Остановите войну!
for scientists:
default search action
Shuang Hao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Shuang Hao, Wenfeng Han, Tao Jiang, Yiping Li, Haonan Wu, Chunlin Zhong, Zhangjun Zhou, He Tang:
Synthetic Data in AI: Challenges, Applications, and Ethical Implications. CoRR abs/2401.01629 (2024) - 2023
- [j25]Shuang Hao, Guangming Song, Juzheng Mao, Yue Gu, Aiguo Song:
A fully actuated aerial manipulator system for industrial contact inspection applications. Ind. Robot 50(3): 421-431 (2023) - [j24]Yawen Li, Guangming Song, Shuang Hao, Juzheng Mao, Aiguo Song:
Semantic stereo visual SLAM toward outdoor dynamic environments based on ORB-SLAM2. Ind. Robot 50(3): 542-554 (2023) - [j23]Yihai Xi, Ning Wang, Shuang Hao, Yiyi Zhang, Xinyu Chen:
Popularity sensitive and domain-aware summarization for web tables. Inf. Sci. 621: 729-748 (2023) - [j22]Mingming Zhang, Xiang Li, Baojun Liu, Jianyu Lu, Yiming Zhang, Jianjun Chen, Haixin Duan, Shuang Hao, Xiaofeng Zheng:
Detecting and Measuring Security Risks of Hosting-Based Dangling Domains. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 9:1-9:28 (2023) - [j21]Juzheng Mao, Guangming Song, Shuang Hao, Mingquan Zhang, Aiguo Song:
Development of a Lightweight Underwater Manipulator for Delicate Structural Repair Operations. IEEE Robotics Autom. Lett. 8(10): 6563-6570 (2023) - [j20]Ye Liu, Fei Wu, Neng Zhao, Qirong Zhang, Wenqiang Wang, Yutong Yang, Xiangting Li, Sixu Li, Zili Huang, Shuang Hao, Guangbin Ou, Liang Zhou, Liang Chang, Shuisheng Lin, Ningyi Xu, Jun Zhou:
NVP: A Flexible and Efficient Processor Architecture for Accelerating Diverse Computer Vision Tasks including DNN. IEEE Trans. Circuits Syst. II Express Briefs 70(1): 271-275 (2023) - [j19]Ye Liu, Kun Huang, Neng Zhao, Jingyuan Li, Shuang Hao, Zili Huang, Xiuyuan Qi, Xinghao Wang, Liang Zhou, Liang Chang, Jun Zhou:
BOHA: A High Performance VSLAM Backend Optimization Hardware Accelerator Using Recursive Fine-Grain H-Matrix Decomposition and Early-Computing With Approximate Linear Solver. IEEE Trans. Circuits Syst. II Express Briefs 70(10): 3827-3831 (2023) - [j18]Shuang Hao, Chengliang Chai, Guoliang Li, Nan Tang, Ning Wang, Xiang Yu:
HOFD: An Outdated Fact Detector for Knowledge Bases. IEEE Trans. Knowl. Data Eng. 35(10): 10775-10789 (2023) - [c58]Xuerui Hong, Shuang Hao:
Imputation of Missing Values in Training Data using Variational Autoencoder. ICDEW 2023: 49-54 - [c57]Shuang Hao, Guangming Song, Yue Gu, Juzheng Mao, Zichao Ji, Shengyu Xie, Aiguo Song:
Vision-based Autonomous Detecting and Grasping Framework for the Fully-actuated Aerial Manipulator. ROBIO 2023: 1-6 - [c56]Juzheng Mao, Guangming Song, Cheng-Lin Liu, Mingquan Zhang, Shengyu Xie, Shuang Hao, Aiguo Song:
A Gaze-based Bilateral Teleoperation Framework for a Team of Mobile Robots *. ROBIO 2023: 1-6 - [c55]Mingming Zhang, Xiang Li, Baojun Liu, Jianyu Lu, Yiming Zhang, Jianjun Chen, Haixin Duan, Shuang Hao, Xiaofeng Zheng:
Detecting and Measuring Security Risks of Hosting-Based Dangling Domains. SIGMETRICS (Abstracts) 2023: 87-88 - [i5]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. CoRR abs/2309.08230 (2023) - 2022
- [j17]Yaqiang Hong, Dake Zhang, Xiangtian Zhou, Aili Chen, Amir Abliz, Jian Bai, Liang Wang, Qingtao Hu, Kenan Gong, Xiaonan Guan, Mengfei Liu, Xinchang Zheng, Shujuan Lai, Hongzhu Qu, Fuxin Zhao, Shuang Hao, Zhen Wu, Hong Cai, Shaoyan Hu, Yue Ma, Junting Zhang, Yang Ke, Qian-Fei Wang, Wei Chen, Changqing Zeng:
Common Postzygotic Mutational Signatures in Healthy Adult Tissues Related to Embryonic Hypoxia. Genom. Proteom. Bioinform. 20(1): 177-191 (2022) - [j16]Pengfei Li, Shuang Hao, Yuhuan Cui, Yazhou Xu, Congcong Liao, Liangliang Sheng:
Analysis of the Evolution of the Relationship between the Urban Pattern and Economic Development in Guangdong Province Based on Coupled Multisource Data. ISPRS Int. J. Geo Inf. 11(10): 512 (2022) - [j15]Jianling Gao, Nan Zhao, Ning Wang, Shuang Hao, Haoyan Wu:
Automatic index selection with learned cost estimator. Inf. Sci. 612: 706-723 (2022) - [j14]Yan Sha, Jufeng Hu, Shuang Hao, Dan Wang:
Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks. KSII Trans. Internet Inf. Syst. 16(9): 3008-3028 (2022) - [j13]Shuang Hao, Dali Zhang, Ming Dong:
Iteratively sampling scheme for stochastic optimization with variable number sample path. Oper. Res. Lett. 50(3): 347-355 (2022) - [c54]Xian Wang, Shuang Hao:
Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee. CCS 2022: 2857-2870 - [c53]Jianling Gao, Nan Zhao, Ning Wang, Shuang Hao:
SmartIndex: An Index Advisor with Learned Cost Estimator. CIKM 2022: 4853-4856 - [c52]Shuang Hao, Peng Li, Renzhi Wu, Xu Chu:
A Model-Agnostic Approach for Learning with Noisy Labels of Arbitrary Distributions. ICDE 2022: 1219-1231 - 2021
- [j12]Shuang Hao, Yuhuan Cui, Jie Wang:
Segmentation Scale Effect Analysis in the Object-Oriented Method of High-Spatial-Resolution Image Classification. Sensors 21(23): 7935 (2021) - [j11]Shuang Hao, Nan Tang, Guoliang Li, Jianhua Feng, Ning Wang:
Mis-categorized entities detection. VLDB J. 30(4): 515-536 (2021) - [c51]Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin:
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic. CCS 2021: 287-303 - [c50]Chaoyi Lu, Baojun Liu, Yiming Zhang, Zhou Li, Fenglu Zhang, Haixin Duan, Ying Liu, Joann Qiongna Chen, Jinjin Liang, Zaifeng Zhang, Shuang Hao, Min Yang:
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR. NDSS 2021 - [c49]Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. USENIX Security Symposium 2021: 3201-3217 - 2020
- [c48]Hao Wu, Shuang Hao:
A Deep Neural Network Model of Particle Thermal Radiation in Packed Bed. AAAI 2020: 1029-1036 - [c47]Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang:
Understanding Promotion-as-a-Service on GitHub. ACSAC 2020: 597-610 - [c46]Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Shuang Hao, Mingxuan Liu, Ying Liu, Dong Wang, Qiang Li:
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China. CCS 2020: 521-534 - [c45]Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, Min Yang:
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks. CCS 2020: 1939-1952 - [c44]Weizhong Li, Kaiwen Shen, Run Guo, Baojun Liu, Jia Zhang, Haixin Duan, Shuang Hao, Xiarun Chen, Yao Wang:
CDN Backfired: Amplification Attacks Based on HTTP Range Requests. DSN 2020: 14-25 - [c43]Yihai Xi, Ning Wang, Shuang Hao, Wenyang Yang, Li Li:
PocketView: A Concise and Informative Data Summarizer. ICDE 2020: 1742-1745 - [c42]Shuang Hao, Chengliang Chai, Guoliang Li, Nan Tang, Ning Wang, Xiang Yu:
Outdated Fact Detection in Knowledge Bases. ICDE 2020: 1890-1893 - [c41]Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu:
CDN Judo: Breaking the CDN DoS Protection with Itself. NDSS 2020 - [c40]Matthew Joslin, Shuang Hao:
Attributing and Detecting Fake Images Generated by Known GANs. SP (Workshops) 2020: 8-14 - [c39]Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian:
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. USENIX Security Symposium 2020: 577-593 - [i4]Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. CoRR abs/2011.08420 (2020)
2010 – 2019
- 2019
- [j10]Shuang Hao, Lingyan Hu, Peter X. Liu:
Sliding Mode Control for a Surgical Teleoperation System via a Disturbance Observer. IEEE Access 7: 43383-43393 (2019) - [c38]Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
Casino royale: a deep exploration of illegal online gambling. ACSAC 2019: 500-513 - [c37]Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang:
Who is answering my queries: understanding and characterizing interception of the DNS resolution path. ANRW 2019: 15-16 - [c36]Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang:
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. EuroS&P 2019: 560-575 - [c35]Chaoyi Lu, Baojun Liu, Zhou Li, Shuang Hao, Hai-Xin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, Jianping Wu:
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? Internet Measurement Conference 2019: 22-35 - [c34]Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Shuang Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang:
TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams. SecureComm (2) 2019: 3-25 - [c33]Matthew Joslin, Neng Li, Shuang Hao, Minhui Xue, Haojin Zhu:
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions. IEEE Symposium on Security and Privacy 2019: 1311-1325 - 2018
- [j9]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li:
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. Comput. Secur. 73: 326-344 (2018) - [j8]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem Beyah:
Cloud repository as a malicious service: challenge, identification and implication. Cybersecur. 1(1): 14 (2018) - [j7]Junli Yang, Zhiguo Jiang, Shuang Hao, Haopeng Zhang:
Higher Order Support Vector Random Fields for Hyperspectral Image Classification. ISPRS Int. J. Geo Inf. 7(1): 19 (2018) - [j6]Shuang Hao, Nan Tang, Guoliang Li, Jian Li, Jianhua Feng:
Distilling relations using knowledge bases. VLDB J. 27(4): 497-519 (2018) - [c32]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. ANRW 2018: 4 - [c31]Baojun Liu, Chaoyi Lu, Zhou Li, Ying Liu, Hai-Xin Duan, Shuang Hao, Zaifeng Zhang:
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly. DSN 2018: 654-665 - [c30]Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, Shuang Hao:
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks. ESORICS (2) 2018: 122-142 - [c29]Shuang Hao, Nan Tang, Guoliang Li, Jianhua Feng:
Discovering Mis-Categorized Entities. ICDE 2018: 413-424 - [c28]Shuang Hao, Yi Xu, Nan Tang, Guoliang Li, Jianhua Feng:
Cleaning Your Wrong Google Scholar Entries. ICDE 2018: 1597-1600 - [c27]Junli Yang, Yiran Jiang, Han Fang, Zhiguo Jiang, Haopeng Zhang, Shuang Hao:
Semantic Segmentation of Aerial Image Using Fully Convolutional Network. IGTA 2018: 546-555 - [c26]Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. NDSS 2018 - [c25]Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. NDSS 2018 - [c24]Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna, Anja Feldmann:
In rDNS We Trust: Revisiting a Common Data-Source's Reliability. PAM 2018: 131-145 - [c23]Kevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna:
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. IEEE Symposium on Security and Privacy 2018: 770-784 - [c22]Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang, Chao Zhang, Hai-Xin Duan, Tao Wan, Jian Jiang, Shuang Hao, Yaoqi Jia:
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation. SRDS 2018: 1-10 - [c21]Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee:
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. USENIX Security Symposium 2018: 393-410 - [c20]Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang:
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. USENIX Security Symposium 2018: 1113-1128 - [c19]Mingming Zhang, Baojun Liu, Chaoyi Lu, Jia Zhang, Shuang Hao, Hai-Xin Duan:
Measuring Privacy Threats in China-Wide Mobile Networks. FOCI @ USENIX Security Symposium 2018 - [i3]Sen Chen, Guozhu Meng, Ting Su, Lingling Fan, Yinxing Xue, Yang Liu, Lihua Xu, Minhui Xue, Bo Li, Shuang Hao:
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps. CoRR abs/1805.05236 (2018) - 2017
- [j5]Shuang Hao, Mengyao Cui, Vanessa Paz Dennen, Yalin Kiliç Türel, Li Mei:
Analysis of mobile learning as an innovation in higher education: a comparative study of three countries. Int. J. Mob. Learn. Organisation 11(4): 314-339 (2017) - [j4]Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
On the Privacy and Security of the Ultrasound Ecosystem. Proc. Priv. Enhancing Technol. 2017(2): 95-112 (2017) - [j3]Shuang Hao, Nan Tang, Guoliang Li, Jian He, Na Ta, Jianhua Feng:
A Novel Cost-Based Model for Data Repairing. IEEE Trans. Knowl. Data Eng. 29(4): 727-742 (2017) - [j2]Na Ta, Guoliang Li, Yongqing Xie, Changqi Li, Shuang Hao, Jianhua Feng:
Signature-Based Trajectory Similarity Join. IEEE Trans. Knowl. Data Eng. 29(4): 870-883 (2017) - [c18]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505 - [c17]Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
DIFUZE: Interface Aware Fuzzing for Kernel Drivers. CCS 2017: 2123-2138 - [c16]Shuang Hao, Nan Tang, Guoliang Li, Jian He, Na Ta, Jianhua Feng:
A Novel Cost-Based Model for Data Repairing. ICDE 2017: 49-50 - [c15]Shuang Hao, Nan Tang, Guoliang Li, Jian Li:
Cleaning Relations Using Knowledge Bases. ICDE 2017: 933-944 - [c14]Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Something from Nothing (There): Collecting Global IPv6 Datasets from DNS. PAM 2017: 30-43 - [i2]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu:
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach. CoRR abs/1706.04146 (2017) - [i1]Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. CoRR abs/1709.06916 (2017) - 2016
- [j1]Xuena Geng, Dantong Ouyang, Xiangfu Zhao, Shuang Hao:
Probabilistic logical approach for testing diagnosability of stochastic discrete event systems. Eng. Appl. Artif. Intell. 53: 53-61 (2016) - [c13]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem A. Beyah:
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. CCS 2016: 1541-1552 - [c12]Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster:
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. CCS 2016: 1568-1579 - [c11]Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah:
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. WWW 2016: 321-332 - 2015
- [c10]Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna:
Drops for Stuff: An Analysis of Reshipping Mule Scams. CCS 2015: 1081-1092 - 2014
- [c9]Dong Deng, Guoliang Li, Shuang Hao, Jiannan Wang, Jianhua Feng:
MassJoin: A mapreduce-based method for scalable string similarity joins. ICDE 2014: 340-351 - [c8]Dongxu Zhang, Xuefei Song, Songtao Mai, Shuang Hao, Hongxiang Guo, Yinben Xia:
Highly survivable software defined synergistic IP+Optical Transport networks. OFC 2014: 1-3 - 2013
- [c7]Shuang Hao, Matthew Thomas, Vern Paxson, Nick Feamster, Christian Kreibich, Chris Grier, Scott Hollenbeck:
Understanding the domain registration behavior of spammers. Internet Measurement Conference 2013: 63-76 - 2011
- [c6]Shuang Hao, Nick Feamster, Ramakant Pandrangi:
Monitoring the initial DNS behavior of malicious domains. Internet Measurement Conference 2011: 269-278
2000 – 2009
- 2009
- [c5]Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser:
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. USENIX Security Symposium 2009: 101-118 - 2006
- [c4]Ting Wang, Shuang Hao, Ping Wang, Gang Peng:
Efficient and Density-Aware Routing for Wireless Sensor Networks. ICCCN 2006: 207-212 - [c3]Shuang Hao, Ting Wang:
Sensor Networks Routing via Bayesian Exploration. LCN 2006: 954-955 - 2005
- [c2]Shuang Hao, Hua Song, Wenbao Jiang, Yiqi Dai:
A queue model to detect DDos attacks. CTS 2005: 106-112 - [c1]Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai:
Using Trust for Restricted Delegation in Grid Environments. ISPEC 2005: 293-301
Coauthor Index
aka: Haixin Duan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-16 22:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint