Journal of King Saud University-Computer and Information Sciences

Papers
(The TQCC of Journal of King Saud University-Computer and Information Sciences is 14. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Multi-scale YOLACT for instance segmentation350
Structure recovery from single omnidirectional image with distortion-aware learning255
LDPORR: A localized location privacy protection method based on optimized random response225
A joint model for entity boundary detection and entity span recognition187
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets167
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems158
A COSMIC function points based test effort estimation model for mobile applications153
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram131
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis127
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature125
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network123
Hurst exponent based approach for influence maximization in social networks117
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm105
Enhanced computer vision applications with blockchain: A review of applications and opportunities101
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter96
Line graph contrastive learning for node classification91
FogCom:SDN-enabled fog node selection for early detection of communicable diseases91
Handling data sparsity via item metadata embedding into deep collaborative recommender system90
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution90
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario87
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods86
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation86
Music rhythm tree based partitioning approach to decision tree classifier86
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks84
A review of IoT network management: Current status and perspectives83
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images82
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism81
Dense attentive GAN-based one-class model for detection of autism and ADHD79
Fast and robust JND-guided video watermarking scheme in spatial domain79
QSST: A Quranic Semantic Search Tool based on word embedding79
Achieving stepwise construction of cyber physical systems in EX-MAN component model78
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images78
Identifying the influential nodes in complex social networks using centrality-based approach77
A Q-learning-based smart clustering routing method in flying Ad Hoc networks73
AUSS: An arabic query-based update-summarization system72
Big data analytics in telecommunications: Governance, architecture and use cases72
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection71
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib70
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease70
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data69
C3CPS: CRITIC-CoCoSo-based caching placement strategy using multi-criteria decision method for efficient content distribution in Named Data Networking68
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm68
MSTFormer: multi-granularity spatial-temporal transformers for 3D human pose estimation68
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine67
ESCALB: An effective slave controller allocation-based load balancing scheme for multi-domain SDN-enabled-IoT networks66
STORE: Security Threat Oriented Requirements Engineering Methodology65
Association rules of fuzzy soft set based classification for text classification problem65
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention61
Enhanced sugeno fuzzy inference system with fuzzy AHP and coefficient of variation to diagnose cardiovascular disease during pregnancy61
Part-of-speech based label update network for aspect sentiment triplet extraction60
General secure encryption algorithm for separable reversible data hiding in encrypted domain59
A deep learning based intelligent framework to mitigate DDoS attack in fog environment59
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA59
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment58
Leukocyte segmentation based on DenseREU-Net58
Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm58
Distance-based confidence generation and aggregation of classifier for unstructured road detection58
Parallel graph-based anomaly detection technique for sequential data57
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime56
Magnetic resonance-driven pseudo CT image using patch-based multi-modal feature extraction and ensemble learning with stacked generalisation56
Electrolytic capacitor surface defect detection based on deep convolution neural network55
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning54
Image steganography using exploiting modification direction for compressed encrypted data53
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice53
Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images52
Improving outliers detection in data streams using LiCS and voting52
Emotion recognition in speech signals using optimization based multi-SVNN classifier52
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction52
Estimating the relative importance of nodes in complex networks based on network embedding and gravity model51
A joint Multi-decoder Dual-attention U-Net framework for tumor segmentation in Whole Slide Images50
Towards the design of personalized adaptive user interfaces for smart TV viewers50
Accepting multiple splicing systems50
A practical streaming approximate matrix multiplication algorithm50
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients49
Communication and computational resource optimization for Industry 5.0 smart devices empowered by MEC49
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme49
RIS-NOMA-assisted short-packet communication with direct links49
Improving artificial bee colony algorithm using modified nearest neighbor sequence49
A two-stage feature aggregation network for multi-category soybean leaf disease identification49
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment49
An improved multi-copy cloud data auditing scheme and its application49
An empirical study of problems and evaluation of IoT malware classification label sources49
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆48
Precision agriculture using IoT data analytics and machine learning47
Graph contrast learning for recommendation based on relational graph convolutional neural network47
Firefly forest: A swarm iteration-free swarm intelligence clustering algorithm47
On QoS evaluation for ZigBee incorporated Wireless Sensor Network (IEEE 802.15.4) using mobile sensor nodes45
TempoX: A disciplined approach for data management in multi-temporal and multi-schema-version XML databases45
State-of-art review of information diffusion models and their impact on social network vulnerabilities45
An enhanced adaptive 3D path planning algorithm for mobile robots with obstacle buffering and improved Theta* using minimum snap trajectory smoothing45
Leveraging artificial intelligence and mutual authentication to optimize content caching in edge data centers45
Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps44
A novel optic disc and optic cup segmentation technique to diagnose glaucoma using deep learning convolutional neural network over retinal fundus images44
A review of diabetic retinopathy: Datasets, approaches, evaluation metrics and future trends43
Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN43
Novel logic mining incorporating log linear approach43
Contrast and brightness balance in image enhancement using Cuckoo Search-optimized image fusion43
An enhanced deadline constraint based task scheduling mechanism for cloud environment43
Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain43
Score level fusion in multi-biometric identification based on zones of interest43
DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering43
Ensemble Stacking Model for Sentiment Analysis of Emirati and Arabic Dialects43
Towards an integrated swarm intelligence framework for urban mobility:A systematic review and proposed theoretical model42
An improved hidden behavioral pattern mining approach to enhance the performance of recommendation system in a big data environment42
Efficient Wear-Leveling-Aware Data Placement for LSM-Tree based key-value store on ZNS SSDs41
Palm tree structure based data aggregation and routing in underwater wireless acoustic sensor networks: Agent oriented approach41
Quality guided reversible data hiding with contrast enhancement41
Enhanced IPCGAN-Alexnet model for new face image generating on age target40
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare40
Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions40
Keypoints class distribution based entropy for weighting scheme on image classification40
Multi-level feature re-weighted fusion for the semantic segmentation of crops and weeds40
Autocorrection of lung boundary on 3D CT lung cancer images40
Enhanced UrduAspectNet: Leveraging Biaffine Attention for superior Aspect-Based Sentiment Analysis40
Image block generation from block-based SMRT in colour image encryption and its performance analysis40
Secure and load balanced routing model for wireless sensor networks39
Semantic query for Quranic ontology39
Design of pedestrian detectors using combinations of scale spaces and classifiers39
Radiogenomic analysis: 1p/19q codeletion based subtyping of low-grade glioma by analysing advanced biomedical texture descriptors38
Vision-inertial collaborative localization of multi-agents with remote interaction38
Moroccan Arabic vocabulary generation using a rule-based approach38
A robust voice spoofing detection system using novel CLS-LBP features and LSTM38
Prediction of hand grip strength based on surface electromyographic signals38
Abnormal lower limb posture recognition based on spatial gait feature dynamic threshold detection37
Performance analysis of PHY layer for RIS-assisted wireless communication systems with retransmission protocols37
Deep reinforcement learning-based local path planning in dynamic environments for mobile robot37
Query-efficient model extraction for text classification model in a hard label setting37
A lightweight secure retrieval model applied to intranet37
Modernizing the multi-temporal multispectral remotely sensed image change detection for global maxima through binary particle swarm optimization37
An enhanced dynamic KC-slice model for privacy preserving data publishing with multiple sensitive attributes by inducing sensitivity37
Sound to expression: Using emotional sound to guide facial expression editing37
Enhanced Indonesian Ethnic Speaker Recognition using Data Augmentation Deep Neural Network37
Research on traditional and deep learning strategies based on optical flow estimation - a review37
A simple flexible cryptosystem for meshed 3D objects and images36
On forecasting the intraday Bitcoin price using ensemble of variational mode decomposition and generalized additive model36
Pseudorandom number generators based on neural networks: a review36
eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles36
Action knowledge for video captioning with graph neural networks35
Adaptive density guided network with CNN and Transformer for underwater fish counting35
Encryption-then-embedding-based hybrid data hiding scheme for medical images35
WQCrowd: Secure blockchain-based crowdsourcing framework with multi-tier worker quality evaluation35
IDaPS — Improved data-locality aware data placement strategy based on Markov clustering to enhance MapReduce performance on Hadoop35
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds35
Modeling UAV swarm flight trajectories using Rapidly-exploring Random Tree algorithm35
EnhancedBERT: A feature-rich ensemble model for Arabic word sense disambiguation with statistical analysis and optimized data collection35
Container scheduling techniques: A Survey and assessment34
Reliable paths prediction with intelligent data plane monitoring enabled reinforcement learning in SD-IoT34
An immune chaotic adaptive evolutionary algorithm for energy-efficient clustering management in LPWSN34
A smart filtering-based adaptive optimized link state routing protocol in flying ad hoc networks for traffic monitoring34
Attention mechanism and mixup data augmentation for classification of COVID-19 Computed Tomography images34
Multi-party reversible data hiding in shared medical images based on texture-guided hierarchical quantization coding34
LSDK-LegalSum: improving legal judgment summarization using logical structure and domain knowledge34
RFM model for customer purchase behavior using K-Means algorithm33
MED-Prompt: A novel prompt engineering framework for medicine prediction on free-text clinical notes33
An ensemble approach for spam detection in Arabic opinion texts33
Influence of conditional holoentropy-based feature selection on automatic recommendation system in E-commerce sector33
Multi-view ensemble learning using multi-objective particle swarm optimization for high dimensional data classification33
SSIM-based sparse image restoration33
Image generation models from scene graphs and layouts: A comparative analysis33
Clustering based semi-supervised machine learning for DDoS attack classification33
Decoding ChatGPT: A taxonomy of existing research, current challenges, and possible future directions33
Advancing speed limit detection in ADAS: A novel data-driven approach using Pareto-GBDTMO32
An efficient method to build music generative model by controlling both general and local note characteristics32
Intrinsic decomposition with deep supervision from a single image32
A novel processor for dynamic evolution of constrained SAT problems: The dynamic evolution variant of the discrete Hopfield neural network satisfiability model32
Evolutionary computing for clinical dataset classification using a novel feature selection algorithm32
Gravitational search algorithm based strategy for combinatorial t-way test suite generation32
Machine learning model design for high performance cloud computing & load balancing resiliency: An innovative approach32
Secure Internet Voting Protocol (SIVP): A secure option for electoral processes32
Arabic duplicate questions detection based on contextual representation, class label matching, and structured self attention32
Highly efficient secure linear algebra for private machine learning classifications over malicious clients in the post-quantum world31
An efficient colossal closed itemset mining algorithm for a dataset with high dimensionality31
Pairing-free certificateless blind signature scheme for smart grid31
A hybrid quantum annealing method for generating ensemble classifiers31
An in-depth exploration of automated jackfruit disease recognition31
Real-coded multi-objective genetic algorithm with effective queuing model for efficient job scheduling in heterogeneous Hadoop environment31
CE-PBFT: A high availability consensus algorithm for large-scale consortium blockchain30
Weighted Distance Hyperbolic Prediction-Based Detection Scheme for Non Line Of Sight nodes in VANETs30
IPSRM: An intent perceived sequential recommendation model30
Completely fair energy scheduling mechanism in a smart distributed multi-microgrid system30
Multiple-level thresholding for breast mass detection30
Research on identity authentication system of Internet of Things based on blockchain technology30
Improving software maintenance with improved bug triaging30
A three-stage layer-based heuristic to solve the 3D bin-packing problem under balancing constraint30
Adaptive mean center of mass particle swarm optimizer for auto-localization in 3D wireless sensor networks29
DCIV: Decentralized cross-chain data integrity verification with blockchain29
Enhancing autonomous driving through intelligent navigation: A comprehensive improvement approach29
Content-based medical image retrieval by spatial matching of visual words29
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration29
Accurate prediction of international trade flows: Leveraging knowledge graphs and their embeddings29
Accelerated analysis on the triple momentum method for a two-layer ReLU neural network29
A novel model compression method based on joint distillation for deepfake video detection29
Emotion recognition from facial images with simultaneous occlusion, pose and illumination variations using meta-learning29
Facilitating the communication with deaf people: Building a largest Saudi sign language dataset29
Stereo matching algorithm based on deep learning: A survey29
A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization28
Self-attention negative feedback network for real-time image super-resolution28
DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing28
Lightweight deep learning model to secure authentication in Mobile Cloud Computing28
A Comprehensive Survey on the Application of Deep and Reinforcement Learning Approaches in Autonomous Driving28
Multi-level residual network VGGNet for fish species classification28
Performance analysis of NOMA enabled multi-user co-operative IoT network with SWIPT protocol28
Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects28
Cooperative backscatter NOMA with imperfect SIC: Towards energy efficient sum rate maximization in sustainable 6G networks27
A dynamic planning model for deploying service functions chain in fog-cloud computing27
Metrics for reusability of java language components27
A hybrid approach for classification and identification of iris damaged levels of alcohol drinkers27
An oversampling FCM-KSMOTE algorithm for imbalanced data classification27
Ensemble human movement sequence prediction model with Apriori based Probability Tree Classifier (APTC) and Bagged J48 on Machine learning27
ECG signal fusion reconstruction via hash autoencoder and margin semantic reinforcement27
A multi-layer hyper-graph routing with jamming-awareness for improved throughput in full-duplex cognitive radio networks27
A reversible and lossless secret image sharing scheme with authentication for color images27
Design of and research on the robot arm recovery grasping system based on machine vision27
Towards the development of believable agents: Adopting neural architectures and adaptive neuro-fuzzy inference system via playback of human traces27
Integration of morphological features and contextual weightage using monotonic chunk attention for part of speech tagging27
Performance improvement of extreme multi-label classification using K-way tree construction with parallel clustering algorithm26
ATLASLang NMT: Arabic text language into Arabic sign language neural machine translation26
Neighborhood constraint extraction for rapid modeling of point cloud scenes in large-scale power grid substations26
The GOP Inter Prediction of H.264 AV\C26
Adaptive security architectural model for protecting identity federation in service oriented computing26
Zoom based image super-resolution using DCT with LBP as characteristic model26
A dynamic distributed edge-cloud manufacturing with improved ADMM algorithms for mass personalization production26
Modular models for systems based on multi-tenant services: A multi-level petri-net-based approach26
Task offloading using GPU-based particle swarm optimization for high-performance vehicular edge computing26
Two-phase fuzzy feature-filter based hybrid model for spam classification25
An unsupervised method for word sense disambiguation25
TFDNet: A triple focus diffusion network for object detection in urban congestion with accurate multi-scale feature fusion and real-time capability25
A novel image recommendation model based on user preferences and social relationships25
Security paradigm for remote health monitoring edge devices in internet of things25
An efficient encryption method for smart grid data based on improved CBC mode25
SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks25
A model for generating a user dynamic profile on social media25
Architecture and optimization of data mining modeling for visualization of knowledge extraction: Patient safety care25
LDNet: High Accuracy Fish Counting Framework using Limited training samples with Density map generation Network25
ApriDS: An evidence linkage network construction model for judgment documents25
A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function25
Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm25
Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm25
A novel collaborative requirement prioritization approach to handle priority vagueness and inter-relationships25
ADCGNet: Attention-based dual channel Gabor network towards efficient detection and classification of electrocardiogram images25
MDFU-Net: Multiscale dilated features up-sampling network for accurate segmentation of tumor from heterogeneous brain data25
A review on 6G for space-air-ground integrated network: Key enablers, open challenges, and future direction24
Optimized task offloading strategy in IoT edge computing network24
Cloud and distributed architectures for data management in agriculture 4.0 : Review and future trends24
A review on community structures detection in time evolving social networks24
CaneSat dataset to leverage convolutional neural networks for sugarcane classification from Sentinel-224
A deep transfer learning model for green environment security analysis in smart city24
An immune plasma algorithm based approach for UCAV path planning23
Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity23
Ulcer detection in Wireless Capsule Endoscopy images using deep CNN23
0.24558305740356