default search action
Cliff C. Zou
Person information
- affiliation: University of Central Florida, Orlando, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Paulo H. L. Rettore, Philipp Zißner, Mohammed Alkhowaiter, Cliff C. Zou, Peter Sevenich:
Military Data Space: Challenges, Opportunities, and Use Cases. IEEE Commun. Mag. 62(1): 70-76 (2024) - [j28]Ibrahim A. Alharbi, Cliff C. Zou, Reem N. Alharbi:
Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning. Sensors 24(11): 3509 (2024) - [j27]Edward L. Amoruso, Richard Leinecker, Cliff C. Zou:
User Privacy Protection via Windows Registry Hooking and Runtime Encryption. Sensors 24(16): 5106 (2024) - [j26]Xiaobin Tan, Chuang Peng, Peng Xie, Hao Wang, Mengxiang Li, Shuangwu Chen, Cliff C. Zou:
Inter-Flow Spatio-Temporal Correlation Analysis Based Website Fingerprinting Using Graph Neural Network. IEEE Trans. Inf. Forensics Secur. 19: 7619-7632 (2024) - [j25]Xiaobin Tan, Shunyi Wang, Liguo Ji, Xinxin Tong, Cliff C. Zou, Quan Zheng, Jian Yang:
Hybrid-Coding Based Content Access Control for Information-Centric Networking. IEEE Trans. Wirel. Commun. 23(7): 6765-6777 (2024) - [c74]Mnassar Alyami, Cliff C. Zou, Yan Solihin:
Adaptive Segmentation: A Tradeoff Between Packet-Size Obfuscation and Performance. SmartNets 2024: 1-4 - 2023
- [j24]Mohammed Alkhowaiter, Hisham A. Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff C. Zou:
Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach. Sensors 23(14): 6287 (2023) - [c73]Edward L. Amoruso, Cliff C. Zou, Richard Leinecker:
User Profiling Attack Using Windows Registry Data. UEMCON 2023: 171-181 - [i7]Roy Laurens, Edo Christianto, Bruce Caulkins, Cliff C. Zou:
Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System. CoRR abs/2306.00095 (2023) - [i6]Mohammed Alkhowaiter, Hisham A. Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff C. Zou:
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach. CoRR abs/2306.00314 (2023) - [i5]Mnassar Alyami, Abdulmajeed Alghamdi, Mohammed Alkhowaiter, Cliff C. Zou, Yan Solihin:
Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks. CoRR abs/2309.05941 (2023) - 2022
- [j23]Lan Luo, Yue Zhang, Clayton White, Brandon Keating, Bryan Pearson, Xinhui Shao, Zhen Ling, Haofei Yu, Cliff C. Zou, Xinwen Fu:
On Security of TrustZone-M-Based IoT Systems. IEEE Internet Things J. 9(12): 9683-9699 (2022) - [j22]Amirfarhad Nilizadeh, Shirin Nilizadeh, Wojciech Mazurczyk, Cliff C. Zou, Gary T. Leavens:
Adaptive Matrix Pattern Steganography on RGB Images. J. Cyber Secur. Mobil. 11(1) (2022) - [c72]Mnassar Alyami, Ibrahim Alharbi, Cliff C. Zou, Yan Solihin, Karl Ackerman:
WiFi-based IoT Devices Profiling Attack based on Eavesdropping of Encrypted WiFi Traffic. CCNC 2022: 385-392 - [c71]Edward L. Amoruso, Richard Leinecker, Cliff C. Zou:
SeeShells: An Optimized Solution for Utilizing Shellbags in a Digital Forensic Investigation. CSR 2022: 143-148 - [c70]Mohammed Alkhowaiter, Khalid Almubarak, Cliff C. Zou:
Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media Platforms. CSR 2022: 149-156 - [c69]Roy Laurens, Edo Christianto, Bruce Caulkins, Cliff C. Zou:
Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System. GLOBECOM 2022: 6091-6096 - [c68]Bryan Pearson, Yue Zhang, Cliff C. Zou, Xinwen Fu:
FUME: Fuzzing Message Queuing Telemetry Transport Brokers. INFOCOM 2022: 1699-1708 - [c67]Mnassar Alyami, Mohammed Alkhowaiter, Mansour Al Ghanim, Cliff C. Zou, Yan Solihin:
MAC-Layer Traffic Shaping Defense Against WiFi Device Fingerprinting Attacks. ISCC 2022: 1-7 - [c66]Edward L. Amoruso, Stephen P. Johnson, Raghu Nandan Avula, Cliff C. Zou:
A Web Infrastructure for Certifying Multimedia News Content for Fake News Defense. ISCC 2022: 1-7 - [c65]Mohammed Alkhowaiter, Khalid Almubarak, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Changchun Zou:
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms. MILCOM 2022: 672-678 - 2021
- [c64]Ibrahim A. Alharbi, Ali Jaber Almalki, Cliff C. Zou:
Hyperparameter Optimization and Comparison of Student Performance Prediction Algorithms. CSCI 2021: 889-894 - [c63]Anne M. Tall, Cliff C. Zou, Jun Wang:
Integrating Cybersecurity Into a Big Data Ecosystem. MILCOM 2021: 69-76 - [i4]Edward L. Amoruso, Stephen P. Johnson, Raghu Nandan Avula, Cliff C. Zou:
A Web Infrastructure for Certifying Multimedia News Content for Fake News Defense. CoRR abs/2104.04671 (2021) - 2020
- [j21]Hanxun Zhou, Yeshuai Hu, Xinlin Yang, Hong Pan, Wei Guo, Cliff C. Zou:
A Worm Detection System Based on Deep Learning. IEEE Access 8: 205444-205454 (2020) - [c62]Kunpeng Liu, Xiaolin Li, Cliff C. Zou, Haibo Huang, Yanjie Fu:
Ambulance Dispatch via Deep Reinforcement Learning. SIGSPATIAL/GIS 2020: 123-126 - [c61]Lan Luo, Yue Zhang, Cliff C. Zou, Xinhui Shao, Zhen Ling, Xinwen Fu:
On Runtime Software Security of TrustZone-M Based IoT Devices. GLOBECOM 2020: 1-7 - [c60]Bryan Pearson, Cliff C. Zou, Yue Zhang, Zhen Ling, Xinwen Fu:
SIC2: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors. ICPADS 2020: 372-381 - [c59]Hossein Rezaeighaleh, Cliff C. Zou:
Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies. TrustCom 2020: 1903-1909 - [c58]Raghu Nandan Avula, Cliff C. Zou:
Performance Evaluation of TPC-C Benchmark on Various Cloud Providers. UEMCON 2020: 226-233 - [i3]Lan Luo, Yue Zhang, Cliff C. Zou, Xinhui Shao, Zhen Ling, Xinwen Fu:
On Runtime Software Security of TrustZone-M based IoT Devices. CoRR abs/2007.05876 (2020)
2010 – 2019
- 2019
- [c57]Hossein Rezaeighaleh, Cliff C. Zou:
Deterministic Sub-Wallet for Cryptocurrencies. Blockchain 2019: 419-424 - [c56]Hossein Rezaeighaleh, Cliff C. Zou:
New Secure Approach to Backup Cryptocurrency Wallets. GLOBECOM 2019: 1-6 - [c55]Roy Laurens, Hossein Rezaeighaleh, Cliff C. Zou, Jusak Jusak:
Using Disposable Domain Names to Detect Online Card Transaction Fraud. ICC 2019: 1-7 - [c54]Bryan Pearson, Lan Luo, Cliff C. Zou, Jacob Crain, Yier Jin, Xinwen Fu:
Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory. IFIPIoT 2019: 289-306 - [c53]Raghu Nandan Avula, Cliff C. Zou:
Improving Rider Safety Using QR Code & Fingerprint Biometrics. UEMCON 2019: 141-144 - 2018
- [j20]Afraa Attiah, Muhammad Faisal Amjad, Mainak Chatterjee, Cliff C. Zou:
An evolutionary routing game for energy balance in Wireless Sensor Networks. Comput. Networks 138: 31-43 (2018) - [j19]Omar Nakhila, Muhammad Faisal Amjad, Erich Dondyk, Cliff C. Zou:
Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients. Comput. Secur. 74: 41-54 (2018) - [c52]Afraa Attiah, Mainak Chatterjee, Cliff C. Zou:
A Game Theoretic Approach to Model Cyber Attack and Defense Strategies. ICC 2018: 1-7 - [c51]Hossein Rezaeighaleh, Roy Laurens, Cliff C. Zou:
Secure Smart Card Signing with Time-based Digital Signature. ICNC 2018: 182-187 - [i2]Dean Wasil, Omar Nakhila, Salih Safa Bacanli, Cliff C. Zou, Damla Turgut:
Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack. CoRR abs/1801.08185 (2018) - [i1]Zhen Ling, Kaizheng Liu, Yiling Xu, Chao Gao, Yier Jin, Cliff C. Zou, Xinwen Fu, Wei Zhao:
IoT Security: An End-to-End View and Case Study. CoRR abs/1805.05853 (2018) - 2017
- [c50]Heather Lawrence, Andrew Hughes, Robert Tonic, Cliff C. Zou:
D-miner: A framework for mining, searching, visualizing, and alerting on darknet events. CNS 2017: 1-9 - [c49]Amirfarhad Nilizadeh, Wojciech Mazurczyk, Cliff C. Zou, Gary T. Leavens:
Information Hiding in RGB Images Using an Improved Matrix Pattern Approach. CVPR Workshops 2017: 1407-1415 - [c48]Kutalmis Akpinar, Fereshteh Jafariakinabad, Kien A. Hua, Omar Nakhila, Jun Ye, Cliff C. Zou:
Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications. DASC/PiCom/DataCom/CyberSciTech 2017: 377-384 - [c47]Roy Laurens, Jusak Jusak, Cliff C. Zou:
Invariant Diversity as a Proactive Fraud Detection Mechanism for Online Merchants. GLOBECOM 2017: 1-6 - [c46]Dean Wasil, Omar Nakhila, Salih Safa Bacanli, Cliff C. Zou, Damla Turgut:
Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack. MASS 2017: 550-554 - [c45]Omar Nakhila, Cliff C. Zou:
Circumvent traffic shaping using virtual wireless clients in IEEE 802.11 wireless local area network. MILCOM 2017: 52-56 - [c44]Afraa Attiah, Mainak Chatterjee, Cliff C. Zou:
A Game Theoretic Approach for Energy-Efficient Clustering in Wireless Sensor Networks. WCNC 2017: 1-6 - 2016
- [j18]Muhammad Faisal Amjad, Mainak Chatterjee, Cliff C. Zou:
Coexistence in heterogeneous spectrum through distributed correlated equilibrium in cognitive radio networks. Comput. Networks 98: 109-122 (2016) - [j17]Xiaobin Tan, Jiangyu Zheng, Cliff C. Zou, Yukun Niu:
Pseudonym-based privacy-preserving scheme for data collection in smart grid. Int. J. Ad Hoc Ubiquitous Comput. 22(2): 120-127 (2016) - [j16]Muhammad Faisal Amjad, Mainak Chatterjee, Omar Nakhila, Cliff C. Zou:
Evolutionary non-cooperative spectrum sharing game: long-term coexistence for collocated cognitive radio networks. Wirel. Commun. Mob. Comput. 16(15): 2166-2178 (2016) - [j15]Muhammad Faisal Amjad, Baber Aslam, Afraa Attiah, Cliff C. Zou:
Towards trustworthy collaboration in spectrum sensing for ad hoc cognitive radio networks. Wirel. Networks 22(3): 781-797 (2016) - [c43]Afraa Attiah, Muhammad Faisal Amjad, Mainak Chatterjee, Cliff C. Zou:
An Evolutionary Game for Efficient Routing in Wireless Sensor Networks. GLOBECOM 2016: 1-7 - [c42]Roy Laurens, Cliff C. Zou:
Using Credit/Debit Card Dynamic Soft Descriptor as Fraud Prevention System for Merchant. GLOBECOM 2016: 1-7 - [c41]Afraa Attiah, Muhammad Faisal Amjad, Omar Nakhila, Cliff C. Zou:
ADP: An adaptive feedback approach for energy-efficient wireless sensor networks. ICNC 2016: 1-7 - [c40]Omar Nakhila, Cliff C. Zou:
Parallel active dictionary attack on IEEE 802.11 enterprise networks. MILCOM 2016: 265-270 - [c39]Omar Nakhila, Cliff C. Zou:
User-side Wi-Fi evil twin attack detection using random wireless channel monitoring. MILCOM 2016: 1243-1248 - 2015
- [c38]Erich Dondyk, Omar Nakhila, Cliff C. Zou:
SPS: An SMS-based push service for energy saving in smartphone's idle state. CCNC 2015: 53-58 - [c37]Omar Nakhila, Erich Dondyk, Muhammad Faisal Amjad, Cliff C. Zou:
User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols. CCNC 2015: 239-244 - [c36]Kien A. Hua, Ning Jiang, Jason Kuhns, Vaithiyanathan Sundaram, Cliff C. Zou:
Redundancy control through traffic deduplication. INFOCOM 2015: 10-18 - [c35]Omar Nakhila, Afraa Attiah, Yier Jin, Cliff C. Zou:
Parallel active dictionary attack on WPA2-PSK Wi-Fi networks. MILCOM 2015: 665-670 - [p2]Ping Wang, Lei Wu, Baber Aslam, Cliff C. Zou:
Analysis of Peer-to-Peer Botnet Attacks and Defenses. Propagation Phenomena in Real World Networks 2015: 183-214 - 2014
- [j14]Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, Cliff C. Zou:
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware. IEEE Trans. Dependable Secur. Comput. 11(4): 361-374 (2014) - [c34]Muhammad Faisal Amjad, Mainak Chatterjee, Omar Nakhila, Cliff C. Zou:
An evolutionary game theoretic framework for coexistence in Cognitive Radio Networks. GlobalSIP 2014: 278-282 - [c33]Roberto Alberdeston, Erich Dondyk, Cliff C. Zou:
Click-tracking blocker: Privacy preservation by disabling search engines' click-tracking. GLOBECOM 2014: 570-575 - [c32]Muhammad Faisal Amjad, Mainak Chatterjee, Cliff C. Zou:
Inducing Cooperation for Optimal Coexistence in Cognitive Radio Networks: A Game Theoretic Approach. MILCOM 2014: 955-961 - [c31]Xiaobin Tan, Zifei Zhou, Cliff C. Zou, Yukun Niu, Xin Chen:
Copyright protection in named data networking. WCSP 2014: 1-6 - 2013
- [j13]Baber Aslam, Ping Wang, Cliff Changchun Zou:
Extension of internet access to VANET via satellite receive-only terminals. Int. J. Ad Hoc Ubiquitous Comput. 14(3): 172-190 (2013) - [j12]Erich Dondyk, Louis Rivera, Cliff Changchun Zou:
Wi-Fi access denial of service attack to smartphones. Int. J. Secur. Networks 8(3): 117-129 (2013) - [j11]Soyoung Park, Baber Aslam, Damla Turgut, Cliff Changchun Zou:
Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur. Commun. Networks 6(4): 523-538 (2013) - [j10]Shawn Embleton, Sherri Sparks, Cliff Changchun Zou:
SMM rootkit: a new breed of OS independent malware. Secur. Commun. Networks 6(12): 1590-1605 (2013) - [c30]Erich Dondyk, Cliff Changchun Zou:
Denial of convenience attack to smartphones using a fake Wi-Fi access point. CCNC 2013: 164-170 - [c29]M. Faisal Amjad, Baber Aslam, Cliff Changchun Zou:
Transparent cross-layer solutions for throughput boost in Cognitive Radio Networks. CCNC 2013: 580-586 - [c28]M. Faisal Amjad, Baber Aslam, Cliff C. Zou:
DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks under denial of service attack. GLOBECOM 2013: 1149-1154 - [c27]Baber Aslam, M. Faisal Amjad, Cliff C. Zou:
PMTR: Privacy-Enhancing Multilayer Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks. MILCOM 2013: 882-887 - [c26]Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou:
Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks. MILCOM 2013: 951-956 - 2012
- [c25]Steven Zittrower, Cliff Changchun Zou:
Encrypted phrase searching in the cloud. GLOBECOM 2012: 764-770 - [c24]Rung-Ching Chen, Wei-Lung Chang, Chia-Fen Shieh, Cliff C. Zou:
Using Hybrid Artificial Bee Colony Algorithm to Extend Wireless Sensor Network Lifetime. IBICA 2012: 156-161 - [c23]Jim Bardgett, Cliff Changchun Zou:
nSwitching: Virtual Machine aware relay hardware switching to improve intra-NIC Virtual Machine traffic. ICC 2012: 2700-2705 - [c22]Baber Aslam, M. Faisal Amjad, Cliff Changchun Zou:
Optimal roadside units placement in urban areas for vehicular networks. ISCC 2012: 423-429 - 2011
- [j9]Lei Wu, Jerome Harrington, Corey Kuwanoe, Cliff Changchun Zou:
Harnessing the power of BitTorrent for distributed denial-of-service attacks. Secur. Commun. Networks 4(8): 860-870 (2011) - [c21]Soyoung Park, Baber Aslam, Cliff C. Zou:
Long-term reputation system for vehicular networking based on vehicle's daily commute routine. CCNC 2011: 436-441 - [c20]Baber Aslam, Cliff C. Zou:
One-way-linkable blind signature security architecture for VANET. CCNC 2011: 745-750 - [c19]Baber Aslam, Cliff C. Zou:
Optimal roadside units placement along highways. CCNC 2011: 814-815 - [c18]Huy D. Truong, Christopher F. Turner, Cliff Changchun Zou:
iCAPTCHA: The Next Generation of CAPTCHA Designed to Defend against 3rd Party Human Attacks. ICC 2011: 1-6 - 2010
- [j8]Baber Aslam, Soyoung Park, Cliff Changchun Zou, Damla Turgut:
Secure traffic data propagation in Vehicular Ad Hoc Networks. Int. J. Ad Hoc Ubiquitous Comput. 6(1): 24-39 (2010) - [j7]Ping Wang, Lei Wu, Ryan Cunningham, Cliff C. Zou:
Honeypot detection in advanced botnet attacks. Int. J. Inf. Comput. Secur. 4(1): 30-51 (2010) - [j6]Ping Wang, Sherri Sparks, Cliff Changchun Zou:
An Advanced Hybrid Peer-to-Peer Botnet. IEEE Trans. Dependable Secur. Comput. 7(2): 113-127 (2010) - [c17]Peter Matthews, Cliff Changchun Zou:
Scene tagging: image-based CAPTCHA using image composition and object relationships. AsiaCCS 2010: 345-350 - [c16]Baber Aslam, Lei Wu, Cliff Changchun Zou:
PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks. NCA 2010: 198-203 - [p1]Ping Wang, Baber Aslam, Cliff Changchun Zou:
Peer-to-Peer Botnets. Handbook of Information and Communication Security 2010: 335-350
2000 – 2009
- 2009
- [c15]Sherri Sparks, Shawn Embleton, Cliff Changchun Zou:
A chipset level network backdoor: bypassing host-based firewall & IDS. AsiaCCS 2009: 125-134 - [c14]Baber Aslam, Ping Wang, Cliff Changchun Zou:
Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals. ICCCN 2009: 1-6 - [c13]Ping Wang, Lei Wu, Baber Aslam, Cliff Changchun Zou:
A Systematic Study on Peer-to-Peer Botnets. ICCCN 2009: 1-8 - 2008
- [c12]Shawn Embleton, Sherri Sparks, Cliff C. Zou:
SMM rootkits: a new breed of OS independent malware. SecureComm 2008: 11 - 2007
- [j5]Cliff Changchun Zou, Donald F. Towsley, Weibo Gong:
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. IEEE Trans. Dependable Secur. Comput. 4(2): 105-118 (2007) - [c11]Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Changchun Zou:
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting. ACSAC 2007: 477-486 - [c10]Ping Wang, Sherri Sparks, Cliff C. Zou:
An Advanced Hybrid Peer-to-Peer Botnet. HotBots 2007 - 2006
- [j4]Cliff Changchun Zou, Nick G. Duffield, Donald F. Towsley, Weibo Gong:
Adaptive Defense Against Various Network Attacks. IEEE J. Sel. Areas Commun. 24(10): 1877-1888 (2006) - [j3]Cliff Changchun Zou, Donald F. Towsley, Weibo Gong:
On the performance of Internet worm scanning strategies. Perform. Evaluation 63(7): 700-723 (2006) - [j2]Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai:
Advanced Routing Worm and Its Security Challenges. Simul. 82(1): 75-85 (2006) - [c9]Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou:
Improving software security via runtime instruction-level taint checking. ASID 2006: 18-24 - [c8]Cliff Changchun Zou, Ryan Cunningham:
Honeypot-Aware Advanced Botnet Construction and Maintenance. DSN 2006: 199-208 - [c7]David Dagon, Cliff Changchun Zou, Wenke Lee:
Modeling Botnet Propagation Using Time Zones. NDSS 2006 - 2005
- [j1]Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao:
The monitoring and early detection of internet worms. IEEE/ACM Trans. Netw. 13(5): 961-974 (2005) - [c6]Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai:
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. PADS 2005: 199-206 - [c5]Cliff C. Zou, Don Towsley, Weibo Gong:
Adaptive Defense Against Various Network Attacks. SRUTI 2005 - 2004
- [c4]Cliff Changchun Zou, Donald F. Towsley, Weibo Gong:
Email Worms Modeling and Defense. ICCCN 2004: 409-414 - 2003
- [c3]Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley:
Monitoring and early warning for internet worms. CCS 2003: 190-199 - [c2]Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
Worm propagation modeling and analysis under dynamic quarantine defense. WORM 2003: 51-60 - 2002
- [c1]Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
Code red worm propagation modeling and analysis. CCS 2002: 138-147
Coauthor Index
aka: Muhammad Faisal Amjad
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 01:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint