| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | — | conf |
CCNC
|
| 2025 | — | conf |
MILCOM
|
| 2025 | — | conf |
MILCOM
|
| 2024 | — | conf |
SIGCSE (1)
|
| 2024 | J | jnl |
IEEE Trans. Artif. Intell.
|
| 2024 | — | conf |
CogMI
|
| 2024 | — | conf |
UEMCON
|
| 2024 | — | conf |
TPS-ISA
|
| 2024 | — | conf |
CCWC
|
| 2023 | — | conf |
SSCI
|
| 2023 | — | conf |
CAI
|
| 2023 | J | jnl |
Complex Intell. Syst.
|
| 2023 | — | conf |
ITSC
|
| 2022 | — | conf |
DSN Workshops
|
| 2022 | J | jnl |
IT Prof.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Artif. Intell.
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
SN Comput. Sci.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
NCS
|
| 2021 | B | conf |
IJCNN
|
| 2021 | J | jnl |
CoRR
|
| 2020 | — | conf |
SSCI
|
| 2020 | — | conf |
UEMCON
|
| 2020 | B | conf |
COMPSAC
|
| 2020 | — | conf |
SSCI
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
FICTA (1)
|
| 2020 | — | conf |
CCWC
|
| 2020 | J | jnl |
J. Medical Syst.
|
| 2020 | J | jnl |
IET Biom.
|
| 2019 | — | conf |
BTAS
|
| 2019 | J | jnl |
J. Bank. Financial Technol.
|
| 2019 | J | jnl |
Int. J. Inf. Sec.
|
| 2019 | J | jnl |
IEEE Trans. Big Data
|
| 2019 | B | conf |
ICIP
|
| 2019 | — | conf |
SSCI
|
| 2018 | — | conf |
SSCI
|
| 2018 | J | jnl |
Soft Comput.
|
| 2018 | — | conf |
BigData Congress
|
| 2018 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2018 | J | jnl |
Inf. Sci.
|
| 2018 | — | conf |
CSoNet
|
| 2018 | — | conf |
WEA (1)
|
| 2017 | Misc | conf |
ICISS
|
| 2017 | — | conf |
SSCI
|
| 2016 | J | jnl |
IEEE Access
|
| 2016 | — | conf |
CISRC
|
| 2016 | — | conf |
SSCI
|
| 2016 | — | conf |
SSCI
|
| 2016 | J | jnl |
Comput. Secur.
|
| 2015 | — | conf |
SSCI
|
| 2015 | — | conf |
SSCI
|
| 2015 | J | jnl |
IT Prof.
|
| 2015 | — | conf |
CISR
|
| 2014 | — | conf |
CISR
|
| 2014 | C | conf |
CIDM
|
| 2014 | — | conf |
CICS
|
| 2014 | J | jnl |
Int. J. Inf. Priv. Secur. Integr.
|
| 2014 | — | conf |
UCNC
|
| 2013 | — | conf |
CSIIRW
|
| 2013 | — | conf |
InfoSecCD
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
Int. J. Cyber Warf. Terror.
|
| 2013 | — | conf |
CyCon
|
| 2013 | — | conf |
CICS
|
| 2012 | — | conf |
CyberSecurity
|
| 2012 | — | ch. |
Variants of Evolutionary Algorithms for Real-World Applications
|
| 2012 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2012 | — | conf |
Critical Infrastructure Protection
|
| 2012 | — | conf |
SpringSim (ANSS)
|
| 2011 | J | jnl |
Int. J. Inf. Secur. Priv.
|
| 2011 | — | conf |
CSIIRW
|
| 2011 | — | conf |
CICS
|
| 2011 | — | conf |
SocialCom/PASSAT
|
| 2011 | J | jnl |
Appl. Soft Comput.
|
| 2011 | — | conf |
CSIIRW
|
| 2011 | — | conf |
CICS
|
| 2011 | — | conf |
CISIM
|
| 2010 | — | conf |
HICSS
|
| 2010 | — | conf |
CSIIRW
|
| 2010 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2010 | — | conf |
SocialCom/PASSAT
|
| 2010 | — | conf |
CSIIRW
|
| 2010 | — | conf |
SEMCCO
|
| 2010 | — | conf |
EST
|
| 2010 | C | conf |
SECRYPT
|
| 2009 | — | conf |
CSIIRW
|
| 2009 | A | conf |
GECCO
|
| 2009 | — | conf |
NaBIC
|
| 2009 | — | conf |
MCDM
|
| 2009 | — | conf |
SoSE
|
| 2009 | J | jnl |
CoRR
|
| 2009 | — | conf |
CICS
|
| 2009 | J | jnl |
Classification of Clinical Conditions: A Case Study on Prediction of Obesity and Its Co-morbidities.
Res. Comput. Sci.
|
| 2009 | — | conf |
CSIIRW
|
| 2009 | — | conf |
MCDM
|
| 2009 | — | conf |
CICS
|
| 2009 | J | jnl |
Inf. Sci.
|
| 2009 | — | conf |
CICS
|
| 2008 | — | conf |
GECCO (Companion)
|
| 2008 | J | jnl |
CoRR
|
| 2008 | — | conf |
ICARIS
|
| 2008 | J | jnl |
IEEE Comput. Intell. Mag.
|
| 2008 | J | jnl |
IEEE Comput. Intell. Mag.
|
| 2007 | — | conf |
FOCI
|
| 2007 | — | ch. |
Advances in Evolutionary Computing for System Design
|
| 2007 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2007 | — | conf |
LION
|
| 2007 | J | jnl |
Evol. Comput.
|
| 2006 | J | jnl |
IEEE Comput. Intell. Mag.
|
| 2006 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2006 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2006 | A | conf |
GECCO
|
| 2006 | A | conf |
GECCO
|
| 2006 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2006 | — | conf |
ICARIS
|
| 2005 | J | jnl |
Comput. Secur.
|
| 2005 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2005 | A | conf |
GECCO
|
| 2005 | A | conf |
GECCO
|
| 2005 | J | jnl |
Soft Comput.
|
| 2004 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2004 | — | ed. |
GECCO (1)
|
| 2004 | — | ed. |
GECCO (2)
|
| 2004 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2004 | — | conf |
GECCO (1)
|
| 2003 | A | conf |
SDM
|
| 2003 | — | conf |
ICARIS
|
| 2003 | A | conf |
GECCO
|
| 2003 | — | conf |
IAW
|
| 2003 | B | conf |
FUZZ-IEEE
|
| 2003 | J | jnl |
Genet. Program. Evolvable Mach.
|
| 2003 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2003 | B | conf |
IJCNN
|
| 2003 | A | ed. |
GECCO
|
| 2003 | A | ed. |
GECCO
|
| 2003 | A | conf |
GECCO
|
| 2003 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2003 | B | conf |
FUZZ-IEEE
|
| 2003 | A | conf |
GECCO
|
| 2003 | A | conf |
GECCO
|
| 2002 | — | conf |
Evolvable Hardware
|
| 2002 | A | conf |
GECCO
|
| 2002 | — | conf |
GECCO Late Breaking Papers
|
| 2002 | J | jnl |
IEEE Trans. Evol. Comput.
|
| 2002 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2002 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2002 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2002 | B | conf |
IEEE Congress on Evolutionary Computation
|
| 2002 | J | jnl |
IEEE Trans. Evol. Comput.
|
| 2002 | A | conf |
GECCO
|
| 2002 | B | conf |
FUZZ-IEEE
|
| 2002 | Misc | conf |
CATA
|
| 2002 | — | conf |
GECCO Late Breaking Papers
|
| 2001 | — | conf |
MMM-ACNS
|
| 2000 | B | conf |
SMC
|
| 2000 | — | conf |
IS
|
| 2000 | J | jnl |
IEEE Trans. Evol. Comput.
|
| 1999 | A | conf |
GECCO
|
| 1999 | — | conf |
AAAI/IAAI
|
| 1999 | B | conf |
CEC
|
| 1998 | B | conf |
SMC
|
| 1998 | J | jnl |
Appl. Intell.
|
| 1998 | — | conf |
AAAI/IAAI
|
| 1997 | — | book |
Evolutionary algorithms in engineering applications.
|
| 1994 | — | conf |
International Conference on Evolutionary Computation
|
| 1993 | B | conf |
ICTAI
|
| 1992 | A | conf |
ECAI
|
| 1992 | A | conf |
PPSN
|