default search action
Leo Yu Zhang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Zesen Hou, Jianting Ning, Xinyi Huang, Shengmin Xu, Leo Yu Zhang:
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud. Comput. Stand. Interfaces 90: 103854 (2024) - [j65]Yanping Wang, Xiaosong Zhang, Ruidong Chen, Hong-Ning Dai, Xiaofen Wang, Leo Yu Zhang, Ming Li:
Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing. IEEE Internet Things J. 11(5): 8401-8413 (2024) - [j64]Hanyang Liu, Yong Wang, Zhiqiang Zhang, Jiangzhou Deng, Chao Chen, Leo Yu Zhang:
Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback. Inf. Process. Manag. 61(4): 103720 (2024) - [j63]Mingfu Xue, Xin Wang, Yinghao Wu, Shifeng Ni, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features. IEEE Trans. Artif. Intell. 5(9): 4649-4659 (2024) - [j62]Xiangli Xiao, Yushu Zhang, Leo Yu Zhang, Zhongyun Hua, Zhe Liu, Jiwu Huang:
FairCMS: Cloud Media Sharing With Fair Copyright Protection. IEEE Trans. Comput. Soc. Syst. 11(5): 6192-6209 (2024) - [j61]Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. IEEE Trans. Dependable Secur. Comput. 21(2): 961-974 (2024) - [j60]Zirui Gong, Liyue Shen, Yanjun Zhang, Leo Yu Zhang, Jingwei Wang, Guangdong Bai, Yong Xiang:
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification. IEEE Trans. Inf. Forensics Secur. 19: 1241-1250 (2024) - [j59]Jianrong Lu, Shengshan Hu, Wei Wan, Minghui Li, Leo Yu Zhang, Lulu Xue, Hai Jin:
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 5405-5418 (2024) - [j58]Mingfu Xue, Yinghao Wu, Shifeng Ni, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger. IEEE Trans. Ind. Informatics 20(3): 5004-5013 (2024) - [j57]Kai Fang, Wei Wang, Marcin Wozniak, Qingchen Zhang, Keping Yu, Junxin Chen, Amr Tolba, Leo Yu Zhang:
Guest Editorial AI-Empowered Internet of Things for Data-Driven Psychophysiological Computing and Patient Monitoring. IEEE J. Biomed. Health Informatics 28(5): 2496-2499 (2024) - [c55]Lulu Xue, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun, Dezhong Yao:
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks. AAAI 2024: 6404-6412 - [c54]Qiuyu Duan, Zhongyun Hua, Qing Liao, Yushu Zhang, Leo Yu Zhang:
Conditional Backdoor Attack via JPEG Compression. AAAI 2024: 19823-19831 - [c53]Di Mi, Yanjun Zhang, Leo Yu Zhang, Shengshan Hu, Qi Zhong, Haizhuan Yuan, Shirui Pan:
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation. AAAI 2024: 19902-19910 - [c52]Yifan Shang, Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection. ACM TUR-C 2024 - [c51]Linji Zhang, Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks. ACM TUR-C 2024 - [c50]Fuyi Wang, Zekai Chen, Lei Pan, Leo Yu Zhang, Jianying Zhou:
CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments. AsiaCCS 2024 - [c49]Ryan Holland, Shantanu Pal, Lei Pan, Leo Yu Zhang:
Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions. COMSNETS 2024: 31-36 - [c48]Fuyi Wang, Jinzhi Ouyang, Lei Pan, Leo Yu Zhang, Xiaoning Liu, Yanping Wang, Robin Doss:
TrustMIS: Trust-Enhanced Inference Framework for Medical Image Segmentation. ECAI 2024: 105-112 - [c47]Xianlong Wang, Minghui Li, Peng Xu, Wei Liu, Leo Yu Zhang, Shengshan Hu, Yanjun Zhang:
PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds. ESORICS (1) 2024: 125-145 - [c46]Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin:
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification. ESORICS (1) 2024: 146-166 - [c45]Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin:
MISA: Unveiling the Vulnerabilities in Split Federated Learning. ICASSP 2024: 6435-6439 - [c44]Linshan Hou, Ruili Feng, Zhongyun Hua, Wei Luo, Leo Yu Zhang, Yiming Li:
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency. ICML 2024 - [c43]Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen:
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World. IJCAI 2024: 1670-1678 - [c42]Minghui Li, Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Leo Yu Zhang, Yichen Wang:
DarkFed: A Data-Free Backdoor Attack in Federated Learning. IJCAI 2024: 4443-4451 - [c41]Yuhang Zhou, Yushu Zhang, Leo Yu Zhang, Zhongyun Hua:
DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group. ACM Multimedia 2024: 10055-10064 - [c40]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. SP 2024: 2048-2066 - [c39]Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. SP 2024: 3015-3033 - [c38]Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin:
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability. SP 2024: 3365-3384 - [i51]Lulu Xue, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun, Dezhong Yao:
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks. CoRR abs/2401.16687 (2024) - [i50]Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang:
Fluent: Round-efficient Secure Aggregation for Private Federated Learning. CoRR abs/2403.06143 (2024) - [i49]Di Mi, Yanjun Zhang, Leo Yu Zhang, Shengshan Hu, Qi Zhong, Haizhuan Yuan, Shirui Pan:
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation. CoRR abs/2403.07673 (2024) - [i48]Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. CoRR abs/2403.10801 (2024) - [i47]Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen:
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness. CoRR abs/2404.11357 (2024) - [i46]Minghui Li, Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Leo Yu Zhang, Yichen Wang:
DarkFed: A Data-Free Backdoor Attack in Federated Learning. CoRR abs/2405.03299 (2024) - [i45]Renqiang Luo, Tao Tang, Feng Xia, Jiaying Liu, Chengpei Xu, Leo Yu Zhang, Wei Xiang, Chengqi Zhang:
Algorithmic Fairness: A Tolerance Perspective. CoRR abs/2405.09543 (2024) - [i44]Linshan Hou, Ruili Feng, Zhongyun Hua, Wei Luo, Leo Yu Zhang, Yiming Li:
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency. CoRR abs/2405.09786 (2024) - [i43]Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill, Shirui Pan:
Large Language Model Watermark Stealing With Mixed Integer Programming. CoRR abs/2405.19677 (2024) - [i42]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Ming Ding, Chao Chen, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Memorization in deep learning: A survey. CoRR abs/2406.03880 (2024) - [i41]Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin:
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification. CoRR abs/2406.15093 (2024) - [i40]Hangtao Zhang, Chenyu Zhu, Xianlong Wang, Ziqi Zhou, Shengshan Hu, Leo Yu Zhang:
BadRobot: Jailbreaking LLM-based Embodied AI in the Physical World. CoRR abs/2407.20242 (2024) - 2023
- [j56]Chenhong Luo, Yong Wang, Bo Li, Hanyang Liu, Pengyu Wang, Leo Yu Zhang:
An Efficient Approach to Manage Natural Noises in Recommender Systems. Algorithms 16(5): 228 (2023) - [j55]Jiangzhou Deng, Hongtao Li, Junpeng Guo, Leo Yu Zhang, Yong Wang:
Providing prediction reliability through deep neural networks for recommender systems. Comput. Ind. Eng. 185: 109627 (2023) - [j54]Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. Comput. Secur. 135: 103488 (2023) - [j53]Yong Wang, Mingxing Gao, Xun Ran, Jun Ma, Leo Yu Zhang:
An improved matrix factorization with local differential privacy based on piecewise mechanism for recommendation systems. Expert Syst. Appl. 216: 119457 (2023) - [j52]Yaxi Yang, Yao Tong, Jian Weng, Yufeng Yi, Yandong Zheng, Leo Yu Zhang, Rongxing Lu:
PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data. IEEE Trans. Cloud Comput. 11(3): 2379-2391 (2023) - [j51]Yong Wang, Zhuo Liu, Leo Yu Zhang, Fabio Pareschi, Gianluca Setti, Guanrong Chen:
From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice. IEEE Trans. Cybern. 53(2): 1324-1334 (2023) - [j50]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. IEEE Trans. Dependable Secur. Comput. 20(2): 1186-1199 (2023) - [j49]Zhiqiang Zhang, Hong Zhu, Pengxin Ban, Yong Wang, Leo Yu Zhang:
Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation. IEEE Trans. Ind. Electron. 70(3): 2916-2926 (2023) - [j48]Jiangzhou Deng, Xun Ran, Yong Wang, Leo Yu Zhang, Junpeng Guo:
Probabilistic Matrix Factorization Recommendation Approach for Integrating Multiple Information Sources. IEEE Trans. Syst. Man Cybern. Syst. 53(10): 6220-6231 (2023) - [c37]Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun:
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples. AAAI 2023: 872-880 - [c36]Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou:
Predicate Private Set Intersection with Linear Complexity. ACNS 2023: 143-166 - [c35]Fuyi Wang, Yanping Wang, Leo Yu Zhang, Yuval Hertzog, Michael Loewy, Dominique Valladolid, Julio Medeiros, Muna Al-Hawawreh, Robin Doss:
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM. ACNS Workshops 2023: 336-354 - [c34]Mengyao Ma, Yanjun Zhang, Mahawaga Arachchige Pathum Chamikara, Leo Yu Zhang, Mohan Baruwal Chhetri, Guangdong Bai:
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks. AsiaCCS 2023: 122-135 - [c33]Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang:
Masked Language Model Based Textual Adversarial Example Detection. AsiaCCS 2023: 925-937 - [c32]Jianrong Lu, Lulu Xue, Wei Wan, Minghui Li, Leo Yu Zhang, Shengqing Hu:
Preserving Privacy of Input Features Across All Stages of Collaborative Learning. ISPA/BDCloud/SocialCom/SustainCom 2023: 191-198 - [c31]Tianyang Cai, Yuqi Li, Tao Jia, Leo Yu Zhang, Zheng Yang:
Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint. CSCWD 2023: 1710-1715 - [c30]Khondaker Tasrif Noor, Antonio Robles-Kelly, Leo Yu Zhang, Mohamed Reda Bouadjenek:
A Bottom-Up Capsule Network for Hierarchical Image Classification. DICTA 2023: 325-331 - [c29]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin:
Downstream-agnostic Adversarial Examples. ICCV 2023: 4322-4332 - [c28]Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Wee-Chung Liew, Zhetao Li:
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning. IJCAI 2023: 4567-4575 - [c27]Xiaoxing Mo, Leo Yu Zhang, Nan Sun, Wei Luo, Shang Gao:
Backdoor Attack on Deep Neural Networks in Perception Domain. IJCNN 2023: 1-8 - [c26]Shengshan Hu, Wei Liu, Minghui Li, Yechao Zhang, Xiaogeng Liu, Xianlong Wang, Leo Yu Zhang, Junhui Hou:
PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness. ACM Multimedia 2023: 666-675 - [c25]Wei Wan, Shengshan Hu, Minghui Li, Jianrong Lu, Longling Zhang, Leo Yu Zhang, Hai Jin:
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning. ACM Multimedia 2023: 7394-7402 - [c24]Yixin Liu, Kaize Ding, Qinghua Lu, Fuyi Li, Leo Yu Zhang, Shirui Pan:
Towards Self-Interpretable Graph-Level Anomaly Detection. NeurIPS 2023 - [c23]Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Jun Zhang, Yang Xiang:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. RAID 2023: 686-699 - [e1]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i39]Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang:
Masked Language Model Based Textual Adversarial Example Detection. CoRR abs/2304.08767 (2023) - [i38]Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Wee-Chung Liew, Zhetao Li:
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning. CoRR abs/2304.10783 (2023) - [i37]Tianyang Cai, Yuqi Li, Tao Jia, Leo Yu Zhang, Zheng Yang:
Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint. CoRR abs/2306.15248 (2023) - [i36]Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin:
Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training. CoRR abs/2307.07873 (2023) - [i35]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin:
Downstream-agnostic Adversarial Examples. CoRR abs/2307.12280 (2023) - [i34]Wei Wan, Shengshan Hu, Minghui Li, Jianrong Lu, Longling Zhang, Leo Yu Zhang, Hai Jin:
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning. CoRR abs/2308.03331 (2023) - [i33]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Client-side Gradient Inversion Against Federated Learning from Poisoning. CoRR abs/2309.07415 (2023) - [i32]Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models. CoRR abs/2310.09822 (2023) - [i31]Yixin Liu, Kaize Ding, Qinghua Lu, Fuyi Li, Leo Yu Zhang, Shirui Pan:
Towards Self-Interpretable Graph-Level Anomaly Detection. CoRR abs/2310.16520 (2023) - [i30]Zirui Gong, Liyue Shen, Yanjun Zhang, Leo Yu Zhang, Jingwei Wang, Guangdong Bai, Yong Xiang:
AGRAMPLIFIER: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification. CoRR abs/2311.06996 (2023) - [i29]Xianlong Wang, Shengshan Hu, Minghui Li, Zhifei Yu, Ziqi Zhou, Leo Yu Zhang, Hai Jin:
Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations. CoRR abs/2311.18403 (2023) - [i28]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. CoRR abs/2312.02673 (2023) - [i27]Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin:
MISA: Unveiling the Vulnerabilities in Split Federated Learning. CoRR abs/2312.11026 (2023) - 2022
- [j47]Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Zahidul Islam, Leo Yu Zhang, Md. Rafiqul Islam, Warren Armstrong:
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges. IEEE Access 10: 44756-44777 (2022) - [j46]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu:
Evaluating Membership Inference Through Adversarial Robustness. Comput. J. 65(11): 2969-2978 (2022) - [j45]Zhuo Liu, Jinyuan Liu, Leo Yu Zhang, Yong Zhao, Xiao Feng Gong:
Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption. Complex. 2022: 5193618:1-5193618:18 (2022) - [j44]Xun Ran, Yong Wang, Leo Yu Zhang, Jun Ma:
A differentially private matrix factorization based on vector perturbation for recommender system. Neurocomputing 483: 32-41 (2022) - [j43]Xun Ran, Yong Wang, Leo Yu Zhang, Jun Ma:
A differentially private nonnegative matrix factorization for recommender system. Inf. Sci. 592: 21-35 (2022) - [j42]Yong Wang, Xuhui Zhao, Zhiqiang Zhang, Leo Yu Zhang:
A collaborative filtering algorithm based on item labels and Hellinger distance for sparse data. J. Inf. Sci. 48(6): 749-766 (2022) - [j41]Zhirun Zheng, Zhetao Li, Hongbo Jiang, Leo Yu Zhang, Dengbiao Tu:
Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing. IEEE Trans. Inf. Forensics Secur. 17: 2256-2271 (2022) - [j40]Hui Zhang, Junxin Chen, Leo Yu Zhang, Chong Fu, Raffaele Gravina, Giancarlo Fortino, Zhihan Lv:
Low-Cost and Confidential ECG Acquisition Framework Using Compressed Sensing and Chaotic Systems for Wireless Body Area Network. IEEE J. Biomed. Health Informatics 26(12): 5783-5792 (2022) - [c22]Zian Liu, Chao Chen, Leo Yu Zhang, Shang Gao:
Working Mechanism of Eternalblue and Its Application in Ransomworm. CSS 2022: 178-191 - [c21]Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu:
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer. CVPR 2022: 14994-15003 - [c20]Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang:
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. ICME 2022: 1-6 - [c19]Zhibin Zheng, Zhongyun Hua, Leo Yu Zhang:
Detecting and Mitigating Backdoor Attacks with Dynamic and Invisible Triggers. ICONIP (3) 2022: 216-227 - [c18]Bilal Hussain Abbasi, Qi Zhong, Leo Yu Zhang, Shang Gao, Antonio Robles-Kelly, Robin Doss:
A Generic Enhancer for Backdoor Attacks on Deep Neural Networks. ICONIP (7) 2022: 296-307 - [c17]Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He:
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection. IJCAI 2022: 753-760 - [c16]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. ISCC 2022: 1-6 - [c15]Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. ACM Multimedia 2022: 678-686 - [c14]Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng:
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints. MSN 2022: 178-185 - [c13]Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu, Leo Yu Zhang, Robin Doss:
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. NSS 2022: 406-425 - [c12]Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang:
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning. TrustCom 2022: 139-146 - [c11]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Jinyu Tian, Jiantao Zhou:
Self-Supervised Adversarial Example Detection by Disentangled Representation. TrustCom 2022: 1000-1007 - [i26]Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Zahidul Islam, Leo Yu Zhang, Md. Rafiqul Islam, Warren Armstrong:
Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges. CoRR abs/2201.07417 (2022) - [i25]Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu:
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer. CoRR abs/2203.03121 (2022) - [i24]Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang:
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. CoRR abs/2204.01934 (2022) - [i23]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. CoRR abs/2204.10958 (2022) - [i22]Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He:
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection. CoRR abs/2204.13256 (2022) - [i21]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu:
Evaluating Membership Inference Through Adversarial Robustness. CoRR abs/2205.06986 (2022) - [i20]Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. CoRR abs/2207.00278 (2022) - [i19]Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng:
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints. CoRR abs/2210.01437 (2022) - [i18]Linshan Hou, Zhongyun Hua, Yuhong Li, Leo Yu Zhang:
M-to-N Backdoor Paradigm: A Stealthy and Fuzzy Attack to Deep Learning Models. CoRR abs/2211.01875 (2022) - [i17]Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun:
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples. CoRR abs/2211.12294 (2022) - 2021
- [j39]Yong Wang, Pengyu Wang, Zhuo Liu, Leo Yu Zhang:
A new item similarity based on α-divergence for collaborative filtering in sparse data. Expert Syst. Appl. 166: 114074 (2021) - [j38]Pengyu Wang, Yong Wang, Leo Yu Zhang, Hong Zhu:
An effective and efficient fuzzy approach for managing natural noise in recommender systems. Inf. Sci. 570: 623-637 (2021) - [j37]Guanjun Lin, Wei Xiao, Leo Yu Zhang, Shang Gao, Yonghang Tai, Jun Zhang:
Deep neural-based vulnerability discovery demystified: data, model and performance. Neural Comput. Appl. 33(20): 13287-13300 (2021) - [j36]Zhuo Liu, Yong Wang, Leo Yu Zhang, Jun Ma:
A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model. Secur. Commun. Networks 2021: 6625579:1-6625579:21 (2021) - [j35]Yushu Zhang, Jiantao Zhou, Yong Xiang, Leo Yu Zhang, Fei Chen, Shaoning Pang, Xiaofeng Liao:
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds. IEEE Trans. Big Data 7(4): 717-728 (2021) - [j34]Junxin Chen, Leo Yu Zhang, Yicong Zhou:
Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms. IEEE Trans. Circuits Syst. Video Technol. 31(12): 4747-4758 (2021) - [j33]Shengshan Hu, Leo Yu Zhang, Qian Wang, Zhan Qin, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. IEEE Trans. Dependable Secur. Comput. 18(3): 1354-1368 (2021) - [c10]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
My Security: An interactive search engine for cybersecurity. HICSS 2021: 1-10 - [c9]Shengshan Hu, Yechao Zhang, Xiaogeng Liu, Leo Yu Zhang, Minghui Li, Hai Jin:
AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch. ACM Multimedia 2021: 2335-2343 - [c8]Wei Wan, Jianrong Lu, Shengshan Hu, Leo Yu Zhang, Xiaobing Pei:
Shielding Federated Learning: A New Attack Approach and Its Defense. WCNC 2021: 1-7 - [i16]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Shengshan Hu, Jinyu Tian, Jiantao Zhou:
Self-Supervised Adversarial Example Detection by Disentangled Representation. CoRR abs/2105.03689 (2021) - [i15]Yushu Zhang, Xiangli Xiao, Leo Yu Zhang, Zhe Liu, Jiwu Huang:
CREAMS: Copyrighted Cloud Media Sharing. CoRR abs/2105.08899 (2021) - [i14]Yong Wang, Zhuo Liu, Leo Yu Zhang, Fabio Pareschi, Gianluca Setti, Guanrong Chen:
From Chaos to Pseudo-Randomness: A Case Study on the 2D Coupled Map Lattice. CoRR abs/2105.10857 (2021) - [i13]Shengshan Hu, Jianrong Lu, Wei Wan, Leo Yu Zhang:
Challenges and approaches for mitigating byzantine attacks in federated learning. CoRR abs/2112.14468 (2021) - 2020
- [j32]Chee Keong Ng, Sutharshan Rajasegarar, Lei Pan, Frank Jiang, Leo Yu Zhang:
VoterChoice: A ransomware detection honeypot with multiple voting framework. Concurr. Comput. Pract. Exp. 32(14) (2020) - [j31]Zhuo Liu, Yong Wang, Gongkun Jiang, Leo Yu Zhang:
Design and Analysis on a Parallel Chaos-Based Hash Function. Int. J. Bifurc. Chaos 30(13): 2050188:1-2050188:18 (2020) - [j30]Yuexin Zhang, Xinyi Huang, Xiaofeng Chen, Leo Yu Zhang, Jun Zhang, Yang Xiang:
A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle. IEEE Internet Things J. 7(2): 1061-1071 (2020) - [j29]Yong Wang, Zhiqiang Zhang, Leo Yu Zhang, Jun Feng, Jerry Gao, Peng Lei:
A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf. Sci. 523: 152-166 (2020) - [j28]Guang Hua, Yong Xiang, Leo Yu Zhang:
Informed Histogram-Based Watermarking. IEEE Signal Process. Lett. 27: 236-240 (2020) - [j27]Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Trans. Dependable Secur. Comput. 17(6): 1218-1231 (2020) - [c7]Digby Mooney, Lynn Margaret Batten, Leo Yu Zhang:
A New Rabin-Type Cryptosystem with Modulus p2q. ATIS 2020: 61-77 - [c6]Yong Wang, Pengyu Wang, Xuhui Zhao, Zhuo Liu, Leo Yu Zhang:
A New Interval Preference Model and Corresponding Fuzzy Similarity Measure for Collaborative Filtering. BigDataService 2020: 212-215 - [c5]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence. NSS 2020: 3-21 - [c4]Qi Zhong, Leo Yu Zhang, Jun Zhang, Longxiang Gao, Yong Xiang:
Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps. PAKDD (2) 2020: 462-474 - [c3]Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang, Yong Xiang:
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. TrustCom 2020: 402-409
2010 – 2019
- 2019
- [j26]Yuansheng Liu, Leo Yu Zhang, Jinyan Li:
Fast detection of maximal exact matches via fixed sampling of query K-mers and Bloom filtering of index K-mers. Bioinform. 35(22): 4560-4567 (2019) - [j25]Yushu Zhang, Yong Xiang, Leo Yu Zhang, Yue Rong, Song Guo:
Secure Wireless Communications Based on Compressive Sensing: A Survey. IEEE Commun. Surv. Tutorials 21(2): 1093-1111 (2019) - [j24]Nan Sun, Jun Zhang, Paul Rimba, Shang Gao, Leo Yu Zhang, Yang Xiang:
Data-Driven Cybersecurity Incident Prediction: A Survey. IEEE Commun. Surv. Tutorials 21(2): 1744-1772 (2019) - [j23]Chee Keong Ng, Frank Jiang, Leo Yu Zhang, Wanlei Zhou:
Static malware clustering using enhanced deep embedding method. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j22]Junxin Chen, Jiazhu Xing, Leo Yu Zhang, Lin Qi:
Compressed sensing for electrocardiogram acquisition in wireless body sensor network: A comparative analysis. Int. J. Distributed Sens. Networks 15(7) (2019) - [j21]Jia Wang, Jianqiang Li, Huihui Wang, Leo Yu Zhang, Lee-Ming Cheng, Qiuzhen Lin:
Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security. IEEE Internet Things J. 6(4): 5892-5901 (2019) - [j20]Yushu Zhang, Yong Xiang, Leo Yu Zhang, Lu-Xing Yang, Jiantao Zhou:
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf. Sci. 496: 150-160 (2019) - [j19]Jia Wang, Leo Yu Zhang, Junxin Chen, Guang Hua, Yushu Zhang, Yong Xiang:
Compressed Sensing Based Selective Encryption With Data Hiding Capability. IEEE Trans. Ind. Informatics 15(12): 6560-6571 (2019) - 2018
- [j18]Yushu Zhang, Qi He, Yong Xiang, Leo Yu Zhang, Bo Liu, Junxin Chen, Yiyuan Xie:
Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things. IEEE Internet Things J. 5(5): 3442-3451 (2018) - [j17]Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen:
Improved known-plaintext attack to permutation-only multimedia ciphers. Inf. Sci. 430: 228-239 (2018) - [j16]Junxin Chen, Leo Yu Zhang, Yushu Zhang, Fabio Pareschi, Yu-Dong Yao:
Exploiting the Security Aspects of Compressive Sampling. Secur. Commun. Networks 2018: 4740174:1 (2018) - [j15]Leo Yu Zhang, Yuansheng Liu, Fabio Pareschi, Yushu Zhang, Kwok-Wo Wong, Riccardo Rovatti, Gianluca Setti:
On the Security of a Class of Diffusion Mechanisms for Image Encryption. IEEE Trans. Cybern. 48(4): 1163-1175 (2018) - 2017
- [j14]Junxin Chen, Nan Bao, Jinchang Li, Zhiliang Zhu, Leo Yu Zhang:
Cryptanalysis of Optical Ciphers Integrating Double Random Phase Encoding With Permutation. IEEE Access 5: 16124-16129 (2017) - [j13]Qiuzhen Lin, Bishan Hu, Ya Tang, Leo Yu Zhang, Jianyong Chen, Xiaomin Wang, Zhong Ming:
A local search enhanced differential evolutionary algorithm for sparse recovery. Appl. Soft Comput. 57: 144-163 (2017) - [j12]Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen:
Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers. Int. J. Bifurc. Chaos 27(10): 1750155:1-1750155:13 (2017) - [j11]Yushu Zhang, Hui Huang, Yong Xiang, Leo Yu Zhang, Xing He:
Harnessing the Hybrid Cloud for Secure Big Image Data Service. IEEE Internet Things J. 4(5): 1380-1388 (2017) - 2016
- [j10]Yushu Zhang, Leo Yu Zhang, Jiantao Zhou, Licheng Liu, Fei Chen, Xing He:
A Review of Compressive Sensing in Information Security Field. IEEE Access 4: 2507-2519 (2016) - [j9]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Di Xiao, Bin Chen, Xiaofeng Liao:
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions. Int. J. Bifurc. Chaos 26(11): 1650191:1-1650191:15 (2016) - [j8]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Di Xiao:
Embedding cryptographic features in compressive sensing. Neurocomputing 205: 472-480 (2016) - [j7]Li Zeng, Renren Liu, Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong:
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher. Multim. Tools Appl. 75(10): 5439-5453 (2016) - [j6]Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Jiantao Zhou:
Bi-level Protected Compressive Sampling. IEEE Trans. Multim. 18(9): 1720-1732 (2016) - 2015
- [j5]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Wenying Wen, Jiantao Zhou, Xing He:
Robust coding of encrypted images via structural matrix. Signal Process. Image Commun. 39: 202-211 (2015) - [c2]Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Qiuzhen Lin:
Joint quantization and diffusion for compressed sensing measurements of natural images. ISCAS 2015: 2744-2747 - [c1]Yushu Zhang, Jiantao Zhou, Leo Yu Zhang, Fei Chen, Xinyu Lei:
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds. SocialSec 2015: 1-6 - [i12]Yuansheng Liu, Leo Yu Zhang, Jia Wang, Yushu Zhang, Kwok-Wo Wong:
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure. CoRR abs/1503.06638 (2015) - [i11]Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong, Fabio Pareschi, Yushu Zhang, Riccardo Rovatti, Gianluca Setti:
On the security of a class of diffusion mechanisms for image encryption. CoRR abs/1512.09263 (2015) - 2014
- [j4]Leo Yu Zhang, Xiaobo Hu, Yuansheng Liu, Kwok-Wo Wong, Jie Gan:
A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19(10): 3653-3659 (2014) - [j3]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Kwok-Wo Wong:
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 29(8): 914-920 (2014) - [i10]Yushu Zhang, Kwok-Wo Wong, Di Xiao, Leo Yu Zhang, Ming Li:
Embedding Cryptographic Features in Compressive Sensing. CoRR abs/1403.6213 (2014) - [i9]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Di Xiao:
Robust Coding of Encrypted Images via Structural Matrix. CoRR abs/1405.6843 (2014) - [i8]Leo Yu Zhang, Kwok-Wo Wong, Chengqing Li, Yushu Zhang:
Towards Secure Compressive Sampling Scheme. CoRR abs/1406.1725 (2014) - [i7]Li Zeng, Renren Liu, Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong:
Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher. CoRR abs/1409.4845 (2014) - [i6]Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Qiuzhen Lin:
Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images. CoRR abs/1411.6079 (2014) - 2013
- [j2]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Michael Z. Q. Chen:
Breaking a Chaotic Image Encryption Algorithm Based on Modulo Addition and XOR Operation. Int. J. Bifurc. Chaos 23(4) (2013) - [i5]Leo Yu Zhang, Xiaobo Hu, Yuansheng Liu, Kwok-Wo Wong, Jie Gan:
A chaotic image encryption scheme owning temp-value feedback. CoRR abs/1304.2612 (2013) - [i4]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Kwok-Wo Wong:
Breaking an image compression and encryption scheme based on Chinese Remainder Theorem. CoRR abs/1306.5615 (2013) - 2012
- [j1]Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J. Syst. Softw. 85(9): 2077-2085 (2012) - [i3]Chengqing Li, Leo Yu Zhang, Rong Ou, Kwok-Wo Wong:
Breaking a novel colour image encryption algorithm based on chaos. CoRR abs/1203.5467 (2012) - [i2]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Michael Z. Q. Chen:
Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. CoRR abs/1207.6536 (2012) - 2011
- [i1]Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. CoRR abs/1112.4941 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint