Secure Combination of Untrusted Time information Based on Optimized Dempster-Shafer Theory Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2406.15501
Secure precision time synchronization is important for applications of Cyber-Physical Systems. However, several attacks, especially the Time Delay Attack (TDA), deteriorates the performance of time synchronization system seriously. Multiple paths scheme is thought as an effective security countermeasure to decrease the influence of TDA. However, the effective secure combination algorithm is still missed for precision time synchronization. In this paper, a secure combination algorithm based on Dempster-Shafer theory is proposed for multiple paths method. Special optimizations are done for the combination algorithm to solve the potential problems due to untrusted evidence. Theoretical simulation shows that the proposed algorithm works much better than Fault Tolerant Algorithm (FTA) and the attack detection method based on single path. And experimental demonstration proves the feasibility and superiority of the proposed algorithm, where the time stability with 27.97 ps, 1.57 ps, and 1.12 ps at average time 1s, 10s, 100s is achieved under TDA and local clock jump. The proposed algorithm can be used to improve the security and resilience of many importance synchronization protocol, such as NTP, PTP, and TWFTT.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2406.15501
- https://arxiv.org/pdf/2406.15501
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4400025293
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4400025293Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2406.15501Digital Object Identifier
- Title
-
Secure Combination of Untrusted Time information Based on Optimized Dempster-Shafer TheoryWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-06-19Full publication date if available
- Authors
-
Yang Li, Yujie Luo, Yichen Zhang, Ao Sun, Wei Huang, Shuai Zhang, Tao Zhang, Chuang Zhou, Li Ma, Jie Yang, Mei Wu, Heng Wang, Yan Pan, Yun Shao, Xing Chen, Ziyang Chen, Yu Song, Hong Guo, Bingjie XuList of authors in order
- Landing page
-
https://arxiv.org/abs/2406.15501Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2406.15501Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2406.15501Direct OA link when available
- Concepts
-
Dempster–Shafer theory, Computer science, Artificial intelligence, Computer security, Algorithm, Data miningTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4400025293 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2406.15501 |
| ids.doi | https://doi.org/10.48550/arxiv.2406.15501 |
| ids.openalex | https://openalex.org/W4400025293 |
| fwci | |
| type | preprint |
| title | Secure Combination of Untrusted Time information Based on Optimized Dempster-Shafer Theory |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9063000082969666 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C178011137 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9292205572128296 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q285997 |
| concepts[0].display_name | Dempster–Shafer theory |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6416274309158325 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C154945302 |
| concepts[2].level | 1 |
| concepts[2].score | 0.4678047001361847 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[2].display_name | Artificial intelligence |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.3817283511161804 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C11413529 |
| concepts[4].level | 1 |
| concepts[4].score | 0.37506672739982605 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[4].display_name | Algorithm |
| concepts[5].id | https://openalex.org/C124101348 |
| concepts[5].level | 1 |
| concepts[5].score | 0.33702003955841064 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[5].display_name | Data mining |
| keywords[0].id | https://openalex.org/keywords/dempster–shafer-theory |
| keywords[0].score | 0.9292205572128296 |
| keywords[0].display_name | Dempster–Shafer theory |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6416274309158325 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[2].score | 0.4678047001361847 |
| keywords[2].display_name | Artificial intelligence |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.3817283511161804 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/algorithm |
| keywords[4].score | 0.37506672739982605 |
| keywords[4].display_name | Algorithm |
| keywords[5].id | https://openalex.org/keywords/data-mining |
| keywords[5].score | 0.33702003955841064 |
| keywords[5].display_name | Data mining |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2406.15501 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2406.15501 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2406.15501 |
| locations[1].id | doi:10.48550/arxiv.2406.15501 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2406.15501 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5100447990 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-1682-0284 |
| authorships[0].author.display_name | Yang Li |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Li, Yang |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5101831823 |
| authorships[1].author.orcid | https://orcid.org/0009-0001-5477-2052 |
| authorships[1].author.display_name | Yujie Luo |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Luo, Yujie |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5100341417 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6162-4066 |
| authorships[2].author.display_name | Yichen Zhang |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Zhang, Yichen |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5100618741 |
| authorships[3].author.orcid | https://orcid.org/0009-0007-5369-624X |
| authorships[3].author.display_name | Ao Sun |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Sun, Ao |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5089610628 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-4051-436X |
| authorships[4].author.display_name | Wei Huang |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Huang, Wei |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5063048209 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-6074-8921 |
| authorships[5].author.display_name | Shuai Zhang |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Zhang, Shuai |
| authorships[5].is_corresponding | False |
| authorships[6].author.id | https://openalex.org/A5100596567 |
| authorships[6].author.orcid | https://orcid.org/0009-0006-7058-9131 |
| authorships[6].author.display_name | Tao Zhang |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Zhang, Tao |
| authorships[6].is_corresponding | False |
| authorships[7].author.id | https://openalex.org/A5102267319 |
| authorships[7].author.orcid | https://orcid.org/0009-0004-0351-6739 |
| authorships[7].author.display_name | Chuang Zhou |
| authorships[7].author_position | middle |
| authorships[7].raw_author_name | Zhou, Chuang |
| authorships[7].is_corresponding | False |
| authorships[8].author.id | https://openalex.org/A5100462130 |
| authorships[8].author.orcid | https://orcid.org/0000-0002-5353-3543 |
| authorships[8].author.display_name | Li Ma |
| authorships[8].author_position | middle |
| authorships[8].raw_author_name | Ma, Li |
| authorships[8].is_corresponding | False |
| authorships[9].author.id | https://openalex.org/A5003783204 |
| authorships[9].author.orcid | https://orcid.org/0000-0003-4383-4745 |
| authorships[9].author.display_name | Jie Yang |
| authorships[9].author_position | middle |
| authorships[9].raw_author_name | Yang, Jie |
| authorships[9].is_corresponding | False |
| authorships[10].author.id | https://openalex.org/A5112146377 |
| authorships[10].author.orcid | |
| authorships[10].author.display_name | Mei Wu |
| authorships[10].author_position | middle |
| authorships[10].raw_author_name | Wu, Mei |
| authorships[10].is_corresponding | False |
| authorships[11].author.id | https://openalex.org/A5075270984 |
| authorships[11].author.orcid | https://orcid.org/0000-0002-1928-3069 |
| authorships[11].author.display_name | Heng Wang |
| authorships[11].author_position | middle |
| authorships[11].raw_author_name | Wang, Heng |
| authorships[11].is_corresponding | False |
| authorships[12].author.id | https://openalex.org/A5101315787 |
| authorships[12].author.orcid | |
| authorships[12].author.display_name | Yan Pan |
| authorships[12].author_position | middle |
| authorships[12].raw_author_name | Pan, Yan |
| authorships[12].is_corresponding | False |
| authorships[13].author.id | https://openalex.org/A5102872449 |
| authorships[13].author.orcid | |
| authorships[13].author.display_name | Yun Shao |
| authorships[13].author_position | middle |
| authorships[13].raw_author_name | Shao, Yun |
| authorships[13].is_corresponding | False |
| authorships[14].author.id | https://openalex.org/A5100533248 |
| authorships[14].author.orcid | https://orcid.org/0009-0007-3479-1962 |
| authorships[14].author.display_name | Xing Chen |
| authorships[14].author_position | middle |
| authorships[14].raw_author_name | Chen, Xing |
| authorships[14].is_corresponding | False |
| authorships[15].author.id | https://openalex.org/A5100324486 |
| authorships[15].author.orcid | https://orcid.org/0000-0002-8343-8029 |
| authorships[15].author.display_name | Ziyang Chen |
| authorships[15].author_position | middle |
| authorships[15].raw_author_name | Chen, Ziyang |
| authorships[15].is_corresponding | False |
| authorships[16].author.id | https://openalex.org/A5101508126 |
| authorships[16].author.orcid | https://orcid.org/0000-0002-9578-5458 |
| authorships[16].author.display_name | Yu Song |
| authorships[16].author_position | middle |
| authorships[16].raw_author_name | Yu, Song |
| authorships[16].is_corresponding | False |
| authorships[17].author.id | https://openalex.org/A5101800603 |
| authorships[17].author.orcid | https://orcid.org/0000-0002-4856-7749 |
| authorships[17].author.display_name | Hong Guo |
| authorships[17].author_position | middle |
| authorships[17].raw_author_name | Guo, Hong |
| authorships[17].is_corresponding | False |
| authorships[18].author.id | https://openalex.org/A5101480784 |
| authorships[18].author.orcid | https://orcid.org/0000-0002-3402-3249 |
| authorships[18].author.display_name | Bingjie Xu |
| authorships[18].author_position | last |
| authorships[18].raw_author_name | Xu, Bingjie |
| authorships[18].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2406.15501 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2024-06-26T00:00:00 |
| display_name | Secure Combination of Untrusted Time information Based on Optimized Dempster-Shafer Theory |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9063000082969666 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W1494981048, https://openalex.org/W4294619279, https://openalex.org/W2953038261, https://openalex.org/W2375966783, https://openalex.org/W4385609800, https://openalex.org/W1979977179, https://openalex.org/W2051487156, https://openalex.org/W4231117045, https://openalex.org/W2468494178, https://openalex.org/W2112550647 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2406.15501 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2406.15501 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2406.15501 |
| primary_location.id | pmh:oai:arXiv.org:2406.15501 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2406.15501 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2406.15501 |
| publication_date | 2024-06-19 |
| publication_year | 2024 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 60 |
| abstract_inverted_index.In | 57 |
| abstract_inverted_index.an | 34 |
| abstract_inverted_index.as | 33, 171 |
| abstract_inverted_index.at | 139 |
| abstract_inverted_index.be | 157 |
| abstract_inverted_index.is | 4, 31, 50, 68, 145 |
| abstract_inverted_index.of | 8, 23, 42, 123, 165 |
| abstract_inverted_index.on | 65, 112 |
| abstract_inverted_index.ps | 138 |
| abstract_inverted_index.to | 38, 82, 88, 159 |
| abstract_inverted_index.1s, | 142 |
| abstract_inverted_index.And | 115 |
| abstract_inverted_index.TDA | 148 |
| abstract_inverted_index.The | 153 |
| abstract_inverted_index.and | 106, 121, 136, 149, 163, 174 |
| abstract_inverted_index.are | 76 |
| abstract_inverted_index.can | 156 |
| abstract_inverted_index.due | 87 |
| abstract_inverted_index.for | 6, 53, 70, 78 |
| abstract_inverted_index.ps, | 133, 135 |
| abstract_inverted_index.the | 15, 21, 40, 45, 79, 84, 95, 107, 119, 124, 128, 161 |
| abstract_inverted_index.1.12 | 137 |
| abstract_inverted_index.1.57 | 134 |
| abstract_inverted_index.100s | 144 |
| abstract_inverted_index.10s, | 143 |
| abstract_inverted_index.NTP, | 172 |
| abstract_inverted_index.PTP, | 173 |
| abstract_inverted_index.TDA. | 43 |
| abstract_inverted_index.Time | 16 |
| abstract_inverted_index.done | 77 |
| abstract_inverted_index.many | 166 |
| abstract_inverted_index.much | 99 |
| abstract_inverted_index.such | 170 |
| abstract_inverted_index.than | 101 |
| abstract_inverted_index.that | 94 |
| abstract_inverted_index.this | 58 |
| abstract_inverted_index.time | 2, 24, 55, 129, 141 |
| abstract_inverted_index.used | 158 |
| abstract_inverted_index.with | 131 |
| abstract_inverted_index.(FTA) | 105 |
| abstract_inverted_index.27.97 | 132 |
| abstract_inverted_index.Delay | 17 |
| abstract_inverted_index.Fault | 102 |
| abstract_inverted_index.based | 64, 111 |
| abstract_inverted_index.clock | 151 |
| abstract_inverted_index.jump. | 152 |
| abstract_inverted_index.local | 150 |
| abstract_inverted_index.path. | 114 |
| abstract_inverted_index.paths | 29, 72 |
| abstract_inverted_index.shows | 93 |
| abstract_inverted_index.solve | 83 |
| abstract_inverted_index.still | 51 |
| abstract_inverted_index.under | 147 |
| abstract_inverted_index.where | 127 |
| abstract_inverted_index.works | 98 |
| abstract_inverted_index.(TDA), | 19 |
| abstract_inverted_index.Attack | 18 |
| abstract_inverted_index.Secure | 0 |
| abstract_inverted_index.TWFTT. | 175 |
| abstract_inverted_index.attack | 108 |
| abstract_inverted_index.better | 100 |
| abstract_inverted_index.method | 110 |
| abstract_inverted_index.missed | 52 |
| abstract_inverted_index.paper, | 59 |
| abstract_inverted_index.proves | 118 |
| abstract_inverted_index.scheme | 30 |
| abstract_inverted_index.secure | 47, 61 |
| abstract_inverted_index.single | 113 |
| abstract_inverted_index.system | 26 |
| abstract_inverted_index.theory | 67 |
| abstract_inverted_index.Special | 74 |
| abstract_inverted_index.average | 140 |
| abstract_inverted_index.improve | 160 |
| abstract_inverted_index.method. | 73 |
| abstract_inverted_index.several | 12 |
| abstract_inverted_index.thought | 32 |
| abstract_inverted_index.However, | 11, 44 |
| abstract_inverted_index.Multiple | 28 |
| abstract_inverted_index.Systems. | 10 |
| abstract_inverted_index.Tolerant | 103 |
| abstract_inverted_index.achieved | 146 |
| abstract_inverted_index.attacks, | 13 |
| abstract_inverted_index.decrease | 39 |
| abstract_inverted_index.multiple | 71 |
| abstract_inverted_index.problems | 86 |
| abstract_inverted_index.proposed | 69, 96, 125, 154 |
| abstract_inverted_index.security | 36, 162 |
| abstract_inverted_index.Algorithm | 104 |
| abstract_inverted_index.algorithm | 49, 63, 81, 97, 155 |
| abstract_inverted_index.detection | 109 |
| abstract_inverted_index.effective | 35, 46 |
| abstract_inverted_index.evidence. | 90 |
| abstract_inverted_index.important | 5 |
| abstract_inverted_index.influence | 41 |
| abstract_inverted_index.potential | 85 |
| abstract_inverted_index.precision | 1, 54 |
| abstract_inverted_index.protocol, | 169 |
| abstract_inverted_index.stability | 130 |
| abstract_inverted_index.untrusted | 89 |
| abstract_inverted_index.algorithm, | 126 |
| abstract_inverted_index.especially | 14 |
| abstract_inverted_index.importance | 167 |
| abstract_inverted_index.resilience | 164 |
| abstract_inverted_index.seriously. | 27 |
| abstract_inverted_index.simulation | 92 |
| abstract_inverted_index.Theoretical | 91 |
| abstract_inverted_index.combination | 48, 62, 80 |
| abstract_inverted_index.feasibility | 120 |
| abstract_inverted_index.performance | 22 |
| abstract_inverted_index.superiority | 122 |
| abstract_inverted_index.applications | 7 |
| abstract_inverted_index.deteriorates | 20 |
| abstract_inverted_index.experimental | 116 |
| abstract_inverted_index.demonstration | 117 |
| abstract_inverted_index.optimizations | 75 |
| abstract_inverted_index.Cyber-Physical | 9 |
| abstract_inverted_index.countermeasure | 37 |
| abstract_inverted_index.Dempster-Shafer | 66 |
| abstract_inverted_index.synchronization | 3, 25, 168 |
| abstract_inverted_index.synchronization. | 56 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 19 |
| citation_normalized_percentile |