


default search action
Aleksandar Ignjatovic
Person information
- affiliation: University of New South Wales, Sydney, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c47]Zhaofeng Zhong, Pathmapirian Nanthakumar
, Gabriel Field, Chamira U. S. Edussooriya, Aleksandar Ignjatovic, Chamith Wijenayake
:
Acquisition and Processing of Chromatic Derivatives using FPGA-based Digital Hardware. ISCAS 2024: 1-5 - 2022
- [j38]Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran
:
VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 657-678 (2022) - [j37]Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran
:
A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 589-613 (2022) - [j36]Mohammad Allahbakhsh
, Haleh Amintoosi
, Aleksandar Ignjatovic, Elisa Bertino
:
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations. IEEE Trans. Serv. Comput. 15(2): 698-709 (2022) - [c46]Kheng Kua, Aleksandar Ignjatovic:
Iterative Filtering Algorithms for Computing Consensus Analyst Estimates. CIFEr 2022: 1-8 - 2021
- [j35]Darshana Jayasinghe
, Aleksandar Ignjatovic
, Sri Parameswaran
:
UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks. IEEE Access 9: 108411-108425 (2021) - [j34]Guntur Dharma Putra
, Volkan Dedeoglu
, Salil S. Kanhere
, Raja Jurdak
, Aleksandar Ignjatovic
:
Trust-Based Blockchain Authorization for IoT. IEEE Trans. Netw. Serv. Manag. 18(2): 1646-1658 (2021) - [j33]Darshana Jayasinghe, Aleksandar Ignjatovic, Roshan G. Ragel, Jude Angelo Ambrose, Sri Parameswaran
:
QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks. ACM Trans. Design Autom. Electr. Syst. 26(5): 33:1-33:36 (2021) - [c45]Amir Antonir
, Chamith Wijenayake, Aleksandar Ignjatovic:
Acquisition of High Bandwidth Signals by Sampling an Analog Chromatic Derivatives Filterbank. ISCAS 2021: 1-5 - [i8]Nicholas Malecki, Hye-young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino:
Simeon - Secure Federated Machine Learning Through Iterative Filtering. CoRR abs/2103.07704 (2021) - [i7]Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak, Aleksandar Ignjatovic:
Trust-based Blockchain Authorization for IoT. CoRR abs/2104.00832 (2021) - 2020
- [j32]Chamith Wijenayake
, Amir Antonir
, Gabriele Keller
, Aleksandar Ignjatovic
:
An Adaptive Denoising Algorithm for Improving Frequency Estimation and Tracking. IEEE Trans. Circuits Syst. II Express Briefs 67-II(1): 172-176 (2020) - [j31]Amin Malekpour, Roshan G. Ragel, Tuo Li, Haris Javaid, Aleksandar Ignjatovic, Sri Parameswaran
:
Hardware Trojan Mitigation in Pipelined MPSoCs. ACM Trans. Design Autom. Electr. Syst. 25(1): 6:1-6:27 (2020) - [c44]Hassaan Saadat, Haris Javaid, Aleksandar Ignjatovic, Sri Parameswaran
:
WEID: Worst-case Error Improvement in Approximate Dividers. ASP-DAC 2020: 593-598 - [c43]Hassaan Saadat, Haris Javaid, Aleksandar Ignjatovic, Sri Parameswaran
:
REALM: Reduced-Error Approximate Log-based Integer Multiplier. DATE 2020: 1366-1371
2010 – 2019
- 2019
- [j30]Arash Bayat
, Bruno Gaëta, Aleksandar Ignjatovic, Sri Parameswaran
:
Pairwise alignment of nucleotide sequences using maximal exact matches. BMC Bioinform. 20(1): 261:1-261:15 (2019) - [j29]Mohsen Rezvani
, David Rajaratnam
, Aleksandar Ignjatovic, Maurice Pagnucco
, Sanjay Jha
:
Analyzing XACML policies using answer set programming. Int. J. Inf. Sec. 18(4): 465-479 (2019) - [j28]Chamith Wijenayake
, Aleksandar Ignjatovic
, Gabriele Keller
:
On reconstruction of bandlimited signals from purely timing information. Signal Process. 159: 89-92 (2019) - [j27]Kai Li
, Chau Yuen
, Branislav Kusy, Raja Jurdak
, Aleksandar Ignjatovic
, Salil S. Kanhere
, Sanjay Jha
:
Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting. IEEE Trans. Mob. Comput. 18(6): 1274-1287 (2019) - [c42]Darshana Jayasinghe, Aleksandar Ignjatovic, Sri Parameswaran
:
RFTC: Runtime Frequency Tuning Countermeasure Using FPGA Dynamic Reconfiguration to Mitigate Power Analysis Attacks. DAC 2019: 139 - [c41]Amin Malekpour, Roshan G. Ragel, Daniel Murphy, Aleksandar Ignjatovic, Sri Parameswaran
:
Hardware Trojan Detection and Recovery in MPSoCs via On-line Application Specific Testing. DDECS 2019: 1-6 - [c40]Darshana Jayasinghe, Aleksandar Ignjatovic, Sri Parameswaran
:
SCRIP: Secure Random Clock Execution on Soft Processor Systems to Mitigate Power-based Side Channel Attacks. ICCAD 2019: 1-7 - 2018
- [j26]Chamith Wijenayake
, Jarryd Scutts, Aleksandar Ignjatovic
:
Signal recovery algorithm for 2-level amplitude sampling using chromatic signal approximations. Signal Process. 153: 143-152 (2018) - [j25]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino:
A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems. ACM Trans. Internet Techn. 18(4): 55:1-55:20 (2018) - [j24]Aleksandar Ignjatovic
, Chamith Wijenayake
, Gabriele Keller
:
Chromatic Derivatives and Approximations in Practice - Part I: A General Framework. IEEE Trans. Signal Process. 66(6): 1498-1512 (2018) - [j23]Aleksandar Ignjatovic
, Chamith Wijenayake
, Gabriele Keller
:
Chromatic Derivatives and Approximations in Practice - Part II: Nonuniform Sampling, Zero-Crossings Reconstruction, and Denoising. IEEE Trans. Signal Process. 66(6): 1513-1525 (2018) - 2017
- [j22]Arash Bayat, Bruno Gaëta, Aleksandar Ignjatovic, Sri Parameswaran
:
Improved VCF normalization for accurate VCF comparison. Bioinform. 33(7): 964-970 (2017) - [c39]Amin Malekpour, Roshan G. Ragel, Aleksandar Ignjatovic, Sri Parameswaran
:
DoSGuard: Protecting pipelined MPSoCs against hardware Trojan based DoS attacks. ASAP 2017: 45-52 - [c38]Haleh Amintoosi
, Mohammad Allahbakhsh, Salil S. Kanhere
, Aleksandar Ignjatovic:
Trust and Privacy Challenges in Social Participatory Networks. ASSRI 2017: 178-190 - [c37]Amin Malekpour, Roshan G. Ragel, Aleksandar Ignjatovic, Sri Parameswaran
:
TrojanGuard: Simple and Effective Hardware Trojan Mitigation Techniques for Pipelined MPSoCs. DAC 2017: 19:1-19:6 - [c36]Darshana Jayasinghe, Aleksandar Ignjatovic, Sri Parameswaran
:
NORA: Algorithmic Balancing without Pre-charge to Thwart Power Analysis Attacks. VLSID 2017: 167-172 - 2016
- [j21]Aleksandar Ignjatovic
:
Asymptotic behaviour of some families of orthonormal polynomials and an associated Hilbert space. J. Approx. Theory 210: 41-79 (2016) - [c35]Darshana Jayasinghe, Shivam Bhasin, Sri Parameswaran
, Aleksandar Ignjatovic:
Does it sound as it claims: a detailed side-channel security analysis of QuadSeal countermeasure. Conf. Computing Frontiers 2016: 449-454 - [c34]Mohsen Rezvani, Aleksandar Ignjatovic, Maurice Pagnucco
, Sanjay K. Jha
:
Anomaly-free policy composition in software-defined networks. Networking 2016: 28-36 - [i6]Kai Li, Chau Yuen, Branislav Kusy, Raja Jurdak, Aleksandar Ignjatovic, Salil S. Kanhere, Sanjay K. Jha:
Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting. CoRR abs/1603.02476 (2016) - 2015
- [j20]Yogita Chapre, Aleksandar Ignjatovic, Aruna Seneviratne
, Sanjay K. Jha
:
CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO. Pervasive Mob. Comput. 23: 89-103 (2015) - [j19]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Secur. Comput. 12(1): 98-110 (2015) - [j18]Mohsen Rezvani, Verica Sekulic, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Interdependent Security Risk Analysis of Hosts and Flows. IEEE Trans. Inf. Forensics Secur. 10(11): 2325-2339 (2015) - [j17]Mohammad Allahbakhsh, Aleksandar Ignjatovic:
An Iterative Method for Calculating Robust Rating Scores. IEEE Trans. Parallel Distributed Syst. 26(2): 340-350 (2015) - [j16]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Hamid Reza Motahari-Nezhad, Boualem Benatallah
:
Robust evaluation of products and reviewers in social rating systems. World Wide Web 18(1): 73-109 (2015) - [c33]Darshana Jayasinghe, Aleksandar Ignjatovic, Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran
:
QuadSeal: Quadruple algorithmic symmetrizing countermeasure against power based side-channel attacks. CASES 2015: 21-30 - [c32]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A Collaborative Reputation System Based on Credibility Propagation in WSNs. ICPADS 2015: 1-8 - [c31]Jude Angelo Ambrose, Nick Higgins, Mrinal Chakravarthy, Shivam Gargg, Tuo Li, Daniel Murphy, Aleksandar Ignjatovic, Sri Parameswaran
:
ARCHER: Communication-based predictive architecture selection for application specific multiprocessor Systems-on-Chip. ISCAS 2015: 413-416 - [c30]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A trust assessment framework for streaming data in WSNs using iterative filtering. ISSNIP 2015: 1-6 - [c29]Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay K. Jha
:
An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems. SEC 2015: 189-203 - 2014
- [j15]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah
, Amin Beheshti
, Norman Foo, Elisa Bertino:
Representation and querying of unfair evaluations in social rating systems. Comput. Secur. 41: 68-88 (2014) - [j14]Haris Javaid, Aleksandar Ignjatovic, Sri Parameswaran
:
Performance Estimation of Pipelined MultiProcessor System-on-Chips (MPSoCs). IEEE Trans. Parallel Distributed Syst. 25(8): 2159-2168 (2014) - [c28]Ghulam Murtaza
, Salil S. Kanhere
, Aleksandar Ignjatovic, Raja Jurdak
, Sanjay K. Jha
:
Trajectory Approximation for Resource Constrained Mobile Sensor Networks. DCOSS 2014: 59-66 - [c27]Kai Li
, Branislav Kusy
, Raja Jurdak
, Aleksandar Ignjatovic, Salil S. Kanhere
, Sanjay K. Jha
:
κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks. EWSN 2014: 17-33 - [c26]Darshana Jayasinghe, Roshan G. Ragel, Jude Angelo Ambrose, Aleksandar Ignjatovic, Sri Parameswaran
:
Advanced modes in AES: Are they safe from power analysis based side channel attacks? ICCD 2014: 173-180 - [c25]Yogita Chapre, Aleksandar Ignjatovic, Aruna Seneviratne
, Sanjay K. Jha
:
CSI-MIMO: Indoor Wi-Fi fingerprinting system. LCN 2014: 202-209 - [c24]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Provenance-aware security risk analysis for hosts and network flows. NOMS 2014: 1-8 - 2013
- [j13]Mohammad Allahbakhsh, Boualem Benatallah
, Aleksandar Ignjatovic, Hamid R. Motahari Nezhad, Elisa Bertino, Schahram Dustdar
:
Quality Control in Crowdsourcing Systems: Issues and Directions. IEEE Internet Comput. 17(2): 76-81 (2013) - [j12]Chun Tung Chou
, Aleksandar Ignjatovic, Wen Hu
:
Efficient Computation of Robust Average of Compressive Sensing Data in Wireless Sensor Networks in the Presence of Sensor Faults. IEEE Trans. Parallel Distributed Syst. 24(8): 1525-1534 (2013) - [c23]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah
, Amin Beheshti
, Elisa Bertino, Norman Foo:
Collusion Detection in Online Rating Systems. APWeb 2013: 196-207 - [c22]Mohsen Rezvani, Aleksandar Ignjatovic, Sanjay K. Jha
:
Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency. DCOSS 2013: 286-288 - [c21]Babak Saghaie, Roshan G. Ragel, Sri Parameswaran
, Aleksandar Ignjatovic:
A novel intermittent fault Markov model for deep sub-micron processors. ACM Great Lakes Symposium on VLSI 2013: 13-18 - [c20]Su Myat Min, Haris Javaid, Aleksandar Ignjatovic, Sri Parameswaran
:
A case study on exploration of last-level cache for energy reduction in DDR3 DRAM. MECO 2013: 42-45 - [c19]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. SenSys 2013: 30:1-30:2 - 2012
- [c18]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah
, Amin Beheshti
, Elisa Bertino, Norman Foo:
Reputation management in crowdsourcing systems. CollaborateCom 2012: 664-671 - [c17]Jude Angelo Ambrose, Aleksandar Ignjatovic, Sri Parameswaran
:
CoRaS: A multiprocessor key corruption and random round swapping for power analysis side channel attacks: A DES case study. ISCAS 2012: 253-256 - [i5]Mohammad Allahbakhsh, Aleksandar Ignjatovic:
Rating through Voting: An Iterative Method for Robust Rating. CoRR abs/1211.0390 (2012) - [i4]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
Detecting, Representing and Querying Collusion in Online Rating Systems. CoRR abs/1211.0963 (2012) - [i3]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
An Analytic Approach to People Evaluation in Crowdsourcing Systems. CoRR abs/1211.3200 (2012) - 2011
- [j11]Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran
, Aleksandar Ignjatovic:
Multiprocessor information concealment architecture to prevent power analysis-based side channel attacks. IET Comput. Digit. Tech. 5(1): 1-15 (2011) - 2010
- [j10]Haris Javaid, Aleksandar Ignjatovic, Sri Parameswaran
:
Rapid Design Space Exploration of Application Specific Heterogeneous Pipelined Multiprocessor Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 29(11): 1777-1789 (2010) - [c16]Haris Javaid, Xin He, Aleksandar Ignjatovic, Sri Parameswaran
:
Optimal synthesis of latency and throughput constrained pipelined MPSoCs targeting streaming applications. CODES+ISSS 2010: 75-84 - [c15]Andhi Janapsatya, Aleksandar Ignjatovic, Jorgen Peddersen, Sri Parameswaran
:
Dueling CLOCK: Adaptive cache replacement policy based on the CLOCK algorithm. DATE 2010: 920-925 - [c14]Haris Javaid, Aleksandar Ignjatovic, Sri Parameswaran
:
Fidelity metrics for estimation models. ICCAD 2010: 1-8
2000 – 2009
- 2009
- [j9]Swarnalatha Radhakrishnan, Hui Guo, Sri Parameswaran
, Aleksandar Ignjatovic:
HMP-ASIPs: heterogeneous multi-pipeline application-specific instruction-set processors. IET Comput. Digit. Tech. 3(1): 94-108 (2009) - [j8]Aleksandar Ignjatovic:
Chromatic derivatives and local approximations. IEEE Trans. Signal Process. 57(8): 2998-3007 (2009) - [c13]Andhi Janapsatya, Sri Parameswaran
, Aleksandar Ignjatovic:
HitME: low power Hit MEmory buffer for embedded systems. ASP-DAC 2009: 335-340 - [c12]Chung Tong Lee, Vishwa Vinay
, Eduarda Mendes Rodrigues, Gabriella Kazai, Natasa Milic-Frayling, Aleksandar Ignjatovic:
Measuring system performance and topic discernment using generalized adaptive-weight mean. CIKM 2009: 2033-2036 - [c11]Chung Tong Lee, Eduarda Mendes Rodrigues, Gabriella Kazai, Natasa Milic-Frayling, Aleksandar Ignjatovic:
Model for Voter Scoring and Best Answer Selection in Community Q&A Services. Web Intelligence 2009: 116-123 - 2008
- [c10]Jude Angelo Ambrose, Sri Parameswaran
, Aleksandar Ignjatovic:
MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. ICCAD 2008: 678-684 - [c9]Jude Angelo Ambrose, Naeill Aldon, Aleksandar Ignjatovic, Sri Parameswaran
:
Anatomy of Differential Power Analysis for AES. SYNASC 2008: 459-466 - [c8]Aleksandar Ignjatovic, Norman Foo, Chung Tong Lee:
An Analytic Approach to Reputation Ranking of Participants in Online Transactions. Web Intelligence 2008: 587-590 - 2007
- [c7]Andhi Janapsatya, Aleksandar Ignjatovic, Sri Parameswaran
, Jörg Henkel:
Instruction trace compression for rapid instruction cache simulation. DATE 2007: 803-808 - 2006
- [j7]Andhi Janapsatya, Aleksandar Ignjatovic, Sri Parameswaran
:
Exploiting statistical information for implementation of instruction scratchpad memory in embedded system. IEEE Trans. Very Large Scale Integr. Syst. 14(8): 816-829 (2006) - [c6]Andhi Janapsatya, Aleksandar Ignjatovic, Sri Parameswaran
:
A novel instruction scratchpad memory optimization method based on concomitance metric. ASP-DAC 2006: 612-617 - [c5]Andhi Janapsatya, Aleksandar Ignjatovic, Sri Parameswaran
:
Finding optimal L1 cache configuration for embedded systems. ASP-DAC 2006: 796-801 - [c4]Swarnalatha Radhakrishnan, Hui Guo, Sri Parameswaran
, Aleksandar Ignjatovic:
Application specific forwarding network and instruction encoding for multi-pipe ASIPs. CODES+ISSS 2006: 241-246 - 2005
- [j6]Patrick Caldon, Aleksandar Ignjatovic:
On mathematical instrumentalism. J. Symb. Log. 70(3): 778-794 (2005) - 2004
- [j5]Aleksandar Ignjatovic, Arun Sharma
:
Some applications of logic to feasibility in higher types. ACM Trans. Comput. Log. 5(2): 332-350 (2004) - [c3]Andhi Janapsatya, Sri Parameswaran
, Aleksandar Ignjatovic:
Hardware/software managed scratchpad memory for embedded system. ICCAD 2004: 370-377 - 2003
- [c2]Aleksandar Ignjatovic, Phuong Minh Nguyen:
Characterizing polynomial time computable functions using theories with weak set existence principles. CATS 2003: 112-122 - 2002
- [j4]Madihally J. Narasimha, Aleksandar Ignjatovic, P. P. Vaidyanathan:
Chromatic derivative filter banks. IEEE Signal Process. Lett. 9(7): 215-216 (2002) - [i2]Aleksandar Ignjatovic, Arun Sharma:
Some applications of logic to feasibility in higher types. CoRR cs.LO/0204045 (2002) - [i1]Aleksandar Ignjatovic:
A Note on Induction Schemas in Bounded Arithmetic. CoRR cs.LO/0210011 (2002)
1990 – 1999
- 1995
- [j3]Samuel R. Buss, Aleksandar Ignjatovic:
Unprovability of Consistency Statements in Fragments of Bounded Arithmetic. Ann. Pure Appl. Log. 74(3): 221-244 (1995) - [j2]Aleksandar Ignjatovic:
Delineating Classes of Computational Complexity via Second Order Theories with Weak Set Existence Principles, I. J. Symb. Log. 60(1): 103-121 (1995) - 1994
- [j1]Aleksandar Ignjatovic:
Hilbert's Program and the Omega-Rule. J. Symb. Log. 59(1): 322-343 (1994) - 1993
- [c1]Peter Clote, Aleksandar Ignjatovic, Bruce M. Kapron
:
Parallel computable higher type functionals (Extended Abstract). FOCS 1993: 72-81
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint