
Ting Liu 0002
Person information
- affiliation (PhD 2010): Xi'an Jiaotong University, School of Electronic and Information Engineering, MOEKLINNS, China
Other persons with the same name
- Ting Liu — disambiguation page
- Ting Liu 0001 — Harbin Institute of Technology, Research Center for Social Computing and Information Retrieval, China (and 1 more)
- Ting Liu 0003 — State University of New York at Albany, NY, USA
- Ting Liu 0004 — AUG Signals Ltd., Toronto, ON, Canada
- Ting Liu 0005
— Google, Inc. (and 1 more)
- Ting Liu 0006 — Carnegie Mellon University, School of Computer Science, Pittsburgh, PA, USA
- Ting Liu 0007 — Henri Poincaré University, Nancy, France
- Ting Liu 0008
— Harbin Institute of Technology, Department of Control Science and Engineering, China
- Ting Liu 0009 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Ting Liu 0010
— Chinese Academy of Sciences, Academy of Mathematics and Systems Sciences, Key Laboratory of Systems and Control, Beijing, China
- Ting Liu 0011
— Beijing University of Posts and Telecommunications, School of Electronic Engineering, Beijing, China
- Ting Liu 0012
— Beijing Jiaotong University, Institute of Information Science, Beijing, China
- Ting Liu 0013
— Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Ting Liu 0014
— Guangdong University of Technology, Department of Communication Engineering, Guangzhou, China
- Ting Liu 0015 — Tianjin University, Department of Management and Economics, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j30]Ming Fan
, Wenying Wei, Xiaofei Xie, Yang Liu
, Xiaohong Guan, Ting Liu
:
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis. IEEE Trans. Inf. Forensics Secur. 16: 838-853 (2021) - [j29]Yu Qu
, Qinghua Zheng, Jianlei Chi, Yangxu Jin, Ancheng He, Di Cui, Hengshan Zhang, Ting Liu
:
Using K-core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance. IEEE Trans. Software Eng. 47(2): 348-366 (2021) - 2020
- [j28]Jianlei Chi, Yu Qu
, Qinghua Zheng, Zijiang Yang, Wuxia Jin, Di Cui, Ting Liu:
Relation-based test case prioritization for regression testing. J. Syst. Softw. 163: 110539 (2020) - [j27]Yang Liu
, Ting Liu
, Hong Sun, Kehuan Zhang, Pengfei Liu:
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids. IEEE Trans. Inf. Forensics Secur. 15: 2453-2468 (2020) - [j26]Ming Fan
, Xiapu Luo
, Jun Liu, Chunyin Nong
, Qinghua Zheng, Ting Liu
:
CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis. IEEE Trans. Reliab. 69(1): 124-138 (2020) - [j25]Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Yu Hao, Pei Liu, Ting Liu:
Tell You a Definite Answer: Whether Your Data is Tainted During Thread Scheduling. IEEE Trans. Software Eng. 46(9): 916-931 (2020) - [j24]Jue Tian
, Rui Tan
, Xiaohong Guan, Zhanbo Xu, Ting Liu:
Moving Target Defense Approach to Detecting Stuxnet-Like Attacks. IEEE Trans. Smart Grid 11(1): 291-300 (2020) - [c54]Yujie Yang, Yadong Zhou, Jiang Wu, Zhanbo Xu, Xiaohong Guan, Wei Chen, Ting Liu:
A Dynamic Cascading Failure Model Integrating Relay Protection in Power Grid. CASE 2020: 1331-1336 - [c53]Jiaqi Guo, Qian Liu, Jian-Guang Lou, Zhenwen Li, Xueqing Liu, Tao Xie, Ting Liu:
Benchmarking Meaning Representations in Neural Semantic Parsing. EMNLP (1) 2020: 1520-1540 - [c52]Wuxia Jin, Yuanfang Cai, Rick Kazman, Gang Zhang, Qinghua Zheng, Ting Liu:
Exploring the Architectural Impact of Possible Dependencies in Python Software. ASE 2020: 758-770 - [c51]Ang Jia, Ming Fan, Xi Xu, Di Cui, Wenying Wei, Zijiang Yang, Kai Ye, Ting Liu:
From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies? MSR 2020: 288-299 - [i4]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models. CoRR abs/2006.14871 (2020) - [i3]Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu:
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis. CoRR abs/2008.05895 (2020) - [i2]Jianlei Chi, Yu Qu, Ting Liu, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning. CoRR abs/2010.10805 (2020)
2010 – 2019
- 2019
- [j23]Jue Tian
, Rui Tan
, Xiaohong Guan, Ting Liu:
Enhanced Hidden Moving Target Defense in Smart Grids. IEEE Trans. Smart Grid 10(2): 2208-2223 (2019) - [c50]Yadong Zhou, Xukun Wang, Zhanbo Xu, Ying Su, Ting Liu, Chao Shen, Xiaohong Guan:
A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment. CASE 2019: 739-744 - [c49]Hengshan Zhang, Qinghua Zheng, Zhongmin Wang, Yanping Chen, Ting Liu, Tianhua Chen
:
Method Selecting Correct One Among Alternatives Utilizing Intuitionistic Fuzzy Preference Relation Without Consensus Reaching Process. FUZZ-IEEE 2019: 1-6 - [c48]Wuxia Jin, Yuanfang Cai, Rick Kazman, Qinghua Zheng, Di Cui, Ting Liu:
ENRE: a tool framework for extensible eNtity relation extraction. ICSE (Companion Volume) 2019: 67-70 - [c47]Chunyin Nong, Qiao Zhang, Liguo Huang, Di Cui, Qinghua Zheng, Ting Liu:
FVT: a fragmented video tutor for "dubbing" software development tutorials. ICSE (SEET) 2019: 95-99 - [c46]Di Cui, Ting Liu, Yuanfang Cai, Qinghua Zheng, Qiong Feng, Wuxia Jin, Jiaqi Guo, Yu Qu
:
Investigating the impact of multiple dependency structures on software defects. ICSE 2019: 584-595 - [c45]Ming Fan, Xiapu Luo, Jun Liu, Meng Wang, Chunyin Nong, Qinghua Zheng, Ting Liu:
Graph embedding based familial analysis of Android malware using unsupervised learning. ICSE 2019: 771-782 - [c44]Jiaqi Guo, Shuyue Li, Jian-Guang Lou, Zijiang Yang, Ting Liu:
Sara: self-replay augmented record and replay for Android in industrial cases. ISSTA 2019: 90-100 - [c43]Qiong Feng, Yuanfang Cai, Rick Kazman, Di Cui, Ting Liu, Hongzhou Fang:
Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation. ASE 2019: 986-997 - [c42]Haijun Wang, Xiaofei Xie, Shang-Wei Lin
, Yun Lin, Yuekang Li, Shengchao Qin, Yang Liu, Ting Liu:
Locating vulnerabilities in binaries via memory layout recovering. ESEC/SIGSOFT FSE 2019: 718-728 - [i1]Ting Liu, Yao Sun:
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach. IACR Cryptol. ePrint Arch. 2019: 248 (2019) - 2018
- [j22]Xiaodong Zhang
, Zijiang Yang, Qinghua Zheng, Yu Hao, Pei Liu, Lechen Yu, Ting Liu
:
Debugging Multithreaded Programs as if They Were Sequential. IEEE Access 6: 40024-40040 (2018) - [j21]Zijiang Yang, Ting Liu, Daniel Xiapu Luo, Chao Wang:
Guest editorial: special issue on concurrent software quality. Softw. Qual. J. 26(3): 851-853 (2018) - [j20]Wuxia Jin, Ting Liu, Yu Qu
, Qinghua Zheng, Di Cui, Jianlei Chi:
Dynamic structure measurement for distributed software. Softw. Qual. J. 26(3): 1119-1145 (2018) - [j19]Ming Fan
, Jun Liu, Xiapu Luo
, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu
:
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 13(8): 1890-1905 (2018) - [j18]Zhenzhou Tian
, Ting Liu, Qinghua Zheng, Eryue Zhuang, Ming Fan, Zijiang Yang:
Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection. IEEE Trans. Software Eng. 44(5): 491-511 (2018) - [c41]Jingyao Fan, Youssef Khazbak, Jue Tian, Ting Liu, Guohong Cao:
Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid. CNS 2018: 1-9 - [c40]Pengfei Liu, Ting Liu:
Physical Intrusion Detection for Industrial Control System. CNS 2018: 1-2 - [c39]Yifei Xu, Ting Liu, Pengfei Liu, Hong Sun:
A Search-based Firmware Code Analysis Method for IoT Devices. CNS 2018: 1-2 - [c38]Jianlei Chi, Yu Qu
, Qinghua Zheng, Zijiang Yang, Wuxia Jin, Di Cui, Ting Liu:
Test Case Prioritization Based on Method Call Sequences. COMPSAC (1) 2018: 251-256 - [c37]Yangxu Jin, Ting Liu, Ancheng He, Yu Qu
, Jianlei Chi:
Android Malware Detector Exploiting Convolutional Neural Network and Adaptive Classifier Selection. COMPSAC (1) 2018: 833-834 - [c36]Hengshan Zhang, Qinghua Zheng, Zhongmin Wang, Yanping Chen, Yu Qu
, Ting Liu:
Crowd Intelligence for Decision Making Based on Positive and Negative Comparing With Linguistic Scale. FUZZ-IEEE 2018: 1-8 - [c35]Wuxia Jin, Ting Liu, Qinghua Zheng, Di Cui, Yuanfang Cai:
Functionality-Oriented Microservice Extraction Based on Execution Trace Clustering. ICWS 2018: 211-218 - [c34]Yu Qu
, Ting Liu, Jianlei Chi, Yangxu Jin, Di Cui, Ancheng He, Qinghua Zheng:
node2defect: using network embedding to improve software defect prediction. ASE 2018: 844-849 - 2017
- [j17]Yadong Zhou
, Dae Wook Kim, Junjie Zhang, Lili Liu, Huan Jin, Hongbo Jin, Ting Liu:
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions. IEEE Access 5: 1990-1999 (2017) - [j16]Ting Liu
, Jue Tian, Yuhong Gui, Yang Liu, Pengfei Liu:
SEDEA: State Estimation-Based Dynamic Encryption and Authentication in Smart Grid. IEEE Access 5: 15682-15693 (2017) - [j15]Siyun Chen, Ting Liu, Feng Gao, Jianting Ji, Zhanbo Xu, Buyue Qian, Hongyu Wu, Xiaohong Guan:
Butler, Not Servant: A Human-Centric Smart Home Energy Management System. IEEE Commun. Mag. 55(2): 27-33 (2017) - [j14]Yadong Zhou, Beibei Zhang, Xiaoxiao Sun, Qinghua Zheng, Ting Liu:
Analyzing and modeling dynamics of information diffusion in microblogging social network. J. Netw. Comput. Appl. 86: 92-102 (2017) - [j13]Ming Fan
, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian, Ting Liu
:
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 12(8): 1772-1785 (2017) - [j12]Haijun Wang, Ting Liu
, Xiaohong Guan, Chao Shen
, Qinghua Zheng, Zijiang Yang:
Dependence Guided Symbolic Execution. IEEE Trans. Software Eng. 43(3): 252-271 (2017) - [c33]Siyun Chen, Feng Gao, Ting Liu:
Load identification based on Factorial Hidden Markov Model and online performance analysis. CASE 2017: 1249-1253 - [c32]Jue Tian, Rui Tan, Xiaohong Guan, Ting Liu:
Hidden Moving Target Defense in Smart Grids. SPSR-SG@CPSWeek 2017: 21-26 - [c31]Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Pei Liu, Jialiang Chang, Yu Hao, Ting Liu:
Automated Testing of Definition-Use Data Flow for Multithreaded Programs. ICST 2017: 172-183 - 2016
- [j11]Zhenzhou Tian
, Ting Liu, Qinghua Zheng, Ming Fan, Eryue Zhuang, Zijiang Yang:
Exploiting thread-related system calls for plagiarism detection of multithreaded programs. J. Syst. Softw. 119: 136-148 (2016) - [j10]Hengshan Zhang, Qinghua Zheng, Ting Liu, Zijiang Yang, Minnan Luo, Yu Qu
:
Improving Linguistic Pairwise Comparison Consistency via Linguistic Discrete Regions. IEEE Trans. Fuzzy Syst. 24(3): 600-614 (2016) - [c30]Jianting Ji, Ting Liu, Chao Shen
, Hongyu Wu
, Wenyi Liu, Man Su, Siyun Chen, Zhanpei Jia:
A human-centered smart home system with wearable-sensor behavior analysis. CASE 2016: 1112-1117 - [c29]Hengshan Zhang, Qinghua Zheng, Ting Liu, Yu Qu
:
Mixed Intuitionistic Fuzzy Aggregation Operators decreasing results of unusual IFNs. FUZZ-IEEE 2016: 896-903 - [c28]Zhenzhou Tian, Ting Liu, Qinghua Zheng, Feifei Tong, Ming Fan, Zijiang Yang:
A new thread-aware birthmark for plagiarism detection of multithreaded programs. ICSE (Companion Volume) 2016: 734-736 - [c27]Ming Fan, Jun Liu, Xiapu Luo
, Kai Chen, Tianyi Chen, Zhenzhou Tian, Xiaodong Zhang, Qinghua Zheng, Ting Liu:
Frequent Subgraph Based Familial Classification of Android Malware. ISSRE 2016: 24-35 - [c26]Wuxia Jin, Ting Liu, Yu Qu
, Jianlei Chi, Di Cui, Qinghua Zheng:
Dynamic cohesion measurement for distributed system. SCTDCP@ASE 2016: 20-26 - [c25]Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Yu Hao, Pei Liu, Lechen Yu
, Ming Fan, Ting Liu:
Debugging Multithreaded Programs as if They Were Sequential. SATE 2016: 78-83 - [e1]Zijiang Yang, Ting Liu, Daniel Xiapu Luo:
Proceedings of the 1st International Workshop on Specification, Comprehension, Testing, and Debugging of Concurrent Programs, SCTDCP@ASE 2016, Singapore, Singapore, September 3, 2016. ACM 2016, ISBN 978-1-4503-4510-1 [contents] - 2015
- [j9]Ting Liu, Yanan Sun, Yang Liu, Yuhong Gui, Yucheng Zhao, Dai Wang, Chao Shen
:
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection. Future Gener. Comput. Syst. 49: 94-103 (2015) - [j8]Yu Qu
, Xiaohong Guan, Qinghua Zheng, Ting Liu, Lidan Wang, Yuqiao Hou, Zijiang Yang:
Exploring community structure of software Call Graph and its applications in class cohesion measurement. J. Syst. Softw. 108: 193-210 (2015) - [j7]Yu Qu
, Xiaohong Guan, Qinghua Zheng, Ting Liu, Jianliang Zhou, Jian Li:
Calling Network: A New Method for Modeling Software Runtime Behaviors. ACM SIGSOFT Softw. Eng. Notes 40(1): 1-8 (2015) - [j6]Zhenzhou Tian, Qinghua Zheng, Ting Liu, Ming Fan, Eryue Zhuang, Zijiang Yang:
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences. IEEE Trans. Software Eng. 41(12): 1217-1235 (2015) - [c24]Hengshan Zhang, Qinghua Zheng, Ting Liu, Xiaojun Cui:
A grade assignment and IFS translation approach based on intensive region searching. FUZZ-IEEE 2015: 1-8 - [c23]Man Su, Jianting Ji, Yulin Che, Ting Liu, Siyun Chen, Zhanbo Xu:
An appliance classification method for residential appliance scheduling. UbiComp/ISWC Adjunct 2015: 1567-1570 - [c22]Siyun Chen, Ting Liu, Yadong Zhou, Chao Shen
, Feng Gao, Yulin Che, Zhanbo Xu:
SHE: Smart home energy management system based on social and motion behavior cognition. SmartGridComm 2015: 859-864 - 2014
- [j5]Ting Liu, Yang Liu, Yashan Mao, Yao Sun, Xiaohong Guan, Weibo Gong, Sheng Xiao:
A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication. IEEE Trans. Smart Grid 5(3): 1175-1182 (2014) - [c21]Siyun Chen, Feng Gao, Xiaohong Guan, Ting Liu, Yulin Che, Yuqi Liu:
A residential load scheduling approach based on load behavior analysis. CASE 2014: 954-959 - [c20]Yan Nan, Hengshan Zhang, Qinghua Zheng, Di Wang, Ting Liu, Boqin Feng:
IFSDA: An intuitionistic fuzzy set-based data aggregation approach for software maintainability evaluation. FSKD 2014: 237-242 - [c19]Hengshan Zhang, Qinghua Zheng, Ting Liu, Yan Nan:
A new approach to improve the consistency of linguistic pair-wise comparison matrix and derive interval weight vector. FUZZ-IEEE 2014: 1190-1196 - [c18]Ting Liu, Siyun Chen, Yuqi Liu, Zhanbo Xu, Yulin Che, Yufei Duan:
SHE: smart home energy management system for appliance identification and personalized scheduling. UbiComp Adjunct 2014: 247-250 - [c17]Ting Liu, Yulin Che, Yuqi Liu, Zhanbo Xu, Yufei Duan, Siyun Chen:
A user demand and preference profiling method for residential energy management. UbiComp Adjunct 2014: 911-918 - [c16]Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Chao Shen
, Zijiang Yang:
Directed test suite augmentation via exploiting program dependency. CSTVA 2014: 1-6 - [c15]Yu Qu
, Qinghua Zheng, Ting Liu, Jian Li, Xiaohong Guan:
In-depth measurement and analysis on densification power law of software execution. WETSoM 2014: 55-58 - [c14]Zhenzhou Tian
, Qinghua Zheng, Ting Liu, Ming Fan, Xiaodong Zhang, Zijiang Yang:
Plagiarism detection for multithreaded software based on thread-aware software birthmarks. ICPC 2014: 304-313 - [c13]Ting Liu, Yuhong Gui, Yanan Sun, Yang Liu, Yao Sun, Feng Xiao:
SEDE: state estimation-based dynamic encryption scheme for smart grid communication. SAC 2014: 539-544 - [c12]Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Xiangyang Li, Lechen Yu, Zijiang Yang:
Reducing Test Cases with Causality Partitions. SEKE 2014: 223-228 - [c11]Zhenzhou Tian, Qinghua Zheng, Ming Fan, Eryue Zhuang, Haijun Wang, Ting Liu:
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool. SEKE 2014: 740-741 - 2013
- [c10]Hengshan Zhang, Qinghua Zheng, Ting Liu, Zijiang Yang, Jiahe Liu:
A discrete region-based approach to improve the consistency of pair-wise comparison matrix. FUZZ-IEEE 2013: 1-7 - [c9]Zhenzhou Tian
, Qinghua Zheng, Ting Liu, Ming Fan:
DKISB: Dynamic Key Instruction Sequence Birthmark for Software Plagiarism Detection. HPCC/EUC 2013: 619-627 - [c8]Yun Gu, Ting Liu, Dai Wang, Xiaohong Guan, Zhanbo Xu:
Bad data detection method for smart grids based on distributed state estimation. ICC 2013: 4483-4487 - [c7]Ting Liu, Yun Gu, Dai Wang, Yuhong Gui, Xiaohong Guan:
A novel method to detect bad data injection attack in smart grid. INFOCOM Workshops 2013: 49-54 - [c6]Ting Liu, Yun Gu, Dai Wang, Yuhong Gui, Xiaohong Guan:
A novel method to detect bad data injection attack in smart grid. INFOCOM 2013: 3423-3428 - [c5]Yang Liu, Jiahe Liu, Ting Liu, Xiaohong Guan, Yanan Sun:
Security risks evaluation toolbox for smart grid devices. SIGCOMM 2013: 479-480 - 2012
- [j4]Qinghua Zheng, Zhijiang Ou, Ting Liu, Zijiang Yang, Yuqiao Hou, Chao Zheng:
Software structure evaluation based on the interaction and encapsulation of methods. Sci. China Inf. Sci. 55(12): 2816-2825 (2012) - [j3]Ting Liu, Xiaohong Guan, Yu Qu
, Yanan Sun:
A layered classification for malicious function identification and malware detection. Concurr. Comput. Pract. Exp. 24(11): 1169-1179 (2012) - [j2]Ting Liu, Zhiwen Wang, Haijun Wang, Ke Lu:
An Entropy-based Method for Attack Detection in Large Scale Network. Int. J. Comput. Commun. Control 7(3): 509-517 (2012) - [c4]Yanan Sun, Xiaohong Guan, Ting Liu, Yu Qu
:
An Identity Authentication Mechanism Based on Timing Covert Channel. TrustCom 2012: 832-836 - 2011
- [c3]Yanan Sun, Xiaohong Guan, Ting Liu:
A New Method for Authentication Based on Covert Channel. NPC 2011: 160-165 - [c2]Ting Liu, Xiaohong Guan, Yu Qu
, Yanan Sun:
A Layered Detection Method for Malware Identification. NPC 2011: 166-175
2000 – 2009
- 2009
- [j1]Ting Liu, Xiaohong Guan, Qinghua Zheng, Yu Qu
:
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense. IEEE Netw. 23(5): 22-29 (2009) - [c1]Ting Liu, Xiaohong Guan, Qinghua Zheng, Ke Lu, Yuanfeng Song, Weizhan Zhang:
Prototype Demonstration: Trojan Detection and Defense System. CCNC 2009: 1-2
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-15 23:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint