Journal of King Saud University-Computer and Information Sciences

Papers
(The H4-Index of Journal of King Saud University-Computer and Information Sciences is 73. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Music rhythm tree based partitioning approach to decision tree classifier838
LDPORR: A localized location privacy protection method based on optimized random response386
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism379
A new stemming model based on data generation to enhance Arabic information retrieval261
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram246
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease225
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature206
Achieving stepwise construction of cyber physical systems in EX-MAN component model195
Hurst exponent based approach for influence maximization in social networks170
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets166
MLEF: a novel meta-learning framework with feature selection for enhanced athlete fatigue risk prediction159
A Q-learning-based smart clustering routing method in flying Ad Hoc networks157
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution156
Cross-scale hypergraph contrastive clustering150
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis147
A comprehensive survey on security and privacy in IoMT-driven smart healthcare: security attacks, mitigation measures, and future research direction141
VTraceChain: A verifiable block chain with double-chain architecture for enhanced tracking141
AUSS: An arabic query-based update-summarization system136
A multi-conditional prior-guided dual spiral CNN-Mamba network for face sketch-photo synthesis133
A Secure & reserved pricing mechanism for peer-to-peer energy trading using additive secret sharing and blockchain132
FogCom:SDN-enabled fog node selection for early detection of communicable diseases132
A joint model for entity boundary detection and entity span recognition131
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods131
Beyond single image: modified saliency aggregation for universal attacks on STR models129
Structure recovery from single omnidirectional image with distortion-aware learning127
Dual-branch geometric algebra graph network with pyramid fusion for deformable medical image registration121
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network121
View-label driven cross-space structure alignment for incomplete multi-view partial multi-label classification117
Line graph contrastive learning for node classification117
Automatic speech recognition and dialect identification for Arabic and Saudi dialects: a systematic literature review112
NMD-FusionNet: a multimodal fusion-based medical imaging-assisted diagnostic model for liver cancer109
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign108
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data107
Dense attentive GAN-based one-class model for detection of autism and ADHD102
Handling data sparsity via item metadata embedding into deep collaborative recommender system101
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection101
Fast and robust JND-guided video watermarking scheme in spatial domain101
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems100
Identifying the influential nodes in complex social networks using centrality-based approach100
Big data analytics in telecommunications: Governance, architecture and use cases98
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter95
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks94
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation94
SCARNet: spatial-channel attention and multi-scale refinement network for 3D human pose estimation93
Multi-scale YOLACT for instance segmentation93
Enhanced computer vision applications with blockchain: A review of applications and opportunities93
Multi-modal fake news detection: A comprehensive survey on deep learning technology, advances, and challenges92
Accepting multiple splicing systems91
A review of IoT network management: Current status and perspectives91
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment89
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients89
ABF-RRT*: Bidirectional fast optimal rapidly-exploring random tree via adaptive sampling of a permissible hyper-ellipsoid88
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme88
Communication and computational resource optimization for Industry 5.0 smart devices empowered by MEC87
Leukocyte segmentation based on DenseREU-Net85
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm84
MSTFormer: multi-granularity spatial-temporal transformers for 3D human pose estimation83
MSTDP: a multi-scale temporal deep learning framework for just-in-time software defect prediction with cross-attention fusion83
Multi-Layer feature fusion with Layer-GAT and adaptive readout for transformer text classification83
Distance-based confidence generation and aggregation of classifier for unstructured road detection83
Estimating the relative importance of nodes in complex networks based on network embedding and gravity model81
General secure encryption algorithm for separable reversible data hiding in encrypted domain80
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA78
An online multi-camera multi-vehicle tracking using lightweight YOLO11 and improved association strategies78
Electrolytic capacitor surface defect detection based on deep convolution neural network77
Integrating LLM-based code optimization with human-like exclusionary reasoning for computational education77
Intelligent recognition and analysis of student behavior in real-classroom scenarios: a comprehensive survey, exploration, and future perspectives76
Improving artificial bee colony algorithm using modified nearest neighbor sequence76
DAORNet: Dense-attentive network for occlusion removal in light field images76
Optimized 3D path planning for UAVs using a multi-strategy snow avalanches algorithm75
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention75
A forward-backward smoothing algorithm for extended object tracking based on the PMBM filter73
Adaptive heterogeneous multi-agent debate for enhanced educational and factual reasoning in large language models73
0.11782097816467