Journal of King Saud University-Computer and Information Sciences

Papers
(The H4-Index of Journal of King Saud University-Computer and Information Sciences is 64. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
LDPORR: A localized location privacy protection method based on optimized random response526
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network307
Hurst exponent based approach for influence maximization in social networks282
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images201
A Q-learning-based smart clustering routing method in flying Ad Hoc networks188
Achieving stepwise construction of cyber physical systems in EX-MAN component model185
QSST: A Quranic Semantic Search Tool based on word embedding173
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature152
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm150
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution146
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation141
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods139
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images126
A COSMIC function points based test effort estimation model for mobile applications119
AUSS: An arabic query-based update-summarization system118
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism114
Enhanced computer vision applications with blockchain: A review of applications and opportunities112
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter111
Identifying the influential nodes in complex social networks using centrality-based approach108
Multi-scale YOLACT for instance segmentation107
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign107
A joint model for entity boundary detection and entity span recognition105
Line graph contrastive learning for node classification103
Structure recovery from single omnidirectional image with distortion-aware learning102
FogCom:SDN-enabled fog node selection for early detection of communicable diseases102
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis101
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease100
Handling data sparsity via item metadata embedding into deep collaborative recommender system98
Music rhythm tree based partitioning approach to decision tree classifier93
Fast and robust JND-guided video watermarking scheme in spatial domain91
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks90
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets89
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems88
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection88
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram88
Dense attentive GAN-based one-class model for detection of autism and ADHD86
Big data analytics in telecommunications: Governance, architecture and use cases85
View-label driven cross-space structure alignment for incomplete multi-view partial multi-label classification85
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data84
A review of IoT network management: Current status and perspectives84
NMD-FusionNet: a multimodal fusion-based medical imaging-assisted diagnostic model for liver cancer81
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib81
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario79
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine75
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm75
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA75
RIS-NOMA-assisted short-packet communication with direct links74
Electrolytic capacitor surface defect detection based on deep convolution neural network74
An empirical study of problems and evaluation of IoT malware classification label sources72
MSTFormer: multi-granularity spatial-temporal transformers for 3D human pose estimation72
Communication and computational resource optimization for Industry 5.0 smart devices empowered by MEC71
An improved multi-copy cloud data auditing scheme and its application71
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆70
A practical streaming approximate matrix multiplication algorithm70
ABF-RRT*: Bidirectional fast optimal rapidly-exploring random tree via adaptive sampling of a permissible hyper-ellipsoid69
An online multi-camera multi-vehicle tracking using lightweight YOLO11 and improved association strategies69
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment67
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment66
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime66
Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm66
Parallel graph-based anomaly detection technique for sequential data66
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning65
Improving outliers detection in data streams using LiCS and voting65
Towards the design of personalized adaptive user interfaces for smart TV viewers64
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction64
0.11035585403442