Computer Journal

Papers
(The median citation count of Computer Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-07-01 to 2024-07-01.)
ArticleCitations
Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model84
An Advanced EEG Motion Artifacts Eradication Algorithm80
A Hybrid-Convolution Spatial–Temporal Recurrent Network For Traffic Flow Prediction58
A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social Networks45
Automated Detection of Oral Pre-Cancerous Tongue Lesions Using Deep Learning for Early Diagnosis of Oral Cavity Cancer44
Computational Prediction of Cervical Cancer Diagnosis Using Ensemble-Based Classification Algorithm39
Deep Neural Network for Disease Detection in Rice Plant Using the Texture and Deep Features38
DeepSTF: A Deep Spatial–Temporal Forecast Model of Taxi Flow36
Energy-Efficient Cluster-Based Routing Protocol for WSN Based on Hybrid BSO–TLBO Optimization Model34
Enabling Smart City With Intelligent Congestion Control Using Hops With a Hybrid Computational Approach30
A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset28
Improved Hybrid Bag-Boost Ensemble With K-Means-SMOTE–ENN Technique for Handling Noisy Class Imbalanced Data27
Severity Level Classification of Brain Tumor based on MRI Images using Fractional-Chicken Swarm Optimization Algorithm24
Breast Cancer Diagnosis Using Multi-Stage Weight Adjustment In The MLP Neural Network23
Deep Belief Network and Closed Polygonal Line for Lung Segmentation in Chest Radiographs21
Computational Model for Prediction of Malignant Mesothelioma Diagnosis21
A Modern View on Forward Security20
A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions19
Non-negative Matrix Factorization: A Survey18
A Federated Learning Approach for Privacy Protection in Context-Aware Recommender Systems18
Fast Learning Through Deep Multi-Net CNN Model For Violence Recognition In Video Surveillance17
The Notion of Transparency Order, Revisited15
Deep Learning-based Sentiment Analysis of Facebook Data: The Case of Turkish Users15
Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm15
Efficient Group ID-Based Encryption With Equality Test Against Insider Attack14
A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition13
Long Multi-digit Number Recognition from Images Empowered by Deep Convolutional Neural Networks13
A Blockchain-Based Framework for IoT Data Monetization Services13
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage12
Adaptive Laplacian Support Vector Machine for Semi-supervised Learning12
The Component Diagnosability of Hypercubes with Large-Scale Faulty Nodes11
A Random Forest Classification Algorithm Based Personal Thermal Sensation Model for Personalized Conditioning System in Office Buildings11
A Machine Learning-Based Model to Evaluate Readability and Assess Grade Level for the Web Pages11
Smart Affect Recognition System for Real-Time Biometric Surveillance Using Hybrid Features and Multilayered Binary Structured Support Vector Machine11
Lung Cancer Detection and Severity Level Classification Using Sine Cosine Sail Fish Optimization Based Generative Adversarial Network with CT Images11
CWOA: Hybrid Approach for Task Scheduling in Cloud Environment11
Prediction of Stock Prices Using Statistical and Machine Learning Models: A Comparative Analysis10
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation10
Computer-Aided Diagnosis System for Chronic Obstructive Pulmonary Disease Using Empirical Wavelet Transform on Auscultation Sounds10
Pattern Matching Model for Recognition of Stone Inscription Characters10
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing10
A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree9
A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs9
A Fuzzy Inference-Based Decision Support System for Disease Diagnosis9
An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction9
Learning Saliency-Aware Correlation Filters for Visual Tracking9
The Conditional Reliability Evaluation of Data Center Network BCDC9
F2SO: An Energy Efficient Cluster Based Routing Protocol Using Fuzzy Firebug Swarm Optimization Algorithm in WSN9
A Survey of Privacy Solutions using Blockchain for Recommender Systems: Current Status, Classification and Open Issues9
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network9
The Reliability ofk-Aryn-Cube Based on Component Connectivity8
Destination Image Recognition And Emotion Analysis: Evidence From User-Generated Content Of Online Travel Communities8
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search8
Machine Learning Model for Multi-View Visualization of Medical Images8
Performance Evaluation of Learning Models for Identification of Suicidal Thoughts8
A Cotton Disease Diagnosis Method Using a Combined Algorithm of Case-Based Reasoning and Fuzzy Logic8
Sentiment Analysis of Fast Food Companies With Deep Learning Models8
Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network8
IoT Data Quality Issues and Potential Solutions: A Literature Review8
On Performance Improvement Of Reversible Data Hiding With Contrast Enhancement8
A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks8
Wrapper-Enabled Feature Selection and CPLM-Based NARX Model for Stock Market Prediction8
LEDet: A Single-Shot Real-Time Object Detector Based on Low-Light Image Enhancement7
A Divide & Conquer Approach to Leads-to Model Checking7
Efficient Multi-Signature Scheme Using Lattice7
Novel Public-Key Encryption with Continuous Leakage Amplification7
Learning Representation From Concurrence-Words Graph For Aspect Sentiment Classification7
Robust Anomaly Detection in Feature-Evolving Time Series7
An Efficient Algorithm to Extract Control Flow-Based Features for IoT Malware Detection7
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors7
Proposed Artificial Bee Colony Algorithm as Feature Selector to Predict the Leadership Perception of Site Managers7
Blockchain-Based Internet-of-Things for Secure Transmission of Medical Data in Rural Areas7
Identifying Influential Nodes in Complex Networks Based on Neighborhood Entropy Centrality7
Knee Muscle Force Estimating Model Using Machine Learning Approach7
A New Ensemble Approach for Congestive Heart Failure and Arrhythmia Classification Using Shifted One-Dimensional Local Binary Patterns with Long Short-Term Memory7
The 3-Extra Connectivity of the Data Center Network BCube6
Lemuria: A Novel Future Crop Prediction Algorithm Using Data Mining6
A proposed framework for cloud-aware multimodal multimedia big data analysis toward optimal resource allocation6
A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm6
Reliability Analysis of Alternating Group Graphs and Split-Stars6
Optimal Text Document Clustering Enabled by Weighed Similarity Oriented Jaya With Grey Wolf Optimization Algorithm6
Automated Computer-Aided Diagnosis of Diabetic Retinopathy Based on Segmentation and Classification using K-nearest neighbor algorithm in retinal images6
Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies6
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning6
Central Station-Based Demand Prediction for Determining Target Inventory in a Bike-Sharing System6
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things6
MeSH-Based Semantic Indexing Approach to Enhance Biomedical Information Retrieval6
Potential of Machine Learning Based Support Vector Regression for Solar Radiation Prediction6
Linearly Homomorphic Signatures from Lattices6
The Relationship Between theg-Extra Connectivity and theg-Extra Diagnosability of Networks Under the MM* Model6
Object Detection and Localization Using Sparse-FCM and Optimization-driven Deep Convolutional Neural Network6
Detecting Urban Anomalies Using Factor Analysis and One Class Support Vector Machine6
An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study6
Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model6
An Ensemble-Based Credit Card Fraud Detection Algorithm Using an Efficient Voting Strategy6
Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin6
MDER: Multi-Dimensional Event Recommendation in Social Media Context6
A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification6
Joining Formal Concept Analysis to Feature Extraction for Data Pruning in Cloud of Things6
Redis-Based Messaging Queue and Cache-Enabled Parallel Processing Social Media Analytics Framework6
Robust Image Hashing With Saliency Map And Sparse Model6
A Decision Tree Ensemble Model for Predicting Bus Bunching6
A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet6
An Optimized k-means Algorithm Based on Information Entropy5
Adaptive Federated Learning With Non-IID Data5
Underwater Image Enhancement With Optimal Histogram Using Hybridized Particle Swarm and Dragonfly5
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures5
Behavior Analysis-Based IoT Services For Crowd Management5
Measuring and Evaluating the Visual Complexity Of Chinese Ink Paintings5
SkySlide: A Hybrid Method for Landslide Susceptibility Assessment based on Landslide-Occurring Data Only5
Intelligent Computing: Knowledge Acquisition Method Based on the Management Scale Transformation5
Detecting Spam Product Reviews in Roman Urdu Script5
Evaluating Membership Inference Through Adversarial Robustness5
Pulmonary Lung Nodule Detection from Computed Tomography Images Using Two-Stage Convolutional Neural Network5
Algorithms Based on Path Contraction Carrying Weights for Enumerating Subtrees of Tricyclic Graphs5
Border Collie Cat Optimization for Intrusion Detection System in Healthcare IoT Network Using Deep Recurrent Neural Network5
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach5
Urdu Named Entity Recognition System Using Deep Learning Approaches5
Residual Closeness, Matching Number and Chromatic Number5
Ant Cat Swarm Optimization-Enabled Deep Recurrent Neural Network for Big Data Classification Based on Map Reduce Framework5
Deep Learning in Age-invariant Face Recognition: A Comparative Study5
Determining Exact Solutions for Structural Parameters on Hierarchical Networks With Density Feature5
An Efficient Deep Learning Approach To IoT Intrusion Detection5
Prognosis and Prediction of Breast Cancer Using Machine Learning and Ensemble-Based Training Model5
SS6: Online Short-Code RAID-6 Scaling by Optimizing New Disk Location and Data Migration5
Tourists’ Digital Footprint: Prediction Method of Tourism Consumption Decision Preference5
Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting5
Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory5
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints5
Cryptanalysis of Modular Exponentiation Outsourcing Protocols5
Aging Facial Recognition for Feature Extraction Using Adaptive Fully Recurrent Deep Neural Learning5
Approximate String Matching with SIMD5
A Virtual Network Embedding Algorithm Based On Double-Layer Reinforcement Learning5
An Energy-Efficient Step-Counting Algorithm for Smartphones4
MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks4
White Matter, Gray Matter and Cerebrospinal Fluid Segmentation from Brain Magnetic Resonance Imaging Using Adaptive U-Net and Local Convolutional Neural Network4
On the g-Extra Connectivity of the Enhanced Hypercubes4
Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher4
Improved Tactile Perception of 3D Geometric Bumps Using Coupled Electrovibration and Mechanical Vibration Stimuli4
Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules4
An Educational Data Mining System For Predicting And Enhancing Tertiary Students’ Programming Skill4
Gaze Estimation Using Neural Network And Logistic Regression4
FLAKE: Fuzzy Graph Centrality-based Automatic Keyword Extraction4
Neural-Aided Statistical Attack for Cryptanalysis4
Practical Attacks of Round-Reduced SIMON Based on Deep Learning4
A Generic Analogy-Centered Software Cost Estimation Based on Differential Evolution Exploration Process4
Rumor Identification and Verification for Text in Social Media Content4
Be Scalable and Rescue My Slices During Reconfiguration4
Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews4
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM94
COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis4
CMT: An Efficient Algorithm for Scalable Packet Classification4
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers4
Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network4
Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks4
Querying Tenuous Group in Attributed Networks4
Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons4
Retrieving Semantic Image Using Shape Descriptors and Latent-Dynamic Conditional Random Fields4
Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network4
Semantic Analysis to Identify Students’ Feedback4
Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things4
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning4
Optimization of Climatic Conditions Affecting Determination of the Amount of Water Needed by Plants in Relation to Their Life Cycle with Particle Swarm Optimization, and Determining the Optimum Irriga4
Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model4
Youtube Trending Videos: Boosting Machine Learning Results Using Exploratory Data Analysis4
A Profit-maximizing Mechanism for Query-based Data Trading with Personalized Differential Privacy4
On the Behaviour of p -Adic Scaled Space Filling Curve Indices for High-Dimensional Data4
Hybrid-based Deep Belief Network Model for Cement Compressive Strength Prediction4
Robust Image Hashing Combining 3D Space Contour and Vector Angle Features4
Hybrid Multi-Channel EEG Filtering Method for Ocular and Muscular Artifact Removal Based on the 3D Spline Interpolation Technique4
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning4
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks4
The Collision Avoidance and Situation-Aware Media Access Scheme Using the Registered-Backoff-Time Method for the IEEE 802.11ah-Based IoT Wireless Networks4
Fog-assisted Energy Efficient Cyber Physical System for Panic-based Evacuation during Disasters4
Robust and Dynamic Graph Convolutional Network For Multi-view Data Classification4
Detection and Localization of Abnormalities in Surveillance Video Using Timerider-Based Neural Network3
Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs3
Smart Multimedia Compressor—Intelligent Algorithms for Text and Image Compression3
Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data3
Lung Lobe Segmentation and Feature Extraction-Based Hierarchical Attention Network for COVID-19 Prediction from Chest X-Ray Images3
Text Summarization as a Multi-objective Optimization Task: Applying Harmony Search to Extractive Multi-Document Summarization3
Unlinkable and Revocable Secret Handshake3
Hamiltonian Properties of the Data Center Network HSDC with Faulty Elements3
Salient Object Detection Based on Multiscale Segmentation and Fuzzy Broad Learning3
Gambling Domain Name Recognition via Certificate and Textual Analysis3
Detecting Cognitive Features of Videos Using EEG Signal3
Work-Efficient Parallel Non-Maximum Suppression Kernels3
QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives3
A One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability3
Improving Science That Uses Code3
Interference and Coverage Modeling for Indoor Terahertz Communications with Beamforming Antennas3
A Novel Approach for Determining Meal Plan for Gestational Diabetes Mellitus Using Artificial Intelligence3
A Trust Framework Utilization in Cloud Computing Environment Based on Multi-criteria Decision-Making Methods3
Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm3
Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features3
Trust-aware Task Allocation in Collaborative Crowdsourcing Model3
On the Longest Common Cartesian Substring Problem3
Sensitivity Analysis of Conflicting Goals in the i* Goal Model3
Optimization of Data Assignment for Parallel Processing in a Hybrid Heterogeneous Environment Using Integer Linear Programming3
Multichannel Ordered Contention MAC Protocol For Underwater Wireless Sensor Networks3
Lost In Translation: Exposing Hidden Compiler Optimization Opportunities3
Improving Bitcoin Transaction Propagation Efficiency through Local Clique Network3
Private Set Operations Over Encrypted Cloud Dataset and Applications3
A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images3
Improving the Performance of Feature Selection Methods with Low-Sample-Size Data3
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT3
Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding3
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network3
Quantum Attacks on 1K-AES and PRINCE3
Multispectral Palm Print and Palm Vein Acquisition Platform and Recognition Method Based on Convolutional Neural Network3
L-graph Automata And Some Applications3
Blockchain-based Fair and Decentralized Data Trading Model3
Precise Point Set Registration Based on Feature Fusion3
Co-simulation and Formal Verification of Co-operative Drone Control With Logic-Based Specifications3
Optimal Slack Stealing Servicing for Real-Time Energy Harvesting Systems3
A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning3
Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study3
Chronological Sailfish Optimizer for Preserving Privacy in Cloud Based on Khatri-Rao Product3
Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance3
Privacy-Aware Image Authentication from Cryptographic Primitives3
Performance Analysis of Prioritization and Contention Control Algorithm in Wireless Body Area Networks3
Fault-Tolerant Strongly Hamiltonian Laceability and Hyper-Hamiltonian Laceability of Cayley Graphs Generated by Transposition Trees3
Multi-view Dynamic Heterogeneous Information Network Embedding3
A Statistical-Based Light-Weight Anomaly Detection Framework for Wireless Body Area Networks3
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems3
An Improved Unsegmented Phonocardiogram Classification Using Nonlinear Time Scattering Features3
OUP accepted manuscript3
An Optimized Deep Belief Network for Land Cover Classification Using Synthetic-Aperture Radar Images and Landsat Images3
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model3
Chinese RoBERTa Distillation For Emotion Classification3
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud3
A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications3
Differentially Private Publication For Correlated Non-Numerical Data3
Multi-key Fully Homomorphic Encryption from Additive Homomorphism3
A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking3
An Attention Enhanced Cross-Modal Image–Sound Mutual Generation Model for Birds3
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles3
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation2
A Modified Firefly Deep Ensemble for Microarray Data Classification2
Stable Communities Detection Method for Temporal Multiplex Graphs: Heterogeneous Social Network Case Study2
Robust Object Detection and Localization Using Semantic Segmentation Network2
A Novel Decision-Making Process for COVID-19 Fighting Based on Association Rules and Bayesian Methods2
Laser Beam Welded Aluminum-Titanium Dissimilar Sheet Metals: Neural Network Based Strength and Hardness Prediction Model2
A New Code-Based Blind Signature Scheme2
Multi-View Spatial–Temporal Graph Neural Network for Traffic Prediction2
Compression with Wildcards: From CNFs to Orthogonal DNFs by Imposing the Clauses One-by-One2
Structure Fault Tolerance of Exchanged Hypercube2
Global and Local Structure Preservation for Nonlinear High-dimensional Spectral Clustering2
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems2
Analysis on the Component Connectivity of Enhanced Hypercubes2
0.060009002685547