| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
J. Electr. Comput. Eng.
|
| 2025 | B | conf |
Automated Attack Graph Construction for Cross-host Threat Detection Using Cyber Threat Intelligence.
TrustCom
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ICCS (3)
|
| 2025 | C | conf |
CSCWD
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2024 | C | conf |
CSCWD
|
| 2024 | C | conf |
CSCWD
|
| 2024 | — | conf |
ICONIP (6)
|
| 2024 | — | conf |
ICCS (1)
|
| 2023 | J | jnl |
Comput. Electron. Agric.
|
| 2023 | J | jnl |
Comput. Networks
|
| 2023 | C | conf |
CSCWD
|
| 2022 | J | jnl |
Appl. Soft Comput.
|
| 2022 | B | conf |
WCNC
|
| 2022 | — | conf |
SciSec
|
| 2022 | J | jnl |
Comput. Networks
|
| 2021 | J | jnl |
Sensors
|
| 2021 | C | conf |
CSCWD
|
| 2021 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2021 | C | conf |
CSCWD
|
| 2021 | C | conf |
CSCWD
|
| 2021 | — | conf |
ICCS (2)
|
| 2020 | B | conf |
ICPR
|
| 2020 | — | conf |
MLMI
|
| 2020 | — | conf |
MLMI
|
| 2020 | — | conf |
FCS
|
| 2020 | C | conf |
Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning.
SEKE
|
| 2020 | C | conf |
ISCC
|
| 2020 | — | conf |
ICCS (4)
|
| 2019 | B | conf |
PIMRC
|
| 2019 | — | conf |
ICC
|
| 2019 | J | jnl |
Telecommun. Syst.
|
| 2018 | B | conf |
GLOBECOM
|
| 2018 | B | conf |
MASS
|
| 2015 | J | jnl |
ACM SIGOPS Oper. Syst. Rev.
|
| 2015 | — | conf |
HotPower@SOSP
|
| 2012 | Misc | conf |
Map estimation of the input of an oversampled filter bank from noisy subbands by belief propagation.
ICASSP
|