Journal of King Saud University-Computer and Information Sciences

Papers
(The median citation count of Journal of King Saud University-Computer and Information Sciences is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Music rhythm tree based partitioning approach to decision tree classifier838
LDPORR: A localized location privacy protection method based on optimized random response386
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism379
A new stemming model based on data generation to enhance Arabic information retrieval261
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram246
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease225
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature206
Achieving stepwise construction of cyber physical systems in EX-MAN component model195
Hurst exponent based approach for influence maximization in social networks170
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets166
MLEF: a novel meta-learning framework with feature selection for enhanced athlete fatigue risk prediction159
A Q-learning-based smart clustering routing method in flying Ad Hoc networks157
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution156
Cross-scale hypergraph contrastive clustering150
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis147
VTraceChain: A verifiable block chain with double-chain architecture for enhanced tracking141
A comprehensive survey on security and privacy in IoMT-driven smart healthcare: security attacks, mitigation measures, and future research direction141
AUSS: An arabic query-based update-summarization system136
A multi-conditional prior-guided dual spiral CNN-Mamba network for face sketch-photo synthesis133
FogCom:SDN-enabled fog node selection for early detection of communicable diseases132
A Secure & reserved pricing mechanism for peer-to-peer energy trading using additive secret sharing and blockchain132
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods131
A joint model for entity boundary detection and entity span recognition131
Beyond single image: modified saliency aggregation for universal attacks on STR models129
Structure recovery from single omnidirectional image with distortion-aware learning127
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network121
Dual-branch geometric algebra graph network with pyramid fusion for deformable medical image registration121
Line graph contrastive learning for node classification117
View-label driven cross-space structure alignment for incomplete multi-view partial multi-label classification117
Automatic speech recognition and dialect identification for Arabic and Saudi dialects: a systematic literature review112
NMD-FusionNet: a multimodal fusion-based medical imaging-assisted diagnostic model for liver cancer109
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign108
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data107
Dense attentive GAN-based one-class model for detection of autism and ADHD102
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection101
Fast and robust JND-guided video watermarking scheme in spatial domain101
Handling data sparsity via item metadata embedding into deep collaborative recommender system101
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems100
Identifying the influential nodes in complex social networks using centrality-based approach100
Big data analytics in telecommunications: Governance, architecture and use cases98
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter95
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation94
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks94
Multi-scale YOLACT for instance segmentation93
Enhanced computer vision applications with blockchain: A review of applications and opportunities93
SCARNet: spatial-channel attention and multi-scale refinement network for 3D human pose estimation93
Multi-modal fake news detection: A comprehensive survey on deep learning technology, advances, and challenges92
A review of IoT network management: Current status and perspectives91
Accepting multiple splicing systems91
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment89
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients89
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme88
ABF-RRT*: Bidirectional fast optimal rapidly-exploring random tree via adaptive sampling of a permissible hyper-ellipsoid88
Communication and computational resource optimization for Industry 5.0 smart devices empowered by MEC87
Leukocyte segmentation based on DenseREU-Net85
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm84
MSTDP: a multi-scale temporal deep learning framework for just-in-time software defect prediction with cross-attention fusion83
Multi-Layer feature fusion with Layer-GAT and adaptive readout for transformer text classification83
Distance-based confidence generation and aggregation of classifier for unstructured road detection83
MSTFormer: multi-granularity spatial-temporal transformers for 3D human pose estimation83
Estimating the relative importance of nodes in complex networks based on network embedding and gravity model81
General secure encryption algorithm for separable reversible data hiding in encrypted domain80
An online multi-camera multi-vehicle tracking using lightweight YOLO11 and improved association strategies78
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA78
Electrolytic capacitor surface defect detection based on deep convolution neural network77
Integrating LLM-based code optimization with human-like exclusionary reasoning for computational education77
Improving artificial bee colony algorithm using modified nearest neighbor sequence76
DAORNet: Dense-attentive network for occlusion removal in light field images76
Intelligent recognition and analysis of student behavior in real-classroom scenarios: a comprehensive survey, exploration, and future perspectives76
Optimized 3D path planning for UAVs using a multi-strategy snow avalanches algorithm75
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention75
Adaptive heterogeneous multi-agent debate for enhanced educational and factual reasoning in large language models73
A forward-backward smoothing algorithm for extended object tracking based on the PMBM filter73
Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm72
An empirical study of problems and evaluation of IoT malware classification label sources72
Lml-yolo: Composite enhanced YOLO object detection model for underwater complex environments70
A two-stage feature aggregation network for multi-category soybean leaf disease identification70
A joint Multi-decoder Dual-attention U-Net framework for tumor segmentation in Whole Slide Images70
DiagX-DT: diagnostic exclusion reasoning with dialectical thinking for traditional Chinese medicine in large language models69
ESCALB: An effective slave controller allocation-based load balancing scheme for multi-domain SDN-enabled-IoT networks69
Towards the design of personalized adaptive user interfaces for smart TV viewers69
RIS-NOMA-assisted short-packet communication with direct links68
SCB-Net: Self-supervised nuclei segmentation network with saliency guidance and contextual boundary attention68
Multi-bit watermarking for deep models via clean trigger samples and pairwise class-difference vectors68
ADMM-based online spectral hashing with elastic metric for cross-modal retrieval67
Graph contrast learning for recommendation based on relational graph convolutional neural network67
Enhanced sugeno fuzzy inference system with fuzzy AHP and coefficient of variation to diagnose cardiovascular disease during pregnancy67
Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images65
A remote sensing image pan-sharpening method based on spectral-spatial balanced adaptive model and polar lights optimizer with two-dimensional ising model in spherical coordinate system65
Graph-based reinforcement learning for software-defined networking traffic engineering64
Transformer -based audio-visual features for video copy detection64
Part-of-speech based label update network for aspect sentiment triplet extraction63
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment62
Image steganography using exploiting modification direction for compressed encrypted data61
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction60
C3CPS: CRITIC-CoCoSo-based caching placement strategy using multi-criteria decision method for efficient content distribution in Named Data Networking60
Precision agriculture using IoT data analytics and machine learning60
An improved multi-copy cloud data auditing scheme and its application59
AtG-ContextNet: a temporal attention and hybrid gating architecture for facial blendshape coefficient regression59
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆59
Leveraging artificial intelligence and mutual authentication to optimize content caching in edge data centers59
Integrating multi-scale decoupled representations for traffic image restoration under multiple adverse weather conditions59
Quality guided reversible data hiding with contrast enhancement58
STAGE: spatio-temporal attention graph-enhanced policy optimization for area defense in UAV swarm confrontations58
Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain57
An improved hidden behavioral pattern mining approach to enhance the performance of recommendation system in a big data environment57
Memory-based collaborative filtering based on matrix factorization and Gower's set rank57
Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps55
TMCNet: A few-shot defect segmentation method based on triplet-based feature enhancement and multi-scale cascaded decoding55
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare55
Efficient Wear-Leveling-Aware Data Placement for LSM-Tree based key-value store on ZNS SSDs55
FedAware: a distributed IoT intrusion detection method based on fractal shrinking autoencoder54
A review of diabetic retinopathy: Datasets, approaches, evaluation metrics and future trends54
Firefly forest: A swarm iteration-free swarm intelligence clustering algorithm54
Multi-level feature re-weighted fusion for the semantic segmentation of crops and weeds54
A two-stage framework with search space pruning for combined algorithm selection and hyperparameter optimization54
HBD-NanoDetPlus:a lightweight detection model for vehicle high beam headlights in rainy and snowy weather53
Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions53
A multi-layer windmill image retention encryption algorithm based on composite sequences and DNA53
HieraFocus: adaptive transformer-based recognition of complex graphic patterns in medical tumor imaging52
DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering52
DE-HQC: dual encoding hybrid quantum convolutional neural network for encrypted traffic classification52
R-TAFM: purely convolutional recurrent refinement for deployment-oriented monocular depth estimation52
Courtroom-FND: a multi-role fake news detection method based on argument switching-based courtroom debate52
Contrast and brightness balance in image enhancement using Cuckoo Search-optimized image fusion51
Ensemble Stacking Model for Sentiment Analysis of Emirati and Arabic Dialects51
Image block generation from block-based SMRT in colour image encryption and its performance analysis51
Rainfall identification and rain intensity classification model in shipborne images based on rain-sensitive attention51
An enhanced adaptive 3D path planning algorithm for mobile robots with obstacle buffering and improved Theta* using minimum snap trajectory smoothing51
Towards an integrated swarm intelligence framework for urban mobility:A systematic review and proposed theoretical model51
Keypoints class distribution based entropy for weighting scheme on image classification50
A novel optic disc and optic cup segmentation technique to diagnose glaucoma using deep learning convolutional neural network over retinal fundus images50
Sound to expression: Using emotional sound to guide facial expression editing50
A lightweight secure retrieval model applied to intranet50
A scoping review of privacy protection in LBS: Architectures, Threats, and Defense mechanisms50
Enhanced IPCGAN-Alexnet model for new face image generating on age target50
Novel logic mining incorporating log linear approach50
WQCrowd: Secure blockchain-based crowdsourcing framework with multi-tier worker quality evaluation49
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds49
Speech-visual integration multimodal multi-agents framework for mobile operation49
EnhancedBERT: A feature-rich ensemble model for Arabic word sense disambiguation with statistical analysis and optimized data collection49
Geometry-aligned dual-branch detection with directional crack-aware attention for EL imaging of photovoltaic cells48
Fine-grained named entity recognition of ancient texts based on multi-view semantic fusion and deep learning48
High-capacity reversible data hiding in encrypted images based on MSB sharing and overlapping sawtooth partition48
Secret image sharing with multi-sized shadow images: Balancing concealment and communication overhead48
eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles48
Performance analysis of PHY layer for RIS-assisted wireless communication systems with retransmission protocols47
Learning trustworthy video representations for orthopaedic skill assessment in medical education47
YOLO-URD: a lightweight UAV-based model for foreign object detection on airport runways47
GeneRetinaNet: a weighted aligned pyramid structure chip text localization network based on Graph-based Recursive Convolution46
IDaPS — Improved data-locality aware data placement strategy based on Markov clustering to enhance MapReduce performance on Hadoop46
A smart filtering-based adaptive optimized link state routing protocol in flying ad hoc networks for traffic monitoring46
Vision-inertial collaborative localization of multi-agents with remote interaction46
Query-efficient model extraction for text classification model in a hard label setting46
Image generation models from scene graphs and layouts: A comparative analysis46
Multi-party reversible data hiding in shared medical images based on texture-guided hierarchical quantization coding45
CLIPCMIC: a zero-shot text classification framework based on cross-modal information completion45
DWLBF: a deletable weighted learned Bloom Filter based on data temperature45
Prediction of hand grip strength based on surface electromyographic signals45
A federated reinforcement learning framework for balancing rapidity and availability in deep space networks45
Adaptive batch color image encryption algorithm based on image hash-driven and multi-round chaotic perturbation44
Q-learning enhanced differential evolution for feature selection in high-dimensional medical data analysis44
Action knowledge for video captioning with graph neural networks44
An immune chaotic adaptive evolutionary algorithm for energy-efficient clustering management in LPWSN44
Influence of conditional holoentropy-based feature selection on automatic recommendation system in E-commerce sector44
Abnormal lower limb posture recognition based on spatial gait feature dynamic threshold detection44
Simulating judicial reasoning: a plea-guided explainable graph neural network for civil judgment prediction43
MATADOR: a magic matrix-based framework for tamper detection and image recovery43
RFM model for customer purchase behavior using K-Means algorithm43
Enhanced UrduAspectNet: Leveraging Biaffine Attention for superior Aspect-Based Sentiment Analysis43
A dust-resistant adaptive CNN for edge-based date palm disease detection in Arid climates: application to Ha’il’s agricultural sector43
A unified optimization framework for RIS-Assisted underlay cognitive LEO–UAV OFDMA networks43
Moroccan Arabic vocabulary generation using a rule-based approach43
LSDK-LegalSum: improving legal judgment summarization using logical structure and domain knowledge42
Enhancing next POI recommendation via multi-graph modeling and multi-granularity contrastive learning42
MCA framework: a novel multi-dimensional cooperative analysis framework for Alzheimer's disease diagnosis42
Enhanced Indonesian Ethnic Speaker Recognition using Data Augmentation Deep Neural Network41
A medical cross-chain dpos consensus scheme integrating reputation and contribution evaluation41
A fully hardware-managed scheduling architecture for AI accelerators41
Attention mechanism and mixup data augmentation for classification of COVID-19 Computed Tomography images41
Research on traditional and deep learning strategies based on optical flow estimation - a review41
Patterns in time series to image phase and multi-step forecasting of financial indices41
Decoding ChatGPT: A taxonomy of existing research, current challenges, and possible future directions41
Adaptive density guided network with CNN and Transformer for underwater fish counting41
SFML-Net: Spatial Feature-Guided motion learning network for micro-expression recognition41
Reliable paths prediction with intelligent data plane monitoring enabled reinforcement learning in SD-IoT40
Encryption-then-embedding-based hybrid data hiding scheme for medical images40
Radiogenomic analysis: 1p/19q codeletion based subtyping of low-grade glioma by analysing advanced biomedical texture descriptors40
Container scheduling techniques: A Survey and assessment40
Pseudorandom number generators based on neural networks: a review40
Modeling UAV swarm flight trajectories using Rapidly-exploring Random Tree algorithm40
Multi-view ensemble learning using multi-objective particle swarm optimization for high dimensional data classification40
Achieving scalable and decentralized blockchain systems: a filecoin-based solution to the blockchain trilemma40
Unveiling camouflaged malicious accounts via unsupervised behavior-affinity dual-graph learning39
Secure and load balanced routing model for wireless sensor networks39
An enhanced hybrid chaotic system and its application in image encryption39
MED-Prompt: A novel prompt engineering framework for medicine prediction on free-text clinical notes39
A robust voice spoofing detection system using novel CLS-LBP features and LSTM39
A lightweight model for indoor object detection in unstructured scenes based on joint attention and prior knowledge in the context of home rehabilitation38
A novel processor for dynamic evolution of constrained SAT problems: The dynamic evolution variant of the discrete Hopfield neural network satisfiability model38
Secure Internet Voting Protocol (SIVP): A secure option for electoral processes38
Advancements in 3-D object detection: A comprehensive review38
Arabic duplicate questions detection based on contextual representation, class label matching, and structured self attention38
An efficient method to build music generative model by controlling both general and local note characteristics38
Deep reinforcement learning-based local path planning in dynamic environments for mobile robot38
Driveshield: Unmasking stealthy attacks on CAN bus via adversarial spatiotemporal feature learning38
Adaptive mean center of mass particle swarm optimizer for auto-localization in 3D wireless sensor networks37
Dynamic relay selection for AoI minimization in short packets based full-duplex energy harvesting-IoT networks37
Lightweight deep learning model to secure authentication in Mobile Cloud Computing37
Advancing speed limit detection in ADAS: A novel data-driven approach using Pareto-GBDTMO37
HiveNet: a high-performance, hybrid, and cost-effective architecture for data center networks37
Improving software maintenance with improved bug triaging37
Machine learning model design for high performance cloud computing & load balancing resiliency: An innovative approach37
Intrinsic decomposition with deep supervision from a single image37
The semi-supervised medical image segmentation method based on adaptive perturbation enhancement and progressive consistency propagation36
Machine learning-aided differential-linear attacks with applications to Des and Speck32/6436
A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization36
An efficient colossal closed itemset mining algorithm for a dataset with high dimensionality36
A hybrid quantum annealing method for generating ensemble classifiers36
IPSRM: An intent perceived sequential recommendation model36
Multiple-level thresholding for breast mass detection36
Facilitating the communication with deaf people: Building a largest Saudi sign language dataset36
Pairing-free certificateless blind signature scheme for smart grid35
A dual scheduling framework for task and resource allocation in clouds using deep reinforcement learning35
DCIV: Decentralized cross-chain data integrity verification with blockchain35
Highly efficient secure linear algebra for private machine learning classifications over malicious clients in the post-quantum world35
A novel model compression method based on joint distillation for deepfake video detection34
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration34
Performance analysis of NOMA enabled multi-user co-operative IoT network with SWIPT protocol34
Comparative analysis of task scheduling in multi-tier fog-cloud computing: from classical approaches to greedy multi-objective optimization34
Ship-SAR: an improved ship image generation framework of synthetic aperture radar via denoising diffusion probabilistic model34
A robust RGBT tracking framework with temporal information enhancement and backward trajectory verification34
Real-coded multi-objective genetic algorithm with effective queuing model for efficient job scheduling in heterogeneous Hadoop environment34
Priority-aware task offloading for LEO satellite edge computing network: a multi-agent deep reinforcement learning-based approach34
Stereo matching algorithm based on deep learning: A survey34
DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing34
Evolutionary computing for clinical dataset classification using a novel feature selection algorithm34
Self-attention negative feedback network for real-time image super-resolution34
Research on identity authentication system of Internet of Things based on blockchain technology33
Physical layer security and covert communication in UAV-ISAC networks: A comprehensive survey33
A lightweight threshold signature scheme for internet of things devices33
Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects33
SLIC-POSE: Self-learning image-conditioned human pose estimation network for real-time coal mining safety monitoring33
SSIM-based sparse image restoration33
LACE: Mitigating cold-starts in serverless with a multi-task mixture-of-experts caching33
A few-shot learning approach based on Brownian distance covariance for plant disease classification33
CE-PBFT: A high availability consensus algorithm for large-scale consortium blockchain32
A three-stage layer-based heuristic to solve the 3D bin-packing problem under balancing constraint32
Multi-level residual network VGGNet for fish species classification32
A Comprehensive Survey on the Application of Deep and Reinforcement Learning Approaches in Autonomous Driving32
0.092334032058716