| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | Misc | conf |
ICDCIT
|
| 2026 | — | conf |
VISAPP (3)
|
| 2026 | J | jnl |
Expert Syst. J. Knowl. Eng.
|
| 2026 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2026 | J | jnl |
Evol. Syst.
|
| 2025 | J | jnl |
IEEE Trans. Veh. Technol.
|
| 2025 | J | jnl |
Comput.
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | J | jnl |
Comput. J.
|
| 2024 | — | conf |
SCI
|
| 2024 | J | jnl |
npj Digit. Medicine
|
| 2024 | J | jnl |
Int. J. Inf. Technol. Commun. Convergence
|
| 2024 | J | jnl |
Telecommun. Syst.
|
| 2023 | J | jnl |
Neural Comput. Appl.
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | Misc | conf |
ICDCIT
|
| 2023 | J | jnl |
Int. J. Medical Informatics
|
| 2023 | J | jnl |
J. Cloud Comput.
|
| 2023 | J | jnl |
Multim. Tools Appl.
|
| 2023 | — | conf |
IC3I
|
| 2022 | J | jnl |
Multim. Tools Appl.
|
| 2022 | J | jnl |
Clust. Comput.
|
| 2021 | J | jnl |
Int. J. Manuf. Res.
|
| 2021 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2021 | J | jnl |
An intrinsic authorship verification technique for compromised account detection in social networks.
Soft Comput.
|
| 2021 | — | conf |
ICCCNT
|
| 2021 | J | jnl |
Comput. Sci. Rev.
|
| 2020 | J | jnl |
Frontiers Blockchain
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Knowl. Based Syst.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Appl. Soft Comput.
|
| 2019 | — | conf |
FNSS
|
| 2019 | J | jnl |
IEEE Access
|
| 2018 | J | jnl |
Expert Syst. Appl.
|
| 2018 | J | jnl |
J. Supercomput.
|
| 2018 | — | conf |
ICTON
|
| 2018 | J | jnl |
J. Netw. Comput. Appl.
|
| 2017 | J | jnl |
Comput. Electr. Eng.
|
| 2017 | — | conf |
VISIGRAPP (4: VISAPP)
|
| 2016 | J | jnl |
Int. J. Commun. Networks Distributed Syst.
|
| 2015 | — | conf |
SocProS (1)
|
| 2011 | J | jnl |
Adv. Internet Things
|