Journal of King Saud University-Computer and Information Sciences

Papers
(The H4-Index of Journal of King Saud University-Computer and Information Sciences is 69. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Line graph contrastive learning for node classification609
A joint model for entity boundary detection and entity span recognition332
Structure recovery from single omnidirectional image with distortion-aware learning307
Music rhythm tree based partitioning approach to decision tree classifier217
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems214
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods206
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease203
Multi-scale YOLACT for instance segmentation195
A review of IoT network management: Current status and perspectives167
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism166
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter161
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data151
Fast and robust JND-guided video watermarking scheme in spatial domain142
Handling data sparsity via item metadata embedding into deep collaborative recommender system139
A new stemming model based on data generation to enhance Arabic information retrieval128
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection128
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign124
QSST: A Quranic Semantic Search Tool based on word embedding123
Enhanced computer vision applications with blockchain: A review of applications and opportunities123
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature116
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks115
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib114
View-label driven cross-space structure alignment for incomplete multi-view partial multi-label classification114
Big data analytics in telecommunications: Governance, architecture and use cases113
Achieving stepwise construction of cyber physical systems in EX-MAN component model111
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images110
Hurst exponent based approach for influence maximization in social networks108
AUSS: An arabic query-based update-summarization system108
A COSMIC function points based test effort estimation model for mobile applications106
A Q-learning-based smart clustering routing method in flying Ad Hoc networks100
FogCom:SDN-enabled fog node selection for early detection of communicable diseases100
LDPORR: A localized location privacy protection method based on optimized random response98
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis96
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario96
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation95
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution95
Dense attentive GAN-based one-class model for detection of autism and ADHD94
NMD-FusionNet: a multimodal fusion-based medical imaging-assisted diagnostic model for liver cancer93
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images93
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network92
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram90
VTraceChain: A verifiable block chain with double-chain architecture for enhanced tracking88
Identifying the influential nodes in complex social networks using centrality-based approach87
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets86
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice85
Accepting multiple splicing systems82
Association rules of fuzzy soft set based classification for text classification problem82
A joint Multi-decoder Dual-attention U-Net framework for tumor segmentation in Whole Slide Images81
Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm80
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients80
Parallel graph-based anomaly detection technique for sequential data79
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment79
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning78
Improving outliers detection in data streams using LiCS and voting77
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction76
Towards the design of personalized adaptive user interfaces for smart TV viewers75
An online multi-camera multi-vehicle tracking using lightweight YOLO11 and improved association strategies75
ABF-RRT*: Bidirectional fast optimal rapidly-exploring random tree via adaptive sampling of a permissible hyper-ellipsoid75
DiagX-DT: diagnostic exclusion reasoning with dialectical thinking for traditional Chinese medicine in large language models74
Leukocyte segmentation based on DenseREU-Net74
Graph-based reinforcement learning for software-defined networking traffic engineering74
Integrating LLM-based code optimization with human-like exclusionary reasoning for computational education73
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme73
Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images73
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆71
An empirical study of problems and evaluation of IoT malware classification label sources71
A practical streaming approximate matrix multiplication algorithm71
MSTFormer: multi-granularity spatial-temporal transformers for 3D human pose estimation70
Part-of-speech based label update network for aspect sentiment triplet extraction69
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm69
Electrolytic capacitor surface defect detection based on deep convolution neural network69
0.12930607795715