Information Sciences

Papers
(The H4-Index of Information Sciences is 81. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Gradient-based optimizer: A new metaheuristic optimization algorithm463
Fractal sorting matrix and its application on chaotic image encryption293
An enhanced fast non-dominated solution sorting genetic algorithm for multi-objective problems262
Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network252
DC-SPP-YOLO: Dense connection and spatial pyramid pooling based YOLO for object detection212
Spatial temporal incidence dynamic graph neural networks for traffic flow forecasting207
K-means clustering algorithms: A comprehensive review, variants analysis, and advances in the era of big data196
Cross-plane colour image encryption using a two-dimensional logistic tent modular map186
Multiattribute group decision making based on neutrality aggregation operators of q-rung orthopair fuzzy sets186
A new divergence measure for belief functions in D–S evidence theory for multisensor data fusion184
A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme169
An Adaptive Polyploid Memetic Algorithm for scheduling trucks at a cross-docking terminal167
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption167
Combining unsupervised and supervised learning in credit card fraud detection163
Consensus of large-scale group decision making in social network: the minimum cost model based on robust optimization156
Root mean square error or mean absolute error? Use their ratio as well153
CNN-based encoder-decoder networks for salient object detection: A comprehensive review and recent advances152
Fuzzy best-worst method based on triangular fuzzy numbers for multi-criteria decision-making147
A novel graph convolutional feature based convolutional neural network for stock trend prediction143
Hybrid many-objective particle swarm optimization algorithm for green coal production problem140
A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT134
Approximating XGBoost with an interpretable decision tree133
Exploiting dynamic spatio-temporal correlations for citywide traffic flow prediction using attention based neural networks127
Score function based on concentration degree for probabilistic linguistic term sets: An application to TOPSIS and VIKOR127
Enhancing MOEA/D with information feedback models for large-scale many-objective optimization126
A privacy-preserving cryptosystem for IoT E-healthcare125
RTFN: A robust temporal feature network for time series classification125
Policy Iteration Reinforcement Learning-based control using a Grey Wolf Optimizer algorithm123
A survey of evolutionary computation for association rule mining123
An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing123
Global context based automatic road segmentation via dilated convolutional neural network119
Sliding-mode surface-based adaptive actor-critic optimal control for switched nonlinear systems with average dwell time117
Adaptively constrained dynamic time warping for time series classification and clustering117
A new approach for classifying coronavirus COVID-19 based on its manifestation on chest X-rays using texture features and neural networks116
Conflicting evidence combination from the perspective of networks116
JKT: A joint graph convolutional network based Deep Knowledge Tracing115
Cryptanalysis of a DNA-based image encryption scheme114
Dynamic graph convolutional network for long-term traffic flow prediction with reinforcement learning113
Adaptive stock trading strategies with deep reinforcement learning methods112
Blockchain-based fair payment smart contract for public cloud storage auditing110
Improving artificial Bee colony algorithm using a new neighborhood selection mechanism110
Balancing composite motion optimization106
Attribute reduction with fuzzy rough self-information measures106
Detection of stealthy false data injection attacks against networked control systems via active data modification106
HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture106
Feature selection using Fisher score and multilabel neighborhood rough sets for multilabel classification105
A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient104
A survey on facial emotion recognition techniques: A state-of-the-art literature review103
A training-integrity privacy-preserving federated learning scheme with trusted execution environment102
A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network101
Reinforcement Learning-based control using Q-learning and gravitational search algorithm with experimental validation on a nonlinear servo system100
A distributed sensor-fault detection and diagnosis framework using machine learning99
DGHNL: A new deep genetic hierarchical network of learners for prediction of credit scoring98
GGA: A modified genetic algorithm with gradient-based local search for solving constrained optimization problems97
Augmented Skeleton Based Contrastive Action Learning with Momentum LSTM for Unsupervised Action Recognition97
Multi-strategy particle swarm and ant colony hybrid optimization for airport taxiway planning problem96
Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks94
A novel fuzzy rough set model with fuzzy neighborhood operators93
The fast image encryption algorithm based on lifting scheme and chaos93
Adaptive neural control for non-strict-feedback nonlinear systems with input delay92
Aggregation of infinite chains of intuitionistic fuzzy sets and their application to choices with temporal intuitionistic fuzzy information92
A new fractional one dimensional chaotic map and its application in high-speed image encryption90
Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach90
RSMOTE: A self-adaptive robust SMOTE for imbalanced problems with label noise90
MHAT: An efficient model-heterogenous aggregation training scheme for federated learning90
Discovering high utility-occupancy patterns from uncertain data87
A novel decision-making approach based on three-way decisions in fuzzy information systems87
A reinforcement learning level-based particle swarm optimization algorithm for large-scale optimization86
Event-triggered distributed control for synchronization of multiple memristive neural networks under cyber-physical attacks86
Co-evolutionary competitive swarm optimizer with three-phase for large-scale complex optimization problem85
Public-key authenticated encryption with keyword search revisited: Security model and constructions85
An efficient surrogate-assisted hybrid optimization algorithm for expensive optimization problems84
A many-objective optimization recommendation algorithm based on knowledge mining83
Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking83
RCSMOTE: Range-Controlled synthetic minority over-sampling technique for handling the class imbalance problem82
Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme82
Learning reinforced attentional representation for end-to-end visual tracking82
Covering-based variable precision fuzzy rough sets with PROMETHEE-EDAS methods82
Group consensus via pinning control for a class of heterogeneous multi-agent systems with input constraints82
An image encryption algorithm based on new chaos and diffusion values of a truth table81
A future intelligent traffic system with mixed autonomous vehicles and human-driven vehicles81
Privacy preservation for machine learning training and classification based on homomorphic encryption schemes81
0.025615930557251