


default search action
Hanlin Zhang 0001
Person information
- affiliation: Qingdao University, College of Computer Science and Technology, Qingdao, China
- affiliation (PhD 2016): Towson University, Department of Computer and Information Sciences, Towson, MD, USA
Other persons with the same name
- Hanlin Zhang — disambiguation page
- Hanlin Zhang 0002
— Harvard University, Cambridge, MA, USA (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j58]Gaoli Mu, Hanlin Zhang
, Jie Lin, Fanyu Kong:
SMCD: Privacy-preserving deep learning based malicious code detection. Comput. Secur. 150: 104226 (2025)
[j57]Yunlong He
, Lingtao Wei, Fei Chen
, Hanlin Zhang, Jia Yu, Haiyang Wang:
Fedai: Federated recommendation system with anonymized interactions. Expert Syst. Appl. 271: 126564 (2025)
[j56]Yaru Liu, Xiaodong Xiao, Fanyu Kong
, Hanlin Zhang, Jia Yu
:
Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data. Future Gener. Comput. Syst. 166: 107716 (2025)
[j55]Xinrong Sun
, Yunting Tao, Fanyu Kong
, Qian Yu, Chunpeng Ge
, Qiuliang Xu
, Hanlin Zhang
:
How to Securely Outsource the Multiple Kernel Fuzzy Clustering Task in Edge Computing. IEEE Internet Things J. 12(11): 16451-16466 (2025)
[j54]Xiaotong Zhao
, Hanlin Zhang
, Jie Lin
, Fan Liang, Fanyu Kong
, Hansong Xu
, Kun Hua:
Privacy-Preserving Edge-Aided Eigenvalue Decomposition in Internet of Things. IEEE Internet Things J. 12(12): 19901-19914 (2025)
[j53]Xiangyuan Yang
, Jie Lin
, Hanlin Zhang, Peng Zhao:
Rethinking the optimization objective for transferable adversarial examples from a fuzzy perspective. Neural Networks 184: 107019 (2025)
[j52]Jiaxin Hu, Jie Lin
, Xiangyuan Yang
, Hanlin Zhang, Peng Zhao:
Enhancing adversarial transferability via transformation inference. Neural Networks 192: 107896 (2025)
[j51]Jie Lin
, Yuhao Ye, Shaobo Li
, Hanlin Zhang
, Peng Zhao
:
Improving Exploration in Deep Reinforcement Learning for Incomplete Information Competition Environments. IEEE Trans. Emerg. Top. Comput. Intell. 9(5): 3665-3676 (2025)
[c17]Tong Sun, Qian Lu, Hanlin Zhang, Qianqian Su, Xinrui Ge:
SMART: a practical and robust client-side RAP detection approach. ICCCN 2025: 1-6- 2024
[j50]Xiangyuan Yang
, Jie Lin, Hanlin Zhang
, Xinyu Yang, Peng Zhao:
An auxiliary correction model implemented by the Correction Property of intermediate layer against adversarial examples. Appl. Soft Comput. 167: 112367 (2024)
[j49]Benxin Yin
, Hanlin Zhang
, Jie Lin, Fanyu Kong
, Leyun Yu:
PVFL: Verifiable federated learning and prediction with privacy-preserving. Comput. Secur. 139: 103700 (2024)
[j48]Guangshang Jiang, Hanlin Zhang
, Jie Lin, Fanyu Kong, Leyun Yu:
Optimized verifiable delegated private set intersection on outsourced private datasets. Comput. Secur. 141: 103822 (2024)
[j47]Yunting Tao
, Yuqun Li, Fanyu Kong
, Yuliang Shi, Ming Yang
, Jia Yu, Hanlin Zhang:
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding. Comput. Secur. 144: 103931 (2024)
[j46]Guangli Wu
, Xingyue Wang
, Qian Lu, Hanlin Zhang
:
Bot-DM: A dual-modal botnet detection method based on the combination of implicit semantic expression and graphical expression. Expert Syst. Appl. 248: 123384 (2024)
[j45]Zaikai Yang
, Qian Lu
, Hanlin Zhang
, Fei Chen
, Hequn Xian
:
Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification. IEEE Internet Things J. 11(8): 14886-14900 (2024)
[j44]Yongjie Li
, Hanlin Zhang
, Jie Lin
, Fan Liang, Hansong Xu
, Xing Liu
, Leyun Yu:
Secure Edge-Aided Singular Value Decomposition in Internet of Things. IEEE Internet Things J. 11(13): 23207-23221 (2024)
[j43]Qian Lu
, Zaikai Yang
, Hanlin Zhang
, Fei Chen
, Hequn Xian
:
MRFE: A Deep-Learning-Based Multidimensional Radio Frequency Fingerprinting Enhancement Approach for IoT Device Identification. IEEE Internet Things J. 11(18): 30442-30454 (2024)
[j42]Xiangyuan Yang
, Jie Lin
, Hanlin Zhang, Peng Zhao:
Improving query efficiency of black-box attacks via the preference of deep learning models. Inf. Sci. 678: 121013 (2024)
[j41]Zhixiang Zhang
, Hanlin Zhang
, Xiangfu Song
, Jie Lin
, Fanyu Kong
:
Secure Outsourcing Evaluation for Sparse Decision Trees. IEEE Trans. Dependable Secur. Comput. 21(6): 5228-5241 (2024)
[c16]Zihao Zhao
, Sijia Cao, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu:
Privacy-Preserving Group Closeness Maximization. ICCCN 2024: 1-6
[c15]Xiaotong Zhao
, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu:
Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue Problem. ICCCN 2024: 1-6
[c14]Hongjian Zhao, Yunting Tao, Fanyu Kong, Guoyan Zhang, Hanlin Zhang, Jia Yu:
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems. ISPA 2024: 2260-2263
[c13]Guangmao Gao, Hanlin Zhang, Jie Lin, Hansong Xu, Fanyu Kong, Leyun Yu:
Privacy-preserving Deep Learning for Autism Spectrum Disorder Classification. SmartCloud 2024: 13-18- 2023
[j40]Yunting Tao
, Fanyu Kong
, Yuliang Shi, Jia Yu, Hanlin Zhang, Xiangyi Wang:
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system. Future Gener. Comput. Syst. 149: 445-454 (2023)
[j39]Jie Lin
, Siqi Huang, Hanlin Zhang
, Xinyu Yang
, Peng Zhao
:
A Deep-Reinforcement-Learning-Based Computation Offloading With Mobile Vehicles in Vehicular Edge Computing. IEEE Internet Things J. 10(17): 15501-15514 (2023)
[j38]Xiangyuan Yang
, Jie Lin
, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Improving the transferability of adversarial examples via direction tuning. Inf. Sci. 647: 119491 (2023)
[j37]Fei Gao, Hanlin Zhang
, Jie Lin, Hansong Xu, Fanyu Kong, Guoqiang Yang:
A verifiable and privacy-preserving framework for federated recommendation system. J. Ambient Intell. Humaniz. Comput. 14(4): 4273-4287 (2023)
[j36]Jie Lin
, Zekun Mu, Tianqing Zhao, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Action density based frame sampling for human action recognition in videos. J. Vis. Commun. Image Represent. 90: 103740 (2023)
[j35]Jie Lin
, Siqi Huang
, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A novel coalition game based distributed cooperative content caching in mobile edge networks. Veh. Commun. 44: 100689 (2023)
[c12]Sijia Cao, Hanlin Zhang, Yuhang Wang, Jie Lin, Fanyu Kong, Leyun Yu:
SecureGAN: Secure Three-Party GAN Training. ICCCN 2023: 1-7
[c11]Yinlong Wang, Yunting Tao, Fanyu Kong
, Zhaoquan Gu, Jia Yu, Hanlin Zhang:
Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers. ICPADS 2023: 2531-2538
[c10]Yunting Tao, Fanyu Kong
, Yuliang Shi, Jia Yu, Hanlin Zhang, Huiyi Liu:
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System. ISCC 2023: 857-863
[i8]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Fuzziness-tuned: Improving the Transferability of Adversarial Examples. CoRR abs/2303.10078 (2023)
[i7]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Improving the Transferability of Adversarial Examples via Direction Tuning. CoRR abs/2303.15109 (2023)- 2022
[j34]Jie Lin
, Lin Huang, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A Novel Lyapunov based Dynamic Resource Allocation for UAVs-assisted Edge Computing. Comput. Networks 205: 108710 (2022)
[j33]Haiyang Liu, Hanlin Zhang
, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving cloud-Aided broad learning system. Comput. Secur. 112: 102503 (2022)
[j32]Xin Sun, Chengliang Tian
, Changhui Hu, Weizhong Tian, Hanlin Zhang, Jia Yu:
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance. Comput. Secur. 118: 102740 (2022)
[j31]Xiulan Li
, Jingguo Bi, Chengliang Tian
, Hanlin Zhang
, Jia Yu
, Yanbin Pan
:
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things. IEEE Internet Things J. 9(9): 6790-6802 (2022)
[j30]Hanlin Zhang
, Jia Yu
, Mohammad S. Obaidat
, Pandi Vijayakumar
, Linqiang Ge
, Jie Lin
, Jianxi Fan
, Rong Hao
:
Secure Edge-Aided Computations for Social Internet-of-Things Systems. IEEE Trans. Comput. Soc. Syst. 9(1): 76-87 (2022)
[j29]Hanlin Zhang
, Peng Gao, Jia Yu
, Jie Lin
, Neal N. Xiong
:
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. IEEE Trans. Netw. Sci. Eng. 9(6): 3956-3967 (2022)
[j28]Chengliang Tian
, Jia Yu
, Hanlin Zhang, Haiyang Xue
, Cong Wang
, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022)
[j27]Xinrui Ge
, Jia Yu
, Hanlin Zhang
, Jianli Bai
, Jianxi Fan
, Neal N. Xiong
:
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT. IEEE Trans. Syst. Man Cybern. Syst. 52(1): 136-150 (2022)
[c9]Benxin Yin
, Hansong Xu
, Xinliang Li, Jun Sun
, Hanlin Zhang
:
MLPSI: Multi-party Privacy Set Intersection with Linear Complexity. ICBDT 2022: 339-343
[c8]Hongjun Li, Fanyu Kong
, Jia Yu, Hanlin Zhang, Luhong Diao, Yunting Tao:
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. TrustCom 2022: 556-564
[i6]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Enhancing the Transferability of Adversarial Examples via a Few Queries. CoRR abs/2205.09518 (2022)
[i5]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Mask-Guided Divergence Loss Improves the Generalization and Robustness of Deep Neural Network. CoRR abs/2206.00913 (2022)
[i4]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
FACM: Correct the Output of Deep Neural Network with Middle Layers Features against Adversarial Samples. CoRR abs/2206.00924 (2022)- 2021
[j26]Jie Lin, Lin Huang, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A novel Latency-Guaranteed based Resource Double Auction for market-oriented edge computing. Comput. Networks 189: 107873 (2021)
[j25]Peng Gao, Hanlin Zhang
, Jia Yu
, Jie Lin
, Xiaopeng Wang, Ming Yang, Fanyu Kong:
Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images. IEEE Internet Things J. 8(5): 3287-3299 (2021)
[j24]Hanlin Zhang
, Le Tong, Jia Yu
, Jie Lin
:
Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices. IEEE Internet Things J. 8(20): 15596-15607 (2021)
[j23]Yunhai Zheng, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li
:
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. J. Comput. Syst. Sci. 121: 18-33 (2021)
[j22]Xinrui Ge
, Jia Yu
, Hanlin Zhang
, Chengyu Hu
, Zengpeng Li
, Zhan Qin
, Rong Hao
:
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE Trans. Dependable Secur. Comput. 18(1): 490-504 (2021)
[i3]Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong:
Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. CoRR abs/2101.02334 (2021)
[i2]Hanlin Zhang, Le Tong, Jia Yu, Jie Lin:
Blockchain Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices. CoRR abs/2101.02341 (2021)
[i1]Haiyang Liu, Hanlin Zhang, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving Cloud-Aided Broad Learning System. CoRR abs/2101.02826 (2021)- 2020
[j21]Jie Lin, Biao Xiao, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A novel multitype-users welfare equilibrium based real-time pricing in smart grid. Future Gener. Comput. Syst. 108: 145-160 (2020)
[j20]Hanlin Zhang, Jia Yu
, Chengliang Tian
, Guobin Xu
, Peng Gao, Jie Lin
:
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things. IEEE Internet Things J. 7(4): 2968-2981 (2020)
[j19]Hanlin Zhang, Jia Yu
, Chengliang Tian
, Le Tong, Jie Lin
, Linqiang Ge
, Huaqun Wang
:
Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things. IEEE Internet Things J. 7(8): 6868-6881 (2020)
[j18]Hongjun Li
, Jia Yu
, Hanlin Zhang, Ming Yang, Huaqun Wang
:
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance. IEEE Internet Things J. 7(9): 8769-8779 (2020)
[j17]Qiang Zhou, Chengliang Tian
, Hanlin Zhang, Jia Yu
, Fengjun Li
:
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. Inf. Sci. 512: 641-660 (2020)
[j16]Liang Zhang, Hanlin Zhang
, Jia Yu
, Hequn Xian
:
Blockchain-based two-party fair contract signing scheme. Inf. Sci. 535: 142-155 (2020)
[j15]Pu Zhao
, Jia Yu
, Hanlin Zhang, Zhan Qin
, Cong Wang
:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. IEEE Trans. Inf. Forensics Secur. 15: 315-328 (2020)
[j14]Jie Lin
, Wei Yu
, Xinyu Yang
, Peng Zhao
, Hanlin Zhang
, Wei Zhao
:
An Edge Computing Based Public Vehicle System for Smart Transportation. IEEE Trans. Veh. Technol. 69(11): 12635-12651 (2020)
2010 – 2019
- 2019
[j13]Shengxia Zhang, Chengliang Tian
, Hanlin Zhang, Jia Yu
, Fengjun Li
:
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method. IEEE Access 7: 53823-53838 (2019)
[j12]Xialei Zhang
, Liang Guo, Hanlin Zhang, Lifeng Guo, Kai Feng, Jie Lin:
An Energy Scheduling Strategy With Priority Within Islanded Microgrids. IEEE Access 7: 135896-135908 (2019)
[j11]Pu Zhao, Jia Yu, Hanlin Zhang:
Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing. J. Inf. Sci. Eng. 35(3): 635-650 (2019)
[c7]Le Tong, Jia Yu, Hanlin Zhang:
Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation. DSC 2019: 1-7- 2018
[j10]Hanlin Zhang, Jia Yu
, Chengliang Tian, Pu Zhao, Guobin Xu, Jie Lin:
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing. IEEE Access 6: 40713-40722 (2018)
[j9]Xinrui Ge
, Jia Yu
, Chengyu Hu
, Hanlin Zhang, Rong Hao:
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing. IEEE Access 6: 45725-45739 (2018)
[j8]Huiying Hou, Jia Yu, Hanlin Zhang, Yan Xu, Rong Hao:
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage. Clust. Comput. 21(4): 1849-1863 (2018)
[j7]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018)
[c6]Wei Yu
, Hanlin Zhang, Yalong Wu, David W. Griffith, Nada Golmie:
A Framework to Enable Multiple Coexisting Internet of Things Applications. ICNC 2018: 637-641- 2017
[j6]Wenting Shen, Guangyang Yang, Jia Yu, Hanlin Zhang
, Fanyu Kong, Rong Hao:
Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Gener. Comput. Syst. 76: 136-145 (2017)
[j5]Jie Lin, Wei Yu
, Nan Zhang, Xinyu Yang, Hanlin Zhang, Wei Zhao
:
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 4(5): 1125-1142 (2017)
[j4]Wenting Shen, Jia Yu, Hui Xia, Hanlin Zhang, Xiuqing Lu, Rong Hao:
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82: 56-64 (2017)
[j3]Qianqian Su
, Jia Yu, Chengliang Tian, Hanlin Zhang, Rong Hao:
How to securely outsource the inversion modulo a large composite number. J. Syst. Softw. 129: 26-34 (2017)- 2016
[c5]Wei Yu
, Hansong Xu, Hanlin Zhang, David W. Griffith, Nada Golmie:
Ultra-Dense Networks: Survey of State of the Art and Future Directions. ICCCN 2016: 1-10
[c4]Zhijiang Chen, Hanlin Zhang
, William G. Hatcher, James H. Nguyen, Wei Yu
:
A streaming-based network monitoring and threat detection system. SERA 2016: 31-37- 2015
[j2]Guobin Xu, Wei Yu
, Zhijiang Chen, Hanlin Zhang
, Paul Moulema, Xinwen Fu
, Chao Lu:
A cloud computing based system for cyber security management. Int. J. Parallel Emergent Distributed Syst. 30(1): 29-45 (2015)
[c3]Yevgeniy Cole, Hanlin Zhang
, Linqiang Ge, Sixiao Wei, Wei Yu
, Chao Lu, Genshe Chen, Dan Shen, Erik Blasch, Khanh D. Pham:
ScanMe mobile: a local and cloud hybrid service for analyzing APKs. RACS 2015: 268-273- 2013
[j1]Difan Zhang, Linqiang Ge, Wei Yu
, Hanlin Zhang
, Rommie L. Hardy, Robert J. Reschly:
On effective data aggregation techniques in host-based intrusion detection in MANET. Int. J. Secur. Networks 8(4): 179-193 (2013)
[c2]Difan Zhang, Linqiang Ge, Rommie L. Hardy, Wei Yu
, Hanlin Zhang
, Robert J. Reschly:
On effective data aggregation techniques in Host-based Intrusion Detection in MANET. CCNC 2013: 85-90
[c1]Wei Yu
, Hanlin Zhang
, Linqiang Ge, Rommie L. Hardy:
On behavior-based detection of malware on Android platform. GLOBECOM 2013: 814-819
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-06 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







