default search action
Minhui Xue 0001
Person information
- affiliation: CSIRO Marsfield, NSW, Australia
- affiliation: University of Adelaide, SA, Australia
- affiliation (former): Macquarie University, Australia
Other persons with the same name
- Chun Jason Xue (aka: Jason Xue 0001, Chun Xue 0001) — Mohamed bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, United Arab Emirates (and 2 more)
- Jason Xue 0003 — Intuit Inc.
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Jiliang Zhang, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Commercial Frameworks. IEEE Trans. Dependable Secur. Comput. 21(3): 1155-1172 (2024) - [j17]Aoting Hu, Zhigang Lu, Renjie Xie, Minhui Xue:
${\sf VeriDIP}$VeriDIP: Verifying Ownership of Deep Neural Networks Through Privacy Leakage Fingerprints. IEEE Trans. Dependable Secur. Comput. 21(4): 2568-2584 (2024) - [j16]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "Code" of Ethics: A Holistic Audit of AI Code Generators. IEEE Trans. Dependable Secur. Comput. 21(5): 4997-5013 (2024) - [j15]Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. IEEE Trans. Inf. Forensics Secur. 19: 104-119 (2024) - [c92]Yuxin Cao, Ziyu Zhao, Xi Xiao, Derui Wang, Minhui Xue, Jin Lu:
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer. AAAI 2024: 945-953 - [c91]Zhiyu Zhu, Huaming Chen, Jiayu Zhang, Xinyi Wang, Zhibo Jin, Minhui Xue, Dongxiao Zhu, Kim-Kwang Raymond Choo:
MFABA: A More Faithful and Accelerated Boundary-Based Attribution Method for Deep Neural Networks. AAAI 2024: 17228-17236 - [c90]Longkun Guo, Chaoqi Jia, Kewen Liao, Zhigang Lu, Minhui Xue:
Efficient Constrained K-center Clustering with Background Knowledge. AAAI 2024: 20709-20717 - [c89]Haodong Lu, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore:
Learning with Mixture of Prototypes for Out-of-Distribution Detection. ICLR 2024 - [c88]Zhiyu Zhu, Huaming Chen, Jiayu Zhang, Xinyi Wang, Zhibo Jin, Jason Xue, Flora D. Salim:
AttEXplore: Attribution for Explanation with model parameters eXploration. ICLR 2024 - [c87]Youwei Shu, Xi Xiao, Derui Wang, Yuxin Cao, Siji Chen, Jason Xue, Linyi Li, Bo Li:
Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing. ICML 2024 - [c86]Zhiyu Zhu, Huaming Chen, Xinyi Wang, Jiayu Zhang, Zhibo Jin, Jason Xue, Jun Shen:
Iterative Search Attribution for Deep Neural Networks. ICML 2024 - [c85]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. NDSS 2024 - [c84]Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. NDSS 2024 - [c83]Kunpeng Zhang, Xiaogang Zhu, Xi Xiao, Minhui Xue, Chao Zhang, Sheng Wen:
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection. NDSS 2024 - [c82]Quan Hong Nguyen, Tingmin Wu, Van Nguyen, Xingliang Yuan, Jason Xue, Carsten Rudolph:
Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails. SecTL@AsiaCCS 2024: 35-46 - [c81]Yuxin Cao, Jinghao Li, Xi Xiao, Derui Wang, Minhui Xue, Hao Ge, Wei Liu, Guangwu Hu:
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model. SP (Workshops) 2024: 48-56 - [c80]Kai Zhang, Yanjun Zhang, Ruoxi Sun, Pei-Wei Tsai, Muneeb Ul Hassan, Xin Yuan, Minhui Xue, Jinjun Chen:
Bounded and Unbiased Composite Differential Privacy. SP 2024: 972-990 - [c79]Zihan Wang, Zhongkui Ma, Xinguo Feng, Ruoxi Sun, Hu Wang, Minhui Xue, Guangdong Bai:
CORELOCKER: Neuron-level Usage Control. SP 2024: 2497-2514 - [c78]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. SP 2024: 2534-2552 - [c77]Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Minhui Xue:
LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs. SP 2024: 2977-2995 - [c76]Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. SP 2024: 3257-3275 - [c75]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. SP 2024: 3311-3326 - [c74]Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen:
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection. USENIX Security Symposium 2024 - [c73]Shuofeng Liu, Zihan Wang, Minhui Xue, Long Wang, Yuanchao Zhang, Guangdong Bai:
Being Transparent is Merely the Beginning: Enforcing Purpose Limitation with Polynomial Approximation. USENIX Security Symposium 2024 - [c72]Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue:
DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts. USENIX Security Symposium 2024 - [c71]Haichen Wang, Shuchao Pang, Zhigang Lu, Yihang Rao, Yongbin Zhou, Minhui Xue:
dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis. USENIX Security Symposium 2024 - [c70]Ruoxi Sun, Hanwen Wang, Minhui Xue, Hsiang-Ting Chen:
PPVR: A Privacy-Preserving Approach for User Behaviors in VR. VR Workshops 2024: 1055-1056 - [c69]Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Minhui Xue:
The Invisible Game on the Internet: A Case Study of Decoding Deceptive Patterns. WWW (Companion Volume) 2024: 521-524 - [c68]Ziqi Wang, Xiaoyu Xia, Minhui Xue, Ibrahim Khalil, Minghui Liwang, Xun Yi:
GEES: Enabling Location Privacy-Preserving Energy Saving in Multi-Access Edge Computing. WWW 2024: 2735-2746 - [c67]Yanjun Zhang, Ruoxi Sun, Liyue Shen, Guangdong Bai, Minhui Xue, Mark Huasong Meng, Xue Li, Ryan K. L. Ko, Surya Nepal:
Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience. WWW 2024: 2986-2997 - [c66]Nan Wu, Xin Yuan, Shuo Wang, Hongsheng Hu, Minhui Xue:
Cardinality Counting in "Alcatraz": A Privacy-aware Federated Learning Approach. WWW 2024: 3076-3084 - [i64]Longkun Guo, Chaoqi Jia, Kewen Liao, Zhigang Lu, Minhui Xue:
Efficient Constrained k-Center Clustering with Background Knowledge. CoRR abs/2401.12533 (2024) - [i63]Haodong Lu, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore:
Learning with Mixture of Prototypes for Out-of-Distribution Detection. CoRR abs/2402.02653 (2024) - [i62]Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Minhui Xue:
The Invisible Game on the Internet: A Case Study of Decoding Deceptive Patterns. CoRR abs/2402.03569 (2024) - [i61]Yuxin Cao, Jinghao Li, Xi Xiao, Derui Wang, Minhui Xue, Hao Ge, Wei Liu, Guangwu Hu:
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model. CoRR abs/2403.11656 (2024) - [i60]Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. CoRR abs/2404.03233 (2024) - [i59]Derui Wang, Minhui Xue, Bo Li, Seyit Camtepe, Liming Zhu:
Provably Unlearnable Examples. CoRR abs/2405.03316 (2024) - [i58]Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang:
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure. CoRR abs/2405.15258 (2024) - [i57]Youwei Shu, Xi Xiao, Derui Wang, Yuxin Cao, Siji Chen, Jason Xue, Linyi Li, Bo Li:
Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing. CoRR abs/2406.02309 (2024) - [i56]Zhongzheng Lai, Huaming Chen, Ruoxi Sun, Yu Zhang, Minhui Xue, Dong Yuan:
On Security Weaknesses and Vulnerabilities in Deep Learning Systems. CoRR abs/2406.08688 (2024) - [i55]Huajie Chen, Tianqing Zhu, Lefeng Zhang, Bo Liu, Derui Wang, Wanlei Zhou, Minhui Xue:
QUEEN: Query Unlearning against Model Extraction. CoRR abs/2407.01251 (2024) - [i54]Yuxin Cao, Yumeng Zhu, Derui Wang, Sheng Wen, Minhui Xue, Jin Lu, Hao Ge:
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems. CoRR abs/2407.08514 (2024) - [i53]Hanrui Wang, Ruoxi Sun, Cunjian Chen, Minhui Xue, Lay-Ki Soon, Shuo Wang, Zhe Jin:
Iterative Window Mean Filter: Thwarting Diffusion-based Adversarial Purification. CoRR abs/2408.10673 (2024) - 2023
- [j14]Zihan Wang, Olivia Byrnes, Hu Wang, Ruoxi Sun, Congbo Ma, Huaming Chen, Qi Wu, Minhui Xue:
Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography. IEEE Trans. Comput. Soc. Syst. 10(6): 2985-2999 (2023) - [c65]Yanli Li, Chongbin Ye, Huaming Chen, Shiping Chen, Minhui Xue, Jun Shen:
Towards Better ML-Based Software Services: An Investigation of Source Code Engineering Impact. SSE 2023: 1-10 - [c64]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Jason Xue, Sharif Abuadbba, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. AINTEC 2023: 78-86 - [c63]Zhibo Jin, Zhiyu Zhu, Hongsheng Hu, Minhui Xue, Huaming Chen:
POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models. AsiaCCS 2023: 1031-1033 - [c62]Zhiyu Zhu, Huaming Chen, Zhibo Jin, Xinyi Wang, Jiayu Zhang, Minhui Xue, Qinghua Lu, Jun Shen, Kim-Kwang Raymond Choo:
FVW: Finding Valuable Weight on Deep Neural Network for Model Pruning. CIKM 2023: 3657-3666 - [c61]He Zhang, Bang Wu, Shuo Wang, Xiangwen Yang, Minhui Xue, Shirui Pan, Xingliang Yuan:
Demystifying Uneven Vulnerability of Link Stealing Attacks against Graph Neural Networks. ICML 2023: 41737-41752 - [c60]Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu:
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. NDSS 2023 - [c59]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. NDSS 2023 - [c58]Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. NDSS 2023 - [c57]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. NDSS 2023 - [c56]Yuxin Cao, Yian Li, Yumeng Zhu, Derui Wang, Minhui Xue:
Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection. NeurIPS 2023 - [c55]Zhiyu Zhu, Jiayu Zhang, Zhibo Jin, Xinyi Wang, Minhui Xue, Jun Shen, Kim-Kwang Raymond Choo, Huaming Chen:
Towards Minimising Perturbation Rate for Adversarial Machine Learning with Pruning. ECML/PKDD (1) 2023: 147-163 - [c54]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. ESEC/SIGSOFT FSE 2023: 1573-1585 - [c53]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere:
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. SP 2023: 1348-1365 - [c52]Yuxin Cao, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen:
StyleFool: Fooling Video Classification Systems via Style Transfer. SP 2023: 1631-1648 - [c51]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
RAI4IoE: Responsible AI for Enabling the Internet of Energy. TPS-ISA 2023: 13-22 - [c50]Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng:
Detecting Union Type Confusion in Component Object Model. USENIX Security Symposium 2023: 4265-4281 - [c49]Haonan Zhong, Jiamin Chang, Ziyue Yang, Tingmin Wu, Mahawaga Arachchige Pathum Chamikara, Chehara Pathmabandu, Minhui Xue:
Copyright Protection and Accountability of Generative AI: Attack, Watermarking and Attribution. WWW (Companion Volume) 2023: 94-98 - [c48]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. WWW 2023: 2166-2177 - [c47]Yanjun Zhang, Guangdong Bai, Mahawaga Arachchige Pathum Chamikara, Mengyao Ma, Liyue Shen, Jingwei Wang, Surya Nepal, Minhui Xue, Long Wang, Joseph K. Liu:
AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning. WWW 2023: 2371-2382 - [d2]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 1. Zenodo, 2023 [all versions] - [d1]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 2. Zenodo, 2023 [all versions] - [i52]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. CoRR abs/2303.09008 (2023) - [i51]Haonan Zhong, Jiamin Chang, Ziyue Yang, Tingmin Wu, Mahawaga Arachchige Pathum Chamikara, Chehara Pathmabandu, Minhui Xue:
Copyright Protection and Accountability of Generative AI: Attack, Watermarking and Attribution. CoRR abs/2303.09272 (2023) - [i50]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "code" of Ethics: A Holistic Audit of AI Code Generators. CoRR abs/2305.12747 (2023) - [i49]Kunpeng Zhang, Xiaogang Zhu, Xiao Xi, Minhui Xue, Chao Zhang, Sheng Wen:
SHAPFUZZ: Efficient Fuzzing via Shapley-Guided Byte Selection. CoRR abs/2308.09239 (2023) - [i48]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. CoRR abs/2309.08230 (2023) - [i47]Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer:
RAI4IoE: Responsible AI for Enabling the Internet of Energy. CoRR abs/2309.11691 (2023) - [i46]Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. CoRR abs/2309.11894 (2023) - [i45]Aoting Hu, Zhigang Lu, Renjie Xie, Minhui Xue:
VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints. CoRR abs/2310.10656 (2023) - [i44]Yuxin Cao, Yian Li, Yumeng Zhu, Derui Wang, Minhui Xue:
Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection. CoRR abs/2310.16569 (2023) - [i43]Kai Zhang, Yanjun Zhang, Ruoxi Sun, Pei-Wei Tsai, Muneeb Ul Hassan, Xin Yuan, Minhui Xue, Jinjun Chen:
Bounded and Unbiased Composite Differential Privacy. CoRR abs/2311.02324 (2023) - [i42]Tian Dong, Guoxing Chen, Shaofeng Li, Minhui Xue, Rayne Holland, Yan Meng, Zhen Liu, Haojin Zhu:
Unleashing Cheapfakes through Trojan Plugins of Large Language Models. CoRR abs/2312.00374 (2023) - [i41]Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. CoRR abs/2312.07861 (2023) - [i40]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. CoRR abs/2312.07870 (2023) - [i39]Yuxin Cao, Ziyu Zhao, Xi Xiao, Derui Wang, Minhui Xue, Jin Lu:
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer. CoRR abs/2312.09935 (2023) - [i38]Zhiyu Zhu, Huaming Chen, Jiayu Zhang, Xinyi Wang, Zhibo Jin, Minhui Xue, Dongxiao Zhu, Kim-Kwang Raymond Choo:
MFABA: A More Faithful and Accelerated Boundary-based Attribution Method for Deep Neural Networks. CoRR abs/2312.13630 (2023) - [i37]Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Jason Xue, Sheng Shen, Wanlei Zhou:
Reinforcement Unlearning. CoRR abs/2312.15910 (2023) - 2022
- [j13]Shaofeng Li, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Suguo Du, Haojin Zhu:
Backdoors Against Natural Language Processing: A Review. IEEE Secur. Priv. 20(5): 50-59 (2022) - [j12]Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe:
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems. IEEE Trans. Inf. Forensics Secur. 17: 3816-3830 (2022) - [j11]Alvin Chan, Lei Ma, Felix Juefei-Xu, Yew-Soon Ong, Xiaofei Xie, Minhui Xue, Yang Liu:
Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples. IEEE Trans. Neural Networks Learn. Syst. 33(11): 6976-6982 (2022) - [c46]Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue:
Dissecting Malware in the Wild. ACSW 2022: 56-64 - [c45]Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue:
Statically Detecting Adversarial Malware through Randomised Chaining. ACSW 2022: 91-95 - [c44]Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue:
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations. CVPR 2022: 13420-13429 - [c43]Kunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui Xue, Sheng Wen:
Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States. ICSE 2022: 1658-1668 - [c42]Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue:
M$^4$I: Multi-modal Models Membership Inference. NeurIPS 2022 - [c41]Chaoran Li, Xiao Chen, Ruoxi Sun, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. ESEC/SIGSOFT FSE 2022: 772-783 - [p1]Shaofeng Li, Shiqing Ma, Minhui Xue, Benjamin Zi Hao Zhao:
Deep Learning Backdoors. Security and Artificial Intelligence 2022: 313-334 - [i36]Kunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui Xue, Sheng Wen:
Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States. CoRR abs/2201.04441 (2022) - [i35]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. CoRR abs/2202.04856 (2022) - [i34]Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue:
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations. CoRR abs/2202.08602 (2022) - [i33]Yuxin Cao, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen:
StyleFool: Fooling Video Classification Systems via Style Transfer. CoRR abs/2203.16000 (2022) - [i32]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. CoRR abs/2208.12449 (2022) - [i31]Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue:
M^4I: Multi-modal Models Membership Inference. CoRR abs/2209.06997 (2022) - [i30]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. CoRR abs/2209.11715 (2022) - 2021
- [j10]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j9]Shaofeng Li, Minhui Xue, Benjamin Zi Hao Zhao, Haojin Zhu, Xinpeng Zhang:
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization. IEEE Trans. Dependable Secur. Comput. 18(5): 2088-2105 (2021) - [j8]Sen Chen, Lingling Fan, Chunyang Chen, Minhui Xue, Yang Liu, Lihua Xu:
GUI-Squatting Attack: Automated Generation of Android Phishing Apps. IEEE Trans. Dependable Secur. Comput. 18(6): 2551-2568 (2021) - [j7]Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian:
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models. IEEE Trans. Inf. Forensics Secur. 16: 3709-3723 (2021) - [c40]Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models. ACISP 2021: 550-568 - [c39]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CCS 2021: 271-286 - [c38]Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin:
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic. CCS 2021: 287-303 - [c37]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CCS 2021: 337-350 - [c36]Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue:
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. CCS 2021: 2096-2112 - [c35]Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu:
Hidden Backdoors in Human-Centric Language Models. CCS 2021: 3123-3140 - [c34]Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe:
An Empirical Assessment of Global COVID-19 Contact Tracing Applications. ICSE (Companion Volume) 2021: 173-174 - [c33]Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe:
An Empirical Assessment of Global COVID-19 Contact Tracing Applications. ICSE 2021: 1085-1097 - [c32]Jing Xu, Minhui (Jason) Xue, Stjepan Picek:
Explainability-based Backdoor Attacks Against Graph Neural Networks. WiseML@WiSec 2021: 31-36 - [i29]Yixuan Liu, Hu Wang, Xiaowei Wang, Xiaoyue Sun, Liuyue Jiang, Minhui Xue:
Delayed Rewards Calibration via Reward Empirical Sufficiency. CoRR abs/2102.10527 (2021) - [i28]Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models. CoRR abs/2102.11502 (2021) - [i27]Jing Xu, Minhui (Jason) Xue, Stjepan Picek:
Explainability-based Backdoor Attacks Against Graph Neural Networks. CoRR abs/2104.03674 (2021) - [i26]Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu:
Hidden Backdoors in Human-Centric Language Models. CoRR abs/2105.00164 (2021) - [i25]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CoRR abs/2105.05445 (2021) - [i24]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CoRR abs/2105.11103 (2021) - [i23]Olivia Byrnes, Wendy La, Hu Wang, Congbo Ma, Minhui Xue, Qi Wu:
Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography. CoRR abs/2107.09287 (2021) - [i22]Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue:
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. CoRR abs/2107.13190 (2021) - [i21]Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
NatiDroid: Cross-Language Android Permission Specification. CoRR abs/2111.08217 (2021) - [i20]Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe:
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems. CoRR abs/2111.09999 (2021) - [i19]Wei Wang, Ruoxi Sun, Tian Dong, Shaofeng Li, Minhui Xue, Gareth Tyson, Haojin Zhu:
Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks. CoRR abs/2111.10085 (2021) - [i18]Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue:
Dissecting Malware in the Wild. CoRR abs/2111.14035 (2021) - [i17]Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue:
Statically Detecting Adversarial Malware through Randomised Chaining. CoRR abs/2111.14037 (2021) - 2020
- [c31]Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
PALOR: Poisoning Attacks Against Logistic Regression. ACISP 2020: 447-460 - [c30]Ruoxi Sun, Minhui Xue:
Quality Assessment of Online Automated Privacy Policy Generators: An Empirical Study. EASE 2020: 270-275 - [c29]Sen Chen, Lingling Fan, Guozhu Meng, Ting Su, Minhui Xue, Yinxing Xue, Yang Liu, Lihua Xu:
An empirical assessment of security risks of global Android banking apps. ICSE 2020: 1310-1322 - [c28]Wei Wang, Ruoxi Sun, Minhui Xue, Damith C. Ranasinghe:
An Automated Assessment of Android Clipboards. ASE 2020: 1249-1251 - [c27]Zhaohua Wang, Zhenyu Li, Minhui Xue, Gareth Tyson:
Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China. PAM 2020: 314-328 - [c26]Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Damith C. Ranasinghe:
VenueTrace: a privacy-by-design COVID-19 digital contact tracing solution: poster abstract. SenSys 2020: 790-791 - [c25]Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu:
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. USENIX Security Symposium 2020: 2415-2432 - [i16]Ruoxi Sun, Minhui Xue:
Quality Assessment of Online Automated Privacy Policy Generators: An Empirical Study. CoRR abs/2002.05341 (2020) - [i15]Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith Ranasinghe:
Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications. CoRR abs/2006.10933 (2020) - [i14]Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models. CoRR abs/2006.11928 (2020) - [i13]Shaofeng Li, Shiqing Ma, Minhui Xue, Benjamin Zi Hao Zhao:
Deep Learning Backdoors. CoRR abs/2007.08273 (2020)
2010 – 2019
- 2019
- [j6]Zhushou Tang, Minhui Xue, Guozhu Meng, Chengguo Ying, Yugeng Liu, Jianan He, Haojin Zhu, Yang Liu:
Securing android applications via edge assistant third-party library detection. Comput. Secur. 80: 257-272 (2019) - [c24]Minhui Xue, Xin Yuan, Heather Lee, Keith W. Ross:
Sensing the Chinese Diaspora: How Mobile Apps Can Provide Insights Into Global Migration Flows. ICDM Workshops 2019: 603-608 - [c23]Xiaofei Xie, Lei Ma, Felix Juefei-Xu, Minhui Xue, Hongxu Chen, Yang Liu, Jianjun Zhao, Bo Li, Jianxiong Yin, Simon See:
DeepHunter: a coverage-guided fuzz testing framework for deep neural networks. ISSTA 2019: 146-157 - [c22]Chong Xiang, Xinyu Wang, Qingrong Chen, Minhui Xue, Zhaoyu Gao, Haojin Zhu, Cailian Chen, Qiuhua Fan:
No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization. IWQoS 2019: 42:1-42:10 - [c21]Matthew Joslin, Neng Li, Shuang Hao, Minhui Xue, Haojin Zhu:
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions. IEEE Symposium on Security and Privacy 2019: 1311-1325 - [c20]Lei Ma, Felix Juefei-Xu, Minhui Xue, Bo Li, Li Li, Yang Liu, Jianjun Zhao:
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems. SANER 2019: 614-618 - [i12]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - [i11]Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, Haojin Zhu:
Invisible Backdoor Attacks Against Deep Neural Networks. CoRR abs/1909.02742 (2019) - 2018
- [j5]Suguo Du, Xiaolong Li, Jinli Zhong, Lu Zhou, Minhui Xue, Haojin Zhu, Limin Sun:
Modeling Privacy Leakage Risks in Large-Scale Social Networks. IEEE Access 6: 17653-17665 (2018) - [j4]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li:
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. Comput. Secur. 73: 326-344 (2018) - [c19]Chong Xiang, Qingrong Chen, Minhui Xue, Haojin Zhu:
APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis. GLOBECOM 2018: 1-7 - [c18]Lei Ma, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Felix Juefei-Xu, Chao Xie, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepMutation: Mutation Testing of Deep Learning Systems. ISSRE 2018: 100-111 - [c17]Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepGauge: multi-granularity testing criteria for deep learning systems. ASE 2018: 120-131 - [c16]Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. NDSS 2018 - [c15]Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, Lihua Xu:
Are mobile banking apps secure? what can be improved? ESEC/SIGSOFT FSE 2018: 797-802 - [c14]Qingshun Wang, Lintao Gu, Minhui Xue, Lihua Xu, Wenyu Niu, Liang Dou, Liang He, Tao Xie:
FACTS: automated black-box testing of FinTech systems. ESEC/SIGSOFT FSE 2018: 839-844 - [i10]Lei Ma, Felix Juefei-Xu, Jiyuan Sun, Chunyang Chen, Ting Su, Fuyuan Zhang, Minhui Xue, Bo Li, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepGauge: Comprehensive and Multi-Granularity Testing Criteria for Gauging the Robustness of Deep Learning Systems. CoRR abs/1803.07519 (2018) - [i9]Minhui Xue, Alexandru Grigoras, Heather Lee, Keith W. Ross:
Sensing the Chinese Diaspora: How Mobile Apps Can Provide Insights into Global Migration Flows. CoRR abs/1803.08256 (2018) - [i8]Lei Ma, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Felix Juefei-Xu, Chao Xie, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepMutation: Mutation Testing of Deep Learning Systems. CoRR abs/1805.05206 (2018) - [i7]Sen Chen, Guozhu Meng, Ting Su, Lingling Fan, Yinxing Xue, Yang Liu, Lihua Xu, Minhui Xue, Bo Li, Shuang Hao:
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps. CoRR abs/1805.05236 (2018) - [i6]Lei Ma, Fuyuan Zhang, Minhui Xue, Bo Li, Yang Liu, Jianjun Zhao, Yadong Wang:
Combinatorial Testing for Deep Learning Systems. CoRR abs/1806.07723 (2018) - [i5]Xiaofei Xie, Lei Ma, Felix Juefei-Xu, Hongxu Chen, Minhui Xue, Bo Li, Yang Liu, Jianjun Zhao, Jianxiong Yin, Simon See:
Coverage-Guided Fuzzing for Deep Neural Networks. CoRR abs/1809.01266 (2018) - [i4]Lei Ma, Felix Juefei-Xu, Minhui Xue, Qiang Hu, Sen Chen, Bo Li, Yang Liu, Jianjun Zhao, Jianxiong Yin, Simon See:
Secure Deep Learning Engineering: A Software Quality Assurance Perspective. CoRR abs/1810.04538 (2018) - [i3]Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaafar, Haojin Zhu:
Differentially Private Data Generative Models. CoRR abs/1812.02274 (2018) - 2017
- [j3]Minhui Xue, Limin Yang, Keith W. Ross, Haifeng Qian:
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study. Peer-to-Peer Netw. Appl. 10(2): 357-367 (2017) - [c13]Haizhong Zheng, Neng Li, Minhui Xue, Suguo Du, Haojin Zhu:
Fake reviews tell no tales? Dissecting click farming in content-generated social networks. ICCC 2017: 1-6 - [c12]Jieqiong Hou, Minhui Xue, Haifeng Qian:
Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers. ISPA/IUCC 2017: 1130-1137 - [c11]Wenqi Bu, Minhui Xue, Lihua Xu, Yajin Zhou, Zhushou Tang, Tao Xie:
When program analysis meets mobile security: an industrial study of misusing Android internet sockets. ESEC/SIGSOFT FSE 2017: 842-847 - [c10]Jialin Wang, Hanni Cheng, Minhui Xue, Xiaojun Hei:
Revisiting Localization Attacks in Mobile App People-Nearby Services. SpaCCS 2017: 17-30 - [i2]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu:
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach. CoRR abs/1706.04146 (2017) - [i1]Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. CoRR abs/1709.06916 (2017) - 2016
- [j2]Minhui Xue, Gabriel Magno, Evandro Cunha, Virgílio A. F. Almeida, Keith W. Ross:
The Right to be Forgotten in the Media: A Data-Driven Study. Proc. Priv. Enhancing Technol. 2016(4): 389-402 (2016) - [j1]Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian:
Thwarting location privacy protection in location-based social discovery services. Secur. Commun. Networks 9(11): 1496-1508 (2016) - [c9]Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu:
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware. AsiaCCS 2016: 377-388 - [c8]Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu:
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning. CCS 2016: 1748-1750 - [c7]Minhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian:
You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users. Internet Measurement Conference 2016: 25-31 - [c6]Sen Chen, Minhui Xue, Lihua Xu:
Towards adversarial detection of mobile malware: poster. MobiCom 2016: 415-416 - [c5]Hanni Cheng, Shiling Mao, Minhui Xue, Xiaojun Hei:
On the Impact of Location Errors on Localization Attacks in Location-Based Social Network Services. SpaCCS 2016: 343-357 - 2015
- [c4]Carson L. Nemelka, Cameron L. Ballard, Kelvin Liu, Minhui Xue, Keith W. Ross:
You Can Yak But You Can't Hide. COSN 2015: 99 - [c3]Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian:
I know where you are: Thwarting privacy protection in location-based social discovery services. INFOCOM Workshops 2015: 179-184 - [c2]Jiawen Peng, Yan Meng, Minhui Xue, Xiaojun Hei, Keith W. Ross:
Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach. SocialSec 2015: 64-71 - [c1]Rongrong Wang, Minhui Xue, Kelvin Liu, Haifeng Qian:
Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks. WASA 2015: 561-570
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint