default search action
Marek Klonowski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j25]Katarzyna Fojcik, Piotr Syga, Marek Klonowski:
Extremely compact video representation for efficient near-duplicates detection. Pattern Recognit. 158: 111016 (2025) - 2023
- [j24]Elijah Hradovich, Marek Klonowski, Dariusz R. Kowalski:
Restrained medium access control on adversarial shared channels. J. Comput. Syst. Sci. 138: 103463 (2023) - [c71]Mateusz Gniewkowski, Piotr Syga, Marek Klonowski, Tomasz Walkowiak:
Do Not Trust Me: Explainability Against Text Classification. ECAI 2023: 875-882 - [c70]Dominik Bojko, Marek Klonowski, Mateusz Marciniak, Piotr Syga:
On Size Hiding Protocols in Beeping Model. Euro-Par 2023: 518-532 - [c69]Dominik Bojko, Marek Klonowski, Dariusz R. Kowalski, Mateusz Marciniak:
Efficient Protective Jamming in 2D SINR Networks. Euro-Par 2023: 533-546 - [c68]Jedrzej Kozal, Justyna Zwolinska, Marek Klonowski, Michal Wozniak:
Defending Network IDS against Adversarial Examples with Continual Learning. ICDM (Workshops) 2023: 60-69 - [i17]Marek Klonowski, Mateusz Marciniak:
Preliminary Report: On Information Hiding in Multi-Hop Radio Networks. CoRR abs/2311.11778 (2023) - 2022
- [j23]Marek Klonowski, Dariusz R. Kowalski, Dominik Pajak:
Generalized framework for Group Testing: Queries, feedbacks and adversaries. Theor. Comput. Sci. 919: 18-35 (2022) - 2021
- [j22]Elijah Hradovich, Marek Klonowski, Dariusz R. Kowalski:
New View on Adversarial Queueing on MAC. IEEE Commun. Lett. 25(4): 1144-1148 (2021) - [c67]Dominik Bojko, Marek Klonowski, Dariusz R. Kowalski, Mateusz Marciniak:
Exact and Efficient Protective Jamming in SINR-based Wireless Networks. MASCOTS 2021: 1-8 - [i16]Marek Klonowski, Dariusz R. Kowalski, Dominik Pajak:
Generalized Framework for Group Testing: Queries, Feedbacks and Adversaries. CoRR abs/2112.01340 (2021) - 2020
- [j21]Krzysztof Grining, Marek Klonowski, Malgorzata Sulkowska:
Stronger trust and privacy in social networks via local cooperation1. J. Complex Networks 8(4) (2020) - [j20]Philipp Brandes, Marcin Kardas, Marek Klonowski, Dominik Pajak, Roger Wattenhofer:
Fast size approximation of a radio network in beeping model. Theor. Comput. Sci. 810: 15-25 (2020) - [c66]Przemyslaw Blaskiewicz, Marek Klonowski, Piotr Syga:
Droppix: Towards More Realistic Video Fingerprinting. ICETE (2) 2020: 468-476 - [c65]Elijah Hradovich, Marek Klonowski, Dariusz R. Kowalski:
Contention resolution on a restrained channel. ICPADS 2020: 89-98 - [i15]Dominik Bojko, Krzysztof Grining, Marek Klonowski:
Probabilistic Counters for Privacy Preserving Data Aggregation. CoRR abs/2003.11446 (2020) - [i14]Krzysztof Grining, Marek Klonowski, Malgorzata Sulkowska:
What Our Choices Say About Our Preferences? CoRR abs/2005.01586 (2020)
2010 – 2019
- 2019
- [j19]Marcin Kardas, Marek Klonowski, Piotr Syga:
How to obfuscate execution of protocols in an ad hoc radio network? Ad Hoc Networks 84: 90-106 (2019) - [j18]Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek:
Ordered and delayed adversaries and how to work against them on a shared channel. Distributed Comput. 32(5): 379-403 (2019) - [j17]Krzysztof Grining, Marek Klonowski, Piotr Syga:
On practical privacy-preserving fault-tolerant data aggregation. Int. J. Inf. Sec. 18(3): 285-304 (2019) - [c64]Marcin Plata, Piotr Syga, Marek Klonowski:
How to Save Your Face: a Facial Recognition Method Robust Against Image Reconstruction. BTAS 2019: 1-10 - [c63]Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek, Prudence W. H. Wong:
Fault-Tolerant Parallel Scheduling of Arbitrary Length Jobs on a Shared Channel. FCT 2019: 306-321 - [c62]Marek Klonowski, Tomasz Struminski, Malgorzata Sulkowska:
Universal Encoding for Provably Irreversible Data Erasing. ICETE (2) 2019: 137-148 - [c61]Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek, Prudence W. H. Wong:
Performing Partially Ordered Sets of Jobs on a MAC in Presence of Adversarial Crashes. NCA 2019: 1-4 - [c60]Bogdan S. Chlebus, Elijah Hradovich, Tomasz Jurdzinski, Marek Klonowski, Dariusz R. Kowalski:
Energy Efficient Adversarial Routing in Shared Channels. SPAA 2019: 191-200 - 2018
- [j16]Marek Klonowski, Ania M. Piotrowska:
Light-weight and secure aggregation protocols based on Bloom filters✰. Comput. Secur. 72: 107-121 (2018) - [j15]Marek Klonowski, Marcin Plata, Piotr Syga:
User authorization based on hand geometry without special equipment. Pattern Recognit. 73: 189-201 (2018) - [c59]Marek Klonowski, Dominik Pajak:
Brief Announcement: Broadcast in Radio Networks, Time vs. Energy Tradeoffs. PODC 2018: 115-117 - [i13]Elijah Hradovich, Marek Klonowski, Dariusz R. Kowalski:
Power Constrained Parallel Queuing with Contention. CoRR abs/1808.02216 (2018) - [i12]Bogdan S. Chlebus, Elijah Hradovich, Tomasz Jurdzinski, Marek Klonowski, Dariusz R. Kowalski:
Energy Efficient Adversarial Routing in Shared Channels. CoRR abs/1810.11441 (2018) - 2017
- [j14]Marek Klonowski, Piotr Syga:
Enhancing privacy for ad hoc systems with predeployment key distribution. Ad Hoc Networks 59: 35-47 (2017) - [c58]Krzysztof Grining, Marek Klonowski:
Towards Extending Noiseless Privacy: Dependent Data and More Practical Approach. AsiaCCS 2017: 546-560 - [c57]Jaroslaw Bernacki, Marek Klonowski, Piotr Syga:
Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure. SECRYPT 2017: 343-350 - [c56]Karol Gotfryd, Marek Klonowski, Dominik Pajak:
On Location Hiding in Distributed Systems. SIROCCO 2017: 174-192 - [c55]Krzysztof Grining, Marek Klonowski, Malgorzata Sulkowska:
How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation. TrustCom/BigDataSE/ICESS 2017: 464-471 - [i11]Krzysztof Grining, Marek Klonowski, Malgorzata Sulkowska:
How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation. CoRR abs/1704.05305 (2017) - [i10]Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek:
Ordered and Delayed Adversaries and How to Work against Them on Shared Channel. CoRR abs/1706.08366 (2017) - [i9]Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek, Prudence W. H. Wong:
Fault-tolerant parallel scheduling of arbitrary length jobs on a shared channel. CoRR abs/1710.07380 (2017) - [i8]Marek Klonowski, Dominik Pajak:
Broadcast in radio networks: time vs. energy tradeoffs. CoRR abs/1711.04149 (2017) - 2016
- [j13]Marcin Bienkowski, Marek Klonowski, Miroslaw Korzeniowski, Dariusz R. Kowalski:
Randomized mutual exclusion on a multiple access channel. Distributed Comput. 29(5): 341-359 (2016) - [j12]Marek Klonowski, Malgorzata Sulkowska:
Energy-optimal algorithms for computing aggregative functions in random networks. Discret. Math. Theor. Comput. Sci. 17(3): 285-306 (2016) - [j11]Marcin Bienkowski, Leszek Gasieniec, Marek Klonowski, Miroslaw Korzeniowski, Bernard Mans, Stefan Schmid, Roger Wattenhofer:
Distributed Alarming in the On-Duty and Off-Duty Models. IEEE/ACM Trans. Netw. 24(1): 218-230 (2016) - [c54]Krzysztof Grining, Marek Klonowski, Piotr Syga:
Practical Fault-Tolerant Data Aggregation. ACNS 2016: 386-404 - [c53]Marek Klonowski, Piotr Syga:
Practical privacy preserving size approximation in distributed systems. CSNDSP 2016: 1-6 - [c52]Philipp Brandes, Marcin Kardas, Marek Klonowski, Dominik Pajak, Roger Wattenhofer:
Approximating the Size of a Radio Network in Beeping Model. SIROCCO 2016: 358-373 - [i7]Krzysztof Grining, Marek Klonowski, Piotr Syga:
Practical Fault-Tolerant Data Aggregation. CoRR abs/1602.04138 (2016) - [i6]Krzysztof Grining, Marek Klonowski:
Privacy of Aggregated Data without Noise. CoRR abs/1605.07956 (2016) - [i5]Karol Gotfryd, Marek Klonowski, Dominik Pajak:
On Location Hiding in Distributed Systems. CoRR abs/1611.04211 (2016) - [i4]Jacek Cichon, Zbigniew Golebiewski, Marcin Kardas, Marek Klonowski, Filip Zagórski:
On spreading rumor in heterogeneous systems. CoRR abs/1612.01061 (2016) - 2015
- [j10]Marek Klonowski, Jacek Cichon, Rafal Kapelko:
On the Dynamics of Systems of Urns. Discret. Math. Theor. Comput. Sci. 17(2): 235-250 (2015) - [j9]Ron Berman, Amos Fiat, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Tomer Levinboim, Amnon Ta-Shma:
Provable Unlinkability Against Traffic Analysis with Low Message Overhead. J. Cryptol. 28(3): 623-640 (2015) - [j8]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks. ACM Trans. Sens. Networks 11(2): 29:1-29:27 (2015) - [c51]Ania M. Piotrowska, Marek Klonowski:
Some Remarks and Ideas About Monetization of Sensitive Data. DPM/QASA@ESORICS 2015: 118-133 - [c50]Marek Klonowski, Dominik Pajak:
Electing a Leader in Wireless Networks Quickly Despite Jamming. SPAA 2015: 304-312 - 2014
- [j7]Albert Levi, Özgür Gürbüz, Antonio Maña, Marek Klonowski, Matteo Cesana, Mona Ghassemian, Susana Sargento:
A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems". Ad Hoc Networks 15: 1-3 (2014) - [j6]Marcin Kardas, Marek Klonowski, Kamil Wolny, Dominik Pajak:
k-Selection Protocols from Energetic Complexity Perspective. Int. J. Netw. Comput. 4(1): 111-130 (2014) - [c49]Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Lightweight Protocol for Trusted Spontaneous Communication. INTRUST 2014: 228-242 - 2013
- [j5]Jacek Cichon, Marek Klonowski:
On Flooding in the Presence of Random Faults. Fundam. Informaticae 123(3): 273-287 (2013) - [c48]Jacek Cichon, Zbigniew Golebiewski, Marcin Kardas, Marek Klonowski:
On Delta-Method of Moments and Probabilistic Sums. ANALCO 2013: 91-98 - [c47]Przemyslaw Blaskiewicz, Marek Klonowski, Krzysztof Majcher, Piotr Syga:
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems. CyberC 2013: 89-96 - [c46]Marcin Kardas, Marek Klonowski, Dominik Pajak:
Energy-Efficient Leader Election Protocols for Single-Hop Radio Networks. ICPP 2013: 399-408 - [c45]Marcin Kardas, Marek Klonowski, Dominik Pajak, Kamil Wolny:
K-Selection Protocols from Energetic Complexity Perspective. IPDPS Workshops 2013: 726-733 - [c44]Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Chameleon RFID and Tracking Prevention. RFIDSec Asia 2013: 17-29 - [c43]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Efficient and robust data aggregation using untrusted infrastructure. SIN 2013: 123-130 - [c42]Marek Klonowski, Michal Koza:
Countermeasures against sybil attacks in WSN based on proofs-of-work. WISEC 2013: 179-184 - [e2]Jacek Cichon, Maciej Gebala, Marek Klonowski:
Ad-hoc, Mobile, and Wireless Network - 12th International Conference, ADHOC-NOW 2013, Wrocław, Poland, July 8-10, 2013. Proceedings. Lecture Notes in Computer Science 7960, Springer 2013, ISBN 978-3-642-39246-7 [contents] - 2012
- [j4]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski:
Energy efficient alert in single-hop networks of extremely weak devices. Theor. Comput. Sci. 453: 65-74 (2012) - [c41]Marek Klonowski, Kamil Wolny:
Immune Size Approximation Algorithms in Ad Hoc Radio Network. EWSN 2012: 33-48 - [c40]Marcin Kardas, Marek Klonowski, Piotr Syga, Szymon Wilczek:
Obfuscated Counting in Single-Hop Radio Network. ICPADS 2012: 692-693 - [c39]Marek Klonowski, Dominik Pajak:
On λ-Alert Problem. IPDPS 2012: 1057-1067 - [c38]Marek Klonowski, Krzysztof Majcher, Wojciech Macyna, Filip Zagórski:
Hidden Bits Approach for Authentication in RFID Systems. RFIDSec 2012: 48-58 - [c37]Marek Klonowski, Piotr Syga, Wojciech Wodo:
Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures. SECRYPT 2012: 296-301 - [e1]Albert Levi, Mohamad Badra, Matteo Cesana, Mona Ghassemian, Özgür Gürbüz, Nafaâ Jabeur, Marek Klonowski, Antonio Maña, Susana Sargento, Sherali Zeadally:
5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. IEEE 2012, ISBN 978-1-4673-0229-6 [contents] - 2011
- [j3]Marek Klonowski:
Security problems of systems of extremely weak devices. Ann. UMCS Informatica 11(3): 9-25 (2011) - [c36]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
How to Transmit Messages via WSN in a Hostile Environment. SECRYPT 2011: 387-390 - [c35]Krzysztof Barczynski, Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski:
Self-keying Identification Mechanism for Small Devices. STA 2011: 37-44 - 2010
- [j2]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka:
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach. KSII Trans. Internet Inf. Syst. 4(3): 380-399 (2010) - [c34]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. ACISP 2010: 391-402 - [c33]Marek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska:
Practical Universal Random Sampling. IWSEC 2010: 84-100 - [c32]Marcin Bienkowski, André Brinkmann, Marek Klonowski, Miroslaw Korzeniowski:
SkewCCC+: A Heterogeneous Distributed Hash Table. OPODIS 2010: 219-234 - [c31]Marcin Bienkowski, Leszek Gasieniec, Marek Klonowski, Miroslaw Korzeniowski, Stefan Schmid:
Event Extent Estimation. SIROCCO 2010: 57-71 - [c30]Marcin Bienkowski, Marek Klonowski, Miroslaw Korzeniowski, Dariusz R. Kowalski:
Dynamic Sharing of a Multiple Access Channel. STACS 2010: 83-94 - [i3]Marcin Bienkowski, Marek Klonowski, Miroslaw Korzeniowski, Dariusz R. Kowalski:
Dynamic sharing of a multiple access channel. CoRR abs/1001.3044 (2010)
2000 – 2009
- 2009
- [j1]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks:
Step-out group signatures. Computing 85(1-2): 137-151 (2009) - [c29]Zbigniew Golebiewski, Michal Koza, Marek Klonowski, Miroslaw Kutylowski:
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. ACIIDS 2009: 477-482 - [c28]Zbigniew Golebiewski, Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Towards Fair Leader Election in Wireless Networks. ADHOC-NOW 2009: 166-179 - [c27]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski:
Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices. ALGOSENSORS 2009: 139-150 - [c26]Marek Klonowski, Michal Przykucki, Tomasz Struminski:
Data Deletion with Time-Aware Adversary Model. CSE (2) 2009: 659-664 - [c25]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka:
Attacking and Repairing the Improved ModOnions Protocol. ICISC 2009: 258-273 - [c24]Przemyslaw Blaskiewicz, Zbigniew Golebiewski, Marek Klonowski, Krzysztof Majcher:
RFID System with Allowers. PerCom Workshops 2009: 1-6 - [i2]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Security Challenges for Wireless Sensor Networks. ERCIM News 2009(76) (2009) - 2008
- [c23]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Distributed Verification of Mixing - Local Forking Proofs Model. ACISP 2008: 128-140 - [c22]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks:
Repelling Detour Attack Against Onions with Re-encryption. ACNS 2008: 296-308 - [c21]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks:
Step-Out Ring Signatures. MFCS 2008: 431-442 - [c20]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Privacy Protection for RFID with Hidden Subset Identifiers. Pervasive 2008: 298-314 - [c19]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski:
Practical Deniable Encryption. SOFSEM 2008: 599-609 - [c18]Marek Klonowski, Tomasz Struminski:
Proofs of Communication and Its Application for Fighting Spam. SOFSEM 2008: 720-730 - [c17]Marek Klonowski, Michal Przykucki, Tomasz Struminski:
Data Deletion with Provable Security. WISA 2008: 240-255 - 2007
- [c16]Jacek Cichon, Marek Klonowski, Lukasz Krzywiecki, Bartlomiej Rózanski, Pawel Zielinski:
Random Subsets of the Interval and P2P Protocols. APPROX-RANDOM 2007: 409-421 - [c15]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Forward-Secure Key Evolution in Wireless Sensor Networks. CANS 2007: 102-120 - [c14]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Privacy Protection in Dynamic Systems Based on RFID Tags. PerCom Workshops 2007: 235-240 - [i1]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Forward-secure Key Evolution in Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2007: 237 (2007) - 2006
- [c13]Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Kleptographic Attacks on E-Voting Schemes. ETRICS 2006: 494-508 - [c12]Marek Klonowski, Anna Lauks:
Extended Sanitizable Signatures. ICISC 2006: 343-355 - [c11]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks:
How to Protect a Signature from Being Shown to a Third Party. TrustBus 2006: 192-202 - 2005
- [c10]Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski:
Local View Attack on Anonymous Communication. ESORICS 2005: 475-488 - [c9]Marek Klonowski, Miroslaw Kutylowski:
Provable Anonymity for Networks of Mixes. Information Hiding 2005: 26-38 - [c8]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
A Practical Voting Scheme with Receipts. ISC 2005: 490-497 - [c7]Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rózanski:
Hiding Data Sources in P2P Networks. IWAP 2005: 225-239 - [c6]Marek Klonowski, Miroslaw Kutylowski, Filip Zagórski:
Anonymous Communication with On-line and Off-line Onion Encoding. SOFSEM 2005: 229-238 - [c5]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Conditional Digital Signatures. TrustBus 2005: 206-215 - 2004
- [c4]Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski:
Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols. Communications and Multimedia Security 2004: 1-15 - [c3]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! ISC 2004: 354-366 - [c2]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. WISA 2004: 400-410 - 2003
- [c1]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Rapid Mixing and Security of Chaum's Visual Electronic Voting. ESORICS 2003: 132-145
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint