Connection Science

Papers
(The median citation count of Connection Science is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Applications of federated learning in smart cities: recent advances, taxonomy, and open challenges89
S_I_LSTM: stock price prediction based on multiple data sources and sentiment analysis67
A multimodal hybrid parallel network intrusion detection model65
NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention57
A novel blockchain-based privacy-preserving framework for online social networks51
Effective classification of android malware families through dynamic features and neural networks33
A Swish RNN based customer churn prediction for the telecom industry with a novel feature selection strategy33
Deep transfer learning mechanism for fine-grained cross-domain sentiment classification30
An emotional classification method of Chinese short comment text based on ELECTRA29
API recommendation for Mashup creation based on neural graph collaborative filtering28
A text classification method based on a convolutional and bidirectional long short-term memory model27
Secure medical digital twin via human-centric interaction and cyber vulnerability resilience26
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning25
Graph learning-based spatial-temporal graph convolutional neural networks for traffic forecasting25
OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems24
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic23
Adaptive weights learning in CNN feature fusion for crime scene investigation image classification23
A novel cluster head selection using Hybrid Artificial Bee Colony and Firefly Algorithm for network lifetime and stability in WSNs23
CNN Convolutional layer optimisation based on quantum evolutionary algorithm22
Prediction of customer engagement behaviour response to marketing posts based on machine learning21
NFMF: neural fusion matrix factorisation for QoS prediction in service selection21
A lightweight authentication scheme for telecare medical information system21
AMGNET: multi-scale graph neural networks for flow field prediction20
A real-world service mashup platform based on data integration, information synthesis, and knowledge fusion20
BFS: A blockchain-based financing scheme for logistics company in supply chain finance20
5GSS: a framework for 5G-secure-smart healthcare monitoring20
WTL-CNN: a news text classification method of convolutional neural network based on weighted word embedding20
The abnormal traffic detection scheme based on PCA and SSH20
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud17
Blockchain-based anonymous authentication for traffic reporting in VANETs17
Intelligent garbage classification system based on improve MobileNetV3-Large16
A content-based recommendation approach based on singular value decomposition16
Composition pattern-aware web service recommendation based on depth factorisation machine16
TCN enhanced novel malicious traffic detection for IoT devices15
Automatic traffic modelling for creating digital twins to facilitate autonomous vehicle development15
Blockchain application in P2P energy markets: social and legal aspects15
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning15
An extrinsic random-based ensemble approach for android malware detection15
Sentiment classification of Chinese Weibo based on extended sentiment dictionary and organisational structure of comments14
Energy-efficient control of thermal comfort in multi-zone residential HVAC via reinforcement learning14
A new method for weighted ensemble clustering and coupled ensemble selection14
Self-adaptive spatial-temporal network based on heterogeneous data for air quality prediction14
A conditional opposition-based particle swarm optimisation for feature selection14
A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles13
Deep and hybrid learning of MRI diagnosis for early detection of the progression stages in Alzheimer’s disease13
An efficient sparse pruning method for human pose estimation13
Image semantic segmentation with hierarchical feature fusion based on deep neural network13
Multi-stream part-fused graph convolutional networks for skeleton-based gait recognition12
Automatic classification method of liver ultrasound standard plane images using pre-trained convolutional neural network12
Lithium-ion battery state-of-charge estimation based on a dual extended Kalman filter and BPNN correction12
A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain12
A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles12
ALSEE: a framework for attribute-level sentiment element extraction towards product reviews11
State-of-charge estimation for Lithium-Ion batteries using Kalman filters based on fractional-order models11
Blockchain-based cross-user data shared auditing11
Selective transfer learning with adversarial training for stock movement prediction11
Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation11
New modified exponentially weighted moving average-moving average control chart for process monitoring10
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks10
KG4Py: A toolkit for generating Python knowledge graph and code semantic search10
A simple but effective method for Indonesian automatic text summarisation10
ASM-VoFDehaze: a real-time defogging method of zinc froth image10
GP-GCN: Global features of orthogonal projection and local dependency fused graph convolutional networks for aspect-level sentiment classification10
A text classification method based on LSTM and graph attention network10
Anomaly detection of industrial state quantity time-Series data based on correlation and long short-term memory10
SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems10
Automated breast cancer detection by reconstruction independent component analysis (RICA) based hybrid features using machine learning paradigms10
Image super-resolution reconstruction based on multi-scale dual-attention9
Threat analysis model to control IoT network routing attacks through deep learning approach9
A hybrid differential evolution for multi-objective optimisation problems9
A novel general kernel-based non-negative matrix factorisation approach for face recognition9
Personalised context-aware re-ranking in recommender system8
Multi-featured spatial-temporal and dynamic multi-graph convolutional network for metro passenger flow prediction8
A team-based multitask data acquisition scheme under time constraints in mobile crowd sensing8
Aggregating multi-scale contextual features from multiple stages for semantic image segmentation8
Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system8
Multi-distribution noise quantisation: an extreme compression scheme for transformer according to parameter distribution8
Security analysis of smart contract based rating and review systems: the perilous state of blockchain-based recommendation practices8
A feature selection method with feature ranking using genetic programming8
A dynamic network traffic classifier using supervised ML for a Docker-based SDN network8
Quality medical data management within an open AI architecture – cancer patients case8
Analysis of early fault vibration detection and analysis of offshore wind power transmission based on deep neural network8
A novel approach for anti-pollution attacks in network coding8
A novel anomaly detection method for multimodal WSN data flow via a dynamic graph neural network7
Digital streaming media distribution and transmission process optimisation based on adaptive recurrent neural network7
An efficient and DoS-resilient name lookup for NDN interest forwarding7
An effective scheduling in data centres for efficient CPU usage and service level agreement fulfilment using machine learning7
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding7
Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks7
Privacy-preserving location-based traffic density monitoring7
A hybrid optimization method by incorporating adaptive response strategy for Feedforward neural network7
HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system7
An SMVQ compressed data hiding scheme based on multiple linear regression prediction7
RFID network planning using a new hybrid ANNs-based approach7
SRDD: a lightweight end-to-end object detection with transformer7
Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network6
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks6
A new locally adaptive K-nearest centroid neighbor classification based on the average distance6
Performance analysis of an improved forked communication network model6
An adaptive differential evolution algorithm using fitness distance correlation and neighbourhood-based mutation strategy6
Hierarchical-fuzzy allocation and multi-parameter adjustment prediction for industrial loading optimisation6
TsFSIM: a three-step fast selection algorithm for influence maximisation in social network6
An EMD-based data hiding scheme for JPEG images6
An ensemble machine learning approach for classification tasks using feature generation6
A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain6
An image encryption algorithm based on multi-layered chaotic maps and its security analysis6
Deep blur detection network with boundary-aware multi-scale features6
Dynamic activation and enhanced image contour features for object detection6
RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system5
Learning adversarial policy in multiple scenes environment via multi-agent reinforcement learning5
Sentiment prediction based on analysis of customers assessments in food serving businesses5
Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT5
Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm5
Multi-Semantic Alignment Graph Convolutional Network5
Improving transaction safety via anti-fraud protection based on blockchain5
COSMIC FP method in software development estimation using artificial neural networks based on orthogonal arrays5
Optimal feature selection and invasive weed tunicate swarm algorithm-based hierarchical attention network for text classification5
A hybrid self-adaptive invasive weed algorithm with differential evolution5
Multi-branch feature learning based speech emotion recognition using SCAR-NET5
In the context of COVID-19: the impact of employees’ risk perception on work engagement5
Cost-sensitive regression learning on small dataset through intra-cluster product favoured feature selection5
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth5
CL-ECPE: contrastive learning with adversarial samples for emotion-cause pair extraction5
Re-LSTM: A long short-term memory network text similarity algorithm based on weighted word embedding5
Robust coal granularity estimation via deep neural network with an image enhancement layer5
An improved Monte Carlo Tree Search approach to workflow scheduling5
Collaborative pursuit-evasion game of multi-UAVs based on Apollonius circle in the environment with obstacle5
Comprehensive evaluation of the intelligence levels for unmanned swarms based on the collective OODA loop and group extension cloud model4
Automated threat modelling and risk analysis in e-Government using BPMN4
Safe transductive support vector machine4
Evaluating performance variations cross cloud data centres using multiview comparative workload traces analysis4
Blockchain-assisted data sharing supports deduplication for cloud storage4
Discovery of effective infrequent sequences based on maximum probability path4
A collaborative auditing scheme with dynamic data updates based on blockchain4
Collaborative filtering recommendation using fusing criteria against shilling attacks4
RACNet: risk assessment Net of cervical lesions in colposcopic images4
Theoretical and empirical validation of software trustworthiness measure based on the decomposition of attributes4
Entity and relation collaborative extraction approach based on multi-head attention and gated mechanism4
A multi-objective bilevel optimisation evolutionary algorithm with dual populations lower-level search4
A high-precision correction method in non-rigid 3D motion poses reconstruction4
Few shot object detection for headdresses and seats in Thangka Yidam based on ResNet and deformable convolution4
Do we need to pay technical debt in blockchain software systems?4
Application of efficient recognition algorithm based on deep neural network in English teaching scene4
Using active learning selection approach for cross-project software defect prediction4
Lightweight multilayer interactive attention network for aspect-based sentiment analysis4
IVP-YOLOv5: an intelligent vehicle-pedestrian detection method based on YOLOv5s4
Neural network pruning based on channel attention mechanism4
A point and density map hybrid network for crowd counting and localization based on unmanned aerial vehicles4
A feature-based intelligent deduplication compression system with extreme resemblance detection4
Dual conditional GAN based on external attention for semantic image synthesis3
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services3
An efficiency control strategy of dual-motor multi-gear drive algorithm3
PS-GCN: psycholinguistic graph and sentiment semantic fused graph convolutional networks for personality detection3
Semantic-aware multi-task learning for image aesthetic quality assessment3
Feature recommendation strategy for graph convolutional network3
Detecting unknown vulnerabilities in smart contracts using opcode sequences3
Monocular vision based on the YOLOv7 and coordinate transformation for vehicles precise positioning3
Business process recommendation method based on cost constraints3
Blockchain-based privacy-preserving multi-tasks federated learning framework3
Ensemble empirical mode decomposition-based preprocessing method with Multi-LSTM for time series forecasting: a case study for hog prices3
Affective feature knowledge interaction for empathetic conversation generation3
Research on the Uyghur morphological segmentation model with an attention mechanism3
Isolated toughness and fractional ( a,b,n )-critical graphs3
An improved multi-leader comprehensive learning particle swarm optimisation based on gravitational search algorithm3
An improved density peaks clustering algorithm by automatic determination of cluster centres3
Conceptual semantic enhanced representation learning for event recognition in still images3
Matching heterogeneous ontologies with adaptive evolutionary algorithm3
Profile-guided optimisation for indirect branches in a binary translator3
Towards Malay named entity recognition: an open-source dataset and a multi-task framework3
Fidan: a predictive service demand model for assisting nursing home health-care robots3
Active learning for deep object detection by fully exploiting unlabeled data3
Discovery of process variants based on trace context tree3
On routing algorithms in the internet of vehicles: a survey3
A dynamic global backbone updating for communication-efficient personalised federated learning3
Full-span named entity recognition with boundary regression3
A pricing model for subscriptions in data transactions3
0.071468830108643