default search action
Guangjie Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j73]Jie Cheng, Guangjie Liu, Shen Gao, Ahmed Raza, Jiming Li, Wu Juan:
Short-Term Passenger Flow Prediction in Urban Rail Transit Based on Points of Interest. IEEE Access 12: 95196-95208 (2024) - [j72]Kuo Diao, Jinlong Zhu, Guangjie Liu, Meng Li:
MDTrans: Multi-scale and dual-branch feature fusion network based on Swin Transformer for building extraction in remote sensing images. IET Image Process. 18(11): 2930-2942 (2024) - [j71]Fengyuan Nie, Weiwei Liu, Guangjie Liu, Bo Gao:
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system. Internet Things 25: 101102 (2024) - [j70]Yunxiang Li, Wen Tian, Xiaopeng Ji, Guangjie Liu, Yuewei Dai:
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures. IEEE Syst. J. 18(1): 692-701 (2024) - [j69]Bo Gao, Weiwei Liu, Guangjie Liu, Fengyuan Nie:
Resource Knowledge-Driven Heterogeneous Graph Learning for Website Fingerprinting. IEEE Trans. Cogn. Commun. Netw. 10(3): 968-981 (2024) - [j68]Wen Tian, Jifei Du, Xiaopeng Ji, Miao Du, Guangjie Liu, Zhu Han:
UAV-Enabled Communication Strategy Against Detection in Covert Communication With Asymmetric Information. IEEE Trans. Wirel. Commun. 23(7): 6921-6937 (2024) - [c22]Junjie Zhao, Sen Qiao, Jinwei Wang, Guangjie Liu:
Generating Image Adversarial Example by Modifying JPEG Stream. CVDL 2024: 55:1-55:8 - 2023
- [j67]James Msughter Adeke, Guangjie Liu, Junjie Zhao, Nannan Wu, Hafsat Muhammad Bashir:
Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables. Future Internet 15(12): 405 (2023) - [j66]Faiz Ul Islam, Guangjie Liu, Weiwei Liu, Qazi Mazhar ul Haq:
A deep learning-based framework to identify and characterise heterogeneous secure network traffic. IET Inf. Secur. 17(2): 294-308 (2023) - [j65]Xufei Ding, Wen Tian, Guangjie Liu, Xiaopeng Ji:
Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks. Sensors 23(23): 9411 (2023) - [j64]Wen Tian, Xufei Ding, Guangjie Liu, Yuewei Dai, Zhu Han:
A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things. IEEE Trans. Green Commun. Netw. 7(4): 2025-2037 (2023) - [j63]Sen Qiao, Daming Cao, Qiaosheng Eric Zhang, Yinfei Xu, Guangjie Liu:
Covert Communication Gains From Adversary's Uncertainty of Phase Angles. IEEE Trans. Inf. Forensics Secur. 18: 2899-2912 (2023) - [j62]Jifei Du, Wen Tian, Xiaopeng Ji, Miao Du, Guangjie Liu, Yuewei Dai, Zhu Han:
Strategic UAV-Assisted Game Model for Detection in Covert Communication. IEEE Trans. Veh. Technol. 72(6): 7426-7438 (2023) - 2022
- [j61]Yupeng Li, Dong Zhao, Guangjie Liu, Yi Liu, Yasmeen Bano, Alisherjon Ibrohimov, Huiling Chen, Chengwen Wu, Xumin Chen:
Intradialytic hypotension prediction using covariance matrix-driven whale optimizer with orthogonal structure-assisted extreme learning machine. Frontiers Neuroinformatics 16 (2022) - [j60]Luhui Yang, Guangjie Liu, Jinwei Wang, Jiangtao Zhai, Yuewei Dai:
A semantic element representation model for malicious domain name detection. J. Inf. Secur. Appl. 66: 103148 (2022) - [j59]Ailiang Qi, Dong Zhao, Fanhua Yu, Guangjie Liu, Ali Asghar Heidari, Huiling Chen, Abeer D. Algarni, Hela Elmannai, Wenyong Gui:
Directional crossover slime mould algorithm with adaptive Lévy diversity for the optimal design of real-world problems. J. Comput. Des. Eng. 9(6): 2375-2418 (2022) - [j58]Jinwei Wang, Kehui Zeng, Bin Ma, Xiangyang Luo, Qilin Yin, Guangjie Liu, Sunil Kr. Jha:
GAN-generated fake face detection via two-stream CNN with PRNU in the wild. Multim. Tools Appl. 81(29): 42527-42545 (2022) - [c21]Yang Yan, Hui Wang, Guangjie Liu, Wen-Bo Huang:
SPOC Project Teaching Research based on STEAM Education Concept : - - Takes the secondary vocational school "Data Structure" course as an example. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-5 - [i1]Sen Qiao, Daming Cao, Qiaosheng Eric Zhang, Yinfei Xu, Guangjie Liu:
Covert Communication Gains from Adversary's Uncertainty of Phase Angles. CoRR abs/2210.05084 (2022) - 2021
- [j57]Faiz Ul Islam, Guangjie Liu, Jiangtao Zhai, Weiwei Liu:
VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning. IEEE Access 9: 59783-59799 (2021) - [j56]Huiwen Bai, Weiwei Liu, Guangjie Liu, Yuewei Dai, Shuhua Huang:
Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information. IEEE Access 9: 80639-80653 (2021) - [j55]Shuhua Huang, Weiwei Liu, Guangjie Liu, Yuewei Dai, Huiwen Bai:
A correlation-based approach to detecting wireless physical covert channels. Comput. Commun. 176: 31-39 (2021) - [j54]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yuewei Dai, Huiwen Bai:
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code. Int. J. Digit. Crime Forensics 13(2): 115-133 (2021) - [j53]Wen Tian, Miao Du, Xiaopeng Ji, Guangjie Liu, Yuewei Dai, Zhu Han:
Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game. IEEE Internet Things J. 8(24): 17372-17381 (2021) - [j52]Luhui Yang, Guangjie Liu, Jinwei Wang, Huiwen Bai, Jiangtao Zhai, Yuewei Dai:
Fast3DS: A real-time full-convolutional malicious domain name detection system. J. Inf. Secur. Appl. 61: 102933 (2021) - [j51]Xiaopeng Ji, Wen Tian, Weiwei Liu, Guangjie Liu:
Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model. J. Ambient Intell. Humaniz. Comput. 12(9): 8859-8866 (2021) - [j50]Guangjie Liu, Jinlong Zhu, Qiucheng Sun, Jiaze Hu, Hao Yu:
Route Optimization Algorithm Based on Game Theory for Tourism Routes at Pseudo-Imperial Palace. J. Inf. Process. Syst. 17(5): 879-891 (2021) - [j49]Luhui Yang, Guangjie Liu, Weiwei Liu, Huiwen Bai, Jiangtao Zhai, Yuewei Dai:
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model. Secur. Commun. Networks 2021: 5567635:1-5567635:20 (2021) - [j48]Huiwen Bai, Guangjie Liu, Weiwei Liu, Yingxue Quan, Shuhua Huang:
N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection. Secur. Commun. Networks 2021: 5599556:1-5599556:17 (2021) - [j47]Wen Tian, Miao Du, Xiaopeng Ji, Guangjie Liu, Yuewei Dai, Zhu Han:
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure. IEEE Trans. Smart Grid 12(5): 4259-4268 (2021) - [c20]Guangjie Liu, Xin Ma, Jinlong Zhu, Yu Zhang, Danyang Yang:
Self-Attention based Multitasking Sequential Recom Mendation. ICCSE 2021: 833-838 - 2020
- [j46]Qingliang Li, Huibowen Hao, Yang Zhao, Qingtian Geng, Guangjie Liu, Yu Zhang, Fanhua Yu:
GANs-LSTM Model for Soil Temperature Estimation From Meteorological: A New Approach. IEEE Access 8: 59427-59443 (2020) - [j45]Wen Tian, Xiaopeng Ji, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Shuhua Huang:
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid. IEEE Access 8: 64075-64085 (2020) - [j44]Luhui Yang, Guangjie Liu, Yuewei Dai, Jinwei Wang, Jiangtao Zhai:
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework. IEEE Access 8: 82876-82889 (2020) - [j43]Shuhua Huang, Xiaogeng Hou, Weiwei Liu, Guangjie Liu, Yuewei Dai, Wen Tian:
Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication. IEEE Access 8: 180341-180351 (2020) - [j42]Jinwei Wang, Qiye Ni, Guangjie Liu, Xiangyang Luo, Sunil Kr. Jha:
Image splicing detection based on convolutional neural network with weight combination strategy. J. Inf. Secur. Appl. 54: 102523 (2020) - [j41]Shuhua Huang, Weiwei Liu, Guangjie Liu, Yuewei Dai, Wen Tian:
Exploiting Correlation Characteristics to Detect Covert digital communication. KSII Trans. Internet Inf. Syst. 14(8): 3550-3566 (2020) - [j40]Jinlong Zhu, Fanhua Yu, Guangjie Liu, Mingyu Sun, Dong Zhao, Qingtian Geng, Jinbo Su:
Classroom Roll-Call System Based on ResNet Networks. J. Inf. Process. Syst. 16(5): 1145-1157 (2020)
2010 – 2019
- 2019
- [j39]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. KSII Trans. Internet Inf. Syst. 13(4): 1866-1883 (2019) - [j38]Yuewei Dai, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai:
An end-to-end generative network for environmental sound-based covert communication. Multim. Tools Appl. 78(7): 8635-8653 (2019) - [j37]Yanlin Yang, Jinliang Wang, Yun Chen, Feng Cheng, Guangjie Liu, Zenghong He:
Remote-Sensing Monitoring of Grassland Degradation Based on the GDI in Shangri-La, China. Remote. Sens. 11(24): 3030 (2019) - [j36]Luhui Yang, Jiangtao Zhai, Weiwei Liu, Xiaopeng Ji, Huiwen Bai, Guangjie Liu, Yuewei Dai:
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis. Symmetry 11(2): 176 (2019) - 2018
- [j35]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network. IEEE Access 6: 48030-48041 (2018) - [j34]Faiz Ul Islam, Guangjie Liu, Xiangyuan Li:
Image Encryption Scheme Based on 4D4W Hyperchaotic System. J. Inf. Hiding Multim. Signal Process. 9(6): 1391-1403 (2018) - [j33]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. Secur. Commun. Networks 2018: 1214681:1-1214681:15 (2018) - [j32]Weiwei Liu, Guangjie Liu, Yang Xia, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking. Secur. Commun. Networks 2018: 5051270:1-5051270:16 (2018) - [c19]Jin Shi, Li Zhang, Shuijun Yin, Weiwei Liu, Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
A Comprehensive Analysis of Interval Based Network Flow Watermarking. ICCCS (4) 2018: 72-84 - [c18]Luhui Yang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang:
A Novel Detection Method for Word-Based DGA. ICCCS (2) 2018: 472-483 - 2017
- [c17]Hao Wang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Detection of Jitterbug Covert Channel Based on Partial Entropy Test. ICCCS (2) 2017: 357-368 - 2016
- [j31]Hao Wang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation. KSII Trans. Internet Inf. Syst. 10(4): 1927-1943 (2016) - [j30]Lihua Zhang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes. J. Inf. Hiding Multim. Signal Process. 7(5): 1041-1051 (2016) - [j29]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy. Secur. Commun. Networks 9(8): 791-802 (2016) - [j28]Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
Detecting JitterBug covert timing channel with sparse embedding. Secur. Commun. Networks 9(11): 1509-1519 (2016) - [j27]Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Dipak Ghosal:
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation. IEEE Trans. Inf. Forensics Secur. 11(4): 677-690 (2016) - [c16]Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping. ICCCS (1) 2016: 166-177 - 2015
- [j26]Zhiyong Su, Xin Yang, Guangjie Liu, Weiqing Li, Weiqing Tang:
Topology authentication for piping isometric drawings. Comput. Aided Des. 66: 33-44 (2015) - [j25]Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
SkyLen: a Skype-based length covert channel. J. Inf. Hiding Multim. Signal Process. 6(3): 473-481 (2015) - [j24]Lihua Zhang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Improving Reliability of Covert Timing Channel to Packet Loss. J. Inf. Hiding Multim. Signal Process. 6(3): 544-553 (2015) - [j23]Hao Wang, Guangjie Liu, Yuewei Dai, Jin Shi:
A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size. J. Inf. Hiding Multim. Signal Process. 6(4): 750-759 (2015) - [j22]Biao Liu, Shaohua Lan, Jing Zhang, Guangjie Liu:
一种基于递归图的网络时间隐蔽信道检测方法 (Approach Based on Recurrence Plot to Detect Covert Timing Channels). 计算机科学 42(2): 114-117 (2015) - [j21]Weiwei Jiang, Guangjie Liu, Yuewei Dai:
基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort). 计算机科学 42(11): 212-216 (2015) - [j20]Yongfei Yang, Guangjie Liu, Yuewei Dai:
基于信任的反馈云模型WSN节点信任评价机制 (Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network). 计算机科学 42(Z6): 388-392 (2015) - [j19]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. Secur. Commun. Networks 8(9): 1636-1647 (2015) - [c15]Guangjie Liu, Jinliang Wang, Lichi Ma, Wenjie Gao:
Research on extraction method of urban impervious surface information. Geoinformatics 2015: 1-4 - [c14]Yichao Jia, Guangjie Liu, Lihua Zhang:
Bionic camouflage underwater acoustic communication based on sea lion sounds. ICCAIS 2015: 332-336 - [c13]Li Ma, Guangjie Liu:
A hierarchical trust model for cluster-based wireless sensor network. ICCAIS 2015: 337-342 - [c12]Hao Li, Guangjie Liu, Weiwei Jiang, Yuewei Dai:
Designing snort rules to detect abnormal DNP3 network data. ICCAIS 2015: 343-348 - 2014
- [j18]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Syndrome trellis codes based on minimal span generator matrix. Ann. des Télécommunications 69(7-8): 403-416 (2014) - [j17]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity. J. Inf. Hiding Multim. Signal Process. 5(4): 769-777 (2014) - [j16]Lihua Zhang, Guangjie Liu, Yuewei Dai:
Network Packet Length Covert Channel Based on Empirical Distribution Function. J. Networks 9(6): 1440-1446 (2014) - [j15]Guangjie Liu, Weiwei Liu, Yuewei Dai, Shiguo Lian:
Adaptive steganography based on block complexity and matrix embedding. Multim. Syst. 20(2): 227-238 (2014) - [j14]Zhiyong Su, Lang Zhou, Guangjie Liu, Jianshou Kong, Yuewei Dai:
Authenticating topological integrity of process plant models through digital watermarking. Multim. Tools Appl. 73(3): 1687-1707 (2014) - 2013
- [j13]Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
An Improved Retransmission-based Network Steganography: Design and Detection. J. Networks 8(1): 182-188 (2013) - [j12]Guangjie Liu, Junwen Wang, Shiguo Lian, Yuewei Dai:
Detect image splicing with artificial blurred boundary. Math. Comput. Model. 57(11-12): 2647-2659 (2013) - [j11]Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
Detection of TCP covert channel based on Markov model. Telecommun. Syst. 54(3): 333-343 (2013) - 2012
- [j10]Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Network covert timing channel with distribution matching. Telecommun. Syst. 49(2): 199-205 (2012) - 2011
- [j9]Guangjie Liu, Weiwei Liu:
An adaptive matrix embedding based on LSB matching for grey-scale images. Int. J. Multim. Intell. Secur. 2(3/4): 238-251 (2011) - [j8]Guangjie Liu, Junwen Wang, Shiguo Lian, Zhiquan Wang:
A passive image authentication scheme for detecting region-duplication forgery with rotation. J. Netw. Comput. Appl. 34(5): 1557-1565 (2011) - 2010
- [j7]Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Secure Multimedia Distribution Based on Watermarking and Encryption. J. Convergence Inf. Technol. 5(9): 279-286 (2010) - [j6]Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression. J. Digit. Content Technol. its Appl. 4(8): 34-42 (2010) - [j5]Guangjie Liu, Zhan Zhang, Yuewei Dai, Shiguo Lian:
Improved LSB-matching Steganography for Preserving Second-order Statistics. J. Multim. 5(5): 458-463 (2010) - [c11]Guangjie Liu, Wen-yong Wang:
Research on an Educational Software Defect Prediction Model Based on SVM. Edutainment 2010: 215-222
2000 – 2009
- 2009
- [j4]Jianwei Wang, Jianmin Lü, Shiguo Lian, Guangjie Liu:
On the Design of Secure Multimedia Authentication. J. Univers. Comput. Sci. 15(2): 426-443 (2009) - 2008
- [j3]Jinwei Wang, Shiguo Lian, Guangjie Liu, Yuewei Dai, Zhongxuan Liu, Zhen Ren:
Secure multimedia watermarking authentication in wavelet domain. J. Electronic Imaging 17(3): 033010 (2008) - [j2]Shiguo Lian, Jinsheng Sun, Guangjie Liu, Zhiquan Wang:
Efficient video encryption scheme based on advanced video coding. Multim. Tools Appl. 38(1): 75-89 (2008) - [j1]Jinwei Wang, Guangjie Liu, Yuewei Dai, Jinsheng Sun, Zhiquan Wang, Shiguo Lian:
Locally optimum detection for Barni's multiplicative watermarking in DWT domain. Signal Process. 88(1): 117-130 (2008) - [c10]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Robust Hashing Based on Persistent Points for Video Copy Detection. CIS (1) 2008: 305-308 - [c9]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Ming Bao:
Forgery-location highway monitoring systembased on video watermarking. ICNSC 2008: 625-629 - [c8]Yuewei Dai, Jinwei Wang, Guangjie Liu:
Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion. ICNSC 2008: 911-915 - [c7]Ming Bao, Yuewei Dai, Guangjie Liu:
Assessment of Integrated Electronic Information System survivability based on u-function. ICNSC 2008: 1837-1841 - 2007
- [c6]Guangjie Liu, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Image Steganography Based on Quantization-Embedders Combination. ICME 2007: 1115-1118 - [c5]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
A RST-Resilient Watermarking Scheme Based on Invariant Features. SITIS 2007: 927-933 - 2006
- [c4]Jinwei Wang, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Shiguo Lian:
Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms. ICICIC (3) 2006: 471-474 - [c3]Guangjie Liu, Jinwei Wang, Shiguo Lian, Yuewei Dai, Zhiquan Wang:
Data Hiding in Neural Network Prediction Errors. ISNN (2) 2006: 273-278 - 2005
- [c2]Guangjie Liu, Jinwei Wang, Yuewei Dai, Zhiquan Wang:
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. ICNC (3) 2005: 976-979 - [c1]Guangjie Liu, Yuewei Dai, Jinwei Wang, Zhiquan Wang, Shiguo Lian:
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming. MMSP 2005: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint