Computer Journal

Papers
(The TQCC of Computer Journal is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model87
An Advanced EEG Motion Artifacts Eradication Algorithm81
A Hybrid-Convolution Spatial–Temporal Recurrent Network For Traffic Flow Prediction65
Automated Detection of Oral Pre-Cancerous Tongue Lesions Using Deep Learning for Early Diagnosis of Oral Cavity Cancer47
A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social Networks46
Deep Neural Network for Disease Detection in Rice Plant Using the Texture and Deep Features41
Computational Prediction of Cervical Cancer Diagnosis Using Ensemble-Based Classification Algorithm40
DeepSTF: A Deep Spatial–Temporal Forecast Model of Taxi Flow36
Energy-Efficient Cluster-Based Routing Protocol for WSN Based on Hybrid BSO–TLBO Optimization Model35
A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset31
Improved Hybrid Bag-Boost Ensemble With K-Means-SMOTE–ENN Technique for Handling Noisy Class Imbalanced Data30
Severity Level Classification of Brain Tumor based on MRI Images using Fractional-Chicken Swarm Optimization Algorithm27
A Federated Learning Approach for Privacy Protection in Context-Aware Recommender Systems23
Deep Belief Network and Closed Polygonal Line for Lung Segmentation in Chest Radiographs22
Computational Model for Prediction of Malignant Mesothelioma Diagnosis21
Non-negative Matrix Factorization: A Survey19
A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions19
Deep Learning-based Sentiment Analysis of Facebook Data: The Case of Turkish Users18
A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition18
Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm15
Long Multi-digit Number Recognition from Images Empowered by Deep Convolutional Neural Networks13
Adaptive Laplacian Support Vector Machine for Semi-supervised Learning13
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation13
An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction12
A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs12
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage12
A Random Forest Classification Algorithm Based Personal Thermal Sensation Model for Personalized Conditioning System in Office Buildings12
The Component Diagnosability of Hypercubes with Large-Scale Faulty Nodes12
Learning Saliency-Aware Correlation Filters for Visual Tracking12
Computer-Aided Diagnosis System for Chronic Obstructive Pulmonary Disease Using Empirical Wavelet Transform on Auscultation Sounds11
Lung Cancer Detection and Severity Level Classification Using Sine Cosine Sail Fish Optimization Based Generative Adversarial Network with CT Images11
CWOA: Hybrid Approach for Task Scheduling in Cloud Environment11
Pattern Matching Model for Recognition of Stone Inscription Characters11
Performance Evaluation of Learning Models for Identification of Suicidal Thoughts10
A New Ensemble Approach for Congestive Heart Failure and Arrhythmia Classification Using Shifted One-Dimensional Local Binary Patterns with Long Short-Term Memory10
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing10
A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree10
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network10
Prediction of Stock Prices Using Statistical and Machine Learning Models: A Comparative Analysis10
IoT Data Quality Issues and Potential Solutions: A Literature Review10
A Fuzzy Inference-Based Decision Support System for Disease Diagnosis10
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search10
A Survey of Privacy Solutions using Blockchain for Recommender Systems: Current Status, Classification and Open Issues9
LEDet: A Single-Shot Real-Time Object Detector Based on Low-Light Image Enhancement9
Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network9
Automated Computer-Aided Diagnosis of Diabetic Retinopathy Based on Segmentation and Classification using K-nearest neighbor algorithm in retinal images9
Learning Representation From Concurrence-Words Graph For Aspect Sentiment Classification9
F2SO: An Energy Efficient Cluster Based Routing Protocol Using Fuzzy Firebug Swarm Optimization Algorithm in WSN9
The Reliability ofk-Aryn-Cube Based on Component Connectivity8
Measuring and Evaluating the Visual Complexity Of Chinese Ink Paintings8
Potential of Machine Learning Based Support Vector Regression for Solar Radiation Prediction8
A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks8
Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model7
Proposed Artificial Bee Colony Algorithm as Feature Selector to Predict the Leadership Perception of Site Managers7
A Divide & Conquer Approach to Leads-to Model Checking7
Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting7
Efficient Multi-Signature Scheme Using Lattice7
Mobility and Security Aware Real-Time Task Scheduling in Fog-Cloud Computing for IoT Devices: A Fuzzy-Logic Approach7
Deep Learning in Age-invariant Face Recognition: A Comparative Study7
An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study7
Blockchain-Based Internet-of-Things for Secure Transmission of Medical Data in Rural Areas7
The 3-Extra Connectivity of the Data Center Network BCube7
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things7
Robust Anomaly Detection in Feature-Evolving Time Series7
Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin7
Object Detection and Localization Using Sparse-FCM and Optimization-driven Deep Convolutional Neural Network7
Detecting Urban Anomalies Using Factor Analysis and One Class Support Vector Machine7
Adaptive Federated Learning With Non-IID Data7
A proposed framework for cloud-aware multimodal multimedia big data analysis toward optimal resource allocation7
Identifying Influential Nodes in Complex Networks Based on Neighborhood Entropy Centrality7
Knee Muscle Force Estimating Model Using Machine Learning Approach7
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints7
Redis-Based Messaging Queue and Cache-Enabled Parallel Processing Social Media Analytics Framework6
Border Collie Cat Optimization for Intrusion Detection System in Healthcare IoT Network Using Deep Recurrent Neural Network6
Robust Image Hashing With Saliency Map And Sparse Model6
Quantum Attacks on 1K-AES and PRINCE6
An Optimized k-means Algorithm Based on Information Entropy6
Joining Formal Concept Analysis to Feature Extraction for Data Pruning in Cloud of Things6
A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification6
The Relationship Between theg-Extra Connectivity and theg-Extra Diagnosability of Networks Under the MM* Model6
An Efficient Deep Learning Approach To IoT Intrusion Detection6
An Ensemble-Based Credit Card Fraud Detection Algorithm Using an Efficient Voting Strategy6
A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet6
Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory6
A Virtual Network Embedding Algorithm Based On Double-Layer Reinforcement Learning6
A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm6
Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study6
Optimal Text Document Clustering Enabled by Weighed Similarity Oriented Jaya With Grey Wolf Optimization Algorithm6
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning6
An Educational Data Mining System For Predicting And Enhancing Tertiary Students’ Programming Skill6
Pulmonary Lung Nodule Detection from Computed Tomography Images Using Two-Stage Convolutional Neural Network6
Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost6
Linearly Homomorphic Signatures from Lattices6
Improving the Performance of Feature Selection Methods with Low-Sample-Size Data6
COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis6
Prognosis and Prediction of Breast Cancer Using Machine Learning and Ensemble-Based Training Model5
Robust and Dynamic Graph Convolutional Network For Multi-view Data Classification5
Lung Lobe Segmentation and Feature Extraction-Based Hierarchical Attention Network for COVID-19 Prediction from Chest X-Ray Images5
Residual Closeness, Matching Number and Chromatic Number5
Cryptanalysis of Modular Exponentiation Outsourcing Protocols5
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems5
Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network5
Detecting Spam Product Reviews in Roman Urdu Script5
Approximate String Matching with SIMD5
Gambling Domain Name Recognition via Certificate and Textual Analysis5
Underwater Image Enhancement With Optimal Histogram Using Hybridized Particle Swarm and Dragonfly5
Urdu Named Entity Recognition System Using Deep Learning Approaches5
Behavior Analysis-Based IoT Services For Crowd Management5
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT5
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks5
Neural-Aided Statistical Attack for Cryptanalysis5
Robust Image Hashing Combining 3D Space Contour and Vector Angle Features5
A Decision Tree Ensemble Model for Predicting Bus Bunching5
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers5
SS6: Online Short-Code RAID-6 Scaling by Optimizing New Disk Location and Data Migration5
Blockchain-based Fair and Decentralized Data Trading Model5
Optimization of Climatic Conditions Affecting Determination of the Amount of Water Needed by Plants in Relation to Their Life Cycle with Particle Swarm Optimization, and Determining the Optimum Irriga5
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network5
Ant Cat Swarm Optimization-Enabled Deep Recurrent Neural Network for Big Data Classification Based on Map Reduce Framework5
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning5
Aging Facial Recognition for Feature Extraction Using Adaptive Fully Recurrent Deep Neural Learning5
Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks5
Evaluating Membership Inference Through Adversarial Robustness5
Tourists’ Digital Footprint: Prediction Method of Tourism Consumption Decision Preference5
A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning4
Co-simulation and Formal Verification of Co-operative Drone Control With Logic-Based Specifications4
On the Longest Common Cartesian Substring Problem4
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM94
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation4
Fault-Tolerant Strongly Hamiltonian Laceability and Hyper-Hamiltonian Laceability of Cayley Graphs Generated by Transposition Trees4
Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher4
FLAKE: Fuzzy Graph Centrality-based Automatic Keyword Extraction4
Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features4
The Star-Structure Connectivity and Star-Substructure Connectivity of Hypercubes and Folded Hypercubes4
Gaze Estimation Using Neural Network And Logistic Regression4
The Collision Avoidance and Situation-Aware Media Access Scheme Using the Registered-Backoff-Time Method for the IEEE 802.11ah-Based IoT Wireless Networks4
Chinese RoBERTa Distillation For Emotion Classification4
Be Scalable and Rescue My Slices During Reconfiguration4
A Generic Analogy-Centered Software Cost Estimation Based on Differential Evolution Exploration Process4
MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks4
Chronological Sailfish Optimizer for Preserving Privacy in Cloud Based on Khatri-Rao Product4
CMT: An Efficient Algorithm for Scalable Packet Classification4
Youtube Trending Videos: Boosting Machine Learning Results Using Exploratory Data Analysis4
Hybrid Multi-Channel EEG Filtering Method for Ocular and Muscular Artifact Removal Based on the 3D Spline Interpolation Technique4
Detecting Cognitive Features of Videos Using EEG Signal4
Hybrid-based Deep Belief Network Model for Cement Compressive Strength Prediction4
L-graph Automata And Some Applications4
Practical Attacks of Round-Reduced SIMON Based on Deep Learning4
Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons4
Fog-assisted Energy Efficient Cyber Physical System for Panic-based Evacuation during Disasters4
Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things4
Rumor Identification and Verification for Text in Social Media Content4
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning4
Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews4
White Matter, Gray Matter and Cerebrospinal Fluid Segmentation from Brain Magnetic Resonance Imaging Using Adaptive U-Net and Local Convolutional Neural Network4
Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules4
On the g-Extra Connectivity of the Enhanced Hypercubes4
RSCOEWR: Radical-Based Sentiment Classification of Online Education Website Reviews4
Multispectral Palm Print and Palm Vein Acquisition Platform and Recognition Method Based on Convolutional Neural Network4
A Profit-maximizing Mechanism for Query-based Data Trading with Personalized Differential Privacy4
A Modified Firefly Deep Ensemble for Microarray Data Classification4
Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network4
On The Axioms Of Common Meadows: Fracterm Calculus, Flattening And Incompleteness4
An Optimized Deep Belief Network for Land Cover Classification Using Synthetic-Aperture Radar Images and Landsat Images4
Impact of COVID-19 on the Human Personality: An Analysis Based on Document Modeling Using Machine Learning Tools3
Structure Fault Tolerance of Exchanged Hypercube3
Enhancing Aspect Category Detection Through Hybridised Contextualised Neural Language Models: A Case Study In Multi-Label Text Classification3
Multi-View Spatial–Temporal Graph Neural Network for Traffic Prediction3
Ransomware Detection by Distinguishing API Call Sequences through LSTM and BERT Models3
A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications3
A One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability3
Multi-key Fully Homomorphic Encryption from Additive Homomorphism3
A Novel Approach for Determining Meal Plan for Gestational Diabetes Mellitus Using Artificial Intelligence3
Detection and Localization of Abnormalities in Surveillance Video Using Timerider-Based Neural Network3
Prediction of Student Performance Using Random Forest Combined With Naïve Bayes3
Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance3
Optimization of Data Assignment for Parallel Processing in a Hybrid Heterogeneous Environment Using Integer Linear Programming3
Adaptive Cross-Lingual Question Generation with Minimal Resources3
Unlinkable and Revocable Secret Handshake3
Improving Bitcoin Transaction Propagation Efficiency through Local Clique Network3
OUP accepted manuscript3
A Statistical-Based Light-Weight Anomaly Detection Framework for Wireless Body Area Networks3
Multi-view Dynamic Heterogeneous Information Network Embedding3
An Improved Unsegmented Phonocardiogram Classification Using Nonlinear Time Scattering Features3
Improving Science That Uses Code3
A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking3
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model3
Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm3
Robust Object Detection and Localization Using Semantic Segmentation Network3
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks3
A Trust Framework Utilization in Cloud Computing Environment Based on Multi-criteria Decision-Making Methods3
Blockchain-Based Confidential Multiparty Contract Signing Protocol Without TTP Using Elliptic Curve Cryptography3
A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images3
Trust-aware Task Allocation in Collaborative Crowdsourcing Model3
Smart Multimedia Compressor—Intelligent Algorithms for Text and Image Compression3
Performance Analysis of Prioritization and Contention Control Algorithm in Wireless Body Area Networks3
Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data3
Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications3
Privacy-Aware Image Authentication from Cryptographic Primitives3
OUP accepted manuscript3
Hamiltonian Properties of the Data Center Network HSDC with Faulty Elements3
Salient Object Detection Based on Multiscale Segmentation and Fuzzy Broad Learning3
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage3
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing3
Performance Evaluation of Machine Learning Techniques for Fault Diagnosis in Vehicle Fleet Tracking Modules3
Rare Correlated Coherent Association Rule Mining With CLS-MMS3
A Robust Blockchain-Based Distribution Master For Distributing Root Zone Data In DNS3
Precise Point Set Registration Based on Feature Fusion3
Differentially Private Publication For Correlated Non-Numerical Data3
An Attention Enhanced Cross-Modal Image–Sound Mutual Generation Model for Birds3
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles3
Sentiment Classification of Tourist’s Opinion on Tourist Places of Interest in South India using Tweet Reviews3
Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs3
Cluster Connectivity And Super Cluster Connectivity Of DQcube3
Channel Estimation for Millimeter Wave Massive MIMO System: Proposed Hybrid Optimization with Heuristic-Enabled Precoding and Combining3
Fidelity Homogenous Genesis Recommendation Model for User Trust with Item Ratings3
Sensitivity Analysis of Conflicting Goals in the i* Goal Model3
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications3
Text Summarization as a Multi-objective Optimization Task: Applying Harmony Search to Extractive Multi-Document Summarization3
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems3
0.057713031768799