| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | — | conf |
HICSS
|
| 2026 | J | jnl |
Inf. Manag.
|
| 2025 | J | jnl |
Inf. Syst. Frontiers
|
| 2025 | — | conf |
HICSS
|
| 2025 | — | conf |
HICSS
|
| 2025 | J | jnl |
Inf. Manag.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Inf. Manag.
|
| 2024 | J | jnl |
MIS Q.
|
| 2024 | J | jnl |
MIS Q.
|
| 2024 | J | jnl |
J. Manag. Inf. Syst.
|
| 2024 | J | jnl |
J. Manag. Inf. Syst.
|
| 2024 | — | conf |
HICSS
|
| 2024 | — | conf |
HICSS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
HICSS
|
| 2023 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2023 | J | jnl |
J. Manag. Inf. Syst.
|
| 2023 | — | conf |
ICDH
|
| 2023 | — | conf |
CSET @ USENIX Security Symposium
|
| 2022 | — | conf |
CSET @ USENIX Security Symposium
|
| 2022 | — | conf |
ICDM (Workshops)
|
| 2021 | J | jnl |
MIS Q.
|
| 2021 | C | conf |
ISI
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
J. Manag. Inf. Syst.
|
| 2020 | C | conf |
ISI
|
| 2020 | C | conf |
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
ISI
|
| 2020 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2020 | C | conf |
ISI
|
| 2019 | J | jnl |
ACM Trans. Manag. Inf. Syst.
|
| 2019 | J | jnl |
AIS Trans. Replication Res.
|
| 2018 | J | jnl |
J. Biomed. Informatics
|
| 2018 | J | jnl |
IEEE Intell. Syst.
|
| 2016 | C | conf |
ISI
|
| 2016 | — | conf |
ICSH
|
| 2015 | — | conf |
ICSH
|
| 2014 | — | conf |
ICSH
|