| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2026 | J | jnl |
Pattern Recognit.
|
| 2025 | A* | conf |
ACM Multimedia
|
| 2025 | J | jnl |
Appl. Soft Comput.
|
| 2025 | A* | conf |
ACM Multimedia
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
Int. J. Comput. Vis.
|
| 2025 | A* | conf |
ACM Multimedia
|
| 2025 | J | jnl |
IEEE Trans. Circuits Syst. Video Technol.
|
| 2024 | J | jnl |
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks.
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | A* | conf |
ICLR
|
| 2024 | — | conf |
ECCV (8)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
GECCO Companion
|
| 2023 | J | jnl |
IEEE Trans. Emerg. Top. Comput. Intell.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
ACM Comput. Surv.
|
| 2023 | A* | conf |
NeurIPS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
ACM Trans. Multim. Comput. Commun. Appl.
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | conf |
IJCAI
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
ECCV (15)
|
| 2022 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Trans. Artif. Intell.
|
| 2021 | J | jnl |
Pattern Recognit. Lett.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2020 | B | conf |
ICPR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | B | conf |
ICPR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
IEEE Access
|
| 2017 | — | conf |
APSEC Workshops
|
| 2017 | — | conf |
WASA
|