| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
EMNLP
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2025 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Who Grants the Agent Power? Defending Against Instruction Injection via Task-Centric Access Control.
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | A* | conf |
SP
|
| 2024 | J | jnl |
CoRR
|
| 2023 | A* | conf |
WWW
|
| 2023 | A* | conf |
ICSE
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
SaTS@CCS
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
|
| 2021 | A* | conf |
AAAI
|
| 2021 | J | jnl |
CoRR
|
| 2018 | — | conf |
ISSCC
|
| 2017 | — | conf |
ESSCIRC
|
| 2016 | J | jnl |
J. Adv. Comput. Intell. Intell. Informatics
|
| 2016 | B | conf |
CEC
|
| 2015 | — | conf |
TAAI
|
| 2015 | C | conf |
ISCAS
|
| 2014 | — | conf |
DySPAN
|
| 2014 | J | jnl |
IEEE Netw.
|
| 2013 | B | conf |
WCNC
|
| 2013 | J | jnl |
Comput. Networks
|
| 2012 | — | conf |
ICC
|