Information Sciences

Papers
(The median citation count of Information Sciences is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Gradient-based optimizer: A new metaheuristic optimization algorithm463
Fractal sorting matrix and its application on chaotic image encryption293
An enhanced fast non-dominated solution sorting genetic algorithm for multi-objective problems262
Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network252
DC-SPP-YOLO: Dense connection and spatial pyramid pooling based YOLO for object detection212
Spatial temporal incidence dynamic graph neural networks for traffic flow forecasting207
K-means clustering algorithms: A comprehensive review, variants analysis, and advances in the era of big data196
Multiattribute group decision making based on neutrality aggregation operators of q-rung orthopair fuzzy sets186
Cross-plane colour image encryption using a two-dimensional logistic tent modular map186
A new divergence measure for belief functions in D–S evidence theory for multisensor data fusion184
A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme169
An Adaptive Polyploid Memetic Algorithm for scheduling trucks at a cross-docking terminal167
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption167
Combining unsupervised and supervised learning in credit card fraud detection163
Consensus of large-scale group decision making in social network: the minimum cost model based on robust optimization156
Root mean square error or mean absolute error? Use their ratio as well153
CNN-based encoder-decoder networks for salient object detection: A comprehensive review and recent advances152
Fuzzy best-worst method based on triangular fuzzy numbers for multi-criteria decision-making147
A novel graph convolutional feature based convolutional neural network for stock trend prediction143
Hybrid many-objective particle swarm optimization algorithm for green coal production problem140
A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT134
Approximating XGBoost with an interpretable decision tree133
Score function based on concentration degree for probabilistic linguistic term sets: An application to TOPSIS and VIKOR127
Exploiting dynamic spatio-temporal correlations for citywide traffic flow prediction using attention based neural networks127
Enhancing MOEA/D with information feedback models for large-scale many-objective optimization126
RTFN: A robust temporal feature network for time series classification125
A privacy-preserving cryptosystem for IoT E-healthcare125
An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing123
Policy Iteration Reinforcement Learning-based control using a Grey Wolf Optimizer algorithm123
A survey of evolutionary computation for association rule mining123
Global context based automatic road segmentation via dilated convolutional neural network119
Sliding-mode surface-based adaptive actor-critic optimal control for switched nonlinear systems with average dwell time117
Adaptively constrained dynamic time warping for time series classification and clustering117
Conflicting evidence combination from the perspective of networks116
A new approach for classifying coronavirus COVID-19 based on its manifestation on chest X-rays using texture features and neural networks116
JKT: A joint graph convolutional network based Deep Knowledge Tracing115
Cryptanalysis of a DNA-based image encryption scheme114
Dynamic graph convolutional network for long-term traffic flow prediction with reinforcement learning113
Adaptive stock trading strategies with deep reinforcement learning methods112
Improving artificial Bee colony algorithm using a new neighborhood selection mechanism110
Blockchain-based fair payment smart contract for public cloud storage auditing110
Attribute reduction with fuzzy rough self-information measures106
Detection of stealthy false data injection attacks against networked control systems via active data modification106
HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture106
Balancing composite motion optimization106
Feature selection using Fisher score and multilabel neighborhood rough sets for multilabel classification105
A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient104
A survey on facial emotion recognition techniques: A state-of-the-art literature review103
A training-integrity privacy-preserving federated learning scheme with trusted execution environment102
A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network101
Reinforcement Learning-based control using Q-learning and gravitational search algorithm with experimental validation on a nonlinear servo system100
A distributed sensor-fault detection and diagnosis framework using machine learning99
DGHNL: A new deep genetic hierarchical network of learners for prediction of credit scoring98
Augmented Skeleton Based Contrastive Action Learning with Momentum LSTM for Unsupervised Action Recognition97
GGA: A modified genetic algorithm with gradient-based local search for solving constrained optimization problems97
Multi-strategy particle swarm and ant colony hybrid optimization for airport taxiway planning problem96
Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks94
The fast image encryption algorithm based on lifting scheme and chaos93
A novel fuzzy rough set model with fuzzy neighborhood operators93
Adaptive neural control for non-strict-feedback nonlinear systems with input delay92
Aggregation of infinite chains of intuitionistic fuzzy sets and their application to choices with temporal intuitionistic fuzzy information92
Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach90
RSMOTE: A self-adaptive robust SMOTE for imbalanced problems with label noise90
MHAT: An efficient model-heterogenous aggregation training scheme for federated learning90
A new fractional one dimensional chaotic map and its application in high-speed image encryption90
A novel decision-making approach based on three-way decisions in fuzzy information systems87
Discovering high utility-occupancy patterns from uncertain data87
Event-triggered distributed control for synchronization of multiple memristive neural networks under cyber-physical attacks86
A reinforcement learning level-based particle swarm optimization algorithm for large-scale optimization86
Co-evolutionary competitive swarm optimizer with three-phase for large-scale complex optimization problem85
Public-key authenticated encryption with keyword search revisited: Security model and constructions85
An efficient surrogate-assisted hybrid optimization algorithm for expensive optimization problems84
A many-objective optimization recommendation algorithm based on knowledge mining83
Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking83
Learning reinforced attentional representation for end-to-end visual tracking82
Covering-based variable precision fuzzy rough sets with PROMETHEE-EDAS methods82
Group consensus via pinning control for a class of heterogeneous multi-agent systems with input constraints82
RCSMOTE: Range-Controlled synthetic minority over-sampling technique for handling the class imbalance problem82
Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme82
A future intelligent traffic system with mixed autonomous vehicles and human-driven vehicles81
Privacy preservation for machine learning training and classification based on homomorphic encryption schemes81
An image encryption algorithm based on new chaos and diffusion values of a truth table81
On the negation of a Dempster–Shafer belief structure based on maximum uncertainty allocation80
Blockchain-based public auditing and secure deduplication with fair arbitration80
Deep embedded multi-view clustering with collaborative training80
A multi-stage evolutionary algorithm for multi-objective optimization with complex constraints80
A problem-specific non-dominated sorting genetic algorithm for supervised feature selection80
Spatial-temporal data-driven service recommendation with privacy-preservation79
Comparative study of interval Type-2 and general Type-2 fuzzy systems in medical diagnosis79
An incremental learning mechanism for object classification based on progressive fuzzy three-way concept79
Bayesian optimization based dynamic ensemble for time series forecasting79
A novel oversampling technique for class-imbalanced learning based on SMOTE and natural neighbors78
Multimodal medical image fusion based on joint bilateral filter and local gradient energy78
Multilabel feature selection using ML-ReliefF and neighborhood mutual information for multilabel neighborhood decision systems78
Autoencoder-based deep metric learning for network intrusion detection78
A cluster-based oversampling algorithm combining SMOTE and k-means for imbalanced medical data78
Estimating priorities from relative deviations in pairwise comparison matrices78
Rules acquisition of formal decision contexts based on three-way concept lattices78
A novel ensemble deep learning model with dynamic error correction and multi-objective ensemble pruning for time series forecasting77
Event-triggered predictive control for networked control systems with DoS attacks77
Fall detection in older adults with mobile IoT devices and machine learning in the cloud and on the edge77
Hybrid query expansion using lexical resources and word embeddings for sentence retrieval in question answering77
An adaptive Bayesian approach to surrogate-assisted evolutionary multi-objective optimization76
An improvement of rough sets’ accuracy measure using containment neighborhoods with a medical application76
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services75
Multipopulation cooperative particle swarm optimization with a mixed mutation strategy75
Intuitionistic fuzzy TOPSIS method based on CVPIFRS models: An application to biomedical problems75
Quantum generative adversarial network for generating discrete distribution74
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation74
Attribute group for attribute reduction73
Application of adaptive reliability importance sampling-based extended domain PSO on single mode failure in reliability engineering73
Towards secure and practical consensus for blockchain based VANET72
A reinforcement learning approach for dynamic multi-objective optimization72
The improved AdaBoost algorithms for imbalanced data classification72
An ensemble of differential evolution and Adam for training feed-forward neural networks71
A genetic algorithm for constructing bijective substitution boxes with high nonlinearity71
Resilient adaptive control of switched nonlinear cyber-physical systems under uncertain deception attacks71
Generalized combination rule for evidential reasoning approach and Dempster–Shafer theory of evidence70
Multi-objective prediction intervals for wind power forecast based on deep neural networks70
Double hierarchy hesitant fuzzy linguistic entropy-based TODIM approach using evidential theory70
Novel methods to finite-time Mittag-Leffler synchronization problem of fractional-order quaternion-valued neural networks70
PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage69
A fusion collaborative filtering method for sparse data in recommender systems69
Multiple attribute decision making based on q-rung orthopair fuzzy generalized Maclaurin symmetic mean operators69
An encrypted coverless information hiding method based on generative models68
A consensus process based on regret theory with probabilistic linguistic term sets and its application in venture capital68
Adapting H-infinity controller for the desired reference tracking of the sphere position in the maglev process68
Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion68
A deep learning approach for multi-attribute data: A study of train delay prediction in railway systems68
Evidence reasoning rule-based classifier with uncertainty quantification68
Facial expression recognition with grid-wise attention and visual transformer67
AF2GNN: Graph convolution with adaptive filters and aggregator fusion for hyperspectral image classification67
Research on AI security enhanced encryption algorithm of autonomous IoT systems67
Using support vector regression and K-nearest neighbors for short-term traffic flow prediction based on maximal information coefficient66
Heterogeneous comprehensive learning and dynamic multi-swarm particle swarm optimizer with two mutation operators66
Fault detection for switched systems with all modes unstable based on interval observer66
Color image dehazing using gradient channel prior and guided L0 filter66
DP-SLAM: A visual SLAM with moving probability towards dynamic environments66
Missing value imputation in multivariate time series with end-to-end generative adversarial networks66
Distributed adaptive security consensus control for a class of multi-agent systems under network decay and intermittent attacks66
Conflict analysis under one-vote veto based on approximate three-way concept lattice65
Adaptive computation offloading and resource allocation strategy in a mobile edge computing environment65
Resampling ensemble model based on data distribution for imbalanced credit risk evaluation in P2P lending64
A clustering- and maximum consensus-based model for social network large-scale group decision making with linguistic distribution64
A three-way decision model based on cumulative prospect theory64
Dynamical analysis of rumor spreading model in multi-lingual environment and heterogeneous complex networks64
Advantages of direct input-to-output connections in neural networks: The Elman network for stock index forecasting64
A dynamic group MCDM model with intuitionistic fuzzy set: Perspective of alternative queuing method64
Interval type-2 fuzzy sets improved by Simulated Annealing for locating the electric charging stations64
Attention-based bidirectional GRU networks for efficient HTTPS traffic classification64
FaultFace: Deep Convolutional Generative Adversarial Network (DCGAN) based Ball-Bearing failure detection method64
A comprehensive bibliometric analysis of uncertain group decision making from 1980 to 201964
A community detection algorithm based on graph compression for large-scale social networks64
Leader-follower consensus control for linear multi-agent systems by fully distributed edge-event-triggered adaptive strategies63
A novel prediction model for the inbound passenger flow of urban rail transit63
Differential evolution with adaptive mutation strategy based on fitness landscape analysis63
Multi-class financial distress prediction based on support vector machines integrated with the decomposition and fusion methods63
Design of fuzzy system-fuzzy neural network-backstepping control for complex robot system63
A novel wrapper-based feature subset selection method using modified binary differential evolution algorithm63
A three-way decision based construction of shadowed sets from Atanassov intuitionistic fuzzy sets63
Multiple attribute decision making using improved intuitionistic fuzzy weighted geometric operators of intuitionistic fuzzy values63
Multi-stage consistency optimization algorithm for decision making with incomplete probabilistic linguistic preference relation63
A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data62
A type-3 logic fuzzy system: Optimized by a correntropy based Kalman filter with adaptive fuzzy kernel size62
Stability analysis of a SAIR rumor spreading model with control strategies in online social networks62
An accurate and dynamic predictive model for a smart M-Health system using machine learning61
Multiple images encryption based on 3D scrambling and hyper-chaotic system61
BBAS: Towards large scale effective ensemble adversarial attacks against deep neural network learning61
Adaptive fault-tolerant control for nonlinear multi-agent systems with DoS attacks61
Multiple criteria group decision making based on group satisfaction61
BARF: A new direct and cross-based binary residual feature fusion with uncertainty-aware module for medical image classification60
Infrared and visible image fusion using dual discriminators generative adversarial networks with Wasserstein distance60
Time works well: Dynamic time warping based on time weighting for time series data mining60
Fixed-time adaptive fuzzy control for uncertain strict feedback switched systems60
TOPSIS-WAA method based on a covering-based fuzzy rough set: An application to rating problem60
An efficient blockchain-based privacy preserving scheme for vehicular social networks60
A hierarchical deep convolutional neural network and gated recurrent unit framework for structural damage detection60
Cross-lingual multi-keyword rank search with semantic extension over encrypted data60
An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated59
SocialLGN: Light graph convolution network for social recommendation59
A privacy-preserving data aggregation scheme for dynamic groups in fog computing59
New technique to alleviate the cold start problem in recommender systems using information from social media and random decision forests59
An efficient consensus reaching framework for large-scale social network group decision making and its application in urban resettlement59
A machine learning and genetic algorithm-based method for predicting width deviation of hot-rolled strip in steel production systems59
New results on stabilization analysis for fuzzy semi-Markov jump chaotic systems with state quantized sampled-data controller59
A trustworthiness-based vehicular recruitment scheme for information collections in Distributed Networked Systems58
Distributed adaptive fixed-time formation control for second-order multi-agent systems with collision avoidance58
A three-way decision approach with probabilistic dominance relations under intuitionistic fuzzy information58
Self directed learning based workload forecasting model for cloud resource management58
An ameliorated teaching–learning-based optimization algorithm based study of image segmentation for multilevel thresholding using Kapur’s entropy and Otsu’s between class variance58
2D eπ-map for image encryption57
Multi-view subspace clustering via partition fusion57
Managing noncooperative behaviors in large-scale group decision-making: Integration of independent and supervised consensus-reaching models56
Multi-label classification with weighted classifier selection and stacked ensemble56
Multi-view ensemble learning based on distance-to-model and adaptive clustering for imbalanced credit risk assessment in P2P lending56
Group decision making with heterogeneous intuitionistic fuzzy preference relations56
Discriminative deep multi-task learning for facial expression recognition56
Identifying influential nodes in complex networks: Effective distance gravity model56
Multi-modal fusion network with complementarity and importance for emotion recognition56
Multi-criteria group decision-making for portfolio allocation with consensus reaching process under interval type-2 fuzzy environment56
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid56
EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain55
A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme55
Multi-strategy competitive-cooperative co-evolutionary algorithm and its application55
GNN-based long and short term preference modeling for next-location prediction55
A fitness-based adaptive differential evolution algorithm55
Efficient scientific workflow scheduling for deadline-constrained parallel tasks in cloud computing environments54
Corporate finance risk prediction based on LightGBM54
Enhancing artificial bee colony algorithm with multi-elite guidance54
A recalling-enhanced recurrent neural network: Conjugate gradient learning algorithm and its convergence analysis54
Multiattribute decision making based on interval-valued intuitionistic fuzzy values, score function of connection numbers, and the set pair analysis theory54
Deep features to detect pulmonary abnormalities in chest X-rays due to infectious diseaseX: Covid-19, pneumonia, and tuberculosis54
RobustH54
Multi-attributed heterogeneous graph convolutional network for bot detection54
Region-edge-based active contours driven by hybrid and local fuzzy region-based energy for image segmentation54
A novel multi-scale fusion framework for detail-preserving low-light image enhancement54
A novel three-way group investment decision model under intuitionistic fuzzy multi-attribute group decision-making environment54
Cloud-based lightweight secure RFID mutual authentication protocol in IoT53
Uncertain database retrieval with measure – Based belief function attribute values under intuitionistic fuzzy set53
A likelihood-based multi-criteria sustainable supplier selection approach with complex preference information53
General interval-valued overlap functions and interval-valued overlap indices53
Multiple attribute group decision making based on advanced linguistic intuitionistic fuzzy weighted averaging aggregation operator of linguistic intuitionistic fuzzy numbers53
Multi-objective scheduling of priority-based rescue vehicles to extinguish forest fires using a multi-objective discrete gravitational search algorithm53
A benefit-to-cost ratio based approach for portfolio selection under multiple criteria with incomplete preference information53
Tensor N-tubal rank and its convex relaxation for low-rank tensor recovery53
An interactive knowledge-based recommender system for fashion product design in the big data environment53
Local community detection by the nearest nodes with greater centrality53
Effective privacy preserving data publishing by vectorization53
A dynamical spatial-temporal graph neural network for traffic demand prediction52
Clustering mixed numerical and categorical data with missing values52
An efficient interval many-objective evolutionary algorithm for cloud task scheduling problem under uncertainty52
Efficient algorithms based on centrality measures for identification of top-K influential users in social networks52
Class-specific information measures and attribute reducts for hierarchy and systematicness52
Plaintext-related image encryption algorithm based on perceptron-like network52
Influence maximization in social networks using graph embedding and graph neural network52
Three-way decisions based multi-attribute decision making with probabilistic dominance relations52
Fixed-time synchronization of fuzzy neutral-type BAM memristive inertial neural networks with proportional delays51
Blockchain-based system for secure outsourcing of bilinear pairings51
Event-triggered static/dynamic feedback control for discrete-time linear systems51
Dynamical behaviors and control measures of rumor-spreading model in consideration of the infected media and time delay51
Three-way decision based on third-generation prospect theory with Z-numbers51
How to process local and global consensus? A large-scale group decision making model based on social network analysis with probabilistic linguistic information51
Transfer learning based intrusion detection scheme for Internet of vehicles51
Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences51
Adaptive fuzzy asymptotical tracking control of nonlinear systems with unmodeled dynamics and quantized actuator51
A probability distribution detection based hybrid ensemble QoS prediction approach51
Rumor2vec: A rumor detection framework with joint text and propagation structure representation learning51
A dynamic event-triggered resilient control approach to cyber-physical systems under asynchronous DoS attacks51
Lattice-valued overlap and quasi-overlap functions50
Modeling and analysis of rumor propagation in social networks50
0.045314073562622