| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2016 | — | book |
|
| 2014 | J | jnl |
Trans. Data Hiding Multim. Secur.
|
| 2014 | J | jnl |
Trans. Data Hiding Multim. Secur.
|
| 2014 | C | conf |
IWDW
|
| 2014 | J | jnl |
Signal Process.
|
| 2013 | — | conf |
ICITS
|
| 2013 | — | conf |
IIH-MSP
|
| 2013 | C | conf |
ISC
|
| 2013 | C | conf |
ICICS
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
J. Syst. Softw.
|
| 2012 | C | conf |
IWDW
|
| 2012 | J | jnl |
J. Vis. Commun. Image Represent.
|
| 2012 | C | conf |
ISPEC
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | Misc | conf |
Inscrypt
|
| 2011 | J | jnl |
IET Inf. Secur.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | C | conf |
IWDW
|
| 2011 | Misc | conf |
Inscrypt
|
| 2011 | J | jnl |
IET Inf. Secur.
|
| 2010 | J | jnl |
Inf. Process. Lett.
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | J | jnl |
Comput. J.
|
| 2010 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2009 | J | jnl |
Des. Codes Cryptogr.
|
| 2008 | J | jnl |
IET Commun.
|
| 2008 | J | jnl |
IET Inf. Secur.
|
| 2008 | J | jnl |
J. Commun. Networks
|