default search action
Nina Taft
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c73]Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin:
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. USENIX Security Symposium 2024 - [i8]Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin:
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. CoRR abs/2403.02292 (2024) - 2022
- [c72]Preksha Nema, Pauline Anthonysamy, Nina Taft, Sai Teja Peddinti:
Analyzing User Perspectives on Mobile App Privacy at Scale. ICSE 2022: 112-124 - [c71]Hamza Harkous, Sai Teja Peddinti, Rishabh Khandelwal, Animesh Srivastava, Nina Taft:
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale. SP 2022: 2469-2486 - [c70]Mahadev Satyanarayanan, Nigel Davies, Nina Taft:
Balancing privacy and serendipity in cyberspace. HotMobile 2022: 81-87 - 2021
- [c69]Igor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, P. J. McLachlan, Jason James:
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome. USENIX Security Symposium 2021: 769-784 - [c68]Weicheng Cao, Chunqiu Xia, Sai Teja Peddinti, David Lie, Nina Taft, Lisa M. Austin:
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. USENIX Security Symposium 2021: 803-820
2010 – 2019
- 2019
- [c67]Sai Teja Peddinti, Igor Bilogrevic, Nina Taft, Martin Pelikan, Úlfar Erlingsson, Pauline Anthonysamy, Giles Hogben:
Reducing Permission Requests in Mobile Apps. Internet Measurement Conference 2019: 259-266 - 2017
- [c66]Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft:
Exploring decision making with Android's runtime permission dialogs using in-context surveys. SOUPS 2017: 195-210 - 2016
- [c65]Stefan Dernbach, Nina Taft, Jim Kurose, Udi Weinsberg, Christophe Diot, Azin Ashkan:
Cache content-selection policies for streaming video services. INFOCOM 2016: 1-9 - [c64]Jeffrey Warshaw, Nina Taft, Allison Woodruff:
Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US. SOUPS 2016: 271-285 - [c63]Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, Brandon Amos:
Privacy Mediators: Helping IoT Cross the Chasm. HotMobile 2016: 39-44 - 2015
- [j15]Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft:
Managing Your Private and Public Data: Bringing Down Inference Attacks Against Your Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1240-1255 (2015) - [c62]Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi:
GraphSC: Parallel Secure Computation Made Easy. IEEE Symposium on Security and Privacy 2015: 377-394 - 2014
- [c61]Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, Nina Taft:
Recommending with an agenda: active learning of private attributes using matrix factorization. RecSys 2014: 65-72 - [c60]Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, Nina Taft:
Privacy tradeoffs in predictive analytics. SIGMETRICS 2014: 57-69 - [c59]Salman Salamatian, Nadia Fawaz, Branislav Kveton, Nina Taft:
SPPM: Sparse Privacy Preserving Mappings. UAI 2014: 712-721 - [e3]Carey Williamson, Aditya Akella, Nina Taft:
Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014. ACM 2014, ISBN 978-1-4503-3213-2 [contents] - [i7]Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, Nina Taft:
Privacy Tradeoffs in Predictive Analytics. CoRR abs/1403.8084 (2014) - [i6]Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft:
Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy. CoRR abs/1408.3698 (2014) - 2013
- [c58]Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, Marc Joye, Nina Taft, Dan Boneh:
Privacy-preserving matrix factorization. CCS 2013: 801-812 - [c57]Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft:
How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data. GlobalSIP 2013: 269-272 - [c56]Jean Bolot, Nadia Fawaz, S. Muthukrishnan, Aleksandar Nikolov, Nina Taft:
Private decayed predicate sums on streams. ICDT 2013: 284-295 - [c55]John Mark Agosta, Jaideep Chandrashekar, Mark Crovella, Nina Taft, Daniel Ting:
Mixture models of endhost network traffic. INFOCOM 2013: 225-229 - [c54]Diana Joumblatt, Jaideep Chandrashekar, Branislav Kveton, Nina Taft, Renata Teixeira:
Predicting user dissatisfaction with Internet application performance at end-hosts. INFOCOM 2013: 235-239 - [c53]Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft:
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. IEEE Symposium on Security and Privacy 2013: 334-348 - [i5]Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, Nina Taft:
Recommending with an Agenda: Active Learning of Private Attributes using Matrix Factorization. CoRR abs/1311.6802 (2013) - 2012
- [j14]Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft:
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning. J. Priv. Confidentiality 4(1) (2012) - [c52]Udi Weinsberg, Qingxi Li, Nina Taft, Athula Balachandran, Vyas Sekar, Gianluca Iannaccone, Srinivasan Seshan:
CARE: content aware redundancy elimination for challenged networks. HotNets 2012: 127-132 - [c51]Diana Joumblatt, Oana Goga, Renata Teixeira, Jaideep Chandrashekar, Nina Taft:
Characterizing end-host application performance across multiple networking environments. INFOCOM 2012: 2536-2540 - [c50]Asher Levi, Osnat Mokryn, Christophe Diot, Nina Taft:
Finding a needle in a haystack of reviews: cold start context-based hotel recommender system. RecSys 2012: 115-122 - [c49]Udi Weinsberg, Smriti Bhagat, Stratis Ioannidis, Nina Taft:
BlurMe: inferring and obfuscating user gender based on ratings. RecSys 2012: 195-202 - [c48]Asher Levi, Osnat Mokryn, Christophe Diot, Nina Taft:
Finding a needle in a haystack of reviews: cold start context-based hotel recommender system demo. RecSys 2012: 305-306 - [e2]Nina Taft, Fabio Ricciato:
Passive and Active Measurement - 13th International Conference, PAM 2012, Vienna, Austria, March 12-14th, 2012. Proceedings. Lecture Notes in Computer Science 7192, Springer 2012, ISBN 978-3-642-28536-3 [contents] - [i4]Udi Weinsberg, Athula Balachandran, Nina Taft, Gianluca Iannaccone, Vyas Sekar, Srinivasan Seshan:
CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks. CoRR abs/1206.1815 (2012) - [i3]John Mark Agosta, Jaideep Chandrashekar, Mark Crovella, Nina Taft, Daniel Ting:
Mixture Models of Endhost Network Traffic. CoRR abs/1212.2744 (2012) - 2011
- [c47]Diana Joumblatt, Renata Teixeira, Jaideep Chandrashekar, Nina Taft:
Performance of networked applications: the challenges in capturing the user's perception. W-MUST@SIGCOMM 2011: 37-42 - [e1]Nina Taft, David Wetherall:
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August 19, 2011. ACM 2011, ISBN 978-1-4503-0800-7 [contents] - [i2]Jean Bolot, Nadia Fawaz, S. Muthukrishnan, Aleksandar Nikolov, Nina Taft:
Private Decayed Sum Estimation under Continual Observation. CoRR abs/1108.6123 (2011) - 2010
- [j13]Diana Joumblatt, Renata Teixeira, Jaideep Chandrashekar, Nina Taft:
Perspectives on tracing end-hosts: a survey summary. Comput. Commun. Rev. 40(2): 51-55 (2010) - [j12]Diana Joumblatt, Renata Teixeira, Jaideep Chandrashekar, Nina Taft:
HostView: annotating end-host performance measurements with user feedback. SIGMETRICS Perform. Evaluation Rev. 38(3): 43-48 (2010) - [c46]Kevin R. Fall, Gianluca Iannaccone, Jayanthkumar Kannan, Fernando Silveira, Nina Taft:
A disruption-tolerant architecture for secure and efficient disaster response communications. ISCRAM 2010 - [c45]Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan:
ASTUTE: detecting a different class of traffic anomalies. SIGCOMM 2010: 267-278 - [c44]Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan:
Detecting traffic anomalies using an equilibrium property. SIGMETRICS 2010: 377-378
2000 – 2009
- 2009
- [j11]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
Stealthy poisoning attacks on PCA-based anomaly detectors. SIGMETRICS Perform. Evaluation Rev. 37(2): 73-74 (2009) - [c43]Lucian Popa, Byung-Gon Chun, Ion Stoica, Jaideep Chandrashekar, Nina Taft:
Macroscope: end-point approach to networked application dependency discovery. CoNEXT 2009: 229-240 - [c42]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Internet Measurement Conference 2009: 1-14 - [c41]Sergiu Nedevschi, Jaideep Chandrashekar, Junda Liu, Bruce Nordman, Sylvia Ratnasamy, Nina Taft:
Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems. NSDI 2009: 381-394 - [c40]Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki:
Exploiting Temporal Persistence to Detect Covert Botnet Channels. RAID 2009: 326-345 - [c39]Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire:
Impact of IT monoculture on behavioral end host intrusion detection. WREN 2009: 27-36 - [i1]Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft:
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning. CoRR abs/0911.5708 (2009) - 2008
- [j10]Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluca Iannaccone:
Race conditions in coexisting overlay networks. IEEE/ACM Trans. Netw. 16(1): 1-14 (2008) - [c38]Saikat Guha, Jaideep Chandrashekar, Nina Taft, Konstantina Papagiannaki:
How healthy are today's enterprise networks? Internet Measurement Conference 2008: 145-150 - [c37]Ling Huang, Donghui Yan, Michael I. Jordan, Nina Taft:
Spectral Clustering with Perturbed Data. NIPS 2008: 705-712 - [c36]Frédéric Giroire, Jaideep Chandrashekar, Gianluca Iannaccone, Konstantina Papagiannaki, Eve M. Schooler, Nina Taft:
The Cubicle vs. The Coffee Shop: Behavioral Modes in Enterprise End-Users. PAM 2008: 202-211 - [c35]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 - 2007
- [j9]Augustin Soule, Antonio Nucci, Rene L. Cruz, Emilio Leonardi, Nina Taft:
Estimating dynamic traffic matrices by using viable routing changes. IEEE/ACM Trans. Netw. 15(3): 485-498 (2007) - [j8]Antonio Nucci, Supratik Bhattacharyya, Nina Taft, Christophe Diot:
IGP link weight assignment for operational Tier-1 backbones. IEEE/ACM Trans. Netw. 15(4): 789-802 (2007) - [c34]Joseph M. Hellerstein, Tyson Condie, Minos N. Garofalakis, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Nina Taft:
Public Health for the Internet (PHI). CIDR 2007: 332-340 - [c33]Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft:
Communication-Efficient Tracking of Distributed Cumulative Triggers. ICDCS 2007: 54 - [c32]Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft:
Communication-Efficient Online Detection of Network-Wide Anomalies. INFOCOM 2007: 134-142 - [c31]Thomas Karagiannis, Konstantina Papagiannaki, Nina Taft, Michalis Faloutsos:
Profiling the End Host. PAM 2007: 186-196 - 2006
- [j7]Gang Liang, Nina Taft, Bin Yu:
A fast lightweight approach to origin-destination IP traffic estimation using partial measurements. IEEE Trans. Inf. Theory 52(6): 2634-2648 (2006) - [c30]Vijay Erramilli, Mark Crovella, Nina Taft:
An independent-connection model for traffic matrices. Internet Measurement Conference 2006: 251-256 - [c29]Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak:
Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions. INFOCOM 2006 - [c28]Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft:
Toward sophisticated detection with distributed triggers. MineNet 2006: 311-316 - [c27]Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony D. Joseph, Nina Taft:
In-Network PCA and Anomaly Detection. NIPS 2006: 617-624 - 2005
- [j6]Antonio Nucci, Ashwin Sridharan, Nina Taft:
The problem of synthetically generating IP traffic matrices: initial recommendations. Comput. Commun. Rev. 35(3): 19-32 (2005) - [j5]Antonio Nucci, Nina Taft, Patrick Thiran, Hui Zang, Christophe Diot:
Increasing the Link Utilization in IP over WDM Networks Using Availability as QoS. Photonic Netw. Commun. 9(1): 55-75 (2005) - [j4]Augustin Soule, Kavé Salamatian, Antonio Nucci, Nina Taft:
Traffic matrix tracking using Kalman filters. SIGMETRICS Perform. Evaluation Rev. 33(3): 24-31 (2005) - [j3]Konstantina Papagiannaki, Nina Taft, Zhi-Li Zhang, Christophe Diot:
Long-term forecasting of Internet backbone traffic. IEEE Trans. Neural Networks 16(5): 1110-1124 (2005) - [c26]Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluca Iannaccone:
Can coexisting overlays inadvertently step on each other? ICNP 2005: 201-214 - [c25]Augustin Soule, Kavé Salamatian, Nina Taft:
Combining Filtering and Statistical Methods for Anomaly Detection. Internet Measurement Conference 2005: 331-344 - [c24]Augustin Soule, Anukool Lakhina, Nina Taft, Konstantina Papagiannaki, Kavé Salamatian, Antonio Nucci, Mark Crovella, Christophe Diot:
Traffic matrices: balancing measurements, inference and modeling. SIGMETRICS 2005: 362-373 - 2004
- [j2]Antonio Nucci, Nina Taft, Chadi Barakat, Patrick Thiran:
Controlled use of excess backbone bandwidth for providing new services in IP-over-WDM networks. IEEE J. Sel. Areas Commun. 22(9): 1692-1707 (2004) - [c23]A. Oveissian, Kavé Salamatian, Augustin Soule, Nina Taft:
Fast Flow Classification over Internet. CNSR 2004: 235-242 - [c22]Ram Keralapura, Nina Taft, Gianluca Iannaccone, Chen-Nee Chuah:
Can ISPs and Overlay Networks Form a Synergistic Co-existence? DSOM 2004: 263-265 - [c21]Konstantina Papagiannaki, Nina Taft, Anukool Lakhina:
A distributed approach to measure IP traffic matrices. Internet Measurement Conference 2004: 161-174 - [c20]Konstantina Papagiannaki, Nina Taft, Christophe Diot:
Impact of Flow Dynamics on Traffic Engineering Design Principles. INFOCOM 2004: 2295-2306 - [c19]Antonio Nucci, Rene L. Cruz, Nina Taft, Christophe Diot:
Design of IGP Link Weights for Estimation of Traffic Matrices. INFOCOM 2004: 2341-2351 - [c18]Gang Liang, Bin Yu, Nina Taft:
Maximum entropy models: convergence rates and applications in dynamic system monitoring. ISIT 2004: 168 - [c17]Augustin Soule, Kavé Salamatian, Nina Taft, Richard Emilion, Konstantina Papagiannaki:
Flow classification by histograms: or how to go on safari in the internet. SIGMETRICS 2004: 49-60 - [c16]Anukool Lakhina, Konstantina Papagiannaki, Mark Crovella, Christophe Diot, Eric D. Kolaczyk, Nina Taft:
Structural analysis of network traffic flows. SIGMETRICS 2004: 61-72 - [c15]Augustin Soule, Antonio Nucci, Rene L. Cruz, Emilio Leonardi, Nina Taft:
How to identify and estimate the largest traffic matrix elements in a dynamic environment. SIGMETRICS 2004: 73-84 - 2003
- [c14]Frédéric Giroire, Antonio Nucci, Nina Taft, Christophe Diot:
Increasing the Robustness of IP Backbones in the Absence of Optical Level Protection. INFOCOM 2003: 1-11 - [c13]Sundar Iyer, Supratik Bhattacharyya, Nina Taft, Christophe Diot:
An approach to alleviate link overload as observed on an IP backbone. INFOCOM 2003: 406-416 - [c12]Konstantina Papagiannaki, Nina Taft, Zhi-Li Zhang, Christophe Diot:
Long-Term Forecasting of Internet Backbone Traffic: Observations and Initial Models. INFOCOM 2003: 1178-1188 - [c11]Mathilde Durvy, Christophe Diot, Nina Taft, Patrick Thiran:
Network Availability Based Service Differentiation. IWQoS 2003: 305-324 - 2002
- [j1]Supratik Bhattacharyya, Christophe Diot, Nina Taft, Jorjeta G. Jetcheva:
Geographical and temporal characteristics of inter-POP flows: View from a single pop. Eur. Trans. Telecommun. 13(1): 5-22 (2002) - [c10]Konstantina Papagiannaki, Nina Taft, Supratik Bhattacharyya, Patrick Thiran, Kavé Salamatian, Christophe Diot:
A pragmatic definition of elephants in internet backbone traffic. Internet Measurement Workshop 2002: 175-176 - [c9]Alberto Medina, Nina Taft, Kavé Salamatian, Supratik Bhattacharyya, Christophe Diot:
Traffic matrix estimation: existing techniques and new directions. SIGCOMM 2002: 161-174 - 2001
- [c8]Patrick Thiran, Nina Taft, Christophe Diot, Hui Zang, Robert Mac Donald:
A Protection-Based Approach to QoS in Packet over Fiber Networks. IWDC 2001: 266-278
1990 – 1999
- 1999
- [c7]Jaroslaw J. Sydir, Nina Taft Plotkin, Nail Akar:
Using ATM Services for (In)Efficient Support of TCP. MASCOTS 1999: 20-29 - 1997
- [c6]Nina Taft Plotkin, Jaroslaw J. Sydir:
The Rate Mismatch Problem in Heterogeneous ABR Flow Control. INFOCOM 1997: 1304-1314 - 1996
- [c5]Richard G. Ogier, Nina Taft Plotkin, Irfan Khan:
Neural Network Methods with Traffic Descriptor Compression for Call Admission Control. INFOCOM 1996: 768-776 - 1995
- [c4]Christian Roche, Nina Taft Plotkin:
The Entropy of Cell Streams as a Traffic Descriptor in ATM Networks. Data Communications and their Performance 1995: 225-240 - [c3]Christian Roche, Nina Taft Plotkin:
The Converging Flows Problem: An Analytical Study. INFOCOM 1995: 32-39 - 1994
- [c2]Nina Taft Plotkin, Pravin Varaiya:
The Entropy of Traffic Streams in ATM Virtual Circuits. INFOCOM 1994: 1038-1045 - 1993
- [c1]Nina Taft Plotkin, Pravin Varaiya:
Performance Analysis of Parallel ATM Connections for Gigabit Speed Applications. INFOCOM 1993: 1186-1193
Coauthor Index
aka: Dina Papagiannaki
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint