


Остановите войну!
for scientists:


default search action
Ruoxi Jia
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Mengmeng Wu, Ruoxi Jia, Changle Lin, Wei Huang, Xiangyu Chang:
Variance reduced Shapley value estimation for trustworthy data valuation. Comput. Oper. Res. 159: 106305 (2023) - [j8]Runing Yang, Ruoxi Jia, Xiangyu Zhang
, Ming Jin
:
Certifiably Robust Neural ODE With Learning-Based Barrier Function. IEEE Control. Syst. Lett. 7: 1634-1639 (2023) - [c37]Ming Jin, Vanshaj Khattar, Harshal Kaushik, Bilgehan Sel, Ruoxi Jia:
On Solution Functions of Optimization: Universal Approximation and Covering Number Bounds. AAAI 2023: 8123-8131 - [c36]Jiachen T. Wang, Ruoxi Jia:
Data Banzhaf: A Robust Data Valuation Framework for Machine Learning. AISTATS 2023: 6388-6421 - [c35]Hoang Anh Just, Feiyang Kang, Tianhao Wang, Yi Zeng, Myeongseob Ko, Ming Jin, Ruoxi Jia:
LAVA: Data Valuation without Pre-Specified Learning Algorithms. ICLR 2023 - [c34]Yi Zeng, Zhouxing Shi, Ming Jin, Feiyang Kang, Lingjuan Lyu, Cho-Jui Hsieh, Ruoxi Jia:
Towards Robustness Certification Against Universal Perturbations. ICLR 2023 - [c33]Junyuan Hong, Yi Zeng, Shuyang Yu, Lingjuan Lyu, Ruoxi Jia, Jiayu Zhou:
Revisiting Data-Free Knowledge Distillation with Poisoned Teachers. ICML 2023: 13199-13212 - [c32]Zhihong Liu, Hoang Anh Just, Xiangyu Chang, Xi Chen, Ruoxi Jia:
2D-Shapley: A Framework for Fragmented Data Valuation. ICML 2023: 21730-21755 - [c31]Bilgehan Sel, Ahmad Al-Tawaha, Yuhao Ding, Ruoxi Jia, Bo Ji, Javad Lavaei, Ming Jin:
Learning-to-Learn to Guide Random Search: Derivative-Free Meta Blackbox Optimization on Manifold. L4DC 2023: 38-50 - [c30]Minzhou Pan, Yi Zeng, Lingjuan Lyu, Xue Lin, Ruoxi Jia:
ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms. USENIX Security Symposium 2023 - [c29]Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia:
Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? USENIX Security Symposium 2023 - [i47]Minzhou Pan, Yi Zeng, Lingjuan Lyu, Xue Lin, Ruoxi Jia:
ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms. CoRR abs/2302.11408 (2023) - [i46]Jiachen T. Wang, Ruoxi Jia:
A Note on "Towards Efficient Data Valuation Based on the Shapley Value". CoRR abs/2302.11431 (2023) - [i45]Jiachen T. Wang, Ruoxi Jia:
A Note on "Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms". CoRR abs/2304.04258 (2023) - [i44]Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal:
A Randomized Approach for Tight Privacy Accounting. CoRR abs/2304.07927 (2023) - [i43]Hoang Anh Just, Feiyang Kang, Jiachen T. Wang, Yi Zeng, Myeongseob Ko, Ming Jin, Ruoxi Jia:
LAVA: Data Valuation without Pre-Specified Learning Algorithms. CoRR abs/2305.00054 (2023) - [i42]Junyuan Hong, Yi Zeng, Shuyang Yu, Lingjuan Lyu, Ruoxi Jia, Jiayu Zhou:
Revisiting Data-Free Knowledge Distillation with Poisoned Teachers. CoRR abs/2306.02368 (2023) - [i41]Zhihong Liu, Hoang Anh Just, Xiangyu Chang, Xi Chen, Ruoxi Jia:
2D-Shapley: A Framework for Fragmented Data Valuation. CoRR abs/2306.10473 (2023) - [i40]Feiyang Kang, Hoang Anh Just, Anit Kumar Sahu, Ruoxi Jia:
Performance Scaling via Optimal Transport: Enabling Data Selection from Partially Revealed Sources. CoRR abs/2307.02460 (2023) - [i39]Bilgehan Sel, Ahmad Al-Tawaha, Vanshaj Khattar, Lu Wang, Ruoxi Jia, Ming Jin:
Algorithm of Thoughts: Enhancing Exploration of Ideas in Large Language Models. CoRR abs/2308.10379 (2023) - [i38]Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal:
Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation. CoRR abs/2308.15709 (2023) - 2022
- [c28]Mostafa Kahla, Si Chen, Hoang Anh Just, Ruoxi Jia:
Label-Only Model Inversion Attacks via Boundary Repulsion. CVPR 2022: 15025-15033 - [c27]Weiyan Shi, Ryan Shea, Si Chen, Chiyuan Zhang, Ruoxi Jia, Zhou Yu:
Just Fine-tune Twice: Selective Differential Privacy for Large Language Models. EMNLP 2022: 6327-6340 - [c26]Yi Zeng, Si Chen, Won Park, Zhuoqing Mao, Ming Jin, Ruoxi Jia:
Adversarial Unlearning of Backdoors via Implicit Hypergradient. ICLR 2022 - [c25]Weiyan Shi, Aiqi Cui, Evan Li, Ruoxi Jia, Zhou Yu:
Selective Differential Privacy for Language Modeling. NAACL-HLT 2022: 2848-2859 - [c24]Xuanli He, Qiongkai Xu, Yi Zeng, Lingjuan Lyu, Fangzhao Wu, Jiwei Li, Ruoxi Jia:
CATER: Intellectual Property Protection on Text Generation APIs via Conditional Watermarks. NeurIPS 2022 - [c23]Jiachen T. Wang, Saeed Mahloujifar, Shouda Wang, Ruoxi Jia, Prateek Mittal:
Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning. NeurIPS 2022 - [i37]Mostafa Kahla, Si Chen, Hoang Anh Just, Ruoxi Jia:
Label-Only Model Inversion Attacks via Boundary Repulsion. CoRR abs/2203.01925 (2022) - [i36]Yi Zeng, Minzhou Pan, Hoang Anh Just, Lingjuan Lyu, Meikang Qiu, Ruoxi Jia:
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information. CoRR abs/2204.05255 (2022) - [i35]Weiyan Shi, Si Chen, Chiyuan Zhang, Ruoxi Jia, Zhou Yu:
Just Fine-tune Twice: Selective Differential Privacy for Large Language Models. CoRR abs/2204.07667 (2022) - [i34]Jie Zhang, Chen Chen, Jiahua Dong, Ruoxi Jia, Lingjuan Lyu:
QEKD: Query-Efficient and Data-Free Knowledge Distillation from Black-box Models. CoRR abs/2205.11158 (2022) - [i33]Tianhao Wang, Ruoxi Jia:
Data Banzhaf: A Data Valuation Framework with Maximal Robustness to Learning Stochasticity. CoRR abs/2205.15466 (2022) - [i32]Jiachen T. Wang, Saeed Mahloujifar, Shouda Wang, Ruoxi Jia, Prateek Mittal:
Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning. CoRR abs/2209.07716 (2022) - [i31]Xuanli He, Qiongkai Xu, Yi Zeng, Lingjuan Lyu, Fangzhao Wu, Jiwei Li, Ruoxi Jia:
CATER: Intellectual Property Protection on Text Generation APIs via Conditional Watermarks. CoRR abs/2209.08773 (2022) - [i30]Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia:
How to Sift Out a Clean Data Subset in the Presence of Data Poisoning? CoRR abs/2210.06516 (2022) - [i29]Zhihua Tian, Jian Liu, Jingyu Li, Xinle Cao, Ruoxi Jia, Kui Ren:
Private Data Valuation and Fair Payment in Data Marketplaces. CoRR abs/2210.08723 (2022) - [i28]Mengmeng Wu, Ruoxi Jia, Changle Lin, Wei Huang, Xiangyu Chang:
Robust Data Valuation via Variance Reduced Data Shapley. CoRR abs/2210.16835 (2022) - [i27]Ming Jin, Vanshaj Khattar, Harshal Kaushik, Bilgehan Sel, Ruoxi Jia:
On Solution Functions of Optimization: Universal Approximation and Covering Number Bounds. CoRR abs/2212.01314 (2022) - 2021
- [j7]Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Ruoxi Jia:
Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services. IEEE Netw. 35(1): 163-169 (2021) - [j6]Wenxiao Wang, Tianhao Wang, Lun Wang, Nanqing Luo, Pan Zhou, Dawn Song, Ruoxi Jia:
DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing. Proc. Priv. Enhancing Technol. 2021(4): 163-183 (2021) - [c22]Tianhao Wang, Yuheng Zhang, Ruoxi Jia:
Improving Robustness to Model Inversion Attacks via Mutual Information Regularization. AAAI 2021: 11666-11673 - [c21]Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song:
REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data. AsiaCCS 2021: 321-335 - [c20]Ruoxi Jia, Fan Wu, Xuehui Sun, Jiacen Xu, David Dao, Bhavya Kailkhura, Ce Zhang, Bo Li, Dawn Song:
Scalability vs. Utility: Do We Have To Sacrifice One for the Other in Data Importance Quantification? CVPR 2021: 8239-8247 - [c19]Si Chen, Mostafa Kahla, Ruoxi Jia, Guo-Jun Qi:
Knowledge-Enriched Distributional Model Inversion Attacks. ICCV 2021: 16158-16167 - [c18]Yi Zeng, Won Park, Z. Morley Mao, Ruoxi Jia:
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective. ICCV 2021: 16453-16461 - [c17]Boxin Wang, Shuohang Wang, Yu Cheng, Zhe Gan, Ruoxi Jia, Bo Li, Jingjing Liu:
InfoBERT: Improving Robustness of Language Models from An Information Theoretic Perspective. ICLR 2021 - [i26]Wenxiao Wang, Tianhao Wang, Lun Wang, Nanqing Luo, Pan Zhou, Dawn Song, Ruoxi Jia:
DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing. CoRR abs/2103.01496 (2021) - [i25]Yi Zeng, Won Park, Z. Morley Mao, Ruoxi Jia:
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective. CoRR abs/2104.03413 (2021) - [i24]Tianhao Wang, Si Chen, Ruoxi Jia:
One-Round Active Learning. CoRR abs/2104.11843 (2021) - [i23]Tianhao Wang, Yi Zeng, Ming Jin, Ruoxi Jia:
A Unified Framework for Task-Driven Data Quality Management. CoRR abs/2106.05484 (2021) - [i22]Tianhao Wang, Yu Yang, Ruoxi Jia:
Learnability of Learning Performance and Its Application to Data Valuation. CoRR abs/2107.06336 (2021) - [i21]Si Chen, Tianhao Wang, Ruoxi Jia:
Zero-Round Active Learning. CoRR abs/2107.06703 (2021) - [i20]Weiyan Shi, Aiqi Cui, Evan Li, Ruoxi Jia, Zhou Yu:
Selective Differential Privacy for Language Modeling. CoRR abs/2108.12944 (2021) - [i19]Yi Zeng, Si Chen, Won Park, Z. Morley Mao, Ming Jin, Ruoxi Jia:
Adversarial Unlearning of Backdoors via Implicit Hypergradient. CoRR abs/2110.03735 (2021) - [i18]Yingyan Zeng, Tianhao Wang, Si Chen, Hoang Anh Just, Ran Jin, Ruoxi Jia:
Learning to Refit for Convex Learning Problems. CoRR abs/2111.12545 (2021) - 2020
- [c16]Yuheng Zhang, Ruoxi Jia, Hengzhi Pei, Wenxiao Wang, Bo Li, Dawn Song:
The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks. CVPR 2020: 250-258 - [c15]Min Du, Ruoxi Jia, Dawn Song:
Robust anomaly detection and backdoor attack detection via differential privacy. ICLR 2020 - [c14]Gerald Friedland, Ruoxi Jia, Jingkang Wang, Bo Li, T. Nathan Mundhenk:
On the Impact of Perceptual Compression on Deep Learning. MIPR 2020: 219-224 - [c13]Powen Yao, Vangelis Lympouridis, Tian Zhu, Michael Zyda, Ruoxi Jia:
Punch Typing: Alternative Method for Text Entry in Virtual Reality. SUI 2020: 28:1-28:2 - [p1]Tianhao Wang, Johannes Rausch, Ce Zhang, Ruoxi Jia, Dawn Song:
A Principled Approach to Data Valuation for Federated Learning. Federated Learning 2020: 153-167 - [i17]Lun Wang, Ruoxi Jia:
Private Distributed Mean Estimation. CoRR abs/2006.13039 (2020) - [i16]Tianhao Wang, Yuheng Zhang, Ruoxi Jia:
Improving Robustness to Model Inversion Attacks via Mutual Information Regularization. CoRR abs/2009.05241 (2020) - [i15]Tianhao Wang, Johannes Rausch, Ce Zhang, Ruoxi Jia, Dawn Song:
A Principled Approach to Data Valuation for Federated Learning. CoRR abs/2009.06192 (2020) - [i14]Boxin Wang, Shuohang Wang, Yu Cheng, Zhe Gan, Ruoxi Jia, Bo Li, Jingjing Liu:
InfoBERT: Improving Robustness of Language Models from An Information Theoretic Perspective. CoRR abs/2010.02329 (2020) - [i13]Si Chen, Ruoxi Jia, Guo-Jun Qi:
Improved Techniques for Model Inversion Attacks. CoRR abs/2010.04092 (2020)
2010 – 2019
- 2019
- [j5]Ruoxi Jia, David Dao, Boxin Wang, Frances Ann Hubis, Nezihe Merve Gürel, Bo Li, Ce Zhang, Costas J. Spanos, Dawn Song:
Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms. Proc. VLDB Endow. 12(11): 1610-1623 (2019) - [c12]Ruoxi Jia, David Dao, Boxin Wang, Frances Ann Hubis, Nick Hynes, Nezihe Merve Gürel, Bo Li, Ce Zhang, Dawn Song, Costas J. Spanos:
Towards Efficient Data Valuation Based on the Shapley Value. AISTATS 2019: 1167-1176 - [i12]Ruoxi Jia, David Dao, Boxin Wang, Frances Ann Hubis, Nick Hynes, Nezihe Merve Gürel, Bo Li, Ce Zhang, Dawn Song, Costas J. Spanos:
Towards Efficient Data Valuation Based on the Shapley Value. CoRR abs/1902.10275 (2019) - [i11]Ruoxi Jia, David Dao, Boxin Wang, Frances Ann Hubis, Nezihe Merve Gürel, Bo Li, Ce Zhang, Costas J. Spanos, Dawn Song:
Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms. CoRR abs/1908.08619 (2019) - [i10]Min Du, Ruoxi Jia, Dawn Song:
Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy. CoRR abs/1911.07116 (2019) - [i9]Ruoxi Jia, Xuehui Sun, Jiacen Xu, Ce Zhang, Bo Li, Dawn Song:
An Empirical and Comparative Analysis of Data Valuation with Scalable Algorithms. CoRR abs/1911.07128 (2019) - [i8]Yuheng Zhang, Ruoxi Jia, Hengzhi Pei, Wenxiao Wang, Bo Li, Dawn Song:
The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks. CoRR abs/1911.07135 (2019) - [i7]Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song:
REFIT: a Unified Watermark Removal Framework for Deep Learning Systems with Limited Data. CoRR abs/1911.07205 (2019) - 2018
- [b1]Ruoxi Jia:
Accountable Data Fusion and Privacy Preservation Techniques in Cyber-Physical Systems. University of California, Berkeley, USA, 2018 - [j4]Ruoxi Jia
, Baihong Jin
, Ming Jin
, Yuxun Zhou
, Ioannis C. Konstantakopoulos
, Han Zou
, Joyce Kim
, Dan Li, Weixi Gu, Reza Arghandeh
, Pierluigi Nuzzo
, Stefano Schiavon
, Alberto L. Sangiovanni-Vincentelli
, Costas J. Spanos:
Design Automation for Smart Building Systems. Proc. IEEE 106(9): 1680-1699 (2018) - [j3]Fisayo Caleb Sangogboye
, Ruoxi Jia, Tianzhen Hong
, Costas J. Spanos, Mikkel Baun Kjærgaard
:
A Framework for Privacy-Preserving Data Publishing with Enhanced Utility for Cyber-Physical Systems. ACM Trans. Sens. Networks 14(3-4): 30:1-30:22 (2018) - [c11]Ruoxi Jia, Ioannis C. Konstantakopoulos, Bo Li, Costas J. Spanos:
Poisoning Attacks on Data-Driven Utility Learning in Games. ACC 2018: 5774-5780 - [i6]Gerald Friedland, Jingkang Wang, Ruoxi Jia, Bo Li:
The Helmholtz Method: Using Perceptual Compression to Reduce Machine Learning Complexity. CoRR abs/1807.10569 (2018) - [i5]Jingkang Wang, Ruoxi Jia, Gerald Friedland, Bo Li, Costas J. Spanos:
One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy. CoRR abs/1810.09650 (2018) - 2017
- [j2]Ming Jin, Ruoxi Jia, Costas J. Spanos:
Virtual Occupancy Sensing: Using Smart Meters to Indicate Your Presence. IEEE Trans. Mob. Comput. 16(11): 3264-3277 (2017) - [c10]Ruoxi Jia, Roy Dong, Prashanth Ganesh, Shankar Sastry, Costas J. Spanos:
Towards a theory of free-lunch privacy in cyber-physical systems. Allerton 2017: 902-910 - [c9]Ruoxi Jia, Roy Dong, Shankar Sastry, Costas J. Spanos:
Optimal sensor-controller codesign for privacy in dynamical systems. CDC 2017: 4004-4011 - [c8]Ruoxi Jia, Roy Dong, S. Shankar Sastry, Costas J. Spanos:
Privacy-enhanced architecture for occupancy-based HVAC Control. ICCPS 2017: 177-186 - [c7]Ruoxi Jia, Fisayo Caleb Sangogboye
, Tianzhen Hong
, Costas J. Spanos, Mikkel Baun Kjærgaard
:
PAD: protecting anonymity in publishing building related datasets. BuildSys@SenSys 2017: 4:1-4:10 - [c6]Ruoxi Jia, Fisayo Caleb Sangogboye
, Tianzhen Hong
, Costas J. Spanos, Mikkel Baun Kjærgaard
:
Privacy-preserving building-related data publication using PAD. BuildSys@SenSys 2017: 32:1-32:2 - 2016
- [j1]Ruoxi Jia, Ming Jin, Han Zou, Yigitcan Yesilata, Lihua Xie, Costas J. Spanos:
MapSentinel: Can the Knowledge of Space Use Improve Indoor Tracking Further? Sensors 16(4): 472 (2016) - [i4]Ruoxi Jia, Roy Dong, S. Shankar Sastry, Costas J. Spanos:
Privacy-Enhanced Architecture for Occupancy-based HVAC Control. CoRR abs/1607.03140 (2016) - 2015
- [c5]Ruoxi Jia, Ming Jin, Zilong Chen, Costas J. Spanos:
SoundLoc: Accurate room-level indoor localization using acoustic signatures. CASE 2015: 186-193 - [c4]Ruoxi Jia, Ming Jin, Han Zou, Yigitcan Yesilata, Lihua Xie, Costas J. Spanos:
Poster Abstract: MapSentinel: Map-Aided Non-intrusive Indoor Tracking in Sensor-Rich Environments. BuildSys@SenSys 2015: 109-110 - [c3]Ruoxi Jia, Yang Gao, Costas J. Spanos:
A fully unsupervised non-intrusive load monitoring framework. SmartGridComm 2015: 872-878 - 2014
- [c2]Ming Jin, Han Zou, Kevin Weekly, Ruoxi Jia, Alexandre M. Bayen, Costas J. Spanos:
Environmental sensing by wearable device for indoor activity and location estimation. IECON 2014: 5369-5375 - [c1]Ming Jin, Ruoxi Jia, Zhaoyi Kang, Ioannis C. Konstantakopoulos, Costas J. Spanos:
PresenceSense: zero-training algorithm for individual presence detection based on power monitoring. BuildSys@SenSys 2014: 1-10 - [i3]Ming Jin, Han Zou, Kevin Weekly, Ruoxi Jia, Alexandre M. Bayen, Costas J. Spanos:
Environmental Sensing by Wearable Device for Indoor Activity and Location Estimation. CoRR abs/1406.5765 (2014) - [i2]Ming Jin, Ruoxi Jia, Zhaoyi Kang, Ioannis C. Konstantakopoulos, Costas J. Spanos:
PresenceSense: Zero-training Algorithm for Individual Presence Detection based on Power Monitoring. CoRR abs/1407.4395 (2014) - [i1]Ruoxi Jia, Ming Jin, Costas J. Spanos:
SoundLoc: Acoustic Method for Indoor Localization without Infrastructure. CoRR abs/1407.4409 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-22 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint