default search action
Yan Xiong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j91]Yan Xiong, Naiqi Wei, Kai Qiao, Zhenyu Li, Zongwei Li:
Exploring Consumption Intent in Live E-Commerce Barrage: A Text Feature-Based Approach Using BERT-BiLSTM Model. IEEE Access 12: 69288-69298 (2024) - [j90]Yan Xiong, Guo Xinya, Junjie Xu:
CNN-Transformer: A deep learning method for automatically identifying learning engagement. Educ. Inf. Technol. 29(8): 9989-10008 (2024) - [j89]Yan Xiong, Jiatang Cheng:
A Modified Sine Cosine Algorithm for Numerical Optimization. Int. J. Comput. Intell. Appl. 23(3): 2450015:1-2450015:16 (2024) - [j88]Yan Xiong, Shumei He:
An improved asynchronous batch gradient method for ridge polynomial neural network. Neurocomputing 581: 127529 (2024) - [j87]Yan Xiong, Siyuan Liu, Jianxiang Zhang, Mingxing Xu, Liang Guo:
Nonlinear control strategies for 3-DOF control moment gyroscope using deep reinforcement learning. Neural Comput. Appl. 36(12): 6441-6465 (2024) - [j86]Shulang Han, Qing Xiao, Ying Liang, Yu Chen, Fei Yan, Hui Chen, Jirong Yue, Xiaobao Tian, Yan Xiong:
Using Flexible-Printed Piezoelectric Sensor Arrays to Measure Plantar Pressure during Walking for Sarcopenia Screening. Sensors 24(16): 5189 (2024) - [c89]Lin Wang, Haithm M. Al-Gunid, Ammar Hawbani, Yan Xiong:
Cooking-Clip: Context-Aware Language-Image Pretraining for Zero-Shot Recipe Generation. ICASSP 2024: 11446-11450 - [i13]Yiming Zhu, Wenchao Huang, Yan Xiong:
LightSLH: Provable and Low-Overhead Spectre v1 Mitigation through Targeted Instruction Hardening. CoRR abs/2408.16220 (2024) - 2023
- [j85]Jiatang Cheng, Yan Xiong:
Multi-strategy adaptive cuckoo search algorithm for numerical optimization. Artif. Intell. Rev. 56(3): 2031-2055 (2023) - [j84]Xuhe Liao, Meng Liu, Shanshi Li, Weiming Huang, Cuiyan Guo, Jia Liu, Yan Xiong, Jianhua Zhang, Yan Fan, Rongfu Wang:
The value on SUV-derived parameters assessed on 18F-FDG PET/CT for predicting mediastinal lymph node metastasis in non-small cell lung cancer. BMC Medical Imaging 23(1): 49 (2023) - [j83]Xi Li, Krista J. Li, Yan Xiong:
Channel Coordination of Storable Goods. Mark. Sci. 42(3): 538-550 (2023) - [c88]Jinxin Zhang, Zhaoyi Meng, Fuyou Miao, Yan Xiong, Zonghao Xu, Yajie Yun, Ruikai Wang:
Usage of Application-driven Ternary Divide-and-conquer Architecture of Heterogeneous Internet of Things in Environmental Monitoring. BIGCOM 2023: 9-15 - [c87]Renjie Ji, Wansen Wang, Yan Xiong, Wenchao Huang:
SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts. BIGCOM 2023: 88-95 - [c86]Jiaqi Guo, Zhaoyi Meng, Qian Zhang, Yan Xiong, Wenchao Huang:
MVVDroid: Android Malware Detection based on Multi-View Visualization. BIGCOM 2023: 96-102 - [c85]Caichang Tu, Wansen Wang, Kaiwen Shi, Yan Xiong, Wenchao Huang:
EOSVERIF: An Automated Analyzer for EOSIO Smart Contracts. BIGCOM 2023: 103-109 - [c84]Youming Zhang, Zhizheng Li, Lei Wang, Yan Lv, Yan Xiong, Liu Yang:
An Interpretable Data-Driven Approach for Employee Ability Assessment. DSC 2023: 270-276 - [c83]Yue Zhuo, Yan Xiong:
Research on Budget Performance Management System of Universitie under Big Data: A Case Study. ICMSS 2023: 154-158 - [c82]Yan Xiong, Visar Berisha, Chaitali Chakrabarti:
Aligning Speech Enhancement for Improving Downstream Classification Performance. INTERSPEECH 2023: 3874-3878 - [c81]Lin Wang, Hongyi Zhang, Xingfu Wang, Yan Xiong:
Learning a Contextualized Multimodal Embedding for Zero-shot Cooking Video Caption Generation. MMAsia 2023: 41:1-41:8 - [c80]Lin Wang, Ammar Hawbani, Yan Xiong:
A Multi-scale Multi-modal Multi-dimension Joint Transformer for Two-Stream Action Classification. PRICAI (3) 2023: 228-233 - [c79]Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji:
Automated Inference on Financial Security of Ethereum Smart Contracts. USENIX Security Symposium 2023: 3367-3383 - [c78]Mingzhe Hu, Qi Zhao, Yu Zhang, Yan Xiong:
Cross-Language Call Graph Construction Supporting Different Host Languages. SANER 2023: 155-166 - 2022
- [j82]Jiatang Cheng, Peizhen Xu, Yan Xiong:
An improved artificial electric field algorithm and its application in neural network optimization. Comput. Electr. Eng. 101: 108111 (2022) - [j81]Yan Xiong, Jiatang Cheng, Lieping Zhang:
Neighborhood Learning-Based Cuckoo Search Algorithm for Global Optimization. Int. J. Pattern Recognit. Artif. Intell. 36(5): 2251006:1-2251006:27 (2022) - [j80]Sung Kim, Morteza Fayazi, Alhad Daftardar, Kuan-Yu Chen, Jielun Tan, Subhankar Pal, Tutu Ajayi, Yan Xiong, Trevor N. Mudge, Chaitali Chakrabarti, David T. Blaauw, Ronald G. Dreslinski, Hun-Seok Kim:
Versa: A 36-Core Systolic Multiprocessor With Dynamically Reconfigurable Interconnect and Memory. IEEE J. Solid State Circuits 57(4): 986-998 (2022) - [j79]Shiyang Huang, Yan Xiong, Liyan Yang:
Skill Acquisition and Data Sales. Manag. Sci. 68(8): 6116-6144 (2022) - [j78]Lin Wang, Xingfu Wang, Ammar Hawbani, Yan Xiong, Xu Zhang:
D2F: discriminative dense fusion of appearance and motion modalities for end-to-end video classification. Multim. Tools Appl. 81(9): 12157-12176 (2022) - [j77]Yan Xiong, Liang Guo, Yang Zhang, Mingxing Xu, Defu Tian, Ming Li:
Surrogate modeling for spacecraft thermophysical models using deep learning. Neural Comput. Appl. 34(19): 16577-16603 (2022) - [j76]Jiatang Cheng, Yan Xiong:
Parameter Control Based Cuckoo Search Algorithm for Numerical Optimization. Neural Process. Lett. 54(4): 3173-3200 (2022) - [c77]Yan Xiong, Jingtao Li, David T. Blaauw, Hun-Seok Kim, Trevor N. Mudge, Ronald G. Dreslinski, Chaitali Chakrabarti:
Improving Energy Efficiency of Convolutional Neural Networks on Multi-core Architectures through Run-time Reconfiguration. ISCAS 2022: 375-379 - [c76]Jingtao Li, Jian Zhou, Yan Xiong, Xing Chen, Chaitali Chakrabarti:
An Adjustable Farthest Point Sampling Method for Approximately-sorted Point Cloud Data. SiPS 2022: 1-6 - [i12]Jingtao Li, Jian Zhou, Yan Xiong, Xing Chen, Chaitali Chakrabarti:
An Adjustable Farthest Point Sampling Method for Approximately-sorted Point Cloud Data. CoRR abs/2208.08795 (2022) - [i11]Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji:
An Automated Analyzer for Financial Security of Ethereum Smart Contracts. CoRR abs/2208.12960 (2022) - 2021
- [j75]Keju Meng, Fuyou Miao, Yu Ning, Wenchao Huang, Yan Xiong, Chin-Chen Chang:
A proactive secret sharing scheme based on Chinese remainder theorem. Frontiers Comput. Sci. 15(2): 152801 (2021) - [j74]Yan Xiong, Liyan Yang:
Disclosure, competition, and learning from asset prices. J. Econ. Theory 197: 105331 (2021) - [j73]Weiran Chen, Xiuhong Li, Xiaoran Chen, Yan Xiong:
Research on influence mechanism of running clothing fatigue based on BP neural network. J. Intell. Fuzzy Syst. 40(4): 7577-7587 (2021) - [j72]Fuyou Miao, Yue Yu, Keju Meng, Yan Xiong, Chin-Chen Chang:
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem. Secur. Commun. Networks 2021: 6678345:1-6678345:9 (2021) - [j71]Keju Meng, Fuyou Miao, Yan Xiong, Chin-Chen Chang:
A reversible extended secret image sharing scheme based on Chinese remainder theorem. Signal Process. Image Commun. 95: 116221 (2021) - [j70]Bing Wang, Changqing Mei, Yuanyuan Wang, Yuming Zhou, Mu-Tian Cheng, Chunhou Zheng, Lei Wang, Jun Zhang, Peng Chen, Yan Xiong:
Imbalance Data Processing Strategy for Protein Interaction Sites Prediction. IEEE ACM Trans. Comput. Biol. Bioinform. 18(3): 985-994 (2021) - [j69]Wenyan Wang, Yuming Zhou, Mu-Tian Cheng, Yan Wang, Chun-Hou Zheng, Yan Xiong, Peng Chen, Zhiwei Ji, Bing Wang:
Potential Pathogenic Genes Prioritization Based on Protein Domain Interaction Network Analysis. IEEE ACM Trans. Comput. Biol. Bioinform. 18(3): 1026-1034 (2021) - [j68]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Jianmeng Huang:
AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs. IEEE Trans. Inf. Forensics Secur. 16: 1912-1927 (2021) - [j67]Yu Ning, Zuo Ye, Gennian Ge, Fuyou Miao, Yan Xiong, Xiande Zhang:
New Results on Self-Dual Generalized Reed-Solomon Codes. IEEE Trans. Inf. Theory 67(11): 7240-7252 (2021) - [c75]Yuting Feng, Feng Xiong, Wenchao Huang, Yan Xiong:
Security Analysis of Session Initiation Protocol Digest Access Authentication Scheme. BigCom 2021: 129-135 - [c74]Xingcan Zhou, Fuyou Miao, Yan Xiong:
A Certificate Authority Domain-based Cross-domain Authentication Scheme for Virtual Enterprise Using Identity Based Encryption. BigCom 2021: 144-149 - [c73]Mingzhe Hu, Yu Zhang, Wenchao Huang, Yan Xiong:
Static Type Inference for Foreign Functions of Python. ISSRE 2021: 423-433 - [c72]Yan Xiong, Visar Berisha, Chaitali Chakrabarti:
Computationally-efficient voice activity detection based on deep neural networks. SiPS 2021: 64-69 - [c71]Sung Kim, Morteza Fayazi, Alhad Daftardar, Kuan-Yu Chen, Jielun Tan, Subhankar Pal, Tutu Ajayi, Yan Xiong, Trevor N. Mudge, Chaitali Chakrabarti, David T. Blaauw, Ronald G. Dreslinski, Hun-Seok Kim:
Versa: A Dataflow-Centric Multiprocessor with 36 Systolic ARM Cortex-M4F Cores and a Reconfigurable Crossbar-Memory Hierarchy in 28nm. VLSI Circuits 2021: 1-2 - [i10]Sung Kim, Morteza Fayazi, Alhad Daftardar, Kuan-Yu Chen, Jielun Tan, Subhankar Pal, Tutu Ajayi, Yan Xiong, Trevor N. Mudge, Chaitali Chakrabarti, David T. Blaauw, Ronald G. Dreslinski, Hun-Seok Kim:
Versa: A Dataflow-Centric Multiprocessor with 36 Systolic ARM Cortex-M4F Cores and a Reconfigurable Crossbar-Memory Hierarchy in 28nm. CoRR abs/2109.03024 (2021) - 2020
- [j66]Yan Xiong, Xiaozhang Chen, Zhenhan Zhang, Huawei Chen, Jiayi Li, Chunsen Liu, Peng Zhou:
Temperature-Dependent Logic Behavior of Logic Transistors Based on WS2. IEEE Access 8: 79368-79375 (2020) - [j65]Lin Wang, Xingfu Wang, Ammar Hawbani, Yan Xiong, Xu Zhang:
Convolution Encoders for End-to-End Action Tracking With Space-Time Cubic Kernels. IEEE Access 8: 139023-139032 (2020) - [j64]Yan Xiong, Liang Guo, Defu Tian, Yang Zhang, Chunlong Liu:
Intelligent Optimization Strategy Based on Statistical Machine Learning for Spacecraft Thermal Design. IEEE Access 8: 204268-204282 (2020) - [j63]Longfan Liu, Yan Li, Yan Xiong, Denis Cavallucci:
A new function-based patent knowledge retrieval tool for conceptual design of innovative products. Comput. Ind. 115: 103154 (2020) - [j62]Chunyao Ye, Yan Xiong, Yan Li, Longfan Liu, Mei Wang:
The influences of product similarity on consumer preferences: a study based on eye-tracking analysis. Cogn. Technol. Work. 22(3): 603-613 (2020) - [j61]Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, Yan Xiong:
A Formal Framework of Shielding Systems by Stepwise Refinement. Int. J. Netw. Secur. 22(1): 54-67 (2020) - [j60]Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications. Int. J. Netw. Secur. 22(3): 381-391 (2020) - [j59]Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:
Static Analysis of Superfluous Network Transmissions in Android Applications. Int. J. Netw. Secur. 22(3): 409-418 (2020) - [j58]Keju Meng, Fuyou Miao, Wenchao Huang, Yan Xiong:
Threshold changeable secret sharing with secure secret reconstruction. Inf. Process. Lett. 157: 105928 (2020) - [j57]Zeng Li, Wenchao Huang, Yan Xiong, Siqi Ren, Tuanfei Zhu:
Incremental learning imbalanced data streams with concept drift: The dynamic updated ensemble algorithm. Knowl. Based Syst. 195: 105694 (2020) - [j56]Yan Xiong, Xin Tong:
Convergence of Batch Gradient Method Based on the Entropy Error Function for Feedforward Neural Networks. Neural Process. Lett. 52(3): 2687-2695 (2020) - [j55]Changbin Lu, Fuyou Miao, Junpeng Hou, Wenchao Huang, Yan Xiong:
A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security. Quantum Inf. Process. 19(1): 24 (2020) - [j54]Changbin Lu, Fuyou Miao, Junpeng Hou, Zhaofeng Su, Yan Xiong:
Quantum multiparty cryptosystems based on a homomorphic random basis encryption. Quantum Inf. Process. 19(9): 293 (2020) - [j53]Huihua Xia, Yan Xiong, Wenchao Huang, Zhaoyi Meng, Fuyou Miao:
Limiting Privacy Breaches in Average-Distance Query. Secur. Commun. Networks 2020: 8895281:1-8895281:24 (2020) - [j52]Jianmeng Huang, Yan Xiong, Wenchao Huang, Chen Xu, Fuyou Miao:
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications. IEEE Syst. J. 14(1): 375-386 (2020) - [c70]Subhankar Pal, Siying Feng, Dong-Hyeon Park, Sung Kim, Aporva Amarnath, Chi-Sheng Yang, Xin He, Jonathan Beaumont, Kyle May, Yan Xiong, Kuba Kaszyk, John Magnus Morton, Jiawen Sun, Michael F. P. O'Boyle, Murray Cole, Chaitali Chakrabarti, David T. Blaauw, Hun-Seok Kim, Trevor N. Mudge, Ronald G. Dreslinski:
Transmuter: Bridging the Efficiency Gap using Memory and Dataflow Reconfiguration. PACT 2020: 175-190 - [c69]Zihan Zhou, Yan Xiong, Wenchao Huang, Lu Ma:
SPrune: A Code Pruning Tool for Ethereum Solidity Contract Static Analysis. BigCom 2020: 66-70 - [c68]Guangshuai Mo, Yan Xiong, Wenchao Huang, Lu Ma:
