default search action
Guangquan Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j96]Nan Jia, Shaojing Fu, Guangquan Xu, Kai Huang, Ming Xu:
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices. Digit. Commun. Networks 10(4): 895-903 (2024) - [j95]Haiyi Liu, Shaoying Liu, Guangquan Xu, Ai Liu, Dingbang Fang:
NNTBFV: Simplifying and Verifying Neural Networks Using Testing-Based Formal Verification. Int. J. Softw. Eng. Knowl. Eng. 34(2): 273-300 (2024) - [j94]Yawar Abbas Abid, Jinsong Wu, Guangquan Xu, Shihui Fu, Muhammad Waqas:
Multilevel Deep Neural Network Approach for Enhanced Distributed Denial-of-Service Attack Detection and Classification in Software-Defined Internet of Things Networks. IEEE Internet Things J. 11(14): 24715-24725 (2024) - [j93]Junfeng Xu, Weiguo Lin, Wenqing Fan, Jia Chen, Keqiu Li, Xiulong Liu, Guangquan Xu, Shengwei Yi, Jie Gan:
A Graph Neural Network Model for Live Face Anti-Spoofing Detection Camera Systems. IEEE Internet Things J. 11(15): 25720-25730 (2024) - [j92]Hao Peng, Zhe Wang, Chao Wei, Dandan Zhao, Guangquan Xu, Jianming Han, Shixin Guo, Ming Zhong, Shouling Ji:
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples. Knowl. Based Syst. 300: 112188 (2024) - [j91]Yujun Dai, Shaoying Liu, Guangquan Xu:
Enhancing human-machine pair inspection with risk number and code inspection diagram. Softw. Qual. J. 32(3): 939-959 (2024) - [j90]Guangquan Xu, Guohua Xin, Litao Jiao, Jian Liu, Shaoying Liu, Meiqi Feng, Xi Zheng:
OFEI: A Semi-Black-Box Android Adversarial Sample Attack Framework Against DLaaS. IEEE Trans. Computers 73(4): 956-969 (2024) - [j89]Wei Yu, Wenkai Wang, Guangquan Xu, Huaming Wu, Hongyan Li, Jun Wang, Xiaoming Li, Juan Liu:
MRFS: Mining Rating Fraud Subgraph in Bipartite Graph for Users and Products. IEEE Trans. Comput. Soc. Syst. 11(3): 3108-3117 (2024) - [j88]Lei Zhang, Yunzhe Jiang, Yazhou Ma, Shiwen Mao, Wenyuan Huang, Zhiyong Yu, Xiao Zheng, Lin Shu, Xiaochen Fan, Guangquan Xu, Changyu Dong:
Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi. IEEE Trans. Inf. Forensics Secur. 19: 8731-8746 (2024) - [j87]Zhi Li, Hao Wang, Guangquan Xu, Alireza Jolfaei, Xi Zheng, Chunhua Su, Wenying Zhang:
Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation. IEEE Trans. Intell. Transp. Syst. 25(3): 2253-2269 (2024) - [j86]Jingyi Cui, Guangquan Xu, Jian Liu, Shicheng Feng, Jianli Wang, Hao Peng, Shihui Fu, Zhaohua Zheng, James Xi Zheng, Shaoying Liu:
ID-SR: Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI. ACM Trans. Knowl. Discov. Data 18(7): 161 (2024) - [j85]Boyu Li, Qinfen Hao, Bin Wu, Guangquan Xu:
An Online Robust Resource Allocation Algorithm for Mobile Edge Computing. IEEE Wirel. Commun. Lett. 13(7): 2013-2017 (2024) - [c56]Dongxiao He, Shuwei Liu, Meng Ge, Zhizhi Yu, Guangquan Xu, Zhiyong Feng:
Improving Distinguishability of Class for Graph Neural Networks. AAAI 2024: 12349-12357 - [c55]Long Chen, Zhenyu Zhang, Xiaoming Li, Guangquan Xu:
AEGAN: A Novel Machine Learning Model to Attribute Network Community Detection. IJCNN 2024: 1-10 - [c54]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang:
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. USENIX Security Symposium 2024 - [i10]Bin Wang, Tianjian Liu, Wenqi Wang, Yuan Weng, Chao Li, Guangquan Xu, Meng Shen, Sencun Zhu, Wei Wang:
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems. CoRR abs/2405.13380 (2024) - [i9]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang:
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. CoRR abs/2406.06207 (2024) - 2023
- [j84]Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu:
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. Comput. Secur. 125: 103048 (2023) - [j83]Guangquan Xu, Hongfei Shao, Jingyi Cui, Hongpeng Bai, Jiliang Li, Guangdong Bai, Shaoying Liu, Weizhi Meng, Xi Zheng:
GenDroid: A query-efficient black-box android adversarial attack framework. Comput. Secur. 132: 103359 (2023) - [j82]Guangquan Xu, Wenyu Dong, Jun Xing, Wenqing Lei, Jian Liu, Lixiao Gong, Meiqi Feng, James Xi Zheng, Shaoying Liu:
