Connection Science

Papers
(The median citation count of Connection Science is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
A text classification method based on a convolutional and bidirectional long short-term memory model95
Optimal feature selection and invasive weed tunicate swarm algorithm-based hierarchical attention network for text classification95
Matching heterogeneous ontologies with adaptive evolutionary algorithm84
Lane detection based on IBN deep neural network and attention67
AI-based data analysis for healthcare37
ScTCN-LightGBM: a hybrid learning method via transposed dimensionality-reduction convolution for loading measurement of industrial material33
Research on social recommendation algorithm based on fuzzy subjective trust30
Conceptual semantic enhanced representation learning for event recognition in still images29
Exploring the NFT market on ethereum: a comprehensive analysis and daily volume forecasting28
Exploring latent weight factors and global information for food-oriented cross-modal retrieval27
ASM-VoFDehaze: a real-time defogging method of zinc froth image26
Business process recommendation method based on cost constraints25
A pricing model for subscriptions in data transactions25
Digital streaming media distribution and transmission process optimisation based on adaptive recurrent neural network24
Real-time reading system for pointer meter based on YolactEdge23
Network security situation assessment based on dual attention mechanism and HHO-ResNeXt21
A high-precision correction method in non-rigid 3D motion poses reconstruction21
Particle-based simulation technique for medical applications21
A hybrid differential evolution for multi-objective optimisation problems20
Monocular vision based on the YOLOv7 and coordinate transformation for vehicles precise positioning20
The detection of distributional discrepancy for language GANs20
Image super-resolution reconstruction based on multi-scale dual-attention20
Dynamic activation and enhanced image contour features for object detection19
Detecting unknown vulnerabilities in smart contracts using opcode sequences16
TSCAPE: time series clustering with curve analysis and projection on an Euclidean space16
AICOM-MP: an AI-based monkeypox detector for resource-constrained environments16
GCN-based weakly-supervised community detection with updated structure centres selection16
Discovery of effective infrequent sequences based on maximum probability path16
Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation15
A point and density map hybrid network for crowd counting and localization based on unmanned aerial vehicles15
Human body contour extraction method based on human skeleton key point guidance15
Blockchain-based cross-user data shared auditing14
Empirical study of privacy inference attack against deep reinforcement learning models14
Image semantic segmentation with hierarchical feature fusion based on deep neural network13
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks13
CL-ECPE: contrastive learning with adversarial samples for emotion-cause pair extraction13
Aggregating multi-scale contextual features from multiple stages for semantic image segmentation13
Monocular vision guided deep reinforcement learning UAV systems with representation learning perception13
Full-span named entity recognition with boundary regression12
Anomaly detection of industrial state quantity time-Series data based on correlation and long short-term memory12
Selecting hybrids of metaheuristics for resource-constraint project scheduling problems with discounted cashflows12
Neural network pruning based on channel attention mechanism12
Deep blur detection network with boundary-aware multi-scale features11
Publishing Ethics & Integrity11
A dynamic global backbone updating for communication-efficient personalised federated learning11
A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain11
A novel approach for anti-pollution attacks in network coding11
A multi-objective bilevel optimisation evolutionary algorithm with dual populations lower-level search10
Signal fingerprint feature extraction and recognition method for communication satellite10
Counting and measuring the size and stomach fullness levels for an intelligent shrimp farming system10
FPGA-oriented lightweight multi-modal free-space detection network10
ALSEE: a framework for attribute-level sentiment element extraction towards product reviews10
TsFSIM: a three-step fast selection algorithm for influence maximisation in social network10
Impartial competitive learning in multi-layered neural networks10
Intelligent garbage classification system based on improve MobileNetV3-Large10
A data sharing method for remote medical system based on federated distillation learning and consortium blockchain10
A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids10
Neighbor interaction-based personalised transfer for cross-domain recommendation10
Selective transfer learning with adversarial training for stock movement prediction9
Blockchain-assisted data sharing supports deduplication for cloud storage9
Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)9
A novel general kernel-based non-negative matrix factorisation approach for face recognition9
An enhanced text classification model by the inverted attention orthogonal projection module9
A feature selection method with feature ranking using genetic programming8
A graph algorithm for the time constrained shortest path8
New modified exponentially weighted moving average-moving average control chart for process monitoring8
Composition pattern-aware web service recommendation based on depth factorisation machine8
An improved density peaks clustering algorithm by automatic determination of cluster centres8
Dependable workflow management system for smart farms8
A secure authentication and key agreement scheme with dynamic management for vehicular networks8
COSMIC FP method in software development estimation using artificial neural networks based on orthogonal arrays8
IVP-YOLOv5: an intelligent vehicle-pedestrian detection method based on YOLOv5s8
A new locally adaptive K-nearest centroid neighbor classification based on the average distance8
Online incremental updating for model enhancement based on multi-perspective trusted intervals8
Improving transaction safety via anti-fraud protection based on blockchain7
Emotion recognition based on convolutional gated recurrent units with attention7
A Blockchain-based federated learning framework for secure aggregation and fair incentives7
Explainable data mining model for hyperinsulinemia diagnostics7
A team-based multitask data acquisition scheme under time constraints in mobile crowd sensing7
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth7
Cross-modal learning with multi-modal model for video action recognition based on adaptive weight training7
Prediction of customer engagement behaviour response to marketing posts based on machine learning7
Analysis of early fault vibration detection and analysis of offshore wind power transmission based on deep neural network7
Early diagnosis of Alzheimer’s disease using dual GAN model with pyramid attention networks7
Toward cost-effective quantum circuit simulation with performance tuning techniques7
Applications of federated learning in smart cities: recent advances, taxonomy, and open challenges6
Devising single in-out long short-term memory univariate models for predicting the electricity price on the day-ahead markets6
Hybrid feature learning framework for the classification of encrypted network traffic6
Safe reinforcement learning for dynamical systems using barrier certificates6
Night construction site detection based on ghost-YOLOX6
AWDS-net: automatic whole-field segmentation network for characterising diverse breast masses6
The abnormal traffic detection scheme based on PCA and SSH6
Deep transfer learning mechanism for fine-grained cross-domain sentiment classification6
IPFS-blockchain-based delegation model for internet of medical robotics things telesurgery system6
Economic policies assessment and judgement during the pandemic with semantic and social network joint analysis6
An emotional classification method of Chinese short comment text based on ELECTRA5
Correction5
VQ-oriented data hiding based on adjustable error compensation strategy5
A multi-factorial evolutionary algorithm concerning diversity information for solving the multitasking Robust Influence Maximization Problem on networks5
Security analysis of smart contract based rating and review systems: the perilous state of blockchain-based recommendation practices5
PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain5
The algorithm and implementation of an extension to LLVM for solving the blocking between instruction sink and division-modulo combine5
CGRS: Collaborative Knowledge Propagation Graph Attention Network for Recipes Recommendation5
Classification of heart sound signals with Whisper model5
RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system5
Low cost network traffic measurement and fast recovery via redundant row subspace-based matrix completion5
ZigZag transform with Durstenfeld shuffle for fast and secure image encryption5
Cost-sensitive regression learning on small dataset through intra-cluster product favoured feature selection5
5GSS: a framework for 5G-secure-smart healthcare monitoring5
Feature recommendation strategy for graph convolutional network5
A novel deep learning model for stock market prediction using a sentiment analysis system from authoritative financial website’s data5
Predicting adolescent violence in Wartegg-ZeichenTest drawing images based on deep learning5
Collaborative pursuit-evasion game of multi-UAVs based on Apollonius circle in the environment with obstacle5
FedG2L: a privacy-preserving federated learning scheme base on “G2L” against poisoning attack5
Predicting algorithm of attC site based on combination optimization strategy5
Automated breast cancer detection by reconstruction independent component analysis (RICA) based hybrid features using machine learning paradigms4
IIM: an information interaction mechanism for aspect-based sentiment analysis4
A text classification method based on LSTM and graph attention network4
GASN: gamma distribution test for driver genes identification based on similarity networks4
A novel anomaly detection method for multimodal WSN data flow via a dynamic graph neural network4
Multi-featured spatial-temporal and dynamic multi-graph convolutional network for metro passenger flow prediction4
Automatic traffic modelling for creating digital twins to facilitate autonomous vehicle development4
An improved multi-leader comprehensive learning particle swarm optimisation based on gravitational search algorithm4
Entity and relation collaborative extraction approach based on multi-head attention and gated mechanism4
A remote sensing encrypted data search method based on a novel double-chain4
Blockchain-based anonymous authentication for traffic reporting in VANETs4
Trajectory privacy data publishing scheme based on local optimisation and R-tree4
Evaluating performance variations cross cloud data centres using multiview comparative workload traces analysis4
A simple but effective method for Indonesian automatic text summarisation4
Hierarchical-fuzzy allocation and multi-parameter adjustment prediction for industrial loading optimisation4
Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks4
Ontology-based semantic data interestingness using BERT models4
Explore deep auto-coder and big data learning to hard drive failure prediction: a two-level semi-supervised model4
Cue prompt adapting model for relation extraction4
Lightweight multilayer interactive attention network for aspect-based sentiment analysis4
On routing algorithms in the internet of vehicles: a survey4
High-performance computing for static security assessment of large power systems3
OCP: an OLAP-based bus crowdedness smart-perceiving mechanism for urban transportation3
An efficiency control strategy of dual-motor multi-gear drive algorithm3
MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance3
A multimodal differential privacy framework based on fusion representation learning3
EIoU-distance loss: an automated team-wise player detection and tracking with jersey colour recognition in soccer3
Multi-Semantic Alignment Graph Convolutional Network3
HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system3
A multimodal hybrid parallel network intrusion detection model3
Monocular 3D object detection with thermodynamic loss and decoupled instance depth3
NNNPE: non-neighbourhood and neighbourhood preserving embedding3
Safe transductive support vector machine3
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding3
In the context of COVID-19: the impact of employees’ risk perception on work engagement3
Neural-based automatic scoring model for Chinese-English interpretation with a multi-indicator assessment3
Secure smart grid implementation with automatic data integrity attack location prediction and exalted energy theft detection3
Knowledge enhancement for speech emotion recognition via multi-level acoustic feature3
Secure medical digital twin via human-centric interaction and cyber vulnerability resilience3
Semantic-aware multi-task learning for image aesthetic quality assessment3
S_I_LSTM: stock price prediction based on multiple data sources and sentiment analysis3
Blockchain application in P2P energy markets: social and legal aspects3
SRDD: a lightweight end-to-end object detection with transformer3
Isolated toughness and fractional ( a,b,n )-critical graphs3
A Swish RNN based customer churn prediction for the telecom industry with a novel feature selection strategy3
Enhancing image data security using the APFB model3
An image encryption algorithm based on multi-layered chaotic maps and its security analysis3
Theoretical and empirical validation of software trustworthiness measure based on the decomposition of attributes3
0.25268507003784