default search action
Yingqi Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Yingqi Liu, Jingwen He, Yihao Liu, Xinqi Lin, Fanghua Yu, Jinfan Hu, Yu Qiao, Chao Dong:
AdaptBIR: Adaptive Blind Image Restoration with latent diffusion prior for higher fidelity. Pattern Recognit. 155: 110659 (2024) - [j11]Fei Gao, Jinshuo Liu, Yingqi Liu, Zhenhai Gao, Rui Zhao:
Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages. Sensors 24(11): 3461 (2024) - 2022
- [j10]Xiaoyu Chen, Zhijie Teng, Yingqi Liu, Jun Lu, Lianfa Bai, Jing Han:
Infrared-Visible Image Fusion Based on Semantic Guidance and Visual Perception. Entropy 24(10): 1327 (2022) - [j9]Wenchao Chen, Bo Chen, Yingqi Liu, Xuefei Cao, Qianru Zhao, Hao Zhang, Long Tian:
Max-Margin Deep Diverse Latent Dirichlet Allocation With Continual Learning. IEEE Trans. Cybern. 52(7): 5639-5653 (2022) - 2021
- [j8]Ruijun Chen, Yingqi Liu, Fei Zhou:
Turning Danger into Safety: The Origin, Research Context and Theoretical Framework of Organizational Resilience. IEEE Access 9: 48899-48913 (2021) - 2020
- [j7]Jinwei Wan, Bo Chen, Yingqi Liu, Yijun Yuan, Hongwei Liu, Lin Jin:
Recognizing the HRRP by Combining CNN and BiRNN With Attention Mechanism. IEEE Access 8: 20828-20837 (2020) - [j6]Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang:
Black-box adversarial sample generation based on differential evolution. J. Syst. Softw. 170: 110767 (2020) - 2018
- [j5]Yuting Wu, Mei Yuan, Shaopeng Dong, Li Lin, Yingqi Liu:
Remaining useful life estimation of engineered systems using vanilla LSTM neural networks. Neurocomputing 275: 167-179 (2018) - 2015
- [j4]Huifeng Pan, Yingqi Liu, Hongwei Gao:
Impact of agricultural industrial structure adjustment on energy conservation and income growth in Western China: a statistical study. Ann. Oper. Res. 228(1): 23-33 (2015) - [j3]Qiao Yu, Shujuan Jiang, Yingqi Liu:
A Detection and Measurement Approach for Memory Leaked Objects in Java Programs. IEICE Trans. Inf. Syst. 98-D(5): 1053-1061 (2015) - 2014
- [j2]Shujuan Jiang, Dandan Yi, Xiaolin Ju, Lingsai Wang, Yingqi Liu:
An approach for test data generation using program slicing and particle swarm optimization. Neural Comput. Appl. 25(7-8): 2047-2055 (2014) - 2011
- [j1]Xiongfei Guo, Yingqi Liu:
The Analysis of China New Energy Vehicle Industry Alliance Status Based on UCINET Software. J. Comput. 6(9): 1852-1856 (2011)
Conference and Workshop Papers
- 2024
- [c37]Yingqi Liu, Yifan Shi, Baoyuan Wu, Qinglun Li, Xueqian Wang, Li Shen:
Decentralized Directed Collaboration for Personalized Federated Learning. CVPR 2024: 23168-23178 - [c36]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Lotus: Evasive and Resilient Backdoor Attacks through Sub-Partitioning. CVPR 2024: 24798-24809 - 2023
- [c35]Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Detecting Backdoors in Pre-trained Encoders. CVPR 2023: 16352-16362 - [c34]Qiuling Xu, Guanhong Tao, Jean Honorio, Yingqi Liu, Shengwei An, Guangyu Shen, Siyuan Cheng, Xiangyu Zhang:
MEDIC: Remove Model Backdoors via Importance Driven Cloning. CVPR 2023: 20485-20494 - [c33]Yifan Shi, Yingqi Liu, Kang Wei, Li Shen, Xueqian Wang, Dacheng Tao:
Make Landscape Flatter in Differentially Private Federated Learning. CVPR 2023: 24552-24562 - [c32]Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang:
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning. ICLR 2023 - [c31]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. NDSS 2023 - [c30]Guangyu Shen, Siyuan Cheng, Guanhong Tao, Kaiyuan Zhang, Yingqi Liu, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration. NeurIPS 2023 - [c29]Shengwei An, Yuan Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang:
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes. SP 2023: 899-916 - [c28]Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang:
PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis. USENIX Security Symposium 2023: 2365-2382 - 2022
- [c27]Zheyuan Li, Yingqi Liu, Xiangyu Chen, Haoming Cai, Jinjin Gu, Yu Qiao, Chao Dong:
Blueprint Separable Residual Network for Efficient Image Super-Resolution. CVPR Workshops 2022: 832-842 - [c26]Yawei Li, Kai Zhang, Radu Timofte, Luc Van Gool, Fangyuan Kong, Mingxi Li, Songwei Liu, Zongcai Du, Ding Liu, Chenhui Zhou, Jingyi Chen, Qingrui Han, Zheyuan Li, Yingqi Liu, Xiangyu Chen, Haoming Cai, Yu Qiao, Chao Dong, Long Sun, Jinshan Pan, Yi Zhu, Zhikai Zong, Xiaoxiao Liu, Zheng Hui, Tao Yang, Peiran Ren, Xuansong Xie, Xian-Sheng Hua, Yanbo Wang, Xiaozhong Ji, Chuming Lin, Donghao Luo, Ying Tai, Chengjie Wang, Zhizhong Zhang, Yuan Xie, Shen Cheng, Ziwei Luo, Lei Yu, Zhihong Wen, Qi Wu, Youwei Li, Haoqiang Fan, Jian Sun, Shuaicheng Liu, Yuanfei Huang, Meiguang Jin, Hua Huang, Jing Liu, Xinjian Zhang, Yan Wang, Lingshun Long, Gen Li, Yuanfan Zhang, Zuowei Cao, Lei Sun, Panaetov Alexander, Yucong Wang, Minjie Cai, Li Wang, Lu Tian, Zheyuan Wang, Hongbing Ma, Jie Liu, Chao Chen, Yidong Cai, Jie Tang, Gangshan Wu, Weiran Wang, Shirui Huang, Honglei Lu, Huan Liu, Keyan Wang, Jun Chen, Shi Chen, Yuchun Miao, Zimo Huang, Lefei Zhang, Mustafa Ayazoglu, Wei Xiong, Chengyi Xiong, Fei Wang, Hao Li, Ruimian Wen, Zhijing Yang, Wenbin Zou, Weixin Zheng, Tian Ye, Yuncheng Zhang, Xiangzhen Kong, Aditya Arora, Syed Waqas Zamir, Salman H. Khan, Munawar Hayat, Fahad Shahbaz Khan, Dandan Gao, Dengwen Zhou, Qian Ning, Jingzhu Tang, Han Huang, Yufei Wang, Zhangheng Peng, Haobo Li, Wenxue Guan, Shenghua Gong, Xin Li, Jun Liu, Wanjun Wang, Kun Zeng, Hanjiang Lin, Xinyu Chen, Jinsheng Fang:
NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results. CVPR Workshops 2022: 1061-1101 - [c25]Guanhong Tao, Guangyu Shen, Yingqi Liu, Shengwei An, Qiuling Xu, Shiqing Ma, Pan Li, Xiangyu Zhang:
Better Trigger Inversion Optimization in Backdoor Scanning. CVPR 2022: 13358-13368 - [c24]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
Complex Backdoor Detection by Symmetric Feature Differencing. CVPR 2022: 14983-14993 - [c23]Lin Zhou, Haoming Cai, Jinjin Gu, Zheyuan Li, Yingqi Liu, Xiangyu Chen, Yu Qiao, Chao Dong:
Efficient Image Super-Resolution Using Vast-Receptive-Field Attention. ECCV Workshops (2) 2022: 256-272 - [c22]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense. ICML 2022: 19879-19892 - [c21]Kun Qiu, Harry Chang, Ying Wang, Xiahui Yu, Wenjun Zhu, Yingqi Liu, Jianwei Ma, Weigang Li, Xiaobo Liu, Shuo Dai:
Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps. ICUFN 2022: 392-398 - [c20]Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Shengwei An, Jingwei Xu, Xiangyu Zhang, Yuan Yao:
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity. NDSS 2022 - [c19]Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang:
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security. SP 2022: 1372-1389 - [c18]Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Piccolo: Exposing Complex Backdoors in NLP Transformer Models. SP 2022: 2025-2042 - 2021
- [c17]Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. AAAI 2021: 1148-1156 - [c16]Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang:
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization. ICML 2021: 9525-9536 - 2020
- [c15]Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang:
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features. CCS 2020: 113-131 - [c14]Guanhong Tao, Shiqing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang:
TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks. ICSE 2020: 986-998 - 2019
- [c13]Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang:
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. CCS 2019: 1265-1282 - [c12]Wen-Chuan Lee, Yingqi Liu, Peng Liu, Shiqing Ma, Hongjun Choi, Xiangyu Zhang, Rajiv Gupta:
White-Box Program Tuning. CGO 2019: 122-135 - [c11]Fei Zhou, Yingqi Liu, Rui Xi:
Research on Comprehensive Evaluation System of Property Service Enterprises. ICEME 2019: 85-89 - [c10]Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang:
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. NDSS 2019 - [c9]Wen-Chuan Lee, Peng Liu, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Programming support for autonomizing software. PLDI 2019: 702-716 - 2018
- [c8]Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:
Trojaning Attack on Neural Networks. NDSS 2018 - [c7]Guanhong Tao, Shiqing Ma, Yingqi Liu, Xiangyu Zhang:
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples. NeurIPS 2018: 7728-7739 - [c6]Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama:
MODE: automated neural network model debugging via state differential analysis and input selection. ESEC/SIGSOFT FSE 2018: 175-186 - 2017
- [c5]Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, I Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng, Xiangyu Zhang, Patrick Eugster:
PAD: programming third-party web advertisement censorship. ASE 2017: 240-251 - [c4]Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang:
LAMP: data provenance for graph based machine learning algorithms through derivative computation. ESEC/SIGSOFT FSE 2017: 786-797 - 2015
- [c3]Xingya Wang, Shujuan Jiang, Xiaolin Ju, Heling Cao, Yingqi Liu:
Mitigating the Dependence Confounding Effect for Effective Predicate-Based Statistical Fault Localization. COMPSAC 2015: 105-114 - 2013
- [c2]Yingqi Liu, Wei Li, Shujuan Jiang, Yanmei Zhang, Xiaolin Ju:
An Approach for Fault Localization Based on Program Slicing and Bayesian. QSIC 2013: 326-332 - 2012
- [c1]Shujuan Jiang, Wei Li, Haiyang Li, Yanmei Zhang, Hongchang Zhang, Yingqi Liu:
Fault Localization for Null Pointer Exception Based on Stack Trace and Program Slicing. QSIC 2012: 9-12
Informal and Other Publications
- 2024
- [i20]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning. CoRR abs/2403.17188 (2024) - [i19]Yingqi Liu, Yifan Shi, Qinglun Li, Baoyuan Wu, Xueqian Wang, Li Shen:
Decentralized Directed Collaboration for Personalized Federated Learning. CoRR abs/2405.17876 (2024) - 2023
- [i18]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. CoRR abs/2301.06241 (2023) - [i17]Yifan Shi, Yingqi Liu, Kang Wei, Li Shen, Xueqian Wang, Dacheng Tao:
Make Landscape Flatter in Differentially Private Federated Learning. CoRR abs/2303.11242 (2023) - [i16]Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Detecting Backdoors in Pre-trained Encoders. CoRR abs/2303.15180 (2023) - [i15]Yifan Shi, Kang Wei, Li Shen, Yingqi Liu, Xueqian Wang, Bo Yuan, Dacheng Tao:
Towards the Flatter Landscape and Better Generalization in Federated Learning under Client-level Differential Privacy. CoRR abs/2305.00873 (2023) - [i14]Yifan Shi, Yingqi Liu, Yan Sun, Zihao Lin, Li Shen, Xueqian Wang, Dacheng Tao:
Towards More Suitable Personalization in Federated Learning via Decentralized Partial Model Training. CoRR abs/2305.15157 (2023) - 2022
- [i13]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense. CoRR abs/2202.05749 (2022) - [i12]Yawei Li, Kai Zhang, Radu Timofte, Luc Van Gool, Fangyuan Kong, Mingxi Li, Songwei Liu, Zongcai Du, Ding Liu, Chenhui Zhou, Jingyi Chen, Qingrui Han, Zheyuan Li, Yingqi Liu, Xiangyu Chen, Haoming Cai, Yu Qiao, Chao Dong, Long Sun, Jinshan Pan, Yi Zhu, Zhikai Zong, Xiaoxiao Liu, Zheng Hui, Tao Yang, Peiran Ren, Xuansong Xie, Xian-Sheng Hua, Yanbo Wang, Xiaozhong Ji, Chuming Lin, Donghao Luo, Ying Tai, Chengjie Wang, Zhizhong Zhang, Yuan Xie, Shen Cheng, Ziwei Luo, Lei Yu, Zhihong Wen, Qi Wu, Youwei Li, Haoqiang Fan, Jian Sun, Shuaicheng Liu, Yuanfei Huang, Meiguang Jin, Hua Huang, Jing Liu, Xinjian Zhang, Yan Wang, Lingshun Long, Gen Li, Yuanfan Zhang, Zuowei Cao, Lei Sun, Panaetov Alexander, Yucong Wang, Minjie Cai, Li Wang, Lu Tian, Zheyuan Wang, Hongbing Ma, Jie Liu, Chao Chen, Yidong Cai, et al.:
NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results. CoRR abs/2205.05675 (2022) - [i11]Zheyuan Li, Yingqi Liu, Xiangyu Chen, Haoming Cai, Jinjin Gu, Yu Qiao, Chao Dong:
Blueprint Separable Residual Network for Efficient Image Super-Resolution. CoRR abs/2205.05996 (2022) - [i10]Guanhong Tao, Yingqi Liu, Siyuan Cheng, Shengwei An, Zhuo Zhang, Qiuling Xu, Guangyu Shen, Xiangyu Zhang:
DECK: Model Hardening for Defending Pervasive Backdoors. CoRR abs/2206.09272 (2022) - [i9]Kun Qiu, Harry Chang, Ying Wang, Xiahui Yu, Wenjun Zhu, Yingqi Liu, Jianwei Ma, Weigang Li, Xiaobo Liu, Shuo Dai:
Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps. CoRR abs/2208.07558 (2022) - [i8]Lin Zhou, Haoming Cai, Jinjin Gu, Zheyuan Li, Yingqi Liu, Xiangyu Chen, Yu Qiao, Chao Dong:
Efficient Image Super-Resolution using Vast-Receptive-Field Attention. CoRR abs/2210.05960 (2022) - [i7]Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang:
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning. CoRR abs/2210.12873 (2022) - [i6]Guanhong Tao, Zhenting Wang, Siyuan Cheng, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang:
Backdoor Vulnerabilities in Normally Trained Deep Learning Models. CoRR abs/2211.15929 (2022) - 2021
- [i5]Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang:
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization. CoRR abs/2102.05123 (2021) - [i4]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry. CoRR abs/2103.08820 (2021) - 2020
- [i3]Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang:
Black-box Adversarial Sample Generation Based on Differential Evolution. CoRR abs/2007.15310 (2020) - [i2]Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. CoRR abs/2012.11212 (2020) - 2018
- [i1]Guanhong Tao, Shiqing Ma, Yingqi Liu, Xiangyu Zhang:
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples. CoRR abs/1810.11580 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint