| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2026 | J | jnl |
Appl. Soft Comput.
|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2026 | J | jnl |
IEEE Trans. Netw. Sci. Eng.
|
| 2026 | J | jnl |
IEEE Trans. Netw. Sci. Eng.
|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2026 | J | jnl |
IEEE Internet Things J.
|
| 2026 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2026 | — | conf |
KDD (1)
|
| 2026 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2026 | A* | conf |
WWW
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
Neurocomputing
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
ACM Trans. Web
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
J. Inf. Secur. Appl.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
J. Comput. Secur.
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Int. J. Intell. Syst.
|
| 2025 | A* | conf |
INFOCOM
|
| 2025 | J | jnl |
ACM Trans. Inf. Syst.
|
| 2025 | A* | conf |
IJCAI
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
Comput. Hum. Behav.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Internet Things J.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Consumer Electron.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
SecureComm (2)
|
| 2024 | J | jnl |
Across-Platform Detection of Malicious Cryptocurrency Transactions via Account Interaction Learning.
CoRR
|
| 2024 | J | jnl |
ACM Comput. Surv.
|
| 2024 | J | jnl |
IEEE Internet Things J.
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
KDD
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Comput. Soc. Syst.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | — | conf |
ACM TUR-C
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
IEEE Internet Things J.
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | A* | conf |
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
USENIX Security Symposium
|
| 2024 | J | jnl |
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
CoRR
|
| 2024 | — | conf |
DSIT
|
| 2024 | A* | conf |
INFOCOM
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
ACM Trans. Knowl. Discov. Data
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
Rethinking Software Misconfigurations in the Real World: An Empirical Study and Literature Analysis.
CoRR
|
| 2024 | — | conf |
DSIT
|
| 2024 | A | conf |
ICWS
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Netw. Serv. Manag.
|
| 2023 | J | jnl |
IEEE CAA J. Autom. Sinica
|
| 2023 | J | jnl |
J. Syst. Archit.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
IEEE Trans. Intell. Transp. Syst.
|
| 2023 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2023 | A* | conf |
CCS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Comput. Biol. Medicine
|
| 2023 | A* | conf |
ICCV
|
| 2023 | J | jnl |
IEEE ACM Trans. Comput. Biol. Bioinform.
|
| 2023 | J | jnl |
IEEE Trans. Software Eng.
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | A* | conf |
AAAI
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2022 | — | conf |
SCC
|
| 2022 | — | conf |
SmartCom
|
| 2022 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2022 | J | jnl |
Comput. J.
|
| 2022 | B | conf |
IEEE Big Data
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
CNS
|
| 2022 | J | jnl |
Int. J. Intell. Syst.
|
| 2022 | J | jnl |
IEEE Trans. Artif. Intell.
|
| 2022 | J | jnl |
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
Int. J. Intell. Syst.
|
| 2022 | — | conf |
CollaborateCom (2)
|
| 2022 | — | conf |
HPCC/DSS/SmartCity/DependSys
|
| 2022 | J | jnl |
Cybersecur.
|
| 2022 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2022 | J | jnl |
ACM J. Data Inf. Qual.
|
| 2022 | J | jnl |
J. Netw. Comput. Appl.
|
| 2021 | J | jnl |
Int. J. Intell. Syst.
|
| 2021 | J | jnl |
ACM Trans. Internet Techn.
|
| 2021 | J | jnl |
IEEE Internet Things J.
|
| 2021 | J | jnl |
Int. J. Distributed Sens. Networks
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Trans. Netw. Sci. Eng.
|
| 2021 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2021 | J | jnl |
IEEE Trans. Intell. Transp. Syst.
|
| 2021 | J | jnl |
Int. J. Netw. Manag.
|
| 2021 | J | jnl |
IEEE Trans. Netw. Sci. Eng.
|
| 2021 | J | jnl |
IEEE Trans. Intell. Transp. Syst.
|
| 2021 | J | jnl |
Secur. Commun. Networks
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Inf. Sci.
|
| 2020 | J | jnl |
IEEE Trans. Fuzzy Syst.
|
| 2020 | — | conf |
CyberC
|
| 2020 | — | conf |
FCS
|
| 2020 | — | conf |
CollaborateCom (1)
|
| 2020 | J | jnl |
Frontiers Comput. Sci.
|
| 2020 | J | jnl |
J. Syst. Softw.
|
| 2020 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2020 | J | jnl |
Inf. Sci.
|
| 2020 | J | jnl |
Future Gener. Comput. Syst.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Trans. Comput. Soc. Syst.
|
| 2020 | — | conf |
NLPCC (1)
|
| 2020 | J | jnl |
IEEE Internet Things J.
|
| 2019 | B | conf |
NSS
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | B | conf |
NSS
|
| 2019 | J | jnl |
Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions.
IEEE Access
|
| 2019 | — | conf |
ACM TUR-C
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
J. Inf. Secur. Appl.
|
| 2019 | J | jnl |
J. Ambient Intell. Humaniz. Comput.
|
| 2019 | J | jnl |
Frontiers Comput. Sci.
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | — | conf |
SocialSec
|
| 2019 | J | jnl |
IEEE Trans. Comput. Soc. Syst.
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
ACM Trans. Intell. Syst. Technol.
|
| 2018 | J | jnl |
Inf. Sci.
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2018 | — | conf |
ICCCS (2)
|
| 2018 | J | jnl |
IEEE Trans. Intell. Transp. Syst.
|
| 2018 | — | conf |
ICDIS
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
World Wide Web
|
| 2018 | J | jnl |
Ad Hoc Networks
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | — | conf |
ESORICS (2)
|
| 2018 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2018 | — | conf |
PAKDD (3)
|
| 2018 | C | conf |
PDCAT
|
| 2017 | J | jnl |
Future Gener. Comput. Syst.
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | J | jnl |
Bioinform.
|
| 2016 | — | conf |
HCC
|
| 2016 | C | conf |
SecureComm
|
| 2016 | — | conf |
Trustcom/BigDataSE/ISPA
|
| 2016 | — | conf |
SCC@AsiaCCS
|
| 2015 | J | jnl |
IET Inf. Secur.
|
| 2015 | C | conf |
IPCCC
|
| 2015 | J | jnl |
Comput. Hum. Behav.
|
| 2015 | A* | conf |
CCS
|
| 2014 | J | jnl |
Knowl. Based Syst.
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2014 | J | jnl |
CoRR
|
| 2012 | J | jnl |
IEEE Netw.
|
| 2011 | — | conf |
IFIPTM
|
| 2011 | Misc | conf |
SAC
|
| 2011 | J | jnl |
IEEE Netw.
|
| 2010 | Misc | conf |
ICISS
|
| 2010 | A* | conf |
ICDM
|
| 2010 | — | conf |
ADMA (1)
|
| 2009 | A* | conf |
WWW
|
| 2009 | — | conf |
ISPAN
|
| 2009 | A | conf |
RAID
|
| 2009 | J | jnl |
J. Syst. Softw.
|
| 2009 | — | conf |
EGC
|
| 2009 | J | jnl |
J. Netw. Comput. Appl.
|
| 2009 | — | conf |
EGC
|
| 2009 | J | jnl |
CoRR
|
| 2008 | C | conf |
CRiSIS
|
| 2008 | J | jnl |
Comput. Commun.
|
| 2007 | — | conf |
Security and Management
|
| 2006 | B | conf |
ARES
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2004 | — | conf |
ISNN (2)
|
| 2004 | — | conf |
CDC
|