default search action
Murtuza Jadliwala
Person information
- affiliation: University of Texas at San Antonio, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Devan Shah, Ruoqi Huang, Tingting Chen, Murtuza Jadliwala:
Rider Posture-Based Continuous Authentication with Few-Shot Learning for Mobility Scooters (Student Abstract). AAAI 2024: 23647-23648 - [c44]Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti:
Towards a Game-Theoretic Understanding of Explanation-Based Membership Inference Attacks. GameSec 2024: 263-283 - [c43]Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala:
MirageFlow: A New Bandwidth Inflation Attack on Tor. NDSS 2024 - [c42]Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath:
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape. SP 2024: 91-109 - [c41]Mohd Sabra, Nisha Vinayaga-Sureshkanth, Ari Sharma, Anindya Maiti, Murtuza Jadliwala:
De-anonymizing VR Avatars using Non-VR Motion Side-channels. WISEC 2024: 54-65 - [i23]Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Murtuza Jadliwala, Peyman Najafirad:
Causative Insights into Open Source Software Security using Large Language Code Embeddings and Semantic Vulnerability Graph. CoRR abs/2401.07035 (2024) - [i22]Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti:
Towards a Game-theoretic Understanding of Explanation-based Membership Inference Attacks. CoRR abs/2404.07139 (2024) - [i21]Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath:
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape. CoRR abs/2404.16212 (2024) - [i20]Joseph Spracklen, Raveen Wijewickrama, A H. M. Nazmus Sakib, Anindya Maiti, Murtuza Jadliwala:
We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs. CoRR abs/2406.10279 (2024) - [i19]Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala:
Spiking Neural Networks in Vertical Federated Learning: Performance Trade-offs. CoRR abs/2407.17672 (2024) - [i18]Nafis Tanveer Islam, Mazal Bethany, Dylan Manuel, Murtuza Jadliwala, Peyman Najafirad:
Unintentional Security Flaws in Code: Automated Defense via Root Cause Analysis. CoRR abs/2409.00199 (2024) - 2023
- [j20]Tayebeh Rajab, Alvi Ataur Khalil, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Mohammad Dakhilalian, Maurice Ngouen, Murtuza Jadliwala, A. Selcuk Uluagac:
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains. Distributed Ledger Technol. Res. Pract. 2(4): 1-21 (2023) - [j19]Raveen Wijewickrama, Sameer Anis Dohadwalla, Anindya Maiti, Murtuza Jadliwala, Sashank Narain:
SkinSense: Efficient vibration-based communications over human body using motion sensors. Internet Things 23: 100835 (2023) - [c40]Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi:
BayBFed: Bayesian Backdoor Defense for Federated Learning. SP 2023: 737-754 - [c39]Maryam Abbasihafshejani, Mohammad Hossein Manshaei, Murtuza Jadliwala:
Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain. VCC 2023: 49-55 - [i17]Mohd Sabra, Nisha Vinayaga-Sureshkanth, Ari Sharma, Anindya Maiti, Murtuza Jadliwala:
Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users. CoRR abs/2301.09041 (2023) - [i16]Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi:
BayBFed: Bayesian Backdoor Defense for Federated Learning. CoRR abs/2301.09508 (2023) - [i15]Raveen Wijewickrama, Sameer Anis Dohadwalla, Anindya Maiti, Murtuza Jadliwala, Sashank Narain:
SkinSense: Efficient Vibration-based Communications Over Human Body Using Motion Sensors. CoRR abs/2303.06037 (2023) - [i14]Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala:
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack. CoRR abs/2307.08550 (2023) - [i13]Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala:
OverHear: Headphone based Multi-sensor Keystroke Inference. CoRR abs/2311.02288 (2023) - 2022
- [c38]Mohd Sabra, Anindya Maiti, Murtuza Jadliwala:
Background Buster: Peeking through Virtual Backgrounds in Online Video Calls. DSN 2022: 522-533 - [c37]Maryam Abbasi, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya, Murtuza Jadliwala:
On Algorand Transaction Fees: Challenges and Mechanism Design. ICC 2022: 5403-5408 - [c36]Anindya Maiti, Nisha Vinayaga-Sureshkanth, Murtuza Jadliwala, Raveen Wijewickrama, Greg Griffin:
Impact of E-Scooters on Pedestrian Safety: A Field Study Using Pedestrian Crowd-Sensing. PerCom Workshops 2022: 799-805 - [c35]Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala:
An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps. WISEC 2022: 125-139 - [e3]Murtuza Jadliwala, Yongdae Kim, Alexandra Dmitrienko:
WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022. ACM 2022, ISBN 978-1-4503-9216-7 [contents] - [e2]Murtuza Jadliwala:
WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, San Antonio, TX, USA, 19 May 2022. ACM 2022, ISBN 978-1-4503-9277-8 [contents] - 2021
- [j18]Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala, Shambhu J. Upadhyaya:
Advances in Secure Knowledge Management in the Artificial Intelligence Era. Inf. Syst. Frontiers 23(4): 807-810 (2021) - [j17]Heena Rathore, Abhay Samant, Murtuza Jadliwala:
TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles. ACM Trans. Cyber Phys. Syst. 5(1): 6:1-6:25 (2021) - [c34]Mohd Sabra, Anindya Maiti, Murtuza Jadliwala:
Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. NDSS 2021 - [c33]Soundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, Jun Han:
Acoustics to the Rescue: Physical Key Inference Attack Revisited. USENIX Security Symposium 2021: 3255-3272 - [c32]Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala:
Write to know: on the feasibility of wrist motion based user-authentication from handwriting. WISEC 2021: 335-346 - 2020
- [j16]Ao Zhu, Shi Cao, Han Yao, Murtuza Jadliwala, Jibo He:
Can Wearable Devices Facilitate a Driver's Brake Response Time in a Classic Car-Following Task? IEEE Access 8: 40081-40087 (2020) - [j15]Anindya Maiti, Murtuza Jadliwala:
Smart Light-based Information Leakage Attacks. GetMobile Mob. Comput. Commun. 24(1): 28-32 (2020) - [c31]Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala:
Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems. AutoSec@CODASPY 2020: 31-35 - [c30]Mehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On Incentive Compatible Role-Based Reward Distribution in Algorand. DSN 2020: 452-463 - [e1]Sanjay K. Sahay, Nihita Goel, Vishwas Patil, Murtuza Jadliwala:
Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, SKM 2019, Goa, India, December 21-22, 2019, Proceedings. Communications in Computer and Information Science 1186, Springer 2020, ISBN 978-981-15-3816-2 [contents] - [i12]Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala:
Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems. CoRR abs/2001.01387 (2020) - [i11]Tayebeh Rajab, Mohammad Hossein Manshaei, Mohammad Dakhilalian, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains. CoRR abs/2002.06531 (2020) - [i10]Mohd Sabra, Anindya Maiti, Murtuza Jadliwala:
Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. CoRR abs/2010.12078 (2020)
2010 – 2019
- 2019
- [j14]Anindya Maiti, Murtuza Jadliwala:
Light Ears: Information Leakage via Smart Lights. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3): 98:1-98:27 (2019) - [c29]Heena Rathore, Abhay Samant, Murtuza Jadliwala, Amr Mohamed:
TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles. AutoSec@CODASPY 2019: 45-48 - [c28]Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei:
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach. GameSec 2019: 276-296 - [c27]Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala:
deWristified: handwriting inference using wrist-based motion sensors revisited. WiSec 2019: 49-59 - [i9]Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei:
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach. CoRR abs/1904.13352 (2019) - [i8]Anindya Maiti, Nisha Vinayaga-Sureshkanth, Murtuza Jadliwala, Raveen Wijewickrama:
Impact of Urban Micromobility Technology on Pedestrian and Rider Safety: A Field Study Using Pedestrian Crowd-Sensing. CoRR abs/1908.05846 (2019) - [i7]Mehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On Incentive Compatible Role-based Reward Distribution in Algorand. CoRR abs/1911.03356 (2019) - 2018
- [j13]Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore:
A Practical Framework for Preventing Distracted Pedestrian-Related Incidents Using Wrist Wearables. IEEE Access 6: 78016-78030 (2018) - [j12]Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar:
A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains. IEEE Access 6: 78100-78112 (2018) - [j11]Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic:
Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches. IEEE Trans. Mob. Comput. 17(9): 2180-2194 (2018) - [c26]Mohd Sabra, Anindya Maiti, Murtuza Jadliwala:
Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study. WearSys@MobiSys 2018: 21-26 - [c25]Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore:
Towards a Practical Pedestrian Distraction Detection Framework using Wearables. PerCom Workshops 2018: 239-245 - [c24]Anindya Maiti, Ryan Heard, Mohd Sabra, Murtuza Jadliwala:
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel. WISEC 2018: 111-122 - [i6]Anindya Maiti, Murtuza Jadliwala:
Light Ears: Information Leakage via Smart Lights. CoRR abs/1808.07814 (2018) - [i5]Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar:
A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains. CoRR abs/1809.07307 (2018) - [i4]Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore:
A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables. CoRR abs/1811.04797 (2018) - 2017
- [j10]Rajiv Bagai, Nafia Malik, Murtuza Jadliwala:
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks. IEEE Trans. Inf. Forensics Secur. 12(5): 1156-1169 (2017) - [j9]Arash Boustani, Anindya Maiti, Sina Yousefian Jazi, Murtuza Jadliwala, Vinod Namboodiri:
Seer Grid: Privacy and Utility Implications of Two-Level Load Prediction in Smart Grids. IEEE Trans. Parallel Distributed Syst. 28(2): 546-557 (2017) - [c23]Anindya Maiti, Murtuza Jadliwala, Chase Weber:
Preventing shoulder surfing using randomized augmented reality keyboards. PerCom Workshops 2017: 630-635 - [i3]Anindya Maiti, Ryan Heard, Mohd Sabra, Murtuza Jadliwala:
A Framework for Inferring Combination Lock Codes using Smartwatches. CoRR abs/1710.00217 (2017) - [i2]Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic:
Side-Channel Inference Attacks on Mobile Keypads using Smartwatches. CoRR abs/1710.03656 (2017) - [i1]Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore:
Towards a Practical Pedestrian Distraction Detection Framework using Wearables. CoRR abs/1710.03755 (2017) - 2016
- [j8]Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Maria Gazaki, Jean-Pierre Hubaux:
A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive Mob. Comput. 25: 125-142 (2016) - [c22]Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He:
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms. AsiaCCS 2016: 795-806 - 2015
- [j7]Babak Karimi, Vinod Namboodiri, Murtuza Jadliwala:
Scalable Meter Data Collection in Smart Grids Through Message Concatenation. IEEE Trans. Smart Grid 6(4): 1697-1706 (2015) - [c21]Arash Boustani, Murtuza Jadliwala, Hyuck M. Kwon, Navid Alamatsaz:
Optimal resource allocation in Cognitive Smart Grid Networks. CCNC 2015: 499-506 - [c20]Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic:
(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches. ISWC 2015: 27-30 - 2014
- [j6]Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 9(7): 1141-1156 (2014) - [c19]Arash Boustani, Navid Alamatsaz, Murtuza Jadliwala, Vinod Namboodiri:
LocJam: A novel jamming-based approach to secure localization in wireless networks. CCNC 2014: 336-344 - [c18]Navid Alamatsaz, Arash Boustani, Murtuza Jadliwala, Vinod Namboodiri:
AgSec: Secure and efficient CDMA-based aggregation for smart metering systems. CCNC 2014: 489-494 - [c17]Murtuza Jadliwala, Anindya Maiti, Vinod Namboodiri:
Social Puzzles: Context-Based Access Control in Online Social Networks. DSN 2014: 299-310 - 2013
- [j5]Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux:
Optimizing mix-zone coverage in pervasive wireless networks. J. Comput. Secur. 21(3): 317-346 (2013) - [j4]Julien Freudiger, Murtuza Jadliwala, Jean-Pierre Hubaux, Valtteri Niemi, Philip Ginzboorg:
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks. Mob. Networks Appl. 18(3): 413-428 (2013) - [c16]Anm Badruddoza, Vinod Namboodiri, Murtuza Jadliwala:
On the energy efficiency of dynamic spectrum access under dynamic channel conditions. CrownCom 2013: 31-36 - [c15]Igor Bilogrevic, Kévin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi:
Inferring social ties in pervasive networks: an on-campus comparative study. UbiComp (Adjunct Publication) 2013: 123-126 - [c14]Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Jean-Pierre Hubaux:
Adaptive information-sharing for privacy-aware mobile social networks. UbiComp 2013: 657-666 - [c13]Babak Karimi, Vinod Namboodiri, Murtuza Jadliwala:
On the scalable collection of metering data in smart grids through message concatenation. SmartGridComm 2013: 318-323 - [c12]Igor Bilogrevic, Kévin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi:
Inferring social ties in academic networks using short-range wireless communications. WPES 2013: 179-188 - 2012
- [c11]Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux:
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. NDSS 2012 - [c10]Igor Bilogrevic, Murtuza Jadliwala, István Lám, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Laurent Bindschaedler, Jean-Pierre Hubaux:
Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks. Pervasive 2012: 370-387 - 2011
- [j3]Igor Bilogrevic, Murtuza Jadliwala, Praveen Kumar, Sudeep Singh Walia, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Meetings through the cloud: Privacy-preserving scheduling on mobile devices. J. Syst. Softw. 84(11): 1910-1927 (2011) - [c9]Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Privacy-preserving activity scheduling on mobile devices. CODASPY 2011: 261-272 - [c8]Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux:
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. ESORICS 2011: 548-567 - [c7]Igor Bilogrevic, Murtuza Jadliwala, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy in Mobile Computing for Location-Sharing-Based Services. PETS 2011: 77-96 - [c6]Murtuza Jadliwala, Julien Freudiger, Imad Aad, Jean-Pierre Hubaux, Valtteri Niemi:
Privacy-triggered communications in pervasive social networks. WOWMOM 2011: 1-6 - 2010
- [j2]Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhyaya, Chunming Qiao, Jean-Pierre Hubaux:
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. IEEE Trans. Mob. Comput. 9(6): 810-823 (2010)
2000 – 2009
- 2009
- [c5]Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, Jinhui Xu:
Towards a theory for securing time synchronization in wireless sensor networks. WISEC 2009: 201-212 - [c4]Reza Shokri, Julien Freudiger, Murtuza Jadliwala, Jean-Pierre Hubaux:
A distortion-based metric for location privacy. WPES 2009: 21-30 - 2008
- [c3]Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhyaya, Chunming Qiao:
Towards a Theory of Robust Localization Against Malicious Beacon Nodes. INFOCOM 2008: 1391-1399 - 2007
- [j1]Murtuza Jadliwala, Qi Duan, Jinhui Xu, Shambhu J. Upadhyaya:
On extracting consistent graphs in wireless sensor networks. Int. J. Sens. Networks 2(3/4): 149-162 (2007) - [c2]Murtuza Jadliwala, Shambhu J. Upadhyaya, Manik Taneja:
ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks. SRDS 2007: 3-12 - 2003
- [c1]Sviatoslav B. Braynov, Murtuza Jadliwala:
Representation and analysis of coordinated attacks. FMSE 2003: 43-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint