| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2026 | J | jnl |
Neurocomputing
|
| 2026 | J | jnl |
Complex Intell. Syst.
|
| 2026 | J | jnl |
BUStega: A generalized coverless image steganography framework based on diffusion models and U2-Net.
Signal Process.
|
| 2026 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2026 | J | jnl |
Neural Networks
|
| 2026 | J | jnl |
Vis. Comput.
|
| 2026 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2026 | J | jnl |
Future Gener. Comput. Syst.
|
| 2026 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Eng. Appl. Artif. Intell.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
Signal Image Video Process.
|
| 2025 | J | jnl |
J. Supercomput.
|
| 2025 | J | jnl |
IEEE Trans. Circuits Syst. Video Technol.
|
| 2025 | — | conf |
KSEM (2)
|
| 2025 | J | jnl |
IEEE Trans. Consumer Electron.
|
| 2024 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2024 | J | jnl |
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption.
IEEE Internet Things J.
|
| 2024 | J | jnl |
Knowl. Based Syst.
|
| 2024 | — | conf |
CSAIDE
|
| 2024 | J | jnl |
Comput. Electr. Eng.
|
| 2023 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2023 | J | jnl |
PeerJ Comput. Sci.
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | J | jnl |
Expert Syst. Appl.
|
| 2022 | — | conf |
ICSIM
|
| 2021 | J | jnl |
Trans. Emerg. Telecommun. Technol.
|
| 2021 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEEE Signal Process. Lett.
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2020 | J | jnl |
Entropy
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Secur. Commun. Networks
|