Computer Journal

Papers
(The median citation count of Computer Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model73
An Advanced EEG Motion Artifacts Eradication Algorithm61
A Hybrid-Convolution Spatial–Temporal Recurrent Network For Traffic Flow Prediction55
A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social Networks42
Automated Detection of Oral Pre-Cancerous Tongue Lesions Using Deep Learning for Early Diagnosis of Oral Cavity Cancer37
Computational Prediction of Cervical Cancer Diagnosis Using Ensemble-Based Classification Algorithm36
Deep Neural Network for Disease Detection in Rice Plant Using the Texture and Deep Features34
Corporate Bankruptcy Prediction: An Approach Towards Better Corporate World34
Energy-Efficient Cluster-Based Routing Protocol for WSN Based on Hybrid BSO–TLBO Optimization Model33
DeepSTF: A Deep Spatial–Temporal Forecast Model of Taxi Flow32
Enabling Smart City With Intelligent Congestion Control Using Hops With a Hybrid Computational Approach30
A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset28
Virtual Block Group: A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table23
Adaptive IoT Empowered Smart Road Traffic Congestion Control System Using Supervised Machine Learning Algorithm23
Severity Level Classification of Brain Tumor based on MRI Images using Fractional-Chicken Swarm Optimization Algorithm22
Improved Hybrid Bag-Boost Ensemble With K-Means-SMOTE–ENN Technique for Handling Noisy Class Imbalanced Data22
Computational Model for Prediction of Malignant Mesothelioma Diagnosis21
Deep Belief Network and Closed Polygonal Line for Lung Segmentation in Chest Radiographs21
Breast Cancer Diagnosis Using Multi-Stage Weight Adjustment In The MLP Neural Network21
A Modern View on Forward Security19
A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions19
Spatiotemporal Clustering and Analysis of Road Accident Hotspots by Exploiting GIS Technology and Kernel Density Estimation16
Non-negative Matrix Factorization: A Survey15
Strong Menger Connectedness of Augmented k-ary n-cubes15
A Novel CMA+DD_LMS Blind Equalization Algorithm for Underwater Acoustic Communication14
The Notion of Transparency Order, Revisited14
Efficient Group ID-Based Encryption With Equality Test Against Insider Attack14
Deep Learning-based Sentiment Analysis of Facebook Data: The Case of Turkish Users13
A Federated Learning Approach for Privacy Protection in Context-Aware Recommender Systems13
Long Multi-digit Number Recognition from Images Empowered by Deep Convolutional Neural Networks12
Fast Learning Through Deep Multi-Net CNN Model For Violence Recognition In Video Surveillance12
A Blockchain-Based Framework for IoT Data Monetization Services12
RGIM: An Integrated Approach to Improve QoS in AODV, DSR and DSDV Routing Protocols for FANETS Using the Chain Mobility Model12
Adaptive Laplacian Support Vector Machine for Semi-supervised Learning11
The Component Diagnosability of Hypercubes with Large-Scale Faulty Nodes11
CWOA: Hybrid Approach for Task Scheduling in Cloud Environment11
Lung Cancer Detection and Severity Level Classification Using Sine Cosine Sail Fish Optimization Based Generative Adversarial Network with CT Images11
A Machine Learning-Based Model to Evaluate Readability and Assess Grade Level for the Web Pages10
Pattern Matching Model for Recognition of Stone Inscription Characters10
Smart Affect Recognition System for Real-Time Biometric Surveillance Using Hybrid Features and Multilayered Binary Structured Support Vector Machine10
Reliability of DQcube Based on g-Extra Conditional Fault10
Performance Improvement Of Pre-trained Convolutional Neural Networks For Action Recognition10
A Random Forest Classification Algorithm Based Personal Thermal Sensation Model for Personalized Conditioning System in Office Buildings10
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage10
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation10
Review-Based Recommender Systems: A Proposed Rating Prediction Scheme Using Word Embedding Representation of Reviews10
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing9
A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree9
Artificial Bee Colony–Based Feature Selection Algorithm for Cyberbullying9
Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm9
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search9
On The (k,t)-Metric Dimension Of Graphs9
Wrapper-Enabled Feature Selection and CPLM-Based NARX Model for Stock Market Prediction8
The Reliability ofk-Aryn-Cube Based on Component Connectivity8
Destination Image Recognition And Emotion Analysis: Evidence From User-Generated Content Of Online Travel Communities8
The Conditional Reliability Evaluation of Data Center Network BCDC8
Hitting Times for Random Walks on Sierpiński Graphs and Hierarchical Graphs8
A Survey of Privacy Solutions using Blockchain for Recommender Systems: Current Status, Classification and Open Issues8
Fog–Cloud Assisted IoT-Based Hierarchical Approach For Controlling Dengue Infection8
A Fuzzy Inference-Based Decision Support System for Disease Diagnosis8
A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks8
Machine Learning Model for Multi-View Visualization of Medical Images8
Local Pollination-Based Moth Search Algorithm for Task-Scheduling Heterogeneous Cloud Environment8
Deep Extreme Learning Machine-Based Optical Character Recognition System for Nastalique Urdu-Like Script Languages8
A Cotton Disease Diagnosis Method Using a Combined Algorithm of Case-Based Reasoning and Fuzzy Logic8
Computer-Aided Diagnosis System for Chronic Obstructive Pulmonary Disease Using Empirical Wavelet Transform on Auscultation Sounds8
A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search7
Learning Saliency-Aware Correlation Filters for Visual Tracking7
Novel Public-Key Encryption with Continuous Leakage Amplification7
Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud7
Sentiment Analysis of Fast Food Companies With Deep Learning Models7
LEDet: A Single-Shot Real-Time Object Detector Based on Low-Light Image Enhancement7
Proposed Artificial Bee Colony Algorithm as Feature Selector to Predict the Leadership Perception of Site Managers7
A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition7
An Efficient Algorithm to Extract Control Flow-Based Features for IoT Malware Detection7
Performance Evaluation of Learning Models for Identification of Suicidal Thoughts7
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network7
F2SO: An Energy Efficient Cluster Based Routing Protocol Using Fuzzy Firebug Swarm Optimization Algorithm in WSN7
Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network7
A Divide & Conquer Approach to Leads-to Model Checking7
A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs7
IoT Data Quality Issues and Potential Solutions: A Literature Review7
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors7
An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction7
Identifying Influential Nodes in Complex Networks Based on Neighborhood Entropy Centrality6
‘Will I Regret for This Tweet?’—Twitter User’s Behavior Analysis System for Private Data Disclosure6
Early Diabetes Discovery From Tongue Images6
Joining Formal Concept Analysis to Feature Extraction for Data Pruning in Cloud of Things6
A New Ensemble Approach for Congestive Heart Failure and Arrhythmia Classification Using Shifted One-Dimensional Local Binary Patterns with Long Short-Term Memory6
Object Detection and Localization Using Sparse-FCM and Optimization-driven Deep Convolutional Neural Network6
A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet6
A Decision Tree Ensemble Model for Predicting Bus Bunching6
Learning Representation From Concurrence-Words Graph For Aspect Sentiment Classification6
Knee Muscle Force Estimating Model Using Machine Learning Approach6
Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin6
A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification6
Reliability Analysis of Alternating Group Graphs and Split-Stars6
Prediction of Stock Prices Using Statistical and Machine Learning Models: A Comparative Analysis6
An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study6
Double-Layer Network Negative Public Opinion Information Propagation Modeling Based on Continuous-Time Markov Chain6
Efficient Multi-Signature Scheme Using Lattice6
Robust Anomaly Detection in Feature-Evolving Time Series6
A Novel Hybrid UE Selection Scheme for Efficient Data Offloading Using D2D Communication6
MeSH-Based Semantic Indexing Approach to Enhance Biomedical Information Retrieval6
Optimal Text Document Clustering Enabled by Weighed Similarity Oriented Jaya With Grey Wolf Optimization Algorithm6
The Relationship Between theg-Extra Connectivity and theg-Extra Diagnosability of Networks Under the MM* Model6
Redis-Based Messaging Queue and Cache-Enabled Parallel Processing Social Media Analytics Framework6
Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies6
Blockchain-Based Internet-of-Things for Secure Transmission of Medical Data in Rural Areas6
Palmprint for Individual’s Personality Behavior Analysis5
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things5
A proposed framework for cloud-aware multimodal multimedia big data analysis toward optimal resource allocation5
Ant Cat Swarm Optimization-Enabled Deep Recurrent Neural Network for Big Data Classification Based on Map Reduce Framework5
SkySlide: A Hybrid Method for Landslide Susceptibility Assessment based on Landslide-Occurring Data Only5
Aging Facial Recognition for Feature Extraction Using Adaptive Fully Recurrent Deep Neural Learning5
Tourists’ Digital Footprint: Prediction Method of Tourism Consumption Decision Preference5
Potential of Machine Learning Based Support Vector Regression for Solar Radiation Prediction5
Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory5
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints5
Software Testing Automation of VR-Based Systems With Haptic Interfaces5
New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT5
Approximate String Matching with SIMD5
An Optimized k-means Algorithm Based on Information Entropy5
MDER: Multi-Dimensional Event Recommendation in Social Media Context5
On Performance Improvement Of Reversible Data Hiding With Contrast Enhancement5
Cryptanalysis of Modular Exponentiation Outsourcing Protocols5
Deep Learning in Age-invariant Face Recognition: A Comparative Study5
Intelligent Computing: Knowledge Acquisition Method Based on the Management Scale Transformation5
On the Behaviour of p -Adic Scaled Space Filling Curve Indices for High-Dimensional Data4
The 3-Extra Connectivity of the Data Center Network BCube4
Querying Tenuous Group in Attributed Networks4
A Virtual Network Embedding Algorithm Based On Double-Layer Reinforcement Learning4
Evaluating Membership Inference Through Adversarial Robustness4
Practical Attacks of Round-Reduced SIMON Based on Deep Learning4
Minimum Status, Matching and Domination of Graphs4
Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things4
Be Scalable and Rescue My Slices During Reconfiguration4
Underwater Image Enhancement With Optimal Histogram Using Hybridized Particle Swarm and Dragonfly4
Automated Computer-Aided Diagnosis of Diabetic Retinopathy Based on Segmentation and Classification using K-nearest neighbor algorithm in retinal images4
Central Station-Based Demand Prediction for Determining Target Inventory in a Bike-Sharing System4
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers4
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM94
Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews4
Hybrid-based Deep Belief Network Model for Cement Compressive Strength Prediction4
A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm4
Fog-assisted Energy Efficient Cyber Physical System for Panic-based Evacuation during Disasters4
Linearly Homomorphic Signatures from Lattices4
Adaptive Federated Learning With Non-IID Data4
Neural-Aided Statistical Attack for Cryptanalysis4
Pulmonary Lung Nodule Detection from Computed Tomography Images Using Two-Stage Convolutional Neural Network4
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning4
Semantic Analysis to Identify Students’ Feedback4
Robust and Dynamic Graph Convolutional Network For Multi-view Data Classification4
An Energy-Efficient Step-Counting Algorithm for Smartphones4
MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks4
Detecting Spam Product Reviews in Roman Urdu Script4
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-2564
Robust Image Hashing With Saliency Map And Sparse Model4
Lemuria: A Novel Future Crop Prediction Algorithm Using Data Mining4
Youtube Trending Videos: Boosting Machine Learning Results Using Exploratory Data Analysis4
Retrieving Semantic Image Using Shape Descriptors and Latent-Dynamic Conditional Random Fields4
Residual Closeness, Matching Number and Chromatic Number4
Algorithms Based on Path Contraction Carrying Weights for Enumerating Subtrees of Tricyclic Graphs4
Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules4
The Collision Avoidance and Situation-Aware Media Access Scheme Using the Registered-Backoff-Time Method for the IEEE 802.11ah-Based IoT Wireless Networks4
A Profit-maximizing Mechanism for Query-based Data Trading with Personalized Differential Privacy4
Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network4
SS6: Online Short-Code RAID-6 Scaling by Optimizing New Disk Location and Data Migration4
Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting4
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach4
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning4
White Matter, Gray Matter and Cerebrospinal Fluid Segmentation from Brain Magnetic Resonance Imaging Using Adaptive U-Net and Local Convolutional Neural Network4
Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model4
Optimization of Climatic Conditions Affecting Determination of the Amount of Water Needed by Plants in Relation to Their Life Cycle with Particle Swarm Optimization, and Determining the Optimum Irriga4
FLAKE: Fuzzy Graph Centrality-based Automatic Keyword Extraction4
Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model4
Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher4
An Efficient Deep Learning Approach To IoT Intrusion Detection4
Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs3
Robust Image Hashing Combining 3D Space Contour and Vector Angle Features3
Trust-aware Task Allocation in Collaborative Crowdsourcing Model3
Detection and Localization of Abnormalities in Surveillance Video Using Timerider-Based Neural Network3
Smaller Compressed Suffix Arrays†3
Detecting Urban Anomalies Using Factor Analysis and One Class Support Vector Machine3
Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data3
On the g-Extra Connectivity of the Enhanced Hypercubes3
Improving Bitcoin Transaction Propagation Efficiency through Local Clique Network3
Coordinate Graph Grammar for the Specification of Spatial Graphs3
Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks3
CMT: An Efficient Algorithm for Scalable Packet Classification3
Rider-Rank Algorithm-Based Feature Extraction for Re-ranking the Webpages in the Search Engine3
Detecting Cognitive Features of Videos Using EEG Signal3
Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding3
Precise Point Set Registration Based on Feature Fusion3
Blockchain-based Fair and Decentralized Data Trading Model3
Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study3
A Novel Approach for Determining Meal Plan for Gestational Diabetes Mellitus Using Artificial Intelligence3
Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons3
A Generic Analogy-Centered Software Cost Estimation Based on Differential Evolution Exploration Process3
A Trust Framework Utilization in Cloud Computing Environment Based on Multi-criteria Decision-Making Methods3
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures3
Gaze Estimation Using Neural Network And Logistic Regression3
Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance3
A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images3
Performance Analysis of Prioritization and Contention Control Algorithm in Wireless Body Area Networks3
Multichannel Ordered Contention MAC Protocol For Underwater Wireless Sensor Networks3
Text Summarization as a Multi-objective Optimization Task: Applying Harmony Search to Extractive Multi-Document Summarization3
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems3
Privacy-Aware Image Authentication from Cryptographic Primitives3
Behavior Analysis-Based IoT Services For Crowd Management3
Prognosis and Prediction of Breast Cancer Using Machine Learning and Ensemble-Based Training Model3
Salient Object Detection Based on Multiscale Segmentation and Fuzzy Broad Learning3
Border Collie Cat Optimization for Intrusion Detection System in Healthcare IoT Network Using Deep Recurrent Neural Network3
Measuring and Evaluating the Visual Complexity Of Chinese Ink Paintings3
An Optimized Deep Belief Network for Land Cover Classification Using Synthetic-Aperture Radar Images and Landsat Images3
Multi-View Spatial–Temporal Graph Neural Network for Traffic Prediction3
Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm3
QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives3
Co-simulation and Formal Verification of Co-operative Drone Control With Logic-Based Specifications3
Character Recognition Algorithm Based on Fusion Probability Model and Deep Learning3
Rumor Identification and Verification for Text in Social Media Content3
Optimal Slack Stealing Servicing for Real-Time Energy Harvesting Systems3
Urdu Named Entity Recognition System Using Deep Learning Approaches3
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model3
Optimization of Data Assignment for Parallel Processing in a Hybrid Heterogeneous Environment Using Integer Linear Programming3
COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis3
Enriching Topic Coherence on Reviews for Cross-Domain Recommendation3
From Relation Algebra to Semi-join Algebra: An Approach to Graph Query Optimization3
Private Set Operations Over Encrypted Cloud Dataset and Applications3
Determining Exact Solutions for Structural Parameters on Hierarchical Networks With Density Feature3
OUP accepted manuscript3
An Ensemble-Based Credit Card Fraud Detection Algorithm Using an Efficient Voting Strategy3
Reusable Fuzzy Extractor Based on the LPN Assumption3
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services3
Multi-view Dynamic Heterogeneous Information Network Embedding3
A One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability3
Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features3
A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking3
An Attention Enhanced Cross-Modal Image–Sound Mutual Generation Model for Birds3
Quantum Attacks on 1K-AES and PRINCE3
Interference and Coverage Modeling for Indoor Terahertz Communications with Beamforming Antennas3
Multispectral Palm Print and Palm Vein Acquisition Platform and Recognition Method Based on Convolutional Neural Network2
Auto-Scale Resource Provisioning In IaaS Clouds2
A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications2
Compression with Wildcards: From CNFs to Orthogonal DNFs by Imposing the Clauses One-by-One2
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning2
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks2
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud2
Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network2
Multi-key Fully Homomorphic Encryption from Additive Homomorphism2
0.027688026428223