default search action
Fei Peng 0001
Person information
- affiliation: Guangzhou University, Guangzhou, Guangdong, China
Other persons with the same name
- Fei Peng — disambiguation page
- Fei Peng 0002 — Southeast University, Nanjing, China
- Fei Peng 0003 — Beijing University of Posts and Telecommunications, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j68]Cheng Zhang, Bo Ou, Fei Peng, Yao Zhao, Keqin Li:
A Survey on Reversible Data Hiding for Uncompressed Images. ACM Comput. Surv. 56(7): 180:1-180:33 (2024) - [j67]Min Long, Jun Zhou, Le-Bing Zhang, Fei Peng, Dengyong Zhang:
ADFF: Adaptive de-morphing factor framework for restoring accomplice's facial image. IET Image Process. 18(2): 470-480 (2024) - [j66]Min Long, Qiangqiang Duan, Le-Bing Zhang, Fei Peng, Dengyong Zhang:
Trans-FD: Transformer-Based Representation Interaction for Face De-Morphing. IEEE Trans. Biom. Behav. Identity Sci. 6(3): 385-397 (2024) - [j65]Min Long, Quantao Yao, Le-Bing Zhang, Fei Peng:
Face De-Morphing Based on Diffusion Autoencoders. IEEE Trans. Inf. Forensics Secur. 19: 3051-3063 (2024) - [j64]Shaowei Wang, Yuntong Li, Yusen Zhong, Kongyang Chen, Xianmin Wang, Zhili Zhou, Fei Peng, Yuqiu Qian, Jiachun Du, Wei Yang:
Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation. IEEE Trans. Mob. Comput. 23(8): 8050-8065 (2024) - [j63]Gangyang Hou, Bo Ou, Min Long, Fei Peng:
Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction. IEEE Trans. Multim. 26: 2395-2407 (2024) - [j62]Fei Peng, Le Qin, Min Long, Jin Li:
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 192:1-192:28 (2024) - [c34]Yan He, Fei Peng, Min Long, Kwok-Yan Lam:
Causality-Inspired Single-Source Domain Generalization for Face Anti-Spoofing. ICASSP 2024: 4925-4929 - [c33]Weixuan Tang, Haoyu Yang, Yuan Rao, Zhili Zhou, Fei Peng:
Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography. ACM Multimedia 2024: 10440-10448 - 2023
- [j61]Yan He, Fei Peng, Min Long:
Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning. IEEE Trans. Biom. Behav. Identity Sci. 5(4): 579-592 (2023) - [j60]Fei Peng, Tongxin Liao, Min Long, Jin Li, Wensheng Zhang, Yicong Zhou:
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6531-6543 (2023) - [j59]Fei Peng, Wenyan Jiang, Min Long, Keqin Li:
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning. IEEE Trans. Dependable Secur. Comput. 20(3): 1867-1881 (2023) - [j58]Fei Peng, Bo Long, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy. IEEE Trans. Multim. 25: 892-906 (2023) - [j57]Fei Peng, Wenyan Jiang, Min Long:
A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 53:1-53:20 (2023) - [c32]Enming Lu, Fei Peng:
Research and Implementation of EXFAT File System Reconstruction Algorithm Based on Cluster Size Assumption and Computational Verification. AIS&P (1) 2023: 300-315 - [c31]Fei Peng, Min Long:
3DPS: 3D Printing Signature for Authentication Based on Equipment Distortion Model. IWDW 2023: 139-150 - 2022
- [j56]Fei Peng, Shao-hua Meng, Min Long:
Presentation attack detection based on two-stream vision transformers with self-attention fusion. J. Vis. Commun. Image Represent. 85: 103518 (2022) - [j55]Fei Peng, Le Qin, Min Long:
Face morphing attack detection and attacker identification based on a watchlist. Signal Process. Image Commun. 107: 116748 (2022) - [j54]Fei Peng, Guanfu Chen, Min Long:
A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5817-5829 (2022) - [j53]Fei Peng, Liping Yin, Min Long:
BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics. IEEE Trans. Circuits Syst. Video Technol. 32(10): 6657-6670 (2022) - [j52]Fei Peng, Tongxin Liao, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation. IEEE Trans. Circuits Syst. Video Technol. 32(12): 8394-8408 (2022) - [j51]Le Qin, Fei Peng, Min Long:
Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision. IEEE Trans. Inf. Forensics Secur. 17: 3649-3662 (2022) - [j50]Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch:
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. ACM Trans. Priv. Secur. 25(1): 4:1-4:28 (2022) - [c30]Fei Peng, Shao-hua Meng, Min Long:
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion. ML4CS (2) 2022: 283-298 - [c29]Fei Peng, Xin-lin Zhang, Min Long:
F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps. ML4CS (2) 2022: 355-369 - [c28]Min Long, Chengkun Jia, Fei Peng:
Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces. ML4CS (3) 2022: 439-454 - 2021
- [j49]Min Long, Sai Long, Fei Peng, Xiao-hua Hu:
Identifying natural images and computer-generated graphics based on convolutional neural network. Int. J. Auton. Adapt. Commun. Syst. 14(1/2): 151-162 (2021) - [j48]Le Qin, Fei Peng, Sushma Venkatesh, Raghavendra Ramachandra, Min Long, Christoph Busch:
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation. IEEE Trans. Biom. Behav. Identity Sci. 3(1): 72-88 (2021) - [j47]Fei Peng, Zi-Xing Lin, Xiang Zhang, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting. IEEE Trans. Circuits Syst. Video Technol. 31(1): 411-424 (2021) - [j46]Fei Peng, Bo Long, Min Long:
A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4538-4553 (2021) - [c27]Le-Bing Zhang, Juan Cai, Fei Peng, Min Long:
MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network. IWDW 2021: 17-31 - 2020
- [j45]Xiang Zhang, Fei Peng, Zi-Xing Lin, Min Long:
A Coverless Image Information Hiding Algorithm Based on Fractal Theory. Int. J. Bifurc. Chaos 30(4): 2050062:1-2050062:20 (2020) - [j44]Fei Peng, Le Qin, Min Long:
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning. J. Vis. Commun. Image Represent. 66: 102746 (2020) - [j43]Min Long, Yu Zhao, Xiang Zhang, Fei Peng:
A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering. Signal Process. 176: 107703 (2020) - [j42]Fei Peng, Yu Zhao, Xiang Zhang, Min Long, Weiqiang Pan:
Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Process. Image Commun. 81 (2020) - [j41]Fei Peng, Wen-Yan Jiang, Ying Qi, Zi-Xing Lin, Min Long:
Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2391-2405 (2020) - [j40]Fei Peng, Xiang Zhang, Zi-Xing Lin, Min Long:
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2765-2780 (2020) - [j39]Fei Peng, Liping Yin, Le-Bing Zhang, Min Long:
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network. IEEE Trans. Multim. 22(10): 2511-2525 (2020) - [c26]Min Long, Sai Long, Guo-lou Ping, Fei Peng:
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing. ICCCN 2020: 1-9 - [c25]Fei Peng, Wenjie Qian, Min Long:
Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision. IWDW 2020: 136-149
2010 – 2019
- 2019
- [j38]Fei Peng, Le-Bing Zhang, Min Long:
FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image. IEEE Access 7: 75122-75131 (2019) - [j37]Fei Peng, Jing Yang, Zi-Xing Lin, Min Long:
Source identification of 3D printed objects based on inherent equipment distortion. Comput. Secur. 82: 173-183 (2019) - [j36]Min Long, You Li, Fei Peng:
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree. Int. J. Digit. Crime Forensics 11(1): 126-137 (2019) - [j35]Min Long, Fei Peng, Yin Zhu:
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU. Multim. Tools Appl. 78(1): 489-506 (2019) - [j34]Fei Peng, Qin Long, Zi-Xing Lin, Min Long:
A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multim. Tools Appl. 78(19): 26885-26905 (2019) - [j33]Fei Peng, Wang Ming, Xiang Zhang, Min Long:
A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion. Signal Process. Image Commun. 78: 426-436 (2019) - [j32]Fei Peng, Zi-Xing Lin, Xiang Zhang, Min Long:
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers. IEEE Trans. Inf. Forensics Secur. 14(9): 2400-2411 (2019) - [j31]Fei Peng, Jing Yang, Min Long:
3-D Printed Object Authentication Based on Printing Noise and Digital Signature. IEEE Trans. Reliab. 68(1): 342-353 (2019) - [c24]Fei Peng, Guo-lou Ping, Shuang-kui Ge:
A Face Privacy Protection Scheme Using CNN Based ROI Editing. HPCC/SmartCity/DSS 2019: 345-352 - 2018
- [j30]Jiangjin Yin, Bo Ou, Xuan Liu, Fei Peng:
Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching. Digit. Signal Process. 81: 173-185 (2018) - [j29]Juan Chen, Fei Peng:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. Int. J. Digit. Crime Forensics 10(1): 67-78 (2018) - [j28]Min Long, Fei Peng, Xiaoqing Gong:
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network. Int. J. Digit. Crime Forensics 10(2): 23-39 (2018) - [j27]Fei Peng, Shuai-ping Wang, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling. Int. J. Digit. Crime Forensics 10(4): 80-89 (2018) - [j26]Min Long, Fei Peng, Han-yun Li:
Separable reversible data hiding and encryption for HEVC video. J. Real Time Image Process. 14(1): 171-182 (2018) - [j25]Le-Bing Zhang, Fei Peng, Le Qin, Min Long:
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51: 56-69 (2018) - [j24]Fei Peng, Le Qin, Min Long:
Face presentation attack detection using guided scale texture. Multim. Tools Appl. 77(7): 8883-8909 (2018) - [j23]Zi-Xing Lin, Fei Peng, Min Long:
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. IEEE Trans. Inf. Forensics Secur. 13(9): 2372-2382 (2018) - [j22]Xiang Zhang, Fei Peng, Min Long:
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. IEEE Trans. Multim. 20(12): 3223-3238 (2018) - [c23]Fei Peng, Le Qin, Min Long:
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection. ICCCN 2018: 1-9 - [c22]Le-Bing Zhang, Fei Peng, Min Long:
Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise. ICME 2018: 1-6 - [i1]Fei Peng, Le-Bing Zhang, Min Long:
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image. CoRR abs/1811.07665 (2018) - 2017
- [j21]Min Long, You Li, Fei Peng:
Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos. Int. J. Bifurc. Chaos 27(4): 1750054:1-1750054:12 (2017) - [j20]Juan Chen, Fei Peng, Jie Li, Min Long:
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping. Int. J. Digit. Crime Forensics 9(2): 25-37 (2017) - [j19]Bo Ou, Xiaolong Li, Jinwei Wang, Fei Peng:
High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion. Neurocomputing 226: 23-34 (2017) - [j18]Le-Bing Zhang, Fei Peng, Min Long:
Identifying source camera using guided image estimation and block weighted average. J. Vis. Commun. Image Represent. 48: 471-479 (2017) - [j17]Fei Peng, Xiaoqing Gong, Min Long, Xingming Sun:
A selective encryption scheme for protecting H.264/AVC video in multimedia social network. Multim. Tools Appl. 76(3): 3235-3253 (2017) - [j16]Zi-Xing Lin, Fei Peng, Min Long:
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web. Signal Process. Image Commun. 57: 134-146 (2017) - [c21]Le Qin, Le-Bing Zhang, Fei Peng, Min Long:
Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern. CCBR 2017: 118-126 - [c20]Zinelabdine Boulkenafet, Jukka Komulainen, Zahid Akhtar, Azeddine Benlamoudi, Djamel Samai, Salah Eddine Bekhouche, Abdelkrim Ouafi, Fadi Dornaika, Abdelmalik Taleb-Ahmed, Le Qin, Fei Peng, L. B. Zhang, Min Long, Shruti Bhilare, Vivek Kanhangad, Artur Costa-Pazo, Esteban Vázquez-Fernández, Daniel Pérez-Cabo, J. J. Moreira-Perez, Daniel González-Jiménez, Amir Mohammadi, Sushil Bhattacharjee, Sébastien Marcel, Svetlana Volkova, Y. Tang, N. Abe, L. Li, X. Feng, Z. Xia, X. Jiang, S. Liu, Rui Shao, Pong C. Yuen, Waldir R. de Almeida, Fernanda A. Andaló, Rafael Padilha, Gabriel Bertocco, William Dias, Jacques Wainer, Ricardo da Silva Torres, Anderson Rocha, Marcus A. Angeloni, Guilherme Folego, Alan Godoy, Abdenour Hadid:
A competition on generalized software-based face presentation attack detection in mobile scenarios. IJCB 2017: 688-696 - [c19]Fei Peng, Shuai-ping Wang, Gang Luo, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling. ICCCS (1) 2017: 3-15 - [c18]Juan Chen, Fei Peng, Min Long:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. ICCCS (2) 2017: 396-407 - [c17]Fei Peng, Zhen-Jie Yan, Min Long:
A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping. SpaCCS Workshops 2017: 147-158 - [c16]Fei Peng, Xiao-hua Hu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces. SpaCCS 2017: 368-380 - 2016
- [j15]Qiuwei Yang, Fei Peng, Jiao-Ting Li, Min Long:
Image tamper detection based on noise estimation and lacunarity texture. Multim. Tools Appl. 75(17): 10201-10211 (2016) - [c15]Le-Bing Zhang, Fei Peng, Min Long:
Source Camera Identification Based on Guided Image Estimation and Block Weighted Average. IWDW 2016: 106-118 - [c14]Fei Peng, Le Qin, Min Long:
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. SecureComm 2016: 774-777 - 2015
- [j14]Min Long, Yan Liu, Fei Peng:
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization. Int. J. Digit. Crime Forensics 7(3): 1-18 (2015) - [c13]Fei Peng, Yin Zhu, Min Long:
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU. ICA3PP (2) 2015: 213-226 - [c12]Fei Peng, Xiaolong Li, Bin Yang:
An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors. ICME 2015: 1-6 - 2014
- [j13]Fei Peng, Yan Liu, Min Long:
Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting. Comput. Aided Des. 49: 42-50 (2014) - [j12]Fei Peng, Die-lan Zhou:
Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU. Digit. Investig. 11(2): 111-119 (2014) - [j11]Fei Peng, Xiaolong Li, Bin Yang:
Improved PVO-based reversible data hiding. Digit. Signal Process. 25: 255-265 (2014) - [c11]Fei Peng, Jiaoling Shi, Min Long:
Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU. ICME 2014: 1-6 - 2013
- [j10]Fei Peng, Xiao-wen Zhu, Min Long:
An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System. Int. J. Digit. Crime Forensics 5(2): 35-49 (2013) - [j9]Fei Peng, Chen Li, Min Long:
A reversible watermark scheme for 2D vector map based on reversible contrast mapping. Secur. Commun. Networks 6(9): 1117-1125 (2013) - [j8]Fei Peng, Xiao-wen Zhu, Min Long:
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos. IEEE Trans. Inf. Forensics Secur. 8(10): 1688-1699 (2013) - 2012
- [j7]Min Long, Yunfei Chen, Fei Peng:
Bit error rate improvement for chaos shift keying chaotic communication systems. IET Commun. 6(16): 2639-2644 (2012) - [j6]Fei Peng, Juan Liu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features. Int. J. Digit. Crime Forensics 4(1): 1-16 (2012) - [j5]Fei Peng, Xiaolong Li, Bin Yang:
Adaptive reversible data hiding scheme based on integer transform. Signal Process. 92(1): 54-62 (2012) - [c10]Fei Peng, Xiaolong Li, Bin Yang:
Calibration Based Reliable Detector for Detecting LSB Matching Steganography. IWDW 2012: 44-53 - 2011
- [j4]Fei Peng, Yu-Zhou Lei, Min Long, Xingming Sun:
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput. Aided Des. 43(8): 1018-1024 (2011) - [j3]Min Long, Yunfei Chen, Fei Peng:
Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication. IEEE Commun. Lett. 15(11): 1175-1177 (2011) - [j2]Fei Peng, Honglin Li:
A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features. Int. J. Digit. Crime Forensics 3(2): 35-40 (2011) - [c9]Yi Luo, Fei Peng, Xiaolong Li, Bin Yang:
Reversible image water marking based on prediction-error expansion and compensation. ICME 2011: 1-6 - 2010
- [j1]Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long:
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput. Aided Des. 42(12): 1207-1216 (2010) - [c8]Fei Peng, Yi Luo:
Improved DE-Based Reversible Watermarking Using Sorting and Histogram Shifting. PCM (1) 2010: 611-621
2000 – 2009
- 2009
- [c7]Fei Peng, Yu-Zhou Lei, Chang-Tsun Li, Yue Li:
A reversible watermarking scheme for 2D engineering graphics based on improved quantisation index modulation. ICDP 2009: 1-6 - [c6]Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long:
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation. ISDF 2009: 11-18 - 2008
- [c5]Shuaijun Li, Fei Peng:
An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems. ICYCS 2008: 1435-1439 - [c4]Fei Peng, Tao Deng, Min Long:
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling. ICYCS 2008: 2809-2813 - [c3]Xiaofeng Huang, Fei Peng, Tao Deng:
A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System. IIH-MSP 2008: 339-342 - [c2]Tao Deng, Fei Peng, Xiaofeng Huang:
A Multiple Encryption Algorithm for 2D Engineering Graphic Based on Fourier Descriptors and Chaos Scrambling. IIH-MSP 2008: 1352-1355 - [c1]Qiaozhuo Du, Fei Peng:
A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic. ISECS 2008: 890-893
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint