Journal of King Saud University-Computer and Information Sciences

Papers
(The H4-Index of Journal of King Saud University-Computer and Information Sciences is 49. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Hybrid Salp Swarm Algorithm for integrating renewable distributed energy resources in distribution systems considering annual load growth235
Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation235
AUSS: An arabic query-based update-summarization system216
Combining reinforcement learning method to enhance LEDBAT++ over diversified network environments180
Efficient resource allocation in the IEEE 802.11ax network leveraging OFDMA technology155
FPGA implementation of a chaos-based image encryption algorithm149
LDPORR: A localized location privacy protection method based on optimized random response124
FUSE based file system for efficient storage and retrieval of fragmented multimedia files111
Skin cancer image segmentation utilizing a novel EN-GWO based hyper-parameter optimized FCEDN107
A Survey on Human Face Expression Recognition Techniques106
Effective and scalable black-box fuzzing approach for modern web applications100
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images97
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib94
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images94
Dynamizing Dijkstra: A solution to dynamic shortest path problem through retroactive priority queue86
Computability evaluation of RESTful API using Primitive Recursive Function82
Light weight approach for secure backbone construction for MANETs80
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm80
Dynamic SFC placement scheme with parallelized SFCs and reuse of initialized VNFs: An A3C-based DRL approach79
Identifying the influential nodes in complex social networks using centrality-based approach74
Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis74
Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic74
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism71
A Novel Metric based Detection of Temporary Field Code Smell and its Empirical Analysis70
DeepFocus: A visual focus of attention detection framework using deep learning in multi-object scenarios70
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication70
A joint model for entity boundary detection and entity span recognition67
Link prediction using extended neighborhood based local random walk in multilayer social networks66
Enhanced Zone-Based Energy Aware Data Collection Protocol for WSNs (E-ZEAL)65
Automatic mapping of configuration options in software using static analysis65
Integrating social media as cooperative learning tool in higher education classrooms: An empirical study65
Hybridization of meta-heuristic algorithm for load balancing in cloud computing environment64
Forwarding strategies in vehicular named data networks: A survey64
Hurst exponent based approach for influence maximization in social networks64
Improving the efficiency of network controllability processes on temporal networks64
Bengali handwritten equation solving system63
Cloud center energy consumption control for predictability in neural fuzzy systems62
Big data analytics in telecommunications: Governance, architecture and use cases62
Line graph contrastive learning for node classification62
Adaptive personalized privacy-preserving data collection scheme with local differential privacy61
A novel tree structure-based multi-prototype clustering algorithm60
Improving Sentiment Analysis of Arabic Tweets by One-way ANOVA59
Enhancing high-speed digital systems: MVL circuit design with CNTFET and RRAM57
Measuring the effect of monitoring on a cloud computing system by estimating the delay time of requests53
Application of soft computing techniques in machine reading of Quranic Kufic manuscripts52
CDBR: A semi-automated collaborative execute-before-after dependency-based requirement prioritization approach52
Energy-aware service composition in multi-Cloud50
A Jaya algorithm based wrapper method for optimal feature selection in supervised classification50
QSST: A Quranic Semantic Search Tool based on word embedding49
Outlier detection toward high-dimensional industrial data using extreme tensor-train learning machine with compression49
Multi-scale YOLACT for instance segmentation49
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study49
Energy efficient cluster head selection using improved Sparrow Search Algorithm in Wireless Sensor Networks49
1.3918359279633