


default search action
Weijia Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Weijia Wang 0001 — Flight Automatic Control Research Institute, Xi'an, China (and 1 more)
- Weijia Wang 0002
— University of California San Diego, Department of Electrical and Computer Engineering, CA, USA - Weijia Wang 0003
— Shandong University, School of Cyber Science and Technology, Qingdao, China (and 2 more) - Weijia Wang 0004
— Air Force Engineering University, Air Traffic Control and Navigation College, Xi'an, China - Weijia Wang 0005
— University of Electronic Science and Technology of China, School of Information and Software Engineering, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j42]Weijia Wang
, Rui Wang:
Order types of reflection orders on affine Weyl groups. Discret. Math. 349(4): 114877 (2026)
[j41]Yupeng Liu
, Weijia Wang
, Yan Wang
, Xiaojie Sun
, Tonglei Cheng
, Jun Fu
:
FiberGNN: A graph neural network framework for efficient photonic crystal fiber parameters prediction. Expert Syst. Appl. 309: 131223 (2026)
[j40]Yanhua Wang
, Yichen Liu
, Binhua Yu, Weijia Wang, Liang Zhang
, Xin Zhang
, Yang Li
:
NHPL: Neural Collapse Guided Hierarchical Prototypical Learning for Radar HRRP Open Set Recognition. IEEE Trans. Aerosp. Electron. Syst. 62: 2350-2368 (2026)
[j39]Weijia Wang
, Changsheng You
, Xiaodan Shao
, Rui Zhang
:
Two-Stage Multi-Beam Training for Multiuser Millimeter-Wave Communications. IEEE Wirel. Commun. Lett. 15: 1822-1826 (2026)- 2025
[j38]Chuntao Jiang, Xin Guan
, Junfan Zhu, Zeyu Wang, Fanbao Xie, Weijia Wang:
The future of artificial intelligence and digital development: a study of trust in social robot capabilities. J. Exp. Theor. Artif. Intell. 37(5): 783-795 (2025)
[j37]Zikang Dong, Weijia Wang
, Hao Zhang:
Large zeta sums. Period. Math. Hung. 91(2): 388-398 (2025)
[j36]Chengrui Shi, Tao Meng, Kun Wang
, Jiakun Lei, Weijia Wang
, Renhao Mao
:
Safe tracking control for free-flying space robots via control barrier functions. Robotics Auton. Syst. 184: 104865 (2025)
[j35]Shengjie Zhu
, Weijia Wang, Bo Wang
, Yang Tian, Fang Xu, Chenglong Liu
:
Oriented Object Detection via Associated Point in Optical Remote Sensing Imagery. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 18: 27258-27271 (2025)
[j34]Kun Wang
, Jianzhong Qiao
, Enmei Wang
, Jiakun Lei
, Weijia Wang
, Tao Meng
:
Safe Inspection Tracking Control for a Tumbling Target Under Full State Constraints and Limited Thrust. IEEE Trans. Aerosp. Electron. Syst. 61(3): 6822-6838 (2025)
[j33]Xuyang Wu
, Yu Mei
, Weijia Wang, Jia Liu
:
Chance-Constrained Trajectory Optimization for UAVs With Randomly Moving Obstacles. IEEE Trans. Aerosp. Electron. Syst. 61(6): 19007-19020 (2025)
[j32]Jiakun Lei
, Tao Meng
, Dongyu Li
, Kun Wang
, Weijia Wang
, Zhonghe Jin:
Switched Hybrid Control for Spacecraft Attitude Control With Flexible and Guaranteed Performance. IEEE Trans. Control. Syst. Technol. 33(2): 582-596 (2025)
[j31]Xue Zhou
, Weijia Wang
, Yaping Hui
, Xuegang Li
, Xuenan Zhang
, Xin Yan
, Tonglei Cheng
:
Real-Time Human Posture Recognition Using Embedded Optical Fiber Sensors and Machine Learning. IEEE Trans. Instrum. Meas. 74: 1-9 (2025)
[j30]Lei Gao, Jingfei Jiang, Jinwei Xu, Weijia Wang, Pengbo Wu:
SAPFIS: a parallel fuzzy inference system for air combat situation assessment. J. Supercomput. 81(1): 73 (2025)
[j29]Di Shao
, Xuequan Lu
, Weijia Wang
, Xiao Liu
, Ajmal Saeed Mian
:
TriCI: Triple Cross-Intra Branch Contrastive Learning for Point Cloud Analysis. IEEE Trans. Vis. Comput. Graph. 31(9): 5321-5333 (2025)
[c28]Xudong Gong, Dawei Feng, Kele Xu, Weijia Wang, Zhangjun Sun, Xing Zhou, Si Zheng, Bo Ding, Huaimin Wang:
VVC-Gym: A Fixed-Wing UAV Reinforcement Learning Environment for Multi-Goal Long-Horizon Problems. ICLR 2025
[c27]Simone Naldi
, Mohab Safey El Din
, Adrien Taylor
, Weijia Wang
:
Solving generic parametric linear matrix inequalities. ISSAC 2025: 267-276
[i15]Simone Naldi, Mohab Safey El Din, Adrien Taylor, Weijia Wang:
Solving generic parametric linear matrix inequalities. CoRR abs/2503.01487 (2025)
[i14]Hang Zhou, Tao Meng, Kun Wang, Chengrui Shi, Renhao Mao, Weijia Wang, Jiakun Lei:
Spacecraft Safe Robust Control Using Implicit Neural Representation for Geometrically Complex Targets in Proximity Operations. CoRR abs/2507.13672 (2025)
[i13]Weijia Wang, Yuanzhi Su, Pei-Gen Ye, Yuan-Gen Wang, Xuequan Lu:
MambaH-Fit: Rethinking Hyper-surface Fitting-based Point Cloud Normal Estimation via State Space Modelling. CoRR abs/2510.09088 (2025)
[i12]Zhuo Huang, Weijia Wang, Xiaogang Zhou, Yu Yu:
DPA-Style Attacks on HQC. IACR Cryptol. ePrint Arch. 2025: 1966 (2025)- 2024
[j28]Lin Chen, Weijia Wang, Yichuan Song, Jihong Yu, Kehao Wang, Shurong Zhang, Weihua Yang, Celimuge Wu:
Meet in the air: Distributed neighbor discovery in 3D networks with directional transceivers. Comput. Networks 241: 110201 (2024)
[j27]Weijia Wang, Xiao Liu, Hailing Zhou, Lei Wei, Zhigang Deng
, M. Manzur Murshed, Xuequan Lu:
Noise4Denoise: Leveraging noise for unsupervised point cloud denoising. Comput. Vis. Media 10(4): 659-669 (2024)
[j26]Zhongxian Bai, Lvna Yu, Lei Zhao, Weijia Wang:
Research on the construction and application of a smart library services maturity evaluation system based on CMM. Electron. Libr. 42(5): 766-794 (2024)
[j25]Wei Wang, Weijia Wang, Hao Zhang:
A structure theorem for the restricted sum of four squares. Finite Fields Their Appl. 95: 102398 (2024)
[j24]Lu Yan
, Kenta Ono, Makoto Watanabe, Weijia Wang:
Why Do People Gather? A Study on Factors Affecting Emotion and Participation in Group Chats. Informatics 11(4): 75 (2024)
[j23]Jinfu Chen
, Weijia Wang, Bo Liu, Saihua Cai
, Dave Towey
, Shengran Wang:
Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism. Inf. Softw. Technol. 171: 107453 (2024)
[j22]Jinfu Chen
, Yemin Yin, Saihua Cai, Weijia Wang, Shengran Wang, Jiming Chen:
iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks. Sci. Comput. Program. 238: 103156 (2024)
[j21]Jiakun Lei
, Tao Meng
, Kun Wang
, Weijia Wang
, Shujian Sun
:
Composite Event-Triggered Intermittent Attitude Control of Spacecraft. IEEE Trans. Aerosp. Electron. Syst. 60(2): 1612-1627 (2024)
[j20]Jiakun Lei
, Tao Meng
, Yang Zhu
, Kun Wang
, Weijia Wang
:
Adaptive Constrained Attitude Control of Spacecraft With Compatible and Guaranteed Performance. IEEE Trans. Aerosp. Electron. Syst. 60(2): 2193-2209 (2024)
[j19]Jiakun Lei
, Tao Meng
, Kun Wang
, Weijia Wang
, Shujian Sun
, Lei Wang
:
Adaptive Reduced-Attitude Control for Spacecraft Boresight Alignment With Safety Constraints and Accuracy Requirements. IEEE Trans. Aerosp. Electron. Syst. 60(4): 3936-3953 (2024)
[j18]Yu Ran
, Weijia Wang, Mingjie Li
, Lin-Cheng Li, Yuan-Gen Wang
, Jin Li
:
Cross-Shaped Adversarial Patch Attack. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2289-2303 (2024)
[j17]Yabo Liu
, Jinghua Wang
, Weijia Wang
, Yu Hu
, Yaowei Wang
, Yong Xu
:
CRADA: Cross Domain Object Detection With Cyclic Reconstruction and Decoupling Adaptation. IEEE Trans. Multim. 26: 6250-6261 (2024)
[j16]Weijia Wang, Wei Pan, Chaofan Dai, Richard Dazeley, Lei Wei
, Bernard Rolfe, Xuequan Lu
:
Segmentation-driven feature-preserving mesh denoising. Vis. Comput. 40(9): 6201-6217 (2024)
[c26]Xishuo Zhang
, Lin Liu
, Yi Wang
, Xiao Liu
, Hailong Wang
, Chetan Arora
, Haichao Liu
, Weijia Wang
, Thuong Hoang
:
Auto-Generated Personas: Enhancing User-centered Design Practices among University Students. CHI Extended Abstracts 2024: 52:1-52:7
[c25]Xudong Gong, Dawei Feng, Kele Xu, Yuanzhao Zhai, Chengkang Yao, Weijia Wang, Bo Ding, Huaimin Wang:
Iterative Regularized Policy Optimization with Imperfect Demonstrations. ICML 2024: 55547-55568- 2023
[j15]Bin He
, Weijia Wang, Xuanren Zhu, Shusheng Qian:
Integrate design structure matrix with carbon footprint for product low carbon design. Adv. Eng. Informatics 56: 102021 (2023)
[j14]Weijia Wang
, Wei Pan, Xiao Liu, Kui Su, Bernard Rolfe, Xuequan Lu
:
Random screening-based feature aggregation for point cloud denoising. Comput. Graph. 116: 64-72 (2023)
[j13]Weijia Wang, Chao Zhou
, Da Lin, Yuan-Gen Wang
:
FeConDefense: Reversing adversarial attacks via feature consistency loss. Comput. Commun. 211: 263-270 (2023)
[j12]Na Li, Yunlin Zhang
, Kun Shi, Yibo Zhang, Xiao Sun, Weijia Wang, Haiming Qian, Huayin Yang, Yongkang Niu:
Real-Time and Continuous Tracking of Total Phosphorus Using a Ground-Based Hyperspectral Proximal Sensing System. Remote. Sens. 15(2): 507 (2023)
[j11]Jiakun Lei
, Tao Meng
, Weijia Wang
, Heng Li, Zhonghe Jin:
Singularity-Avoidance Prescribed Performance Control for Spacecraft Attitude Tracking. IEEE Trans. Aerosp. Electron. Syst. 59(5): 5405-5421 (2023)
[c24]Weijia Wang, Xuequan Lu
, Di Shao
, Xiao Liu, Richard Dazeley, Antonio Robles-Kelly, Wei Pan:
Weighted Point Cloud Normal Estimation. ICME 2023: 2015-2020
[i11]Weijia Wang, Xuequan Lu, Di Shao, Xiao Liu, Richard Dazeley, Antonio Robles-Kelly, Wei Pan:
Weighted Point Cloud Normal Estimation. CoRR abs/2305.04007 (2023)
[i10]Jiakun Lei, Tao Meng, Yang Zhu, Kun Wang, Weijia Wang:
Adaptive Compatible Performance Control for Spacecraft Attitude Control under Motion Constraints with Guaranteed Accuracy. CoRR abs/2305.19627 (2023)
[i9]Jiakun Lei, Tao Meng, Kun Wang, Weijia Wang, Shujian Sun:
Composite Triggered Intermittent Control for Constrained Spacecraft Attitude Tracking. CoRR abs/2305.19644 (2023)
[i8]Jiakun Lei, Tao Meng, Kun Wang, Weijia Wang, Shujian Sun, Lei Wang:
Adaptive Reduced Attitude Control for Spacecraft Boresight Alignment under Multiple Constraints with Guaranteed Accuracy. CoRR abs/2305.19645 (2023)
[i7]Kun Wang, Tao Meng, Jiakun Lei, Weijia Wang:
Safety Guaranteed Control for Spacecraft Inspection Mission. CoRR abs/2306.05136 (2023)- 2022
[j10]Bin He
, Fuze Xu, Dong Zhang, Weijia Wang:
A Convolutional Neural Network-Based Recognition Method of Gear Performance Degradation Mode. J. Comput. Inf. Sci. Eng. 22(5) (2022)
[j9]Weijia Wang
, Ramón Escobedo
, Stéphane Sanchez
, Clément Sire
, Zhangang Han, Guy Theraulaz
:
The impact of individual perceptual and cognitive factors on collective states in a data-driven fish school model. PLoS Comput. Biol. 18(3) (2022)
[c23]Ziwen Yi
, Weijia Wang
:
Brain entrainment by audio-visual gamma frequency stimulations. ICBBS 2022: 120-123
[c22]Weijia Wang, Xuequan Lu, Dasith de Silva Edirimuni
, Xiao Liu, Antonio Robles-Kelly:
Deep Point Cloud Normal Estimation via Triplet Learning (Demonstration). ICME Workshops 2022: 1
[c21]Weijia Wang, Xuequan Lu
, Dasith de Silva Edirimuni
, Xiao Liu, Antonio Robles-Kelly:
Deep Point Cloud Normal Estimation Via Triplet Learning. ICME 2022: 1-6
[c20]Bo Liu, Jinfu Chen, Weijia Wang, Saihua Cai, Jingyi Chen, Qiaowei Feng:
An adaptive search optimization algorithm for improving the detection capability of software vulnerability. Internetware 2022: 212-220
[c19]Vincent Danos, Weijia Wang
:
Consistency of Automated Market Makers. Tokenomics 2022: 4:1-4:12
[c18]Hailan Kuang, Weijia Wang, Liang Tang, Xiaolin Ma, Xinhua Liu:
A Silkworm Counting Method With Density Map Based on Multiscale Feature Fusion. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1544-1550
[i6]Jiakun Lei, Tao Meng, Weijia Wang, Heng Li, Zhonghe Jin:
Singularity-Avoidance Prescribed Performance Attitude Tracking of Spacecraft. CoRR abs/2206.12761 (2022)
[i5]Jiakun Lei, Tao Meng, Weijia Wang, Chengjin Yin, Zhonghe Jin:
Robust Control For Spacecraft Attitude Tracking Under Multiple Physical Limitations with Guaranteed Performance. CoRR abs/2209.05755 (2022)
[i4]Jiakun Lei, Tao Meng, Weijia Wang, Shujian Sun, Heng Li, Zhonghe Jin:
Spacecraft Attitude Pointing Control under Pointing Forbidden Constraints with Guaranteed Accuracy. CoRR abs/2209.05801 (2022)
[i3]Jiakun Lei, Tao Meng, Kun Wang, Weijia Wang, Zhonghe Jin:
Event-Triggered Intermittent Prescribed Performance Control for Spacecraft Attitude Reorientation. CoRR abs/2211.05481 (2022)- 2021
[b1]Weijia Wang:
Towards Intelligent Data Acquisition Systems with Embedded Deep Learning on MPSoC. Karlsruhe Institute of Technology, Germany, 2021
[j8]Xiao Liao, Weijia Wang, Wei Wang, Chong Liang:
Research on Multidimensional Image Intelligent Matching Algorithm of Artificial Intelligence Image Recognition Technology. Mob. Inf. Syst. 2021: 6987170:1-6987170:10 (2021)
[c17]Jin-Fu Chen, Bo Liu, Saihua Cai, Weijia Wang, Shengran Wang:
AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism. SETTA 2021: 161-177
[i2]Weijia Wang, Xuequan Lu, Dasith de Silva Edirimuni, Xiao Liu, Antonio Robles-Kelly:
Deep Point Cloud Normal Estimation via Triplet Learning. CoRR abs/2110.10494 (2021)- 2020
[j7]Kun Wang, Wen Wang
, Weijia Wang, Xiaoqun Jiang, Tao Yu, Pubu Ciren:
Spatial Assessment of Health Economic Losses from Exposure to Ambient Pollutants in China. Remote. Sens. 12(5): 790 (2020)
[c16]Weijia Wang, Steven Baker
, Andrew Irlitti
:
Exploring the Effects of User Control on Social Engagement in Virtual Reality. OZCHI 2020: 253-262
[c15]Weijia Wang, Chong Yan Chua, Tilman Dingler
:
Streamlining the Prosthesis Fabrication Process Using 3D Technologies. PervasiveHealth 2020: 402-405
2010 – 2019
- 2019
[j6]Weijia Wang
:
Twisted Weak Orders of Coxeter Groups. Order 36(3): 511-523 (2019)- 2017
[c14]Xiaofeng Qiu, Fangyuan Cheng, Weijia Wang, Gang Zhang, Yangjun Qiu:
A security controller-based software defined security architecture. ICIN 2017: 191-195
[i1]Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang:
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication. IACR Cryptol. ePrint Arch. 2017: 1100 (2017)- 2016
[c13]Weijia Wang, Xiaofeng Qiu, Li Sun, Rui Zhao:
A data driven orchestration framework in software defined security. IC-NIDC 2016: 34-39- 2015
[c12]Zheng-Hao Chong, Robert T. W. Hung, Kit-Hang Lee, Weijia Wang, Tony W. L. Ng, Wyatt S. Newman
:
Autonomous wall cutting with an Atlas humanoid robot. TePRA 2015: 1-6- 2014
[j5]Weijia Wang, Lei Hu:
A generic homomorphic MAC construction for authentication in network coding. Secur. Commun. Networks 7(2): 429-433 (2014)
[j4]Weijia Wang, Lei Hu:
A Secure and Efficient Handover Authentication Protocol for Wireless Networks. Sensors 14(7): 11379-11394 (2014)
[c11]Wyatt S. Newman
, Zheng-Hao Chong, Cong Du, Robert T. W. Hung, Kit-Hang Lee, Li Ma, Tony W. L. Ng, Christopher E. Swetenham, Kenneth K. S. Tjoeng, Weijia Wang:
Autonomous valve turning with an Atlas humanoid robot. Humanoids 2014: 493-499
[c10]Wyatt S. Newman, Zheng-Hao Chong, Cong Du, Robert T. W. Hung, Kit-Hang Lee, Li Ma, Tony W. L. Ng, Christopher E. Swetenham, Kenneth K. S. Tjoeng, Weijia Wang:
Autonomous valve turning with an Atlas humanoid robot. Humanoids 2014: 748- 2013
[j3]Weijia Wang, Robert D. Plante, Jen Tang:
Minimum cost allocation of quality improvement targets under supplier process disruption. Eur. J. Oper. Res. 228(2): 388-396 (2013)
[c9]Weijia Wang, Jie Hu:
A New Evolutionary Algorithm for Portfolio Optimization and Its Application. CIS 2013: 80-84
[c8]Weijia Wang, Lei Hu, Yong Li:
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting. NSS 2013: 507-520- 2012
[c7]Lei Hou, Hanling Li, Ming Zhang, Weijia Wang, Dezhi Lin, Lin Qiu:
Dual-Scaled Method for the Rheology of Non-newtonian Boundary Layer and Its High Performance FEM. ICICA (LNCS) 2012: 284-290- 2010
[j2]Weijia Wang, Lei Hu, Yong Li
:
Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks. IEEE Commun. Lett. 14(8): 782-784 (2010)
[c6]Weijia Wang, Lei Hu, Yong Li:
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols. Inscrypt 2010: 218-235
2000 – 2009
- 2007
[c5]Weijia Wang, Lei Hu, Yong Li:
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. Inscrypt 2007: 93-107
[c4]Weijia Wang, Yong Li
, Lei Hu, Li Lu:
Storage-Awareness: RFID Private Authentication based on Sparse Tree. SECPerU 2007: 61-66
[c3]Fen Liu, Lei Hu, Li Lu, Weijia Wang:
Privacy-preserving authentication with low computational overhead for RFID systems. SecureComm 2007: 127-132- 2006
[c2]Weijia Wang, Lei Hu:
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. INDOCRYPT 2006: 118-132
1990 – 1999
- 1993
[j1]Weijia Wang, Fouad A. Tobagi:
The Christmas-Tree Switch: An Output Queuing Space-Division Fast Packet Switch Based on Inerleaving Distribution and Concentration Functions. Comput. Networks ISDN Syst. 25(6): 631-644 (1993)- 1991
[c1]Weijia Wang, Fouad A. Tobagi:
The Christmas-Tree Switch: An Output Queueing Space-Division Fast Packet Switch Based on Interleaving Distribution and Concentration Functions. INFOCOM 1991: 163-170
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-17 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







