| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
CODASPY
|
| 2025 | — | conf |
ICSC
|
| 2025 | J | jnl |
Guarding Your Conversations: Privacy Gatekeepers for Secure Interactions with Cloud-Based AI Models.
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ICSC
|
| 2025 | — | conf |
ICECET
|
| 2024 | — | conf |
AIIoT
|
| 2024 | J | jnl |
CoRR
|
| 2024 | C | conf |
HSI
|
| 2024 | — | conf |
AISec@CCS
|
| 2024 | C | conf |
HSI
|
| 2024 | — | conf |
ICSC
|
| 2024 | — | conf |
SmartNets
|
| 2024 | — | conf |
ICAART (1)
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
IWSPA@CODASPY
|
| 2022 | — | conf |
TPS-ISA
|
| 2021 | C | conf |
PST
|
| 2021 | C | conf |
IH&MMSec
|
| 2021 | — | conf |
ICA
|
| 2021 | — | conf |
SmartNets
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | — | conf |
SmartWorld/SCALCOM/UIC/ATC/IOP/SCI
|
| 2021 | — | conf |
CHI Extended Abstracts
|
| 2020 | — | conf |
CODASPY
|
| 2019 | — | conf |
ICCDA
|
| 2019 | — | conf |
ICPHM
|
| 2019 | J | jnl |
CoRR
|
| 2019 | C | conf |
PST
|
| 2019 | J | jnl |
IEEE Trans. Biom. Behav. Identity Sci.
|
| 2018 | — | conf |
UEMCON
|
| 2018 | — | conf |
BIOSIG
|
| 2018 | — | conf |
UEMCON
|
| 2018 | — | conf |
IWSPA@CODASPY
|
| 2017 | B | conf |
IJCB
|
| 2016 | — | conf |
BTAS
|
| 2016 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2016 | — | book |
|
| 2016 | — | conf |
BTAS
|
| 2015 | — | conf |
BTAS
|
| 2015 | J | jnl |
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet.
Comput. Secur.
|
| 2015 | — | conf |
BTAS
|
| 2014 | A* | conf |
CCS
|
| 2014 | — | conf |
CVPR Workshops
|
| 2013 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2013 | J | jnl |
IT Prof.
|
| 2013 | A* | conf |
CCS
|
| 2013 | — | conf |
BTAS
|
| 2012 | — | conf |
BTAS
|
| 2011 | J | jnl |
Ann. des Télécommunications
|
| 2011 | — | conf |
MM&Sec
|
| 2010 | A* | conf |
CCS
|