| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | — | conf |
KDD (2)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
ICDM
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
ICLR
|
| 2025 | A | conf |
UAI
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
AAAI
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Neural Comput. Appl.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Mach. Learn.
|
| 2024 | J | jnl |
Pattern Recognit.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | A* | conf |
ICLR
|
| 2024 | J | jnl |
CoRR
|
| 2023 | — | conf |
EPIA (1)
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
WIFS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
ESORICS Workshops (2)
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
NeurIPS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2022 | J | jnl |
IEEE Trans. Neural Networks Learn. Syst.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Optim. Methods Softw.
|
| 2022 | J | jnl |
J. Mach. Learn. Res.
|
| 2022 | — | conf |
WIFS
|
| 2022 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | C | ed. |
IH&MMSec
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | C | conf |
IH&MMSec
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
GameSec
|
| 2020 | J | jnl |
Expert Syst. Appl.
|
| 2020 | J | jnl |
Mach. Learn.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | C | ed. |
IH&MMSec
|
| 2020 | — | conf |
ITAT
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A* | conf |
NeurIPS
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
PGM
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A* | conf |
AAAI
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | C | conf |
IH&MMSec
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Mach. Learn.
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | C | conf |
IH&MMSec
|
| 2018 | J | jnl |
Expert Syst. Appl.
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
ECML/PKDD (2)
|
| 2017 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2017 | B | conf |
SISAP
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
GameSec
|
| 2017 | J | jnl |
J. Comput. Syst. Sci.
|
| 2017 | — | conf |
ISNN (1)
|
| 2016 | — | conf |
AISec@CCS
|
| 2016 | B | conf |
SISAP
|
| 2016 | J | jnl |
Comput. Networks
|
| 2016 | J | jnl |
Mach. Learn.
|
| 2016 | — | conf |
Media Watermarking, Security, and Forensics
|
| 2016 | — | conf |
WIFS
|
| 2016 | C | conf |
IH&MMSec
|
| 2016 | J | jnl |
IEEE Intell. Syst.
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
PAISI
|
| 2015 | B | conf |
IM
|
| 2015 | — | conf |
WIFS
|
| 2015 | — | conf |
WIFS
|
| 2015 | — | conf |
Media Watermarking, Security, and Forensics
|
| 2015 | Misc | conf |
ICASSP
|
| 2014 | — | conf |
Media Watermarking, Security, and Forensics
|
| 2014 | — | conf |
ECML/PKDD (2)
|
| 2014 | C | conf |
IH&MMSec
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | Misc | conf |
ICASSP
|
| 2013 | C | conf |
IH&MMSec
|
| 2013 | — | conf |
Media Watermarking, Security, and Forensics
|
| 2012 | — | conf |
MM&Sec
|
| 2012 | — | conf |
Media Watermarking, Security, and Forensics
|
| 2012 | — | conf |
WIFS
|
| 2012 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2012 | — | conf |
Media Watermarking, Security, and Forensics
|
| 2011 | — | conf |
Information Hiding
|
| 2011 | — | conf |
Media Forensics and Security
|
| 2011 | — | conf |
Media Forensics and Security
|
| 2011 | — | ed. |
Information Hiding
|
| 2010 | — | conf |
Media Forensics and Security
|
| 2010 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2010 | — | conf |
Information Hiding
|
| 2009 | — | conf |
Media Forensics and Security
|
| 2009 | — | conf |
MM&Sec
|
| 2008 | — | conf |
Information Hiding
|
| 2008 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2008 | — | conf |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents
|
| 2008 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2008 | — | conf |
MM&Sec
|
| 2008 | — | conf |
MM&Sec
|
| 2007 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2007 | — | conf |
MM&Sec
|
| 2006 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2005 | C | conf |
IWDW
|