
Zoe Lin Jiang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j30]Jun Zhang
, Shiqing Hu, Zoe Lin Jiang:
Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks. IEEE Access 8: 111889-111898 (2020) - [j29]Junbin Fang
, Guikai Xi, Rong Li, Qian Chen, Puxi Lin, Sijin Li, Zoe Lin Jiang
, Siu-Ming Yiu:
Coarse-to-fine two-stage semantic video carving approach in digital forensics. Comput. Secur. 97: 101942 (2020) - [j28]Zoe Lin Jiang
, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Zechao Liu, Junbin Fang
, Siu-Ming Yiu, Xuan Wang:
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. Inf. Sci. 518: 168-180 (2020) - [j27]Xixi Huang, Ye Ding, Zoe Lin Jiang, Shuhan Qi, Xuan Wang, Qing Liao
:
DP-FL: a novel differentially private federated learning framework for the unbalanced data. World Wide Web 23(4): 2529-2545 (2020) - [c51]Jun Zhang, Siu-Ming Yiu, Zoe Lin Jiang:
Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions. ICA3PP (2) 2020: 126-141
2010 – 2019
- 2019
- [j26]Ye Li, Zoe Lin Jiang, Lin Yao, Xuan Wang, Siu-Ming Yiu, Zhengan Huang:
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties. Clust. Comput. 22(Suppl 1): 1581-1593 (2019) - [j25]Qing Liao
, Ye Ding, Zoe Lin Jiang, Xuan Wang, Chunkai Zhang, Qian Zhang:
Multi-task deep convolutional neural network for cancer diagnosis. Neurocomputing 348: 66-73 (2019) - [j24]Chunkai Zhang
, Panbo Tian, Xudong Zhang, Zoe Lin Jiang
, Lin Yao, Xuan Wang:
Fast Eclat Algorithms Based on Minwise Hashing for Large Scale Transactions. IEEE Internet Things J. 6(2): 3948-3961 (2019) - [j23]Chunkai Zhang, Panbo Tian, Xudong Zhang, Qing Liao, Zoe Lin Jiang, Xuan Wang:
HashEclat: an efficient frequent itemset algorithm. Int. J. Mach. Learn. Cybern. 10(11): 3003-3016 (2019) - [j22]Shuhan Qi, Zawlin Kyaw, Xuan Wang, Zoe Lin Jiang, Jian Guan:
Large scale product search with spatial quantization and deep ranking. Multim. Tools Appl. 78(19): 27045-27065 (2019) - [j21]Zhengzhong Yi, Junbin Fang
, Puxi Lin, Xiao-jun Wen, Zoe Lin Jiang, Xuan Wang:
Efficient quantum key distribution protocol based on classical-quantum polarized channels. Quantum Inf. Process. 18(12): 356 (2019) - [c50]Yifan Li, Xuan Wang, Zoe Lin Jiang, Shuhan Qi, Xinhui Liu, Qian Chen:
RGB-D tracker under Hierarchical structure. CIFEr 2019: 1-6 - [c49]Heyan Chai, Shuqiang Yang, Zoe Lin Jiang, Xuan Wang, Yiqun Chen, Hengyu Luo:
A New Robust and Reversible Watermarking Technique Based on Erasure Code. ICA3PP (1) 2019: 153-168 - [c48]Zhentian Xiong, Zoe Lin Jiang, Shuqiang Yang, Xuan Wang, Junbin Fang:
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique. NSS 2019: 272-287 - [c47]Zeming Lu, Zoe Lin Jiang
, Yulin Wu
, Xuan Wang
, Yantao Zhong:
A Lattice-Based Anonymous Distributed E-Cash from Bitcoin. ProvSec 2019: 275-287 - [c46]Heyan Chai, Shuqiang Yang, Zoe Lin Jiang, Xuan Wang:
A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering. TrustCom/BigDataSE 2019: 411-418 - [c45]Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. TrustCom/BigDataSE 2019: 570-577 - [i2]Chunkai Zhang, Yingyang Chen, Ao Yin, Zhen Qin, Xing Zhang, Keli Zhang, Zoe Lin Jiang:
An Improvement of PAA on Trend-Based Approximation for Time Series. CoRR abs/1907.00700 (2019) - 2018
- [j20]Aisha Sikandar
, Waqas Anwar
, Usama Ijaz Bajwa, Xuan Wang, Misba Sikandar, Lin Yao, Zoe Lin Jiang, Chunkai Zhang:
Decision Tree Based Approaches for Detecting Protein Complex in Protein Protein Interaction Network (PPI) via Link and Sequence Analysis. IEEE Access 6: 22108-22120 (2018) - [j19]Xiao-jun Wen, Genping Wang, Yongzhi Chen, Zhengzhong Yi, Zoe Lin Jiang, Jun-bin Fang:
Quantum solution for secure information transmission of wearable devices. Int. J. Distributed Sens. Networks 14(5) (2018) - [j18]Yongzhi Chen, Xiao-jun Wen, Zhiwei Sun, Zoe Lin Jiang, Junbin Fang:
A sensitive information protection scheme in wearable devices based on quantum entanglement. Int. J. Distributed Sens. Networks 14(10) (2018) - [j17]Ye Li, Xuan Wang, Zoe Lin Jiang, Siu-Ming Yiu:
Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties. Int. J. High Perform. Comput. Netw. 12(2): 207-215 (2018) - [j16]Shuhan Qi, Xuan Wang, Xi Zhang
, Xuemeng Song, Zoe Lin Jiang:
Scalable graph based non-negative multi-view embedding for image ranking. Neurocomputing 274: 29-36 (2018) - [j15]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu:
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J. Netw. Comput. Appl. 108: 112-123 (2018) - [j14]Jian Guan, Xuan Wang, Pengming Feng, Jing Dong, Jonathon A. Chambers, Zoe Lin Jiang, Wenwu Wang:
Polynomial dictionary learning algorithms in sparse representations. Signal Process. 142: 492-503 (2018) - [j13]Ye Li, Zoe Lin Jiang
, Xuan Wang
, Jun-bin Fang, En Zhang
, Xianmin Wang
:
Securely Outsourcing ID3 Decision Tree in Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 2385150:1-2385150:10 (2018) - [c44]Chunkai Zhang, Yingyang Chen, Ao Yin, Zhen Qin, Xing Zhang, Keli Zhang, Zoe Lin Jiang:
An Improvement of PAA on Trend-Based Approximation for Time Series. ICA3PP (2) 2018: 248-262 - [c43]Ao Yin, Chunkai Zhang, Zoe Lin Jiang, Yulin Wu, Xing Zhang, Keli Zhang, Xuan Wang:
PPLDEM: A Fast Anomaly Detection Algorithm with Privacy Preserving. ICA3PP (4) 2018: 358-373 - [c42]Yulin Wu, Xuan Wang, Zoe Lin Jiang, Xuan Li, Jin Li, Siu-Ming Yiu, Zechao Liu, Hainan Zhao, Chunkai Zhang:
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection. ICA3PP (4) 2018: 374-388 - [c41]Chuxin Wu, Peng Zhang, Hongwei Liu, Zehong Chen, Zoe Lin Jiang:
An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control. ICA3PP (4) 2018: 389-398 - [c40]Wenli Sun, Zoe Lin Jiang, Jun Zhang, Siu-Ming Yiu, Yulin Wu, Hainan Zhao, Xuan Wang, Peng Zhang:
Outsourced Privacy Preserving SVM with Multiple Keys. ICA3PP (4) 2018: 415-430 - [c39]Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, Siu-Ming Yiu, Junbin Fang:
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing. ICA3PP (4) 2018: 447-460 - [c38]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Yulin Wu, Siu-Ming Yiu:
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 1003-1008 - [c37]Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 140-147 - [c36]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Ruoqing Zhang, Yulin Wu:
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage. TrustCom/BigDataSE 2018: 614-623 - 2017
- [j12]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Xinyi Huang, Siu-Ming Yiu, Kunihiko Sadakane
:
Offline/online attribute-based encryption with verifiable outsourced decryption. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j11]Meng Liu
, Xuan Wang, Chi Yang, Zoe Lin Jiang, Ye Li:
An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing. Int. J. Distributed Sens. Networks 13(1) (2017) - [j10]Man Ho Au
, Tsz Hon Yuen
, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j9]Cong Zuo, Kaitai Liang
, Zoe Lin Jiang, Jun Shao, Jun-bin Fang:
Cost-effective privacy-preserving vehicular urban sensing system. Pers. Ubiquitous Comput. 21(5): 893-901 (2017) - [c35]Jun Zhang, Xin Wang, Siu-Ming Yiu, Zoe Lin Jiang, Jin Li:
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM. SCC@AsiaCCS 2017: 75-82 - [c34]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu:
Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys. CSE/EUC (1) 2017: 548-555 - [c33]Hongwei Liu, Ping Zhu, Zehong Chen, Peng Zhang, Zoe Lin Jiang:
Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage. CSE/EUC (1) 2017: 556-561 - [c32]Yulin Wu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage. CSE/EUC (1) 2017: 562-567 - [c31]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Qing Liao:
Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases. DSC 2017: 124-132 - [c30]Junbin Fang, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. IFIP Int. Conf. Digital Forensics 2017: 223-244 - [c29]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang:
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. ISPEC 2017: 525-538 - [c28]Qing Liao, Zoe Lin Jiang, Xuan Wang, Chunkai Zhang, Ye Ding:
Cancer classification with multi-task deep learning. SPAC 2017: 76-81 - [c27]Chunkai Zhang, Jianwei Guo, Changqing Qi, Zoe Lin Jiang, Qing Liao, Lin Yao, Xuan Wang:
EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling. SPAC 2017: 118-123 - [c26]Chunkai Zhang, Xudong Zhang, Zoe Lin Jiang, Qing Liao, Lin Yao, Xuan Wang:
Mining inter-transaction association rules from multiple time-series data. SPAC 2017: 158-163 - [c25]Zoe Lin Jiang, Jiajun Huang, Zechao Liu, Xuan Wang:
Attribute-based queries over outsourced encrypted database. SPAC 2017: 164-168 - [c24]Chunkai Zhang, Guoquan Wang, Ying Zhou, Lin Yao, Zoe Lin Jiang, Qing Liao, Xuan Wang:
Feature selection for high dimensional imbalanced class data based on F-measure optimization. SPAC 2017: 278-283 - [c23]Chunkai Zhang, Haodong Liu, Ye Li, Ao Yin, Zoe Lin Jiang, Qing Liao, Xuan Wang:
A novel privacy-preserving distributed anomaly detection method. SPAC 2017: 463-468 - [c22]Zechao Liu, Xuan Wang, Lei Cui, Zoe Lin Jiang, Chunkai Zhang:
White-box traceable dynamic attribute based encryption. SPAC 2017: 526-530 - [c21]Zoe Lin Jiang, Yudong Liang, Zechao Liu, Xuan Wang:
Lattice-based proxy signature scheme with reject sampling method. SPAC 2017: 558-563 - [c20]Ruoqing Zhang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xiaoqi Yu, Zechao Liu, Zoe Lin Jiang:
A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation. TrustCom/BigDataSE/ICESS 2017: 363-370 - [c19]Peng Zhang, Xiafei Zhang, Xiaoqiang Sun, Joseph K. Liu, Jianping Yu, Zoe Lin Jiang:
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics. TrustCom/BigDataSE/ICESS 2017: 668-674 - [c18]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties. TrustCom/BigDataSE/ICESS 2017: 1070-1075 - [p1]Junbin Fang, Zoe Lin Jiang, Sijin Li, Siu-Ming Yiu, Lucas C. K. Hui, Kam-Pui Chow:
Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone. Mobile Security and Privacy 2017: 205-216 - 2016
- [j8]Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
, Man Ho Au
, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j7]Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zoe Lin Jiang, Xuan Wang:
Key based data analytics across data centers considering bi-level resource provision in cloud computing. Future Gener. Comput. Syst. 62: 40-50 (2016) - [c17]Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe Lin Jiang, Jin Li:
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage. ACISP (2) 2016: 153-169 - [c16]Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang:
Generic Construction of Publicly Verifiable Predicate Encryption. AsiaCCS 2016: 889-894 - [c15]Zoe Lin Jiang, Ruoqing Zhang, Zechao Liu, Siu-Ming Yiu, Lucas C. K. Hui, Xuan Wang, Junbin Fang:
A Revocable Outsourcing Attribute-Based Encryption Scheme. CloudComp 2016: 145-161 - [c14]Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zoe Lin Jiang, Xuan Wang:
Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing. IoTBD 2016: 243-254 - [c13]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Chunkai Zhang, Xiaomeng Zhao:
Dynamic Attribute-Based Access Control in Cloud Storage Systems. Trustcom/BigDataSE/ISPA 2016: 129-137 - [i1]Jun-bin Fang, Zhen Che, Xiaolong Yu, Zhe Chen, Zoe Lin Jiang, Siu-Ming Yiu, Kui Ren, Xiaoqing Tan:
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes. CoRR abs/1608.07202 (2016) - 2015
- [j6]Zili Zhang, Xuan Wang, Kai Han, Zoe Lin Jiang:
A Novel Arc Segmentation Approach for Document Image Processing. Int. J. Pattern Recognit. Artif. Intell. 29(1): 1553001:1-1553001:25 (2015) - [c12]Xiaoyan Liu, Zoe Lin Jiang, Siu-Ming Yiu, Xuan Wang, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Jun-bin Fang:
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks. MSN 2015: 124-133 - 2014
- [j5]Jun-bin Fang, Zoe Lin Jiang, Kexin Ren, Yunhan Luo, Zhe Chen, Weiping Liu, Xuan Wang
, Xiamu Niu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design. Quantum Inf. Process. 13(6): 1425-1435 (2014) - [j4]Man Ho Au
, Joseph K. Liu
, Jun-bin Fang, Zoe Lin Jiang, Willy Susilo, Jianying Zhou:
A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Trans. Veh. Technol. 63(1): 3-18 (2014) - [c11]Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu
, Man Ho Au
, Xuan Wang:
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. ICICS 2014: 274-289 - 2013
- [j3]Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, K. P. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. IEEE Trans. Inf. Forensics Secur. 8(5): 821-828 (2013) - [c10]Gang Zhou, Yanbin Tang, Jun-bin Fang, Zoe Lin Jiang, K. P. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Rongsheng Xu, Yonghao Mai, Shuhui Hou, Fei Xu:
Photo Forensics on Shanzhai Mobile Phone. WASA 2013: 454-464 - 2012
- [c9]Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang:
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. IFIP Int. Conf. Digital Forensics 2012: 129-142 - 2011
- [j2]Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Meng-meng Sheng:
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics. J. Zhejiang Univ. Sci. C 12(10): 809-818 (2011) - [c8]Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7
2000 – 2009
- 2009
- [j1]Zoe Lin Jiang, Siu-Ming Yiu, Y. Dong, Lucas Chi Kwong Hui, Starsky H. Y. Wong:
Secure Chained Threshold Proxy Signature without and with Supervision. J. Softw. Eng. Appl. 2(4): 267-275 (2009) - [c7]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Zoe Lin Jiang, Victor O. K. Li:
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. ADHOCNETS 2009: 160-175 - [c6]Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. Security and Management 2009: 307-313 - 2008
- [c5]Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong:
Chained Threshold Proxy Signature without and with Supervision. CSSE (3) 2008: 837-840 - [c4]Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Improving Disk Sector Integrity Using K-Dimension Hashing. IFIP Int. Conf. Digital Forensics 2008: 87-98 - [c3]Frank Y. W. Law, Pierre K. Y. Lai, Zoe Lin Jiang, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, C. F. Chong:
Protecting Digital Legal Professional Privilege (LPP) Data. SADFE 2008: 91-101 - 2007
- [c2]Zoe Lin Jiang, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu, Pierre K. Y. Lai:
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. FGCN (2) 2007: 141-145 - 2006
- [c1]Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu:
A Key-Recovery System for Long-term Encrypted Documents. EDOC Workshops 2006: 52
Coauthor Index
aka: Jun-bin Fang
aka: Lucas Chi Kwong Hui

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-08 02:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint