


default search action
Yong Fang 0002
Person information
- affiliation: Sichuan University, Chengdu, China
Other persons with the same name
- Yong Fang — disambiguation page
- Yong Fang 0001 ![0000-0002-3345-8259 [0000-0002-3345-8259]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png) — Chang'an University, Xi'an, China (and 1 more) — Chang'an University, Xi'an, China (and 1 more)
- Yong Fang 0003 ![0000-0002-3597-6770 [0000-0002-3597-6770]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png) — Shanghai University, Shanghai, China — Shanghai University, Shanghai, China
- Yong Fang 0004 ![0000-0001-5515-3758 [0000-0001-5515-3758]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png) — Shandong University of Science and Technology, Qingdao, China — Shandong University of Science and Technology, Qingdao, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j42]Yijia Xu [j42]Yijia Xu , Qiang Zhang, Huaxin Deng , Qiang Zhang, Huaxin Deng , Zhonglin Liu, Cheng Yang, Yong Fang , Zhonglin Liu, Cheng Yang, Yong Fang : :
 Unknown web attack threat detection based on large language model. Appl. Soft Comput. 173: 112905 (2025)
 [j41]Yaochang Xu, Yong Fang [j41]Yaochang Xu, Yong Fang , Yijia Xu , Yijia Xu , Zhan Wang: , Zhan Wang:
 Automatic optimization for generating adversarial malware based on prioritized evolutionary computing. Appl. Soft Comput. 173: 112933 (2025)
 [j40]Qinglin Qi, Yun Luo, Yijia Xu [j40]Qinglin Qi, Yun Luo, Yijia Xu , Wenbo Guo, Yong Fang , Wenbo Guo, Yong Fang : :
 SpearBot: Leveraging large language models in a generative-critique framework for spear-phishing email generation. Inf. Fusion 122: 103176 (2025)
 [j39]Hongsheng Zuo, Yong Fang, Peng Jia, Ximing Fan [j39]Hongsheng Zuo, Yong Fang, Peng Jia, Ximing Fan , Xi Peng , Xi Peng , Yijia Xu , Yijia Xu , Rui Pan: , Rui Pan:
 Directed fuzzing based on path constraints and deviation path correction. Inf. Softw. Technol. 188: 107875 (2025)
 [c19]Qiang Zhang, Pei Yan, Yijia Xu, Xinfeng Li, Hongyi Cai, Chuanpo Fu, Yong Fang, Yang Liu: [c19]Qiang Zhang, Pei Yan, Yijia Xu, Xinfeng Li, Hongyi Cai, Chuanpo Fu, Yong Fang, Yang Liu:
 Agent Behavior: The Regulatory Object of the Agent-Centric Online Ecosystem in Digital Age. ICECCS 2025: 473-479
- 2024
 [j38]Yijia Xu [j38]Yijia Xu , Yong Fang , Yong Fang , Cheng Huang, Zhonglin Liu, Weipeng Cao: , Cheng Huang, Zhonglin Liu, Weipeng Cao:
 Hacker group identification based on dynamic heterogeneous graph node update. Appl. Soft Comput. 158: 111587 (2024)
 [j37]Hongyu Pan, Yong Fang [j37]Hongyu Pan, Yong Fang , Wenbo Guo, Yijia Xu , Wenbo Guo, Yijia Xu , Changhui Wang: , Changhui Wang:
 Few-shot graph classification on cross-site scripting attacks detection. Comput. Secur. 140: 103749 (2024)
 [j36]Kaiyang Wang [j36]Kaiyang Wang , Huaxin Deng , Huaxin Deng , Yijia Xu , Yijia Xu , Zhonglin Liu, Yong Fang , Zhonglin Liu, Yong Fang : :
 Multi-target label backdoor attacks on graph neural networks. Pattern Recognit. 152: 110449 (2024)
 [j35]Bo Yan [j35]Bo Yan , Cheng Yang , Cheng Yang , Chuan Shi , Chuan Shi , Yong Fang , Yong Fang , Qi Li , Qi Li , Yanfang Ye , Yanfang Ye , Junping Du , Junping Du : :
 Graph Mining for Cybersecurity: A Survey. ACM Trans. Knowl. Discov. Data 18(2): 47:1-47:52 (2024)
 [i5]Wenbo Guo, Chengwei Liu, Limin Wang, Jiahui Wu, Zhengzi Xu, Cheng Huang, Yong Fang, Yang Liu [i5]Wenbo Guo, Chengwei Liu, Limin Wang, Jiahui Wu, Zhengzi Xu, Cheng Huang, Yong Fang, Yang Liu : :
 PackageIntel: Leveraging Large Language Models for Automated Intelligence Extraction in Package Ecosystems. CoRR abs/2409.15049 (2024)
 [i4]Qinglin Qi, Yun Luo, Yijia Xu, Wenbo Guo, Yong Fang: [i4]Qinglin Qi, Yun Luo, Yijia Xu, Wenbo Guo, Yong Fang:
 SpearBot: Leveraging Large Language Models in a Generative-Critique Framework for Spear-Phishing Email Generation. CoRR abs/2412.11109 (2024)
- 2023
 [j34]Zhonglin Liu [j34]Zhonglin Liu , Yong Fang , Yong Fang , Cheng Huang , Cheng Huang , Yijia Xu , Yijia Xu : :
 MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model. Comput. Secur. 124: 103015 (2023)
 [j33]Yijia Xu [j33]Yijia Xu , Yong Fang , Yong Fang , Zhonglin Liu, Qiang Zhang , Zhonglin Liu, Qiang Zhang : :
 PWAGAT: Potential Web attacker detection based on graph attention network. Neurocomputing 557: 126725 (2023)
 [c18]Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu [c18]Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu : :
 An Empirical Study of Malicious Code In PyPI Ecosystem. ASE 2023: 166-177
 [i3]Bo Yan, Cheng Yang [i3]Bo Yan, Cheng Yang , Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du: , Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du:
 Graph Mining for Cybersecurity: A Survey. CoRR abs/2304.00485 (2023)
 [i2]Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang [i2]Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang , Yang Liu: , Yang Liu:
 An Empirical Study of Malicious Code In PyPI Ecosystem. CoRR abs/2309.11021 (2023)
- 2022
 [j32]Zhonglin Liu [j32]Zhonglin Liu , Yong Fang , Yong Fang , Cheng Huang, Jiaxuan Han: , Cheng Huang, Jiaxuan Han:
 GraphXSS: An efficient XSS payload detection approach based on graph convolutional network. Comput. Secur. 114: 102597 (2022)
 [j31]Yong Fang [j31]Yong Fang , Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang , Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang : :
 JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network. Comput. Secur. 118: 102715 (2022)
 [j30]Wenbo Guo [j30]Wenbo Guo , Yong Fang , Yong Fang , Cheng Huang , Cheng Huang , Haoran Ou, Chun Lin, Yongyan Guo: , Haoran Ou, Chun Lin, Yongyan Guo:
 HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network. Comput. Secur. 121: 102823 (2022)
 [j29]Yong Fang, Congshuang Wang, Zhiyang Fang, Cheng Huang: [j29]Yong Fang, Congshuang Wang, Zhiyang Fang, Cheng Huang:
 LMTracker: Lateral movement path detection based on heterogeneous graph embedding. Neurocomputing 474: 37-47 (2022)
 [j28]Yijia Xu [j28]Yijia Xu , Yong Fang , Yong Fang , Cheng Huang, Zhonglin Liu , Cheng Huang, Zhonglin Liu : :
 HGHAN: Hacker group identification based on heterogeneous graph attention network. Inf. Sci. 612: 848-863 (2022)
 [j27]Hongyu Pan, Yong Fang [j27]Hongyu Pan, Yong Fang , Cheng Huang, Wenbo Guo, Xuelin Wan: , Cheng Huang, Wenbo Guo, Xuelin Wan:
 GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks. KSII Trans. Internet Inf. Syst. 16(12): 4008-4023 (2022)
 [j26]Xiaole Liu, Cheng Huang, Yong Fang [j26]Xiaole Liu, Cheng Huang, Yong Fang : :
 DDIML: Explainable detection model for drive-by-download attacks. J. Intell. Fuzzy Syst. 43(3): 3429-3442 (2022)
 [j25]Xiao-Wang Wu, Yan Wang, Yong Fang [j25]Xiao-Wang Wu, Yan Wang, Yong Fang , Peng Jia: , Peng Jia:
 Embedding vector generation based on function call graph for effective malware detection and classification. Neural Comput. Appl. 34(11): 8643-8656 (2022)
 [c17]Zhonglin Liu [c17]Zhonglin Liu , Yong Fang , Yong Fang , Yijia Xu , Yijia Xu : :
 Cross-site Scripting Threat Intelligence Detection Based on Deep Learning. FCS 2022: 89-104
 [c16]Shaohua Wang, Yong Fang [c16]Shaohua Wang, Yong Fang , Yijia Xu , Yijia Xu , Yaxian Wang: , Yaxian Wang:
 Black-Box Adversarial Windows Malware Generation via United Puppet-based Dropper and Genetic Algorithm. HPCC/DSS/SmartCity/DependSys 2022: 653-662
 [c15]Yijia Xu [c15]Yijia Xu , Yong Fang , Yong Fang , Zhonglin Liu: , Zhonglin Liu:
 Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional Network. MSN 2022: 398-407
 [c14]Haoran Ou, Yong Fang [c14]Haoran Ou, Yong Fang , Yongyan Guo, Wenbo Guo, Cheng Huang: , Yongyan Guo, Wenbo Guo, Cheng Huang:
 Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites. RAID 2022: 409-430
- 2021
 [j24]Yong Fang [j24]Yong Fang , Yuchi Zhang, Cheng Huang: , Yuchi Zhang, Cheng Huang:
 CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network. Comput. J. 64(8): 1215-1225 (2021)
 [j23]Yong Fang [j23]Yong Fang , Kai Li, Rongfeng Zheng , Kai Li, Rongfeng Zheng , Shan Liao, Yue Wang: , Shan Liao, Yue Wang:
 A communication-channel-based method for detecting deeply camouflaged malicious traffic. Comput. Networks 197: 108297 (2021)
 [j22]Yong Fang [j22]Yong Fang , Xiangyu Zhou, Cheng Huang: , Xiangyu Zhou, Cheng Huang:
 Effective method for detecting malicious PowerShell scripts based on hybrid features☆. Neurocomputing 448: 30-39 (2021)
 [j21]Yong Fang [j21]Yong Fang , Shaoshuai Yang, Bin Zhao, Cheng Huang , Shaoshuai Yang, Bin Zhao, Cheng Huang : :
 Cyberbullying Detection in Social Networks Using Bi-GRU with Self-Attention Mechanism. Inf. 12(4): 171 (2021)
 [j20]Wenbo Guo [j20]Wenbo Guo , Cheng Huang, Weina Niu, Yong Fang , Cheng Huang, Weina Niu, Yong Fang : :
 Intelligent mining vulnerabilities in python code snippets. J. Intell. Fuzzy Syst. 41(2): 3615-3628 (2021)
 [j19]Yong Fang [j19]Yong Fang , Mingyu Xie, Cheng Huang , Mingyu Xie, Cheng Huang : :
 PBDT: Python Backdoor Detection Model Based on Combined Features. Secur. Commun. Networks 2021: 9923234:1-9923234:13 (2021)
 [j18]Wanping Liu, Zhoulan Zhang, Cheng Huang, Yong Fang [j18]Wanping Liu, Zhoulan Zhang, Cheng Huang, Yong Fang : :
 CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers. EAI Endorsed Trans. Security Safety 7(24): e5 (2021)
 [c13]Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo, Yong Fang [c13]Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo, Yong Fang , Cheng Huang: , Cheng Huang:
 No Pie in the Sky: The Digital Currency Fraud Website Detection. ICDF2C 2021: 176-193
- 2020
 [j17]Yong Fang [j17]Yong Fang , Wenjie Zhang , Wenjie Zhang , Beibei Li , Beibei Li , Fan Jing , Fan Jing , Lei Zhang , Lei Zhang : :
 Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API. IEEE Access 8: 2313-2326 (2020)
 [j16]Yong Fang [j16]Yong Fang , Yangchen Gao , Yangchen Gao , Fan Jing , Fan Jing , Lei Zhang , Lei Zhang : :
 Android Malware Familial Classification Based on DEX File Section Features. IEEE Access 8: 10614-10627 (2020)
 [j15]Gouheng Zhao [j15]Gouheng Zhao , Peng Jia, Cheng Huang , Peng Jia, Cheng Huang , Anmin Zhou, Yong Fang , Anmin Zhou, Yong Fang : :
 A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks. IEEE Access 8: 65462-65471 (2020)
 [j14]Yong Fang [j14]Yong Fang , Yue Yang, Cheng Huang: , Yue Yang, Cheng Huang:
 EmailDetective: An Email Authorship Identification And Verification Model. Comput. J. 63(11): 1775-1787 (2020)
 [j13]Yong Fang [j13]Yong Fang , Cheng Huang , Cheng Huang , Yu Su, Yaoyao Qiu: , Yu Su, Yaoyao Qiu:
 Detecting malicious JavaScript code based on semantic analysis. Comput. Secur. 93: 101764 (2020)
 [j12]Yong Fang [j12]Yong Fang , Cuirong Zhao, Cheng Huang, Liang Liu: , Cuirong Zhao, Cheng Huang, Liang Liu:
 SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods. Digit. Investig. 35: 300981 (2020)
 [j11]Fan Shi, Pengcheng Zhu, Xiangyu Zhou, Bintao Yuan, Yong Fang [j11]Fan Shi, Pengcheng Zhu, Xiangyu Zhou, Bintao Yuan, Yong Fang : :
 Network attack detection and visual payload labeling technology based on Seq2Seq architecture with attention mechanism. Int. J. Distributed Sens. Networks 16(4) (2020)
2010 – 2019
- 2019
 [j10]Yong Fang [j10]Yong Fang , Yusong Guo, Cheng Huang, Liang Liu: , Yusong Guo, Cheng Huang, Liang Liu:
 Analyzing and Identifying Data Breaches in Underground Forums. IEEE Access 7: 48770-48777 (2019)
 [j9]Yong Fang, Cheng Zhang, Cheng Huang, Liang Liu, Yue Yang: [j9]Yong Fang, Cheng Zhang, Cheng Huang, Liang Liu, Yue Yang:
 Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism. IEEE Access 7: 56329-56340 (2019)
 [j8]Luping Liu [j8]Luping Liu , Xiaohai He , Xiaohai He , Liang Liu, Lingbo Qing, Yong Fang , Liang Liu, Lingbo Qing, Yong Fang , Jiayong Liu: , Jiayong Liu:
 Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning. Appl. Soft Comput. 82 (2019)
 [j7]Yong Fang [j7]Yong Fang , Cheng Huang , Cheng Huang , Yijia Xu , Yijia Xu , Yang Li: , Yang Li:
 RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning. Future Internet 11(8): 177 (2019)
 [j6]Liang Liu, Cheng Huang, Yong Fang [j6]Liang Liu, Cheng Huang, Yong Fang , Zhenxue Wang: , Zhenxue Wang:
 Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium. KSII Trans. Internet Inf. Syst. 13(10): 5260-5275 (2019)
 [c12]Liang Liu, Cheng Huang, Yong Fang [c12]Liang Liu, Cheng Huang, Yong Fang , Zhenxue Wang: , Zhenxue Wang:
 Network Attack and Defense Effectiveness Evaluation Based on Dematel Method. ICAIS (3) 2019: 564-575
 [c11]Yong Fang [c11]Yong Fang , Yijia Xu , Yijia Xu , Cheng Huang, Liang Liu, Lei Zhang: , Cheng Huang, Liang Liu, Lei Zhang:
 Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. ICICT (2) 2019: 99-115
 [i1]Luping Liu, Xiaohai He, Liang Liu, Lingbo Qing, Yong Fang, Jiayong Liu: [i1]Luping Liu, Xiaohai He, Liang Liu, Lingbo Qing, Yong Fang, Jiayong Liu:
 Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with Machine learning. CoRR abs/1903.10208 (2019)
- 2018
 [j5]Yong Fang [j5]Yong Fang , Cheng Huang, Liang Liu, Min Xue: , Cheng Huang, Liang Liu, Min Xue:
 Research on Malicious JavaScript Detection Technology Based on LSTM. IEEE Access 6: 59118-59125 (2018)
 [j4]Fengping Rong, Yong Fang, Zheng Zuo, Liang Liu: [j4]Fengping Rong, Yong Fang, Zheng Zuo, Liang Liu:
 MACSPMD: 基于恶意API调用序列模式挖掘的恶意代码检测 (MACSPMD: Malicious API Call Sequential Pattern Mining Based Malware Detection). 计算机科学 45(5): 131-138 (2018)
 [j3]Zheng Zuo, Liang Liu, Lei Zhang, Yong Fang [j3]Zheng Zuo, Liang Liu, Lei Zhang, Yong Fang : :
 Indoor Positioning Based on Bluetooth Low-Energy Beacons Adopting Graph Optimization. Sensors 18(11): 3736 (2018)
 [c10]Handong Cui, Delu Huang, Yong Fang [c10]Handong Cui, Delu Huang, Yong Fang , Liang Liu, Cheng Huang: , Liang Liu, Cheng Huang:
 Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm. DSC 2018: 153-160
 [c9]Yong Fang [c9]Yong Fang , Yang Li, Liang Liu, Cheng Huang: , Yang Li, Liang Liu, Cheng Huang:
 DeepXSS: Cross Site Scripting Detection Based on Deep Learning. ICCAI 2018: 47-51
 [c8]Yong Fang [c8]Yong Fang , Yaoyao Qiu, Liang Liu, Cheng Huang: , Yaoyao Qiu, Liang Liu, Cheng Huang:
 Detecting Webshell Based on Random Forest with FastText. ICCAI 2018: 52-56
 [c7]Yong Fang [c7]Yong Fang , Xiao Long, Liang Liu, Cheng Huang: , Xiao Long, Liang Liu, Cheng Huang:
 DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN. ICCSP 2018: 10-15
 [c6]Yong Fang [c6]Yong Fang , Jiayi Peng, Liang Liu, Cheng Huang: , Jiayi Peng, Liang Liu, Cheng Huang:
 WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM. ICCSP 2018: 170-174
- 2017
 [c5]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang [c5]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang , Christopher Kruegel, Giovanni Vigna: , Christopher Kruegel, Giovanni Vigna:
 Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505
- 2016
 [j2]Cheng Huang, Jiayong Liu, Yong Fang [j2]Cheng Huang, Jiayong Liu, Yong Fang , Zheng Zuo: , Zheng Zuo:
 A study on Web security incidents in China by analyzing vulnerability disclosure platforms. Comput. Secur. 58: 47-62 (2016)
- 2015
 [j1]Qian Zhang, Rongjun Qin, Xin Huang [j1]Qian Zhang, Rongjun Qin, Xin Huang , Yong Fang , Yong Fang , Liang Liu: , Liang Liu:
 Classification of Ultra-High Resolution Orthophotos Combined with DSM Using a Dual Morphological Top Hat Profile. Remote. Sens. 7(12): 16422-16440 (2015)
 [c4]Peng Jia, Xiang He, Liang Liu, Binjie Gu, Yong Fang [c4]Peng Jia, Xiang He, Liang Liu, Binjie Gu, Yong Fang : :
 A framework for privacy information protection on Android. ICNC 2015: 1127-1131
 [c3]Binjie Gu, Yong Fang [c3]Binjie Gu, Yong Fang , Peng Jia, Liang Liu, Lei Zhang, Meilin Wang: , Peng Jia, Liang Liu, Lei Zhang, Meilin Wang:
 A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis. IIH-MSP 2015: 333-336
- 2014
 [c2]Yi Gong, Yong Fang [c2]Yi Gong, Yong Fang , Liang Liu, Juan Li: , Liang Liu, Juan Li:
 Multi-agent Intrusion Detection System Using Feature Selection Approach. IIH-MSP 2014: 528-531
- 2013
 [c1]Liang He, Yong Fang [c1]Liang He, Yong Fang , Liang Liu: , Liang Liu:
 Website Regional Rapid Security Detection Method. CICSyN 2013: 185-190
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-31 02:07 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