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection. Digit. Commun. Networks 9(5): 1169-1179 (2023) - [j81]Cong Wang, Xiaohang Li, Maode Ma, Tong Zhou, Guangquan Xu, Naixue Xiong, Yiying Zhang:
PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments. Trans. Emerg. Telecommun. Technol. 34(5) (2023) - [j80]Xiaoming Li, Yi Luo, Neal Xiong, Wei Yu, Guangquan Xu, Changzheng Liu, Xiaoping Yang:
Local node feature modeling for edge computing based on network embedding in dynamic networks. J. Parallel Distributed Comput. 171: 98-110 (2023) - [j79]Guangquan Xu, Chen Qi, Wenyu Dong, Lixiao Gong, Shaoying Liu, Si Chen, Jian Liu, Xi Zheng:
A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain. IEEE J. Biomed. Health Informatics 27(2): 698-709 (2023) - [j78]Guangquan Xu, Zhengbo Han, Lixiao Gong, Litao Jiao, Hongpeng Bai, Shaoying Liu, Xi Zheng:
ASQ-FastBM3D: An Adaptive Denoising Framework for Defending Adversarial Attacks in Machine Learning Enabled Systems. IEEE Trans. Reliab. 72(1): 317-328 (2023) - [j77]Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker:
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. IEEE Trans. Software Eng. 49(10): 4624-4638 (2023) - [c53]Lili Yan, Jingyi Cui, Jian Liu, Guangquan Xu, Lidong Han, Alireza Jolfaei, Xi Zheng:
IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. AsiaCCS 2023: 638-648 - [c52]Lixiao Gong, Guangquan Xu, Jingyi Cui, Xiao Wang, Shihui Fu, Xi Zheng, Shaoying Liu:
GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System. ICA3PP (6) 2023: 78-92 - [c51]Yujun Dai, Shaoying Liu, Guangquan Xu, Ai Liu:
Utilizing Risk Number and Program Slicing to Improve Human-Machine Pair Inspection. ICECCS 2023: 108-115 - [i8]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Guangquan Xu, Pan Zhou:
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience. CoRR abs/2306.06909 (2023) - 2022
- [j76]Wei Yu, Guangquan Xu, Xiaoming Li, Xue Chen, Ying Sun, Ning Yuan:
Heterogeneous Information Network Representation Learning Incorporating Community Structure. IEEE Access 10: 51249-51260 (2022) - [j75]Guangquan Xu, Hongpeng Bai, Jun Xing, Tao Luo, Neal N. Xiong, Xiaochun Cheng, Shaoying Liu, James Xi Zheng:
SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles. J. Parallel Distributed Comput. 164: 1-11 (2022) - [j74]Shangming Cai, Dongsheng Wang, Haixia Wang, Yongqiang Lyu, Guangquan Xu, Xi Zheng, Athanasios V. Vasilakos:
DynaComm: Accelerating Distributed CNN Training Between Edges and Clouds Through Dynamic Communication Scheduling. IEEE J. Sel. Areas Commun. 40(2): 611-625 (2022) - [j73]Qing Lyu, Yonghang Zhou, Qilin Fan, Yongqiang Lyu, Xi Zheng, Guangquan Xu, Jun Li:
JOSP: Joint Optimization of Flow Path Scheduling and Virtual Network Function Placement for Delay-Sensitive Applications. Mob. Networks Appl. 27(4): 1642-1658 (2022) - [j72]Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. IEEE Trans. Dependable Secur. Comput. 19(2): 862-878 (2022) - [j71]Qiong Chen, Mengxing Huang, Hao Wang, Guangquan Xu:
A Feature Discretization Method Based on Fuzzy Rough Sets for High-Resolution Remote Sensing Big Data Under Linear Spectral Model. IEEE Trans. Fuzzy Syst. 30(5): 1328-1342 (2022) - [j70]Jinyan Wang, Guangquan Xu, Wenqing Lei, Lixiao Gong, Xi Zheng, Shaoying Liu:
CPFL: An Effective Secure Cognitive Personalized Federated Learning Mechanism for Industry 4.0. IEEE Trans. Ind. Informatics 18(10): 7186-7195 (2022) - [c50]Zhaohua Zheng, Zhaobin Qin, Deshun Li, Keqiu Li, Guangquan Xu:
A Holistic Client Selection Scheme in Federated Mobile CrowdSensing Based on Reverse Auction. CSCWD 2022: 1305-1310 - [c49]Haiyi Liu, Shaoying Liu, Ai Liu, Dingbang Fang, Guangquan Xu:
Verifying and Improving Neural Networks Using Testing-Based Formal Verification. SOFL+MSVL 2022: 126-141 - [e4]Yongxuan Lai, Tian Wang, Min Jiang, Guangquan Xu, Wei Liang, Aniello Castiglione:
Algorithms and Architectures for Parallel Processing - 21st International Conference, ICA3PP 2021, Virtual Event, December 3-5, 2021, Proceedings, Part I. Lecture Notes in Computer Science 13155, Springer 2022, ISBN 978-3-030-95383-6 [contents] - [e3]Yongxuan Lai, Tian Wang, Min Jiang, Guangquan Xu, Wei Liang, Aniello Castiglione:
Algorithms and Architectures for Parallel Processing - 21st International Conference, ICA3PP 2021, Virtual Event, December 3-5, 2021, Proceedings, Part II. Lecture Notes in Computer Science 13156, Springer 2022, ISBN 978-3-030-95387-4 [contents] - [e2]Yongxuan Lai, Tian Wang, Min Jiang, Guangquan Xu, Wei Liang, Aniello Castiglione:
Algorithms and Architectures for Parallel Processing - 21st International Conference, ICA3PP 2021, Virtual Event, December 3-5, 2021, Proceedings, Part III. Lecture Notes in Computer Science 13157, Springer 2022, ISBN 978-3-030-95390-4 [contents] - 2021
- [j69]Hongyu Yang, Renyun Zeng, Guangquan Xu, Liang Zhang:
A network security situation assessment method based on adversarial deep learning. Appl. Soft Comput. 102: 107096 (2021) - [j68]Xiaoming Li, Guangquan Xu, Changzheng Liu, Wei Yu, Zhao Liu, Zhenhuan Wu, Xiaoping Yang:
Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation. Future Gener. Comput. Syst. 125: 364-375 (2021) - [j67]Guangquan Xu, Yuyang Zhao, Litao Jiao, Meiqi Feng, Zhong Ji, Emmanouil Panaousis, Si Chen, Xi Zheng:
TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems. IEEE Internet Things J. 8(12): 9559-9567 (2021) - [j66]Guangquan Xu, Guofeng Feng, Litao Jiao, Meiqi Feng, Xi Zheng, Jian Liu:
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services. Secur. Commun. Networks 2021: 5395705:1-5395705:10 (2021) - [j65]Hongwei Jing, Xiaoming Li, Guangquan Xu, Mengli Zhu, Li Shen, Fangyuan Liu, Haoyang Peng:
Dynamic Study of Intelligent Traffic Behaviour Based on Multiple Traffic Modes. Sci. Program. 2021: 7254907:1-7254907:16 (2021) - [j64]Gongyu Zhou, Guangquan Xu, Jianye Hao, Shizhan Chen, Junfeng Xu, Xi Zheng:
Generalized Centered 2-D Principal Component Analysis. IEEE Trans. Cybern. 51(3): 1666-1677 (2021) - [j63]Pengli Nie, Guangquan Xu, Litao Jiao, Shaoying Liu, Jian Liu, Weizhi Meng, Hongyue Wu, Meiqi Feng, Weizhe Wang, Zhengjun Jing, Xi Zheng:
Sparse Trust Data Mining. IEEE Trans. Inf. Forensics Secur. 16: 4559-4573 (2021) - [j62]Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, Chunhua Su:
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts. IEEE Trans. Netw. Sci. Eng. 8(2): 1133-1144 (2021) - [c48]Guangquan Xu, Meiqi Feng, Litao Jiao, Jian Liu, Hong-Ning Dai, Ding Wang, Emmanouil Panaousis, Xi Zheng:
MFF-AMD: Multivariate Feature Fusion for Android Malware Detection. CollaborateCom (1) 2021: 368-385 - [c47]Hao Peng, Zhen Qian, Ming Zhong, Dandan Zhao, Guangquan Xu, Songyang Wu, Jianming Han:
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack. FCS 2021: 230-242 - [i7]Guangquan Xu, Yihua Liu, Jun Xing, Tao Luo, Yonghao Gu, Shaoying Liu, Xi Zheng, Athanasios V. Vasilakos:
SG-PBFT: a Secure and Highly Efficient Blockchain PBFT Consensus Algorithm for Internet of Vehicles. CoRR abs/2101.01306 (2021) - [i6]Shangming Cai, Dongsheng Wang, Haixia Wang, Yongqiang Lyu, Guangquan Xu, Xi Zheng, Athanasios V. Vasilakos:
DynaComm: Accelerating Distributed CNN Training between Edges and Clouds through Dynamic Communication Scheduling. CoRR abs/2101.07968 (2021) - [i5]Guangquan Xu, Guohua Xin, Litao Jiao, Jian Liu, Shaoying Liu, Meiqi Feng, Xi Zheng:
OFEI: A Semi-black-box Android Adversarial Sample Attack Framework Against DLaaS. CoRR abs/2105.11593 (2021) - [i4]Xiaoming Li, Guangquan Xu, Wei Yu, Pengfei Jiao, Xiangyu Song:
Analysis of 5G academic Network based on graph representation learning method. CoRR abs/2111.08264 (2021) - 2020
- [j61]Guangquan Xu, Xiaotong Li, Litao Jiao, Weizhe Wang, Ao Liu, Chunhua Su, Xi Zheng, Shaoying Liu, Xiaochun Cheng:
BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs. IEEE Commun. Mag. 58(7): 35-41 (2020) - [j60]Zhengjun Jing, Chunsheng Gu, Yong Li, Mengshi Zhang, Guangquan Xu, Alireza Jolfaei, Peizhong Shi, Chenkai Tan, James Xi Zheng:
Security analysis of indistinguishable obfuscation for internet of medical things applications. Comput. Commun. 161: 202-211 (2020) - [j59]Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng, Kaitai Liang, Duncan S. Wong, Hao Wang:
Am I eclipsed? A smart detector of eclipse attacks for Ethereum. Comput. Secur. 88 (2020) - [j58]Hong-Ning Dai, Hao Wang, Guangquan Xu, Jiafu Wan, Muhammad Imran:
Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies. Enterp. Inf. Syst. 14(9-10): 1279-1303 (2020) - [j57]Guangquan Xu, Wei Wang, Litao Jiao, Xiaotong Li, Kaitai Liang, James Xi Zheng, Wenjuan Lian, Hequn Xian, Honghao Gao:
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications. IEEE Internet Things J. 7(4): 2539-2552 (2020) - [j56]Jianan Li, Jun Wu, Guangquan Xu, Jianhua Li, Xi Zheng, Alireza Jolfaei:
Integrating NFV and ICN for Advanced Driver-Assistance Systems. IEEE Internet Things J. 7(7): 5861-5873 (2020) - [j55]Song Han, Jianhong Lin, Shuai Zhao, Guangquan Xu, Siqi Ren, Daojing He, Licheng Wang, Leyun Shi:
Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing. IEEE Internet Things J. 7(8): 7550-7563 (2020) - [j54]Yongzhong He, Chao Wang, Guangquan Xu, Wenjuan Lian, Hequn Xian, Wei Wang:
Privacy-preserving categorization of mobile applications based on large-scale usage data. Inf. Sci. 514: 557-570 (2020) - [j53]Yingjie Wang, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, Wei Wang:
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis. J. Syst. Softw. 167: 110609 (2020) - [j52]Guangquan Xu, Wenjuan Zhou, Arun Kumar Sangaiah, Yao Zhang, Xi Zheng, Qiang Tang, Naixue Xiong, Kaitai Liang, Xiaokang Zhou:
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs. IEEE Netw. 34(2): 22-29 (2020) - [j51]Tian Wang, Yuzhu Liang, Yi Yang, Guangquan Xu, Hao Peng, Anfeng Liu, Weijia Jia:
An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems. IEEE Netw. 34(3): 16-22 (2020) - [j50]Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang:
An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things. Secur. Commun. Networks 2020: 6656066:1-6656066:11 (2020) - [j49]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j48]Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, Wei Wang:
Sensing Users' Emotional Intelligence in Social Networks. IEEE Trans. Comput. Soc. Syst. 7(1): 103-112 (2020) - [j47]Zhuobing Han, Xiaohong Li, Guangquan Xu, Naixue Xiong, Ettore Merlo, Eleni Stroulia:
An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models. IEEE Trans. Ind. Informatics 16(2): 1024-1034 (2020) - [j46]Longpeng Li, Guangquan Xu, Litao Jiao, Xiaotong Li, Hao Wang, Jing Hu, Hequn Xian, Wenjuan Lian, Honghao Gao:
A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems. IEEE Trans. Ind. Informatics 16(3): 2091-2101 (2020) - [j45]Tian Wang, Lei Qiu, Arun Kumar Sangaiah, Guangquan Xu, Anfeng Liu:
Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things. IEEE Trans. Ind. Informatics 16(5): 3531-3539 (2020) - [j44]Zhengdi Hu, Guangquan Xu, Xi Zheng, Jiang Liu, Zhangbing Li, Quan Z. Sheng, Wenjuan Lian, Hequn Xian:
SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation. ACM Trans. Internet Techn. 20(1): 4:1-4:20 (2020) - [j43]Guangquan Xu, Bingyan Liu, Litao Jiao, Xiaotong Li, Meiqi Feng, Kaitai Liang, Lei Ma, Xi Zheng:
Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks. IEEE Wirel. Commun. 27(3): 72-78 (2020) - [c46]Guangquan Xu, Miao Li, Xiaotong Li, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Qiang Tang, Shaoying Liu:
Defending Use-After-Free via Relationship Between Memory and Pointer. CollaborateCom (1) 2020: 583-597 - [c45]Lixia Xie, Liping Yan, Guangquan Xu, Jiyong Zhang:
Analysis Model of Node Failures and Impact for AANET. FCS 2020: 55-64 - [c44]Jun Xing, Guangquan Xu, Chengbo Yin:
Video Investigation Analysis System Enhanced by Explicable Model. FCS 2020: 111-117 - [c43]Zhijie Zhang, Lejun Zhang, Waqas Rasheed, Zilong Jin, Tinghuai Ma, Huiling Chen, Guangquan Xu:
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol. FCS 2020: 215-230 - [c42]Hongyu Yang, Yuhao Feng, Guangquan Xu, Jiyong Zhang:
Fuzzy Petri Nets Based Information System Security Situation Assessment Model. FCS 2020: 283-293 - [c41]Lixia Xie, Huiyu Ni, Guangquan Xu, Jiyong Zhang:
A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method. FCS 2020: 643-653 - [c40]Wenzhuang Kang, Shangping Zhong, Kaizhi Chen, Jianhua Lai, Guangquan Xu:
RF-AdaCost: WebShell Detection Method that Combines Statistical Features and Opcode. FCS 2020: 667-682 - [c39]Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang:
A Variational Generative Network Based Network Threat Situation Assessment. ICICS 2020: 479-491 - [e1]Guangquan Xu, Kaitai Liang, Chunhua Su:
Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings. Communications in Computer and Information Science 1286, Springer 2020, ISBN 978-981-15-9738-1 [contents] - [i3]Ao Liu, Guangquan Xu, Dexiang Zhou, Xi Zheng, Jianting Ning, Rui Wang, Hao Wang, Hong-Ning Dai, Xiaojiang Du:
SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space. CoRR abs/2004.05693 (2020)
2010 – 2019
- 2019
- [j42]Zhenhu Ning, Guangquan Xu, Naixue Xiong, Yongli Yang, Changxiang Shen, Emmanouil Panaousis, Hao Wang, Kaitai Liang:
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things. IEEE Access 7: 30112-30125 (2019) - [j41]Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si, Wei Wang:
Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality. IEEE Access 7: 33380-33392 (2019) - [j40]Tingyu Song, Xiaohong Li, Zhiyong Feng, Guangquan Xu:
Inferring Patterns for Taint-Style Vulnerabilities With Security Patches. IEEE Access 7: 52339-52349 (2019) - [j39]Shanchen Pang, Qian Gao, Ting Liu, Hua He, Guangquan Xu, Kaitai Liang:
A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment. IEEE Access 7: 56492-56503 (2019) - [j38]Shaobin Cai, Yong Zhu, Tian Wang, Guangquan Xu, Anfeng Liu, Xuxun Liu:
Data Collection in Underwater Sensor Networks based on Mobile Edge Computing. IEEE Access 7: 65357-65367 (2019) - [j37]Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Hequn Xian, Yuanyuan Li, Xiangliang Zhang:
Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions. IEEE Access 7: 67602-67631 (2019) - [j36]Xiaoming Li, Guangquan Xu, Wenjuan Lian, Hequn Xian, Litao Jiao, Yu Huang:
Multi-Layer Network Local Community Detection Based on Influence Relation. IEEE Access 7: 89051-89062 (2019) - [j35]Jiaping Men, Guangquan Xu, Zhen Han, Zhonghao Sun, Xiaojun Zhou, Wenjuan Lian, Xiaochun Cheng:
Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface. IEEE Access 7: 103751-103759 (2019) - [j34]Chunxue Wu, Bobo Ju, Yan Wu, Xiao Lin, Naixue Xiong, Guangquan Xu, Hongyan Li, Xuefeng Liang:
UAV Autonomous Target Search Based on Deep Reinforcement Learning in Complex Disaster Scene. IEEE Access 7: 117227-117245 (2019) - [j33]Guangquan Xu, Yao Zhang, Litao Jiao, Emmanouil Panaousis, Kaitai Liang, Hao Wang, Xiaotong Li:
DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost. IEEE Access 7: 174740-174749 (2019) - [j32]Da-Zhi Sun, Ze-Guang Zhu, Guangquan Xu, Wei Guo:
One-round provably secure yoking-proof for RFID applications. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j31]Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang:
Polynomial-based modifiable blockchain structure for removing fraud transactions. Future Gener. Comput. Syst. 99: 154-163 (2019) - [j30]Xianjiao Zeng, Guangquan Xu, Xi Zheng, Yang Xiang, Wanlei Zhou:
E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT. IEEE Internet Things J. 6(2): 1506-1519 (2019) - [j29]Guangquan Xu, Yao Zhang, Arun Kumar Sangaiah, Xiaohong Li, Aniello Castiglione, Xi Zheng:
CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf. Sci. 476: 505-515 (2019) - [j28]Zhenyu Mao, Yi Su, Guangquan Xu, Xueping Wang, Yu Huang, Weihua Yue, Li Sun, Naixue Xiong:
Spatio-temporal deep learning method for ADHD fMRI classification. Inf. Sci. 499: 1-11 (2019) - [j27]Qubeijian Wang, Hong-Ning Dai, Hao Wang, Guangquan Xu, Arun Kumar Sangaiah:
UAV-enabled friendly jamming scheme to secure industrial Internet of Things. J. Commun. Networks 21(5): 481-490 (2019) - [j26]Yu Huang, Wanxing Sheng, Peipei Jin, Baicuan Nie, Meikang Qiu, Guangquan Xu:
A Node-Oriented Discrete Event Scheduling Algorithm Based on Finite Resource Model. J. Organ. End User Comput. 31(3): 67-82 (2019) - [j25]Xiaoming Li, Guangquan Xu, Sandhya Armoogum, Honghao Gao:
Consumers Team Detection Model Based on Trust for Multi-Level. Mob. Inf. Syst. 2019: 4147859:1-4147859:10 (2019) - [j24]Gaolei Li, Guangquan Xu, Arun Kumar Sangaiah, Jun Wu, Jianhua Li:
EdgeLaaS: Edge Learning as a Service for Knowledge-Centric Connected Healthcare. IEEE Netw. 33(6): 37-43 (2019) - [j23]Yanrong Lu, Guangquan Xu, Lixiang Li, Yixian Yang:
Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks. IEEE Syst. J. 13(2): 1454-1465 (2019) - [j22]Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, Wei Wang:
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs. IEEE Trans. Comput. Soc. Syst. 6(6): 1373-1385 (2019) - [j21]Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen:
Using Sparse Representation to Detect Anomalies in Complex WSNs. ACM Trans. Intell. Syst. Technol. 10(6): 64:1-64:18 (2019) - [j20]Yanrong Lu, Guangquan Xu, Lixiang Li, Yixian Yang:
Anonymous three-factor authenticated key agreement for wireless sensor networks. Wirel. Networks 25(4): 1461-1475 (2019) - [c38]Xiaoheng Deng, Huan Chen, Ruting Cai, Feng Zeng, Guangquan Xu, Honggang Zhang:
A Knowledge-Based Multiplayer Collaborative Routing in Opportunistic Networks. DASC/PiCom/DataCom/CyberSciTech 2019: 16-21 - [c37]Zhengdi Hu, Guangquan Xu, Xi Zheng, Jiang Liu, Xiaojiang Du:
SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation. GLOBECOM 2019: 1-6 - [c36]Jingjing Song, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, Wei Wang:
An Efficient Vulnerability Detection Model for Ethereum Smart Contracts. NSS 2019: 433-442 - [i2]Hong-Ning Dai, Hao Wang, Guangquan Xu, Jiafu Wan, Muhammad Imran:
Big Data Analytics for Manufacturing Internet of Things: Opportunities, Challenges and Enabling Technologies. CoRR abs/1909.00413 (2019) - 2018
- [j19]Chen Liu, Dingyi Fang, Yue Hu, Shensheng Tang, Dan Xu, Wen Cui, Xiaojiang Chen, Baoying Liu, Guangquan Xu, Hao Chen:
EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network. Comput. Networks 143: 191-205 (2018) - [j18]Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu:
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems. Future Gener. Comput. Syst. 79: 417-430 (2018) - [j17]Guangquan Xu, Jia Liu, Yanrong Lu, Xianjiao Zeng, Yao Zhang, Xiaoming Li:
A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks. J. Netw. Comput. Appl. 107: 83-92 (2018) - [j16]Xiaokang Zhou, Guangquan Xu, Jianhua Ma, Ivan Ruchkin:
Scalable platforms and advanced algorithms for IoT and cyber-enabled applications. J. Parallel Distributed Comput. 118(Part): 1-4 (2018) - [j15]Ran Wang, Guangquan Xu, Xianjiao Zeng, Xiaohong Li, Zhiyong Feng:
TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting. J. Parallel Distributed Comput. 118(Part): 100-106 (2018) - [j14]XiaoMing Li, Guangquan Xu, Minghu Tang:
Community detection for multi-layer social network based on local random walk. J. Vis. Commun. Image Represent. 57: 91-98 (2018) - [c35]Ning Zhang, Guangquan Xu, Guozhu Meng, Xi Zheng:
SoProtector: Securing Native C/C++ Libraries for Mobile Applications. ICA3PP (3) 2018: 417-431 - [c34]Mengdi Liu, Guangquan Xu, Jun Zhang, Rajan Shankaran, Gang Luo, Xi Zheng, Zonghua Zhang:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems. ICA3PP (4) 2018: 495-510 - [c33]Bin Yang, Guangquan Xu, Xianjiao Zeng, Jia Liu, Yao Zhang:
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 821-827 - [i1]Mengdi Liu, Guangquan Xu:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-scale Recommendation Systems. CoRR abs/1805.02548 (2018) - 2017
- [j13]Guangquan Xu, Yan Cao, Yuanyuan Ren, Xiaohong Li, Zhiyong Feng:
Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things. IEEE Access 5: 21046-21056 (2017) - [j12]Qi Guo, Xiaohong Li, Guangquan Xu, Zhiyong Feng:
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks. Future Gener. Comput. Syst. 70: 42-47 (2017) - [j11]Ran Wang, Guangquan Xu, Bin Liu, Yan Cao, Xiaohong Li:
Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks. IEEE Multim. 24(4): 38-47 (2017) - [j10]Wenjun Wang, Xiao-ming Li, Pengfei Jiao, Guangquan Xu, Ning Yuan, Wei Yu:
Exploring Intracity Taxi Mobility during the Holidays for Location-Based Marketing. Mob. Inf. Syst. 2017: 6310827:1-6310827:10 (2017) - [j9]Guangquan Xu, Gaoxu Zhang, Chao Xu, Bin Liu, Mingquan Li, Yan Ren, Xiaohong Li, Zhiyong Feng, Degan Zhang:
A multi-attribute rating based trust model: improving the personalized trust modeling framework. Multim. Tools Appl. 76(4): 5833-5849 (2017) - [c32]XiaoMing Li, Limengzi Yuan, Chaochao Liu, Wei Yu, Xue Chen, Guangquan Xu:
An Efficient Critical Incident Propagation Model for Social Networks Based on Trust Factor. CollaborateCom 2017: 416-424 - [c31]You Zhai, Guangquan Xu, Yao Zhang:
A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature. NaNA 2017: 279-285 - [c30]Hongbo Li, Xiaohong Li, Jianye Hao, Guangquan Xu, Zhiyong Feng, Xiaofei Xie:
FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model. QRS 2017: 352-363 - [c29]Yang Zhao, Guangquan Xu, Yao Zhang:
HFA-MD: An Efficient Hybrid Features Analysis Based Android Malware Detection Method. QSHINE 2017: 248-257 - [c28]Feng Guo, Guangquan Xu, Ning Zhang, Kaili Qiu:
POQAS-S: a Novel Programmer-Oriented Online Question Answering System With Semantic Comprehension. SEKE 2017: 52-56 - [c27]Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han:
Automated Software Security Requirements Recommendation Based on FT-SR Model. SEKE 2017: 382-385 - [c26]Da-Zhi Sun, Guangquan Xu:
One-Round Provably Secure Yoking-Proof for RFID Applications. TrustCom/BigDataSE/ICESS 2017: 315-322 - 2016
- [j8]Guangquan Xu, Yuanyuan Ren, Yuanbin Han, Xiaohong Li, Zhiyong Feng:
Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems. IEICE Trans. Inf. Syst. 99-D(8): 2019-2026 (2016) - [j7]Xiaohong Li, Jiayi Xu, Guangquan Xu, Jianye Hao, Xiaoru Li, Zhiyong Feng, Honghao Gao:
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service. Int. J. Softw. Eng. Knowl. Eng. 26(4): 563-586 (2016) - [c25]Guangquan Xu, Yan Cao, Yao Zhang, Gaoxu Zhang, Xiaohong Li, Zhiyong Feng:
TRM: Computing Reputation Score by Mining Reviews. AAAI Workshop: Incentives and Trust in Electronic Communities 2016 - [c24]Xin Zhang, Xiaohong Li, Zhiyong Feng, Guangquan Xu:
Universal Analysis and Detection Framework for Location Aided Routing. ICECCS 2016: 145-154 - [c23]Ren Zhao, Xiaohong Li, Guangquan Xu, Zhiyong Feng, Jianye Hao:
E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet. SOFL+MSVL 2016: 101-120 - 2015
- [c22]Chen Liu, Dingyi Fang, Xiaojiang Chen, Yue Hu, Wen Cui, Guangquan Xu, Hao Chen:
LSVS: Bringing Layer Slicing and Virtual Sinks to Geographic Opportunistic Routing in Strip WSNs. BDCloud 2015: 281-286 - [c21]Guangquan Xu, Bin Liu, Yuanyuan Ren, Runhe Huang, Gaoxu Zhang, Zhiyong Feng, Xiaohong Li:
Towards Trustworthy Participants in Social Participatory Networks. CSCloud 2015: 194-199 - [c20]Qi Guo, Xiaohong Li, Zhiyong Feng, Guangquan Xu:
MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks. HPCC/CSS/ICESS 2015: 1512-1517 - [c19]Guangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li, Zhiyong Feng:
PEM4RFID: Privacy Enhancement Model for RFID Systems. ICA3PP (3) 2015: 682-694 - [c18]Dongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:
POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware. SecureComm 2015: 559-562 - [c17]Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor. TrustCom/BigDataSE/ISPA (1) 2015: 33-40 - [c16]Guangquan Xu, Yan Ren, Gaoxu Zhang, Bin Liu, Xiaohong Li, Zhiyong Feng:
HyCPK: Securing Identity Authentication in Ubiquitous Computing. UIC/ATC/ScalCom 2015: 239-246 - 2014
- [j6]Chao Xu, Qinghua Hu, Guangquan Xu, Zhiyong Feng:
An approach to facial expression analysis with multi-model interactions. Int. J. Comput. Math. 91(11): 2329-2340 (2014) - [j5]Xiaoru Li, Xiaohong Li, Guangquan Xu, Jing Hu, Zhiyong Feng:
Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol. J. Appl. Math. 2014: 983204:1-983204:10 (2014) - [j4]Xiaohong Li, Ke He, Zhiyong Feng, Guangquan Xu:
Unified threat model for analyzing and evaluating software threats. Secur. Commun. Networks 7(10): 1454-1466 (2014) - [c15]Gang Shen, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng:
An Extended UML Method for the Verification of Security Protocols. ICECCS 2014: 19-28 - [c14]Xiaofei Wu, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng:
OOPN-SRAM: A Novel Method for Software Risk Assessment. ICECCS 2014: 150-153 - [c13]Haofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu, Zhiyong Feng:
Hybrid Detection Using Permission Analysis for Android Malware. SecureComm (1) 2014: 541-545 - [c12]Zhuobing Han, Xiaohong Li, Ruitao Feng, Jing Hu, Guangquan Xu, Zhiyong Feng:
A Three-Dimensional Model for Software Security Evaluation. TASE 2014: 34-41 - [c11]Shuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang, Zhiyong Feng:
Attack Tree Based Android Malware Detection with Hybrid Analysis. TrustCom 2014: 380-387 - [c10]Hongbin Pei, Xiaohong Li, Guangquan Xu, Zhiyong Feng:
Mining Specification of Insecure Browser Extension Behavior. TrustCom 2014: 871-876 - 2013
- [j3]Guangquan Xu, Weisheng Li, Rui Xu, Yingyuan Xiao, Honghao Gao, Xiaohong Li, Zhiyong Feng, Jia Mei:
An algorithm on fairness verification of mobile sink routing in wireless sensor network. Pers. Ubiquitous Comput. 17(5): 851-864 (2013) - [j2]Da-Zhi Sun, Jian-Xin Li, Zhiyong Feng, Zhen-Fu Cao, Guangquan Xu:
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquitous Comput. 17(5): 895-905 (2013) - [c9]Rui Xu, Guangquan Xu, Da-Zhi Sun, Xiaohong Li, Zhiyong Feng:
Improving KeyNote Trust Management Model Based on User Behavior for Social Learning. ICWL Workshops 2013: 96-103 - [c8]Yingyuan Xiao, Tao Jiang, Yukun Li, Guangquan Xu:
Data Interpolating over RFID Data Streams for Missed Readings. WAIM Workshops 2013: 257-265 - 2012
- [c7]Guangquan Xu, Chao Xu, Xiuming Tian, Luxia Zhang, Xiaohong Li, Weisheng Li:
PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network. CGC 2012: 594-600 - [c6]Chao Xu, Guangquan Xu, Qinghua Hu, Zhiyong Feng:
Facial Expressions Analysis Based on Cooperative Neuro-computing Interactions. IScIDE 2012: 107-114
2000 – 2009
- 2009
- [c5]Guangquan Xu, Zhiyong Feng, Xiaohong Li, Hutong Wu, Yongxin Yu, Shizhan Chen, Guozheng Rao:
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics. ICICS 2009: 385-395 - 2008
- [c4]Xiaohui Yang, Zhiyong Feng, Guangquan Xu:
The Automatic Formation of Agent Societies: A Service-Driven Approach. ALPIT 2008: 556-561 - [c3]Huabei Wu, Jizhou Sun, Guangquan Xu:
On the Trust Decision in Virtual Society: Using the Least Point Principle in Dempster-Shafer Theory of Belief Functions. ICNC (6) 2008: 63-66 - 2007
- [j1]Guangquan Xu, Zhiyong Feng, Huabei Wu, Dexin Zhao:
Swift Trust in a Virtual Temporary System: A Model Based on the Dempster-Shafer Theory of Belief Functions. Int. J. Electron. Commer. 12(1): 93-126 (2007) - [c2]Dexin Zhao, Zhiyong Feng, Qing Yu, Guangquan Xu:
A Fuzzy Extension of OWL for Vague Knowledge. FSKD (4) 2007: 312-316 - [c1]Guangquan Xu, Zhiyong Feng, Gang Wang, Huabei Wu:
An Improvement of Coleman Model of Trust: Using FNHMS to Manage Reputation in Multi-agent Systems. Web Intelligence/IAT Workshops 2007: 319-322
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint