default search action
Heng Zhang 0001
Person information
- affiliation: Jiangsu Ocean University, School of Science, Jiangsu, China
- affiliation: Huaihai Institute of Technology, Lianyungang, China
- affiliation (PhD 2015): Zhejiang University, College of Control Science and Engineering, Hangzhou, China
Other persons with the same name
- Heng Zhang — disambiguation page
- Heng Zhang 0002 — Shanghai Dianji University, School of Electronic Information Engineering, China (and 2 more)
- Heng Zhang 0003 — VMware Inc, Palo Alto, CA, USA (and 1 more)
- Heng Zhang 0004 — Shandong University, School of Mechanical, Electrical and Information Engineering, Weihai, China
- Heng Zhang 0005 — Chinese Academy of Sciences, Institute of Software, China
- Heng Zhang 0006 — Tianjin University, School of Computer Software, China (and 3 more)
- Heng Zhang 0007 — Chinese Academy of Sciences, Institute of Electronics, Department of Space Microwave Remote Sensing System, Beijing, China
- Heng Zhang 0008 — University of Southern California, Marshall School of Business, Los Angeles, CA, USA
- Heng Zhang 0009 — Darmstadt University of Technology, Germany
- Heng Zhang 0010 — Syracuse University, Department of Mechanical and Aerospace Engineering, NY, USA
- Heng Zhang 0011 — Wuhan University, School of Electronic Information, China
- Heng Zhang 0012 — Southwest University, School of Computer and Information Science, Chongqing, China (and 1 more)
- Heng Zhang 0013 — Central South University, School of Computer Science and Engineering, Changsha, China
- Heng Zhang 0014 — Tongji University, School of Software Engineering, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j57]Chaoqun Yang, Xiaowei Liang, Zhiguo Shi, Heng Zhang, Xianghui Cao:
Augmented LRFS-based filter: Holistic tracking of group objects. Signal Process. 226: 109665 (2025) - 2024
- [j56]Dandan Zhang, Weiyu Liu, Heng Zhang:
Finite-Time Attitude Consensus Tracking Control of Multiple Spacecraft Systems With Input Quantization and Actuator Faults. IEEE Access 12: 147671-147679 (2024) - [j55]Yanhan Wang, Wenting Wang, Xin Wang, Heng Zhang, Xiaoming Wu, Ming Yang:
FedTweet: Two-fold Knowledge Distillation for non-IID Federated Learning. Comput. Electr. Eng. 114: 109067 (2024) - [j54]Rong Fei, Jian Zhang, Liling Bo, Heng Zhang, Hongran Li, Ming Li:
Joint multi-subspace feature learning with singular value decomposition for robust single-sample face recognition. Comput. Electr. Eng. 114: 109085 (2024) - [j53]Xin Wang, Heng Zhang, Ming Yang, Xiaoming Wu, Peng Cheng:
Privacy-Preserving Collaborative Learning: A Scheme Providing Heterogeneous Protection. IEEE Internet Things J. 11(2): 1840-1853 (2024) - [j52]Yan Ren, Heng Zhang, Xianghui Cao, Chaoqun Yang, Jian Zhang, Hongran Li:
Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based Traffic Signal Control. IEEE Internet Things J. 11(4): 5816-5825 (2024) - [j51]Qiyan Zang, Jian Zhang, Liling Bo, Yuchen Xiao, Guangwei Gao, Heng Zhang, Hongran Li, Zhaoman Zhong, Yan Ren:
A fully automatic adjacent key-points localization framework for minimal repeated pattern detection in printed fabric images. Knowl. Based Syst. 300: 112157 (2024) - [j50]Yan Ren, Heng Zhang, Wen Yang, Ming Li, Jian Zhang, Hongran Li:
Transferable Adversarial Attack Against Deep Reinforcement Learning-Based Smart Grid Dynamic Pricing System. IEEE Trans. Ind. Informatics 20(6): 9015-9025 (2024) - [j49]Yan Ren, Heng Zhang, Linkang Du, Zhikun Zhang, Jian Zhang, Hongran Li:
Stealthy Black-Box Attack With Dynamic Threshold Against MARL-Based Traffic Signal Control System. IEEE Trans. Ind. Informatics 20(10): 12021-12031 (2024) - [j48]Zhe Wang, Heng Zhang, Xianghui Cao, Endong Liu, Hongran Li, Jian Zhang:
Modeling and Detection Scheme for Zero-Dynamics Attack on Wind Power System. IEEE Trans. Smart Grid 15(1): 934-943 (2024) - [i1]Chaoqun Yang, Mengdie Xu, Xiaowei Liang, Heng Zhang, Xianghui Cao:
Augmented Labeled Random Finite Sets and Its Application to Group Target Tracking. CoRR abs/2403.13562 (2024) - 2023
- [j47]Haoyu Shu, Jiayu Zhou, Wen Yang, Heng Zhang:
Distortion-based state security codes for distributed sensor networks. Autom. 151: 110904 (2023) - [j46]Hongran Li, Tieli Lv, Yuchao Shui, Jian Zhang, Heng Zhang, Hui Zhao, Saibao Ma:
An Improved grey wolf optimizer with weighting functions and its application to Unmanned Aerial Vehicles path planning. Comput. Electr. Eng. 111(Part A): 108893 (2023) - [j45]Heng Zhang, Jianwei Sun, Xin Wang, Chenglong Gong:
Achieving Physical Layer Security Against Location Unknown Eavesdroppers via Friendly Jammer. IEEE CAA J. Autom. Sinica 10(10): 2038-2040 (2023) - [j44]Jianwei Sun, Heng Zhang, Xin Wang, Ming Yang, Jian Zhang, Hongran Li, Chenglong Gong:
Leveraging UAV-RIS Reflects to Improve the Security Performance of Wireless Network Systems. IEEE Netw. Lett. 5(2): 81-85 (2023) - [j43]Xin Wang, Chongrong Fang, Ming Yang, Xiaoming Wu, Heng Zhang, Peng Cheng:
Resilient Distributed Classification Learning Against Label Flipping Attack: An ADMM-Based Approach. IEEE Internet Things J. 10(17): 15617-15631 (2023) - [j42]Chaoqun Yang, Lei Mo, Xianghui Cao, Heng Zhang, Zhiguo Shi:
A Labeled RFS-Based Framework for Multiple Integrity Attackers Detection and Identification in Cyber-Physical Systems. IEEE Internet Things J. 10(21): 19244-19256 (2023) - [j41]Heng Zhang, Jun Gu, Zhikun Zhang, Linkang Du, Yongmin Zhang, Yan Ren, Jian Zhang, Hongran Li:
Backdoor attacks against deep reinforcement learning based traffic signal control systems. Peer Peer Netw. Appl. 16(1): 466-474 (2023) - [j40]Peipei Chen, Wen Yang, Yun Liu, Heng Zhang, Zhiyun Zhao:
Dynamic Encoding Scheme for State Estimation Over Wireless Sensor Networks. IEEE Trans. Circuits Syst. II Express Briefs 70(11): 4098-4102 (2023) - [j39]Dandan Zhang, Song Zhu, Heng Zhang, Weisheng Si, Wei Xing Zheng:
Fixed-Time Consensus for Multiple Mechanical Systems With Input Dead-Zone and Quantization Under Directed Graphs. IEEE Trans. Netw. Sci. Eng. 10(3): 1525-1536 (2023) - [j38]Chaoqun Yang, Xianghui Cao, Lidong He, Heng Zhang:
Distributed Multiple Attacks Detection via Consensus AA-GMPHD Filter. IEEE Trans. Syst. Man Cybern. Syst. 53(12): 7526-7536 (2023) - [c27]Yinchu Wang, Yan Ren, Heng Zhang, Hongran Li, Jian Zhang:
An Intrusion Detection Method Based on Hash Function for Industrial Cloud Data. ICPADS 2023: 2460-2466 - [c26]Heng Zhang, Lei Wu, Zhemin Sun, Zhikai Zhang, Ming Li, Hongran Li, Jian Zhang:
Maximizing Throughput in Unmanned Surface Vehicle Relay System under Jamming Attacks. MSN 2023: 825-830 - 2022
- [j37]Le Wang, Xianghui Cao, Heng Zhang, Changyin Sun, Wei Xing Zheng:
Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation. Autom. 137: 110145 (2022) - [j36]Jiayu Zhou, Wen Yang, Heng Zhang, Wei Xing Zheng, Yong Xu, Yang Tang:
Security analysis and defense strategy of distributed filtering under false data injection attacks. Autom. 138: 110151 (2022) - [j35]Shuai Xu, Jian Zhang, Xin Qin, Yuchen Xiao, Jianjun Qian, Liling Bo, Heng Zhang, Hongran Li, Zhaoman Zhong:
Deep retinex decomposition network for underwater image enhancement. Comput. Electr. Eng. 100: 107822 (2022) - [j34]Zeyu Zhang, Hongran Li, Heng Zhang, Jian Zhang, Zhaoman Zhong, Weiwei Xu:
Model-free predictive control of nonlinear systems under False Data Injection attacks. Comput. Electr. Eng. 100: 107977 (2022) - [j33]Jian Zhang, Xin Qin, Yuchen Xiao, Rong Fei, Qiyan Zang, Shuai Xu, Liling Bo, Hongran Li, Heng Zhang, Zhaoman Zhong:
Subspace cross representation measure for robust face recognition with few samples. Comput. Electr. Eng. 102: 108162 (2022) - [j32]Yu Zhu, Heng Zhang, Hongran Li, Jian Zhang, Dandan Zhang:
Optimal Jamming Strategy Against Two-State Switched System. IEEE Commun. Lett. 26(3): 706-710 (2022) - [j31]Ruimeng Gan, Yangyang Wang, Zhe Xiao, Heng Zhang, Xin Wang, Ming Yang:
Energy-efficient DoS attack against remote state estimation. Internet Technol. Lett. 5(4) (2022) - [j30]Jian Zhang, Weihua Liu, Liling Bo, Heng Zhang, Hongran Li, Shuai Xu:
Joint Reflectance Field Estimation and Sparse Representation for Face Image Illumination Preprocessing and Recognition. Neural Process. Lett. 54(5): 3551-3564 (2022) - [c25]Yu Zhu, Heng Zhang, Ruijun Liu, Jian Zhang, Hongran Li:
Optimal Jamming Strategy Against Periodically Switched Linear Discrete-Time System. ASCC 2022: 2001-2006 - [c24]Fazong Wu, Xin Wang, Ming Yang, Heng Zhang, Xiaoming Wu, Jia Yu:
Stealthy Attack Detection for Privacy-preserving Real-time Pricing in Smart Grids. ASCC 2022: 2012-2017 - [c23]Panxin Bai, Heng Zhang, Jian Zhang, Hongran Li:
USV Control With Adaptive Compensation Under False Data Injection Attacks. INFOCOM Workshops 2022: 1-2 - 2021
- [j29]Shuai Xu, Jian Zhang, Liling Bo, Hongran Li, Heng Zhang, Zhaoman Zhong, Dongqing Yuan:
Singular vector sparse reconstruction for image compression. Comput. Electr. Eng. 91: 107069 (2021) - [j28]Weiwei Xu, Heng Zhang, Xianghui Cao, Ruilong Deng, Hongran Li, Jian Zhang:
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper. Inf. Sci. 546: 871-882 (2021) - [j27]Le Wang, Xianghui Cao, Bowen Sun, Heng Zhang, Changyin Sun:
Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping. IEEE Trans. Ind. Informatics 17(3): 1987-1997 (2021) - [c22]Jun Gu, Heng Zhang, Zhikun Zhang, Jian Zhang, Hongran Li:
Iris Protection with Verisimilar Feature Structure. ICPADS 2021: 396-401 - [c21]Jianwei Sun, Heng Zhang, Weiwei Xu, Hongran Li, Jian Zhang, Jiacheng Ke, Hao Yan:
Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract. IoTDI 2021: 257-258 - [c20]Jun Gu, Heng Zhang, Yiming Lu, Hongran Li, Jian Zhang:
Hiding Iris Biological Features with Encryption. SPAC 2021: 501-505 - [c19]Hao Yan, Heng Zhang, Jianwei Sun, Tao Tian, Hongbin Wang, Dandan Zhang, Weiwei Xu, Jian Zhang, Hongran Li, Dongqing Yuan:
Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory. WASA (3) 2021: 68-76 - 2020
- [j26]Wen Yang, Dengke Li, Heng Zhang, Yang Tang, Wei Xing Zheng:
An encoding mechanism for secrecy of remote state estimation. Autom. 120: 109116 (2020) - [j25]Jian Zhang, Heng Zhang, Bo Li, Hongran Li, Shuai Xu, Dongqing Yuan:
Subspace transform induced robust similarity measure for facial images. Frontiers Inf. Technol. Electron. Eng. 21(9): 1334-1345 (2020) - [j24]Hongran Li, Weiwei Xu, Heng Zhang, Jian Zhang, Yi Liu:
Polynomial regressors based data-driven control for autonomous underwater vehicles. Peer-to-Peer Netw. Appl. 13(5): 1767-1775 (2020) - [j23]Ruimeng Gan, Jin-Liang Shao, Yue Xiao, Heng Zhang, Wei Xing Zheng:
Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks. IEEE Trans. Autom. Control. 65(9): 3832-3846 (2020) - [j22]Chaoqun Yang, Zhiguo Shi, Heng Zhang, Junfeng Wu, Xiufang Shi:
Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory. IEEE Trans. Cybern. 50(9): 4066-4075 (2020) - [j21]Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng:
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks. IEEE Trans. Dependable Secur. Comput. 17(2): 236-247 (2020) - [j20]Ruimeng Gan, Yue Xiao, Jin-Liang Shao, Heng Zhang:
Optimal Attack Strategy Against Wireless Networked Control Systems With Proactive Channel Hopping. IEEE Trans. Ind. Informatics 16(4): 2436-2446 (2020) - [c18]Chaoqun Yang, Xiaofeng Wang, Heng Zhang, Yu Zheng:
Waveform Design For Track-Before-Detect-Based Cognitive Radars. SAM 2020: 1-5 - [c17]Weiwei Xu, Heng Zhang, Xianghui Cao, Ruilong Deng, Dongqing Yuan, Jian Zhang, Hongran Li, Jiacheng Ke, Haisong Xu:
Poster Abstract: Iterative Trajectory Optimization for Dual-UAV Secure Communications. IoTDI 2020: 260-261
2010 – 2019
- 2019
- [j19]Heng Zhang, Yanzheng Zhu, Michael V. Basin, Dawei Shi, Zhengtao Ding:
Advanced control theory and applications for next-generation engineered systems. Eur. J. Control 48: 1-2 (2019) - [j18]Daxing Xu, Yan Qin, Heng Zhang, Li Yu, Hailun Wang:
Set-valued Kalman filtering: Event triggered communication with quantized measurements. Peer-to-Peer Netw. Appl. 12(3): 677-688 (2019) - [j17]Heng Zhang, Zhiguo Shi, Mohammed Chadli, Yanzheng Zhu, Zhaojian Li:
Guest editorial: Networked cyber-physical systems: Optimization theory and applications. Peer-to-Peer Netw. Appl. 12(6): 1624-1626 (2019) - [j16]Heng Zhang, Wenchao Meng, Junjian Qi, Xiaoyu Wang, Wei Xing Zheng:
Distributed Load Sharing Under False Data Injection Attack in an Inverter-Based Microgrid. IEEE Trans. Ind. Electron. 66(2): 1543-1551 (2019) - [c16]Zhaojian Li, Minghui Zheng, Heng Zhang:
Optimization-Based Unknown Input Observer for Road Profile Estimation with Experimental Validation on a Suspension Station. ACC 2019: 3829-3834 - [c15]Ruimeng Gan, Jin-Liang Shao, Heng Zhang, Yue Xiao:
Analysis on Attack Schedules in Wireless Networked Control Systems based on Channel Hopping. ASCC 2019: 591-596 - [c14]Weiwei Xu, Yuchen Xiao, Hongran Li, Jian Zhang, Heng Zhang:
Trajectory Tracking for Autonomous Underwater Vehicle Based on Model-Free Predictive Control. HPSR 2019: 1-6 - [c13]Wenming Jiao, Heng Zhang, Qiyan Zang, Jian Zhang, Hongran Li:
Iris biometric feature hidden based on chaotic encryption. RACS 2019: 295-299 - [c12]Shuaiwei Zhang, Jiayue Ju, Suyi Jiao, Changwon Lim, Kinga Molnar, Jian Zhang, Hongran Li, Jing Sun, Heng Zhang:
Optimizing Time-series Prediction on China's Green Trade Economy. SSCI 2019: 1579-1584 - 2018
- [j15]Heng Zhang, Wei Xing Zheng:
Optimum transmission policy for remote state estimation with opportunistic energy harvesting. Comput. Networks 135: 266-274 (2018) - [j14]Heng Zhang, Wei Xing Zheng:
Robust Transmission Power Management for Remote State Estimation With Wireless Energy Harvesting. IEEE Internet Things J. 5(4): 2682-2690 (2018) - [j13]Heng Zhang, Wei Xing Zheng:
Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel. IEEE Trans. Autom. Control. 63(9): 3032-3039 (2018) - [j12]Heng Zhang, Yifei Qi, Junfeng Wu, Lingkun Fu, Lidong He:
DoS Attack Energy Management Against Remote State Estimation. IEEE Trans. Control. Netw. Syst. 5(1): 383-394 (2018) - [j11]Heng Zhang, Wei Xing Zheng:
Sensor transmission power control in remote state estimation over a fading communication channel. Trans. Inst. Meas. Control 40(9): 2813-2820 (2018) - [j10]Chaoqun Yang, Li Feng, Heng Zhang, Shibo He, Zhiguo Shi:
A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems. IEEE Trans. Signal Inf. Process. over Networks 4(1): 125-136 (2018) - [c11]Wenchao Meng, Heng Zhang, Huan Zhou, Peter Xiaoping Liu:
Distributed Asymptotically Synchronization Control for MIMO Nonlinear Multiagent Systems. I-SPAN 2018: 31-37 - [c10]Heng Zhang, Huan Zhou, Wenming Jiao, Jie Shi, Qiyan Zang, Jing Sun, Jian Zhang:
Biological Features De-identification in Iris Images. I-SPAN 2018: 67-71 - [c9]Jian Zhang, Heng Zhang, Yanlong Wang, Liling Bo, Jing Sun:
Automatic Detection of Minimal Repeated Pattern in Printing Fabric Images. SenSys 2018: 351-352 - 2017
- [j9]Huan Zhou, Shouzhi Xu, Dong Ren, Chungming Huang, Heng Zhang:
Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks. Ad Hoc Networks 55: 87-96 (2017) - [j8]Yongmin Zhang, Wenchao Meng, Heng Zhang, Preetha Thulasiraman, Tom H. Luan:
Guest editorial: Distributed control and optimization of wireless networks. Peer-to-Peer Netw. Appl. 10(3): 421-424 (2017) - [c8]Heng Zhang, Yifei Qi, Junfeng Wu:
Optimal jamming power allocation against remote state estimation. ACC 2017: 1660-1665 - [c7]Heng Zhang, Wei Xing Zheng:
Optimal sensor power control via a correlated block fading channel. ASCC 2017: 1098-1103 - [c6]Yanzheng Zhu, Zhixiong Zhong, Heng Zhang, Donghua Zhou:
Filtering for networked switched systems with multiple redundant channels: An application to the boost-buck converter. ICCA 2017: 594-599 - 2016
- [j7]Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen:
Privacy and performance trade-off in cyber-physical systems. IEEE Netw. 30(2): 62-66 (2016) - [j6]Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi:
Secured measurement fusion scheme against deceptive ECM attack in radar network. Secur. Commun. Networks 9(16): 3911-3921 (2016) - [j5]Lifu Zhang, Heng Zhang:
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop. Sensors 16(4): 443 (2016) - [j4]Heng Zhang, Peng Cheng, Ling Shi, Jiming Chen:
Optimal DoS Attack Scheduling in Wireless Networked Control System. IEEE Trans. Control. Syst. Technol. 24(3): 843-852 (2016) - [c5]Jing Sun, Dun-Wei Gong, Zhuang Miao, Zhigang Xu, Heng Zhang:
Ensemble dominance for solving interval programming problems. CEC 2016: 562-569 - 2015
- [j3]Lifu Zhang, Heng Zhang, Cunhua Li, Buxi Ni:
Optimal Jamming Attack Scheduling in Networked Sensing and Control Systems. Int. J. Distributed Sens. Networks 11: 206954:1-206954:7 (2015) - [j2]Heng Zhang, Peng Cheng, Ling Shi, Jiming Chen:
Optimal Denial-of-Service Attack Scheduling With Energy Constraint. IEEE Trans. Autom. Control. 60(11): 3023-3028 (2015) - [c4]Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng:
Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks. MASS 2015: 181-189 - [c3]Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi:
Performance of Target Tracking in Radar Network System Under Deception Attack. WASA 2015: 664-673 - 2014
- [j1]Shuo Guo, Heng Zhang, Ziguo Zhong, Jiming Chen, Qing Cao, Tian He:
Detecting Faulty Nodes with Data Errors for Wireless Sensor Networks. ACM Trans. Sens. Networks 10(3): 40:1-40:27 (2014) - [c2]Heng Zhang, Peng Cheng, Ling Shi, Jiming Chen:
Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control. ACC 2014: 3996-4001 - 2013
- [c1]Heng Zhang, Peng Cheng, Ling Shi, Jiming Chen:
Optimal DoS attack policy against remote state estimation. CDC 2013: 5444-5449
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint