| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Signal Process.
|
| 2026 | J | jnl |
Appl. Soft Comput.
|
| 2026 | J | jnl |
Displays
|
| 2025 | J | jnl |
Int. J. Intell. Syst.
|
| 2025 | J | jnl |
Adv. Eng. Informatics
|
| 2025 | J | jnl |
Int. J. Pattern Recognit. Artif. Intell.
|
| 2025 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Clust. Comput.
|
| 2024 | J | jnl |
Appl. Soft Comput.
|
| 2024 | J | jnl |
Int. J. Intell. Syst.
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | C | conf |
ISPA
|
| 2024 | C | conf |
ISPA
|
| 2024 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2024 | J | jnl |
IEEE Trans. Consumer Electron.
|
| 2023 | Misc | conf |
WISA
|
| 2023 | J | jnl |
Int. J. Pattern Recognit. Artif. Intell.
|
| 2023 | J | jnl |
J. Electronic Imaging
|
| 2023 | J | jnl |
Neural Process. Lett.
|
| 2023 | J | jnl |
Syst.
|
| 2022 | J | jnl |
Oper. Res. Lett.
|
| 2022 | J | jnl |
J. Frankl. Inst.
|
| 2022 | — | conf |
ICEMT
|
| 2022 | J | jnl |
Syst.
|
| 2022 | B | conf |
IPEC
|
| 2022 | B | conf |
SMC
|
| 2021 | — | conf |
DSIT
|
| 2021 | — | conf |
ICIT
|
| 2020 | — | conf |
DSIT
|
| 2020 | J | jnl |
J. Optim. Theory Appl.
|
| 2019 | — | conf |
DSIT
|
| 2019 | J | jnl |
J. Medical Imaging Health Informatics
|
| 2019 | — | conf |
DSIT
|
| 2018 | C | conf |
PACLIC
|
| 2018 | J | jnl |
Wirel. Pers. Commun.
|
| 2017 | C | conf |
QRS
|
| 2017 | — | conf |
ICSI (2)
|
| 2017 | J | jnl |
计算机科学
|
| 2016 | J | jnl |
Appl. Math. Lett.
|
| 2015 | J | jnl |
计算机科学
|
| 2014 | J | jnl |
J. Softw.
|
| 2014 | J | jnl |
Comput. Math. Appl.
|
| 2013 | J | jnl |
J. Softw.
|
| 2012 | J | jnl |
J. Comput.
|
| 2012 | J | jnl |
J. Softw.
|
| 2012 | J | jnl |
J. Softw.
|
| 2011 | J | jnl |
J. Comput.
|
| 2011 | J | jnl |
Inf. Fusion
|
| 2011 | — | conf |
ICDIP
|
| 2010 | J | jnl |
J. Networks
|
| 2009 | — | conf |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security
|
| 2009 | — | conf |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security
|
| 2009 | — | conf |
IFITA (3)
|
| 2008 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2008 | — | conf |
FSKD (5)
|
| 2007 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2006 | — | conf |
IWNAS
|
| 2006 | — | conf |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
|
| 2004 | — | conf |
Data Mining and Knowledge Discovery: Theory, Tools, and Technology
|
| 2003 | — | conf |
Storage and Retrieval for Media Databases
|
| 2003 | — | conf |
Data Mining and Knowledge Discovery: Theory, Tools, and Technology
|
| 2002 | — | conf |
Data Mining and Knowledge Discovery: Theory, Tools, and Technology
|