Journal of King Saud University-Computer and Information Sciences

Papers
(The H4-Index of Journal of King Saud University-Computer and Information Sciences is 71. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
FogCom:SDN-enabled fog node selection for early detection of communicable diseases701
Line graph contrastive learning for node classification360
Structure recovery from single omnidirectional image with distortion-aware learning329
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods268
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism253
A new stemming model based on data generation to enhance Arabic information retrieval233
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign221
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks216
View-label driven cross-space structure alignment for incomplete multi-view partial multi-label classification181
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib178
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution172
AUSS: An arabic query-based update-summarization system159
Music rhythm tree based partitioning approach to decision tree classifier149
Achieving stepwise construction of cyber physical systems in EX-MAN component model149
Hurst exponent based approach for influence maximization in social networks140
A COSMIC function points based test effort estimation model for mobile applications138
Multi-modal fake news detection: A comprehensive survey on deep learning technology, advances, and challenges137
VTraceChain: A verifiable block chain with double-chain architecture for enhanced tracking137
QSST: A Quranic Semantic Search Tool based on word embedding129
A joint model for entity boundary detection and entity span recognition128
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram127
Big data analytics in telecommunications: Governance, architecture and use cases123
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets122
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease121
Multi-scale YOLACT for instance segmentation119
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems117
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection115
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature110
Dual-branch geometric algebra graph network with pyramid fusion for deformable medical image registration110
Handling data sparsity via item metadata embedding into deep collaborative recommender system109
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter109
Dense attentive GAN-based one-class model for detection of autism and ADHD109
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis103
A review of IoT network management: Current status and perspectives103
Identifying the influential nodes in complex social networks using centrality-based approach101
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network99
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images99
NMD-FusionNet: a multimodal fusion-based medical imaging-assisted diagnostic model for liver cancer96
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario95
A Secure & reserved pricing mechanism for peer-to-peer energy trading using additive secret sharing and blockchain94
LDPORR: A localized location privacy protection method based on optimized random response93
Enhanced computer vision applications with blockchain: A review of applications and opportunities92
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data90
Fast and robust JND-guided video watermarking scheme in spatial domain89
A Q-learning-based smart clustering routing method in flying Ad Hoc networks88
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice85
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation85
Accepting multiple splicing systems84
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment84
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients84
Parallel graph-based anomaly detection technique for sequential data83
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning83
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction82
ABF-RRT*: Bidirectional fast optimal rapidly-exploring random tree via adaptive sampling of a permissible hyper-ellipsoid82
DiagX-DT: diagnostic exclusion reasoning with dialectical thinking for traditional Chinese medicine in large language models81
An online multi-camera multi-vehicle tracking using lightweight YOLO11 and improved association strategies81
Improving artificial bee colony algorithm using modified nearest neighbor sequence80
An improved multi-copy cloud data auditing scheme and its application79
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme79
RIS-NOMA-assisted short-packet communication with direct links78
Enhanced sugeno fuzzy inference system with fuzzy AHP and coefficient of variation to diagnose cardiovascular disease during pregnancy78
Graph contrast learning for recommendation based on relational graph convolutional neural network77
Leukocyte segmentation based on DenseREU-Net77
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA76
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine75
Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images74
STORE: Security Threat Oriented Requirements Engineering Methodology74
A practical streaming approximate matrix multiplication algorithm73
C3CPS: CRITIC-CoCoSo-based caching placement strategy using multi-criteria decision method for efficient content distribution in Named Data Networking72
Association rules of fuzzy soft set based classification for text classification problem72
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm72
Estimating the relative importance of nodes in complex networks based on network embedding and gravity model71
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention71
0.1913731098175