default search action
Hamid Haj Seyyed Javadi
Person information
- affiliation: Shahed University, Tehran, Iran
- affiliation (PhD 2002): Amirkabir University of Technology, Tehran, Iran
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j73]Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm. Clust. Comput. 27(2): 1503-1525 (2024) - [j72]Leili Nosrati, Amir-Massoud Bidgoli, Hamid Haj Seyyed Javadi:
Identifying People's Faces in Smart Banking Systems Using Artificial Neural Networks. Int. J. Comput. Intell. Syst. 17(1): 9 (2024) - [j71]Nasim Vatani, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi, Somayyeh Jafarali Jassbi:
Social networks data analytical approaches for trust-based recommender systems: A systematic literature review. Int. J. Commun. Syst. 37(5) (2024) - [j70]Seyedeh Shabnam Jazaeri, Parvaneh Asghari, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues. Multim. Tools Appl. 83(1): 1311-1377 (2024) - [j69]Hossein Alikarami, Amir-Massoud Bidgoli, Hamid Haj Seyed Javadi:
Belief Mining in Persian Texts Based on Deep Learning and Users' Opinions. IEEE Trans. Affect. Comput. 15(2): 632-643 (2024) - [j68]A. Moradikashkooli, H. Haj Seyyed Javadi, Sam Jabbehdari:
An efficient optimization algorithm for nonlinear 2D fractional optimal control problems. J. Supercomput. 80(6): 7906-7930 (2024) - [j67]Ronita Rezapour, Parvaneh Asghari, Hamid Haj Seyyed Javadi, Shamsollah Ghanbari:
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing. J. Supercomput. 80(18): 26614-26657 (2024) - [i6]Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar:
Reducing the computational complexity of fuzzy identity-based encryption from lattice. IACR Cryptol. ePrint Arch. 2024: 16 (2024) - [i5]Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:
Fuzzy Identity Based Encryption with a flexible threshold value. IACR Cryptol. ePrint Arch. 2024: 43 (2024) - 2023
- [j66]Nasim Vatani, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi:
Personality-based and trust-aware products recommendation in social networks. Appl. Intell. 53(1): 879-903 (2023) - [j65]Nasim Vatani, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi:
Correction to: Personality-based and trust-aware products recommendation in social networks. Appl. Intell. 53(13): 17241 (2023) - [j64]Mehran Aghaei, Parvaneh Asghari, Sepideh Adabi, Hamid Haj Seyyed Javadi:
Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing. Clust. Comput. 26(2): 1479-1493 (2023) - [j63]Mohammad Faraji Mehmandar, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
Fuzzy Q-learning approach for autonomic resource provisioning of IoT applications in fog computing environments. J. Ambient Intell. Humaniz. Comput. 14(4): 4237-4255 (2023) - [j62]Hadi Mojez, Amir-Massoud Bidgoli, Hamid Haj Seyyed Javadi:
Extended array model of star capacity-aware delay-based next controller placement problem for multiple controller failures in software-defined wide area networks. J. Ambient Intell. Humaniz. Comput. 14(8): 11039-11057 (2023) - [j61]Mohammadreza Haj Seyed Javadi, Hamid Haj Seyyed Javadi, Parisa Rahmani:
Localization of sensor nodes in the Internet of Things using fuzzy logic and learning automata. J. Intell. Fuzzy Syst. 45(1): 619-635 (2023) - [j60]Babak Afshin, Mohammad Ebrahim Shiri, Kamran Layeghi, Hamid Haj Seyyed Javadi:
Kernel Optimization for Reducing Core Vector Machine Classification Error. Neural Process. Lett. 55(7): 10011-10036 (2023) - [j59]Samira Akhbarifar, Hamid Haj Seyyed Javadi, Amir Masoud Rahmani, Mehdi Hosseinzadeh:
A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment. Pers. Ubiquitous Comput. 27(3): 697-713 (2023) - [j58]Bijan Pourghorbani Dinachali, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
A pricing approach for optimal use of computing resources in cloud federation. J. Supercomput. 79(3): 3055-3094 (2023) - [j57]Seyedeh Shabnam Jazaeri, Parvaneh Asghari, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions. J. Supercomput. 79(15): 17619-17669 (2023) - [j56]Rasoul Roustaei, Hamid Haj Seyyed Javadi, Midia Reshadi:
Implicit Lightweight Proxy Based Key Agreement for the Internet of Things (ILPKA). Wirel. Pers. Commun. 130(3): 1833-1860 (2023) - 2022
- [j55]Marziyeh Dadvar, Hamidreza Navidi, Hamid Haj Seyyed Javadi, Mitra Mirzarezaee:
A cooperative approach for combining particle swarm optimization and differential evolution algorithms to solve single-objective optimization problems. Appl. Intell. 52(4): 4089-4108 (2022) - [j54]Tina Samizadeh Nikoui, Amir Masoud Rahmani, Ali Balador, Hamid Haj Seyyed Javadi:
Analytical model for task offloading in a fog computing system with batch-size-dependent service. Comput. Commun. 190: 201-215 (2022) - [j53]Bijan Pourghorbani Dinachali, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
A cost-aware approach for cloud federation formation. Trans. Emerg. Telecommun. Technol. 33(12) (2022) - [j52]Mohammad Nazaralipoorsoomali, Parvaneh Asghari, Seyyed Hamid Haj Seyyed Javadi:
Performance improvement of Routing Protocol for Low-Power and Lossy Networks protocol in an Internet of Things-based smart retail system. Int. J. Commun. Syst. 35(10) (2022) - [j51]Parvaneh Asghari, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi:
Privacy-aware cloud service composition based on QoS optimization in Internet of Things. J. Ambient Intell. Humaniz. Comput. 13(11): 5295-5320 (2022) - [j50]Hadi Mojez, Amir-Massoud Bidgoli, Hamid Haj Seyyed Javadi:
Star capacity-aware latency-based next controller placement problem with considering single controller failure in software-defined wide-area networks. J. Supercomput. 78(11): 13205-13244 (2022) - [j49]Mohammad Faraji Mehmandar, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
A self-learning approach for proactive resource and service provisioning in fog environment. J. Supercomput. 78(15): 16997-17026 (2022) - [j48]Neda Solari Esfehani, Hamid Haj Seyyed Javadi:
A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks. Wirel. Pers. Commun. 127(4): 2905-2934 (2022) - 2021
- [j47]Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions. Clust. Comput. 24(4): 3187-3228 (2021) - [j46]Ronita Rezapour, Parvaneh Asghari, Hamid Haj Seyyed Javadi, Shamsollah Ghanbari:
Security in fog computing: A systematic review on issues, challenges and solutions. Comput. Sci. Rev. 41: 100421 (2021) - [j45]Mohammad Faraji Mehmandar, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach. Trans. Emerg. Telecommun. Technol. 32(11) (2021) - [j44]Aniseh Najafi, Majid Bayat, Hamid Haj Seyyed Javadi:
Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things. Future Gener. Comput. Syst. 124: 285-294 (2021) - [j43]Tina Samizadeh Nikoui, Amir Masoud Rahmani, Ali Balador, Hamid Haj Seyyed Javadi:
Internet of Things architecture challenges: A systematic review. Int. J. Commun. Syst. 34(4) (2021) - [j42]Vahid Chegeni, Hamid Haj Seyyed Javadi, Mohammad Reza Moazami Goudarzi, Afshin Rezakhani:
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case. ISC Int. J. Inf. Secur. 13(1): 73-85 (2021) - [j41]Aniseh Najafi, Majid Bayat, Hamid Haj Seyyed Javadi:
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud. ISC Int. J. Inf. Secur. 13(2): 87-100 (2021) - [j40]Maryam Hozhabr, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
Dynamic secure multi-keyword ranked search over encrypted cloud data. J. Inf. Secur. Appl. 61: 102902 (2021) - [j39]Houshyar Mohammady Talvar, Hamid Haj Seyyed Javadi, Hamidreza Navidi, Afshin Rezakhani:
A new resource allocation method in fog computing via non-cooperative game theory. J. Intell. Fuzzy Syst. 41(2): 3921-3932 (2021) - [j38]Aniseh Najafi, Hamid Haj Seyyed Javadi, Majid Bayat:
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multim. Tools Appl. 80(17): 26049-26068 (2021) - [j37]Neda Solari Esfehani, Hamid Haj Seyyed Javadi:
A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network. Wirel. Networks 27(4): 3025-3052 (2021) - [i4]Akbar Morshed Aski, Hamid Haj Seyyed Javadi:
A novel key pre-distribution scheme based on μ-PBIBD combinatorial design in the resource-constrained IoT network. CoRR abs/2102.07137 (2021) - [i3]Parvaneh Asghari, Hamid Haj Seyyed Javadi:
Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices. CoRR abs/2102.13340 (2021) - [i2]Vahid Chegeni, H. Haj Seyyed Javadi, Mohammad Reza Moazami Goudarzi, Afshin Rezakhani:
Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case. CoRR abs/2104.07714 (2021) - 2020
- [j36]Mohammad Faraji Mehmandar, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
A dynamic fog service provisioning approach for IoT applications. Int. J. Commun. Syst. 33(14) (2020) - [j35]Morteza Babazadeh Shareh, Hamidreza Navidi, Hamid Haj Seyyed Javadi, Mehdi Hosseinzadeh:
Corrigendum to "Preventing Sybil Attacks in P2P File Sharing Networks Based on the Evolutionary Game Model" [Information Sciences 470 (2019) 94-108]. Inf. Sci. 509: 317 (2020) - [j34]Nafiseh Masaeli, Hamid Haj Seyyed Javadi, Seyed Hossein Erfani:
Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds. J. Inf. Secur. Appl. 54: 102519 (2020) - [j33]Sasan Saqaeeyan, Hamid Haj Seyyed Javadi, Hossein Amirkhani:
Anomaly Detection in Smart Homes Using Bayesian Networks. KSII Trans. Internet Inf. Syst. 14(4): 1796-1816 (2020) - [j32]Kobra Alimohammadi, Majid Bayat, Hamid H. S. Javadi:
A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. Multim. Tools Appl. 79(3-4): 2855-2872 (2020) - [j31]Akbar Morshed Aski, Hamid Haj Seyyed Javadi, Gholam Hassan Shirdel:
A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network. Wirel. Pers. Commun. 114(3): 2079-2103 (2020)
2010 – 2019
- 2019
- [j30]Parvaneh Asghari, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi:
Internet of Things applications: A systematic review. Comput. Networks 148: 241-261 (2019) - [j29]Pooneh Nikkhah Bahrami, Hamid H. S. Javadi, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A hierarchical key pre-distribution scheme for fog networks. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j28]Parvaneh Asghari, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi:
A medical monitoring scheme and health-medical service composition model in cloud-based IoT platform. Trans. Emerg. Telecommun. Technol. 30(6) (2019) - [j27]Aniseh Najafi, Hamid Haj Seyyed Javadi, Majid Bayat:
Verifiable ranked search over encrypted data with forward and backward privacy. Future Gener. Comput. Syst. 101: 410-419 (2019) - [j26]Morteza Babazadeh Shareh, Hamidreza Navidi, Hamid Haj Seyyed Javadi, Mehdi Hosseinzadeh:
Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model. Inf. Sci. 470: 94-108 (2019) - [j25]Hamid Reza Sharifi, Hamid Haj Seyyed Javadi, Ali Moeini, Mehdi Hosseinzadeh:
Residual design of sink localization algorithms for wireless sensor networks. J. High Speed Networks 25(1): 87-99 (2019) - [j24]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi:
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures. J. Inf. Process. Syst. 15(4): 865-889 (2019) - [j23]Elaheh Gavagsaz, Ali Rezaee, Hamid Haj Seyyed Javadi:
Load balancing in join algorithms for skewed data in MapReduce systems. J. Supercomput. 75(1): 228-254 (2019) - [j22]Parisa Rahmani, Hamid Haj Seyyed Javadi:
Topology Control in MANETs Using the Bayesian Pursuit Algorithm. Wirel. Pers. Commun. 106(3): 1089-1116 (2019) - [p1]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi, Lizhe Wang, Fatos Xhafa, Wei Ren:
A layered security architecture based on cyber kill chain against advanced persistent threats. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 135-155 - 2018
- [j21]Hamid Reza Sharifi, Hamid Haj Seyyed Javadi, Ali Moeini, Mehdi Hosseinzadeh:
Unital Design Based Sink Location Service for Wireless Sensor Networks. IEEE Access 6: 28733-28745 (2018) - [j20]Tooska Dargahi, Hamid H. S. Javadi, Hosein Shafiei, Payam Mousavi:
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks. Int. J. High Perform. Comput. Netw. 11(2): 117-128 (2018) - [j19]Parvaneh Asghari, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi:
Service composition approaches in IoT: A systematic review. J. Netw. Comput. Appl. 120: 61-77 (2018) - [j18]Parisa Rahmani, Hamid Haj Seyyed Javadi, Hamidreza Bakhshi, Mehdi Hosseinzadeh:
TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata. J. Netw. Syst. Manag. 26(2): 426-462 (2018) - [j17]Hossein Shirgahi, Mehran Mohsenzadeh, Hamid Haj Seyyed Javadi:
A new method of trust mirroring estimation based on social networks parameters by fuzzy system. Int. J. Mach. Learn. Cybern. 9(7): 1153-1168 (2018) - [j16]Hooman Asadian, Hamid Haj Seyed Javadi:
Identification of Sybil attacks on social networks using a framework based on user interactions. Secur. Priv. 1(2) (2018) - [j15]Elaheh Gavagsaz, Ali Rezaee, Hamid Haj Seyyed Javadi:
Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling. J. Supercomput. 74(7): 3415-3440 (2018) - [j14]Mohaddese Anzani, Hamid Haj Seyyed Javadi, Vahid Modiri:
Key-management scheme for wireless sensor networks based on merging blocks of symmetric design. Wirel. Networks 24(8): 2867-2879 (2018) - [j13]Parisa Rahmani, Hamid Haj Seyyed Javadi, Hamidreza Bakhshi, Mehdi Hosseinzadeh:
Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata. Wirel. Pers. Commun. 103(3): 2285-2316 (2018) - 2017
- [j12]Hossein Shirgahi, Mehran Mohsenzadeh, Hamid Haj Seyyed Javadi:
Trust estimation of the semantic web using semantic web clustering. J. Exp. Theor. Artif. Intell. 29(3): 537-556 (2017) - [j11]Hossein Shirgahi, Mehran Mohsenzadeh, Hamid Haj Seyyed Javadi:
A three level fuzzy system for evaluating the trust of single web services. J. Intell. Fuzzy Syst. 32(1): 589-611 (2017) - [j10]Tooska Dargahi, Hamid H. S. Javadi, Hosein Shafiei:
Securing Underwater Sensor Networks Against Routing Attacks. Wirel. Pers. Commun. 96(2): 2585-2602 (2017) - [j9]Vahid Modiri, Hamid Haj Seyyed Javadi, Mohaddese Anzani:
A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design. Wirel. Pers. Commun. 96(2): 2821-2841 (2017) - 2016
- [j8]Nassim Taghipour, Hamid Haj Seyyed Javadi, Mohammad Mahdi Dehshibi, Andrew Adamatzky:
On Complexity of Persian Orthography: L-Systems Approach. Complex Syst. 25(2) (2016) - 2015
- [j7]Ali Pirkhedri, Hamid Haj Seyyed Javadi:
Solving the time-fractional diffusion equation via Sinc-Haar collocation method. Appl. Math. Comput. 257: 317-326 (2015) - [j6]Seyed Hossein Erfani, Hamid Haj Seyyed Javadi, Amir Masoud Rahmani:
A dynamic key management scheme for dynamic wireless sensor networks. Secur. Commun. Networks 8(6): 1040-1049 (2015) - [j5]Tooska Dargahi, Hamid H. S. Javadi, Mehdi Hosseinzadeh:
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Secur. Commun. Networks 8(8): 1561-1574 (2015) - [i1]Hamid Haj Seyed Javadi, Andrea Montanari:
The Hidden Subgraph Problem. CoRR abs/1511.05254 (2015) - 2014
- [j4]Masoumeh Javanbakht, Hossein Erfani, Hamid Haj Seyyed Javadi, Parisa Daneshjoo:
Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs. Secur. Commun. Networks 7(11): 2003-2014 (2014) - 2013
- [j3]Hossein Shirgahi, Mehran Mohsenzadeh, Hamid Haj Seyyed Javadi:
Boundary query solution using convex hull algorithm. J. Exp. Theor. Artif. Intell. 25(1): 139-146 (2013) - [j2]Nafiseh Masaeli, Hamid Haj Seyed Javadi, Elham Noori:
Optimistic Selection of Cluster Heads Based on Facility Location Problem in Cluster-Based Routing Protocols. Wirel. Pers. Commun. 72(4): 2721-2740 (2013) - 2012
- [j1]Sadegh Nourossana, Hossein Erfani, H. Haj Seyyed Javadi, Amir Masoud Rahmani:
Bee Colony System: Preciseness and Speed in Discrete Optimization. Int. J. Artif. Intell. Tools 21(1) (2012) - 2010
- [c6]Mohammad Alamery, Ahmad Faraahi, H. Haj Seyyed Javadi, Sadegh Nourossana, Hossein Erfani:
Multi-Join Query Optimization Using the Bees Algorithm. DCAI 2010: 449-457 - [c5]Faranak Bahredar, Hossein Erfani, H. Haj Seyyed Javadi, Nafiseh Masaeli:
A Meta Heuristic Solution for Closest String Problem Using Ant Colony System. DCAI 2010: 549-557 - [c4]Sadegh Nourossana, H. Haj Seyyed Javadi, Hossein Erfani, Amir Masoud Rahmani:
Bee Colony System: Preciseness and Speed in Discrete Optimization. DCAI 2010: 649-655 - [c3]F. S. Halataei, H. Haj Seyyed Javadi:
SIMD Bpriori Algorithms. EMS 2010: 357-362
2000 – 2009
- 2009
- [c2]Amin Zargar Nasrollahy, Hamid Haj Seyyed Javadi:
Using Particle Swarm Optimization for Robot Path Planning in Dynamic Environments with Moving Obstacles and Target. EMS 2009: 60-65 - [c1]Abdolhamid Momenzadeh, Hamid Haj Seyyed Javadi, Mashalla Abbasi Dezfouli:
Design an Efficient System for Intrusion Detection via Evolutionary Fuzzy System. UKSim 2009: 89-94
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint