| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2015 | J | jnl |
Appl. Math. Comput.
|
| 2012 | J | jnl |
Appl. Math. Comput.
|
| 2012 | J | jnl |
Appl. Math. Lett.
|
| 2011 | J | jnl |
Appl. Math. Comput.
|
| 2011 | J | jnl |
J. Comput. Appl. Math.
|
| 2010 | J | jnl |
J. Comput. Appl. Math.
|
| 2010 | J | jnl |
Comput. Math. Appl.
|
| 2010 | J | jnl |
Sci. China Inf. Sci.
|
| 2010 | J | jnl |
Int. J. Comput. Math.
|
| 2010 | J | jnl |
Comput. Math. Appl.
|
| 2010 | J | jnl |
Int. J. Comput. Math.
|
| 2010 | J | jnl |
Int. J. Comput. Math.
|
| 2010 | J | jnl |
Int. J. Comput. Math.
|
| 2010 | J | jnl |
Int. J. Comput. Math.
|
| 2009 | J | jnl |
Comput. Math. Appl.
|
| 2009 | J | jnl |
Int. J. Comput. Math.
|
| 2009 | J | jnl |
Appl. Math. Comput.
|
| 2009 | J | jnl |
Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator.
Signal Process.
|
| 2009 | J | jnl |
J. Comput. Appl. Math.
|
| 2008 | J | jnl |
Appl. Math. Comput.
|
| 2008 | J | jnl |
Appl. Math. Comput.
|
| 2008 | J | jnl |
Appl. Math. Lett.
|
| 2008 | J | jnl |
Image Vis. Comput.
|
| 2008 | J | jnl |
Appl. Math. Comput.
|
| 2008 | J | jnl |
Appl. Math. Comput.
|
| 2007 | J | jnl |
Appl. Math. Comput.
|
| 2007 | J | jnl |
Appl. Math. Comput.
|
| 2007 | J | jnl |
Appl. Math. Comput.
|
| 2007 | J | jnl |
Appl. Math. Comput.
|
| 2006 | J | jnl |
Appl. Math. Comput.
|
| 2006 | J | jnl |
Appl. Math. Comput.
|
| 2006 | J | jnl |
Appl. Math. Comput.
|
| 2006 | — | conf |
IIH-MSP
|
| 2005 | J | jnl |
Appl. Math. Comput.
|
| 2005 | J | jnl |
Appl. Math. Comput.
|
| 2004 | J | jnl |
Appl. Math. Comput.
|