| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Robust and Efficient Tool Orchestration via Layered Execution Structures with Reflective Correction.
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Neurocomputing
|
| 2025 | A* | conf |
CCS
|
| 2025 | A | conf |
ACSAC
|
| 2025 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
Int. J. Circuit Theory Appl.
|
| 2024 | — | conf |
ESORICS (3)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A | conf |
ACSAC
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Ind. Electron.
|
| 2024 | A | conf |
ICPC
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2024 | A* | ed. |
CCS
|
| 2024 | — | conf |
ESORICS (1)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A | conf |
ECAI
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
J. Imaging
|
| 2023 | — | conf |
IoTDI
|
| 2023 | A* | conf |
CCS
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | A* | conf |
NDSS
|
| 2022 | C | conf |
IECON
|
| 2022 | C | conf |
SecureComm
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
J. Imaging
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
ESORICS (3)
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
EMNLP (Findings)
|
| 2022 | — | conf |
ESORICS (2)
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | C | ed. |
CRiSIS
|
| 2022 | J | jnl |
Pattern Recognit.
|
| 2021 | — | ed. |
ACNS Workshops
|
| 2021 | — | conf |
ESORICS (1)
|
| 2021 | Misc | conf |
SenSys
|
| 2021 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A | conf |
ACSAC
|
| 2021 | J | jnl |
CoRR
|
| 2021 | B | conf |
TrustCom
|
| 2020 | — | ed. |
ACNS Workshops
|
| 2020 | — | conf |
ESORICS (1)
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A* | conf |
CCS
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A | conf |
ACSAC
|
| 2020 | — | conf |
ACM Great Lakes Symposium on VLSI
|
| 2020 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2020 | — | conf |
ComComAP
|
| 2020 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2020 | — | conf |
HotSoS
|
| 2020 | A* | conf |
USENIX Security Symposium
|
| 2019 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2019 | Misc | conf |
SEC
|
| 2019 | — | conf |
TTO
|
| 2019 | J | jnl |
ACM J. Data Inf. Qual.
|
| 2019 | A | conf |
ACSAC
|
| 2019 | J | jnl |
IEEE Trans. Ind. Electron.
|
| 2019 | A | conf |
DATE
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A* | conf |
CCS
|
| 2019 | — | conf |
WiSec
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A | conf |
ACSAC
|
| 2019 | C | conf |
ICICS
|
| 2019 | — | conf |
ASIST
|
| 2019 | J | jnl |
IEEE Internet Things J.
|
| 2019 | J | jnl |
J. Comput. Secur.
|
| 2019 | J | jnl |
IEEE Trans. Ind. Electron.
|
| 2019 | — | conf |
ComComAP
|
| 2018 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2018 | A | conf |
RAID
|
| 2018 | — | conf |
SecureComm (1)
|
| 2018 | — | conf |
ESORICS (1)
|
| 2018 | A | conf |
ACSAC
|
| 2018 | J | jnl |
CoRR
|
| 2018 | C | conf |
SACMAT
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
ISPA/IUCC/BDCloud/SocialCom/SustainCom
|
| 2018 | A* | conf |
AAAI
|
| 2018 | J | jnl |
CoRR
|
| 2018 | C | conf |
IPCCC
|
| 2017 | C | ed. |
ICMLA
|
| 2017 | C | conf |
SecureComm
|
| 2017 | — | conf |
ICSC
|
| 2017 | J | jnl |
Int. J. Semantic Comput.
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
IEEE Internet Things J.
|
| 2017 | A | conf |
ICCAD
|
| 2017 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2017 | B | conf |
IJCNN
|
| 2017 | A | conf |
ACSAC
|
| 2017 | — | conf |
SCAV@CPSWeek
|
| 2016 | A | conf |
ICME
|
| 2016 | J | jnl |
IEEE Secur. Priv.
|
| 2016 | B | conf |
ICTAI
|
| 2015 | — | conf |
CLEF (Working Notes)
|
| 2015 | — | conf |
ICCPS
|
| 2015 | B | conf |
DBSec
|
| 2015 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2015 | — | conf |
ICHI
|
| 2015 | A* | conf |
CCS
|
| 2015 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2014 | A | conf |
CIKM
|
| 2014 | — | conf |
IEEE BigData
|
| 2014 | A* | conf |
NDSS
|
| 2014 | J | jnl |
BMC Medical Informatics Decis. Mak.
|
| 2014 | B | conf |
ICIP
|
| 2014 | — | conf |
TRECVID
|
| 2013 | — | conf |
ICIRA (2)
|
| 2013 | — | conf |
IEEE BigData
|
| 2013 | — | conf |
IEEE BigData
|
| 2013 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | J | jnl |
EURASIP J. Wirel. Commun. Netw.
|
| 2013 | C | conf |
SACMAT
|
| 2013 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2012 | B | conf |
SRDS
|
| 2012 | — | conf |
JCDL
|
| 2012 | — | conf |
BIBM Workshops
|
| 2012 | — | conf |
ICMLA (1)
|
| 2012 | — | conf |
HISB
|
| 2012 | J | jnl |
Electron. Libr.
|
| 2012 | A | conf |
CIKM
|
| 2012 | — | conf |
SmartGridComm
|
| 2012 | — | conf |
CODASPY
|
| 2012 | — | conf |
CODASPY
|
| 2011 | — | conf |
HISB
|
| 2011 | A | conf |
CIKM
|
| 2011 | — | conf |
HISB
|
| 2011 | B | conf |
SSDBM
|
| 2011 | J | jnl |
VLDB J.
|
| 2011 | J | jnl |
Int. J. Secur. Networks
|
| 2011 | — | conf |
HICSS
|
| 2010 | A* | conf |
INFOCOM
|
| 2010 | A* | conf |
ACM Multimedia
|
| 2009 | A* | conf |
ICDE
|
| 2008 | C | conf |
CollaborateCom
|
| 2007 | A* | conf |
CCS
|
| 2007 | A | conf |
ESORICS
|
| 2007 | B | conf |
DASFAA
|
| 2006 | — | conf |
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
SUTC (1)
|
| 2005 | J | jnl |
Inf. Process. Manag.
|
| 2005 | — | conf |
XIME-P
|
| 2005 | J | jnl |
Expert Syst. Appl.
|
| 2005 | J | jnl |
Expert Syst. Appl.
|
| 2004 | — | conf |
Secure Data Management
|
| 2004 | Misc | conf |
ICIG
|
| 2004 | A | conf |
CIKM
|
| 2003 | — | conf |
ICIP (1)
|
| 2002 | — | conf |
ICME (1)
|