![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Samik Basu 0001
Person information
- affiliation: Iowa State University, Department of Computer Science, Ames, USA
Other persons with the same name
- Samik Basu 0002 — Vivekananda University, Belur, India
- Samik Basu 0003 — CoreEL Technologies, Bangalore, India
Refine list
![note](https://dblp.org/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c89]Yanhui Zhu
, Samik Basu
, A. Pavan
:
Regularized Unconstrained Weakly Submodular Maximization. CIKM 2024: 3537-3548 - [c88]Yanhui Zhu, Samik Basu, A. Pavan:
Improved Evolutionary Algorithms for Submodular Maximization with Cost Constraints. IJCAI 2024: 7082-7090 - [c87]Karthik Hanumanthaiah
, Samik Basu:
Iterative Counter-Example Guided Robustness Verification for Neural Networks. SAIV 2024: 179-187 - [i8]Yanhui Zhu, Samik Basu, A. Pavan:
Improved Evolutionary Algorithms for Submodular Maximization with Cost Constraints. CoRR abs/2405.05942 (2024) - [i7]Le Chang, Saitej Yavvari, Rance Cleaveland, Samik Basu, Liyi Li:
DisQ: A Markov Decision Process Based Language for Quantum Distributed Systems. CoRR abs/2407.09710 (2024) - [i6]Yanhui Zhu, Samik Basu, A. Pavan:
Regularized Unconstrained Weakly Submodular Maximization. CoRR abs/2408.04620 (2024) - [i5]Yanhui Zhu, Samik Basu, A. Pavan:
Fairness in Monotone k-submodular Maximization: Algorithms and Applications. CoRR abs/2411.05318 (2024) - 2023
- [c86]Samik Basu, Vasant G. Honavar
, Ganesh Ram Santhanam, Jia Tao
:
Representing and Reasoning with Multi-Stakeholder Qualitative Preference Queries. ECAI 2023: 206-213 - [c85]Guanyu Nie, Yanhui Zhu, Yididiya Y. Nadew, Samik Basu, A. Pavan, Christopher John Quinn:
Size-constrained k-submodular maximization in near-linear time. UAI 2023: 1545-1554 - [c84]Madhavan R. Padmanabhan, Yanhui Zhu, Samik Basu, Aduri Pavan:
Maximizing submodular functions under submodular constraints. UAI 2023: 1618-1627 - [i4]Samik Basu, Vasant G. Honavar, Ganesh Ram Santhanam, Jia Tao:
Representing and Reasoning with Multi-Stakeholder Qualitative Preference Queries. CoRR abs/2307.16307 (2023) - 2021
- [j13]Samik Basu, Ratnesh Kumar:
Control of Non-Deterministic Systems With $\mu$-Calculus Specifications Using Quotienting. IEEE CAA J. Autom. Sinica 8(5): 953-970 (2021) - [j12]Xiaoyun Fu, Madhavan R. Padmanabhan, Raj Gaurav Kumar, Samik Basu, Shawn F. Dorius, A. Pavan:
Measuring the impact of influence on individuals: roadmap to quantifying attitude. Soc. Netw. Anal. Min. 11(1): 61 (2021) - [c83]Xiaoyun Fu, Rishabh Rajendra Bhatt, Samik Basu, Aduri Pavan:
Multi-Objective Submodular Optimization with Approximate Oracles and Influence Maximization. IEEE BigData 2021: 328-334 - 2020
- [c82]Xiaoyun Fu, Madhavan R. Padmanabhan, Raj Gaurav Kumar, Samik Basu, Shawn F. Dorius, Aduri Pavan:
Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude. ASONAM 2020: 227-231 - [c81]Raj Gaurav Kumar, Preeti Bhardwaj, Samik Basu, Aduri Pavan:
Disrupting Diffusion: Critical Nodes in Network. WI/IAT 2020: 397-404 - [i3]Xiaoyun Fu, Madhavan Rajagopal Padmanabhan, Raj Gaurav Kumar, Samik Basu, Shawn F. Dorius, Aduri Pavan:
Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude. CoRR abs/2010.13304 (2020)
2010 – 2019
- 2018
- [c80]Madhavan R. Padmanabhan, Naresh Somisetty, Samik Basu, A. Pavan:
Influence Maximization in Social Networks With Non-Target Constraints. IEEE BigData 2018: 771-780 - 2017
- [c79]Maheedhar Gunasekharan, Samik Basu, Ganesh Ram Santhanam:
Selecting the minimal set of preferred responses to counter detected intrusions. CISRC 2017: 5:1-5:8 - 2016
- [b1]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar
:
Representing and Reasoning with Qualitative Preferences: Tools and Applications. Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers 2016, ISBN 978-3-031-00445-2 - [j11]Samik Basu, Tevfik Bultan:
On deciding synchronizability for asynchronously communicating systems. Theor. Comput. Sci. 656: 60-75 (2016) - [c78]Chris Strasburg, Samik Basu, Johnny S. Wong:
A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness. CISRC 2016: 11:1-11:8 - [c77]Samik Basu, Tevfik Bultan:
Automated Choreography Repair. FASE 2016: 13-30 - 2015
- [c76]Ganesh Ram Santhanam, Gopalakrishnan Sivaprakasam, Giora Slutzki, Samik Basu:
A Knowledge Based Framework for Case-specific Diagnosis. ICAART (2) 2015: 482-488 - [c75]Zachary J. Oster
, Ganesh Ram Santhanam, Samik Basu:
Scalable modeling and analysis of requirements preferences: A qualitative approach using CI-Nets. RE 2015: 214-219 - [i2]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
CRISNER: A Practically Efficient Reasoner for Qualitative Preferences. CoRR abs/1507.08559 (2015) - 2014
- [c74]Tanmoy Sarkar, Samik Basu, Johnny Wong:
iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants. ITNG 2014: 479-484 - [c73]Samik Basu, Tevfik Bultan:
Automatic verification of interactions in asynchronous systems with unbounded buffers. ASE 2014: 743-754 - [i1]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Representing and Reasoning with Qualitative Preferences for Compositional Systems. CoRR abs/1401.3899 (2014) - 2013
- [c72]Ganesh Ram Santhanam
, Samik Basu, Vasant G. Honavar
:
Verifying Preferential Equivalence and Subsumption via Model Checking. ADT 2013: 324-335 - [c71]Chris Strasburg, Samik Basu, Johnny S. Wong:
S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection Systems. COMPSAC 2013: 319-328 - [c70]Ganesh Ram Santhanam
, Zachary J. Oster
, Samik Basu:
Identifying a preferred countermeasure strategy for attack graphs. CSIIRW 2013: 11 - [c69]Tanmoy Sarkar, Samik Basu, Johnny Wong:
SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL Mutants. ITNG 2013: 337-342 - [c68]Michelle Ruse, Samik Basu:
Detecting Cross-Site Scripting Vulnerability Using Concolic Testing. ITNG 2013: 633-638 - [c67]Ganesh Ram Santhanam
, Samik Basu, Vasant G. Honavar
:
Preference Based Service Adaptation Using Service Substitution. Web Intelligence 2013: 487-493 - [e1]Samik Basu, Cesare Pautasso, Liang Zhang, Xiang Fu:
Service-Oriented Computing - 11th International Conference, ICSOC 2013, Berlin, Germany, December 2-5, 2013, Proceedings. Lecture Notes in Computer Science 8274, Springer 2013, ISBN 978-3-642-45004-4 [contents] - 2012
- [j10]Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
Towards cost-sensitive assessment of intrusion response selection. J. Comput. Secur. 20(2-3): 169-198 (2012) - [j9]Paul Jennings, Arka P. Ghosh, Samik Basu:
A two-phase approximation for model checking probabilistic unbounded until properties of probabilistic systems. ACM Trans. Softw. Eng. Methodol. 21(3): 18:1-18:35 (2012) - [c66]Roopak Sinha, Partha S. Roop, Zoran Salcic, Samik Basu:
Correct-by-construction multi-component SoC design. DATE 2012: 647-652 - [c65]Zachary J. Oster
, Ganesh Ram Santhanam
, Samik Basu, Vasant G. Honavar
:
Model Checking of Qualitative Sensitivity Preferences to Minimize Credential Disclosure. FACS 2012: 205-223 - [c64]Tanmoy Sarkar, Samik Basu, Johnny S. Wong:
ConSMutate: SQL Mutants for Guiding Concolic Testing of Database Applications. ICFEM 2012: 462-477 - [c63]Zachary J. Oster
, Syed Adeel Ali, Ganesh Ram Santhanam
, Samik Basu, Partha S. Roop:
A Service Composition Framework Based on Goal-Oriented Requirements Engineering, Model Checking, and Qualitative Preference Analysis. ICSOC 2012: 283-297 - [c62]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Deciding choreography realizability. POPL 2012: 191-202 - [c61]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Synchronizability for Verification of Asynchronously Communicating Systems. VMCAI 2012: 56-71 - 2011
- [j8]Jing Liu, Samik Basu, Robyn R. Lutz
:
Compositional model checking of software product lines using variation point obligations. Autom. Softw. Eng. 18(1): 39-76 (2011) - [j7]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Representing and Reasoning with Qualitative Preferences for Compositional Systems. J. Artif. Intell. Res. 42: 211-274 (2011) - [c60]Ganesh Ram Santhanam, Yuly Suvorov, Samik Basu, Vasant G. Honavar:
Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach. AAAI 2011: 1408-1414 - [c59]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Identifying Sustainable Designs Using Preferences over Sustainability Attributes. AAAI Spring Symposium: Artificial Intelligence and Sustainable Design 2011 - [c58]Zachary J. Oster
, Ganesh Ram Santhanam
, Samik Basu:
Identifying Optimal Composite Services by Decomposing the Service Composition Problem. ICWS 2011: 267-274 - [c57]Zachary J. Oster
, Ganesh Ram Santhanam
, Samik Basu:
Automating analysis of qualitative preferences in goal-oriented requirements engineering. ASE 2011: 448-451 - [c56]Samik Basu, Tevfik Bultan:
Choreography conformance via synchronizability. WWW 2011: 795-804 - 2010
- [j6]Natalia Stakhanova, Samik Basu, Johnny Wong:
On the symbiosis of specification-based and anomaly-based detection. Comput. Secur. 29(2): 253-268 (2010) - [c55]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Dominance Testing via Model Checking. AAAI 2010: 357-362 - [c54]Igors Svecs, Tanmoy Sarkar, Samik Basu, Johnny S. Wong:
XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment. COMPSAC Workshops 2010: 287-292 - [c53]Zachary J. Oster
, Ganesh Ram Santhanam
, Samik Basu:
Decomposing the Service Composition Problem. ECOWS 2010: 163-170 - [c52]Youssef Hanna, David Samuelson, Samik Basu, Hridesh Rajan
:
Automating Cut-off for Multi-parameterized Systems. ICFEM 2010: 338-354 - [c51]Hongyu Sun, Samik Basu, Vasant G. Honavar
, Robyn R. Lutz
:
Automata-Based Verification of Security Requirements of Composite Web Services. ISSRE 2010: 348-357 - [c50]Ru He, Paul Jennings, Samik Basu, Arka P. Ghosh, Huaiqing Wu:
A bounded statistical approach for model checking of unbounded until properties. ASE 2010: 225-234 - [c49]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Efficient Dominance Testing for Unconditional Preferences. KR 2010 - [c48]Michelle Ruse, Tanmoy Sarkar, Samik Basu:
Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs. SAINT 2010: 31-37 - [c47]Chris Strasburg, Sandeep Krishnan, Karin S. Dorman
, Samik Basu, Johnny S. Wong:
Masquerade Detection in Network Environments. SAINT 2010: 38-44 - [c46]Dinanath Nadkarni, Samik Basu, Vasant G. Honavar
, Robyn R. Lutz
:
Failure Analysis for Composition of Web Services Represented as Labeled Transition Systems. WS-FM 2010: 161-175
2000 – 2009
- 2009
- [c45]Ganesh Ram Santhanam
, Samik Basu, Vasant G. Honavar
:
Web Service Substitution Based on Preferences Over Non-functional Attributes. IEEE SCC 2009: 210-217 - [c44]Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:
Intrusion response cost assessment methodology. AsiaCCS 2009: 388-391 - [c43]Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:
A Framework for Cost Sensitive Assessment of Intrusion Response Selection. COMPSAC (1) 2009: 355-360 - [c42]Roopak Sinha, Partha S. Roop, Samik Basu, Zoran Salcic:
Multi-clock Soc design using protocol conversion. DATE 2009: 123-128 - [c41]Samik Basu, Arka P. Ghosh, Ru He:
Approximate Model Checking of PCTL Involving Unbounded Path Properties. ICFEM 2009: 326-346 - [c40]Zachary J. Oster
, Samik Basu:
Extending Substitutability in Composite Services by Allowing Asynchronous Communication with Message Buffers. ICTAI 2009: 572-575 - [c39]Saayan Mitra, Ratnesh Kumar, Samik Basu:
A Framework for Optimal Decentralized Service-Choreography. ICWS 2009: 493-500 - [c38]Xia Wang, Johnny S. Wong, Fred Stanley, Samik Basu:
Cross-Layer Based Anomaly Detection in Wireless Mesh Networks. SAINT 2009: 9-15 - [c37]Youssef Hanna, Samik Basu, Hridesh Rajan
:
Behavioral automata composition for automatic topology independent verification of parameterized systems. ESEC/SIGSOFT FSE 2009: 325-334 - [c36]Hongyu Sun, Robyn R. Lutz, Samik Basu:
Product-line-based requirements customization for web service compositions. SPLC 2009: 141-150 - 2008
- [j5]Roopak Sinha
, Partha S. Roop, Samik Basu:
SoC Design Approach Using Convertibility Verification. EURASIP J. Embed. Syst. 2008 (2008) - [j4]Jyotishman Pathak, Samik Basu, Robyn R. Lutz
, Vasant G. Honavar
:
MOSCOE: an Approach for Composing Web Services through Iterative Reformulation of Functional Specifications. Int. J. Artif. Intell. Tools 17(1): 109-138 (2008) - [c35]Jyotishman Pathak, Samik Basu, Vasant G. Honavar
:
Composing Web Services through Automatic Reformulation of Service Specifications. IEEE SCC (1) 2008: 361-369 - [c34]Saayan Mitra, Ratnesh Kumar, Samik Basu:
Optimum Decentralized Choreography for Web Services Composition. IEEE SCC (2) 2008: 395-402 - [c33]Ganesh Ram Santhanam
, Samik Basu, Vasant G. Honavar
:
TCP-Compose* - A TCP-Net Based Algorithm for Efficient Composition of Web Services Using Qualitative Preferences. ICSOC 2008: 453-467 - [c32]Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
On Evaluation of Response Cost for Intrusion Response Systems. RAID 2008: 390-391 - [c31]Ganesh Ram Santhanam
, Samik Basu, Vasant G. Honavar
:
On Utilizing Qualitative Preferences in Web Service Composition: A CP-net Based Approach. SERVICES I 2008: 538-544 - [c30]Roopak Sinha
, Partha S. Roop, Samik Basu:
A Module Checking Based Converter Synthesis Approach for SoCs. VLSI Design 2008: 492-501 - 2007
- [j3]Natalia Stakhanova, Samik Basu, Johnny Wong:
A taxonomy of intrusion response systems. Int. J. Inf. Comput. Secur. 1(1/2): 169-184 (2007) - [j2]Samik Basu, Scott A. Smolka:
Model checking the Java metalocking algorithm. ACM Trans. Softw. Eng. Methodol. 16(3): 12 (2007) - [c29]Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong:
Specification Synthesis for Monitoring and Analysis of MANET Protocols. AINA Workshops (1) 2007: 183-187 - [c28]Natalia Stakhanova, Samik Basu, Johnny Wong:
A Cost-Sensitive Model for Preemptive Intrusion Response Systems. AINA 2007: 428-435 - [c27]Samik Basu, Ratnesh Kumar:
Quotient-based control synthesis for partially observed non-deterministic plants with mu-calculus specifications. CDC 2007: 5294-5299 - [c26]Jyotishman Pathak, Samik Basu, Vasant G. Honavar
:
On Context-Specific Substitutability of Web Services. ICWS 2007: 192-199 - [c25]Saayan Mitra, Ratnesh Kumar, Samik Basu:
Automated Choreographer Synthesis for Web Services Composition Using I/O Automata. ICWS 2007: 364-371 - [c24]Flavian Vasile, Samik Basu:
Cost-based Analysis of Multiple Counter-Examples. SEKE 2007: 33-38 - [c23]Saayan Mitra, Samik Basu, Ratnesh Kumar:
Local and On-the-fly Choreography-based Web Service Composition. Web Intelligence 2007: 521-527 - [c22]Roopak Sinha
, Partha S. Roop, Samik Basu:
A Model Checking Approach to Protocol Conversion. SLA++P@ETAPS 2007: 81-94 - [p1]Jyotishman Pathak, Samik Basu, Vasant G. Honavar:
Assembling Composite Web Services from Autonomous Components. Emerging Artificial Intelligence Applications in Computer Engineering 2007: 394-405 - 2006
- [j1]Samik Basu, C. R. Ramakrishnan:
Compositional analysis for verification of parameterized systems. Theor. Comput. Sci. 354(2): 211-229 (2006) - [c21]Ratnesh Kumar, Changyan Zhou, Samik Basu:
Finite bisimulation of reactive untimed infinite state systems modeled as automata with variables. ACC 2006: 1-6 - [c20]Samik Basu, Ratnesh Kumar:
Quotient-based Control Synthesis for Non-Deterministic Plants with Mu-Calculus Specifications. CDC 2006: 6041-6046 - [c19]Natalia Stakhanova, Samik Basu, Robyn R. Lutz
, Johnny Wong:
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. DASC 2006: 333-340 - [c18]Jyotishman Pathak, Samik Basu, Robyn R. Lutz
, Vasant G. Honavar:
Parallel Web Service Composition in MoSCoE: A Choreography-Based Approach. ECOWS 2006: 3-12 - [c17]Jyotishman Pathak, Samik Basu, Robyn R. Lutz
, Vasant G. Honavar
:
MoSCoE: A Framework for Modeling Web Service Composition and Execution. ICDE Workshops 2006: 143 - [c16]Jyotishman Pathak, Samik Basu, Vasant G. Honavar
:
Modeling Web Services by Iterative Reformulation of Functional and Non-functional Requirements. ICSOC 2006: 314-326 - [c15]Jyotishman Pathak, Samik Basu, Robyn R. Lutz
, Vasant G. Honavar
:
Selecting and Composing Web Services through Iterative Reformulation of Functional Specifications. ICTAI 2006: 445-454 - [c14]Andrew S. Miner, Samik Basu:
Verification of software via integration of design and implementation. IPDPS 2006 - [c13]Ping Yang, Samik Basu, C. R. Ramakrishnan:
Parameterized Verification of pi-Calculus Systems. TACAS 2006: 42-57 - [c12]Samik Basu, Partha S. Roop, Roopak Sinha
:
Local Module Checking for CTL Specifications. FESCA@ETAPS 2006: 125-141 - 2005
- [c11]Natalia Stakhanova, Samik Basu, Johnny Wong, Oleg Stakhanov:
Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. ICDCS Workshops 2005: 203-209 - [c10]Curtis W. Keller, Diptikalyan Saha, Samik Basu, Scott A. Smolka:
FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs. TACAS 2005: 563-569 - 2004
- [c9]Samik Basu, Diptikalyan Saha, Scott A. Smolka:
Localizing Program Errors for Cimple Debugging. FORTE 2004: 79-96 - [c8]Samik Basu, Prem Uppuluri:
Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. ICDCIT 2004: 353-362 - [c7]Prem Uppuluri, Samik Basu:
LASE: Layered Approach for Sensor Security and Efficiency. ICPP Workshops 2004: 346-353 - 2003
- [c6]Samik Basu, Diptikalyan Saha, Yow-Jian Lin, Scott A. Smolka:
Generation of All Counter-Examples for Push-Down Systems. FORTE 2003: 79-94 - [c5]R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney:
Model-carrying code: a practical approach for safe execution of untrusted applications. SOSP 2003: 15-28 - [c4]Samik Basu, C. R. Ramakrishnan:
Compositional Analysis for Verification of Parameterized Systems. TACAS 2003: 315-330 - 2002
- [c3]Samik Basu, K. Narayan Kumar, L. Robert Pokorny, C. R. Ramakrishnan:
Resource-Constrained Model Checking of Recursive Programs. TACAS 2002: 236-250 - 2001
- [c2]Samik Basu, Madhavan Mukund, C. R. Ramakrishnan, I. V. Ramakrishnan, Rakesh M. Verma
:
Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming. ICLP 2001: 166-180 - 2000
- [c1]Samik Basu, Scott A. Smolka, Orson R. Ward:
Model Checking the Java Meta-Locking Algorithm. ECBS 2000: 342-350
Coauthor Index
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 21:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint