


default search action
Muhammad Asif Habib
Person information
- affiliation: National Textile University, Faisalabad, Pakistan
- affiliation (PhD 2011): Johannes Kepler University, Linz, Austria
- not to be confused with: Muhammad Asif 0002
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j31]Muhammad Kashif Nazir, Cm Nadeem Faisal, Muhammad Asif Habib, Haseeb Ahmad [j31]Muhammad Kashif Nazir, Cm Nadeem Faisal, Muhammad Asif Habib, Haseeb Ahmad : :
 Leveraging Multilingual Transformer for Multiclass Sentiment Analysis in Code-Mixed Data of Low-Resource Languages. IEEE Access 13: 7538-7554 (2025)
 [j30]Arshad Mahmood [j30]Arshad Mahmood , Muhammad Asif Habib , Muhammad Asif Habib , Mudassar Ahmad , Mudassar Ahmad , Sajjad Ahmad Baig , Sajjad Ahmad Baig : :
 Assessing Industry 4.0 Readiness and Adoption Barriers in Textile Sector: Strategic Insights for Sustainable Industrial Transformation. IEEE Access 13: 122698-122725 (2025)
 [j29]Naeem Raza [j29]Naeem Raza , Muhammad Asif Habib , Muhammad Asif Habib , H. M. Sajid Imran , H. M. Sajid Imran , Abdul Qayum , Abdul Qayum , Sajida Perveen , Sajida Perveen , Sohail Jabbar , Sohail Jabbar , Shahzad Sarwar , Shahzad Sarwar , Mudassar Ahmad , Mudassar Ahmad : :
 An Efficient and Cost-Effective Vehicle Detection and Tracking System for Collision Avoidance in Foggy Weather. IEEE Access 13: 126525-126556 (2025)
 [j28]Sohail Jabbar [j28]Sohail Jabbar , Umar Raza , Umar Raza , Muhammad Asif Habib , Muhammad Asif Habib , Muhammad Farhan , Muhammad Farhan , Saqib Saeed , Saqib Saeed : :
 Automated Cardiac Disease Prediction Using Composite GAN and DeepLab Model. IEEE Access 13: 138313-138327 (2025)
 [j27]Arshad Mahmood, Muhammad Asif Habib [j27]Arshad Mahmood, Muhammad Asif Habib , Mudassar Ahmad , Mudassar Ahmad , Sajjad Ahmad Baig , Sajjad Ahmad Baig : :
 Barriers to Adoption Industry 4.0 in Textile Sector: Analyzing Challenges in Transitioning to Smart Manufacturing With ISM and MICMAC. IEEE Access 13: 146722-146744 (2025)
 [j26]Muhammad Asif Habib [j26]Muhammad Asif Habib , Umar Raza , Umar Raza , Sohail Jabbar , Sohail Jabbar , Muhammad Farhan , Muhammad Farhan , Farhan Ullah , Farhan Ullah : :
 ActionSync Video Transformation: Automated Object Removal and Responsive Effects in Motion Videos Using Hybrid CNN and GRU. IEEE Access 13: 149834-149852 (2025)
 [j25]Zupash Awais, Muzammil Hussain, Ayman Elshenawy, Ahmad Arsalan [j25]Zupash Awais, Muzammil Hussain, Ayman Elshenawy, Ahmad Arsalan , Muhammad Anwar, Muhammad Asif Habib , Muhammad Anwar, Muhammad Asif Habib , Sohail Jabbar , Sohail Jabbar , Mudassar Ahmad , Mudassar Ahmad : :
 ISCC: Intelligent Semantic Caching and Control for NDN-Enabled Industrial IoT Networks. IEEE Access 13: 169881-169898 (2025)
 [j24]Rana Hassam Ahmed, Jabeen Sultana, Samraiz Zahid, Muhammad Asif Habib, Abdul Rauf, Majid Hussain: [j24]Rana Hassam Ahmed, Jabeen Sultana, Samraiz Zahid, Muhammad Asif Habib, Abdul Rauf, Majid Hussain:
 Integrating Large Language Models and AI Into Blockchain: A Framework for Intelligent Smart Contracts and Fraud Detection. IEEE Access 13: 181323-181335 (2025)
 [j23]Habib Ur Rahman, Muhammad Asif Habib [j23]Habib Ur Rahman, Muhammad Asif Habib , Shahzad Sarwar, Awais Ahmad , Shahzad Sarwar, Awais Ahmad , Anand Paul, Yazeed Alkhrijah , Anand Paul, Yazeed Alkhrijah , Waeal J. Obidallah , Waeal J. Obidallah : :
 Al-based energy aware parent selection mechanism to enhance security and energy efficiency for smart homes in Internet of Things. Expert Syst. J. Knowl. Eng. 42(2) (2025)
- 2023
 [j22]Salman Raza [j22]Salman Raza , Manzoor Ahmed, Haseeb Ahmad, Muhammad Ayzed Mirza , Manzoor Ahmed, Haseeb Ahmad, Muhammad Ayzed Mirza , Muhammad Asif Habib , Muhammad Asif Habib , Shangguang Wang: , Shangguang Wang:
 Task offloading in mmWave based 5G vehicular cloud computing. J. Ambient Intell. Humaniz. Comput. 14(9): 12595-12607 (2023)
 [j21]Humael Hussain [j21]Humael Hussain , Chaudhry Muhammad Nadeem Faisal , Chaudhry Muhammad Nadeem Faisal , Muhammad Asif Habib , Muhammad Asif Habib , Martín González-Rodríguez , Martín González-Rodríguez , Daniel Fernández Lanvin, Javier de Andrés: , Daniel Fernández Lanvin, Javier de Andrés:
 ARLexic game: an augmented reality-based serious game for training of dyslexic and dysgraphic children. Virtual Real. 27(4): 3649-3663 (2023)
- 2022
 [j20]Muhammad Yasir [j20]Muhammad Yasir , Ali Haidar, Muhammad Umar Chaudhry , Ali Haidar, Muhammad Umar Chaudhry , Muhammad Asif Habib , Muhammad Asif Habib , Aamir Hussain , Aamir Hussain , Elzbieta Jasinska , Elzbieta Jasinska , Zbigniew Leonowicz , Zbigniew Leonowicz , Michal Jasiñski , Michal Jasiñski : :
 Performing in-situ analytics: Mining frequent patterns from big IoT data at network edge with D-HARPP. Eng. Appl. Artif. Intell. 116: 105480 (2022)
 [j19]Usman Rauf Kamboh [j19]Usman Rauf Kamboh , Muhammad Rehman Shahid , Muhammad Rehman Shahid , Hamza Aldabbas , Hamza Aldabbas , Ammar Rafiq , Ammar Rafiq , Bader Alouffi , Bader Alouffi , Muhammad Asif Habib , Muhammad Asif Habib , Ubaid Ullah , Ubaid Ullah : :
 Radio Network Forensic with mmWave Using the Dominant Path Algorithm. Secur. Commun. Networks 2022: 9692892:1-9692892:15 (2022)
 [c17]Muhammad Usama Baloch, Mudassar Ahmad, Rehan Ashraf, Muhammad Asif Habib [c17]Muhammad Usama Baloch, Mudassar Ahmad, Rehan Ashraf, Muhammad Asif Habib : :
 Development of an Embedded Device for Stroke Prediction via Artificial Intelligence-Based Algorithms. FIT 2022: 136-141
 [c16]Kainat Rizwan, Mudassar Ahmad, Muhammad Asif Habib [c16]Kainat Rizwan, Mudassar Ahmad, Muhammad Asif Habib : :
 Cyber Automated Network Resilience Defensive Approach against Malware Images. FIT 2022: 237-242
 [c15]Khadija Nadeem, Mudassar Ahmad, Muhammad Asif Habib [c15]Khadija Nadeem, Mudassar Ahmad, Muhammad Asif Habib : :
 Emotional States Detection Model from Handwriting by using Machine Learning. FIT 2022: 284-289
 [c14]Khadija Nadeem, Mudassar Ahmad, Zafar Javed, Muhammad Asif Habib [c14]Khadija Nadeem, Mudassar Ahmad, Zafar Javed, Muhammad Asif Habib : :
 Development of a Machine Learning Model for Prediction of Colour Trends in Fashion Industry. FIT 2022: 296-301
- 2021
 [j18]Aisha Younas [j18]Aisha Younas , Chaudhry Muhammad Nadeem Faisal , Chaudhry Muhammad Nadeem Faisal , Muhammad Asif Habib , Muhammad Asif Habib , Rehan Ashraf , Rehan Ashraf , Mudassar Ahmad , Mudassar Ahmad : :
 Role of Design Attributes to Determine the Intention to Use Online Learning via Cognitive Beliefs. IEEE Access 9: 94181-94202 (2021)
 [j17]Zhongjian Xu, Muhammad Ahsan Latif, Syed Shaham Madni [j17]Zhongjian Xu, Muhammad Ahsan Latif, Syed Shaham Madni , Ammar Rafiq , Ammar Rafiq , Iqbal Alam , Iqbal Alam , Muhammad Asif Habib: , Muhammad Asif Habib:
 Detecting White Cotton Bolls Using High-Resolution Aerial Imagery Acquired Through Unmanned Aerial System. IEEE Access 9: 169068-169081 (2021)
 [j16]Mudassar Ahmad [j16]Mudassar Ahmad , Usman Ahmad, Md. Asri Ngadi, Muhammad Asif Habib , Usman Ahmad, Md. Asri Ngadi, Muhammad Asif Habib , Chaudhry Muhammad Nadeem Faisal , Chaudhry Muhammad Nadeem Faisal , Nasir Mahmood: , Nasir Mahmood:
 ARFC: Advance response function of TCP CUBIC for IoT-based applications using big data. Concurr. Comput. Pract. Exp. 33(4) (2021)
 [j15]Waheed Yousuf Ramay [j15]Waheed Yousuf Ramay , Xu-Cheng Yin, Shams-ur Rahman , Xu-Cheng Yin, Shams-ur Rahman , Muhammad Asif Habib , Muhammad Asif Habib : :
 Hybrid approach for big data localization and semantic annotation. Concurr. Comput. Pract. Exp. 33(4) (2021)
- 2020
 [j14]Muhammad Yasir, Muhammad Asif Habib, Muhammad Ashraf, Shahzad Sarwar [j14]Muhammad Yasir, Muhammad Asif Habib, Muhammad Ashraf, Shahzad Sarwar , Muhammad Umar Chaudhry , Muhammad Umar Chaudhry , Hamayoun Shahwani, Mudassar Ahmad, Chaudhry Muhammad Nadeem Faisal , Hamayoun Shahwani, Mudassar Ahmad, Chaudhry Muhammad Nadeem Faisal : :
 D-GENE: Deferring the GENEration of Power Sets for Discovering Frequent Itemsets in Sparse Big Data. IEEE Access 8: 27375-27392 (2020)
 [j13]Rehan Ashraf, Muhammad Asif Habib, Muhammad Akram, Muhammad Ahsan Latif, Muhammad Sheraz Arshad Malik, Muhammad Awais, Saadat Hanif Dar, Toqeer Mahmood, Muhammad Yasir, Zahoor Abbas: [j13]Rehan Ashraf, Muhammad Asif Habib, Muhammad Akram, Muhammad Ahsan Latif, Muhammad Sheraz Arshad Malik, Muhammad Awais, Saadat Hanif Dar, Toqeer Mahmood, Muhammad Yasir, Zahoor Abbas:
 Deep Convolution Neural Network for Big Data Medical Image Classification. IEEE Access 8: 105659-105670 (2020)
 [j12]Mudassar Ahmad, Usman Ahmad, Md. Asri Ngadi, Muhammad Asif Habib [j12]Mudassar Ahmad, Usman Ahmad, Md. Asri Ngadi, Muhammad Asif Habib , Shehzad Khalid, Rehan Ashraf: , Shehzad Khalid, Rehan Ashraf:
 Loss Based Congestion Control Module for Health Centers Deployed by Using Advanced IoT Based SDN Communication Networks. Int. J. Parallel Program. 48(2): 213-243 (2020)
 [j11]Idrees Ahmed [j11]Idrees Ahmed , Abid Khan , Abid Khan , Adeel Anjum, Mansoor Ahmed , Adeel Anjum, Mansoor Ahmed , Muhammad Asif Habib , Muhammad Asif Habib : :
 A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks. Int. J. Parallel Program. 48(2): 344-366 (2020)
 [j10]Rehan Ashraf, Mudassar Ahmed [j10]Rehan Ashraf, Mudassar Ahmed , Usman Ahmad, Muhammad Asif Habib , Usman Ahmad, Muhammad Asif Habib , Sohail Jabbar , Sohail Jabbar , Muhammad Kashif Naseer: , Muhammad Kashif Naseer:
 MDCBIR-MF: multimedia data for content-based image retrieval by using multiple features. Multim. Tools Appl. 79(13-14): 8553-8579 (2020)
2010 – 2019
- 2019
 [j9]Muhammad Yasir, Muhammad Asif Habib, Muhammad Ashraf, Shahzad Sarwar [j9]Muhammad Yasir, Muhammad Asif Habib, Muhammad Ashraf, Shahzad Sarwar , Muhammad Umar Chaudhry , Muhammad Umar Chaudhry , Hamayoun Shahwani, Mudassar Ahmad, Chaudhry Muhammad Nadeem Faisal , Hamayoun Shahwani, Mudassar Ahmad, Chaudhry Muhammad Nadeem Faisal : :
 TRICE: Mining Frequent Itemsets by Iterative TRimmed Transaction LattICE in Sparse Big Data. IEEE Access 7: 181688-181705 (2019)
 [j8]Muhammad Asif Habib [j8]Muhammad Asif Habib , Mudassar Ahmad , Mudassar Ahmad , Sohail Jabbar , Sohail Jabbar , Shehzad Khalid, Junaid Chaudhry , Shehzad Khalid, Junaid Chaudhry , Kashif Saleem , Kashif Saleem , Joel J. P. C. Rodrigues , Joel J. P. C. Rodrigues , Mohammed Sayim Khalil , Mohammed Sayim Khalil : :
 Security and privacy based access control model for internet of connected vehicles. Future Gener. Comput. Syst. 97: 687-696 (2019)
 [j7]Muhammad Asif Habib, Chaudhry Muhammad Nadeem Faisal [j7]Muhammad Asif Habib, Chaudhry Muhammad Nadeem Faisal , Shahzad Sarwar, Muhammad Ahsan Latif, Farhan Aadil , Shahzad Sarwar, Muhammad Ahsan Latif, Farhan Aadil , Mudassar Ahmad, Rehan Ashraf, Muazzam Maqsood , Mudassar Ahmad, Rehan Ashraf, Muazzam Maqsood : :
 Privacy-based medical data protection against internal security threats in heterogeneous Internet of Medical Things. Int. J. Distributed Sens. Networks 15(9) (2019)
 [j6]Muhammad Yasir [j6]Muhammad Yasir , Muhammad Asif Habib , Muhammad Asif Habib , Shahzad Sarwar, Chaudhry Muhammad Nadeem Faisal , Shahzad Sarwar, Chaudhry Muhammad Nadeem Faisal , Mudassar Ahmad, Sohail Jabbar , Mudassar Ahmad, Sohail Jabbar : :
 HARPP: HARnessing the Power of Power sets for Mining Frequent Itemsets. Inf. Technol. Control. 48(3): 415-431 (2019)
 [j5]Awais Ahmad [j5]Awais Ahmad , Mudassar Ahmad, Muhammad Asif Habib, Shahzad Sarwar, Junaid Chaudhry, Muhammad Ahsan Latif, Saadat Hanif Dar, Muhammad Shahid: , Mudassar Ahmad, Muhammad Asif Habib, Shahzad Sarwar, Junaid Chaudhry, Muhammad Ahsan Latif, Saadat Hanif Dar, Muhammad Shahid:
