2024: 1-5 - [c56]Abhijeet Solanki, Syed Rafay Hasan, Terry N. Guo:
Investigate the Effects of Laser Attack on Intelligence of the AV Perception. ISVLSI 2024: 779-782 - [i15]Muneeba Asif, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Syed Rafay Hasan, Soamar Homsi:
SHEATH: Defending Horizontal Collaboration for Distributed CNNs against Adversarial Noise. CoRR abs/2409.17279 (2024) - 2023
- [j23]Adewale Adeyemo, Jonathan J. Sanderson, Tolulope A. Odetola, Faiq Khalid, Syed Rafay Hasan:
StAIn: Stealthy Avenues of Attacks on Horizontally Collaborated Convolutional Neural Network Inference and Their Mitigation. IEEE Access 11: 10520-10534 (2023) - [j22]Tolulope A. Odetola, Adewale Adeyemo, Faiq Khalid, Syed Rafay Hasan:
FM-ModComp: Feature Map Modification and Hardware-Software Co-Comparison for secure hardware accelerator-based CNN inference. Microprocess. Microsystems 100: 104827 (2023) - [c55]Adewale Adeyemo, Syed Rafay Hasan:
Enhancing the Security of Collaborative Deep Neural Networks: An Examination of the Effect of Low Pass Filters. ACM Great Lakes Symposium on VLSI 2023: 461-465 - [c54]Enahoro Oriero, Faiq Khalid, Syed Rafay Hasan:
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans. HASP@MICRO 2023: 47-55 - [c53]Jonathan J. Sanderson, Syed Rafay Hasan, Besma Roui-Abidi, Mongi A. Abidi:
Integrating Gstreamer with Xilinx's ZCU 104 Edge Platform for Real-Time Intelligent Image Enhancement. MWSCAS 2023: 639-643 - [c52]Samuel Sylvester, Jonathan J. Sanderson, Syed Rafay Hasan:
Mitigation of Rowhammer Attack on DDR4 Memory: A Novel Multi-Table Frequent Element Algorithm Based Approach. MWSCAS 2023: 1098-1102 - [i14]Enahoro Oriero, Faiq Khalid, Syed Rafay Hasan:
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans. CoRR abs/2310.03994 (2023) - 2022
- [j21]Tolulope A. Odetola, Katie M. Groves, Muhammed Yousufuddin, Faiq Khalid, Syed Rafay Hasan:
2L-3W: 2-Level 3-Way Hardware-Software Co-verification for the Mapping of Convolutional Neural Network (CNN) onto FPGA Boards. SN Comput. Sci. 3(1): 60 (2022) - [c51]Tolulope A. Odetola, Faiq Khalid, Syed Rafay Hasan:
LaBaNI: Layer-based Noise Injection Attack on Convolutional Neural Networks. ACM Great Lakes Symposium on VLSI 2022: 143-146 - [c50]Tolulope A. Odetola, Adewale Adeyemo, Syed Rafay Hasan:
Hardening Hardware Accelerartor Based CNN Inference Phase Against Adversarial Noises. HOST 2022: 141-144 - [c49]Travis Sandefur, Syed Rafay Hasan:
Framework to Benchmark CNNs (FaBCNN) for Processing Real-Time HD Video Streams on FPGAs. ISCAS 2022: 1778-1782 - [c48]Adewale Adeyemo, Travis Sandefur, Tolulope A. Odetola, Syed Rafay Hasan:
Towards Enabling Dynamic Convolution Neural Network Inference for Edge Intelligence. ISCAS 2022: 1833-1837 - [c47]Akram Hakiri, Aniruddha S. Gokhale, Yogesh D. Barve, Valerio Formicola, Shashank Shekhar, Charif Mahmoudi, Mohammad Ashiqur Rahman, Uttam Ghosh, Syed Rafay Hasan, Terry N. Guo:
Techniques for Realizing Secure, Resilient and Differentiated 5G Operations. WMNC 2022: 113-117 - [c46]Jacob Nelson, Syed Rafay Hasan:
Compressed Sparse Kernel: Optimization of Pruning for Customized CNNs on FPGAs. MWSCAS 2022: 1-4 - [c45]Terry N. Guo, Hawzhin Mohammed, Syed Rafay Hasan:
Edge Intelligence in Mobile Nodes: Opportunistic Pipeline via 5G D2D for On-site Sensing. VTC Fall 2022: 1-5 - [i13]Adewale Adeyemo, Travis Sandefur, Tolulope A. Odetola, Syed Rafay Hasan:
Towards Enabling Dynamic Convolution Neural Network Inference for Edge Intelligence. CoRR abs/2202.09461 (2022) - 2021
- [j20]Tolulope A. Odetola, Faiq Khalid, Hawzhin Mohammed, Travis Sandefur, Syed Rafay Hasan:
FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack. IEEE Access 9: 115370-115387 (2021) - [c44]Tolulope A. Odetola, Syed Rafay Hasan:
SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic Attack (HIA) on Convolutional Neural Network (CNN). ISCAS 2021: 1-5 - [c43]Hawzhin Mohammed, Faiq Khalid, Paul Sawyer, Gabriella Cataloni, Syed Rafay Hasan:
InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection. HASP@MICRO 2021: 8:1-8:8 - [c42]Jacob Nelson, Tolulope A. Odetola, Syed Rafay Hasan:
WORDA: A Winograd Offline-Runtime Decomposition Algorithm for Faster CNN Inference. MWSCAS 2021: 46-49 - [c41]Hawzhin Mohammed, Tolulope A. Odetola, Nan Guo, Syed Rafay Hasan:
Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things. MWSCAS 2021: 330-333 - [c40]Adewale Adeyemo, Faiq Khalid, Tolulope A. Odetola, Syed Rafay Hasan:
Security Analysis of Capsule Network Inference using Horizontal Collaboration. MWSCAS 2021: 1074-1077 - [i12]Tolulope A. Odetola, Syed Rafay Hasan:
SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic Attack (HIA) on Convolutional Neural Network (CNN). CoRR abs/2103.09327 (2021) - [i11]Tolulope A. Odetola, Faiq Khalid, Travis Sandefur, Hawzhin Mohammed, Syed Rafay Hasan:
FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack. CoRR abs/2106.06895 (2021) - [i10]Hawzhin Mohammed, Tolulope A. Odetola, Nan Guo, Syed Rafay Hasan:
Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things. CoRR abs/2107.05828 (2021) - [i9]Adewale Adeyemo, Faiq Khalid, Tolulope A. Odetola, Syed Rafay Hasan:
Security Analysis of Capsule Network Inference using Horizontal Collaboration. CoRR abs/2109.11041 (2021) - 2020
- [j19]Hawzhin Mohammed, Syed Rafay Hasan, Falah Awwad:
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks. IEEE Access 8: 36847-36862 (2020) - [j18]Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Muhammad Shafique:
SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection. Microprocess. Microsystems 77: 103122 (2020) - [j17]Waqar Ahmad, Osman Hasan, Falah Awwad, Nabil Bastaki, Syed Rafay Hasan:
Formal Reliability Analysis of an Integrated Power Generation System Using Theorem Proving. IEEE Syst. J. 14(4): 4820-4831 (2020) - [j16]Faiq Khalid, Syed Rafay Hasan, Sara Zia, Osman Hasan, Falah Awwad, Muhammad Shafique:
MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3748-3761 (2020) - [c39]Ogheneuriri Oderhohwo, Hawzhin Mohammed, Tolulope A. Odetola, Terry N. Guo, Syed Rafay Hasan, Felix Dogbe:
An Edge Intelligence Framework for Resource Constrained Community Area Network. MWSCAS 2020: 97-100 - [c38]Ogheneuriri Oderhohwo, Tolulope A. Odetola, Hawzhin Mohammed, Syed Rafay Hasan:
Deployment of Object Detection Enhanced with Multi-label Multi-classification on Edge Device. MWSCAS 2020: 986-989 - [i8]Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan:
How Secure is Distributed Convolutional Neural Network on IoT Edge Devices? CoRR abs/2006.09276 (2020) - [i7]Terry N. Guo, Hawzhin Mohammed, Syed Rafay Hasan:
Collaborative Pipeline Using Opportunistic Mobile Resources via D2D for Computation-Intensive Tasks. CoRR abs/2006.09301 (2020) - [i6]Faiq Khalid, Syed Rafay Hasan, Sara Zia, Osman Hasan, Falah Awwad, Muhammad Shafique:
MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices. CoRR abs/2011.11632 (2020)
2010 – 2019
- 2019
- [j15]Muluken Tadesse Hailesellasie, Syed Rafay Hasan:
MulNet: A Flexible CNN Processor With Higher Resource Utilization Efficiency for Constrained Devices. IEEE Access 7: 47509-47524 (2019) - [j14]Enahoro Oriero, Syed Rafay Hasan:
Survey on recent counterfeit IC detection techniques and future research directions. Integr. 66: 135-152 (2019) - [c37]Muluken Hailesellasie, Syed Rafay Hasan, Otmane Aït Mohamed:
MulMapper: Towards an Automated FPGA-Based CNN Processor Generator Based on a Dynamic Design Space Exploration. ISCAS 2019: 1-5 - [c36]Muluken Hailesellasie, Jacob Nelson, Faiq Khalid, Syed Rafay Hasan:
VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity. MWSCAS 2019: 650-653 - [c35]Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan, Sari Stissi, Isaiah Garlin, Falah Awwad:
(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling. MWSCAS 2019: 852-855 - [i5]Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Falah Awwad, Muhammad Shafique:
SIMCom: Statistical Sniffing of Inter-Module Communications for Run-time Hardware Trojan Detection. CoRR abs/1901.07299 (2019) - [i4]Tolulope A. Odetola, Hawzhin Raoof Mohammed, Syed Rafay Hasan:
A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA). CoRR abs/1911.00783 (2019) - [i3]Tolulope A. Odetola, Ogheneuriri Oderhohwo, Syed Rafay Hasan:
A Scalable Multilabel Classification to Deploy Deep Learning Architectures For Edge Devices. CoRR abs/1911.02098 (2019) - [i2]Tolulope A. Odetola, Katie M. Groves, Syed Rafay Hasan:
2L-3W: 2-Level 3-Way Hardware-Software Co-Verification for the Mapping of Deep Learning Architecture (DLA) onto FPGA Boards. CoRR abs/1911.05944 (2019) - 2018
- [j13]Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification. Integr. 61: 62-76 (2018) - [j12]Muluken Hailesellasie, Syed Rafay Hasan:
Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs. J. Hardw. Syst. Secur. 2(1): 1-14 (2018) - [c34]Muluken Hailesellasie, Syed Rafay Hasan, Faiq Khalid, Falah Awwad, Muhammad Shafique:
FPGA-Based Convolutional Neural Network Architecture with Reduced Parameter Requirements. ISCAS 2018: 1-5 - [c33]Faiq Khalid, Sunil Nanjiani, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad, Muhammad Shafique:
Low Power Digital Clock Multipliers for Battery-Operated Internet of Things (IoT) Devices. ISCAS 2018: 1-5 - [c32]Enahoro Oriero, Syed Rafay Hasan:
All Digital Low Power Aging Sensor for Counterfeit Detection in Integrated Circuits. MWSCAS 2018: 33-36 - [c31]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory. MWSCAS 2018: 853-856 - [c30]Hawzhin Mohammed, Jimmy Howell, Syed Rafay Hasan, Nan Guo, Faiq Khalid, Omar S. Elkeelany:
Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup. MWSCAS 2018: 972-975 - [i1]Hawzhin Mohammed, Syed Rafay Hasan, Mohammad Ashiqur Rahman:
Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks. CoRR abs/1807.11565 (2018) - 2017
- [j11]Siraj Fulum Mossa, Syed Rafay Hasan, Omar S. Elkeelany:
Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs. Integr. 58: 116-124 (2017) - [j10]Siraj Fulum Mossa, Syed Rafay Hasan, Omar S. Elkeelany:
Hardware trojans in 3-D ICs due to NBTI effects and countermeasure. Integr. 59: 64-74 (2017) - [c29]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models. DATE 2017: 294-297 - [c28]Muluken Hailesellasie, Syed Rafay Hasan:
A fast FPGA-based deep convolutional neural network using pseudo parallel memories. ISCAS 2017: 1-4 - [c27]Khawaja Taimoor Tanweer, Syed Rafay Hasan, Awais Mehmood Kamboh:
Motion artifact reduction from PPG signals during intense exercise using filtered X-LMS. ISCAS 2017: 1-4 - [c26]Adnan Yaqoob Salik, Muhammad Usama Sardar, Osman Hasan, Syed Rafay Hasan, Falah Awwad:
Formal verification of demand response based home energy management systems in smart grids. ISGT Asia 2017: 1-6 - [c25]Syed Rafay Hasan, Phani Tangellapalli:
Area efficient soft error tolerant RISC pipeline: Leveraging data encoding and inherent ALU redundancy. MWSCAS 2017: 699-702 - [c24]Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Falah Awwad:
Behavior profiling of power distribution networks for runtime hardware trojan detection. MWSCAS 2017: 1316-1319 - [c23]Oluwadara Adegbite, Syed Rafay Hasan:
A novel correlation power analysis attack on PIC based AES-128 without access to crypto device. MWSCAS 2017: 1320-1323 - 2016
- [j9]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Analyzing Vulnerability of Asynchronous Pipeline to Soft Errors: Leveraging Formal Verification. J. Electron. Test. 32(5): 569-586 (2016) - [j8]Siraj Fulum Mossa, Syed Rafay Hasan, Omar Sayed Ahmed Elkeelany:
Grouped through silicon vias for lower Ldi/dt drop in three-dimensional integrated circuit. IET Circuits Devices Syst. 10(1): 44-53 (2016) - [j7]Syed Rafay Hasan, Waqas Gul, Osman Hasan:
Clock domain crossing (CDC) in 3D-SICs: Semi QDI asynchronous vs loosely synchronous. Integr. 52: 367-380 (2016) - [c22]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. AsianHOST 2016: 1-6 - [c21]Faiq Khalid Lodhi, Imran Hafeez Abbasi, Faiq Khalid, Osman Hasan, Falah R. Awwad, Syed Rafay Hasan:
A self-learning framework to detect the intruded integrated circuits. ISCAS 2016: 1702-1705 - [c20]Waqas Gul, Syed Rafay Hasan, Osman Hasan, Faiq Khalid Lodhi, Falah R. Awwad:
Synchronously triggered GALS design templates leveraging QDI asynchronous interfaces. ISCAS 2016: 2615-2618 - 2015
- [j6]Ghaith Bany Hamad, Syed Rafay Hasan, Otmane Aït Mohamed, Yvon Savaria:
Characterizing, modeling, and analyzing soft error propagation in asynchronous and synchronous digital circuits. Microelectron. Reliab. 55(1): 238-250 (2015) - [c19]Syed Rafay Hasan, Siraj Fulum Mossa, Omar Sayed Ahmed Elkeelany, Falah Awwad:
Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs. MWSCAS 2015: 1-4 - [c18]Syed Rafay Hasan, Siraj Fulum Mossa, Ciro Perez, Falah Awwad:
Hardware Trojans in asynchronous FIFO-buffers: From clock domain crossing perspective. MWSCAS 2015: 1-4 - [c17]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Formal analysis of macro synchronous micro asychronous pipeline for hardware Trojan detection. NORCAS 2015: 1-4 - 2014
- [j5]Faiq Khalid Lodhi, Syed Rafay Hasan, Naeha Sharif, Nadra Ramzan, Osman Hasan:
Timing variation aware dynamic digital phase detector for low-latency clock domain crossing. IET Circuits Devices Syst. 8(1): 58-64 (2014) - [c16]Ghaith Bany Hamad, Syed Rafay Hasan, Otmane Aït Mohamed, Yvon Savaria:
Abstracting Single Event Transient characteristics variations due to input patterns and fan-out. ISCAS 2014: 1468-1471 - [c15]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Low Power Soft Error Tolerant Macro Synchronous Micro Asynchronous (MSMA) Pipeline. ISVLSI 2014: 601-606 - [c14]Waqas Gul, Syed Rafay Hasan, Osman Hasan:
Yield aware inter-logic-layer communication in 3-D ICs: Early design stage recommendations. MWSCAS 2014: 222-225 - [c13]Ghaith Bany Hamad, Syed Rafay Hasan, Otmane Aït Mohamed, Yvon Savaria:
Modeling, analyzing, and abstracting single event transient propagation at gate level. MWSCAS 2014: 515-518 - [c12]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah Awwad:
Hardware Trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline. MWSCAS 2014: 659-662 - [c11]Siraj Fulum Mossa, Syed Rafay Hasan, Omar Sayed Ahmed Elkeelany:
Introducing redundant TSV with low inductance for 3-D IC. NEWCAS 2014: 117-120 - [c10]Waqas Gul, Syed Rafay Hasan, Osman Hasan:
Clock domain crossing (CDC) for inter-logic-layer communication in 3-D ICs. NEWCAS 2014: 476-479 - 2013
- [j4]Claude Thibeault, Yassine Hariri, Syed Rafay Hasan, Christelle Hobeika, Yvon Savaria, Yves Audet, Fatima Zahra Tazi:
A Library-Based Early Soft Error Sensitivity Analysis Technique for SRAM-Based FPGA Design. J. Electron. Test. 29(4): 457-471 (2013) - [c9]Phani Balaji Swamy Tangellapalli, Syed Rafay Hasan:
Soft error aware pipelined architecture: Leveraging automatic repeat request protocol. MWSCAS 2013: 549-552 - 2012
- [c8]Zaid Al-bayati, Otmane Aït Mohamed, Syed Rafay Hasan, Yvon Savaria:
A novel hybrid FIFO asynchronous clock domain crossing interfacing method. ACM Great Lakes Symposium on VLSI 2012: 271-274 - [c7]Ghaith Bany Hamad, Otmane Aït Mohamed, Syed Rafay Hasan, Yvon Savaria:
Identification of soft error glitch-propagation paths: Leveraging SAT solvers. ISCAS 2012: 3258-3261 - [c6]Faiq Khalid Lodhi, Osman Hasan, Syed Rafay Hasan, Falah Awwad:
Modified null convention logic pipeline to detect soft errors in both null and data phases. MWSCAS 2012: 402-405 - [c5]Phani Balaji Swamy Tangellapalli, Syed Rafay Hasan:
Towards low area overhead ARQ based soft error tolerant data paths for SRAM-based Altera FPGAs. MWSCAS 2012: 422-425 - 2011
- [j3]Syed Rafay Hasan, Normand Bélanger, Yvon Savaria, M. Omair Ahmad:
All digital skew tolerant synchronous interfacing methods for high-performance point-to-point communications in deep sub-micron SoCs. Integr. 44(1): 22-38 (2011) - [c4]Ghaith Bany Hamad, Otmane Aït Mohamed, Syed Rafay Hasan, Yvon Savaria:
SEGP-Finder: Tool for identification of Soft Error Glitch-Propagating paths at gate level. ICECS 2011: 358-361 - 2010
- [j2]Syed Rafay Hasan, Normand Bélanger, Yvon Savaria, M. Omair Ahmad:
Crosstalk Glitch Propagation Modeling for Asynchronous Interfaces in Globally Asynchronous Locally Synchronous Systems. IEEE Trans. Circuits Syst. I Regul. Pap. 57-I(8): 2020-2031 (2010) - [j1]Syed Rafay Hasan, Normand Bélanger, Yvon Savaria, M. Omair Ahmad:
Crosstalk-Glitch Gating: A Solution for Designing Glitch-Tolerant Asynchronous Handshake Interface Mechanisms for GALS Systems. IEEE Trans. Circuits Syst. I Regul. Pap. 57-I(10): 2696-2707 (2010)
2000 – 2009
- 2009
- [c3]Syed Rafay Hasan, Bill Pontikakis, Yvon Savaria:
An All-digital Skew-adaptive Clock Scheduling Algorithm for Heterogeneous Multiprocessor Systems on Chips (MPSoCs). ISCAS 2009: 2501-2504 - 2007
- [c2]Syed Rafay Hasan, Yvon Savaria:
Crosstalk Effects in Event-Driven Self-Timed Circuits Designed With 90nm CMOS Technology. ISCAS 2007: 629-632 - 2004
- [c1]Adhir Upadhyay, Syed Rafay Hasan, Mohamed Nekili:
Optimal partitioning of globally asychronous locally synchronous processor arrays. ACM Great Lakes Symposium on VLSI 2004: 7-12
Coauthor Index
aka: Falah Awwad
aka: Faiq Khalid Lodhi
aka: Hawzhin Raoof Mohammed
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint