Connection Science

Papers
(The median citation count of Connection Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Applications of federated learning in smart cities: recent advances, taxonomy, and open challenges68
S_I_LSTM: stock price prediction based on multiple data sources and sentiment analysis49
Binary atom search optimisation approaches for feature selection42
A novel blockchain-based privacy-preserving framework for online social networks40
Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system37
Effective classification of android malware families through dynamic features and neural networks28
An emotional classification method of Chinese short comment text based on ELECTRA25
Deep transfer learning mechanism for fine-grained cross-domain sentiment classification24
Adaptive weights learning in CNN feature fusion for crime scene investigation image classification23
API recommendation for Mashup creation based on neural graph collaborative filtering23
The identification of influential nodes based on structure similarity23
Graph learning-based spatial-temporal graph convolutional neural networks for traffic forecasting22
OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems21
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning21
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic21
A real-world service mashup platform based on data integration, information synthesis, and knowledge fusion20
A text classification method based on a convolutional and bidirectional long short-term memory model20
A Swish RNN based customer churn prediction for the telecom industry with a novel feature selection strategy19
NFMF: neural fusion matrix factorisation for QoS prediction in service selection19
A lightweight authentication scheme for telecare medical information system19
Extending emotional lexicon for improving the classification accuracy of Chinese film reviews18
Secure medical digital twin via human-centric interaction and cyber vulnerability resilience17
CNN Convolutional layer optimisation based on quantum evolutionary algorithm17
Prediction of customer engagement behaviour response to marketing posts based on machine learning16
A novel cluster head selection using Hybrid Artificial Bee Colony and Firefly Algorithm for network lifetime and stability in WSNs16
A sigmoid attractiveness based improved firefly algorithm and its applications in IIR filter design15
A novel image compression technology based on vector quantisation and linear regression prediction15
Composition pattern-aware web service recommendation based on depth factorisation machine15
WTL-CNN: a news text classification method of convolutional neural network based on weighted word embedding15
BFS: A blockchain-based financing scheme for logistics company in supply chain finance14
5GSS: a framework for 5G-secure-smart healthcare monitoring14
ClothGAN: generation of fashionable Dunhuang clothes using generative adversarial networks14
An edge streaming data processing framework for autonomous driving14
Modelling and simulation of sprinters’ health promotion strategy based on sports biomechanics14
Blockchain-based anonymous authentication for traffic reporting in VANETs14
A novel data representation framework based on nonnegative manifold regularisation13
Self-adaptive spatial-temporal network based on heterogeneous data for air quality prediction13
Intelligent garbage classification system based on improve MobileNetV3-Large13
Empirical research of accounting conservatism, corporate governance and stock price collapse risk based on panel data model12
An extrinsic random-based ensemble approach for android malware detection12
Blockchain application in P2P energy markets: social and legal aspects12
The abnormal traffic detection scheme based on PCA and SSH12
TCN enhanced novel malicious traffic detection for IoT devices12
An adaptive defense mechanism to prevent advanced persistent threats12
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud12
Multi-stream part-fused graph convolutional networks for skeleton-based gait recognition11
CG-Art: demystifying the anthropocentric bias of artistic creativity11
Securing top-k query processing in two-tiered sensor networks11
Selective transfer learning with adversarial training for stock movement prediction11
AMGNET: multi-scale graph neural networks for flow field prediction11
An efficient sparse pruning method for human pose estimation10
A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles10
Sentiment classification of Chinese Weibo based on extended sentiment dictionary and organisational structure of comments10
A new method for weighted ensemble clustering and coupled ensemble selection10
Automatic traffic modelling for creating digital twins to facilitate autonomous vehicle development10
A content-based recommendation approach based on singular value decomposition10
A conditional opposition-based particle swarm optimisation for feature selection10
Analysing rumours spreading considering self-purification mechanism10
ASM-VoFDehaze: a real-time defogging method of zinc froth image9
Automatic classification method of liver ultrasound standard plane images using pre-trained convolutional neural network9
A simple but effective method for Indonesian automatic text summarisation9
GP-GCN: Global features of orthogonal projection and local dependency fused graph convolutional networks for aspect-level sentiment classification9
A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain9
A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles9
Multi-distribution noise quantisation: an extreme compression scheme for transformer according to parameter distribution8
Automated breast cancer detection by reconstruction independent component analysis (RICA) based hybrid features using machine learning paradigms8
Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation8
Lithium-ion battery state-of-charge estimation based on a dual extended Kalman filter and BPNN correction8
ALSEE: a framework for attribute-level sentiment element extraction towards product reviews8
Image semantic segmentation with hierarchical feature fusion based on deep neural network8
Deep and hybrid learning of MRI diagnosis for early detection of the progression stages in Alzheimer’s disease8
Anomaly detection of industrial state quantity time-Series data based on correlation and long short-term memory8
A hybrid differential evolution for multi-objective optimisation problems8
SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems7
State-of-charge estimation for Lithium-Ion batteries using Kalman filters based on fractional-order models7
Energy-efficient control of thermal comfort in multi-zone residential HVAC via reinforcement learning7
A novel approach for anti-pollution attacks in network coding7
Digital streaming media distribution and transmission process optimisation based on adaptive recurrent neural network7
Personalised context-aware re-ranking in recommender system7
Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis7
New modified exponentially weighted moving average-moving average control chart for process monitoring7
An SMVQ compressed data hiding scheme based on multiple linear regression prediction7
Image super-resolution reconstruction based on multi-scale dual-attention7
An effective scheduling in data centres for efficient CPU usage and service level agreement fulfilment using machine learning7
Using machine learning techniques for DSP software performance prediction at source code level7
A novel general kernel-based non-negative matrix factorisation approach for face recognition7
Content-based image retrieval using block truncation coding based on edge quantization7
A community partitioning algorithm based on network enhancement7
Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network6
A text classification method based on LSTM and graph attention network6
Deep blur detection network with boundary-aware multi-scale features6
TsFSIM: a three-step fast selection algorithm for influence maximisation in social network6
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks6
An efficient and DoS-resilient name lookup for NDN interest forwarding6
SRDD: a lightweight end-to-end object detection with transformer6
Multi-featured spatial-temporal and dynamic multi-graph convolutional network for metro passenger flow prediction6
Performance analysis of an improved forked communication network model6
Aggregating multi-scale contextual features from multiple stages for semantic image segmentation6
A dynamic network traffic classifier using supervised ML for a Docker-based SDN network6
Security analysis of smart contract based rating and review systems: the perilous state of blockchain-based recommendation practices6
Tyre pattern image retrieval – current status and challenges6
CASH: correlation-aware scheduling to mitigate soft error impact on heterogeneous multicores6
Blockchain-based cross-user data shared auditing6
NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention5
KG4Py: A toolkit for generating Python knowledge graph and code semantic search5
Extracting road maps from high-resolution satellite imagery using refined DSE-LinkNet5
A feature selection method with feature ranking using genetic programming5
Dynamic activation and enhanced image contour features for object detection5
Robust coal granularity estimation via deep neural network with an image enhancement layer5
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning5
Cost-sensitive regression learning on small dataset through intra-cluster product favoured feature selection5
A team-based multitask data acquisition scheme under time constraints in mobile crowd sensing5
Privacy-preserving location-based traffic density monitoring5
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding5
A novel anomaly detection method for multimodal WSN data flow via a dynamic graph neural network5
Analysis of early fault vibration detection and analysis of offshore wind power transmission based on deep neural network5
An EMD-based data hiding scheme for JPEG images4
A hybrid self-adaptive invasive weed algorithm with differential evolution4
Sentiment prediction based on analysis of customers assessments in food serving businesses4
An adaptive differential evolution algorithm using fitness distance correlation and neighbourhood-based mutation strategy4
RFID network planning using a new hybrid ANNs-based approach4
HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system4
A hybrid optimization method by incorporating adaptive response strategy for Feedforward neural network4
A new locally adaptive K-nearest centroid neighbor classification based on the average distance4
A high-precision correction method in non-rigid 3D motion poses reconstruction4
Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system4
Quality medical data management within an open AI architecture – cancer patients case4
Collaborative filtering recommendation using fusing criteria against shilling attacks4
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks4
An improved Monte Carlo Tree Search approach to workflow scheduling4
Hierarchical-fuzzy allocation and multi-parameter adjustment prediction for industrial loading optimisation4
CL-ECPE: contrastive learning with adversarial samples for emotion-cause pair extraction4
Optimal feature selection and invasive weed tunicate swarm algorithm-based hierarchical attention network for text classification4
A feature-based intelligent deduplication compression system with extreme resemblance detection4
A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain4
Do we need to pay technical debt in blockchain software systems?4
In the context of COVID-19: the impact of employees’ risk perception on work engagement4
RACNet: risk assessment Net of cervical lesions in colposcopic images4
Lightweight multilayer interactive attention network for aspect-based sentiment analysis4
Entity and relation collaborative extraction approach based on multi-head attention and gated mechanism3
Feature recommendation strategy for graph convolutional network3
Blockchain-assisted data sharing supports deduplication for cloud storage3
Business process recommendation method based on cost constraints3
Re-LSTM: A long short-term memory network text similarity algorithm based on weighted word embedding3
Comprehensive evaluation of the intelligence levels for unmanned swarms based on the collective OODA loop and group extension cloud model3
Evaluating performance variations cross cloud data centres using multiview comparative workload traces analysis3
An improved multi-leader comprehensive learning particle swarm optimisation based on gravitational search algorithm3
COSMIC FP method in software development estimation using artificial neural networks based on orthogonal arrays3
Discovery of effective infrequent sequences based on maximum probability path3
Threat analysis model to control IoT network routing attacks through deep learning approach3
Towards Malay named entity recognition: an open-source dataset and a multi-task framework3
Theoretical and empirical validation of software trustworthiness measure based on the decomposition of attributes3
A multimodal hybrid parallel network intrusion detection model3
A multi-objective bilevel optimisation evolutionary algorithm with dual populations lower-level search3
RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system3
Learning adversarial policy in multiple scenes environment via multi-agent reinforcement learning3
Few shot object detection for headdresses and seats in Thangka Yidam based on ResNet and deformable convolution3
Ensemble empirical mode decomposition-based preprocessing method with Multi-LSTM for time series forecasting: a case study for hog prices3
Realised volatility prediction of high-frequency data with jumps based on machine learning2
Neural-based automatic scoring model for Chinese-English interpretation with a multi-indicator assessment2
Multi-branch feature learning based speech emotion recognition using SCAR-NET2
ZigZag transform with Durstenfeld shuffle for fast and secure image encryption2
Isolated toughness and fractional ( a,b,n )-critical graphs2
Multi-Semantic Alignment Graph Convolutional Network2
Improving transaction safety via anti-fraud protection based on blockchain2
Matching heterogeneous ontologies with adaptive evolutionary algorithm2
A pricing model for subscriptions in data transactions2
Discovery of process variants based on trace context tree2
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services2
Using active learning selection approach for cross-project software defect prediction2
Predicting before acting: improving policy quality by taking a vision of consequence2
CGRS: Collaborative Knowledge Propagation Graph Attention Network for Recipes Recommendation2
Semantic-aware multi-task learning for image aesthetic quality assessment2
Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)2
A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids2
Research on social recommendation algorithm based on fuzzy subjective trust2
Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT2
Application of efficient recognition algorithm based on deep neural network in English teaching scene2
Simulation research on safety detection of pattern rope jumping motion based on large data background2
Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks2
Malware detection based on visualization of recombined API instruction sequence2
What is beautiful is not always good: influence of machine learning-derived photo attractiveness on intention to initiate social interactions in mobile dating applications2
An improved density peaks clustering algorithm by automatic determination of cluster centres2
Monocular vision based on the YOLOv7 and coordinate transformation for vehicles precise positioning2
Conceptual semantic enhanced representation learning for event recognition in still images2
0.06044602394104