default search action
Kuo-Hui Yeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j67]Abdalla Hadabi, Zheng Qu, Rashad Elhabob, Sachin Kumar, Kuo-Hui Yeh, Saru Kumari, Hu Xiong:
Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT. Comput. Electr. Eng. 116: 109164 (2024) - [j66]Chanapha Bast, Kuo-Hui Yeh:
Emerging Authentication Technologies for Zero Trust on the Internet of Things. Symmetry 16(8): 993 (2024) - [j65]Fan-Hsun Tseng, Jiang-Yi Zeng, Hsin-Hung Cho, Kuo-Hui Yeh, Chi-Yuan Chen:
Detecting Adversarial Examples of Fake News via the Neurons Activation State. IEEE Trans. Comput. Soc. Syst. 11(4): 5199-5209 (2024) - 2023
- [j64]Shi-Cho Cha, Weizhi Meng, Wen-Wei Li, Kuo-Hui Yeh:
A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2. Comput. Ind. Eng. 178: 109091 (2023) - [j63]Jun Feng, Hu Xiong, Jinhao Chen, Yang Xiang, Kuo-Hui Yeh:
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT. IEEE Internet Things J. 10(6, March 15): 4815-4829 (2023) - [j62]Wen-Wei Li, Weizhi Meng, Kuo-Hui Yeh, Shi-Cho Cha:
Trusting Computing as a Service for Blockchain Applications. IEEE Internet Things J. 10(13): 11326-11342 (2023) - [j61]Mengjuan Liu, Jiang Liu, Chenyang Liu, Kuo-Hui Yeh:
A task-oriented neural dialogue system capable of knowledge accessing. J. Inf. Secur. Appl. 76: 103551 (2023) - [j60]Hu Xiong, Zheng Qu, Xin Huang, Kuo-Hui Yeh:
Revocable and Unbounded Attribute-Based Encryption Scheme With Adaptive Security for Integrating Digital Twins in Internet of Things. IEEE J. Sel. Areas Commun. 41(10): 3306-3317 (2023) - [j59]Kuongho Chen, Lin-Fa Lee, Wayne Chiu, Chunhua Su, Kuo-Hui Yeh, Han-Chieh Chao:
A Trusted Reputation Management Scheme for Cross-Chain Transactions. Sensors 23(13): 6033 (2023) - [j58]Kuo-Hui Yeh, Chien-Ming Chen, Wei-Che Chien:
Special Issue Editorial "Deep Learning Technologies for Mobile Networks: A Themed Issue in Honor of Prof. Han-Chieh Chao". Symmetry 15(4): 882 (2023) - [j57]Kuo-Hui Yeh, Chunhua Su, Shi-Cho Cha:
Special Issue Editorial "Blockchain-Enabled Technology for IoT Security, Privacy and Trust". Symmetry 15(5): 1059 (2023) - [j56]Shi-Cho Cha, Chun-Lin Chang, Yang Xiang, Tzu-Jia Huang, Kuo-Hui Yeh:
Enhancing OAuth With Blockchain Technologies for Data Portability. IEEE Trans. Cloud Comput. 11(1): 349-366 (2023) - [j55]Hu Xiong, Hanxiao Wang, Weizhi Meng, Kuo-Hui Yeh:
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System. IEEE Trans. Ind. Informatics 19(11): 10977-10986 (2023) - [j54]ZengRi Zeng, Baokang Zhao, Han-Chieh Chao, Ilsun You, Kuo-Hui Yeh, Weizhi Meng:
Towards Intelligent Attack Detection Using DNA Computing. ACM Trans. Multim. Comput. Commun. Appl. 19(3s): 126:1-126:27 (2023) - [c27]Yang Zhao, Xingyu Ke, Yuwei Pang, Hu Xiong, Guobin Zhu, Kuo-Hui Yeh:
Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls. BDTA 2023: 79-94 - [c26]Kuongho Chen, Tzu-Yuan Kao, Kuo-Hui Yeh:
Designing a Mobile Payment-Driven Mobility-as-a-Service Architecture for Bus Transportation. KES 2023: 4814-4823 - 2022
- [j53]Chien-Ming Chen, Shehzad Ashraf Chaudhry, Kuo-Hui Yeh, Muhammad Naveed Aman:
Security, Trust and Privacy for Cloud, Fog and Internet of Things. Secur. Commun. Networks 2022: 9841709:1-9841709:2 (2022) - [j52]Kuo-Hui Yeh, Guan-Yan Yang, Chanapha Butpheng, Lin-Fa Lee, Ying-Ho Liu:
A Secure Interoperability Management Scheme for Cross-Blockchain Transactions. Symmetry 14(12): 2473 (2022) - [j51]Hu Xiong, Chuanjie Jin, Mamoun Alazab, Kuo-Hui Yeh, Hanxiao Wang, Thippa Reddy Gadekallu, Weizheng Wang, Chunhua Su:
On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT. IEEE J. Biomed. Health Informatics 26(5): 1977-1986 (2022) - [c25]Wanting Zhou, Shiwei Yuan, Lei Li, Kuo-Hui Yeh:
A Novel Fast Recovery Method for HT Tamper in Embedded Processor. BlockTEA 2022: 131-139 - [c24]Jiang-Yi Zeng, Li-En Chang, Hsin-Hung Cho, Chi-Yuan Chen, Han-Chieh Chao, Kuo-Hui Yeh:
Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection. DSC 2022: 1-7 - [c23]Wei-Han Lin, Guan-Yan Yang, Kuo-Hui Yeh:
Integrating FIDO Authentication with New Digital Identity in Taiwan. GCCE 2022: 311-312 - [c22]Shi-Cho Cha, Yi-Hsuan Hsuan, Kuo-Hui Yeh, Takeshi Ishihara, Yoshihiro Ohba, Wei-Nin Chen:
An Evolutionary Risk-based Access Control Framework for Enterprise File Systems. WF-IoT 2022: 1-6 - 2021
- [j50]Mian Ahmad Jan, Kuo-Hui Yeh, Zhiyuan Tan, Yulei Wu:
Blockchain for edge-enabled smart cities applications. J. Inf. Secur. Appl. 61: 102937 (2021) - [j49]Yi Wu, Wei Zhang, Hu Xiong, Zhiguang Qin, Kuo-Hui Yeh:
Efficient access control with traceability and user revocation in IoT. Multim. Tools Appl. 80(20): 31487-31508 (2021) - [j48]Jerry Chun-Wei Lin, Kuo-Hui Yeh:
Security and Privacy Techniques in IoT Environment. Sensors 21(1): 1 (2021) - [c21]Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Kuo-Hui Yeh, Wensheng Gan, SK Hafizul Islam:
A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy. DSC 2021: 1-8 - [c20]Qian Mei, Hu Xiong, Yanan Zhao, Kuo-Hui Yeh:
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating. DSC 2021: 1-8 - [c19]Guan-Yan Yang, Kuo-Hui Yeh, Lin-Fa Lee:
Towards a Novel Interoperability Management Scheme for Cross-blockchain Transactions. GCCE 2021: 942-943 - 2020
- [j47]Kuo-Hui Yeh, Weizhi Meng, SK Hafizul Islam, Kuan Zhang, Ennan Zhai:
IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT. IEEE Access 8: 219690-219694 (2020) - [j46]Shi-Cho Cha, Kuo-Hui Yeh, Zijia Huang:
bleRPC: A plug-and-play RPC framework over BLE. Comput. Commun. 157: 298-307 (2020) - [j45]Kuo-Hui Yeh, Robert H. Deng, Hiroaki Kikuchi:
Special Issue on FinTech Security and Privacy. Future Gener. Comput. Syst. 112: 1172-1173 (2020) - [j44]Liangfu Lu, Xiaoxu Ren, Kuo-Hui Yeh, Zhiyuan Tan, Jocelyn Chanussot:
Exploring coupled images fusion based on joint tensor decomposition. Hum. centric Comput. Inf. Sci. 10: 10 (2020) - [j43]Kuo-Hui Yeh, Chunhua Su, Robert H. Deng, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. Int. J. Inf. Sec. 19(3): 243-244 (2020) - [j42]Hu Xiong, Yan Wu, Chunhua Su, Kuo-Hui Yeh:
A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things. J. Inf. Secur. Appl. 53: 102507 (2020) - [j41]Chanapha Butpheng, Kuo-Hui Yeh, Hu Xiong:
Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review. Symmetry 12(7): 1191 (2020) - [j40]Lu Zhou, Chunhua Su, Wayne Chiu, Kuo-Hui Yeh:
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks. IEEE Trans. Emerg. Top. Comput. 8(2): 303-312 (2020) - [j39]Shih-Chao Cha, Hao Wang, Zhiyuan Tan, Yuh-Jzer Joung, Yen-Chung Tseng, Kuo-Hui Yeh:
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 641-652 (2020)
2010 – 2019
- 2019
- [j38]Lu Zhou, Xiong Li, Kuo-Hui Yeh, Chunhua Su, Wayne Chiu:
Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 91: 244-251 (2019) - [j37]Hu Xiong, Yanan Zhao, Li Peng, Hao Zhang, Kuo-Hui Yeh:
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Gener. Comput. Syst. 97: 453-461 (2019) - [j36]Shi-Cho Cha, Tzu-Yang Hsu, Yang Xiang, Kuo-Hui Yeh:
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges. IEEE Internet Things J. 6(2): 2159-2187 (2019) - [j35]Chien-Ming Chen, King-Hang Wang, Kuo-Hui Yeh, Bin Xiang, Tsu-Yang Wu:
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J. Ambient Intell. Humaniz. Comput. 10(8): 3133-3142 (2019) - [j34]Lu Zhou, Chunhua Su, Kuo-Hui Yeh:
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things. ACM Trans. Embed. Comput. Syst. 18(3): 28:1-28:10 (2019) - 2018
- [j33]Shi-Cho Cha, Ming-Shiung Chuang, Kuo-Hui Yeh, Zijia Huang, Chunhua Su:
A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices. IEEE Access 6: 20779-20787 (2018) - [j32]Shi-Cho Cha, Jyun-Fu Chen, Chunhua Su, Kuo-Hui Yeh:
A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things. IEEE Access 6: 24639-24649 (2018) - [j31]Shi-Cho Cha, Kuo-Hui Yeh:
A Data-Driven Security Risk Assessment Scheme for Personal Data Protection. IEEE Access 6: 50510-50517 (2018) - [j30]Kuo-Hui Yeh, Chunhua Su, Jia-Li Hou, Wayne Chiu, Chien-Ming Chen:
A Robust Mobile Payment Scheme With Smart Contract-Based Transaction Repository. IEEE Access 6: 59394-59404 (2018) - [j29]Kuo-Hui Yeh, Chunhua Su, Wayne Chiu, Lu Zhou:
I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics. IEEE Commun. Mag. 56(2): 150-157 (2018) - [j28]Jiageng Chen, Chunhua Su, Kuo-Hui Yeh, Moti Yung:
Special Issue on Advanced Persistent Threat. Future Gener. Comput. Syst. 79: 243-246 (2018) - [j27]Kuo-Hui Yeh, Nai-Wei Lo, Chun-Kai Wang:
A robust NFC-based personalized IPTV service system. Multim. Tools Appl. 77(5): 5129-5148 (2018) - [j26]Kuo-Hui Yeh:
A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments. IEEE Syst. J. 12(2): 2027-2038 (2018) - [j25]Lu Zhou, Kuo-Hui Yeh, Gerhard P. Hancke, Zhe Liu, Chunhua Su:
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints. IEEE Signal Process. Mag. 35(5): 76-87 (2018) - [j24]Wayne Chiu, Chunhua Su, Chuan-Yen Fan, Chien-Ming Chen, Kuo-Hui Yeh:
Authentication with What You See and Remember in the Internet of Things. Symmetry 10(11): 537 (2018) - [c18]Shi-Cho Cha, Kuo-Hui Yeh:
An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology. CNS 2018: 1-2 - [c17]Wayne Chiu, Kuo-Hui Yeh, Akihito Nakamura:
Seeing Is Believing: Authenticating Users with What They See and Remember. ISPEC 2018: 391-403 - 2017
- [j23]Liang-Chun Chen, Chien-Lung Hsu, Nai-Wei Lo, Kuo-Hui Yeh, Ping-Hsien Lin:
Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks. IEICE Trans. Inf. Syst. 100-D(10): 2267-2274 (2017) - [j22]Kuo-Hui Yeh, Chunhua Su, Kim-Kwang Raymond Choo, Wayne Chiu:
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things. Sensors 17(5): 1001 (2017) - [j21]Shi-Cho Cha, Kuo-Hui Yeh, Jyun-Fu Chen:
Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things. Sensors 17(10): 2348 (2017) - [c16]Kuo-Hui Yeh, Nai-Wei Lo, Chun-Kai Wang:
A NFC-Based Authentication Scheme for Personalized IPTV Services. IIH-MSP (2) 2017: 273-281 - [i1]Kuo-Hui Yeh:
Cryptanalysis of Wang et al's Certificateless Signature Scheme without Bilinear Pairings. IACR Cryptol. ePrint Arch. 2017: 217 (2017) - 2016
- [j20]Kuo-Hui Yeh:
A Secure IoT-Based Healthcare System With Body Sensor Networks. IEEE Access 4: 10288-10299 (2016) - [j19]Nai-Wei Lo, Kuo-Hui Yeh, Chuan-Yen Fan:
Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid. IEEE Syst. J. 10(4): 1361-1369 (2016) - [c15]Kuo-Hui Yeh, Chunhua Su, Chien-Lung Hsu, Wayne Chiu, Yu-Fan Hsueh:
Transparent authentication scheme with adaptive biometrie features for IoT networks. GCCE 2016: 1-2 - 2015
- [j18]Jia-Li Hou, Kuo-Hui Yeh:
Novel Authentication Schemes for IoT Based Healthcare Systems. Int. J. Distributed Sens. Networks 11: 183659:1-183659:9 (2015) - [j17]Kuo-Hui Yeh:
An Efficient Resource Allocation Framework for Cloud Federations. Inf. Technol. Control. 44(1): 64-76 (2015) - [j16]Kuo-Hui Yeh:
An Anonymous and Lightweight Authentication Scheme for Mobile Devices. Inf. Technol. Control. 44(2): 206-215 (2015) - [j15]Kuo-Hui Yeh:
A lightweight authentication scheme with user untraceability. Frontiers Inf. Technol. Electron. Eng. 16(4): 259-271 (2015) - [j14]Kuo-Hui Yeh, Kuo-Yu Tsai, Chuan-Yen Fan:
An efficient certificateless signature scheme without bilinear pairings. Multim. Tools Appl. 74(16): 6519-6530 (2015) - [c14]Kuo-Hui Yeh, Nai-Wei Lo, Lin-Chih Chen, Ping-Hsien Lin:
A fraud detection system for real-time messaging communication on Android Facebook messenger. GCCE 2015: 361-363 - 2014
- [j13]Kuo-Hui Yeh, Nai-Wei Lo, Kuo-Yu Tsai, Yingjiu Li, Enrico Winata:
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration. Wirel. Pers. Commun. 77(3): 1775-1800 (2014) - [j12]Kuo-Hui Yeh:
A Provably Secure Multi-server Based Authentication Scheme. Wirel. Pers. Commun. 79(3): 1621-1634 (2014) - [c13]Kuo-Hui Yeh, Nai-Wei Lo, Chuan-Yen Fan:
An analysis framework for information loss and privacy leakage on Android applications. GCCE 2014: 216-218 - [c12]Kuo-Hui Yeh, YuShan Chen, Fan-Wei Wang:
An Authentication Scheme for Ubiquitous RFID Systems. RFIDSec Asia 2014: 41-50 - [e1]Nai-Wei Lo, Yingjiu Li, Kuo-Hui Yeh:
Radio Frequency Identification System Security - RFIDsec'14 Asia Workshop Proceedings, Hualien, Taiwan, November 27-28, 2014. Cryptology and Information Security Series 12, IOS Press 2014, ISBN 978-1-61499-461-9 [contents] - 2013
- [j11]Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Chieh Wang:
Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care. Int. J. Distributed Sens. Networks 9 (2013) - [j10]Chih-ho Chou, Kuo-Yu Tsai, Tzong-Chen Wu, Kuo-Hui Yeh:
Efficient and secure three-party authenticated key exchange protocol for mobile environments. J. Zhejiang Univ. Sci. C 14(5): 347-355 (2013) - [j9]Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou:
Analysis and design of a smart card based authentication protocol. J. Zhejiang Univ. Sci. C 14(12): 909-917 (2013) - [c11]Kuo-Hui Yeh, Kuo-Yu Tsai, Ren-Zong Kuo, Tzong-Chen Wu:
Robust Certificateless Signature Scheme without Bilinear Pairings. ICITCS 2013: 1-4 - 2012
- [c10]Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Ta-Chi Yang, Horng-Twu Liaw:
Analysis of an eHealth Care System with Smart Card Based Authentication. AsiaJCIS 2012: 59-61 - [c9]Nai-Wei Lo, Kuo-Hui Yeh, Hsuan-Yu Chen:
Cryptanalyses of Two Ultralightweight RFID Authentication Protocols. RFIDSec Asia 2012: 85-93 - [c8]Kuo-Hui Yeh, Nai-Wei Lo, Chieh Wang:
A Patient Privacy-Aware E-health System Based on Passive RFID. UIC/ATC 2012: 967-972 - 2011
- [j8]Yung-Chun Chen, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li, Enrico Winata:
Adaptive collision resolution for efficient RFID tag identification. EURASIP J. Wirel. Commun. Netw. 2011: 139 (2011) - [j7]Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li:
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. Int. J. Commun. Syst. 24(7): 829-836 (2011) - [j6]Kuo-Hui Yeh, Nai-Wei Lo, Enrico Winata:
CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems. J. Inf. Sci. Eng. 27(2): 777-788 (2011) - 2010
- [j5]Nai-Wei Lo, Kuo-Hui Yeh:
Anonymous Coexistence Proofs for RFID Tags. J. Inf. Sci. Eng. 26(4): 1213-1230 (2010) - [j4]Nai-Wei Lo, Kuo-Hui Yeh:
Mutual RFID Authentication Scheme for Resource-constrained Tags. J. Inf. Sci. Eng. 26(5): 1875-1889 (2010) - [j3]Kuo-Hui Yeh, Chunhua Su, Nai-Wei Lo, Yingjiu Li, Yi-Xiang Hung:
Two robust remote user authentication protocols using smart cards. J. Syst. Softw. 83(12): 2556-2565 (2010) - [c7]Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li, Enrico Winata:
An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. AINA Workshops 2010: 335-338 - [c6]Nai-Wei Lo, Kuo-Hui Yeh:
A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems. AINA Workshops 2010: 562-566 - [c5]Nai-Wei Lo, Kuo-Hui Yeh:
De-synchronization attack on RFID authentication protocols. ISITA 2010: 566-570
2000 – 2009
- 2009
- [j2]Nai-Wei Lo, Kuo-Hui Yeh:
Cryptanalysis of two three-party encrypted key exchange protocols. Comput. Stand. Interfaces 31(6): 1167-1174 (2009) - [c4]Kuo-Hui Yeh, Nai-Wei Lo:
Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. IAS 2009: 532-535 - 2008
- [j1]Nai-Wei Lo, Kuo-Hui Yeh, Chan Yeob Yeun:
New mutual agreement protocol to secure mobile RFID-enabled devices. Inf. Secur. Tech. Rep. 13(3): 151-157 (2008) - [c3]Kuo-Hui Yeh, Nai-Wei Lo, Enrico Winata:
An Efficient Tree-Based Tag Identification Protocol for RFID Systems. AINA Workshops 2008: 966-970 - 2007
- [c2]Nai-Wei Lo, Kuo-Hui Yeh:
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. EUC Workshops 2007: 43-56 - [c1]Nai-Wei Lo, Kuo-Hui Yeh:
Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. Secure Data Management 2007: 203-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint