| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
J. Netw. Comput. Appl.
|
| 2026 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2026 | A* | conf |
AAAI
|
| 2026 | J | jnl |
CoRR
|
| 2026 | A* | conf |
AAAI
|
| 2026 | A* | conf |
AAAI
|
| 2026 | A* | conf |
AAAI
|
| 2025 | B | conf |
ICPADS
|
| 2025 | J | jnl |
Future Gener. Comput. Syst.
|
| 2025 | J | jnl |
IEEE Trans. Neural Networks Learn. Syst.
|
| 2025 | J | jnl |
Neural Networks
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
Int. J. Intell. Syst.
|
| 2025 | J | jnl |
Expert Syst. Appl.
|
| 2025 | J | jnl |
Comput. Networks
|
| 2025 | J | jnl |
Neural Networks
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | A* | conf |
IJCAI
|
| 2025 | J | jnl |
Comput. Networks
|
| 2025 | J | jnl |
Comput. Mater. Continua
|
| 2025 | A* | conf |
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
SIGIR
|
| 2025 | J | jnl |
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
CoRR
|
| 2025 | J | jnl |
Neural Networks
|
| 2025 | — | conf |
KDD (2)
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2025 | J | jnl |
J. Artif. Intell. Res.
|
| 2025 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2025 | J | jnl |
Expert Syst. Appl.
|
| 2025 | A* | conf |
AAAI
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Trans. Computers
|
| 2024 | J | jnl |
Appl. Intell.
|
| 2024 | J | jnl |
Appl. Intell.
|
| 2024 | Misc | conf |
ICASSP
|
| 2024 | A* | conf |
AAAI
|
| 2024 | Misc | conf |
ICASSP
|
| 2024 | C | conf |
CSCWD
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Neurocomputing
|
| 2024 | J | jnl |
Int. J. Intell. Syst.
|
| 2024 | J | jnl |
Int. J. Intell. Syst.
|
| 2024 | J | jnl |
Neural Networks
|
| 2024 | J | jnl |
Inf. Sci.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
AAAI
|
| 2023 | J | jnl |
Int. J. Intell. Syst.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
Swarm Evol. Comput.
|
| 2023 | — | conf |
ADMA (5)
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
ICANN (7)
|
| 2023 | A* | conf |
ACM Multimedia
|
| 2023 | J | jnl |
World Wide Web (WWW)
|
| 2023 | J | jnl |
Neural Networks
|
| 2023 | — | conf |
ICONIP (2)
|
| 2023 | — | conf |
ICANN (3)
|
| 2023 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
ICCV
|
| 2023 | A* | conf |
ACM Multimedia
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2022 | A* | conf |
IJCAI
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Int. J. Intell. Syst.
|
| 2022 | B | conf |
IJCNN
|
| 2022 | B | conf |
IJCNN
|
| 2022 | Misc | conf |
Inscrypt
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | B | conf |
IJCNN
|
| 2022 | J | jnl |
Int. J. Intell. Syst.
|
| 2022 | A* | conf |
IJCAI
|
| 2022 | J | jnl |
IEEE Trans. Neural Networks Learn. Syst.
|
| 2022 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2022 | J | jnl |
Int. J. Intell. Syst.
|
| 2022 | A* | conf |
ACM Multimedia
|
| 2022 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2021 | J | jnl |
Complex.
|
| 2021 | B | conf |
IJCNN
|
| 2021 | — | conf |
ICICS (2)
|
| 2021 | A* | conf |
ACM Multimedia
|
| 2021 | J | jnl |
CoRR
|
| 2021 | B | conf |
SMC
|
| 2021 | J | jnl |
Neurocomputing
|
| 2021 | B | conf |
ICIP
|
| 2021 | J | jnl |
J. Inf. Secur. Appl.
|
| 2021 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2021 | J | jnl |
IEEE Access
|
| 2021 | C | conf |
IWDW
|
| 2021 | J | jnl |
CoRR
|
| 2020 | — | conf |
APSIPA
|
| 2020 | — | conf |
FCS
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Trans. Cybern.
|
| 2020 | J | jnl |
Neurocomputing
|
| 2020 | A* | conf |
ACM Multimedia
|
| 2020 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2020 | J | jnl |
Pattern Recognit.
|
| 2020 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2019 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2019 | J | jnl |
Pattern Recognit.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Multim. Tools Appl.
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
IEEE Netw.
|
| 2019 | C | conf |
IWDW
|
| 2019 | A | conf |
ICME
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Multim. Tools Appl.
|
| 2018 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2018 | J | jnl |
Multim. Tools Appl.
|
| 2018 | — | conf |
ICA3PP (1)
|
| 2018 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2018 | J | jnl |
IEEE Syst. J.
|
| 2018 | J | jnl |
Multim. Tools Appl.
|
| 2018 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2018 | — | conf |
APSIPA
|
| 2017 | C | conf |
IWDW
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | J | jnl |
Secur. Commun. Networks
|
| 2017 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2017 | C | conf |
Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC.
IH&MMSec
|
| 2017 | J | jnl |
Soft Comput.
|
| 2017 | J | jnl |
Inf. Sci.
|
| 2017 | J | jnl |
Appl. Math. Comput.
|
| 2017 | J | jnl |
J. Syst. Softw.
|
| 2016 | C | conf |
IWDW
|
| 2016 | J | jnl |
Int. J. Commun. Syst.
|
| 2016 | J | jnl |
Secur. Commun. Networks
|
| 2016 | J | jnl |
Multim. Tools Appl.
|
| 2016 | J | jnl |
Comput. Networks
|
| 2016 | J | jnl |
IET Commun.
|
| 2016 | J | jnl |
Multim. Tools Appl.
|
| 2016 | J | jnl |
Secur. Commun. Networks
|
| 2016 | J | jnl |
Appl. Soft Comput.
|
| 2016 | Misc | conf |
ICASSP
|
| 2016 | J | jnl |
计算机科学
|
| 2016 | J | jnl |
计算机科学
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | B | conf |
COMPSAC
|
| 2015 | B | conf |
COMPSAC
|
| 2014 | C | conf |
IH&MMSec
|
| 2014 | B | conf |
TrustCom
|
| 2013 | J | jnl |
Int. J. Softw. Eng. Knowl. Eng.
|
| 2013 | — | conf |
INCoS
|
| 2012 | C | conf |
ISC
|
| 2011 | J | jnl |
J. Softw.
|
| 2011 | J | jnl |
Soft Comput.
|
| 2011 | J | jnl |
Int. J. Comput. Intell. Syst.
|
| 2011 | C | conf |
SEKE
|
| 2011 | B | conf |
TrustCom
|
| 2011 | — | conf |
WASA
|
| 2010 | — | conf |
ICICA (LNCS)
|
| 2008 | — | conf |
ICYCS
|
| 2008 | — | conf |
CIS (2)
|
| 2008 | — | conf |
CIS (1)
|
| 2004 | — | conf |
GCC
|
| 2000 | — | conf |
Web-Age Information Management
|