| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2026 | J | jnl |
Future Gener. Comput. Syst.
|
| 2026 | J | jnl |
Knowl. Based Syst.
|
| 2026 | J | jnl |
Expert Syst. Appl.
|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2026 | J | jnl |
IEEE Trans. Netw. Sci. Eng.
|
| 2026 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | — | conf |
WASA (1)
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Frontiers Comput. Sci.
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
IEEE Trans. Reliab.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2025 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
SIGIR
|
| 2025 | J | jnl |
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | — | conf |
KDD (2)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
Proc. ACM Softw. Eng.
|
| 2025 | A | conf |
ICWS
|
| 2025 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
ICSE
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | A* | conf |
ASE
|
| 2024 | J | jnl |
CoRR
|
| 2024 | B | conf |
TrustCom
|
| 2024 | J | jnl |
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems.
CoRR
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2020 | J | jnl |
IEEE Internet Things J.
|
| 2020 | A* | conf |
USENIX Security Symposium
|
| 2019 | — | conf |
ICC
|