Computers & Electrical Engineering

Papers
(The median citation count of Computers & Electrical Engineering is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
A new voltage sensitivity-based distributed feedback online optimization for voltage control in active distribution networks319
A new two-stage wire rope leakage signal noise reduction method208
Opposition African vultures optimization based NFOPID controller for frequency stabilization of multi-microgrid network185
Devising a hybrid approach for near real-time DDoS detection in IoT181
Galactic swarm optimization with deep transfer learning driven colorectal cancer classification for image guided intervention168
Power loss reduction and voltage enhancement via distributed photovoltaic generation: Case study in North Cyprus157
A lightweight temporal attention-based convolution neural network for driver's activity recognition in edge151
Indoor localization by projecting magnetic field signals onto images with vision transformer136
From interpretation to explanation: An analytical examination of deep neural network with linguistic rule-based model133
A coloring and timing brain-computer interface for the nursing bed robot116
Automated training of location-specific edge models for traffic counting110
Evaluating sustainable wind energy sources with multiple criteria decision-making (MCDM) techniques110
Resnet-based modified red deer optimization with DLCNN classifier for plant disease identification and classification109
Robust load frequency control in interval power systems via reduced-order generalized active disturbance rejection control107
The coupled Kaplan–Yorke-Logistic map for the image encryption applications105
An advanced approach for cloud enabled energy efficient ventilation control of multiple main fans in underground coal mines102
Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm101
An efficient optimization approach with mobility management for enhanced QoS and secure communication in flying adhoc networks96
BlockGuard: Advancing digital copyright integrity with blockchain technique95
FIDO-enabled universal authenticator with Web usability and privacy preservation95
LHTAM: Low-power and high-speed approximate multiplier for tiny inexact computing systems89
Enhancing voltage stability in photovoltaic and wind micro grids with a hybrid optimization approach86
Editorial Board85
Model-free predictive current control of IPMSMs based on an improved extended state observer with parallel resonant controller switching control strategy84
Improved Signcryption algorithm for cloud virtual machines84
Open-set security authentication: A novel CAN-bus recognition algorithm based on metric learning81
STI-TP: A Spatio-temporal interleaved model for multi-modal trajectory prediction of heterogeneous traffic agents81
Time series analysis and anomaly detection for trustworthy smart homes79
An IDBO-optimized CNN-BiLSTM model for load forecasting in regional integrated energy systems78
Leveraging MPPT capability for solar irradiance estimation: H-INC-IBS-based assessment of explicit models under real-world climatic conditions77
Operator-centric joystick mapping for intuitive manual operation of differential drive robots77
Design of mobile robot navigation controller using neuro-fuzzy logic system75
Low-light robust face super resolution via morphological transformation based locality-constrained representation75
A current-based algorithm for one-end fault location in series capacitor compensated double-circuit transmission lines75
A novel prediction method for vulnerability outbreak trend74
Neutral-point voltage control of the three-level inverter in permanent magnet synchronous motor based direct-drive belt conveyor74
Frequency response models and control in smart power systems with high penetration of renewable energy sources72
Obstacle detection and tracking for intelligent agricultural machinery71
Distributed subgraph query for RDF graph data based on MapReduce71
A lightweight-X-authentication protocol over automotive gateway70
An adaptive bilateral impedance control based on nonlinear disturbance observer for different flexible targets grasping70
Extraction and analysis algorithms for Sanxingdui cultural relics based on hyperspectral imaging70
Editorial Board69
Route recommendation based on temporal–spatial metric67
Anti-occlusion face recognition algorithm based on a deep convolutional neural network67
Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments66
Guest editorial: Introduction to the special section on recent advances and challenges in quantum-dot cellular automata (VSI-QCA)66
Low power design methodology in quantum-dot cellular automata65
Cascaded multi-3D-view fusion for 3D-oriented object detection64
Distribution network forecasting and expansion planning with optimal location and sizing of solar photovoltaic-based distributed generation64
Mixture lightweight transformer for scene understanding64
Intelligent algorithms for incident detection and management in smart transportation systems64
Remote reconfiguration of FPGA-based wireless sensor nodes for flexible Internet of Things☆63
Quantum-dot cellular automata based design of multifunction binary right shifter circuit63
Autonomous prediction of Type 2 Diabetes with high impact of glucose level61
Corrigendum to “Mitigating Dimension Constraints: A Novel Sliding Attack Strategy for Robust Synthetic Voice Detection” [Computers and Electrical Engineering Volume 118(2024), 1414/109355]61
Object extraction from image with big size based on bilateral grid60
Multi-oriented scene text detection by fixed-width multi-ratio rotation anchors60
IoT-based disease prediction using machine learning59
Highly accurate map construction and deep Q-network for autonomous driving and smart transportation59
Non-bias self-attention learning for weakly supervised semantic segmentation58
Deep learning-based risk management of financial market in smart grid58
Power management strategy based on Elman neural network for grid-connected photovoltaic-wind-battery hybrid system58
Modality emotion semantic correlation analysis for multimodal emotion recognition57
Technical assessment framework for cost-sharing agreements in transactive energy systems57
Measurement framework for the consistent and fast measurement of conducted grid emissions in the 9-500 kHz range57
A multi-perturbation consistency framework for semi-supervised person re-identification56
An optimized ensemble classifier for mammographic mass classification56
Scalable COVID-19 classification using map reduce framework and deep learning enabled hunter Jaya African vultures optimization56
An optimization-based EVA-VCAS for effective voltage sag management55
Modeling and control design for half electric vehicle with wheel BLDC actuator and Pacejka's tire54
VTion-PatchTST: Elevated PatchTST model for network security situation prediction54
A fault ride-through strategy for accurate energy optimization of offshore wind VSC HVDC system without improved fault ride-through strategy of wind turbines54
Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface53
ISAFusionNet: Involution and soft attention based deep multi-modal fusion network for multi-label skin lesion classification53
Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks53
Exploring multicepstral features in a new classical machine learning-based framework for replay attack detection53
MOOC dropout prediction using a fusion deep model based on behaviour features52
Deep learning techniques for securing cyber-physical systems in supply chain 4.052
HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection52
Efficient prediction of coronary artery disease using machine learning algorithms with feature selection techniques52
A cross-scale framework for low-light image enhancement using spatial–spectral information51
A comprehensive intrusion detection framework using boosting algorithms51
A machine learning-based adaptive heuristic for vessel scheduling problem under uncertainty via chance-constrained programming51
Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles50
Inverter Open Circuit fault diagnosis method based on ISMO for Improved Efficiency50
Editorial Board49
A flexible and privacy-preserving federated learning framework based on logistic regression49
Intelligent deep learning-enabled autonomous small ship detection and classification model49
Malaria parasite detection using deep learning algorithms based on (CNNs) technique49
Multiclass vulnerability and clone detection in Ethereum smart contracts using Block-wise Abstract Syntax Tree based Federated Graph Neural Networks49
Design of novel differential power processing scheme for small-scale PV array application operating under partial shading conditions: modelling and experimental validation49
ANFIS-SA-based design of a hybrid reconfigurable antenna for l-Band, C-band, 5G and ISM band applications49
Energy and delay aware routing model for smart crop monitoring application using internet of things49
Mitigation of electric field near overhead transmission lines using electromechanical compensation based on genetic algorithm49
Benchmarking feed-forward randomized neural networks for vessel trajectory prediction48
RestormGAN: Restormer with generative facial prior towards real-world blind face restoration48
Integrating individualised and similar group in knowledge tracing48
An ensemble learning model for hardware Trojan detection in integrated circuit design47
Unsupervised domain adaptation through adversarial enhancement and gradient discrepancy minimization47
EcoWatch: Region of interest-based multi-quantization resource-efficient framework for migratory bird surveillance using wireless sensor networks and environmental context awareness47
Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model47
Performance evaluation method for different clustering techniques47
Adopting effective hierarchal IoMTs computing with K-efficient clustering to control and forecast COVID-19 cases46
Multivariate variational mode decomposition & phase space reconstruction based motor imagery EEG classification46
A brain-like navigation method inspired by the spatial cells’ cognitive mechanism46
Realtime single-stage instance segmentation network based on anchors45
A heterogeneous graph neural recommendation model with hierarchical social trust45
Integrated energy storage systems with the Jordanian electrical power grid44
Multi-modal graph reasoning for structured video text extraction44
MIMO auto-regressive modeling-based generalized predictive control for grid-connected hybrid systems44
Hybrid Optimization Algorithm for VM Migration in Cloud Computing44
Studies on energy efficient techniques for agricultural monitoring by wireless sensor networks43
Distance learning quality assessment of universities based on interval monotonic decision tree algorithm43
Effective phase utilization and efficiency improvement of high power interleaved DC–DC converter using modified rotating phase shedding control43
Prediction of wind farm reactive power fast variations by adaptive one-dimensional convolutional neural network43
Optimization driven model and segmentation network for skin cancer detection43
Secure deduplication for big data with efficient dynamic ownership updates43
A synergistic reinforcement learning-based framework design in driving automation42
Task prediction on tablet based deep learning method42
SCHEISB: Design of a high efficiency IoMT security model based on sharded chains using bio-inspired optimizations42
Efficient and lightweight protocol for anti-jamming communications in wireless body area networks42
Editorial Board42
Development of secure Internet of Vehicle Things (IoVT) for smart transportation system42
SDN-assisted technique for traffic control and information execution in vehicular adhoc networks41
Intelligent transportation system for internet of vehicles based vehicular networks for smart cities41
Design, analysis and implementation of electronically interfaced photovoltaic system using ARM Cortex-M4 microcontroller41
3D placement of UAVs with optimal beamforming for multi-user communications41
Xray-Net: Self-supervised pixel stretching approach to improve low-contrast medical imaging41
Golden ratio based deep fake video detection system with fusion of capsule networks40
Modified deep attractor neural networks for variability compensation in recognition tasks40
An improved method for image de-blurring based on a multi-scale neural network40
C3E: A framework for chart classification and content extraction40
A novel hybrid machine learning algorithm for detection in smart cities40
Modal-aware prompt tuning with deep adaptive feature enhancement39
A novel Distributed Denial of Service attack defense scheme for Software-Defined Networking using Packet-In message and frequency domain analysis39
A hybrid BERT-CPSO model for multi-class depression detection using pure hindi and hinglish multimodal data on social media39
Locally enhanced denoising self-attention networks and decoupled position encoding for sequential recommendation39
Artificial intelligence-based smart agricultural systems for saffron cultivation with integration of Unmanned Aerial Vehicle imagery and deep learning approaches38
Fire hawks optimized radial basis function neural network based feature extraction and ON/OFF detection of household appliances38
Stealthy Backdoor Attacks on Graph Neural Networks via Relational Constraint Modeling38
Rewriting blockchain: A hybrid consensus that defeats the trilemma paradox37
A lightweight network for driver gesture recognition37
Blockchain-enabled distributed learning for enhanced smart grid security and efficiency37
A novel pairing free certificateless aggregate signcryption scheme for IoMT37
Explainable artificial intelligence-based identification of the localized events in imagined speech electroencephalogram37
Secure lightweight digital twin (DT) technology for seamless wireless communication in vehicular ad hoc network37
Joint detection and localization of False Data Injection Attacks in smart grids: An enhanced state estimation approach37
Quasi-Z-source on-board charger based on reducing the size of the DC-Side active power buffer for electric vehicle applications37
Estimating Botnet Impact on IoT/IoE networks using Traffic flow Features36
Multi-type energy conversion for managing the consumption by enhancing the resiliency of electrical distribution networks36
The sound of intrusion: A novel network intrusion detection system36
A reliability framework for NB-IoT devices: Addressing transient faults and silent data corruptions36
An improved YOLOv5-based approach to soybean phenotype information perception36
An efficient consortium blockchain privacy protection scheme based on group signatures and bulletproofs36
A Q-learning-based hierarchical routing protocol in underwater acoustic sensor networks35
A routing approach based on combination of gray wolf clustering and fuzzy clustering and using multi-criteria decision making approaches for WSN-IoT35
Spatio-temporal photovoltaic prediction via a convolutional based hybrid network35
Secure Frequency Regulation of Electric Vehicle-connected Microgrid System under Multiple Latency Attacks35
A short-term wind power prediction approach based on ensemble empirical mode decomposition and improved long short-term memory35
Generic Edge Computing System for Optimization and Computation Offloading of Unmanned Aerial Vehicle35
CorrFormer: Context-aware tracking with cross-correlation and transformer35
A real-time detector for small-object remote sensing34
Load frequency control based on reinforcement learning for microgrids under false data attacks34
Novel Enhanced-Grey Wolf Optimization hybrid machine learning technique for biomedical data computation34
Nonlinear integral backstepping control based on particle swarm optimization for a grid-connected variable wind energy conversion system during voltage dips33
Combining hybrid metaheuristic algorithms and reinforcement learning to improve the optimal control of nonlinear continuous-time systems with input constraints33
Enhanced security of data dissemination in blockchain-based peer-to-peer smart energy trading network33
An efficient diagnosis of heart disease using optimized cross-layer Densenet121 pyramid mutual attention network33
A pattern recognition model for static gestures in malaysian sign language based on machine learning techniques33
No-reference quality assessment for underwater images33
Extendable multilevel inverter for renewable energy sources with fuzzy-PI controller for single phase induction motors33
Digital twins and artificial intelligence in transportation infrastructure: Classification, application, and future research directions33
Optimal heterogeneous domain adaptation for text classification in transfer learning33
Evaluation of LFC performance in renewable sources-based interconnected power systems using an effective cascade control strategy33
MPPT controller improvement for a PEM fuel cell system based on Gaussian Process Regression with a digital twin33
A multilevel network-assisted congestion feedback mechanism for network congestion control32
Editorial Board32
LMCodec2: Ultra-low bit rate codec with causal multiple transformers32
PTSRDet: End-to-End Super-Resolution and object-detection approach for small defect detection of power transmission lines32
Efficient implementation of post quantum MLWR-based PKE scheme using NTT32
Resource-aware deep learning models for beyond-wave-length positioning accuracy in massive MIMO architecture32
A robust unified spoofing audio detection scheme32
A novel Laplacian vector directional filter designed for real-time removal of impulsive noise from color images32
LFGNet: Low-level feature-guided network for drivers’ calling behavior detection32
How rationals boost textual entailment modeling: Insights from large language models32
A double-compression method for searchable network packets in network forensics and analysis32
Tailoring naturalistic adversarial examples via text-to-image diffusion models31
A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation31
Exploring the convergence of Metaverse, Blockchain, Artificial Intelligence, and digital twin for pioneering the digitization in the envision smart grid 3.031
A visual cortex-inspired edge neuromorphic hardware architecture with on-chip multi-layer STDP learning31
Hybrid twin attention based convolutional stacked sparse autoencoder for classification of defected weld images31
Expanding the wrench feasible workspace of quadrotor-based mobile cable-driven parallel manipulators using multi-objective optimization and machine learning31
A novel hybrid global maximum power point tracking method based on partial shading mitigation for grid connected photovoltaic systems31
A cooperation and decision-making framework in dynamic confrontation for multi-agent systems31
Trapezoidal reference-based single carrier pulse width modulation method for multilevel converters with novel FPGA implementation31
User financial credit analysis for blockchain regulation31
Hierarchical integrated energy system management considering energy market, demand response and uncertainties: A robust optimization approach31
High-performance front end PFC controller design for light electric vehicle charger application31
Secure and scalable trust management in IoT: A hierarchical blockchain-based approach31
A review on federated learning towards image processing31
Real time monitoring of solid waste with customized hardware and Internet of Things31
Single and multi-threaded power flow algorithm for integrated transmission-distribution-residential networks31
A non-isolated buck-boost converter based on SEPIC topology for renewable energy applications31
Introduction to the special section on security and privacy in IoT and cloud (VSI-spiot)30
Special Section on Resiliency techniques in cloud computing infrastructures and applications30
Hybrid ant colony and intelligent water drop algorithm for route planning of unmanned aerial vehicles30
Introduction to the special section on developments in renewable energy generation and automation30
Study and investigate perceptions of Jordanian college students on the golden ratio proportions30
Customized deep neural network model for autonomous and efficient surveillance of wildlife in national parks30
Unsupervised virtual view synthesis from monocular video with generative adversarial warping30
Modeling Drosophila vision neural pathways to detect weak moving targets from cluttered backgrounds30
Design of cross-cultural teaching management system for international students based on cloud service platform30
A gradient deconvolutional network for side-channel attacks29
Semi-supervised cross-modal retrieval with graph-based semantic alignment network29
Effective scheduling mechanism for a mixture of 5G multimedia use cases29
Convolutional neural network and sensor fusion for obstacle classification in the context of powered prosthetic leg applications29
Study on eye-gaze input interface based on deep learning using images obtained by multiple cameras29
Adaptive few-shot learning with a fair priori distribution29
A novel symmetric cryptographic method to design block complexity for data security28
A game theory approach for smart traffic management28
LPCHISEL: Automatic power intent generation for a chisel-based ASIC design28
A semidefinite relaxation approach for the offloading problem in edge computing28
Cluster-based attacks prevention algorithm for autonomous vehicles using machine learning algorithms28
Optimal LCL-filter design for a single-phase grid-connected inverter using metaheuristic algorithms28
Multi-label disaster text classification via supervised contrastive learning for social media data28
Feature mixing and self-training for source-free active domain adaptation28
Performance analysis of video data transmission for telemedicine applications with 5G enabled Internet of Things28
Joint multi-subspace feature learning with singular value decomposition for robust single-sample face recognition28
Visual analysis of action using machine learning and distributed expectation-maximization algorithm28
ADCAS: Adversarial Deep Clustering of Android Streams28
BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing27
EfficientNet and multi-path convolution with multi-head attention network for brain tumor grade classification27
Developing a time-series speed prediction model using Transformer networks for freeway interchange areas27
Heuristic deep learning scheduling in cloud for resource-intensive internet of things systems27
Single-branch self-supervised learning with hybrid tasks27
Reconfigurable and hardware efficient adaptive quantization model-based accelerator for binarized neural network27
Fault diagnosis of planetary gearboxes under variable operating conditions based on AWM-TCN27
Two-stage computing offloading algorithm in cloud-edge collaborative scenarios based on game theory27
Optimization of sensor selection problem in IoT systems using opposition-based learning in many-objective evolutionary algorithms27
Optimizing the LoRa network performance for industrial scenario using a machine learning approach27
A hybrid Fifth Generation based approaches on extracting and analyzing customer requirement through online mode in healthcare industry27
Global and local geometric constrained feature matching for high resolution remote sensing images27
DDoS SourceTracer: An Intelligent Application for DDoS Attack Mitigation in SDN27
HAREDNet: A deep learning based architecture for autonomous video surveillance by recognizing human actions27
Bi-level planning and scheduling of electric vehicle charging stations for peak shaving and congestion management in low voltage distribution networks27
Personalized and motion-based human activity recognition with transfer learning and compressed deep learning models26
Underwater multilateral tele-operation control with constant time delays26
Adapting visible-light-image diffusion model for infrared image restoration in rainy weather26
Hyper spectral image classifications for monitoring harvests in agriculture using fly optimization algorithm26
0.49064612388611