| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2024 | J | jnl |
Unsupervised contaminated user profile identification against shilling attack in recommender system.
Intell. Data Anal.
|
| 2022 | J | jnl |
A concealed poisoning attack to reduce deep neural networks' robustness against adversarial samples.
Inf. Sci.
|
| 2021 | J | jnl |
Int. J. Mach. Learn. Cybern.
|
| 2018 | J | jnl |
Int. J. Mach. Learn. Cybern.
|
| 2018 | Misc | conf |
ICMLC
|
| 2015 | — | conf |
MCS
|
| 2015 | J | jnl |
Quantification of side-channel information leaks based on data complexity measures for web browsing.
Int. J. Mach. Learn. Cybern.
|
| 2014 | J | jnl |
Inf. Sci.
|
| 2012 | Misc | conf |
ICMLC
|
| 2011 | Misc | conf |
ICMLC
|
| 2010 | Misc | conf |
ICMLC
|
| 2010 | B | conf |
SMC
|