| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2025 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2025 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2025 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | Misc | conf |
CSICC
|
| 2025 | J | jnl |
Int. J. Inf. Sec.
|
| 2025 | — | conf |
IWCIT
|
| 2025 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2025 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2025 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Neurocomputing
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
J. Cryptogr. Eng.
|
| 2024 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | A* | conf |
ICML
|
| 2024 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2024 | J | jnl |
IEEE Internet Things J.
|
| 2024 | J | jnl |
Int. J. Comput. Intell. Syst.
|
| 2024 | J | jnl |
IEEE Trans. Green Commun. Netw.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | B | conf |
ITW
|
| 2023 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Commun.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | J | jnl |
Des. Codes Cryptogr.
|
| 2022 | — | conf |
ASHES@CCS
|
| 2022 | J | jnl |
J. Inf. Secur. Appl.
|
| 2022 | B | conf |
ITW
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2022 | — | conf |
IWCIT
|
| 2022 | J | jnl |
Int. J. Internet Protoc. Technol.
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2021 | J | jnl |
Inf. Sci.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
ISCISC
|
| 2021 | — | conf |
IWCIT
|
| 2021 | J | jnl |
Comput. Networks
|
| 2021 | J | jnl |
CoRR
|
| 2021 | B | conf |
ISIT
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Comput. Intell. Neurosci.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | — | conf |
ASIACRYPT (1)
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
J. Inf. Secur. Appl.
|
| 2020 | J | jnl |
J. Intell. Transp. Syst.
|
| 2020 | J | jnl |
Clust. Comput.
|
| 2020 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2020 | — | conf |
IWCIT
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
IET Commun.
|
| 2020 | J | jnl |
IET Commun.
|
| 2020 | B | conf |
PIMRC
|
| 2020 | J | jnl |
Internet Things
|
| 2019 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2019 | B | conf |
ISIT
|
| 2019 | — | conf |
ISCISC
|
| 2019 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2019 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2019 | J | jnl |
J. Ambient Intell. Humaniz. Comput.
|
| 2019 | — | conf |
ISCISC
|
| 2019 | — | conf |
ISCISC
|
| 2019 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | J | jnl |
Wirel. Networks
|
| 2019 | J | jnl |
J. Netw. Comput. Appl.
|
| 2019 | J | jnl |
Int. J. Netw. Secur.
|
| 2019 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2019 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2019 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2019 | J | jnl |
IET Signal Process.
|
| 2019 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
IWCIT
|
| 2019 | J | jnl |
CoRR
|
| 2019 | B | conf |
ITW
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
IWCIT
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
IET Inf. Secur.
|
| 2018 | J | jnl |
Int. J. Commun. Syst.
|
| 2018 | — | conf |
IST
|
| 2018 | J | jnl |
Blind Interference Alignment for the K-User SISO Interference Channel Using Reconfigurable Antennas.
IEEE Commun. Lett.
|
| 2018 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2018 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2018 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2018 | J | jnl |
Int. J. Commun. Syst.
|
| 2018 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2018 | J | jnl |
IEEE Trans. Green Commun. Netw.
|
| 2018 | — | conf |
IWCIT
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
Wirel. Pers. Commun.
|
| 2017 | — | conf |
ISCISC
|
| 2017 | J | jnl |
Wirel. Pers. Commun.
|
| 2017 | J | jnl |
Comput. Networks
|
| 2017 | — | conf |
ISCISC
|
| 2017 | J | jnl |
IEEE Commun. Lett.
|
| 2017 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2017 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2017 | J | jnl |
IEEE Wirel. Commun. Lett.
|
| 2017 | J | jnl |
Wirel. Pers. Commun.
|
| 2017 | — | conf |
ISCISC
|
| 2017 | — | conf |
ISCISC
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
IWCIT
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
ISCISC
|
| 2017 | J | jnl |
On Optimal Online Algorithms for Energy Harvesting Systems With Continuous Energy and Data Arrivals.
IEEE Wirel. Commun. Lett.
|
| 2017 | J | jnl |
On Optimal Online Algorithms for Energy Harvesting Systems with Continuous Energy and Data Arrivals.
CoRR
|
| 2017 | — | conf |
ISCISC
|
| 2017 | B | conf |
ISIT
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2017 | — | conf |
ISCISC
|
| 2017 | J | jnl |
IET Commun.
|
| 2017 | J | jnl |
Int. J. Commun. Syst.
|
| 2017 | J | jnl |
Wirel. Pers. Commun.
|
| 2017 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2017 | — | conf |
WSA
|
| 2016 | J | jnl |
Inf. Process. Lett.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
Int. J. Internet Protoc. Technol.
|
| 2016 | — | conf |
IWCIT
|
| 2016 | — | conf |
IST
|
| 2016 | — | conf |
ISCISC
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
IET Inf. Secur.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
IET Inf. Secur.
|
| 2016 | — | conf |
IWCIT
|
| 2016 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2016 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2016 | J | jnl |
IET Commun.
|
| 2016 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | J | jnl |
IET Commun.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2016 | J | jnl |
Trans. Emerg. Telecommun. Technol.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
IWCIT
|
| 2016 | J | jnl |
Des. Codes Cryptogr.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
ISCISC
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
Wirel. Networks
|
| 2015 | J | jnl |
Wirel. Networks
|
| 2015 | J | jnl |
Inf. Technol. Control.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
Int. J. Commun. Syst.
|
| 2015 | — | conf |
ISWCS
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
J. Signal Process. Syst.
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
IET Inf. Secur.
|
| 2015 | J | jnl |
IET Commun.
|
| 2015 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2015 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2015 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2015 | Misc | conf |
INDOCRYPT
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
Secur. Commun. Networks
|
| 2015 | J | jnl |
IET Commun.
|
| 2015 | — | conf |
IWCIT
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | B | conf |
ISIT
|
| 2015 | J | jnl |
IET Commun.
|
| 2015 | J | jnl |
Wirel. Pers. Commun.
|
| 2015 | J | jnl |
Wirel. Pers. Commun.
|
| 2014 | — | conf |
ISCISC
|
| 2014 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | — | conf |
IWCIT
|
| 2014 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | — | conf |
ICC
|
| 2014 | — | conf |
RFIDSec
|
| 2014 | — | conf |
ISCISC
|
| 2014 | J | jnl |
IET Inf. Secur.
|
| 2014 | — | conf |
IWCIT
|
| 2014 | — | conf |
ISCISC
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
IET Commun.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
IET Commun.
|
| 2014 | — | conf |
ISCISC
|
| 2014 | — | conf |
IWCIT
|
| 2014 | — | conf |
ISCISC
|
| 2014 | — | conf |
ISCISC
|
| 2014 | J | jnl |
Wirel. Pers. Commun.
|
| 2014 | — | conf |
IWCIT
|
| 2014 | J | jnl |
IET Commun.
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2014 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
ISCISC
|
| 2013 | B | conf |
ISIT
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
IWCIT
|
| 2013 | J | jnl |
IET Commun.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
IWCIT
|
| 2013 | J | jnl |
Inf. Process. Lett.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
CoRR
|
| 2013 | B | conf |
ISIT
|
| 2013 | B | conf |
ISIT
|
| 2013 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
IWCIT
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
IWCIT
|
| 2013 | J | jnl |
CoRR
|
| 2013 | B | conf |
ISIT
|
| 2013 | B | conf |
ITW
|
| 2013 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | J | jnl |
IEICE Trans. Commun.
|
| 2013 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
ISCISC
|
| 2013 | — | conf |
IWCIT
|
| 2013 | J | jnl |
Wirel. Pers. Commun.
|
| 2013 | C | conf |
PST
|
| 2013 | J | jnl |
Secur. Commun. Networks
|
| 2013 | B | conf |
ITW
|
| 2013 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | B | conf |
ISIT
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | — | conf |
ICT
|
| 2012 | J | jnl |
CoRR
|
| 2012 | B | conf |
ISIT
|
| 2012 | J | jnl |
CoRR
|
| 2012 | B | conf |
ISIT
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
IET Inf. Secur.
|
| 2012 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2012 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2012 | B | conf |
ICNP
|
| 2012 | B | conf |
ITW
|
| 2012 | J | jnl |
IET Commun.
|
| 2012 | J | jnl |
CoRR
|
| 2012 | B | conf |
ISIT
|
| 2012 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2012 | J | jnl |
CoRR
|
| 2012 | B | conf |
ITW
|
| 2012 | — | conf |
Swe-CTW
|
| 2012 | B | conf |
ISIT
|
| 2012 | J | jnl |
CoRR
|
| 2012 | — | conf |
ISWCS
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
CoRR
|
| 2012 | B | conf |
ITW
|
| 2012 | J | jnl |
IET Inf. Secur.
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
IET Commun.
|
| 2011 | J | jnl |
CoRR
|
| 2011 | J | jnl |
CoRR
|
| 2011 | — | conf |
Communications and Multimedia Security
|
| 2011 | B | conf |
ISIT
|
| 2011 | J | jnl |
CoRR
|
| 2011 | J | jnl |
CoRR
|
| 2011 | Misc | conf |
INDOCRYPT
|
| 2011 | J | jnl |
CoRR
|
| 2011 | C | conf |
WISTP
|
| 2011 | J | jnl |
EURASIP J. Wirel. Commun. Netw.
|
| 2011 | J | jnl |
IEEE Commun. Lett.
|
| 2011 | J | jnl |
IET Commun.
|
| 2011 | — | conf |
CCNC
|
| 2011 | J | jnl |
J. Inf. Process. Syst.
|
| 2011 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2011 | B | conf |
ISIT
|
| 2011 | C | conf |
MMSP
|
| 2011 | B | conf |
ITW
|
| 2011 | B | conf |
ISIT
|
| 2011 | J | jnl |
IET Commun.
|
| 2011 | — | conf |
CCNC
|
| 2011 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2011 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2011 | J | jnl |
The Capacity Region of p -Transmitter/ q -Receiver Multiple-Access Channels With Common Information.
IEEE Trans. Inf. Theory
|
| 2011 | J | jnl |
CoRR
|
| 2011 | B | conf |
ISIT
|
| 2010 | J | jnl |
CoRR
|
| 2010 | J | jnl |
IET Commun.
|
| 2010 | J | jnl |
IET Commun.
|
| 2010 | B | conf |
ITW
|
| 2010 | C | conf |
ISITA
|
| 2010 | J | jnl |
IEEE Commun. Lett.
|
| 2010 | B | conf |
ISIT
|
| 2010 | J | jnl |
IET Commun.
|
| 2010 | B | conf |
ITW
|
| 2010 | C | conf |
ISITA
|
| 2010 | J | jnl |
IET Commun.
|
| 2010 | C | conf |
CIT
|
| 2010 | J | jnl |
IET Commun.
|
| 2010 | J | jnl |
CoRR
|
| 2010 | C | conf |
EUC
|
| 2010 | C | conf |
ISPEC
|
| 2010 | B | conf |
ITW
|
| 2010 | B | conf |
ISIT
|
| 2010 | C | conf |
ISITA
|
| 2010 | B | conf |
ITW
|
| 2010 | J | jnl |
J. Commun. Networks
|
| 2010 | J | jnl |
CoRR
|
| 2010 | C | conf |
ISITA
|
| 2010 | J | jnl |
CoRR
|
| 2010 | B | conf |
ISIT
|
| 2010 | J | jnl |
IEEE Trans. Signal Process.
|
| 2010 | J | jnl |
CoRR
|
| 2010 | C | conf |
ISITA
|
| 2010 | C | conf |
ISITA
|
| 2010 | B | conf |
ISIT
|
| 2009 | C | conf |
ICICS
|
| 2009 | B | conf |
ISIT
|
| 2009 | J | jnl |
IET Commun.
|
| 2009 | B | conf |
ISIT
|
| 2009 | B | conf |
ISIT
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
IEEE Trans. Signal Process.
|
| 2009 | J | jnl |
ISC Int. J. Inf. Secur.
|
| 2009 | J | jnl |
IET Inf. Secur.
|
| 2009 | J | jnl |
IET Commun.
|
| 2009 | — | conf |
EIT
|
| 2009 | B | conf |
GLOBECOM
|
| 2009 | J | jnl |
IET Commun.
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
IEEE Trans. Wirel. Commun.
|
| 2009 | B | conf |
ITW
|
| 2009 | B | conf |
ISIT
|
| 2009 | B | conf |
ISIT
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
CoRR
|
| 2009 | B | conf |
ISIT
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
IET Commun.
|
| 2009 | B | conf |
ISIT
|
| 2009 | J | jnl |
IET Commun.
|
| 2008 | J | jnl |
EURASIP J. Wirel. Commun. Netw.
|
| 2008 | B | conf |
ISIT
|
| 2008 | B | conf |
ISIT
|
| 2008 | — | conf |
Security and Management
|
| 2008 | J | jnl |
IET Inf. Secur.
|
| 2008 | J | jnl |
IEEE Signal Process. Lett.
|
| 2008 | B | conf |
WiOpt
|
| 2008 | — | conf |
ICT
|
| 2008 | J | jnl |
IEEE Commun. Lett.
|
| 2007 | J | jnl |
IEEE Trans. Signal Process.
|
| 2007 | B | conf |
ISIT
|
| 2006 | C | conf |
SECRYPT
|
| 2006 | J | jnl |
IEEE Trans. Commun.
|
| 2006 | J | jnl |
IEEE Trans. Commun.
|
| 2004 | J | jnl |
IEEE Trans. Wirel. Commun.
|
| 2003 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2002 | B | conf |
PIMRC
|
| 1993 | — | conf |
Information Theory and Applications
|
| 1982 | J | jnl |
IEEE Trans. Inf. Theory
|