default search action
Eunsuk Kang
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, PA, USA
- affiliation (former): University of California, Berkeley, Department of Electrical Engineering and Computer Sciences, CA, USA
- affiliation (former): Massachusetts Institute of Technology, Computer Science and Artificial Intelligence Laboratory, Cambridge, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Yuanfang Cai, Michel R. V. Chaudron, Eunsuk Kang, André van der Hoek:
Report on the 1st International Workshop on Designing Software (Designing 2024). ACM SIGSOFT Softw. Eng. Notes 49(3): 32-34 (2024) - [j17]Cole Vick, Eunsuk Kang, Stavros Tripakis:
Counterexample classification. Softw. Syst. Model. 23(2): 455-472 (2024) - [j16]Nianyu Li, Mingyue Zhang, Jialong Li, Sridhar Adepu, Eunsuk Kang, Zhi Jin:
A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems. ACM Trans. Auton. Adapt. Syst. 19(2): 12 (2024) - [c65]Mingyue Zhang, Jialong Li, Nianyu Li, Eunsuk Kang, Kenji Tei:
User-Driven Adaptation: Tailoring Autonomous Driving Systems with Dynamic Preferences. CHI Extended Abstracts 2024: 361:1-361:8 - [c64]Changjian Zhang, Parv Kapoor, Rômulo Meira-Góes, David Garlan, Eunsuk Kang, Akila Ganlath, Shatadal Mishra, Nejib Ammar:
Tolerance of Reinforcement Learning Controllers Against Deviations in Cyber Physical Systems. FM (2) 2024: 267-285 - [c63]Eunsuk Kang, Akila Ganlath, Shatadal Mishra, Florin Baiduc, Nejib Ammar:
Contract-Driven Runtime Adaptation. NFM 2024: 298-313 - [c62]Parv Kapoor, Eunsuk Kang, Rômulo Meira-Góes:
Safe Planning Through Incremental Decomposition of Signal Temporal Logic Specifications. NFM 2024: 377-396 - [c61]Simon Chu, Justin Koe, David Garlan, Eunsuk Kang:
Integrating Graceful Degradation and Recovery through Requirement-driven Adaptation. SEAMS@ICSE 2024: 122-132 - [c60]Saloni Sinha, Eunsuk Kang:
Formal Modeling and Analysis of Apache Kafka in Alloy 6. ABZ 2024: 25-42 - [i19]Simon Chu, Justin Koe, David Garlan, Eunsuk Kang:
Integrating Graceful Degradation and Recovery through Requirement-driven Adaptation. CoRR abs/2401.09678 (2024) - [i18]Mingyue Zhang, Jialong Li, Nianyu Li, Eunsuk Kang, Kenji Tei:
User-Driven Adaptation: Tailoring Autonomous Driving Systems with Dynamic Preferences. CoRR abs/2403.02928 (2024) - [i17]Parv Kapoor, Eunsuk Kang, Rômulo Meira-Góes:
Safe Planning through Incremental Decomposition of Signal Temporal Logic Specifications. CoRR abs/2403.10554 (2024) - [i16]Changjian Zhang, Parv Kapoor, Eunsuk Kang, Romulo Meira Goes, David Garlan, Akila Ganlath, Shatadal Mishra, Nejib Ammar:
Tolerance of Reinforcement Learning Controllers against Deviations in Cyber Physical Systems. CoRR abs/2406.17066 (2024) - [i15]Ian Dardik, April Porter, Eunsuk Kang:
Recomposition: A New Technique for Efficient Compositional Verification. CoRR abs/2408.03488 (2024) - [i14]Eunsuk Kang, Mary Shaw:
tl;dr: Chill, y'all: AI Will Not Devour SE. CoRR abs/2409.00764 (2024) - 2023
- [j15]BaekGyu Kim, Eunsuk Kang:
Toward Large-Scale Test for Certifying Autonomous Driving Software in Collaborative Virtual Environment. IEEE Access 11: 72641-72654 (2023) - [j14]Rômulo Meira-Góes, Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
On tolerance of discrete systems with respect to transition perturbations. Discret. Event Dyn. Syst. 33(4): 395-424 (2023) - [j13]Yi-Ting Hsieh, Tzu-Tao Chang, Chen-Jun Tsai, Shih-Lun Wu, Ching-Yuan Bai, Kai-Chieh Chang, Chung-Wei Lin, Eunsuk Kang, Chao Huang, Qi Zhu:
System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints. ACM Trans. Cyber Phys. Syst. 7(3): 21:1-21:28 (2023) - [c59]Rômulo Meira-Góes, Ian Dardik, Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
Safe Environmental Envelopes of Discrete Systems. CAV (1) 2023: 326-350 - [c58]Changjian Zhang, Ian Dardik, Rômulo Meira-Góes, David Garlan, Eunsuk Kang:
Fortis: A Tool for Analysis and Repair of Robust Software Systems. FMCAD 2023: 1-9 - [c57]Chun Yong Chong, Eunsuk Kang, Mary Shaw:
Open Design Case Study - A Crowdsourcing Effort to Curate Software Design Case Studies. SEET@ICSE 2023: 23-28 - [c56]Changjian Zhang, Tarang Saluja, Rômulo Meira-Góes, Matthew L. Bolton, David Garlan, Eunsuk Kang:
Robustification of Behavioral Designs against Environmental Deviations. ICSE 2023: 423-434 - [c55]Niloofar Mansoor, Hamid Bagheri, Eunsuk Kang, Bonita Sharif:
An Empirical Study Assessing Software Modeling in Alloy. FormaliSE 2023: 44-54 - [c54]Sumon Biswas, Yining She, Eunsuk Kang:
Towards Safe ML-Based Systems in Presence of Feedback Loops. SE4SafeML@SIGSOFT FSE 2023: 18-21 - [c53]Simon Chu, Emma Shedden, Changjian Zhang, Rômulo Meira-Góes, Gabriel A. Moreno, David Garlan, Eunsuk Kang:
Runtime Resolution of Feature Interactions through Adaptive Requirement Weakening. SEAMS 2023: 115-125 - [c52]Nianyu Li, Mingyue Zhang, Jialong Li, Eunsuk Kang, Kenji Tei:
Preference Adaptation: user satisfaction is all you need! SEAMS 2023: 133-144 - [c51]Matthew L. Bolton, Svetlana Riabova, Yeonbin Son, Eunsuk Kang:
Negative Transfer in Task-Based Human Reliability Analysis: A Formal Methods Approach. SMC 2023: 5249-5254 - [c50]Alcino Cunha, Nuno Macedo, Eunsuk Kang:
Task Model Design and Analysis with Alloy. ABZ 2023: 303-320 - [i13]Chun Yong Chong, Eunsuk Kang, Mary Shaw:
Open Design Case Study - A Crowdsourcing Effort to Curate Software Design Case Studies. CoRR abs/2301.05069 (2023) - [i12]Rômulo Meira-Góes, Ian Dardik, Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
Safe Environmental Envelopes of Discrete Systems. CoRR abs/2306.01025 (2023) - [i11]Simon Chu, Emma Shedden, Changjian Zhang, Rômulo Meira-Góes, Gabriel A. Moreno, David Garlan, Eunsuk Kang:
Runtime Resolution of Feature Interactions through Adaptive Requirement Weakening. CoRR abs/2310.18217 (2023) - [i10]Changjian Zhang, Parv Kapoor, Romulo Meira Goes, David Garlan, Eunsuk Kang, Akila Ganlath, Shatadal Mishra, Nejib Ammar:
Investigating Robustness in Cyber-Physical Systems: Specification-Centric Analysis in the face of System Deviations. CoRR abs/2311.07462 (2023) - 2022
- [j12]Sven Apel, Christian Kästner, Eunsuk Kang:
Feature Interactions on Steroids: On the Composition of ML Models. IEEE Softw. 39(3): 120-124 (2022) - [j11]Sridhar Adepu, Nianyu Li, Eunsuk Kang, David Garlan:
Modeling and Analysis of Explanation for Secure Industrial Control Systems. ACM Trans. Auton. Adapt. Syst. 17(3-4): 1-26 (2022) - [c49]Sune Chung Jepsen, Torben Worm, Eunsuk Kang:
Reconfigurability For Industry 4.0 Middleware Software Architectures. COINS 2022: 1-8 - [c48]Tzu-Han Hsu, Borzoo Bonakdarpour, Eunsuk Kang, Stavros Tripakis:
Mapping Synthesis for Hyperproperties. CSF 2022: 486-500 - [c47]Eunsuk Kang, Rômulo Meira-Góes:
Requirements Engineering for Feedback Loops in Software-Intensive Systems. RE Workshops 2022: 2-5 - 2021
- [j10]Jongkil Jay Jeong, Gillian C. Oliver, Eunsuk Kang, Sadie Creese, Peter Thomas:
The current state of research on people, culture and cybersecurity. Pers. Ubiquitous Comput. 25(5): 809-812 (2021) - [j9]Matthew L. Bolton, Xi Zheng, Eunsuk Kang:
A formal method for including the probability of erroneous human task behavior in system analyses. Reliab. Eng. Syst. Saf. 213: 107764 (2021) - [c46]Maria Casimiro, Paolo Romano, David Garlan, Gabriel A. Moreno, Eunsuk Kang, Mark Klein:
Self-Adaptation for Machine Learning Based Systems. ECSA (Companion) 2021 - [c45]Maria Casimiro, Paolo Romano, David Garlan, Gabriel A. Moreno, Eunsuk Kang, Mark Klein:
Self-adaptive Machine Learning Systems: Research Challenges and Opportunities. ECSA (Tracks and Workshops) 2021: 133-155 - [c44]Nianyu Li, Mingyue Zhang, Eunsuk Kang, David Garlan:
Engineering Secure Self-Adaptive Systems with Bayesian Games. FASE 2021: 130-151 - [c43]Yutong Wu, Renzhi Tang, Eunsuk Kang, Zhihao Jiang:
Model-based clinical assist system for cardiac ablation. ICCPS 2021: 110-120 - [c42]Eunsuk Kang:
The Role of Environmental Deviations in Engineering Robust Systems. RE Workshops 2021: 435-438 - [c41]Cole Vick, Eunsuk Kang, Stavros Tripakis:
Counterexample Classification. SEFM 2021: 312-331 - [c40]Changjian Zhang, Ryan Wagner, Pedro Orvalho, David Garlan, Vasco Manquinho, Ruben Martins, Eunsuk Kang:
AlloyMax: bringing maximum satisfaction to relational specifications. ESEC/SIGSOFT FSE 2021: 155-167 - [d1]Rômulo Meira-Góes, Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
Artifact for Paper: On tolerance of discrete systems with respect to transition perturbations. Zenodo, 2021 - [i9]Christian Kästner, Eunsuk Kang, Sven Apel:
Feature Interactions on Steroids: On the Composition of ML Models. CoRR abs/2105.06449 (2021) - [i8]Cole Vick, Eunsuk Kang, Stavros Tripakis:
Counterexample Classification. CoRR abs/2108.00885 (2021) - [i7]Rômulo Meira-Góes, Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
On tolerance of discrete systems with respect to transition perturbations. CoRR abs/2110.04200 (2021) - [i6]Mingyue Zhang, Nianyu Li, Sridhar Adepu, Eunsuk Kang, Zhi Jin:
A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems. CoRR abs/2112.07588 (2021) - 2020
- [j8]Rômulo Meira-Góes, Eunsuk Kang, Raymond H. Kwong, Stéphane Lafortune:
Synthesis of sensor deception attacks at the supervisory layer of Cyber-Physical Systems. Autom. 121: 109172 (2020) - [j7]Hokeun Kim, Eunsuk Kang, David Broman, Edward A. Lee:
Resilient Authentication and Authorization for the Internet of Things (IoT) Using Edge Computing. ACM Trans. Internet Things 1(1): 4:1-4:27 (2020) - [j6]Muhammed O. Sayin, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Tamer Basar:
Reliable Smart Road Signs. IEEE Trans. Intell. Transp. Syst. 21(12): 4995-5009 (2020) - [c39]Christian Kästner, Eunsuk Kang:
Teaching software engineering for AI-enabled systems. ICSE (SEET) 2020: 45-48 - [c38]Hamid Bagheri, Eunsuk Kang, Niloofar Mansoor:
Synthesis of assurance cases for software certification. ICSE (NIER) 2020: 61-64 - [c37]Nianyu Li, Sridhar Adepu, Eunsuk Kang, David Garlan:
Explanations for human-on-the-loop: a probabilistic model checking approach. SEAMS@ICSE 2020: 181-187 - [c36]Benjamin Gafford, Tobias Dürschmid, Gabriel A. Moreno, Eunsuk Kang:
Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems. ASE 2020: 1090-1102 - [c35]Maryam Bagheri, Edward A. Lee, Eunsuk Kang, Marjan Sirjani, Ehsan Khamespanah, Ali Movaghar:
Lightweight Formal Method for Robust Routing in Track-based Traffic Control Systems. MEMOCODE 2020: 1-10 - [c34]Weichao Zhou, Ruihan Gao, BaekGyu Kim, Eunsuk Kang, Wenchao Li:
Runtime-Safety-Guided Policy Repair. RV 2020: 131-150 - [c33]Shih-Lun Wu, Ching-Yuan Bai, Kai-Chieh Chang, Yi-Ting Hsieh, Chao Huang, Chung-Wei Lin, Eunsuk Kang, Qi Zhu:
Efficient System Verification with Multiple Weakly-Hard Constraints for Runtime Monitoring. RV 2020: 497-516 - [c32]Changjian Zhang, David Garlan, Eunsuk Kang:
A behavioral notion of robustness for software systems. ESEC/SIGSOFT FSE 2020: 1-12 - [i5]Christian Kästner, Eunsuk Kang:
Teaching Software Engineering for AI-Enabled Systems. CoRR abs/2001.06691 (2020) - [i4]Romulo Meira Goes, Eunsuk Kang, Raymond H. Kwong, Stéphane Lafortune:
Synthesis of Sensor Deception Attacks at the Supervisory Layer of Cyber-Physical Systems. CoRR abs/2008.01497 (2020) - [i3]Weichao Zhou, Ruihan Gao, BaekGyu Kim, Eunsuk Kang, Wenchao Li:
Runtime-Safety-Guided Policy Repair. CoRR abs/2008.07667 (2020)
2010 – 2019
- 2019
- [j5]Aleksandar Milicevic, Joseph P. Near, Eunsuk Kang, Daniel Jackson:
Alloy*: a general-purpose higher-order relational constraint solver. Formal Methods Syst. Des. 55(1): 1-32 (2019) - [c31]Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
Automated Synthesis of Secure Platform Mappings. CAV (1) 2019: 219-237 - [c30]Chanwook Oh, Eunsuk Kang, Shinichi Shiraishi, Pierluigi Nuzzo:
Optimizing Assume-Guarantee Contracts for Cyber-Physical System Design. DATE 2019: 246-251 - [c29]Tobias Dürschmid, Eunsuk Kang, David Garlan:
Trade-off-oriented development: making quality attribute trade-offs first-class. ICSE (NIER) 2019: 109-112 - [c28]Sridhar Adepu, Eunsuk Kang, Aditya P. Mathur:
Challenges in Secure Engineering of Critical Infrastructure Systems. ASE Workshops 2019: 61-64 - [c27]Huiye Liu, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Douglas M. Blough:
A Byzantine-Tolerant Distributed Consensus Algorithm for Connected Vehicles Using Proof-of-Eligibility. MSWiM 2019: 225-234 - [i2]Muhammed O. Sayin, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Tamer Basar:
A Game Theoretical Error-Correction Framework for Secure Traffic-Sign Classification. CoRR abs/1901.10622 (2019) - 2018
- [j4]Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
A formal approach for detection of security flaws in the android permission system. Formal Aspects Comput. 30(5): 525-544 (2018) - [j3]Jianye Hao, Eunsuk Kang, Jun Sun, Zan Wang, Zhaopeng Meng, Xiaohong Li, Zhong Ming:
An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers. IEEE Trans. Smart Grid 9(4): 2398-2408 (2018) - [c26]Kosuke Watanabe, Eunsuk Kang, Chung-Wei Lin, Shinichi Shiraishi:
Runtime monitoring for safety of intelligent vehicles. DAC 2018: 31:1-31:6 - [c25]Hengyi Liang, Matthew Jagielski, Bowen Zheng, Chung-Wei Lin, Eunsuk Kang, Shinichi Shiraishi, Cristina Nita-Rotaru, Qi Zhu:
Network and system level security in connected vehicle applications. ICCAD 2018: 94 - [c24]BaekGyu Kim, Chung-Wei Lin, Eunsuk Kang, Nobuyuki Tomatsu, Shinichi Shiraishi:
Platform-Independent QoS Parameters and Primitive APIs for Automotive Software. ITSC 2018: 98-104 - [c23]Íñigo Íncer Romeo, Alberto L. Sangiovanni-Vincentelli, Chung-Wei Lin, Eunsuk Kang:
Quotient for Assume-Guarantee Contracts. MEMOCODE 2018: 67-77 - [c22]Ximing Chen, Eunsuk Kang, Shinichi Shiraishi, Victor M. Preciado, Zhihao Jiang:
Digital Behavioral Twins for Safe Connected Cars. MoDELS 2018: 144-153 - [c21]Santhana Gopalan Raghavan, Kosuke Watanabe, Eunsuk Kang, Chung-Wei Lin, Zhihao Jiang, Shinichi Shiraishi:
Property-Driven Runtime Resolution of Feature Interactions. RV 2018: 316-333 - [c20]Thomas Chowdhury, Eric Lesiuta, Kerianne Rikley, Chung-Wei Lin, Eunsuk Kang, BaekGyu Kim, Shinichi Shiraishi, Mark Lawford, Alan Wassyng:
Safe and Secure Automotive Over-the-Air Updates. SAFECOMP 2018: 172-187 - 2017
- [j2]Tomás Bures, Danny Weyns, Bradley R. Schmerl, Eduardo Tovar, Eric Boden, Thomas Gabor, Ilias Gerostathopoulos, Pragya Gupta, Eunsuk Kang, Alessia Knauss, Pankesh Patel, Awais Rashid, Ivan Ruchkin, Roykrong Sukkerd, Christos Tsigkanos:
Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions. ACM SIGSOFT Softw. Eng. Notes 42(2): 19-24 (2017) - [c19]Romulo Meira Goes, Eunsuk Kang, Raymond H. Kwong, Stéphane Lafortune:
Stealthy deception attacks for cyber-physical systems. CDC 2017: 4224-4230 - [c18]Hokeun Kim, Eunsuk Kang, Edward A. Lee, David Broman:
A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things. IoTDI 2017: 147-158 - [c17]Hokeun Kim, Eunsuk Kang, David Broman, Edward A. Lee:
An Architectural Mechanism for Resilient IoT Services. SafeThings@SenSys 2017: 8-13 - [i1]Eunsuk Kang, Stéphane Lafortune, Stavros Tripakis:
Synthesis of Property-Preserving Mappings. CoRR abs/1705.03618 (2017) - 2016
- [b1]Eunsuk Kang:
Multi-representational security modeling and analysis. Massachusetts Institute of Technology, Cambridge, MA, USA, 2016 - [c16]Eunsuk Kang, Sridhar Adepu, Daniel Jackson, Aditya P. Mathur:
Model-based security analysis of a water treatment system. SEsCPS@ICSE 2016: 22-28 - [c15]Eunsuk Kang:
Design Space Exploration for Security. SecDev 2016: 30-36 - [c14]Jianye Hao, Eunsuk Kang, Jun Sun, Daniel Jackson:
Designing minimal effective normative systems with the help of lightweight formal methods. SIGSOFT FSE 2016: 50-60 - [c13]Eunsuk Kang, Aleksandar Milicevic, Daniel Jackson:
Multi-representational security analysis. SIGSOFT FSE 2016: 181-192 - 2015
- [c12]Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification. FM 2015: 73-89 - [c11]Aleksandar Milicevic, Joseph P. Near, Eunsuk Kang, Daniel Jackson:
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver. ICSE (1) 2015: 609-619 - 2014
- [c10]Jianye Hao, Eunsuk Kang, Daniel Jackson, Jun Sun:
Adaptive Defending Strategy for Smart Grid Attacks. SEGS@CCS 2014: 23-30 - 2011
- [c9]Joseph P. Near, Aleksandar Milicevic, Eunsuk Kang, Daniel Jackson:
A lightweight code analysis and its role in evaluation of a dependability case. ICSE 2011: 31-40 - 2010
- [c8]Daniel Jackson, Eunsuk Kang:
A Structure for Dependability Arguments. ASM 2010: 1 - [c7]Ethan K. Jackson, Eunsuk Kang, Markus Dahlweid, Dirk Seifert, Thomas Santen:
Components, platforms and possibilities: towards generic automation for MDA. EMSOFT 2010: 39-48 - [c6]Eunsuk Kang, Ethan K. Jackson, Wolfram Schulte:
An Approach for Effective Design Space Exploration. Monterey Workshop 2010: 33-54 - [c5]Eunsuk Kang, Daniel Jackson:
Patterns for building dependable systems with trusted bases. PLoP 2010: 19:1-19:14 - [c4]Eunsuk Kang, Daniel Jackson:
Dependability Arguments with Trusted Bases. RE 2010: 262-271 - [c3]Daniel Jackson, Eunsuk Kang:
Separation of concerns for dependable software design. FoSER 2010: 173-176
2000 – 2009
- 2009
- [j1]Eunsuk Kang, Daniel Jackson:
Designing and Analyzing a Flash File System with Alloy. Int. J. Softw. Informatics 3(2-3): 129-148 (2009) - 2008
- [c2]Eunsuk Kang, Daniel Jackson:
Formal Modeling and Analysis of a Flash Filesystem in Alloy. ABZ 2008: 294-308 - 2007
- [c1]Eunsuk Kang, Mark D. Aagaard:
Improving the Usability of HOL Through Controlled Automation Tactics. TPHOLs 2007: 157-172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint