| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Intell. Serv. Robotics
|
| 2023 | J | jnl |
J. Digit. Imaging
|
| 2022 | — | conf |
SCIS/ISIS
|
| 2020 | J | jnl |
Int. J. Fuzzy Log. Intell. Syst.
|
| 2019 | J | jnl |
Int. J. Fuzzy Log. Intell. Syst.
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
IEEE Access
|
| 2017 | J | jnl |
Int. J. Fuzzy Log. Intell. Syst.
|
| 2017 | J | jnl |
J. Adv. Comput. Intell. Intell. Informatics
|
| 2017 | J | jnl |
Int. J. Fuzzy Syst.
|
| 2017 | J | jnl |
Int. J. Humanoid Robotics
|
| 2017 | J | jnl |
Int. J. Humanoid Robotics
|
| 2016 | — | conf |
ESSDERC
|
| 2016 | J | jnl |
Int. J. Fuzzy Log. Intell. Syst.
|
| 2015 | J | jnl |
J. Comput. Virol. Hacking Tech.
|
| 2015 | J | jnl |
Soft Comput.
|
| 2014 | — | conf |
SCIS&ISIS
|
| 2013 | J | jnl |
KSII Trans. Internet Inf. Syst.
|
| 2013 | — | conf |
URAI
|
| 2012 | — | conf |
RiTA
|
| 2012 | — | conf |
SCIS&ISIS
|
| 2011 | — | conf |
UCMA (2)
|
| 2011 | — | conf |
UCMA (2)
|
| 2011 | — | conf |
ICHIT (2)
|
| 2010 | J | jnl |
IEICE Trans. Commun.
|
| 2010 | — | conf |
A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment.
FGIT-FGCN (1)
|
| 2010 | — | conf |
FGIT-FGCN (1)
|
| 2010 | J | jnl |
Int. J. Fuzzy Log. Intell. Syst.
|
| 2010 | — | conf |
FGIT-FGCN (1)
|
| 2010 | — | conf |
FGIT-FGCN (1)
|
| 2009 | — | conf |
ICHIT
|
| 2009 | — | conf |
FGIT-FGCN
|
| 2008 | — | conf |
FGCN (2)
|
| 2008 | J | jnl |
J. Digit. Content Technol. its Appl.
|
| 2008 | — | conf |
Humanoids
|
| 2007 | — | conf |
FGCN (2)
|
| 2007 | — | conf |
ICCSA Workshops
|
| 2006 | J | jnl |
Int. J. Fuzzy Log. Intell. Syst.
|
| 2005 | J | jnl |
Int. J. Fuzzy Log. Intell. Syst.
|
| 2004 | J | jnl |
Fuzzy Sets Syst.
|
| 2003 | B | conf |
SMC
|
| 2000 | J | jnl |
Fuzzy Sets Syst.
|
| 1995 | A* | conf |
ICRA
|