default search action
Shuhao Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Shuhao Li 0001 — Fudan University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Shuhao Li, Jichao Yin, Daozhen Guo, Guangyao Li, Hu Wang:
An efficient online successive reanalysis method for dynamic topology optimization. Adv. Eng. Softw. 191: 103625 (2024) - [j21]Xiang Li, Jiang Xie, Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Tianning Zang:
Let model keep evolving: Incremental learning for encrypted traffic classification. Comput. Secur. 137: 103624 (2024) - [j20]Jichao Yin, Hu Wang, Shuhao Li, Daozhen Guo:
An efficient topology optimization method based on adaptive reanalysis with projection reduction. Eng. Comput. 40(1): 213-234 (2024) - [j19]Guangjun Wu, Fengxin Liu, Shuhao Li, Qige Song, Zixian Tang:
AC-DNN: An Adaptive Compact DNNs Architecture for Collaborative Learning Among Heterogeneous Smart Devices. IEEE Internet Things J. 11(12): 21072-21082 (2024) - [j18]Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. IEEE Trans. Inf. Forensics Secur. 19: 1372-1387 (2024) - [c59]Hongbo Xu, Zhenyu Cheng, Shuhao Li, Chenxu Wang, Peishuai Sun, Jiang Xie, Qingyun Liu:
ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs. ESORICS (2) 2024: 162-181 - [c58]Peishuai Sun, Chengxiang Si, Shuhao Li, Zhenyu Cheng, Shuyuan Zhao, Qingyun Liu:
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection. ICASSP 2024: 4765-4769 - [c57]Shuhao Li, Wensheng Luo, Ruifang Zhang, José I. Leon, Abraham Marquez, Leopoldo García Franquelo:
Improved Sliding Mode Control Strategy Based on Photovoltaic-Energy Storage Virtual Synchronous Generator System. ISIE 2024: 1-6 - [i14]Lipeng Ma, Weidong Yang, Sihang Jiang, Ben Fei, Mingjie Zhou, Shuhao Li, Bo Xu, Yanghua Xiao:
LUK: Empowering Log Understanding with Expert Knowledge from Large Language Models. CoRR abs/2409.01909 (2024) - 2023
- [j17]Peishuai Sun, Shuhao Li, Jiang Xie, Hongbo Xu, Zhenyu Cheng, Rong Yang:
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge. Comput. Secur. 130: 103257 (2023) - [j16]Yafei Sang, Jisong Yang, Yongzheng Zhang, Shuhao Li, Peng Chang:
Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach. Comput. Secur. 131: 103145 (2023) - [j15]Guojun Ji, Tianyu Fu, Shuhao Li:
Optimal selling format considering price discount strategy in live-streaming commerce. Eur. J. Oper. Res. 309(2): 529-544 (2023) - [j14]Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, Kashif Sharif, Haibo Hu, Yuanzhang Li:
Membership Inference Attacks Against Deep Learning Models via Logits Distribution. IEEE Trans. Dependable Secur. Comput. 20(5): 3799-3808 (2023) - [c56]Jiexing Qi, Shuhao Li, Zhixin Guo, Yusheng Huang, Chenghu Zhou, Weinan Zhang, Xinbing Wang, Zhouhan Lin:
Text Classification In The Wild: A Large-Scale Long-Tailed Name Normalization Dataset. ICASSP 2023: 1-5 - [c55]Kai Huang, Xiangxin Meng, Jian Zhang, Yang Liu, Wenjie Wang, Shuhao Li, Yuqing Zhang:
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair. ASE 2023: 1162-1174 - [i13]Jiexing Qi, Shuhao Li, Zhixin Guo, Yusheng Huang, Chenghu Zhou, Weinan Zhang, Xinbing Wang, Zhouhan Lin:
Text Classification in the Wild: a Large-scale Long-tailed Name Normalization Dataset. CoRR abs/2302.09509 (2023) - [i12]Shuhao Li, Hu Wang, Jichao Yin, Daozhen Guo, Guangyao Li:
An efficient online successive reanalysis method for dynamic topology optimization. CoRR abs/2305.08110 (2023) - [i11]Shuhao Li, Hu Wang, Jichao Yin, Xinchao Jiang, Yaya Zhang:
A novel reduced basis method for adjoint sensitivity analysis of dynamic topology optimization. CoRR abs/2308.09864 (2023) - [i10]Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A method based on hierarchical spatiotemporal features for trojan traffic detection. CoRR abs/2309.01174 (2023) - [i9]Jiang Xie, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics. CoRR abs/2309.03724 (2023) - [i8]Xiaochun Yun, Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun:
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. CoRR abs/2309.03739 (2023) - [i7]Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun, Hongbo Xu:
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute. CoRR abs/2310.10660 (2023) - [i6]Jichao Yin, Ziming Wen, Shuhao Li, Yaya Zhang, Hu Wang:
Dynamically configured physics-informed neural network in topology optimization applications. CoRR abs/2312.06993 (2023) - 2022
- [j13]Xiaochun Yun, Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun:
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. Comput. Secur. 121: 102834 (2022) - [j12]Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun, Hongbo Xu:
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute. Comput. Secur. 121: 102867 (2022) - [j11]Xiao Guo, Zhenhua Wen, Shuhao Li, Qingzhen Yang:
Study on the influence of blade on electromagnetic scattering characteristics in the open-ended cavity. J. Comput. Sci. 62: 101716 (2022) - [c54]Hanwu Sun, Chengwei Peng, Yafei Sang, Shuhao Li, Yongzheng Zhang, Yujia Zhu:
Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic. CollaborateCom (2) 2022: 153-173 - [c53]Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Ruihai Ge, Yong Ding:
A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet. CollaborateCom (2) 2022: 419-436 - [c52]Hongbo Xu, Shuhao Li, Zhenyu Cheng, Rui Qin, Jiang Xie, Peishuai Sun:
VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network. CollaborateCom (2) 2022: 437-456 - [c51]Hongbo Xu, Shuhao Li, Zhenyu Cheng, Rui Qin, Jiang Xie, Peishuai Sun:
TrafficGCN: Mobile Application Encrypted Traffic Classification Based on GCN. GLOBECOM 2022: 891-896 - [c50]Zhenyu Cheng, Xiaochun Yun, Shuhao Li, Jinbu Geng, Rui Qin, Li Fan:
DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph. ICCS (1) 2022: 345-359 - [c49]Jinbu Geng, Zhenyu Cheng, Zhicheng Liu, Shuhao Li, Rui Qin:
HNOP: Attack Traffic Detection Based on Hierarchical Node Hopping Features of Packets. ICCS (1) 2022: 431-444 - [c48]Ruihai Ge, Yongzheng Zhang, Shuhao Li, Guoqiao Zhou, Guangze Zhao:
Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic. ICCNS 2022: 23-29 - [c47]Jinbu Geng, Shuhao Li, Zhicheng Liu, Zhenyu Cheng, Li Fan:
Effective Malicious URL Detection by Using Generative Adversarial Networks. ICWE 2022: 341-356 - [c46]Wensheng Luo, Shuhao Li, Sergio Vazquez, Jinqian Du, Ligang Wu, Leopoldo García Franquelo:
Grid-Connected Inverter Control Via Linear Parameter-Varying System Approach. IECON 2022: 1-6 - [c45]Ruihai Ge, Yongzheng Zhang, Shuhao Li, Guoqiao Zhou:
A Dual-Branch Self-attention Method for Mobile Malware Detection via Network Traffic. IJCNN 2022: 1-8 - [c44]Jiang Xie, Shuhao Li, Peishuai Sun:
Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks. SciSec 2022: 217-232 - [c43]Peishuai Sun, Shuhao Li, Jiang Xie, Hongbo Xu, Zhenyu Cheng, Rui Qin:
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features. SEC 2022: 126-141 - [c42]Qige Song, Yongzheng Zhang, Shuhao Li:
Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison. SecureComm 2022: 192-211 - [c41]Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet. TrustCom 2022: 117-122 - [i5]Jichao Yin, Hu Wang, Shuhao Li, Daozhen Guo:
Adaptive auxiliary reduced model reanalysis-based efficient topology optimization method. CoRR abs/2205.00385 (2022) - [i4]Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan:
l-Leaks: Membership Inference Attacks with Logits. CoRR abs/2205.06469 (2022) - [i3]Qige Song, Yongzheng Zhang, Shuhao Li:
Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison. CoRR abs/2206.12236 (2022) - [i2]Jichao Yin, Hu Wang, Daozhen Guo, Shuhao Li:
An efficient topology optimization based on multigrid assisted reanalysis for heat transfer problem. CoRR abs/2210.00947 (2022) - 2021
- [j10]Shuhao Li, Qiang Sun, Shupei Liu:
Risk assessment for supply chain based on Cloud model. J. Intell. Fuzzy Syst. 41(2): 3523-3540 (2021) - [j9]Zhiqiang Wang, Xiaorui Ren, Shuhao Li, Bingyan Wang, Jianyi Zhang, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. Secur. Commun. Networks 2021: 5518528:1-5518528:12 (2021) - [j8]Yinuo Lyu, Wenying He, Shuhao Li, Quan Zou, Fei Guo:
iPro2L-PSTKNC: A Two-Layer Predictor for Discovering Various Types of Promoters by Position Specific of Nucleotide Composition. IEEE J. Biomed. Health Informatics 25(6): 2329-2337 (2021) - [c40]Shuhao Li, Jiawei Chen:
The Title of the Paper: Decoupled Power Regulation for Dual-Frequency Induction Heating Power Supply with Single Full-Bridge Inversion Topology. EEET 2021: 98-102 - [c39]Jinbu Geng, Shuhao Li, Yongzheng Zhang, Zhicheng Liu, Zhenyu Cheng:
LIFH: Learning Interactive Features from HTTP Payload using Image Reconstruction. ICC 2021: 1-6 - 2020
- [j7]Jiang Xie, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. Comput. Secur. 96: 101923 (2020) - [c38]Haiwen Wang, Ruijie Wang, Chuan Wen, Shuhao Li, Yuting Jia, Weinan Zhang, Xinbing Wang:
Author Name Disambiguation on Heterogeneous Information Network with Adversarial Representation Learning. AAAI 2020: 238-245 - [c37]Jinhao Zhang, Shuhao Li, Yijie Ding, Jijun Tang, Fei Guo:
An two-layer predictive model of ensemble classifier chain for detecting antimicrobial peptides. BIBM 2020: 56-61 - [c36]Xiaolin Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network. ICCS (3) 2020: 282-296 - [c35]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Chengwei Peng:
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. ICCS (3) 2020: 379-398 - [c34]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Zhenyu Cheng:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks. ISCC 2020: 1-7 - [c33]Zhiqiang Wang, Shuhao Li, Bingyan Wang, Xiaorui Ren, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. SocialSec 2020: 34-40 - [i1]Haiwen Wang, Ruijie Wang, Chuan Wen, Shuhao Li, Yuting Jia, Weinan Zhang, Xinbing Wang:
Author Name Disambiguation on Heterogeneous Information Network with Adversarial Representation Learning. CoRR abs/2002.09803 (2020)
2010 – 2019
- 2019
- [j6]Jiapeng Zhang, Luoyi Fu, Shuhao Li, Yuhang Yao, Xinbing Wang:
Core Percolation in Interdependent Networks. IEEE Trans. Netw. Sci. Eng. 6(4): 952-967 (2019) - [c32]Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li:
Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features. ICT 2019: 73-79 - [c31]Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection. IPCCC 2019: 1-8 - [c30]Zhenyu Cheng, Xunxun Chen, Yongzheng Zhang, Shuhao Li, Jian Xu:
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network. TrustCom/BigDataSE 2019: 232-239 - [c29]Jia Li, Xiaochun Yun, Mao Tian, Jiang Xie, Shuhao Li, Yongzheng Zhang, Yu Zhou:
A Method of HTTP Malicious Traffic Detection on Mobile Networks. WCNC 2019: 1-8 - 2018
- [c28]Zhenyu Cheng, Xunxun Chen, Yongzheng Zhang, Shuhao Li, Jian Xu:
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users. CollaborateCom 2018: 329-345 - [c27]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data. CollaborateCom 2018: 488-503 - [c26]Yaping Chi, Zhiting Ling, Xuejing Ba, Shuhao Li:
An Analysis of a New Detection Method for Spear Phishing Attack. CSPS (3) 2018: 1063-1072 - [c25]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. ICICS 2018: 685-695 - 2017
- [c24]Qiquan Wang, Xiaoyan Li, Shuhao Li, Songli Yang:
Risks and risk control of wind power enterprises. ICNC-FSKD 2017: 3070-3075 - [c23]Zhenyu Cheng, Xunxun Chen, Yongzheng Zhang, Shuhao Li, Yafei Sang:
Detecting Information Theft Based on Mobile Network Flows for Android Users. NAS 2017: 1-10 - [c22]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao:
Discovering Malicious Domains through Alias-Canonical Graph. TrustCom/BigDataSE/ICESS 2017: 225-232 - [c21]Jingkun Liu, Shuhao Li, Yongzheng Zhang, Jun Xiao, Peng Chang, Chengwei Peng:
Detecting DNS Tunnel through Binary-Classification Based on Behavior Features. TrustCom/BigDataSE/ICESS 2017: 339-346 - 2015
- [j5]Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:
Botnet spoofing: fighting botnet with itself. Secur. Commun. Networks 8(1): 80-89 (2015) - [j4]Xiao-chun Yun, Shuhao Li, Yongzheng Zhang:
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation. IEEE Trans. Inf. Forensics Secur. 10(11): 2365-2380 (2015) - 2014
- [c20]Tao Yin, Yongzheng Zhang, Shuhao Li:
DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance. NAS 2014: 191-199 - 2012
- [c19]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. SEC 2012: 261-272 - 2011
- [j3]Lidong Zhai, Li Guo, Xiang Cui, Shuhao Li:
Research on Real-time Publish/Subscribe System supported by Data-Integration. J. Softw. 6(6): 1133-1139 (2011) - [c18]Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu:
Poster: recoverable botnets: a hybrid C&C approach. CCS 2011: 833-836 - [c17]Yipeng Wang, Zhibin Zhang, Li Guo, Shuhao Li:
Using Entropy to Classify Traffic More Deeply. NAS 2011: 45-52 - [c16]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Xiang Cui, Yipeng Wang:
A Propagation Model for Social Engineering Botnets in Social Networks. PDCAT 2011: 423-426 - 2010
- [j2]Shuhao Li, Sandie Balaguer, Alexandre David, Kim G. Larsen, Brian Nielsen, Saulius Pusinskas:
Scenario-based verification of real-time systems using Uppaal. Formal Methods Syst. Des. 37(2-3): 200-264 (2010) - [c15]Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen, Saulius Pusinskas:
Scenario-based analysis and synthesis of real-time systems using uppaal. DATE 2010: 447-452 - [c14]Ming Zhu, Liyi Xiao, Shuhao Li, Yanjing Zhang:
Efficient Two-Dimensional Error Codes for Multiple Bit Upsets Mitigation in Memory. DFT 2010: 129-135 - [c13]Shuhao Li, Paul Pettersson:
Verification and controller synthesis for resource-constrained real-time systems: Case study of an autonomous truck. ETFA 2010: 1-8 - [c12]Alexandre David, Kim Guldstrand Larsen, Shuhao Li, Marius Mikucionis, Brian Nielsen:
Testing Real-Time Systems under Uncertainty. FMCO 2010: 352-371
2000 – 2009
- 2009
- [j1]Mengluo Ji, Ji Wang, Shuhao Li, Zhi-Chang Qi:
Automated Worst-Case Execution Time Analysis Based on Program Modes. Comput. J. 52(5): 530-544 (2009) - [c11]Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen, Saulius Pusinskas:
Verifying Real-Time Systems against Scenario-Based Requirements. FM 2009: 676-691 - [c10]Alexandre David, Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen:
Timed Testing under Partial Observability. ICST 2009: 61-70 - 2008
- [c9]Alexandre David, Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen:
A Game-Theoretic Approach to Real-Time System Testing. DATE 2008: 486-491 - [c8]Wei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li:
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme. WAIM 2008: 558-563 - [c7]Alexandre David, Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen:
Cooperative Testing of Timed Systems. MBT@ETAPS 2008: 79-92 - 2006
- [c6]Mengluo Ji, Ji Wang, Shuhao Li, Zhi-Chang Qi:
Automated WCET Analysis Based on Program Modes. AST 2006: 36-42 - 2005
- [c5]Shuhao Li, Ji Wang, Xin Wang, Zhi-Chang Qi:
Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM. COMPSAC (1) 2005: 13-18 - [c4]Xin Wang, Zhi-Chang Qi, Shuhao Li:
An Optimized Method for Automatic Test Oracle Generation from Real-Time Specification. ICECCS 2005: 440-449 - 2004
- [c3]Shuhao Li, Ji Wang, Wei Dong, Zhichang Qi:
Property-Oriented Testing of Real-Time Systems. APSEC 2004: 358-365 - [c2]Shuhao Li, Ji Wang, Zhi-Chang Qi:
Property-Oriented Test Generation from UML Statecharts. ASE 2004: 122-131 - [c1]Shuhao Li, Zhi-Chang Qi:
Property-Oriented Testing: An Approach to Focusing Testing Efforts on Behaviours of Interest. SOQUA/TECOS 2004: 191-206
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint