default search action
Li Xu 0002
Person information
- affiliation: Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
- affiliation (PhD 2004): Nanjing University of Posts and Telecommunications, China
Other persons with the same name
- Li Xu — disambiguation page
- Li Xu 0001 — SenseTime Group Limited (and 2 more)
- Li Xu 0003 — University of Saskatchewan, Global Institute for Water Security, SK, Canada (and 2 more)
- Li Xu 0004 — Akita Prefectural University, Department of Electronics and Information Systems, Japan (and 2 more)
- Li Xu 0005 — Tianjin University, Key Laboratory of Smart Grid of Ministry of Education, China
- Li Xu 0006 — University of Michigan, Department of Electrical Engineering and Computer Science, Ann Arbor, MI, USA
- Li Xu 0007 — University of Hong Kong
- Li Xu 0008 — Xidian University, School of Telecommunications Engineering, Shaanxi, China (and 1 more)
Other persons with a similar name
- Xu Li — disambiguation page
- Xue Li — disambiguation page
- Xue Jun Li (aka: Xuejun Li 0006) — Auckland University of Technology, School of Engineering, Computer and Mathematical Sciences, New Zealand
- Xuemei Li (aka: Xue-mei Li, Xue-Mei Li) — disambiguation page
- Yixue Li (aka: Yi-Xue Li) — disambiguation page
- Xu Li 0001 — Huawei Technologies Canada (and 4 more)
- Xue Li 0001 — University of Queensland, Brisbane, Australia
- Xuemei Li 0001 (aka: Xue-mei Li 0001, Xue-Mei Li 0001) — Shandong Co-Innovation Center of Future Intelligent Computing, Yantai, China (and 1 more)
- Li Da Xu (aka: Lida Xu)
- Xinli Xu (aka: Xin-Li Xu) — Zhejiang University of Technology, Hangzhou, Zhejiang, China
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j138]Zhenyu Xu, Xinxin Zhang, Mingzhi Chen, Li Xu:
Influence maximization in mobile social networks based on RWP-CELF. Computing 106(6): 1913-1931 (2024) - [j137]Yonghui Lin, Li Xu, Wei Lin, Jiayin Li:
Community anomaly detection in attribute networks based on refining context. Computing 106(6): 1987-2006 (2024) - [j136]Xiaolin Li, Qikui Xu, Zhenyu Xu, Hongyan Zhang, Li Xu:
Graph Reconfigurable Pooling for Graph Representation Learning. IEEE Trans. Emerg. Top. Comput. 12(1): 139-149 (2024) - [j135]Yanze Huang, Limei Lin, Li Xu, Sun-Yuan Hsieh:
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks. IEEE Trans. Reliab. 73(1): 279-289 (2024) - [j134]Yuhang Lin, Limei Lin, Yanze Huang, Li Xu, Sun-Yuan Hsieh:
Endogenous Security of $FQ_{n}$ Networks: Adaptive System-Level Fault Self-Diagnosis. IEEE Trans. Reliab. 73(3): 1659-1668 (2024) - 2023
- [j133]Yanze Huang, Limei Lin, Eddie Cheng, Li Xu:
Component Fault Diagnosis and Fault Tolerance of Alternating Group Graphs. Comput. J. 66(5): 1184-1194 (2023) - [j132]Hui Dong, Jianxi Fan, Baolei Cheng, Yan Wang, Li Xu:
Hamiltonian Properties of the Data Center Network HSDC with Faulty Elements. Comput. J. 66(8): 1965-1981 (2023) - [j131]Xinxin Zhang, Min Gao, Li Xu, Zhaobin Zhou:
Influence maximization based on SATS scheme in social networks. Computing 105(2): 275-292 (2023) - [j130]Xiaolin Li, Li Xu, Hongyan Zhang, Qikui Xu:
Differential privacy preservation for graph auto-encoders: A novel anonymous graph publishing model. Neurocomputing 521: 113-125 (2023) - [j129]Chen Dong, Yinan Yao, Yi Xu, Ximeng Liu, Yan Wang, Hao Zhang, Li Xu:
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. Sensors 23(12): 5503 (2023) - [j128]He Fang, Zhenlong Xiao, Xianbin Wang, Li Xu, Lajos Hanzo:
Collaborative Authentication for 6G Networks: An Edge Intelligence Based Autonomous Approach. IEEE Trans. Inf. Forensics Secur. 18: 2091-2103 (2023) - [j127]Yanze Huang, Kui Wen, Limei Lin, Li Xu, Sun-Yuan Hsieh:
Component Fault Diagnosability of Hierarchical Cubic Networks. ACM Trans. Design Autom. Electr. Syst. 28(3): 39:1-39:19 (2023) - [j126]Yuexin Zhang, Fengjuan Zhou, Xinyi Huang, Li Xu, Ayong Ye:
Key Extraction Using Ambient Sounds for Smart Devices. ACM Trans. Sens. Networks 19(1): 16:1-16:20 (2023) - [j125]Yanze Huang, Limei Lin, Yuhang Lin, Li Xu, Sun-Yuan Hsieh:
Fault Diagnosability of Networks With Fault-Free Block at Local Vertex Under MM* Model. IEEE Trans. Reliab. 72(1): 372-383 (2023) - [c65]Qian Liu, Xiaobei Dong, Zhixiong Chen, Ximeng Liu, Li Xu:
Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security. DASC/PiCom/CBDCom/CyberSciTech 2023: 109-115 - [c64]Yinan Yao, Decheng Qiu, Bolun Li, Chen Dong, Li Xu, Xiaodong Guo, Changping Lai:
IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare. DASC/PiCom/CBDCom/CyberSciTech 2023: 367-374 - [c63]Jingsong Lin, Xiaodong Guo, Chen Dong, Chenxi Lyu, Li Xu, Zhenyi Chen:
Text Summarization Generation Based on Improved Transformer Model. DASC/PiCom/CBDCom/CyberSciTech 2023: 831-836 - [c62]Jihai Luo, Chen Dong, Zhenyi Chen, Li Xu, Tianci Chen:
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm. GPC (2) 2023: 47-62 - [c61]Huichang Huang, Zhongliao Yang, Jiayuan Zhong, Li Xu, Chen Dong, Ruishen Bao:
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare. GPC (2) 2023: 209-223 - [c60]Zhongliao Yang, Huichang Huang, Zeyi Liu, Chen Dong, Li Xu:
Resource Binding and Module Placement Algorithms for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare. GPC (2) 2023: 266-281 - [c59]Chengling Wang, Yunru Ma, Yuexin Zhang, Ayong Ye, Li Xu:
A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder. ICCNS 2023: 12-18 - [c58]Yuting Zuo, Li Xu, Yuexin Zhang, Zhaozhe Kang, Chenbin Zhao:
BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social Networks. ICICS 2023: 302-313 - [i1]He Fang, Zhenlong Xiao, Xianbin Wang, Li Xu, Lajos Hanzo:
Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach. CoRR abs/2303.15143 (2023) - 2022
- [j124]Yanze Huang, Limei Lin, Li Xu:
Subgraph Reliability of Alternating Group Graph With Uniform and Nonuniform Vertex Fault-Free Probabilities. Comput. J. 65(3): 589-605 (2022) - [j123]Manli Yuan, Yi Mu, Fatemeh Rezaeibagha, Li Xu, Xinyi Huang:
Controllable software licensing system for sub-licensing. J. Inf. Secur. Appl. 64: 103061 (2022) - [j122]Jing Zhang, Si-Tong Shi, Cai-Jie Weng, Li Xu:
Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks. Secur. Commun. Networks 2022: 6338123:1-6338123:13 (2022) - [j121]Chenbin Zhao, Li Xu, Jiguo Li, He Fang, Yinghui Zhang:
Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy. IEEE Syst. J. 16(3): 4804-4815 (2022) - [j120]Limei Lin, Yanze Huang, Li Xu, Sun-Yuan Hsieh:
Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks. IEEE Trans. Computers 71(11): 2968-2981 (2022) - [j119]Feng Wang, Li Xu, Jiguo Li, Kim-Kwang Raymond Choo:
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage. IEEE Trans. Cloud Comput. 10(4): 2704-2716 (2022) - [j118]Xinxin Zhang, Li Xu, Zhenyu Xu:
Influence Maximization Based on Network Motifs in Mobile Social Networks. IEEE Trans. Netw. Sci. Eng. 9(4): 2353-2363 (2022) - [j117]Limei Lin, Yanze Huang, Li Xu, Sun-Yuan Hsieh:
A Pessimistic Fault Diagnosability of Large-Scale Connected Networks via Extra Connectivity. IEEE Trans. Parallel Distributed Syst. 33(2): 415-428 (2022) - [j116]Limei Lin, Yanze Huang, Yuhang Lin, Sun-Yuan Hsieh, Li Xu:
FFNLFD: Fault Diagnosis of Multiprocessor Systems at Local Node With Fault-Free Neighbors Under PMC Model and MM* Model. IEEE Trans. Parallel Distributed Syst. 33(7): 1739-1751 (2022) - [j115]Limei Lin, Yanze Huang, Sun-Yuan Hsieh, Li Xu:
Strong Reliability of Star Graphs Interconnection Networks. IEEE Trans. Reliab. 71(3): 1241-1254 (2022) - [c57]Xinxin Zhang, Li Xu, Zhenyu Xu, Hung-Min Sun, Chia-Wei Lee:
Information spreading in mobile social networks: identifying the influential nodes using FPSO algorithm. ICIT 2022: 41-46 - [c56]Yihong Wang, Xueli Sun, Weibei Fan, Baolei Cheng, Li Xu, Jianxi Fan:
Relationship between g-extra Connectivity and g-restricted Connectivity in Networks. ICPADS 2022: 155-160 - 2021
- [j114]Hongyan Zhang, Limei Lin, Li Xu, Xiaoding Wang:
Graph partition based privacy-preserving scheme in social networks. J. Netw. Comput. Appl. 195: 103214 (2021) - [j113]Limei Lin, Yanze Huang, Dajin Wang, Sun-Yuan Hsieh, Li Xu:
A Novel Measurement for Network Reliability. IEEE Trans. Computers 70(10): 1719-1731 (2021) - [j112]Limei Lin, Yanze Huang, Li Xu, Sun-Yuan Hsieh:
A Complete Fault Tolerant Method for Extra Fault Diagnosability of Alternating Group Graphs. IEEE Trans. Reliab. 70(3): 957-969 (2021) - [j111]Limei Lin, Yanze Huang, Yuhang Lin, Li Xu, Sun-Yuan Hsieh:
An Analysis on the Reliability of the Alternating Group Graph. IEEE Trans. Reliab. 70(4): 1542-1555 (2021) - [c55]Hongyan Zhang, Xiaolin Li, Jiayu Xu, Li Xu:
Graph Matching Based Privacy-Preserving Scheme in Social Networks. SocialSec 2021: 110-118 - 2020
- [j110]Feng Wang, Li Xu, Kim-Kwang Raymond Choo, Yuexin Zhang, Huaqun Wang, Jiguo Li:
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage. IEEE Access 8: 2258-2271 (2020) - [j109]Huibin Lai, Li Xu, Yali Zeng:
An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative Spectrum Sensing. IEEE Access 8: 163472-163482 (2020) - [j108]Min Gao, Li Xu, Limei Lin, Yanze Huang, Xinxin Zhang:
Influence maximization based on activity degree in mobile social networks. Concurr. Comput. Pract. Exp. 32(11) (2020) - [j107]Rushan Lin, Li Xu, He Fang, Chuan Huang:
Efficient physical layer key generation technique in wireless communications. EURASIP J. Wirel. Commun. Netw. 2020(1): 13 (2020) - [j106]Shengnan Yan, Xiaoding Wang, Li Xu:
Rollout algorithm for light-weight physical-layer authentication in cognitive radio networks. IET Commun. 14(18): 3128-3134 (2020) - [j105]Jing Zhang, Zhiwei Lin, Pei-Wei Tsai, Li Xu:
Entropy-driven data aggregation method for energy-efficient wireless sensor networks. Inf. Fusion 56: 103-113 (2020) - [j104]Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil:
Lightweight privacy preservation for secondary users in cognitive radio networks. J. Netw. Comput. Appl. 162: 102652 (2020) - [j103]Jing Si, Rong Guo, Xiang Lu, Chao Han, Li Xu, Dan Xing, Caiping Chen:
Decision aids on breast conserving surgery for early stage breast cancer patients: a systematic review. BMC Medical Informatics Decis. Mak. 20(1): 275 (2020) - [j102]Limei Lin, Yanze Huang, Xiaoding Wang, Li Xu:
Restricted connectivity and good-neighbor diagnosability of split-star networks. Theor. Comput. Sci. 824-825: 81-91 (2020) - [j101]Yanze Huang, Limei Lin, Li Xu:
A new proof for exact relationship between extra connectivity and extra diagnosability of regular connected graphs under MM* model. Theor. Comput. Sci. 828-829: 70-80 (2020) - [j100]He Fang, Xianbin Wang, Li Xu:
Fuzzy Learning for Multi-Dimensional Adaptive Physical Layer Authentication: A Compact and Robust Approach. IEEE Trans. Wirel. Commun. 19(8): 5420-5432 (2020) - [c54]Kexin Liu, Xiaozhen Lu, Liang Xiao, Li Xu:
Learning Based Energy Efficient Radar Power Control Against Deceptive Jamming. GLOBECOM 2020: 1-6 - [c53]Xinxin Zhang, Li Xu, Min Gao:
An Efficient Influence Maximization Algorithm Based on Social Relationship Priority in Mobile Social Networks. SocialSec 2020: 164-177 - [c52]Qichao Lai, Li Xu, Manli Yuan, Feng Wang, He Fang:
User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid. SPDE 2020: 676-691 - [c51]Hongyan Zhang, Li Xu, Limei Lin, Xiaoding Wang:
De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks. SPDE 2020: 726-737
2010 – 2019
- 2019
- [j99]Yanze Huang, Limei Lin, Dajin Wang, Li Xu:
Minimum Neighborhood of Alternating Group Graphs. IEEE Access 7: 17299-17311 (2019) - [j98]Limei Lin, Yanze Huang, Dajin Wang, Li Xu:
Component Reliability Evaluation on Split-Stars. IEEE Access 7: 147939-147953 (2019) - [j97]Chenbin Zhao, Li Xu, Jiguo Li, Feng Wang, He Fang:
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage. IEEE Access 7: 160459-160471 (2019) - [j96]Yali Zeng, Li Xu, Xu Yang, Xun Yi:
An efficient privacy-preserving protocol for database-driven cognitive radio networks. Ad Hoc Networks 90 (2019) - [j95]Yafei Zhai, Limei Lin, Li Xu, Xinxin Zhang, Yanze Huang:
The Conditional Diagnosability with g-Good-Neighbor of Exchanged Hypercubes. Comput. J. 62(5): 747-756 (2019) - [j94]Limei Lin, Li Xu, Yanze Huang, Yang Xiang, Xiangjian He:
On exploiting priority relation graph for reliable multi-path communication in mobile social networks. Inf. Sci. 477: 490-507 (2019) - [j93]Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil:
Privacy-preserving aggregation for cooperative spectrum sensing. J. Netw. Comput. Appl. 140: 54-64 (2019) - [j92]Rui Zhu, Li Xu, Yali Zeng, Xun Yi:
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification. Secur. Commun. Networks 2019: 9126376:1-9126376:12 (2019) - [j91]Yanze Huang, Limei Lin, Li Xu, Xiaoding Wang:
Extra diagnosability and good-neighbor diagnosability of n-dimensional alternating group graph AGn under the PMC model. Theor. Comput. Sci. 795: 36-49 (2019) - [j90]Limei Lin, Li Xu, Riqing Chen, Sun-Yuan Hsieh, Dajin Wang:
Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks. IEEE Trans. Dependable Secur. Comput. 16(6): 1086-1097 (2019) - [j89]Jing Zhang, Li Xu, Pei-Wei Tsai, Zhiwei Lin:
Minimization of delay and collision with cross cube spanning tree in wireless sensor networks. Wirel. Networks 25(4): 1875-1893 (2019) - 2018
- [j88]Baojun Zhou, Jie Li, Xiaoyan Wang, Yu Gu, Li Xu, Yongqiang Hu, Lihua Zhu:
Online Internet traffic monitoring system using spark streaming. Big Data Min. Anal. 1(1): 47-56 (2018) - [j87]Feng Wang, Li Xu, Huaqun Wang, Zhide Chen:
Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69: 521-533 (2018) - [j86]Dongcheng Wang, Li Xu, Feng Wang, Qikui Xu:
An anonymous batch handover authentication protocol for big flow wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2018: 200 (2018) - [j85]Ayong Ye, Qiuling Chen, Li Xu, Wei Wu:
The flexible and privacy-preserving proximity detection in mobile social network. Future Gener. Comput. Syst. 79: 271-283 (2018) - [j84]Xinxin Zhang, Li Xu, Limei Lin, Yanze Huang, Xiaoding Wang:
The (t, k) -Diagnosability of Balanced Hypercube under the PMC Model. Int. J. Comput. Math. Comput. Syst. Theory 3(4): 230-243 (2018) - [j83]Limei Lin, Sun-Yuan Hsieh, Li Xu, Shuming Zhou, Riqing Chen:
The relationship between extra connectivity and conditional diagnosability of regular graphs under the PMC model. J. Comput. Syst. Sci. 95: 1-18 (2018) - [j82]Feng Wang, Li Xu, Wei Gao:
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors". IEEE Trans. Comput. Soc. Syst. 5(3): 854-857 (2018) - [j81]Limei Lin, Li Xu, Dajin Wang, Shuming Zhou:
The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs. IEEE Trans. Dependable Secur. Comput. 15(3): 542-548 (2018) - [j80]He Fang, Li Xu, Xianbin Wang:
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme. IEEE Trans. Inf. Forensics Secur. 13(1): 197-209 (2018) - [j79]Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun:
A shareable keyword search over encrypted data in cloud computing. J. Supercomput. 74(3): 1001-1023 (2018) - [j78]Limei Lin, Sun-Yuan Hsieh, Riqing Chen, Li Xu, Chia-Wei Lee:
The Relationship Between g-Restricted Connectivity and g-Good-Neighbor Fault Diagnosability of General Regular Networks. IEEE Trans. Reliab. 67(1): 285-296 (2018) - [j77]He Fang, Li Xu, Yulong Zou, Xianbin Wang, Kim-Kwang Raymond Choo:
Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication. IEEE Trans. Veh. Technol. 67(11): 10788-10799 (2018) - 2017
- [j76]Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Zhengxin Yu:
A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems. IEEE Access 5: 27679-27690 (2017) - [j75]Jing Zhang, Li Xu, Xingsi Xue, Wei Wu, Hong Yang:
Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 38(1-4): 169-198 (2017) - [j74]He Fang, Li Xu, Kim-Kwang Raymond Choo:
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Appl. Math. Comput. 296: 153-167 (2017) - [j73]Hui Lin, Jia Hu, Li Xu, Youliang Tian, Lei Liu, Stewart Blakeway:
A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks. Comput. Electr. Eng. 64: 407-419 (2017) - [j72]He Fang, Li Xu, Jie Li, Kim-Kwang Raymond Choo:
An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks. Comput. Commun. 105: 124-132 (2017) - [j71]Hui Lin, Jia Hu, Youliang Tian, Li Yang, Li Xu:
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism. Inf. Sci. 387: 238-253 (2017) - [j70]Chao Lin, Wei Wu, Xinyi Huang, Li Xu:
A new universal designated verifier transitive signature scheme for big graph data. J. Comput. Syst. Sci. 83(1): 73-83 (2017) - [j69]Feng Wang, Li Xu:
Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability. J. Inf. Sci. Eng. 33(4): 873-889 (2017) - [j68]Jing Zhang, Li Xu, Shuming Zhou, Geyong Min, Yang Xiang, Jia Hu:
Crossed Cube Ring: A k-connected virtual backbone for wireless sensor networks. J. Netw. Comput. Appl. 91: 75-88 (2017) - [j67]Xiaoding Wang, Li Xu, Shuming Zhou:
A Straight Skeleton Based Connectivity Restoration Strategy in the Presence of Obstacles for WSNs. Sensors 17(10): 2299 (2017) - [j66]He Fang, Li Xu, Xinyi Huang:
Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput. 21(4): 907-921 (2017) - [j65]Li Xu, Jing Zhang, Pei-Wei Tsai, Wei Wu, Dajin Wang:
Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks. Soft Comput. 21(10): 2619-2629 (2017) - [j64]Xiaoding Wang, Li Xu, Shuming Zhou, Wei Wu:
Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks. Sci. Program. 2017: 5807289:1-5807289:19 (2017) - [j63]Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang, Li Xu:
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design. ACM Trans. Embed. Comput. Syst. 16(2): 57:1-57:20 (2017) - [j62]Li Xu, Jing Zhang, Yang Xiang, Xinyi Huang:
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks. Wirel. Pers. Commun. 96(4): 4947-4972 (2017) - [c50]Ayong Ye, Qiuling Chen, Li Xu:
Private and Flexible Proximity Detection Based on Geohash. VTC Spring 2017: 1-5 - 2016
- [j61]Zhide Chen, Meng Wang, Li Xu, Wei Wu:
Worm propagation model in mobile network. Concurr. Comput. Pract. Exp. 28(4): 1134-1144 (2016) - [j60]He Fang, Li Xu, Liang Xiao:
Secure routing and resource allocation based on game theory in cooperative cognitive radio networks. Concurr. Comput. Pract. Exp. 28(10): 2958-2977 (2016) - [j59]Li Xu, He Fang, Zhiwei Lin:
Evolutionarily stable opportunistic spectrum access in cognitive radio networks. IET Commun. 10(17): 2290-2299 (2016) - [j58]Limei Lin, Li Xu, Shuming Zhou, Yang Xiang:
Trustworthiness-hypercube-based reliable communication in mobile social networks. Inf. Sci. 369: 34-50 (2016) - [j57]YaLi Zeng, Li Xu, Zhide Chen:
Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks. Sensors 16(1): 3 (2016) - [j56]Limei Lin, Li Xu, Shuming Zhou, Sun-Yuan Hsieh:
The t/k-Diagnosability for Regular Networks. IEEE Trans. Computers 65(10): 3157-3170 (2016) - [j55]Limei Lin, Li Xu, Shuming Zhou:
Relating the extra connectivity and the conditional diagnosability of regular graphs under the comparison model. Theor. Comput. Sci. 618: 21-29 (2016) - [j54]Limei Lin, Li Xu, Shuming Zhou, Sun-Yuan Hsieh:
The Extra, Restricted Connectivity and Conditional Diagnosability of Split-Star Networks. IEEE Trans. Parallel Distributed Syst. 27(2): 533-545 (2016) - [j53]Li Xu, Limei Lin, Shuming Zhou, Sun-Yuan Hsieh:
The Extra Connectivity, Extra Conditional Diagnosability, and t/m-Diagnosability of Arrangement Graphs. IEEE Trans. Reliab. 65(3): 1248-1262 (2016) - [c49]Chengxing Li, Li Xu, Feng Ye, Jiazhen Chen:
An Adaptive Error Concealment Algorithm Based on Partition Model. IGTA 2016: 35-43 - [c48]Qiuling Chen, Ayong Ye, Li Xu:
A privacy-preserving Proximity Detection Method in social network. ICC 2016 2016: 68:1-68:6 - [c47]Jianchuan Xiao, Li Xu, Limei Lin, Xiaoding Wang:
A Privacy-Preserving Approach Based on Graph Partition for Uncertain Trajectory Publishing. ISPDC 2016: 285-290 - [c46]Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun:
Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. NSS 2016: 47-61 - 2015
- [j52]Hui Lin, Li Xu, Xinyi Huang, Wei Wu, Yijie Huang:
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Networks 35: 51-64 (2015) - [j51]Jing Zhang, Shuming Zhou, Li Xu, Wei Wu, Xiucai Ye:
An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube. Int. J. Appl. Math. Comput. Sci. 25(2): 295-309 (2015) - [j50]Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang:
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks. Comput. J. 58(4): 656-667 (2015) - [j49]Hui Lin, Li Xu, Yi Mu, Wei Wu:
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing. Future Gener. Comput. Syst. 52: 125-136 (2015) - [j48]Yuexin Zhang, Li Xu, Xinyi Huang, Jie Li:
Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge. Int. J. Ad Hoc Ubiquitous Comput. 20(4): 262-273 (2015) - [j47]Limei Lin, Li Xu, Shuming Zhou:
Conditional diagnosability and strong diagnosability of shuffle-cubes under the comparison model. Int. J. Comput. Math. 92(2): 230-249 (2015) - [j46]Jie Li, Xiucai Ye, Li Xu, Huaibei Liu:
Collecting all data continuously in wireless sensor networks with a mobile base station. Int. J. Comput. Sci. Eng. 11(3): 239-248 (2015) - [j45]Xiaoding Wang, Li Xu, Shuming Zhou:
Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 409085:1-409085:13 (2015) - [j44]Hui Lin, Jia Hu, Chuan Huang, Li Xu, Bin Wu:
Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks. Int. J. Distributed Sens. Networks 11: 674591:1-674591:12 (2015) - [j43]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu:
Cooperative attribute-based access control for enterprise computing system. Int. J. Embed. Syst. 7(3/4): 191-202 (2015) - [j42]Chuan Yao, Li Xu, Xinyi Huang:
Batch public auditing for distributed mobile cloud computing. Int. J. High Perform. Comput. Netw. 8(2): 102-109 (2015) - [j41]Shuquan Hou, Xinyi Huang, Joseph K. Liu, Jin Li, Li Xu:
Universal designated verifier transitive signatures for graph-based big data. Inf. Sci. 318: 144-156 (2015) - [j40]Xiaoding Wang, Li Xu, Shuming Zhou, Joseph K. Liu:
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks. J. Univers. Comput. Sci. 21(3): 384-405 (2015) - [j39]Shuming Zhou, Limei Lin, Li Xu, Dajin Wang:
The t/k-Diagnosability of Star Graph Networks. IEEE Trans. Computers 64(2): 547-555 (2015) - [j38]Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015) - [j37]Limei Lin, Li Xu, Shuming Zhou:
Conditional diagnosability and strong diagnosability of Split-Star Networks under the PMC model. Theor. Comput. Sci. 562: 565-580 (2015) - [j36]Li Xu, Xinyu Chen, Jie Li, Xinyi Huang, Jianying Zhou:
Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis. Telecommun. Syst. 60(1): 149-158 (2015) - [j35]Huaqun Wang, Bo Qin, Qianhong Wu, Li Xu, Josep Domingo-Ferrer:
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids. IEEE Trans. Inf. Forensics Secur. 10(11): 2340-2351 (2015) - [j34]Jing Zhang, Li Xu, Shuming Zhou, Xiucai Ye:
A novel sleep scheduling scheme in green wireless sensor networks. J. Supercomput. 71(3): 1067-1094 (2015) - [j33]Limei Lin, Shuming Zhou, Li Xu, Dajin Wang:
The Extra Connectivity and Conditional Diagnosability of Alternating Group Networks. IEEE Trans. Parallel Distributed Syst. 26(8): 2352-2362 (2015) - [j32]Limei Lin, Li Xu, Shuming Zhou, Dajin Wang:
The Reliability of Subgraphs in the Arrangement Graph. IEEE Trans. Reliab. 64(2): 807-818 (2015) - [c45]Youhua Xia, Hui Lin, Li Xu:
An AGV Mechanism Based Secure Routing Protocol for Internet of Things. CIT/IUCC/DASC/PICom 2015: 662-666 - [c44]Hui Lin, Jia Hu, Jiajia Liu, Li Xu, Yulei Wu:
A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing. CIT/IUCC/DASC/PICom 2015: 2049-2054 - [c43]Hui Lin, Jia Hu, Chuan Huang, Li Xu:
A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks. CIT/IUCC/DASC/PICom 2015: 2198-2205 - [c42]Jing Zhang, Li Xu, Qun Shen, Xiaorong Ji:
Localization for Jamming Attack in Wireless Sensor Networks. ECC 2015: 361-369 - [c41]Feng Wang, Li Xu, Jeng-Shyang Pan:
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model". IIH-MSP 2015: 195-198 - [c40]Jing Zhang, Li Xu, Hong Yang:
A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks. IIH-MSP 2015: 364-367 - [c39]Li Xu, Limei Lin, Sheng Wen:
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks. NSS 2015: 459-466 - 2014
- [j31]Li Xu, Yuan He, Xiaofeng Chen, Xinyi Huang:
Ticket-based handoff authentication for wireless mesh networks. Comput. Networks 73: 185-194 (2014) - [j30]Zhide Chen, Cheng Qiao, Li Xu, Wei Wu:
Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory. Concurr. Comput. Pract. Exp. 26(5): 1130-1141 (2014) - [j29]Li Xu, Elisa Bertino, Yi Mu:
Security of new generation computing systems. Concurr. Comput. Pract. Exp. 26(8): 1475-1476 (2014) - [j28]Li Xu, Yuexin Zhang:
Matrix-based pairwise key establishment for wireless mesh networks. Future Gener. Comput. Syst. 30: 140-145 (2014) - [j27]Chuan Yao, Li Xu, Xinyi Huang, Joseph K. Liu:
A secure remote data integrity checking cloud storage system from threshold encryption. J. Ambient Intell. Humaniz. Comput. 5(6): 857-865 (2014) - [j26]Meng Wang, Zhide Chen, Li Xu, Huan Zhan:
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism. J. Appl. Math. 2014: 746803:1-746803:14 (2014) - [j25]Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu:
Dynamics stability in wireless sensor networks active defense model. J. Comput. Syst. Sci. 80(8): 1534-1548 (2014) - [j24]Yuan He, Li Xu, Wei Wu:
A local joint fast handoff scheme in cognitive wireless mesh networks. Secur. Commun. Networks 7(2): 455-465 (2014) - [j23]Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu:
Anomaly diagnosis based on regression and classification analysis of statistical traffic features. Secur. Commun. Networks 7(9): 1372-1383 (2014) - [j22]Limei Lin, Shuming Zhou, Li Xu, Dajin Wang:
Conditional diagnosability of arrangement graphs under the PMC model. Theor. Comput. Sci. 548: 79-97 (2014) - [j21]Xiucai Ye, Jie Li, Li Xu:
Distributed Separate Coding for Continuous Data Collection in Wireless Sensor Networks. ACM Trans. Sens. Networks 11(1): 17:1-17:26 (2014) - [j20]Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, Li Xu:
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(7): 1767-1775 (2014) - [j19]Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Atulya Nagar:
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks. Wirel. Pers. Commun. 75(3): 1611-1633 (2014) - [c38]Jia Hu, Hui Lin, Li Xu:
Energy-Aware Secure Routing for Hybrid Wireless Mesh Networks. CSE 2014: 915-922 - [c37]Jing Zhang, Li Xu, Hui Lin:
A CDS-Based Network Coding Scheme in Wireless Sensor Converge-Cast Networks. CSE 2014: 1599-1604 - [c36]Limei Lin, Li Xu, Shuming Zhou, Wei Wu:
The Social Feature-Based Priority Relation Graph of Mobile Social Networks. CSE 2014: 1921-1926 - [c35]Yuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu:
A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks. ESORICS (1) 2014: 526-541 - [c34]Shuquan Hou, Xinyi Huang, Li Xu:
Identity-Based Transitive Signcryption. NSS 2014: 246-259 - [c33]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu:
GO-ABE: Group-Oriented Attribute-Based Encryption. NSS 2014: 260-270 - 2013
- [j18]Lanxiang Chen, Shuming Zhou, Xinyi Huang, Li Xu:
Data dynamics for remote data possession checking in cloud storage. Comput. Electr. Eng. 39(7): 2413-2424 (2013) - [j17]Li Xu, Xi Cao, Yuexin Zhang, Wei Wu:
Software Service Signature (S3) for authentication in cloud computing. Clust. Comput. 16(4): 905-914 (2013) - [j16]Jianliang Gao, Jia Hu, Geyong Min, Li Xu:
Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic. Concurr. Comput. Pract. Exp. 25(1): 85-93 (2013) - [j15]Li Xu, Lei Ji, Shuming Zhou:
An efficient self-diagnosis protocol for hierarchical wireless mesh networks. Concurr. Comput. Pract. Exp. 25(14): 2036-2051 (2013) - [j14]Zhide Chen, Yanqing Zeng, Li Xu:
A Supermodular Game Framework for Power Control of Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j13]Wei Wu, Jianying Zhou, Yang Xiang, Li Xu:
How to achieve non-repudiation of origin with privacy protection in cloud computing. J. Comput. Syst. Sci. 79(8): 1200-1213 (2013) - [j12]Yuexin Zhang, Li Xu, Yang Xiang, Xinyi Huang:
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge. IEEE Trans. Emerg. Top. Comput. 1(2): 331-340 (2013) - [c32]Yuexin Zhang, Li Xu, Yang Xiang, Xinyi Huang:
Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge. ICC 2013: 1604-1608 - [c31]Yuexin Zhang, Li Xu, Xinyi Huang, Jie Li:
Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks. IMIS 2013: 153-158 - [c30]Jing Zhang, Li Xu, Shuming Zhou, Wei Wu:
Constructing Connected Dominating Set Based on Crossed Cube in WSN. INCoS 2013: 443-447 - [c29]Chuan Yao, Li Xu, Xinyi Huang:
A Secure Cloud Storage System from Threshold Encryption. INCoS 2013: 541-545 - [c28]Yanling Lian, Li Xu, Xinyi Huang:
Attribute-Based Signatures with Efficient Revocation. INCoS 2013: 573-577 - [c27]Xianhu Ma, Li Xu, Geyong Min:
Congestion Control Based on Cross-Layer Game Optimization in Wireless Mesh Networks. MSN 2013: 41-46 - [c26]He Fang, Li Xu, Chuan Huang:
Dynamic Opportunistic Spectrum Access of Multi-channel Multi-radio Based on Game Theory in Wireless Cognitive Network. MSN 2013: 127-132 - [c25]Jia Hu, Hui Lin, Li Xu:
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks. NSS 2013: 678-684 - [c24]Xiucai Ye, Jie Li, Li Xu:
Group Data Collection in wireless sensor networks with a mobile base station. WCNC 2013: 1133-1138 - 2012
- [j11]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu:
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. Comput. J. 55(10): 1157-1168 (2012) - [c23]Li Xu, Zhibin Zeng, Xiucai Ye:
Multi-objective Optimization Based Virtual Resource Allocation Strategy for Cloud Computing. ACIS-ICIS 2012: 56-61 - [c22]Li Xu, Penggui Pan, Xiaoding Wang, Wei Wu:
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network. INCoS 2012: 259-263 - [c21]Xi Cao, Li Xu, Yuexin Zhang, Wei Wu:
Identity-Based Proxy Signature for Cloud Service in SaaS. INCoS 2012: 594-599 - [c20]Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu:
Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis. TrustCom 2012: 264-270 - [c19]Hui Lin, Jia Hu, Atulya Nagar, Li Xu:
Role Based Privacy-Aware Secure Routing in WMNs. TrustCom 2012: 1872-1877 - [c18]Jie Li, Xiucai Ye, Li Xu:
A Novel Data Collection Scheme for WSNs. VTC Spring 2012: 1-5 - [e1]Li Xu, Elisa Bertino, Yi Mu:
Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer 2012, ISBN 978-3-642-34600-2 [contents] - 2011
- [j10]Dajin Wang, Liwei Lin, Li Xu:
A study of subdividing hexagon-clustered WSN for power saving: Analysis and simulation. Ad Hoc Networks 9(7): 1302-1311 (2011) - [j9]Zhide Chen, Yihui Qiu, Jingjing Liu, Li Xu:
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Comput. Math. Appl. 62(9): 3378-3388 (2011) - [j8]Xinghua Li, Jianfeng Ma, YoungHo Park, Li Xu:
A USIM-Based Uniform Access Authentication Framework in Mobile Communication. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j7]Xinghua Li, Xiang Lu, Jianfeng Ma, Zhenfang Zhu, Li Xu, YoungHo Park:
Authentications and Key Management in 3G-WLAN Interworking. Mob. Networks Appl. 16(3): 394-407 (2011) - 2010
- [j6]Jianliang Gao, Jia Hu, Geyong Min, Li Xu:
QoS analysis of medium access control in LR-WPANs under bursty error channels. Future Gener. Comput. Syst. 26(8): 1426-1432 (2010) - [j5]Zhixiong Chen, Li Xu, Chenhuang Wu:
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves. Int. J. Netw. Secur. 11(3): 149-154 (2010) - [j4]Li Xu, Sisheng Chen, Xinyi Huang, Yi Mu:
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. Int. J. Secur. Networks 5(1): 35-44 (2010) - [c17]Xinyu Chen, Li Xu, Jie Li:
Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop Network. CIT 2010: 2570-2575 - [c16]Zhide Chen, Li Xu:
Service Price Discrimination in Wireless Network. CSE 2010: 34-41 - [c15]Youqin Chen, Zhide Chen, Li Xu:
RFID System Security Using Identity-Based Cryptography. IITSI 2010: 460-464 - [c14]Yilian Zhang, Zhide Chen, Li Xu:
How to Construct a Divisible Online/Offline Signature. IITSI 2010: 562-566
2000 – 2009
- 2009
- [j3]Li Xu, Sisheng Chen:
Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks. Int. J. Distributed Sens. Networks 5(1): 56 (2009) - [c13]Jianliang Gao, Jia Hu, Geyong Min, Li Xu:
QoS Performance Analysis of IEEE 802.15.4 MAC in LR-WPAN with Bursty Error Channels. MSN 2009: 252-256 - 2008
- [j2]Yihui Zhang, Li Xu, Xiaoding Wang:
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks. J. Commun. 3(6): 43-50 (2008) - [j1]Li Xu, Jianwei Chen, Xiaoding Wang:
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network. J. Commun. 3(6): 51-58 (2008) - [c12]Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo:
Hierarchical Identity-Based Online/Offline Encryption. ICYCS 2008: 2115-2119 - [c11]Zhao-Hui Tang, Li Xu, Zhide Chen, Fuchun Guo:
On the Security of WAI Protocol in the Third Version of WAPI. IIH-MSP 2008: 516-519 - [c10]Hui Lin, Li Xu, Xiaoding Wang:
A New Security Mechanism Based on SIP in Wireless LAN-3G Integration. ISCSCT (1) 2008: 763-767 - 2007
- [c9]Fuchun Guo, Yi Mu, Zhide Chen, Li Xu:
Multi-Identity Single-Key Decryption without Random Oracles. Inscrypt 2007: 384-398 - [c8]Jianwei Chen, Li Xu, Yi Mu:
A new group rekeying scheme based on t-packing designs for ad hoc networks. Infoscale 2007: 54 - [c7]Zhongsheng Wu, Zhide Chen, Li Xu, Fuchun Guo:
Routing Protocols Based on Double Auction for Ad Hoc Networks. IEEE NAS 2007: 55-61 - [c6]Zhongsheng Wu, Zhide Chen, Fuchun Guo, Li Xu:
Identity Based Private Matching. SECPerU 2007: 85-90 - [c5]Zhongren Liu, Li Xu, Zhide Chen, Fuchun Guo:
Private Key Management in Hierarchical Identity-Based Encryption. SITIS 2007: 206-212 - 2006
- [c4]Zhide Chen, Li Xu:
Anti-Collusion Anonymous Credentials Scheme. CIT 2006: 150 - [c3]Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang:
Secure and Efficient Trust Negotiation. CIS 2006: 374-384 - [c2]Li Xu, Zhiwei Lin, Ayong Ye:
Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network. CSCWD 2006: 1027-1030 - [c1]Zhiwei Lin, Li Xu, Dajin Wang, Jianliang Gao:
A Coloring Based Backbone Construction Algorithm in Wireless Ad Hoc Network. GPC 2006: 509-516
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint