default search action
Yan Lindsay Sun
Person information
- affiliation: University of Rhode Island, Department of Electrical, Computer and Biomedical Engineering, Kingston, RI, USA
Other persons with the same name
- Yan Sun — disambiguation page
- Yan Sun 0002 — Shandong University of Finance and Economics, School of Management Science and Engineering, Jinan, China (and 2 more)
- Yan Sun 0003 — University of Erlangen-Nuremberg, Institute for Digital Communications, Erlangen, Germany
- Yan Sun 0004 — Beijing University of Posts and Telecommunications, School of Computer Science, China (and 1 more)
- Yan Sun 0005 — Queen Mary University of London, Department of Electronic Engineering and Computer Science, UK
- Yan Sun 0006 — Huawei Technologies, Santa Clara, CA, USA (and 1 more)
- Yan Sun 0007 — Cisco, USA (and 1 more)
- Yan Sun 0008 — Tableau Software, Seattle, WA, USA (and 1 more)
- Yan Sun 0009 — Shanghai Normal University, Department Of Mathematics, China (and 1 more)
- Yan Sun 0010 — Shanghai Jiao Tong University, China
- Yan Sun 0011 — Purdue University, Department of Statistics, West Lafayette, IN, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c63]Zhenhua Wang, Hepeng Li, Haibo He, Yan Sun:
Robust Distributed Finite-time Secondary Frequency Control of Islanded AC Microgrids With Event-Triggered Mechanism. ISGT 2023: 1-5 - 2022
- [c62]Timothy Curry, Gabriel De Pace, Benjamin Fuller, Laurent Michel, Yan Lindsay Sun:
DUELMIPs: Optimizing SDN Functionality and Security. CP 2022: 17:1-17:18 - [c61]Hui Lin, Yan Sun:
EleGNN: Electrical-Model-Guided Graph Neural Networks for Power Distribution System State Estimation. GLOBECOM 2022: 5292-5298 - [c60]Zhenhua Wang, William Danilczyk, Hepeng Li, Haibo He, Yan Lindsay Sun:
Resilient Predictor-Based Load Frequency Control for Multi-Region Power Systems Under DoS Attacks. ISGT 2022: 1-5 - 2021
- [j36]Zhenhua Wang, Haibo He, Zhiqiang Wan, Yan Sun:
Coordinated Topology Attacks in Smart Grid Using Deep Reinforcement Learning. IEEE Trans. Ind. Informatics 17(2): 1407-1415 (2021) - [c59]Zhenhua Wang, He Jiang, Haibo He, Yan Lindsay Sun:
Distributed Finite-Time Secondary Control for AC Microgrids With Mobile Power Resource and Communication Time-delays. ISGT 2021: 1-5 - 2020
- [c58]Qianqian Cheng, Lixin Li, Yan Sun, Dawei Wang, Wei Liang, Xu Li, Zhu Han:
Efficient Resource Allocation for NOMA-MEC System in Ultra-Dense Network: A Mean Field Game Approach. ICC Workshops 2020: 1-6 - [c57]Yan Sun, Lixin Li, Qianqian Cheng, Dawei Wang, Wei Liang, Xu Li, Zhu Han:
Joint Trajectory and Power Optimization in Multi-Type UAVs Network with Mean Field Q-Learning. ICC Workshops 2020: 1-6
2010 – 2019
- 2019
- [c56]Yan Sun, Lixin Li, Kaiyuan Xue, Xu Li, Wei Liang, Zhu Han:
Inhomogeneous Multi-UAV Aerial Base Stations Deployment: A Mean-Field-Type Game Approach. IWCMC 2019: 1204-1208 - 2018
- [j35]Chenren Xu, Yan Lindsay Sun, Konstantinos N. Plataniotis, Nic Lane:
Signal Processing and the Internet of Things [From the Guest Editors]. IEEE Signal Process. Mag. 35(5): 13-15 (2018) - [c55]Qingming Li, Zhanjiang Chen, H. Vicky Zhao, Yan Lindsay Sun:
Prima: Probabilistic Ranking with Inter-Item Competition and Multi-Attribute Utility Function. ICASSP 2018: 6388-6392 - 2017
- [j34]Chaonan Wang, Liudong Xing, Amir Ehsani Zonouz, Vinod M. Vokkarane, Yan Lindsay Sun:
Communication Reliability Analysis of Wireless Sensor Networks Using Phased-Mission Model. Qual. Reliab. Eng. Int. 33(4): 823-837 (2017) - [p1]Harishchandra Dubey, Admir Monteiro, Nicholas Constant, Mohammadreza Abtahi, Debanjan Borthakur, Leslie Mahler, Yan Sun, Qing Yang, Umer Akbar, Kunal Mankodiya:
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications. Handbook of Large-Scale Distributed Computing in Smart Healthcare 2017: 281-321 - [i1]Harishchandra Dubey, Admir Monteiro, Nicholas Constant, Mohammadreza Abtahi, Debanjan Borthakur, Leslie Mahler, Yan Sun, Qing Yang, Umer Akbar, Kunal Mankodiya:
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications. CoRR abs/1706.08012 (2017) - 2016
- [j33]Amir Ehsani Zonouz, Liudong Xing, Vinod M. Vokkarane, Yan Sun:
Hybrid wireless sensor networks: a reliability, cost and energy-aware approach. IET Wirel. Sens. Syst. 6(2): 42-48 (2016) - [j32]Chaonan Wang, Liudong Xing, Vinod M. Vokkarane, Yan Lindsay Sun:
Infrastructure Communication Sensitivity Analysis of Wireless Sensor Networks. Qual. Reliab. Eng. Int. 32(2): 581-594 (2016) - 2015
- [j31]Amir Ehsani Zonouz, Liudong Xing, Vinod M. Vokkarane, Yan Sun:
Application communication reliability of wireless sensor networks. IET Wirel. Sens. Syst. 5(2): 58-67 (2015) - [j30]Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Syed Rizvi, Athanasios V. Vasilakos:
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions. J. Comput. Sci. Eng. 9(3) (2015) - [j29]Yongbo Zeng, Yan Sun, Liudong Xing, Vinod Vokkarane:
A Study of Online Social Network Privacy Via the TAPE Framework. IEEE J. Sel. Top. Signal Process. 9(7): 1270-1284 (2015) - [j28]Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid. IEEE Trans. Inf. Forensics Secur. 10(5): 1010-1024 (2015) - [j27]Younghun Chae, Lisa Cingiser DiPippo, Yan Lindsay Sun:
Trust Management for Defending On-Off Attacks. IEEE Trans. Parallel Distributed Syst. 26(4): 1178-1191 (2015) - [c54]Yongbo Zeng, Yihai Zhu, Yan Lindsay Sun:
Equal rating opportunity analysis for detecting review manipulation. ChinaSIP 2015: 846-850 - [c53]Jun Yan, Yufei Tang, Yihai Zhu, Haibo He, Yan Sun:
Smart Grid Vulnerability under Cascade-Based Sequential Line-Switching Attacks. GLOBECOM 2015: 1-7 - [c52]Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Diversity of cascading failure processes in electrical grids. ISGT 2015: 1-5 - 2014
- [j26]Chaonan Wang, Liudong Xing, Vinod Vokkarane, Yan Lindsay Sun:
Reliability and lifetime modeling of wireless sensor nodes. Microelectron. Reliab. 54(1): 160-166 (2014) - [j25]Yuhong Liu, Yan Lindsay Sun:
Securing Digital Reputation in Online Social Media [Applications Corner]. IEEE Signal Process. Mag. 31(1): 149-155 (2014) - [j24]Jun Yan, Haibo He, Yan Sun:
Integrated Security Analysis on Cascading Failure in Complex Networks. IEEE Trans. Inf. Forensics Secur. 9(3): 451-463 (2014) - [j23]Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Resilience Analysis of Power Grids Under the Sequential Attack. IEEE Trans. Inf. Forensics Secur. 9(12): 2340-2354 (2014) - [j22]Yihai Zhu, Jun Yan, Yan Sun, Haibo He:
Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph. IEEE Trans. Parallel Distributed Syst. 25(12): 3274-3284 (2014) - [c51]Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Coordinated attacks against substations and transmission lines in power grids. GLOBECOM 2014: 655-661 - [c50]Xiaohui Gong, H. Vicky Zhao, Yan Lindsay Sun:
Probabilistic ranking of multi-attribute items using indifference curve. ICASSP 2014: 6132-6136 - [c49]Yihai Zhu, Jun Yan, Yufei Tang, Yan Sun, Haibo He:
The sequential attack against power grid networks. ICC 2014: 616-621 - [c48]Yongbo Zeng, Yan Sun, Liudong Xing, Vinod Vokkarane:
Trust-aware privacy evaluation in online social networks. ICC 2014: 932-938 - [c47]Euijin Choo, Ting Yu, Min Chi, Yan Sun:
Revealing and incorporating implicit communities to improve recommender systems. EC 2014: 489-506 - [c46]Zhen Chen, Yongbo Zeng, Gerald Hefferman, Yan Sun:
FiberID: molecular-level secret for identification of things. WIFS 2014: 84-88 - 2013
- [j21]Jun Yan, Yihai Zhu, Haibo He, Yan Sun:
Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map. IEEE Trans. Inf. Forensics Secur. 8(4): 646-656 (2013) - [j20]Yuhong Liu, Yan Sun, Siyuan Liu, Alex C. Kot:
Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis. IEEE Trans. Inf. Forensics Secur. 8(6): 936-948 (2013) - [j19]Zhou Yuan, Zhu Han, Yan Lindsay Sun, Husheng Li, Ju Bin Song:
Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks. IEEE Trans. Mob. Comput. 12(9): 1750-1760 (2013) - [c45]Amir Ehsani Zonouz, Liudong Xing, Vinod Vokkarane, Yan Sun:
Application Communication Reliability of Wireless Sensor Networks Supporting K-coverage. DCOSS 2013: 430-435 - [c44]Yuhong Liu, Yan Sun:
Can reputation manipulation boost app sales in Android market? ICASSP 2013: 8707-8711 - [c43]Jun Yan, Yihai Zhu, Haibo He, Yan Sun:
Revealing temporal features of attacks against smart grid. ISGT 2013: 1-6 - [c42]William J. Matuszak, Lisa Cingiser DiPippo, Yan Lindsay Sun:
CyberSAVe: situational awareness visualization for cyber security of smart grid systems. VizSEC 2013: 25-32 - 2012
- [j18]Hervé Bourlard, Vikram Krishnamurthy, Yan Lindsay Sun, H. Vicky Zhao, K. J. Ray Liu:
A Technical Revolution: Social Learning and Networking [From the Guest Editors]. IEEE Signal Process. Mag. 29(2): 20-21 (2012) - [j17]Yan Sun, Yuhong Liu:
Security of Online Reputation Systems: The evolution of attacks and defenses. IEEE Signal Process. Mag. 29(2): 87-97 (2012) - [j16]Xiaorong Zhang, Yuhong Liu, Fan Zhang, Jin Ren, Yan Lindsay Sun, Qing Yang, He Huang:
On Design and Implementation of Neural-Machine Interface for Artificial Legs. IEEE Trans. Ind. Informatics 8(2): 418-429 (2012) - [c41]Younghun Chae, Lisa Cingiser DiPippo, Yan Lindsay Sun:
Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack. CollaborateCom 2012: 406-415 - [c40]Yihai Zhu, Yan Sun, Haibo He:
Load distribution vector based attack strategies against power grid systems. GLOBECOM 2012: 935-941 - 2011
- [c39]Yuhong Liu, Fan Zhang, Yan Lindsay Sun, He Huang:
Trust sensor interface for improving reliability of EMG-based user intent recognition. EMBC 2011: 7516-7520 - [c38]Wenkai Wang, Qiao Cai, Yan Sun, Haibo He:
Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid. GLOBECOM 2011: 1-6 - [c37]Yuhong Liu, Yan Sun, Ting Yu:
Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems. SocialCom/PASSAT 2011: 425-434 - 2010
- [j15]Wenkai Wang, Husheng Li, Yan Lindsay Sun, Zhu Han:
Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks. EURASIP J. Adv. Signal Process. 2010 (2010) - [j14]Weijun Xiao, Yan Sun, Yinan Liu, Qing Yang:
TEA: transmission error approximation for distance estimation between two Zigbee devices. Int. J. High Perform. Comput. Netw. 6(3/4): 248-253 (2010) - [j13]Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yang, Yafei Dai:
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses. IEEE Trans. Knowl. Data Eng. 22(12): 1766-1780 (2010) - [c36]Qinyuan Feng, Ling Liu, Yan Sun, Ting Yu, Yafei Dai:
Enhancing personalized ranking quality through multidimensional modeling of inter-item competition. CollaborateCom 2010: 1-10 - [c35]Wenkai Wang, Yan Sun, Husheng Li, Zhu Han:
Cross-Layer Attack and Defense in Cognitive Radio Networks. GLOBECOM 2010: 1-6 - [c34]He Huang, Yan Lindsay Sun, Qing Yang, Fan Zhang, Xiaorong Zhang, Yuhong Liu, Jin Ren, Fabian Sierra:
Integrating neuromuscular and cyber systems for neural control of artificial legs. ICCPS 2010: 129-138 - [c33]Yuhong Liu, Yan Sun:
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis. SocialCom/PASSAT 2010: 65-72
2000 – 2009
- 2009
- [j12]Zhu Han, Yan Lindsay Sun:
Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j11]Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai:
Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator. J. Comput. Sci. Technol. 24(5): 855-867 (2009) - [j10]Yafei Yang, Yan Sun, Steven Kay, Qing Yang:
Securing rating aggregation systems using statistical detectors and trust. IEEE Trans. Inf. Forensics Secur. 4(4): 883-898 (2009) - [c32]Wenkai Wang, Husheng Li, Yan Sun, Zhu Han:
Attack-proof collaborative spectrum sensing in cognitive radio networks. CISS 2009: 130-134 - [c31]Wenkai Wang, Husheng Li, Yan Sun, Zhu Han:
CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing. GLOBECOM 2009: 1-6 - [c30]Qinyuan Feng, Yu Wu, Yan Sun, Jing Jiang, Yafei Dai:
User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions. ICASSP 2009: 3477-3480 - [c29]Yafei Yang, Yan Lindsay Sun, Steven Kay, Qing Yang:
Defending online reputation systems against collaborative unfair raters through signal modeling and trust. SAC 2009: 1308-1315 - 2008
- [j9]Yan Sun, Zhu Han, K. J. Ray Liu:
Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2): 112-119 (2008) - [c28]Yuhong Liu, Yafei Yang, Yan Lindsay Sun:
Detection of collusion behaviors in online reputation systems. ACSCC 2008: 1368-1372 - [c27]Yafei Yang, Yan Sun:
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing. GLOBECOM 2008: 1985-1990 - [c26]Zhu Han, Yan Lindsay Sun, Hongyuan Shi:
Cooperative Transmission for Underwater Acoustic Communications. ICC 2008: 2028-2032 - [c25]Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei Dai:
Modeling Attack Behaviors in Rating Systems. ICDCS Workshops 2008: 241-248 - [c24]Yafei Yang, Qinyuan Feng, Yan Lindsay Sun, Yafei Dai:
RepTrap: a novel attack on feedback-based reputation systems. SecureComm 2008: 8 - 2007
- [j8]Wei Yu, Yan Sun, K. J. Ray Liu:
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. IEEE Trans. Dependable Secur. Comput. 4(3): 228-242 (2007) - [j7]Yan Lindsay Sun, K. J. Ray Liu:
Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes. IEEE Trans. Inf. Forensics Secur. 2(2): 213-226 (2007) - [j6]Yan Sun, K. J. Ray Liu:
Hierarchical group access control for secure multicast communications. IEEE/ACM Trans. Netw. 15(6): 1514-1526 (2007) - [c23]Zhu Han, Yan Lindsay Sun:
Self-Learning Cooperative Transmission - Coping with Unreliability Due to Mobility, Channel Estimation Errors, and Untrustworthy Nodes. GLOBECOM 2007: 361-365 - [c22]Yan Lindsay Sun, Yafei Yang:
Trust Establishment in Distributed Networks: Analysis and Modeling. ICC 2007: 1266-1273 - [c21]Yafei Yang, Yan Lindsay Sun, Jin Ren, Qing Yang:
Building Trust in Online Rating Systems Through Signal Modeling. ICDCS Workshops 2007: 23 - [c20]Zhu Han, Yan Lindsay Sun:
Securing Cooperative Transmission in Wireless Communications. MobiQuitous 2007: 1-6 - 2006
- [j5]Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu:
Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2): 305-317 (2006) - [j4]Yinian Mao, Yan Sun, Min Wu, K. J. Ray Liu:
JET: dynamic join-exit-tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw. 14(5): 1128-1140 (2006) - [j3]Xuemin Shen, Chuang Lin, Yan Lindsay Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao:
Wireless network security. Wirel. Commun. Mob. Comput. 6: 269-271 (2006) - [c19]Yan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu:
Attacks on Trust Evaluation in Distributed Networks. CISS 2006: 1461-1466 - [c18]Yafei Yang, Yan Sun:
Energy-efficient Reliable Transmission Protocol with Outsourcing in WSNs. GLOBECOM 2006 - [c17]Yan Lindsay Sun, Zhu Han, Wei Yu, K. J. Ray Liu:
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. INFOCOM 2006 - [c16]Weijun Xiao, Yan Sun, Yinan Liu, Qing Yang:
TEA: Transmission Error Approximation for Distance Estimation between Two Zigbee Devices. IWNAS 2006: 15-22 - 2005
- [j2]Charles Pandana, Yan Sun, K. J. Ray Liu:
Channel-aware priority transmission scheme using joint channel estimation and data loading for OFDM systems. IEEE Trans. Signal Process. 53(8-2): 3297-3310 (2005) - [c15]Wei Yu, Yan Sun, K. J. Ray Liu:
Minimization of rekeying cost for contributory group communications. GLOBECOM 2005: 5 - [c14]Yan Sun, Wei Yu, Zhu Han, K. J. Ray Liu:
Trust modeling and evaluation in ad hoc networks. GLOBECOM 2005: 6 - [c13]Wei Yu, Yan Sun, K. J. Ray Liu:
HADOF: defense against routing disruptions in mobile ad hoc networks. INFOCOM 2005: 1252-1261 - 2004
- [j1]Yan Sun, Wade Trappe, K. J. Ray Liu:
A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Trans. Netw. 12(4): 653-666 (2004) - [c12]Yan Sun, K. J. Ray Liu:
Scalable Hierarchical Access Control in Secure Group Communications. INFOCOM 2004: 1296-1306 - [c11]Yan Sun, K. J. Ray Liu:
Securing Dynamic Membership Information in Multicast Communications. INFOCOM 2004: 1307-1317 - [c10]Yinian Mao, Yan Sun, Min Wu, K. J. Ray Liu:
Dynamic Join-Exit Amortization and Scheduling for Time-Efficient Group Key Agreement. INFOCOM 2004: 2617-2627 - [c9]Yan Sun, K. J. Ray Liu:
Transmit diversity techniques for multicasting over wireless networks. WCNC 2004: 593-598 - 2003
- [c8]Yan Sun, K. J. Ray Liu:
Securing dynamic group membership information over multicast: attacks and immunization. GLOBECOM 2003: 1466-1470 - [c7]Yan Sun, Wade Trappe, K. J. Ray Liu:
Topology-aware key management schemes for wireless multicast. GLOBECOM 2003: 1471-1475 - [c6]Charles Pandana, Yan Sun, K. J. Ray Liu:
Channel aware unequal error protection for image transmission over broadband wireless LAN. ICIP (1) 2003: 93-96 - [c5]Yan Sun, K. J. Ray Liu:
Multi-layer key management for secure multimedia multicast communications. ICME 2003: 205-208 - 2002
- [c4]Yan Sun, Charles Pandana, Xiaowen Wang, K. J. Ray Liu:
A joint channel estimation and unequal error protection scheme for image transmission in wireless OFDM systems. IEEE Workshop on Multimedia Signal Processing 2002: 380-383 - [c3]Bin Sun, Wade Trappe, Yan Sun, K. J. Ray Liu:
A time-efficient contributory key agreement scheme for secure group communications. ICC 2002: 1159-1163 - [c2]Yan Sun, Wade Trappe, K. J. Ray Liu:
An efficient key management scheme for secure wireless multicast. ICC 2002: 1236-1240 - [c1]Yan Sun, Xiaowen Wang, K. J. Ray Liu:
A joint channel estimation and unequal error protection scheme for video transmission in OFDM systems. ICIP (1) 2002: 549-552
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint