| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Computers
|
| 2026 | J | jnl |
Expert Syst. Appl.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | A* | conf |
IJCAI
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Trans. Computers
|
| 2024 | J | jnl |
Integr.
|
| 2024 | J | jnl |
Neurocomputing
|
| 2024 | J | jnl |
IEEE Internet Things J.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Trans. Sustain. Comput.
|
| 2023 | — | conf |
ATS
|
| 2023 | J | jnl |
AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation.
Comput. Secur.
|
| 2023 | J | jnl |
IACR Trans. Cryptogr. Hardw. Embed. Syst.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
PeerJ Comput. Sci.
|
| 2023 | A | conf |
ACSAC
|
| 2023 | A* | conf |
DAC
|
| 2023 | J | jnl |
Neural Comput. Appl.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Secur. Commun. Networks
|
| 2022 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2022 | J | jnl |
World Wide Web
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Trans. Emerg. Top. Comput.
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
IEEE Internet Things J.
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
Secur. Commun. Networks
|
| 2019 | Misc | conf |
Inscrypt
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2019 | J | jnl |
Secur. Commun. Networks
|
| 2019 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2019 | J | jnl |
IEEE Internet Things J.
|
| 2018 | Misc | conf |
ICMLC
|
| 2018 | J | jnl |
IEEE Trans. Ind. Electron.
|
| 2018 | J | jnl |
Appl. Intell.
|
| 2018 | J | jnl |
Sci. China Inf. Sci.
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | B | conf |
ICPADS
|
| 2018 | J | jnl |
Sci. China Inf. Sci.
|
| 2018 | B | conf |
ICPADS
|
| 2018 | J | jnl |
Frontiers Inf. Technol. Electron. Eng.
|
| 2018 | J | jnl |
计算机科学
|
| 2017 | Misc | conf |
ICMLC
|
| 2017 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2017 | — | conf |
AsianHOST
|
| 2017 | J | jnl |
Sci. China Inf. Sci.
|
| 2017 | J | jnl |
IEEE Access
|
| 2017 | J | jnl |
Sci. China Inf. Sci.
|
| 2017 | A | conf |
DSN
|
| 2016 | J | jnl |
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur.
|
| 2014 | C | conf |
FDTC
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | J | jnl |
Comput. Secur.
|
| 2013 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2013 | J | jnl |
J. Syst. Softw.
|
| 2013 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2013 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2013 | — | conf |
COSADE
|
| 2013 | C | conf |
FDTC
|
| 2013 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2013 | J | jnl |
IEICE Trans. Commun.
|
| 2012 | J | jnl |
J. Networks
|
| 2012 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | — | conf |
COSADE
|
| 2012 | J | jnl |
Secur. Commun. Networks
|
| 2012 | — | conf |
CCIS
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2010 | — | conf |
WCNIS
|
| 2009 | — | conf |
IIH-MSP
|
| 2009 | — | conf |
HIS (1)
|
| 2009 | — | conf |
CSIE (6)
|
| 2009 | — | conf |
HIS (1)
|
| 2008 | — | conf |
ICYCS
|