| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Comput. Secur.
|
| 2026 | J | jnl |
Knowl. Based Syst.
|
| 2026 | J | jnl |
IEEE Trans. Software Eng.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Neural Networks
|
| 2025 | J | jnl |
Inf. Softw. Technol.
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
RBZZER: A Directed Fuzzing Technique for Efficient Detection of Memory Leaks via Risk Area Analysis.
Comput. Mater. Continua
|
| 2025 | J | jnl |
Int. J. Neural Syst.
|
| 2024 | J | jnl |
Expert Syst. Appl.
|
| 2024 | J | jnl |
J. Cloud Comput.
|
| 2024 | — | conf |
NLPCC (5)
|
| 2024 | J | jnl |
Comput. Mater. Continua
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | — | conf |
NLPCC (4)
|
| 2024 | J | jnl |
J. Vis. Commun. Image Represent.
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
Softw. Qual. J.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
Knowl. Based Syst.
|
| 2023 | J | jnl |
Appl. Intell.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | A | conf |
ICME
|
| 2023 | J | jnl |
Knowl. Based Syst.
|
| 2023 | J | jnl |
Inf. Sci.
|
| 2023 | J | jnl |
Neurocomputing
|
| 2023 | J | jnl |
Appl. Intell.
|
| 2023 | J | jnl |
Neurocomputing
|
| 2023 | J | jnl |
J. Vis. Commun. Image Represent.
|
| 2023 | J | jnl |
Inf. Sci.
|
| 2023 | — | conf |
KSEM (4)
|
| 2023 | J | jnl |
Autom. Softw. Eng.
|
| 2022 | J | jnl |
Neural Networks
|
| 2022 | J | jnl |
IEEE Trans. Syst. Man Cybern. Syst.
|
| 2022 | J | jnl |
Knowl. Based Syst.
|
| 2022 | J | jnl |
J. Vis. Commun. Image Represent.
|
| 2021 | J | jnl |
Inf. Sci.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
ICICS (1)
|
| 2021 | J | jnl |
J. Comput. Methods Sci. Eng.
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2021 | J | jnl |
IEEE Trans. Computational Imaging
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
Neural Comput. Appl.
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
Neurocomputing
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
J. Inf. Secur. Appl.
|
| 2020 | J | jnl |
基于增强BiLSTM-CRF模型的推文恶意软件名称识别 (Malware Name Recognition in Tweets Based on Enhanced BiLSTM-CRF Model).
计算机科学
|
| 2020 | J | jnl |
计算机科学
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Secur. Commun. Networks
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Appl. Soft Comput.
|
| 2019 | J | jnl |
Comput. Intell. Neurosci.
|
| 2019 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2017 | J | jnl |
Neural Comput. Appl.
|
| 2017 | A | conf |
AsiaCCS
|
| 2016 | J | jnl |
Comput. Secur.
|
| 2016 | J | jnl |
CoRR
|