| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | — | conf |
HICSS
|
| 2026 | J | jnl |
IEEE Internet Things J.
|
| 2026 | — | conf |
HICSS
|
| 2025 | B | conf |
IWCMC
|
| 2025 | — | conf |
ARES (2)
|
| 2025 | J | jnl |
Inf. Syst. Frontiers
|
| 2025 | — | conf |
IWSPA@CODASPY
|
| 2025 | — | conf |
ASONAM (1)
|
| 2025 | — | conf |
ICAART (2)
|
| 2025 | — | conf |
eScience
|
| 2025 | B | conf |
ICPP
|
| 2024 | J | jnl |
Clust. Comput.
|
| 2024 | — | conf |
AMCIS
|
| 2024 | B | conf |
TrustCom
|
| 2024 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2024 | — | conf |
CogMI
|
| 2024 | — | conf |
SIGMIS-CPR
|
| 2024 | — | conf |
ICC
|
| 2024 | J | jnl |
CoRR
|
| 2023 | B | conf |
NOMS
|
| 2023 | J | jnl |
DTRAP
|
| 2023 | C | conf |
ISI
|
| 2023 | J | jnl |
J. Comput. Soc. Sci.
|
| 2023 | — | conf |
WWW (Companion Volume)
|
| 2023 | B | conf |
Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks.
COMPSAC
|
| 2023 | — | conf |
AMCIS
|
| 2022 | — | conf |
AMCIS
|
| 2022 | — | conf |
IDSTA
|
| 2022 | Misc | conf |
CSR
|
| 2022 | C | conf |
BDCAT
|
| 2021 | J | jnl |
DTRAP
|
| 2021 | J | jnl |
Int. J. Inf. Comput. Secur.
|
| 2021 | C | conf |
ISI
|
| 2021 | — | conf |
ISPA/BDCloud/SocialCom/SustainCom
|
| 2021 | — | conf |
ISPA/BDCloud/SocialCom/SustainCom
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
J. Inf. Secur. Appl.
|
| 2020 | J | jnl |
IEEE Trans. Comput. Soc. Syst.
|
| 2020 | — | conf |
Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks.
IWSPA@CODASPY
|
| 2019 | J | jnl |
Int. J. Inf. Technol. Web Eng.
|
| 2019 | — | conf |
OTM Workshops
|
| 2018 | J | jnl |
Inf. Syst. Frontiers
|
| 2017 | J | jnl |
Knowl. Inf. Syst.
|
| 2017 | J | jnl |
J. Netw. Comput. Appl.
|
| 2017 | B | conf |
IM
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2016 | Misc | conf |
SAC
|
| 2016 | — | conf |
OTM Conferences
|
| 2015 | C | conf |
ISI
|
| 2014 | — | conf |
Context Infusion in Semantic Link Networks to Detect Cyber-attacks: A Flow-Based Detection Approach.
ICSC
|
| 2014 | J | jnl |
Int. J. Inf. Comput. Secur.
|
| 2014 | — | conf |
KMO
|
| 2013 | — | conf |
SERE
|
| 2012 | — | conf |
CyberSecurity
|
| 2012 | — | conf |
KMO
|