Остановите войну!
for scientists:
default search action
Changhoon Lee
- > Home > Persons > Changhoon Lee
Publications
- 2024
- [j81]Hyejin Eom, Minjeong Cho, Changhoon Lee:
Conditional Cube Attack on Lightweight Sycon-AEAD-64. IEEE Internet Things J. 11(7): 11652-11662 (2024) - [i4]Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho:
Software-Defined Cryptography: A Design Feature of Cryptographic Agility. IACR Cryptol. ePrint Arch. 2024: 518 (2024) - 2023
- [j80]Seunghee Seo, Byoungjin Seok, Changhoon Lee:
Digital forensic investigation framework for the metaverse. J. Supercomput. 79(9): 9467-9485 (2023) - 2022
- [j79]Sushil Kumar Singh, Changhoon Lee, Jong Hyuk Park:
CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing. Comput. Ind. Eng. 166: 107967 (2022) - 2021
- [j78]Dat Phuc Tran Song, Yong-Hyeon Shin, Changhoon Lee:
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks. KSII Trans. Internet Inf. Syst. 15(6): 2148-2167 (2021) - [i2]Jongsu Kim, Changhoon Lee:
Deep Particulate Matter Forecasting Model Using Correntropy-Induced Loss. CoRR abs/2106.03032 (2021) - 2020
- [j77]Dat Phuc Tran Song, Byoungjin Seok, Changhoon Lee:
HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches. Appl. Soft Comput. 97(Part): 106663 (2020) - [j75]SungJin Kim, Jaeik Cho, Changhoon Lee, Taeshik Shon:
Smart seed selection-based effective black box fuzzing for IIoT protocol. J. Supercomput. 76(12): 10140-10154 (2020) - 2019
- [j74]Chunxue Wu, Langfeng Li, Changwei Peng, Yan Wu, Naixue Xiong, Changhoon Lee:
Design and analysis of an effective graphics collaborative editing system. EURASIP J. Image Video Process. 2019: 50 (2019) - [j73]Byoungjin Seok, Changhoon Lee:
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor. Int. J. Distributed Sens. Networks 15(9) (2019) - 2018
- [j72]Haoqi Liu, Changhoon Lee, Mingming Han, Zhongbin Su, Varshinee Anu Padigala, Weizheng Shen:
Information-based management mode based on value network analysis for livestock enterprises. Enterp. Inf. Syst. 12(1): 36-53 (2018) - [j71]Neal N. Xiong, Yang Shen, Kangye Yang, Changhoon Lee, Chunxue Wu:
Color sensors and their applications based on real-time color image segmentation for cyber physical systems. EURASIP J. Image Video Process. 2018: 23 (2018) - [j69]Liping Gao, Dongfang Gao, Naixue Xiong, Changhoon Lee:
CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5. Multim. Tools Appl. 77(4): 5067-5082 (2018) - [j68]Dat Phuc Tran Song, Changhoon Lee:
Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets. Symmetry 10(8): 353 (2018) - [j67]Seonghyeon Gong, Jaeik Cho, Changhoon Lee:
A Reliability Comparison Method for OSINT Validity Analysis. IEEE Trans. Ind. Informatics 14(12): 5428-5435 (2018) - 2017
- [j66]Shehzad Ashraf Chaudhry, Aiiad Albeshri, Naixue Xiong, Changhoon Lee, Taeshik Shon:
A privacy preserving authentication scheme for roaming in ubiquitous networks. Clust. Comput. 20(2): 1223-1236 (2017) - [j62]Feng Jiang, Jie Ren, Changhoon Lee, Wuzhen Shi, Shaohui Liu, Debin Zhao:
Spatial and temporal pyramid-based real-time gesture recognition. J. Real Time Image Process. 13(3): 599-611 (2017) - [j61]Yang Yu, Ziyan Jia, Weige Tao, Bo Xue, Changhoon Lee:
An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things. Wirel. Pers. Commun. 93(2): 571-587 (2017) - [j60]Dat Phuc Tran Song, Neal Naixue Xiong, Changhoon Lee:
Cryptanalysis of the XO-64 Suitable for Wireless Systems. Wirel. Pers. Commun. 93(2): 589-600 (2017) - 2016
- [j55]Changhoon Lee, Geyong Min, Weifeng Chen:
Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation. Multim. Tools Appl. 75(9): 4845-4849 (2016) - [j53]Zhijun Fang, Fengchang Fei, Yuming Fang, Changhoon Lee, Naixue Xiong, Lei Shu, Sheng Chen:
Abnormal event detection in crowded scenes based on deep learning. Multim. Tools Appl. 75(22): 14617-14639 (2016) - [j52]Aamir Shahzad, Malrey Lee, Changhoon Lee, Naixue Xiong, Suntae Kim, Young Keun Lee, Kangmin Kim, Seon-Mi Woo, Gisung Jeong:
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system. Multim. Tools Appl. 75(22): 14641-14668 (2016) - [j51]Aamir Shahzad, René Landry, Malrey Lee, Naixue Xiong, Jongho Lee, Changhoon Lee:
A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols. Sensors 16(6): 821 (2016) - [j50]Changhoon Lee, Kyusuk Han, Juan Li:
Editorial: A special section on "Emerging Platform Technologies". J. Supercomput. 72(1): 1-4 (2016) - [j49]Hyunhee Park, Changhoon Lee, Yang Sun Lee, Eui-Jik Kim:
Performance analysis for contention adaptation of M2M devices with directional antennas. J. Supercomput. 72(9): 3387-3408 (2016) - [j48]Dat Phuc Tran Song, Changhoon Lee:
Security analysis of SDDO-based block cipher for wireless sensor network. J. Supercomput. 72(9): 3619-3628 (2016) - 2015
- [j46]Dat Phuc Tran Song, Changhoon Lee:
Related-Key Differential Attacks on COSB-128. Int. J. Distributed Sens. Networks 11: 617972:1-617972:8 (2015) - [j45]Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee, Kyungho Lee:
Methodology and implementation for tracking the file sharers using BitTorrent. Multim. Tools Appl. 74(1): 271-286 (2015) - [j44]Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. Peer-to-Peer Netw. Appl. 8(4): 716-732 (2015) - [c27]Changhoon Lee, Chang Dong Yoo:
Segment-wise online learning based on greedy algorithm for real-time multi-target tracking. ICIP 2015: 872-876 - [c26]HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong:
New Efficient Padding Methods Secure Against Padding Oracle Attacks. ICISC 2015: 329-342 - 2014
- [j43]Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong:
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing. Int. J. Distributed Sens. Networks 10 (2014) - [j42]Qun Jin, Sethuraman Panchanathan, Changhoon Lee:
Special section on human-centric computing. Inf. Sci. 257: 229-230 (2014) - [j40]Kyung-Soo Lim, Changhoon Lee, Jong Hyuk Park, Sangjin Lee:
Test-driven forensic analysis of satellite automotive navigation systems. J. Intell. Manuf. 25(2): 329-338 (2014) - [j39]Sanghyun Seo, Changhoon Lee, Xilin Chen:
Special issue on convergence of real-time 3D imaging and optical communications. J. Real Time Image Process. 9(3): 519-521 (2014) - [j38]Changhoon Lee, J. Wenny Rahayu, Uyen Trang Nguyen:
Knowledge management technologies for semantic multimedia services. Multim. Tools Appl. 71(1): 195-198 (2014) - [j37]Changhoon Lee, Xiaohong Jiang, Christian Becker, Laurence T. Yang:
Editorial: special issue on "Recent advanced in ubiquitous infrastructure technology". Telecommun. Syst. 55(1): 1-3 (2014) - [j36]Mingbiao Li, Naixue Xiong, Bo Yang, Zhonghua Li, Jong Hyuk Park, Changhoon Lee:
Posted price model based on GRS and its optimization for improving grid resource sharing efficiency. Telecommun. Syst. 55(1): 71-79 (2014) - [j34]Hang Tu, Neeraj Kumar, Debiao He, Jongsung Kim, Changhoon Lee:
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. J. Supercomput. 70(1): 224-235 (2014) - [c24]Tae-Ho Kim, Changhoon Lee, Chang Dong Yoo:
Greedy algorithm for real-time multi-object tracking. ICIP 2014: 398-402 - 2013
- [j33]Keun-Gi Lee, Changhoon Lee, Sangjin Lee:
On-site investigation methodology for incident response in Windows environments. Comput. Math. Appl. 65(9): 1413-1420 (2013) - [j32]Kyung-Soo Lim, Changhoon Lee:
A framework for unified digital evidence management in security convergence. Electron. Commer. Res. 13(3): 379-398 (2013) - [j31]Kitae Jeong, Changhoon Lee, Jong Lim:
Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013: 151 (2013) - [j30]Yuseop Lee, Kitae Jeong, Jaechul Sung, Changhoon Lee, Seokhie Hong, Ku-Young Chang:
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j28]Hongju Cheng, Naixue Xiong, Laurence T. Yang, Guolong Chen, Xiaofang Zhuang, Changhoon Lee:
Links organization for channel assignment in multi-radio wireless mesh networks. Multim. Tools Appl. 65(2): 239-258 (2013) - [j27]Chulhong Min, Chanyou Hwang, Taiwoo Park, Yuhwan Kim, Uichin Lee, Inseok Hwang, Chungkuk Yoo, Changhoon Lee, Younghyun Ju, Junehwa Song, Jaeung Lee, Miri Moon, Haechan Lee, Youngki Lee:
ACM HotMobile 2013 demo: bringing in-situ social awareness to mobile systems: everyday interaction monitoring and its applications. ACM SIGMOBILE Mob. Comput. Commun. Rev. 17(3): 9-10 (2013) - [j26]Taek-Young Youn, Eun Sook Kang, Changhoon Lee:
Efficient three-party key exchange protocols with round efficiency. Telecommun. Syst. 52(2): 1367-1376 (2013) - [j25]Jangwoo Park, Dae-Heon Park, Changhoon Lee:
Angle and ranging based localization method for ad hoc network. J. Supercomput. 64(2): 507-521 (2013) - [j24]Jewan Bang, Changhoon Lee, Sangjin Lee, Kyungho Lee:
Damaged backup data recovery method for Windows mobile. J. Supercomput. 66(2): 875-887 (2013) - 2012
- [j23]Lansheng Han, Cai Fu, Deqing Zou, Changhoon Lee, Wenjing Jia:
Task-based behavior detection of illegal codes. Math. Comput. Model. 55(1-2): 80-86 (2012) - [j22]Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee, Sangjin Lee:
On-the-spot digital investigation by means of LDFS: Live Data Forensic System. Math. Comput. Model. 55(1-2): 223-240 (2012) - [j21]Jong Hyuk Park, Oscar C. Au, Mikael Wiberg, Changhoon Lee:
Recent advances and future directions in multimedia and mobile computing. Multim. Tools Appl. 57(2): 237-242 (2012) - [j20]Namheun Son, Keun-Gi Lee, Sangjun Jeon, Sangjin Lee, Changhoon Lee:
The effective method of database server forensics on the enterprise environment. Secur. Commun. Networks 5(10): 1086-1093 (2012) - [j19]Sudip Misra, P. Venkata Krishna, Akhil Bhiwal, Amardeep Singh Chawla, Bernd E. Wolfinger, Changhoon Lee:
A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks. J. Supercomput. 62(1): 4-23 (2012) - [c23]Jinkeon Kang, Kitae Jeong, Sang-Soo Yeo, Changhoon Lee:
Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments. AINA Workshops 2012: 726-731 - [c22]Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee:
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent. ITCS 2012: 187-195 - [c21]Jeehee Lee, Hyunji Chung, Changhoon Lee, Sangjin Lee:
Methodology for Digital Forensic Investigation of iCloud. ITCS 2012: 197-206 - [c20]Jong-Hyun Choi, Keun-Gi Lee, Jungheum Park, Changhoon Lee, Sangjin Lee:
Analysis Framework to Detect Artifacts of Portable Web Browser. ITCS 2012: 207-214 - [c19]Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee:
Improved Differential Fault Analysis on Block Cipher SEED-128. NBiS 2012: 675-680 - [i1]Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong:
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED. IACR Cryptol. ePrint Arch. 2012: 621 (2012) - 2011
- [j18]Changhoon Lee, Jongsung Kim, Jaechul Sung, Yangsun Lee, Chang Hoon Lee:
Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems. Comput. Informatics 30(3): 447-466 (2011) - [j17]Taek-Young Youn, Changhoon Lee, Young-Ho Park:
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes. Comput. Commun. 34(3): 353-357 (2011) - [c18]Namheun Son, Keun-Gi Lee, Sangjun Jeon, Hyunji Chung, Sangjin Lee, Changhoon Lee:
The Method of Database Server Detection and Investigation in the Enterprise Environment. STA 2011: 164-171 - [e2]Changhoon Lee, Jean-Marc Seigneur, James J. Park, Roland R. Wagner:
Secure and Trust Computing, Data Management, and Applications - STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Communications in Computer and Information Science 187, Springer 2011, ISBN 978-3-642-22364-8 [contents] - 2010
- [j16]Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee:
Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2): 326-337 (2010) - [j15]Hamid R. Arabnia, Wai-Chi Fang, Changhoon Lee, Yan Zhang:
Context-Aware Middleware and Intelligent Agents for Smart Environments. IEEE Intell. Syst. 25(2): 10-11 (2010) - [j14]Changhoon Lee, Han-Chieh Chao, Irfan Awan:
Special issue on "Modeling and simulation techniques for future generation communication networks". Simul. Model. Pract. Theory 18(4): 405-406 (2010) - [j13]Jaeik Cho, Changhoon Lee, Sang Hyun Cho, Jung Hwan Song, Jongin Lim, Jongsub Moon:
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data. Simul. Model. Pract. Theory 18(4): 431-435 (2010) - [j12]Changhoon Lee, Sangjin Lee, Jong Hyuk Park, Sajid Hussain, Jung Hwan Song:
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device. Telecommun. Syst. 44(3-4): 267-279 (2010) - [j11]YunSeop Yu, Seong-Ho Choi, Hyung-Kun Park, Changhoon Lee, Young-Sik Jeong, Sang-Hoon Kim:
A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications. J. Supercomput. 54(1): 122-137 (2010) - [j10]Eun-Jun Yoon, Kee-Young Yoo, Sang-Soo Yeo, Changhoon Lee:
Robust Deniable Authentication Protocol. Wirel. Pers. Commun. 55(1): 81-90 (2010) - 2009
- [j8]Kitae Jeong, Changhoon Lee, Jongsung Kim, Seokhie Hong:
Security analysis of the SCO-family using key schedules. Inf. Sci. 179(24): 4232-4242 (2009) - [j7]Changhoon Lee, Jongsung Kim, Seokhie Hong, Yangsun Lee:
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments. J. Univers. Comput. Sci. 15(5): 1007-1022 (2009) - [c16]Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang:
Update on SEED: SEED-192/256. ISA 2009: 1-10 - [e1]Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-Hoon Kim, Sang-Soo Yeo:
Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings. Lecture Notes in Computer Science 5576, Springer 2009, ISBN 978-3-642-02616-4 [contents] - 2008
- [j6]Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(2): 642-649 (2008) - [j5]Jongsung Kim, Changhoon Lee, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jongin Lim:
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3047-3058 (2008) - [j3]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Security analysis of the full-round DDO-64 block cipher. J. Syst. Softw. 81(12): 2328-2335 (2008) - 2007
- [c15]Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157 - 2006
- [c14]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ACISP 2006: 421-431 - [c13]Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 - [c12]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ICCSA (3) 2006: 446-455 - [c10]Jiqiang Lu, Changhoon Lee, Jongsung Kim:
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. SCN 2006: 95-110 - 2005
- [c9]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon:
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. IMACC 2005: 201-219 - [c8]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Mycrypt 2005: 244-262 - [c7]Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong:
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. WEWoRC 2005: 64-75 - 2004
- [c6]Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee:
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. ACISP 2004: 137-148 - [c5]Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong:
Padding Oracle Attacks on Multiple Modes of Operation. ICISC 2004: 343-351 - [c4]Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. INDOCRYPT 2004: 191-205 - 2003
- [c3]Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures. INDOCRYPT 2003: 82-96 - [c2]Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2. INDOCRYPT 2003: 97-106 - 2002
- [c1]Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim:
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002: 456-468
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint