| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Pattern Recognit.
|
| 2026 | A* | conf |
AAAI
|
| 2026 | J | jnl |
Pattern Recognit.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Neural Networks
|
| 2024 | J | jnl |
Inf. Sci.
|
| 2023 | — | conf |
IJCRS
|
| 2018 | — | conf |
PACIS
|
| 2018 | — | conf |
PACIS
|
| 2017 | J | jnl |
Enterp. Inf. Syst.
|
| 2016 | — | conf |
PAKDD Workshops
|
| 2016 | — | conf |
HICSS
|
| 2016 | — | conf |
PACIS
|
| 2015 | J | jnl |
Comput. Networks
|
| 2015 | — | conf |
PACIS
|
| 2014 | J | jnl |
Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability.
Sci. China Inf. Sci.
|
| 2013 | — | conf |
PACIS
|
| 2010 | A* | conf |
AAAI
|
| 2008 | — | conf |
Security and Management
|
| 2007 | C | conf |
ISCC
|