Automated Theorem Proving via Interacting with Proof Assistants by Dynamic Strategies. BigCom 2020: 71-75 - [c67]Cijian Song, Yan Xiong, Wenchao Huang, Lu Ma:
Joint Self-Attention and Multi-Embeddings for Chinese Named Entity Recognition. BigCom 2020: 76-80 - [c66]Chuanhu Cheng, Yan Xiong, Wenchao Huang, Lu Ma:
Context-aware Generation of Proof Scripts for Theorem Proving. BigCom 2020: 81-85 - [c65]Shangwu Dong, Yan Xiong, Wenchao Huang, Lu Ma:
KIMS: Kernel Integrity Measuring System based on TrustZone. BigCom 2020: 103-107 - [c64]Jingtao Li, Adnan Siraj Rakin, Yan Xiong, Liangliang Chang, Zhezhi He, Deliang Fan, Chaitali Chakrabarti:
Defending Bit-Flip Attack through DNN Weight Reconstruction. DAC 2020: 1-6 - [c63]Chen Xu, Yan Xiong, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Cheng Su, Guangshuai Mo:
Identifying compatibility-related APIs by exploring biased distribution in Android apps. ICSE (Companion Volume) 2020: 280-281 - [c62]Yan Xiong, Jian Zhou, Subhankar Pal, David T. Blaauw, Hun-Seok Kim, Trevor N. Mudge, Ronald G. Dreslinski, Chaitali Chakrabarti:
Accelerating Deep Neural Network Computation on a Low Power Reconfigurable Architecture. ISCAS 2020: 1-5 - [c61]Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang:
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies. USENIX Security Symposium 2020: 253-270
2010 – 2019
- 2019
- [j51]Ye Wang, Changqing Mei, Yuming Zhou, Yan Wang, Chunhou Zheng, Xiao Zhen, Yan Xiong, Peng Chen, Jun Zhang, Bing Wang:
Semi-supervised prediction of protein interaction sites from unlabeled sample information. BMC Bioinform. 20-S(25): 699 (2019) - [j50]Jiatang Cheng, Lei Wang, Yan Xiong:
Ensemble of cuckoo search variants. Comput. Ind. Eng. 135: 299-313 (2019) - [j49]Keju Meng, Fuyou Miao, Wenchao Huang, Yan Xiong:
Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem. Discret. Appl. Math. 268: 152-163 (2019) - [j48]Jiatang Cheng, Lei Wang, Yan Xiong:
Cuckoo search algorithm with memory and the vibrant fault diagnosis for hydroelectric generating unit. Eng. Comput. 35(2): 687-702 (2019) - [j47]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Lei Qin, Xin Jin, Hongbing Yan:
AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications. Neurocomputing 341: 10-25 (2019) - [j46]Jun Zhang, Hanhua Lai, Yan Xiong:
Concurrent Transmission Based on Distributed Scheduling for Underwater Acoustic Networks. Sensors 19(8): 1871 (2019) - [c60]Yan Xiong, Hong Lai:
The improved protocol based on the Bennett 92 protocol. ACM TUR-C 2019: 161:1-161:9 - [c59]Chen Xu, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
An Observational Study on Compatibility-Related API Usage. BigCom 2019: 64-68 - [c58]Xiaoyu Li, Cheng Su, Yan Xiong, Wenchao Huang, Wansen Wang:
Formal Verification of BNB Smart Contract. BigCom 2019: 74-78 - [c57]Zeng Li, Yan Xiong, Wenchao Huang:
Drift-detection Based Incremental Ensemble for Reacting to Different Kinds of Concept Drift. BigCom 2019: 107-114 - [c56]Xianglin Bao, Cheng Su, Yan Xiong, Wenchao Huang, Yifei Hu:
FLChain: A Blockchain for Auditable Federated Learning with Trust and Incentive. BigCom 2019: 151-159 - [c55]Huihua Xia, Wenchao Huang, Yan Xiong:
Differentially Private Geo-Social Ranking. BigCom 2019: 250-254 - [c54]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs. ICSE (Companion Volume) 2019: 230-231 - [c53]Yan Xiong, Visar Berisha, Chaitali Chakrabarti:
Residual + Capsule Networks (ResCap) for Simultaneous Single-Channel Overlapped Keyword Recognition. INTERSPEECH 2019: 3337-3341 - [i9]Fuyou Miao, Keju Meng, Yue Yu, Wenchao Huang, Yan Xiong, Xingfu Wang:
Tightly Coupled Secret Sharing and Its Application to Group Authentication. CoRR abs/1908.02110 (2019) - 2018
- [j45]Longfan Liu, Yan Li, Yan Xiong, Juan Cao:
An EEG study of the relationship between design problem statements and cognitive behaviors during conceptual design. Artif. Intell. Eng. Des. Anal. Manuf. 32(3): 351-362 (2018) - [j44]Jiatang Cheng, Lei Wang, Qiaoyong Jiang, Yan Xiong:
A novel cuckoo search algorithm with multiple update rules. Appl. Intell. 48(11): 4192-4211 (2018) - [j43]Jian Du, Yan Li, Jinlong Ma, Yan Xiong, Wenqiang Li:
Retrieval of Semantic-Based Inspirational Sources for Emotional Design. Comput. Intell. Neurosci. 2018: 4685187:1-4685187:17 (2018) - [j42]Juan Cao, Yan Xiong, Yan Li, Longfan Liu, Mei Wang:
Differences between beginning and advanced design students in analogical reasoning during idea generation: evidence from eye movements. Cogn. Technol. Work. 20(3): 505-520 (2018) - [j41]Jiatang Cheng, Lei Wang, Qiaoyong Jiang, Zijian Cao, Yan Xiong:
Cuckoo search algorithm with dynamic feedback information. Future Gener. Comput. Syst. 89: 317-334 (2018) - [j40]Yan Xiong, Fang Xu, Qiang Chen, Jun Zhang:
Speech Enhancement Using Heterogeneous Information. Int. J. Grid High Perform. Comput. 10(3): 46-59 (2018) - [j39]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Panlong Yang, Yanan Zhang, XuFei Mao:
Lightitude: Indoor Positioning Using Uneven Light Intensity Distribution. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(2): 67:1-67:25 (2018) - [j38]Jiatang Cheng, Lei Wang, Yan Xiong:
Modified cuckoo search algorithm and the prediction of flashover voltage of insulators. Neural Comput. Appl. 30(2): 355-370 (2018) - [c52]Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang:
Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem. ASIACRYPT (3) 2018: 310-331 - [c51]Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:
Detecting Stubborn Permission Requests in Android Applications. BigCom 2018: 84-89 - [c50]Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:
Identifying Superfluous Network Transmissions in Android Applications. BigCom 2018: 96-101 - [c49]Hongbing Yan, Yan Xiong, Wenchao Huang, Jianmeng Huang, Zhaoyi Meng:
Automatically Detecting Malicious Sensitive Data Usage in Android Applications. BigCom 2018: 102-107 - [c48]Lei Qin, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation. BigCom 2018: 108-113 - [c47]Jiabin Zhu, Yan Xiong, Wenchao Huang:
A Formal Framework for State Continuity of Protected Modules. BigCom 2018: 114-119 - [c46]Yifei Hu, Yan Xiong, Wenchao Huang, Xianglin Bao:
KeyChain: Blockchain-Based Key Distribution. BigCom 2018: 126-131 - [c45]Jiabin Zhu, Wenchao Huang, Yan Xiong:
Formally Verifying Memory Isolation Based on ARM Processors. BigCom 2018: 195-200 - [i8]Yan Xiong, Cheng Su, Wenchao Huang:
Verifying Security Protocols using Dynamic Strategies. CoRR abs/1807.00669 (2018) - [i7]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs. CoRR abs/1809.07036 (2018) - [i6]Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang:
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem. IACR Cryptol. ePrint Arch. 2018: 837 (2018) - 2017
- [j37]Xiang-ke Niu, Jun Li, Susant Kumar Das, Yan Xiong, Chao-bing Yang, Tao Peng:
Developing a nomogram based on multiparametric magnetic resonance imaging for forecasting high-grade prostate cancer to reduce unnecessary biopsies within the prostate-specific antigen gray zone. BMC Medical Imaging 17(1): 11:1-11:9 (2017) - [j36]Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang:
A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems. Int. J. Netw. Secur. 19(5): 794-803 (2017) - [j35]Wenchao Huang, Xiang-Yang Li, Yan Xiong, Panlong Yang, Yiqing Hu, XuFei Mao, Fuyou Miao, Baohua Zhao, Jumin Zhao:
Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers. IEEE J. Sel. Areas Commun. 35(5): 1104-1117 (2017) - [c44]Xin Jin, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
Mining Anomalous Usage of Sensitive Data through Anomaly Detection. BigCom 2017: 59-67 - [c43]Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang, Cheng Su:
A Verified Secure Protocol Model of OAuth Dynamic Client Registration. BigCom 2017: 106-110 - [c42]Yan Xiong, Wenli Xu:
Depth data research of GIS based on clustering analysis algorithm. MIPPR 2017: 1061105 - 2016
- [j34]Jianjun Gao, Yan Xiong, Duan Li:
Dynamic mean-risk portfolio selection with multiple risk measures in continuous-time. Eur. J. Oper. Res. 249(2): 647-656 (2016) - [j33]Yuwei Wang, Ze Luo, John Y. Takekawa, Diann J. Prosser, Yan Xiong, Scott H. Newman, Xiangming Xiao, Nyambayar Batbayar, Kyle Spragens, Sivananinthaperumal Balachandran, Baoping Yan:
A new method for discovering behavior patterns among animal movements. Int. J. Geogr. Inf. Sci. 30(5): 929-947 (2016) - [j32]Nancy Tsai, Yan Xiong:
An investigation of the information system security issues in Taiwan. Int. J. Bus. Inf. Syst. 21(3): 309-320 (2016) - [j31]Yu Chen, Yan Xiong, Wentao Jiang, Man-Sang Wong, Fei Yan, Qingyuan Wang, Yubo Fan:
Numerical simulation on the effects of drug-eluting stents with different bending angles on hemodynamics and drug distribution. Medical Biol. Eng. Comput. 54(12): 1859-1870 (2016) - [j30]Xiaoxu He, Chenxi Shao, Yan Xiong:
A non-parametric symbolic approximate representation for long time series. Pattern Anal. Appl. 19(1): 111-127 (2016) - [j29]Xiaopu Wang, Yan Xiong, Wenchao Huang:
An Accurate Direction Finding Scheme Using Virtual Antenna Array via Smartphones. Sensors 16(11): 1811 (2016) - [j28]Panlong Yang, Qingyu Li, Yubo Yan, Xiang-Yang Li, Yan Xiong, Baowei Wang, Xingming Sun:
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading. IEEE Trans. Veh. Technol. 65(7): 5485-5496 (2016) - [c41]Xiaopu Wang, Yan Xiong, Wenchao Huang:
Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones. BigCom 2016: 111-122 - [c40]Wenchao Huang, Xiang-Yang Li, Yan Xiong, Panlong Yang, Yiqing Hu, XuFei Mao, Fuyou Miao, Baohua Zhao, Ju-Min Zhao:
WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals. UbiComp 2016: 439-450 - [c39]Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang:
Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus. Trustcom/BigDataSE/ISPA 2016: 42-49 - 2015
- [j27]Xiangwen Li, Yan Xiong:
Collapsible graphs and Hamilton cycles of line graphs. Discret. Appl. Math. 194: 132-142 (2015) - [j26]Yan Xiong, Yesong Li:
Modified Internal Model Control Scheme for the Drive Part with Elastic Joints in Robotic System. J. Intell. Robotic Syst. 79(3-4): 475-485 (2015) - [j25]Fuyou Miao, Yan Xiong, Xingfu Wang, Moaman Badawy:
Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing. IEEE Trans. Inf. Forensics Secur. 10(5): 889-899 (2015) - [j24]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu, Xingfu Wang:
Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones. IEEE Trans. Mob. Comput. 14(10): 2145-2157 (2015) - [j23]Yubo Yan, Panlong Yang, Xiang-Yang Li, Yafei Zhang, Jianjiang Lu, Lizhao You, Jiliang Wang, Jinsong Han, Yan Xiong:
WizBee: Wise ZigBee Coexistence via Interference Cancellation with Single Antenna. IEEE Trans. Mob. Comput. 14(12): 2590-2603 (2015) - [j22]Panlong Yang, Bowen Li, Jinlong Wang, Xiang-Yang Li, Zhiyong Du, Yubo Yan, Yan Xiong:
Online Sequential Channel Accessing Control: A Double Exploration vs. Exploitation Problem. IEEE Trans. Wirel. Commun. 14(8): 4654-4666 (2015) - [j21]Xuangou Wu, Panlong Yang, Shaojie Tang, Xiao Zheng, Yan Xiong:
Privacy preserving RSS map generation for a crowdsensing network. IEEE Wirel. Commun. 22(4): 42-48 (2015) - [c38]Xiaopu Wang, Yan Xiong, Wenchao Huang:
Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones. BigCom 2015: 126-140 - [c37]Xudong Gong, Yan Xiong, Wenchao Huang, Lei Chen, Qiwei Lu, Yiqing Hu:
Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation. DASFAA (1) 2015: 108-124 - [c36]Yuwei Wang, Ze Luo, Yan Xiong, Diann J. Prosser, Scott H. Newman, John Y. Takekawa, Baoping Yan:
Discovering Loose Group Movement Patterns from Animal Trajectories. e-Science 2015: 196-206 - [c35]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Yanan Zhang, XuFei Mao, Panlong Yang, Caimei Wang:
Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices. ICDCS 2015: 732-733 - [c34]Yuyang Ke, Yan Xiong, Yiqing Hu, Xudong Gong, Wenchao Huang:
Magemite: Character inputting system based on magnetic sensor. WOWMOM 2015: 1-3 - [i5]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Yanan Zhang, XuFei Mao, Panlong Yang, Caimei Wang:
Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices. CoRR abs/1505.05977 (2015) - [i4]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Yiqing Hu, XuFei Mao, Panlong Yang:
WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker. CoRR abs/1508.05477 (2015) - 2014
- [j20]Yushu Lai, Yan Xiong:
Hierarchical Storage Model and Priority Ranking Method of Rules in Rule-based Reasoning System. Int. J. Comput. Intell. Syst. 7(4): 676-685 (2014) - [j19]Xiaoxu He, Chenxi Shao, Yan Xiong:
A new similarity measure based on shape information for invariant with multiple distortions. Neurocomputing 129: 556-569 (2014) - [j18]Yila Huang, Qiwei Lu, Yan Xiong:
Collaborative Outsourced Data Mining for Secure Cloud Computing. J. Networks 9(10): 2655-2664 (2014) - [j17]Xuangou Wu, Yan Xiong, Panlong Yang, Shouhong Wan, Wenchao Huang:
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 13(10): 5867-5877 (2014) - [c33]Yuwei Wang, Danhuai Guo, Kuien Liu, Yan Xiong:
A fast algorithm of geometry generalization. SIGSPATIAL/GIS 2014: 609-612 - [c32]Yan Xiong, Jianjun Gao:
Continuous-time mean-variance portfolio optimization with Safety-First Principle. ICCA 2014: 66-71 - [c31]Xiaoxu He, Chenxi Shao, Yan Xiong:
A new dynamic clustering method based on nuclear field. ICNC 2014: 642-647 - [c30]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu:
Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones. INFOCOM 2014: 370-378 - [c29]Xuangou Wu, Panlong Yang, Taeho Jung, Yan Xiong, Xiao Zheng:
Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs. MobiHoc 2014: 13-22 - [c28]Chaocan Xiang, Panlong Yang, Bin Yu, Chang Tian, Hong He, Jibin Guo, Yan Xiong:
Confidence-interval based sensing quality evaluation for mobile sensor networks. MSCC@MobiHoc 2014: 25-28 - [c27]Maotian Zhang, Panlong Yang, Chang Tian, Chaocan Xiang, Yan Xiong:
Walk globally, act locally: efficient influential user identification in mobile social networks. MSCC@MobiHoc 2014: 29-34 - 2013
- [j16]Xuangou Wu, Yan Xiong, Wenchao Huang, Hong Shen, Mingxi Li:
An efficient compressive data gathering routing scheme for large-scale wireless sensor networks. Comput. Electr. Eng. 39(6): 1935-1946 (2013) - [j15]Xiancun Zhou, Yan Xiong, Mingxi Li:
Detection System of Clone Attacks based on RSSI in Wireless Sensor Networks. J. Networks 8(1): 221-228 (2013) - [j14]Xiaoxu He, Chenxi Shao, Yan Xiong:
Using an SQP Algorithm to Choose the Feature Set for Data Field Clustering. Smart Comput. Rev. 3(4): 210-219 (2013) - [j13]Wenchao Huang, Yan Xiong, Xingfu Wang, Fuyou Miao, Chengyi Wu, Xudong Gong, Qiwei Lu:
Fine-Grained Refinement on TPM-Based Protocol Applications. IEEE Trans. Inf. Forensics Secur. 8(6): 1013-1026 (2013) - [c26]Qingwen Liu, Yan Xiong, Wenchao Huang:
Integrating Social Information into Collaborative Filtering for Celebrities Recommendation. ACIIDS (2) 2013: 109-118 - [c25]Jianjun Gao, Yan Xiong:
Dynamic mean-CVaR portfolio optimization in continuous-time. ICCA 2013: 1550-1555 - [c24]Mingxi Li, Yan Xiong, Xuangou Wu, Xiancun Zhou, Yuhui Sun, Shenpei Chen, Xiaoya Zhu:
A Regional Statistics Detection Scheme against Sybil Attacks in WSNs. TrustCom/ISPA/IUCC 2013: 285-291 - [c23]Yiqing Hu, Yan Xiong, Xudong Gong, Qiwei Lu, Mingxi Li, Wenchao Huang:
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism. TrustCom/ISPA/IUCC 2013: 1729-1734 - [c22]Hisham Mustafa, Yan Xiong:
Routing attacks detection and reaction scheme for mobile ad hoc networks using statistical methods. WOCC 2013: 659-664 - [i3]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu:
Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones. CoRR abs/1306.1651 (2013) - [i2]Qiwei Lu, Wenchao Huang, Xudong Gong, Xingfu Wang, Yan Xiong, Fuyou Miao:
A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET. CoRR abs/1307.2977 (2013) - [i1]Qiwei Lu, Wenchao Huang, Yan Xiong, Xudong Gong:
Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining. CoRR abs/1307.2991 (2013) - 2012
- [j12]Chaogang Tang, Qing Li, Yan Xiong, Shiting Wen, An Liu, Farong Zhong:
Dominance-Based Service Selection Scheme with Concurrent Requests. J. Comput. Sci. Eng. 6(2): 89-104 (2012) - [c21]Chaogang Tang, Shiting Wen, Qing Li, Yan Xiong, An Liu:
Probabilistic Top-k Dominating Composite Service Selection. ICEBE 2012: 1-8 - [c20]Xiancun Zhou, Yan Xiong, Renjin Liu:
Research on User Authentication Scheme against the Man-in-the-Middle Attack. ICICA (2) 2012: 1-8 - [c19]Shichen Liu, Yan Xiong, Qiwei Lu, Wenchao Huang:
Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization. IJCCI 2012: 133-143 - [c18]Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang:
Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing. TrustCom 2012: 100-108 - [c17]Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao:
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET. TrustCom 2012: 656-665 - 2011
- [j11]Xiaoming Deng, Yan Xiong:
A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks. J. Comput. Sci. Technol. 26(4): 732-743 (2011) - [c16]Dawei Li, Shujin Qin, Yan Xiong, Li Wang:
The Research and Realization of Algorithms for Guillotine Rectangle Cutting Stock Problem. ICDMA 2011: 1313-1316 - [c15]Chaogang Tang, Qing Li, Yan Xiong, An Liu, Shiting Wen:
A Dominance-Based Approach for Selection in Service Composition. ICEBE 2011: 36-43 - [c14]Xiancun Zhou, Yan Xiong:
An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks. ICICA (LNCS) 2011: 266-273 - [c13]Yan Xiong, Wenyong Zhou, Chang-an Wu, Lei Li, Hongbing Liu:
TSP evolutionary algorithm based on fitness increment. ICNC 2011: 2364-2367 - [c12]Wenyong Zhou, Yan Xiong, Chang-an Wu, Hongbing Liu:
Fast Support Vector Regression Based on Cut. ICSI (2) 2011: 363-370 - 2010
- [j10]Depin Chen, Yan Xiong, Jun Yan, Gui-Rong Xue, Gang Wang, Zheng Chen:
Knowledge transfer for cross domain learning to rank. Inf. Retr. 13(3): 236-253 (2010) - [j9]Yan Deng, Xiangning He, Jing Zhao, Yan Xiong, Yan-qun Shen, Jian Jiang:
Application of artificial neural network for switching loss modeling in power IGBTs. J. Zhejiang Univ. Sci. C 11(6): 435-443 (2010) - [c11]Chaogang Tang, Qing Li, Yan Xiong, An Liu, Shiting Wen:
Constraints Partition Based Service Process Replacement with End-to-End QoS Constraints. SKG 2010: 157-163 - [c10]Xiaoming Deng, Yan Xiong, Depin Chen:
MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks. WiMob 2010: 225-232
2000 – 2009
- 2009
- [c9]Wenchao Huang, Yan Xiong, Depin Chen:
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. CSE (2) 2009: 809-816 - 2008
- [j8]Xin Li, Bei Hua, Yi Shang, Yan Xiong:
A robust localization algorithm in wireless sensor networks. Frontiers Comput. Sci. China 2(4): 438-450 (2008) - [c8]Depin Chen, Jun Yan, Gang Wang, Yan Xiong, Weiguo Fan, Zheng Chen:
TransRank: A Novel Algorithm for Transfer of Rank Learning. ICDM Workshops 2008: 106-115 - 2007
- [j7]Yan Xiong, Wei Wu, Xidai Kang, Chao Zhang:
Training Pi-Sigma Network by Online Gradient Algorithm with Penalty for Small Weight Update. Neural Comput. 19(12): 3356-3368 (2007) - [j6]Chao Zhang, Wei Wu, Yan Xiong:
Convergence Analysis of Batch Gradient Algorithm for Three Classes of Sigma-Pi Neural Networks. Neural Process. Lett. 26(3): 177-189 (2007) - [c7]Yushu Lai, Xunbo Li, Yan Xiong:
Multiple Hierarchical Reasoning in Uncertain Situations for Complex Device Fault Diagnosis. ISIC 2007: 534-538 - [c6]Xidai Kang, Yan Xiong, Chao Zhang, Wei Wu:
Convergence of Online Gradient Algorithm with Stochastic Inputs for Pi-Sigma Neural Networks. FOCI 2007: 564-569 - [c5]Jianlin Wu, Shuangshuang Lou, Yan Xiong, Bai Wang:
A Mechanism of Timely Knowledge Push on Demand Based on ECA and Multi-Agent Techniques. CONFENIS (1) 2007: 317-326 - [c4]Jianlin Wu, Yan Xiong, Shuangshuang Lou, Bai Wang:
Research on Customer Profile Integration of Telecom Enterprises Based on Ontology. CONFENIS (1) 2007: 771-780 - 2006
- [j5]Xiaofan Lin, Yan Xiong:
Detection and analysis of table of contents based on content association. Int. J. Document Anal. Recognit. 8(2-3): 132-143 (2006) - [j4]Yici Cai, Bin Liu, Yan Xiong, Qiang Zhou, Xianlong Hong:
Priority-Based Routing Resource Assignment Considering Crosstalk. J. Comput. Sci. Technol. 21(6): 913-921 (2006) - 2005
- [j3]Yici Cai, Yan Xiong, Xianlong Hong, Yi Liu:
Reliable buffered clock tree routing algorithm with process variation tolerance. Sci. China Ser. F Inf. Sci. 48(5): 670-680 (2005) - 2002
- [c3]Meiliu Lu, Yan Xiong, Du Zhang:
A Web-based Microarray Experiment Management System. CAINE 2002: 29-32 - 2001
- [j2]Yan Xiong, Qiang Huo, Chorkin Chan:
A Discrete Contextual Stochastic Model for the Offline Recognition of Handwritten Chinese Characters. IEEE Trans. Pattern Anal. Mach. Intell. 23(7): 774-782 (2001)
1990 – 1999
- 1999
- [c2]Yan Xiong, Stephen E. Reichenbach:
Maximum mutual information estimation of a simplified hidden MRF for offline handwritten Chinese character recognition. Document Recognition and Retrieval 1999: 58-63 - [c1]Stephen E. Reichenbach, Yan Xiong, Ram M. Narayanan, Luyin Cao:
Information theoretic assessment and design of hyperspectral imaging systems. Visual Information Processing 1999: 100-104 - 1997
- [j1]Yan Xiong, Jia-Xiong Peng, Ming-yue Ding, Dong-Hui Xue:
The unique solution of projective invariants of six points from four uncalibrated images. Pattern Recognit. 30(3): 513-517 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint