default search action
Mohammad Hossein Manshaei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Mina Kimiaei, Hossein Saidi, Mohammad Hossein Manshaei:
An Adaptive and Hierarchical Approach to Configure Sharding Committees in Blockchains. IEEE Access 12: 148961-148978 (2024) - [c42]Sopan Sarkar, Mohammad Hossein Manshaei, Marwan Krunz, Hamid Ravaee:
RecuGAN: A Novel Generative AI Approach for Synthesizing RF Coverage Maps. ICCCN 2024: 1-9 - [c41]Zhiwu Guo, Wenhan Zhang, Ming Li, Marwan Krunz, Mohammad Hossein Manshaei:
DL-SIC: Deep Learning Aided Successive Interference Cancellation in Shared Spectrum. ICNC 2024: 754-760 - [c40]Mohammad Hossein Manshaei, Marwan Krunz, Amal Yousseef:
Performance Evaluation of DSRC and C-V2X Coexistence in the 5.895-5.925 GHz Spectrum. ICNC 2024: 862-867 - 2023
- [j30]Monireh Mohebbi Moghaddam, Bahar Boroomand, Mohammad Jalali, Arman Zareian, Alireza Daeijavad, Mohammad Hossein Manshaei, Marwan Krunz:
Games of GANs: game-theoretical models for generative adversarial networks. Artif. Intell. Rev. 56(9): 9771-9807 (2023) - [j29]Tayebeh Rajab, Alvi Ataur Khalil, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Mohammad Dakhilalian, Maurice Ngouen, Murtuza Jadliwala, A. Selcuk Uluagac:
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains. Distributed Ledger Technol. Res. Pract. 2(4): 1-21 (2023) - [j28]Oscar G. Bautista, Mohammad Hossein Manshaei, Richard Hernandez, Kemal Akkaya, Soamar Homsi, Arif Selcuk Uluagac:
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation. J. Netw. Syst. Manag. 31(4): 68 (2023) - [j27]Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Masoud Ardakani:
Optimal Association Strategy of Multi-Gateway Wireless Sensor Networks Against Smart Jammers. IEEE Wirel. Commun. Lett. 12(2): 317-321 (2023) - [c39]Sopan Sarkar, Mohammad Hossein Manshaei, Marwan Krunz:
RADIANCE: Radio-Frequency Adversarial Deep-learning Inference for Automated Network Coverage Estimation. GLOBECOM 2023: 832-837 - [c38]Richard Hernandez, Oscar G. Bautista, Mohammad Hossein Manshaei, Abdulhadi Sahin, Kemal Akkaya:
Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC. LCN 2023: 1-4 - [c37]Maryam Abbasihafshejani, Mohammad Hossein Manshaei, Murtuza Jadliwala:
Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain. VCC 2023: 49-55 - [i19]Sopan Sarkar, Mohammad Hossein Manshaei, Marwan Krunz:
RADIANCE: Radio-Frequency Adversarial Deep-learning Inference for Automated Network Coverage Estimation. CoRR abs/2308.10584 (2023) - 2022
- [j26]Seyede Fatemeh Noorani, Mohammad Hossein Manshaei, Mohammad Ali Montazeri, Behnaz Omoomi:
Fostering Peer Learning With a Game-Theoretical Approach in a Blended Learning Environment. IEEE Trans. Comput. Soc. Syst. 9(2): 571-580 (2022) - [j25]Bin Xiao, Fan Wu, Francesco Chiti, Mohammad Hossein Manshaei, Giuseppe Ateniese:
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications. IEEE Trans. Netw. Sci. Eng. 9(1): 171-172 (2022) - [c36]Maryam Abbasi, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya, Murtuza Jadliwala:
On Algorand Transaction Fees: Challenges and Mechanism Design. ICC 2022: 5403-5408 - 2021
- [j24]Bahareh Farahbakhsh, Ali Fanian, Mohammad Hossein Manshaei:
TGSM: Towards trustworthy group-based service management for social IoT. Internet Things 13: 100312 (2021) - [j23]Fatemeh Tavakoli, Javad Salimi Sartakhti, Mohammad Hossein Manshaei, David Basanta:
Cancer immunoediting: A game theoretical approach. Silico Biol. 14(1-2): 1-12 (2021) - [j22]Monireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Mehdi Naderi Soorki, Walid Saad, Maziar Goudarzi, Dusit Niyato:
On Coordination of Smart Grid and Cooperative Cloud Providers. IEEE Syst. J. 15(1): 672-683 (2021) - [j21]Abdullah Aydeger, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya:
Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach. IEEE Trans. Netw. Sci. Eng. 8(1): 751-764 (2021) - [c35]Md Hasan Shahriar, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Dong Chen:
iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems. CNS 2021: 200-208 - [c34]Alvi Ataur Khalil, Alexander J. Byrne, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei:
REPlanner: Efficient UAV Trajectory-Planning using Economic Reinforcement Learning. SMARTCOMP 2021: 153-160 - [c33]Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kavé Salamatian, Masoud Nejad Sattary:
Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph. WebSci 2021: 253-261 - [i18]Masoumeh Zareh, Mohammad Hossein Manshaei, Sayed Jalal Zahabi:
Modeling the Hallucinating Brain: A Generative Adversarial Framework. CoRR abs/2102.08209 (2021) - [i17]Alvi Ataur Khalil, Alexander J. Byrne, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei:
Efficient UAV Trajectory-Planning using Economic Reinforcement Learning. CoRR abs/2103.02676 (2021) - [i16]Monireh Mohebbi Moghadam, Bahar Boroumand, Mohammad Jalali, Arman Zareian, Alireza Daei Javad, Mohammad Hossein Manshaei:
Game of GANs: Game Theoretical Models for Generative Adversarial Networks. CoRR abs/2106.06976 (2021) - [i15]Mohammad Reza Heidarpour, Mohammad Hossein Manshaei:
Optimal Association Strategy of Multi-gateway Wireless Sensor Networks Against Smart Jammers. CoRR abs/2111.10261 (2021) - 2020
- [j20]Mohammad Ashiqur Rahman, Md. Golam Moula Mehedi Hasan, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic analysis to defend against remote operating system fingerprinting. J. Inf. Secur. Appl. 52: 102456 (2020) - [j19]Mohammad Reza Heidarpour, Mohammad Hossein Manshaei:
Resource allocation in future HetRAT networks: a general framework. Wirel. Networks 26(4): 2695-2706 (2020) - [c32]Mehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On Incentive Compatible Role-Based Reward Distribution in Algorand. DSN 2020: 452-463 - [i14]Tayebeh Rajab, Mohammad Hossein Manshaei, Mohammad Dakhilalian, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains. CoRR abs/2002.06531 (2020) - [i13]Monireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Mehdi Naderi Soorki, Walid Saad, Maziar Goudarzi, Dusit Niyato:
On Coordination of Smart Grid and Cooperative Cloud Providers. CoRR abs/2003.13675 (2020) - [i12]Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kavé Salamatian, Masoud Nejad Sattary:
On Detecting Hidden Third-Party Web Trackers with a Wide Dependency Chain Graph: A Representation Learning Approach. CoRR abs/2004.14826 (2020) - [i11]Mohammad Amin Samadi, Mohammad Sadegh Akhondzadeh, Sayed Jalal Zahabi, Mohammad Hossein Manshaei, Zeinab Maleki, Payman Adibi:
Evaluating Sparse Interpretable Word Embeddings for Biomedical Domain. CoRR abs/2005.05114 (2020)
2010 – 2019
- 2019
- [j18]Monireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Walid Saad, Maziar Goudarzi:
On Data Center Demand Response: A Cloud Federation Approach. IEEE Access 7: 101829-101843 (2019) - [j17]Rasool Esmaeilyfard, Faramarz Hendessi, Mohammad Hossein Manshaei, Jens Grossklags:
A game-theoretic model for users' participation in ephemeral social vehicular networks. Int. J. Commun. Syst. 32(12) (2019) - [j16]Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi:
Social Community-Aware Content Placement in Wireless Device-to-Device Communication Networks. IEEE Trans. Mob. Comput. 18(8): 1938-1950 (2019) - [c31]Brian K. Ledbetter, Samuel Wehunt, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei:
LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons. COMPSAC (1) 2019: 535-544 - [c30]Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Walid Saad:
A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G Systems. COMPSAC (1) 2019: 549-558 - [c29]Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei:
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach. GameSec 2019: 276-296 - [c28]Sara Ranjbaran, Mohammad Hossein Manshaei, Michele Nitti:
A Social-Aware Approach for Federated IoT-Mobile Cloud using Matching Theory. WF-IoT 2019: 554-559 - [i10]Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei:
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach. CoRR abs/1904.13352 (2019) - [i9]Seyede Fatemeh Noorani, Mohammad Hossein Manshaei, Mohammad Ali Montazeri, Behnaz Omoomi:
Fostering Peer Learning through a New Game-Theoretical Approach in a Blended Learning Environment. CoRR abs/1910.12235 (2019) - [i8]Mehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On Incentive Compatible Role-based Reward Distribution in Algorand. CoRR abs/1911.03356 (2019) - [i7]Abdullah Aydeger, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya:
Strategic Defense against Stealthy Link Flooding Attacks: A Signaling Game Approach. CoRR abs/1912.10073 (2019) - 2018
- [j15]Seyede Fatemeh Noorani, Mohammad Hossein Manshaei, Mohammad Ali Montazeri, Quanyan Zhu:
Game-Theoretic Approach to Group Learning Enhancement Through Peer-to-Peer Explanation and Competition. IEEE Access 6: 53684-53697 (2018) - [j14]Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar:
A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains. IEEE Access 6: 78100-78112 (2018) - [j13]Javad Salimi Sartakhti, Mohammad Hossein Manshaei, Marco Archetti:
Game Theory of Tumor-Stroma Interactions in Multiple Myeloma: Effect of Nonlinear Benefits. Games 9(2): 32 (2018) - [j12]Mehdi Naderi Soorki, Mohammad Hossein Manshaei, Behrouz Maham, Hossein Saidi:
On Uplink Virtual MIMO with Device Relaying Cooperation Enforcement in 5G Networks. IEEE Trans. Mob. Comput. 17(1): 155-168 (2018) - [i6]Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi:
Social Community-Aware Content Placement in Wireless Device-to-Device Communication Networks. CoRR abs/1808.02637 (2018) - [i5]Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar:
A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains. CoRR abs/1809.07307 (2018) - 2017
- [j11]Zeinab Zali, Ehsan Aslanian, Mohammad Hossein Manshaei, Massoud Reza Hashemi, Thierry Turletti:
Peer-Assisted Information-Centric Network (PICN): A Backward Compatible Solution. IEEE Access 5: 25005-25020 (2017) - [j10]Bahareh Khazaei, Javad Salimi Sartakhti, Mohammad Hossein Manshaei, Quanyan Zhu, Mehdi Sadeghi, Seyed Rasoul Mousavi:
HIV-1-infected T-cells dynamics and prognosis: An evolutionary game model. Comput. Methods Programs Biomed. 152: 1-14 (2017) - [j9]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab:
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids. IEEE Trans. Dependable Secur. Comput. 14(2): 221-234 (2017) - [j8]Meysam Ghaffari, Nasser Ghadiri, Mohammad Hossein Manshaei, Mehran Sadeghi Lahijani:
P4QS: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications. IEEE Trans. Veh. Technol. 66(10): 9458-9469 (2017) - [j7]Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi:
Stochastic Coalitional Games for Cooperative Random Access in M2M Communications. IEEE Trans. Wirel. Commun. 16(9): 6179-6192 (2017) - [c27]Mehdi Naderi Soorki, Mohammad Hossein Manshaei, Walid Saad, Hossein Saidi, Ramin Hasibi, Amirhosein Shafieyoun, Amirreza Hajrasouliha:
Collaborative Real-Time Content Download Application for Wireless Device-to-Device Communications. GLOBECOM 2017: 1-6 - [c26]Mohammad Taghi Adili, Amin Mohammadi, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman:
A cost-effective security management for clouds: A game-theoretic deception mechanism. IM 2017: 98-106 - [i4]Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi:
Stochastic Coalitional Games for Cooperative Random Access in M2M Communications. CoRR abs/1707.07759 (2017) - 2016
- [j6]Seyyed Mohammadreza Azimi, Mohammad Hossein Manshaei, Faramarz Hendessi:
Cooperative primary-secondary dynamic spectrum leasing game via decentralized bargaining. Wirel. Networks 22(3): 755-764 (2016) - [c25]Mehdi Naderi Soorki, Mohammad Yaghini, Mohammad Hossein Manshaei, Walid Saad, Hossein Saidi:
Energy-aware optimization and mechanism design for cellular device-to-device local area networks. CISS 2016: 309-314 - [c24]Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu:
A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars. GameSec 2016: 382-394 - [c23]Mohammad Sadegh Nourbakhsh, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Walid Saad:
Electric vehicle consumption markets: An economic analysis. GlobalSIP 2016: 906-910 - [c22]Sara Ranjbaran, Amin Mohammadi, Mohammad Hossein Manshaei:
On Cooperation Mechanism in Internet of Things with Multiple Sponsors. GLOBECOM Workshops 2016: 1-6 - [c21]Mehdi Naderi Soorki, Mohammad Mozaffari, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi:
Resource Allocation for Machine-to-Machine Communications with Unmanned Aerial Vehicles. GLOBECOM Workshops 2016: 1-6 - [i3]Mehdi Naderi Soorki, Mohammad Yaghini, Mohammad Hossein Manshaei, Walid Saad, Hossein Saidi:
Energy-Aware Optimization and Mechanism Design for Cellular Device-to-Device Local Area Networks. CoRR abs/1601.06762 (2016) - [i2]Meysam Ghaffari, Nasser Ghadiri, Mohammad Hossein Manshaei, Mehran Sadeghi Lahijani:
P4QS: A Peer to Peer Privacy Preserving Query Service for Location-Based Mobile Applications. CoRR abs/1606.02373 (2016) - [i1]Mehdi Naderi Soorki, Mohammad Mozaffari, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi:
Resource Allocation for Machine-to-Machine Communications with Unmanned Aerial Vehicles. CoRR abs/1608.07632 (2016) - 2015
- [c20]Monireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Quanyan Zhu:
To Trust or Not: A Security Signaling Game Between Service Provider and Client. GameSec 2015: 322-333 - 2014
- [c19]Sadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani, Quanyan Zhu:
A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design. GameSec 2014: 319-328 - [c18]Fateme Hajikarami, Mehdi Berenjkoub, Mohammad Hossein Manshaei:
A modular two-layer system for accurate and fast traffic classification. ISCISC 2014: 149-154 - 2013
- [j5]Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Basar, Jean-Pierre Hubaux:
Game theory meets network security and privacy. ACM Comput. Surv. 45(3): 25:1-25:39 (2013) - [j4]Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes:
Non-Cooperative Location Privacy. IEEE Trans. Dependable Secur. Comput. 10(2): 84-98 (2013) - [c17]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic approach for deceiving Remote Operating System Fingerprinting. CNS 2013: 73-81 - [p1]Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux:
Ad-Blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance. The Economics of Information Security and Privacy 2013: 49-73 - 2012
- [c16]Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux:
Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance. WEIS 2012 - 2011
- [j3]Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux:
OREN: Optimal revocations in ephemeral networks. Comput. Networks 55(5): 1168-1180 (2011) - [c15]Mathias Humbert, Mohammad Hossein Manshaei, Jean-Pierre Hubaux:
One-to-n scrip systems for cooperative privacy-enhancing technologies. Allerton 2011: 682-692 - 2010
- [c14]Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger, Jean-Pierre Hubaux:
Tracking Games in Mobile Networks. GameSec 2010: 38-57 - [c13]Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux:
ISPs and Ad Networks Against Botnet Ad Fraud. GameSec 2010: 149-167 - [c12]Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec, Jean-Pierre Hubaux:
On the Age of Pseudonyms in Mobile Ad Hoc Networks. INFOCOM 2010: 1577-1585 - [c11]Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux:
Optimal revocations in ephemeral networks: A game-theoretic framework. WiOpt 2010: 21-30
2000 – 2009
- 2009
- [j2]Mohammad Hossein Manshaei, Mathieu Lacage, Ceilidh Hoffmann, Thierry Turletti:
On selecting the best transmission mode for WiFi devices. Wirel. Commun. Mob. Comput. 9(7): 959-975 (2009) - [c10]Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes:
On non-cooperative location privacy: a game-theoretic analysis. CCS 2009: 324-337 - [c9]Mohammad Hossein Manshaei, Peter Marbach, Jean-Pierre Hubaux:
Evolution and market share of wireless community networks. GAMENETS 2009: 508-514 - [c8]Florent Garcin, Mohammad Hossein Manshaei, Jean-Pierre Hubaux:
Cooperation in underwater sensor networks. GAMENETS 2009: 540-548 - 2008
- [c7]Maxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux:
Revocation games in ephemeral networks. CCS 2008: 199-210 - [c6]Mohammad Hossein Manshaei, Julien Freudiger, Márk Félegyházi, Peter Marbach, Jean-Pierre Hubaux:
On Wireless Social Community Networks. INFOCOM 2008: 1552-1560 - [c5]Amin Mazloumian, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux:
Optimal pricing strategy for wireless social community networks. NetEcon 2008: 103-108 - 2006
- [c4]Hitoshi Asaeda, Musfiq Rahman, Mohammad Hossein Manshaei, Yasuko Fukuzawa:
Implementation of group member authentication protocol in mobile ad-hoc networks. WCNC 2006: 2205-2210 - 2005
- [b1]Mohammad Hossein Manshaei:
Cross layer interactions for adaptive communications in IEEE 802.11 wireless LANs. (Mécanismes d'interactions intercouches pour améliorer la performance des réseaux locaux sans fil IEE 802.11). University of Nice Sophia Antipolis, France, 2005 - [j1]Mohammad Hossein Manshaei, Thierry Turletti, Thomas Guionnet:
An Evaluation of Media-Oriented Rate Selection Algorithm for Multimedia Transmission in MANETs. EURASIP J. Wirel. Commun. Netw. 2005(5): 757-773 (2005) - [c3]Mohammad Hossein Manshaei, Gion Reto Cantieni, Chadi Barakat, Thierry Turletti:
Performance Analysis of the IEEE 802.11 MAC and Physical Layer Protocol. WOWMOM 2005: 88-97 - 2004
- [c2]Mathieu Lacage, Mohammad Hossein Manshaei, Thierry Turletti:
IEEE 802.11 rate adaptation: a practical approach. MSWiM 2004: 126-134 - [c1]Mohammad Hossein Manshaei, Thierry Turletti, Marwan Krunz:
A media-oriented transmission mode selection in 802.11 wireless LANs. WCNC 2004: 1228-1233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint