default search action
Abdullah Al-Dhelaan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j60]Weiwei Yuan, Yun Han, Donghai Guan, Guangjie Han, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Weighted enclosing subgraph-based link prediction for complex network. EURASIP J. Wirel. Commun. Netw. 2022(1): 65 (2022) - [j59]Mingming Yang, Tinghuai Ma, Qing Tian, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Aggregated squeeze-and-excitation transformations for densely connected convolutional networks. Vis. Comput. 38(8): 2661-2674 (2022) - 2021
- [j58]Yuan Tian, Biao Song, Tinghuai Ma, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Bi-Tier Differential Privacy for Precise Auction-Based People-Centric IoT Service. IEEE Access 9: 55036-55044 (2021) - [c21]Lamya Albraheem, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Bus-based WSMP Dissemination Protocol for Vehicular Network. iiWAS 2021: 504-516 - 2020
- [j57]Tinghuai Ma, Qin Liu, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LGIEM: Global and local node influence based community detection. Future Gener. Comput. Syst. 105: 533-546 (2020) - [j56]Bockarie Daniel Marah, Zilong Jing, Tinghuai Ma, Raeed Alsabri, Raphael Anaadumba, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Smartphone Architecture for Edge-Centric IoT Analytics. Sensors 20(3): 892 (2020) - [j55]Tinghuai Ma, Te Yu, Xiuge Wu, Jie Cao, Alia Alabdulkarim, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Multiple clustering and selecting algorithms with combining strategy for selective clustering ensemble. Soft Comput. 24(20): 15129-15141 (2020) - [j54]Weiwei Yuan, Kangya He, Chenyang Shi, Donghai Guan, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Multi-view network embedding with node similarity ensemble. World Wide Web 23(5): 2699-2714 (2020)
2010 – 2019
- 2019
- [j53]Donghai Guan, Tingting Wang, Weiwei Yuan, Lejun Zhang, Yuan Tian, Mohammed Al-Dhelaan, Abdullah Al-Dhelaan:
SWNF: Sign Prediction of Weak Ties Based on the Network Features. IEEE Access 7: 102054-102063 (2019) - [j52]Meili Tang, Qin Liu, Tinghuai Ma, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
$\mathcal{K}$ -Lowest-Influence Overlapping Nodes Based Community Detection in Complex Networks. IEEE Access 7: 109646-109661 (2019) - [j51]Samir Elmougy, Laura Pezza, Luca G. Tallini, Abdullah Al-Dhelaan, Bella Bose:
Diversity Combining Type I-Hybrid ARQ protocol over m-ary Asymmetric Varshamov channels. Comput. Electr. Eng. 77: 389-397 (2019) - [j50]Weiwei Yuan, Jiali Pang, Donghai Guan, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Sign Prediction on Unlabeled Social Networks Using Branch and Bound Optimized Transfer Learning. Complex. 2019: 4906903:1-4906903:11 (2019) - [j49]Tinghuai Ma, YuWei Zhao, Honghao Zhou, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Natural disaster topic extraction in Sina microblogging based on graph analysis. Expert Syst. Appl. 115: 346-355 (2019) - [j48]YuWei Zhao, Tinghuai Ma, Yu Hao, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan:
ICRA: index based cache replacement algorithm for cloud storage. Int. J. Sens. Networks 29(1): 48-57 (2019) - [j47]Huan Rong, Tinghuai Ma, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Deep rolling: A novel emotion prediction model for a multi-participant communication context. Inf. Sci. 488: 158-180 (2019) - [j46]Yuan Tian, Mariya M. Kaleemullah, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma:
A privacy preserving location service for cloud-of-things system. J. Parallel Distributed Comput. 123: 215-222 (2019) - 2018
- [j45]Tinghuai Ma, Jingjing Qu, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm. IEEE Access 6: 7214-7223 (2018) - [j44]Donghai Guan, Hongqiang Wei, Weiwei Yuan, Guangjie Han, Yuan Tian, Mohammed Al-Dhelaan, Abdullah Al-Dhelaan:
Improving Label Noise Filtering by Exploiting Unlabeled Data. IEEE Access 6: 11154-11165 (2018) - [j43]Tinghuai Ma, Siyang Yu, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks. IEEE Access 6: 66621-66631 (2018) - [j42]Tinghuai Ma, Jing Jia, Yu Xue, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Protection of location privacy for moving kNN queries in social networks. Appl. Soft Comput. 66: 525-532 (2018) - 2017
- [j41]Anees Ara, Mznah Al-Rodhaan, Yuan Tian, Abdullah Al-Dhelaan:
A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems. IEEE Access 5: 12601-12617 (2017) - [j40]Zohair Al-Ameen, Ghazali Sulong, Amjad Rehman, Mznah Al-Rodhaan, Tanzila Saba, Abdullah Al-Dhelaan:
Phase-preserving approach in denoising computed tomography medical images. Comput. methods Biomech. Biomed. Eng. Imaging Vis. 5(1): 16-26 (2017) - 2016
- [j39]Tinghuai Ma, Huan Rong, Changhong Ying, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Detect structural-connected communities based on BSCHEF in C-DBLP. Concurr. Comput. Pract. Exp. 28(2): 311-330 (2016) - [j38]Tinghuai Ma, Limin Guo, Meili Tang, Yuan Tian, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness. IEICE Trans. Inf. Syst. 99-D(6): 1512-1520 (2016) - [j37]Yinghua Lv, Tinghuai Ma, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171: 9-22 (2016) - [j36]Tinghuai Ma, Yao Wang, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LED: A fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207: 488-500 (2016) - [j35]Najla Al-Nabhan, Bowu Zhang, Xiuzhen Cheng, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Three connected dominating set algorithms for wireless sensor networks. Int. J. Sens. Networks 21(1): 53-66 (2016) - [j34]Ahmed Aldammas, Adel Soudani, Abdullah Al-Dhelaan:
The efficiency of buffer and buffer-less data-flow control schemes for congestion avoidance in Networks on Chip. J. King Saud Univ. Comput. Inf. Sci. 28(2): 184-198 (2016) - [i2]Anees Ara, Mznah Al-Rodhaan, Yuan Tian, Abdullah Al-Dhelaan:
A secure service provisioning framework for cyber physical cloud computing systems. CoRR abs/1611.00374 (2016) - 2015
- [j33]Rania Mousa, Mohd Shahrizal Sunar, Hoshang Kolivand, Amjad Rehman, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Marker Hiding Methods: Applications in Augmented Reality. Appl. Artif. Intell. 29(2): 101-118 (2015) - [j32]Wei Tian, Tinghuai Ma, Yuhui Zheng, Xin Wang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Weighted curvature-preserving PDE image filtering method. Comput. Math. Appl. 70(6): 1336-1344 (2015) - [j31]Tinghuai Ma, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
KDVEM : a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12): 1165-1184 (2015) - [j30]Zohair Al-Ameen, Ghazali Sulong, Amjad Rehman, Abdullah Al-Dhelaan, Tanzila Saba, Mznah Al-Rodhaan:
An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization. EURASIP J. Adv. Signal Process. 2015: 32 (2015) - [j29]Yuan Le, Xiuzhen Cheng, Dechang Chen, Nan Zhang, Taieb Znati, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks. EURASIP J. Wirel. Commun. Netw. 2015: 49 (2015) - [j28]Tinghuai Ma, Jinjuan Zhou, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Sungyoung Lee:
Social Network and Tag Sources Based Augmenting Collaborative Recommender System. IEICE Trans. Inf. Syst. 98-D(4): 902-910 (2015) - [j27]Mohsin S. Alhilal, Adel Soudani, Abdullah Al-Dhelaan:
Image-Based Object Identification for Efficient Event-Driven Sensing in Wireless Multimedia Sensor Networks. Int. J. Distributed Sens. Networks 11: 850869:1-850869:11 (2015) - [j26]Noor Asma Husain, Mohd Shafry Mohd Rahim, Amjad Rehman Khan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Tanzila Saba:
Iterative adaptive subdivision surface approach to reduce memory consumption in rendering process (IteAS). J. Intell. Fuzzy Syst. 28(1): 337-344 (2015) - [j25]Zaid A. Hussain, Bella Bose, Abdullah Al-Dhelaan:
Edge disjoint Hamiltonian cycles in Eisenstein-Jacobi networks. J. Parallel Distributed Comput. 86: 62-70 (2015) - [i1]Mutaz Beraka, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Collaborative Bibliographic System for Review/Survey Articles. CoRR abs/1509.04218 (2015) - 2014
- [j24]Tanzila Saba, Amjad Rehman, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Evaluation of Current Documents Image Denoising Techniques: A Comparative Study. Appl. Artif. Intell. 28(9): 879-887 (2014) - [j23]Ali Nodehi, Ghazali Sulong, Mznah Al-Rodhaan, Amjad Rehman, Abdullah Al-Dhelaan, Tanzila Saba:
Intelligent fuzzy approach for fast fractal image compression. EURASIP J. Adv. Signal Process. 2014: 112 (2014) - [j22]Najla Al-Nabhan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Distributed Energy-Efficient Approaches for Connected Dominating Set Construction in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j21]Ridha Ouni, Abdullah Al-Dhelaan, Rafik Louati:
A New Energy-Efficient Neighbor Discovery and Load Balancing Protocol for Mobile Sensor Networks. J. Circuits Syst. Comput. 23(7) (2014) - [j20]Adel Soudani, Ahmed Aldammas, Abdullah Al-Dhelaan:
Efficient Scheme for Congestion Control in Network-on-Chip with QoS consideration. J. Circuits Syst. Comput. 23(9) (2014) - [j19]Zaid A. Hussain, Bella Bose, Abdullah Al-Dhelaan:
Generalized Hypercubes: Edge-Disjoint Hamiltonian Cycles and Gray Codes. IEEE Trans. Computers 63(2): 375-382 (2014) - [j18]Wei Li, Shengling Wang, Yong Cui, Xiuzhen Cheng, Ran Xin, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
AP Association for Proportional Fairness in Multirate WLANs. IEEE/ACM Trans. Netw. 22(1): 191-202 (2014) - [c20]Mohsin S. Alhilal, Adel Soudani, Abdullah Al-Dhelaan:
Low power scheme for image based object identification in wireless multimedia sensor networks. ICMCS 2014: 927-932 - [c19]Yuan Tian, Biao Song, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Eui-Nam Huh:
Threat-based evaluation for context-aware multimedia surveillance system. ICUIMC 2014: 48:1-48:8 - [c18]Amal Alharbi, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Q-Routing in Cognitive Packet Network Routing Protocol for MANETs. IJCCI (NCTA) 2014: 234-243 - [c17]Yuan Tian, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma:
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration. ISBAST 2014: 166-170 - [c16]Ahmed Aldammas, Adel Soudani, Abdullah Al-Dhelaan:
A Buffered Flow Control Scheme with Flit Weight-Based Dropping Mechanism for Efficient Communication in NoC. MCSoC 2014: 229-236 - [c15]Mohsin S. Alhilal, Adel Soudani, Abdullah Al-Dhelaan:
A Shape-Based Object Identification Scheme in Wireless Multimedia Sensor Networks. MISSI 2014: 251-259 - [c14]Ahmed Aldammas, Adel Soudani, Abdullah Al-Dhelaan:
Flow control solution for efficient communication and congestion avoidance in NoC. SoCC 2014: 177-182 - 2013
- [j17]Ohood Saud Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j16]Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan:
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j15]Najla Al-Nabhan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Xiuzhen Cheng:
Connected dominating set algorithms for wireless sensor networks. Int. J. Sens. Networks 13(2): 121-134 (2013) - [c13]Saad A. Al-Ahmadi, Abdullah Al-Dhelaan:
EDGS: Efficient data gathering scheme for dense Wireless Sensor Networks. GLOBECOM Workshops 2013: 848-854 - [c12]Bowu Zhang, Wei Cheng, Limin Sun, Xiuzhen Cheng, Taieb Znati, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model. MiSeNet@MobiCom 2013: 11-20 - [c11]Najla Al-Nabhan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Xiuzhen Cheng:
Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks. SMC 2013: 4450-4455 - [c10]Najla Al-Nabhan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A distributed self-healing algorithm for virtual backbone construction and maintenance in Wireless Sensor Networks. WiSEE 2013: 1-6 - 2012
- [c9]Ohood Saud Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Biometric access control for wireless nodes. CASoN 2012: 167-174 - [c8]Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan:
Towards Efficient Security Services in Wireless Sensor Networks. FGIT-MulGraB/BSBT/IUrC 2012: 114-123 - [c7]Najla Al-Nabhan, Bowu Zhang, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Two Connected Dominating Set Algorithms for Wireless Sensor Networks. WASA 2012: 705-713 - 2011
- [j14]Zhi Sun, Pu Wang, Mehmet C. Vuran, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Ian F. Akyildiz:
MISE-PIPE: Magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Networks 9(3): 218-227 (2011) - [j13]Zhi Sun, Pu Wang, Mehmet C. Vuran, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Ian F. Akyildiz:
BorderSense: Border patrol through advanced wireless sensor networks. Ad Hoc Networks 9(3): 468-477 (2011) - [j12]Min Ding, Qilian Liang, Xiuzhen Cheng, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Scott C.-H. Huang, Dechang Chen:
A Model-Based Approach for Outlier Detection in Sensor Networks. Ad Hoc Sens. Wirel. Networks 12(3-4): 275-293 (2011) - [j11]Pu Wang, Zhi Sun, Mehmet C. Vuran, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Ian F. Akyildiz:
On network connectivity of wireless sensor networks for sandstorm monitoring. Comput. Networks 55(5): 1150-1157 (2011) - [j10]Wei Li, Yong Cui, Xiuzhen Cheng, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs. IEEE Trans. Wirel. Commun. 10(11): 3784-3792 (2011) - [j9]Pu Wang, Ian F. Akyildiz, Abdullah Al-Dhelaan:
Percolation theory based connectivity and latency analysis of cognitive radio ad hoc networks. Wirel. Networks 17(3): 659-669 (2011) - [c6]Hajar Al-Hujailan, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A cooperative intrusion detection scheme for clustered mobile ad hoc networks. IAS 2011: 179-185 - [c5]Pu Wang, Zhi Sun, Mehmet C. Vuran, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Ian F. Akyildiz:
Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring. ICC 2011: 1-5 - [c4]Yuan Le, Liran Ma, Hongjun Yu, Xiuzhen Cheng, Yong Cui, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks. WASA 2011: 271-279 - [c3]Adeeb M. Alhomoud, Rashid Munir, Jules Pagna Disso, Irfan Awan, Abdullah Al-Dhelaan:
Performance Evaluation Study of Intrusion Detection Systems. ANT/MobiWIS 2011: 173-180 - [p1]Monis Akhlaq, Faeiz Alserhani, Irfan Awan, John Mellor, Andrea J. Cullen, Abdullah Al-Dhelaan:
Implementation and Evaluation of Network Intrusion Detection Systems. Network Performance Engineering 2011: 988-1016 - 2010
- [j8]Brandon F. Lo, Ian F. Akyildiz, Abdullah Al-Dhelaan:
Efficient Recovery Control Channel Design in Cognitive Radio Ad Hoc Networks. IEEE Trans. Veh. Technol. 59(9): 4513-4526 (2010) - [c2]Pu Wang, Ian F. Akyildiz, Abdullah Al-Dhelaan:
Dynamic Connectivity of Cognitive Radio Ad-Hoc Networks with Time-Varying Spectral Activity. GLOBECOM 2010: 1-5 - [c1]Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Efficient Route Discovery Algorithm for MANETs. NAS 2010: 165-170
2000 – 2009
- 2002
- [j7]Abdel Elah Al-Ayyoub, Khaled Day, Abdullah Al-Dhelaan:
On the attractiveness of the star network. J. Syst. Softw. 63(2): 151-158 (2002)
1990 – 1999
- 1999
- [j6]Saad Haj Bakry, Abdullah Al-Dhelaan:
Planning information networks: the scope and the customer issues. Int. J. Netw. Manag. 9(1): 28-37 (1999) - 1998
- [j5]Abdullah Al-Dhelaan:
Editorial. Telecommun. Syst. 10(1): 1 (1998) - 1996
- [j4]Adel Al-Rumaih, Rana Ejaz Ahmed, Saad Haj Bakry, Abdullah Al-Dhelaan:
A Methodology for Network Topology Design with Link and Node Failuresy Tolerance. Int. J. Netw. Manag. 6(1): 42-63 (1996) - [j3]Hamad Al-Sulaiym, Mohammed A. Al-Turaigi, Abdullah Al-Dhelaan, Saad Haj Bakry:
Computer Simulation for the Evaluation of the IBM-SNA CongestionManagement Method on GULFNET. Int. J. Netw. Manag. 6(2): 94-107 (1996) - 1995
- [j2]Saad Haj Bakry, Abdullah Al-Dhelaan, Abdulaziz Al-Muammar:
A Mathematical Model for the Investigations of Access Demands on Information Networks with Applications. Int. J. Netw. Manag. 5(2): 82-94 (1995) - [j1]Hasan Taher, Saad Haj Bakry, Abdullah Al-Dhelaan, Abdulaziz Al-Muammar:
Information networks awareness and utilization issues: The case of gulfnet. Int. J. Netw. Manag. 5(3): 115-120 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint