| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Cybersecur.
|
| 2026 | J | jnl |
Inf. Sci.
|
| 2026 | J | jnl |
Cybersecur.
|
| 2025 | J | jnl |
IET Image Process.
|
| 2025 | J | jnl |
J. Vis. Commun. Image Represent.
|
| 2025 | J | jnl |
J. Netw. Comput. Appl.
|
| 2025 | B | conf |
ICPADS
|
| 2025 | J | jnl |
J. Electronic Imaging
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
J. Netw. Comput. Appl.
|
| 2025 | J | jnl |
Circuits Syst. Signal Process.
|
| 2025 | J | jnl |
The DUDFTO Attack: Towards Down-to-UP Timeout Probing and Dynamically Flow Table Overflowing in SDN.
IEEE Trans. Netw. Serv. Manag.
|
| 2025 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2024 | J | jnl |
Pattern Recognit.
|
| 2024 | C | conf |
ISPA
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
Comput. Networks
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
J. Netw. Comput. Appl.
|
| 2022 | J | jnl |
Comput. Networks
|
| 2021 | J | jnl |
Appl. Intell.
|
| 2021 | J | jnl |
J. Inf. Secur. Appl.
|
| 2021 | J | jnl |
Secur. Commun. Networks
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2021 | J | jnl |
J. Netw. Comput. Appl.
|
| 2020 | — | conf |
HPCC/DSS/SmartCity
|
| 2019 | — | conf |
APWeb/WAIM (2)
|
| 2019 | J | jnl |
IEEE Access
|
| 2017 | J | jnl |
Pattern Recognit.
|
| 2017 | J | jnl |
计算机科学
|
| 2016 | J | jnl |
Neurocomputing
|
| 2016 | — | conf |
CCIS
|
| 2014 | J | jnl |
Appl. Intell.
|
| 2013 | J | jnl |
Comput. Secur.
|