 Parallel query execution over encrypted data in database-as-a-service (DaaS). J. Supercomput. 75(4): 2269-2288 (2019)
 [c13]Moneeb Ahmed, Ihsan Elahi, Muhammad Abrar, Umair Aslam, Iqra Khalid, Muhammad Asif Habib: [c13]Moneeb Ahmed, Ihsan Elahi, Muhammad Abrar, Umair Aslam, Iqra Khalid, Muhammad Asif Habib:
 Understanding Blockchain: Platforms, Applications and Implementation Challenges. ICFNDS 2019: 35:1-35:8
 [c12]Abid Jamil, Chaudhry Muhammad Nadeem Faisal [c12]Abid Jamil, Chaudhry Muhammad Nadeem Faisal , Muhammad Asif Habib , Muhammad Asif Habib , Sohail Jabbar , Sohail Jabbar , Haseeb Ahmad: , Haseeb Ahmad:
 The Experimental Investigation of the Influence of Gender in Enjoyment, Ease of use, Satisfaction, and Usefulness during Interaction in Gaming Environment. Interacción 2019: 50:1-50:4
 [c11]Umair Khadam, Muhammad Munwar Iqbal, Muhammad Asif Habib [c11]Umair Khadam, Muhammad Munwar Iqbal, Muhammad Asif Habib , Kijun Han: , Kijun Han:
 A Watermarking Technique Based on File Page Objects for PDF. PACRIM 2019: 1-5
 [p2]Mudassar Ahmad, Tanveer Younis, Muhammad Asif Habib [p2]Mudassar Ahmad, Tanveer Younis, Muhammad Asif Habib , Rehan Ashraf, Syed Hassan Ahmed , Rehan Ashraf, Syed Hassan Ahmed : :
 A Review of Current Security Issues in Internet of Things. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 11-23
 [p1]Mudassar Ahmad, Atiab Ishtiaq, Muhammad Asif Habib [p1]Mudassar Ahmad, Atiab Ishtiaq, Muhammad Asif Habib , Syed Hassan Ahmed , Syed Hassan Ahmed : :
 A Review of Internet of Things (IoT) Connectivity Techniques. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 25-36
- 2018
 [j4]Muhammad Asif Habib [j4]Muhammad Asif Habib , Mudassar Ahmad , Mudassar Ahmad , Sohail Jabbar , Sohail Jabbar , Syed Hassan Ahmed , Syed Hassan Ahmed , Joel J. P. C. Rodrigues , Joel J. P. C. Rodrigues : :
 Speeding Up the Internet of Things: LEAIoT: A Lightweight Encryption Algorithm Toward Low-Latency Communication for the Internet of Things. IEEE Consumer Electron. Mag. 7(6): 31-37 (2018)
 [j3]Kaleem Razzaq Malik, Muhammad Asif Habib [j3]Kaleem Razzaq Malik, Muhammad Asif Habib , Shehzad Khalid, Mudassar Ahmad, Mai Alfawair, Awais Ahmad, Gwanggil Jeon , Shehzad Khalid, Mudassar Ahmad, Mai Alfawair, Awais Ahmad, Gwanggil Jeon : :
 A generic methodology for geo-related data semantic annotation. Concurr. Comput. Pract. Exp. 30(15) (2018)
 [j2]Muhammad Ayzed Mirza [j2]Muhammad Ayzed Mirza , Mudassar Ahmad, Muhammad Asif Habib , Mudassar Ahmad, Muhammad Asif Habib , Nasir Mahmood, Chaudhry Muhammad Nadeem Faisal , Nasir Mahmood, Chaudhry Muhammad Nadeem Faisal , Usman Ahmad: , Usman Ahmad:
 CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks. J. Supercomput. 74(10): 5082-5098 (2018)
 [j1]Sohail Jabbar [j1]Sohail Jabbar , Muhammad Asif Habib, Abid Ali Minhas , Muhammad Asif Habib, Abid Ali Minhas , Mudassar Ahmad , Mudassar Ahmad , Rehan Ashraf , Rehan Ashraf , Shehzad Khalid , Shehzad Khalid , Kijun Han , Kijun Han : :
 Analysis of Factors Affecting Energy Aware Routing in Wireless Sensor Network. Wirel. Commun. Mob. Comput. 2018 (2018)
 [c10]Mudassar Ahmad, Awais Ahmad, Sohail Jabbar [c10]Mudassar Ahmad, Awais Ahmad, Sohail Jabbar , Muhammad Asif, Muhammad Asif Habib, Syed Hassan Ahmed, Sayed Chhattan Shah , Muhammad Asif, Muhammad Asif Habib, Syed Hassan Ahmed, Sayed Chhattan Shah : :
 TCP CUBIC: A Transport Protocol for Improving the Performance of TCP in Long Distance High Bandwidth Cyber-Physical Systems. ICC Workshops 2018: 1-6
 [c9]Chaudhry Muhammad Nadeem Faisal [c9]Chaudhry Muhammad Nadeem Faisal , Javier de Andrés Suárez , Javier de Andrés Suárez , Martín González-Rodríguez , Martín González-Rodríguez , Daniel Fernández Lanvin, Mudassar Ahmad, Muhammad Asif Habib: , Daniel Fernández Lanvin, Mudassar Ahmad, Muhammad Asif Habib:
 Impact of web design features on irritation for E-commerce websites. SAC 2018: 656-663
- 2017
 [c8]Bushra Zafar [c8]Bushra Zafar , Rehan Ashraf, Mudassar Ahmad, Muhammad Asif Habib: , Rehan Ashraf, Mudassar Ahmad, Muhammad Asif Habib:
 Modelling and Simulation of Resource constrained Vaccination Strategies and Epidemic Outbreaks. FIT 2017: 12-17
 [c7]Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf: [c7]Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf:
 An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security. ICFNDS 2017: 57:1-57:6
 [c6]Ulfat Imdad, Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf: [c6]Ulfat Imdad, Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf:
 Auto Configuration Based Enhanced and Secure Domain Naming Service for IPV-6 Internet of Things. ICFNDS 2017: 58:1-58:5
 [c5]Muhammad Yasir, Muhammad Asif Habib, Muhammad Shahid, Mudassar Ahmad: [c5]Muhammad Yasir, Muhammad Asif Habib, Muhammad Shahid, Mudassar Ahmad:
 Agent-based Modeling and Simulation of Virus on a Scale-Free Network. ICFNDS 2017: 59:1-59:6
 [c4]Muhammad Naeem, Rehan Ashraf, Nouman Ali [c4]Muhammad Naeem, Rehan Ashraf, Nouman Ali , Mudassar Ahmad, Muhammad Asif Habib: , Mudassar Ahmad, Muhammad Asif Habib:
 Bottom up Approach for Better Requirements Elicitation. ICFNDS 2017: 60:1-60:4
 [c3]Mudassar Ahmad, Muhammad Asif Habib, Rehan Ashraf, Muhammad Shahid: [c3]Mudassar Ahmad, Muhammad Asif Habib, Rehan Ashraf, Muhammad Shahid:
 Enhancement in Data-Recovery and Re-Transmit Mechanisms of TCP. LCN Workshops 2017: 183-187
- 2010
 [c2]Muhammad Asif Habib: [c2]Muhammad Asif Habib:
 Mutual exclusion and role inheritance affecting least privilege in RBAC. ICITST 2010: 1-6
2000 – 2009
- 2009
 [c1]Muhammad Asif Habib, Christian Praher: [c1]Muhammad Asif Habib, Christian Praher:
 Object based dynamic separation of duty in RBAC. ICITST 2009: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-31 01:14 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







