Journal of King Saud University-Computer and Information Sciences

Papers
(The TQCC of Journal of King Saud University-Computer and Information Sciences is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Hybrid Salp Swarm Algorithm for integrating renewable distributed energy resources in distribution systems considering annual load growth235
Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation235
AUSS: An arabic query-based update-summarization system216
Combining reinforcement learning method to enhance LEDBAT++ over diversified network environments180
Efficient resource allocation in the IEEE 802.11ax network leveraging OFDMA technology155
FPGA implementation of a chaos-based image encryption algorithm149
LDPORR: A localized location privacy protection method based on optimized random response124
FUSE based file system for efficient storage and retrieval of fragmented multimedia files111
Skin cancer image segmentation utilizing a novel EN-GWO based hyper-parameter optimized FCEDN107
A Survey on Human Face Expression Recognition Techniques106
Effective and scalable black-box fuzzing approach for modern web applications100
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images97
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib94
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images94
Dynamizing Dijkstra: A solution to dynamic shortest path problem through retroactive priority queue86
Computability evaluation of RESTful API using Primitive Recursive Function82
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm80
Light weight approach for secure backbone construction for MANETs80
Dynamic SFC placement scheme with parallelized SFCs and reuse of initialized VNFs: An A3C-based DRL approach79
Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis74
Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic74
Identifying the influential nodes in complex social networks using centrality-based approach74
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism71
A Novel Metric based Detection of Temporary Field Code Smell and its Empirical Analysis70
DeepFocus: A visual focus of attention detection framework using deep learning in multi-object scenarios70
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication70
A joint model for entity boundary detection and entity span recognition67
Link prediction using extended neighborhood based local random walk in multilayer social networks66
Enhanced Zone-Based Energy Aware Data Collection Protocol for WSNs (E-ZEAL)65
Automatic mapping of configuration options in software using static analysis65
Integrating social media as cooperative learning tool in higher education classrooms: An empirical study65
Hybridization of meta-heuristic algorithm for load balancing in cloud computing environment64
Forwarding strategies in vehicular named data networks: A survey64
Hurst exponent based approach for influence maximization in social networks64
Improving the efficiency of network controllability processes on temporal networks64
Bengali handwritten equation solving system63
Cloud center energy consumption control for predictability in neural fuzzy systems62
Big data analytics in telecommunications: Governance, architecture and use cases62
Line graph contrastive learning for node classification62
Adaptive personalized privacy-preserving data collection scheme with local differential privacy61
A novel tree structure-based multi-prototype clustering algorithm60
Improving Sentiment Analysis of Arabic Tweets by One-way ANOVA59
Enhancing high-speed digital systems: MVL circuit design with CNTFET and RRAM57
Measuring the effect of monitoring on a cloud computing system by estimating the delay time of requests53
Application of soft computing techniques in machine reading of Quranic Kufic manuscripts52
CDBR: A semi-automated collaborative execute-before-after dependency-based requirement prioritization approach52
A Jaya algorithm based wrapper method for optimal feature selection in supervised classification50
Energy-aware service composition in multi-Cloud50
Multi-scale YOLACT for instance segmentation49
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study49
Energy efficient cluster head selection using improved Sparrow Search Algorithm in Wireless Sensor Networks49
QSST: A Quranic Semantic Search Tool based on word embedding49
Outlier detection toward high-dimensional industrial data using extreme tensor-train learning machine with compression49
A spatiotemporal Order-Revealing query processing approach for Industrial Internet of Things48
FogCom:SDN-enabled fog node selection for early detection of communicable diseases47
Expert systems in oil palm precision agriculture: A decade systematic review46
CoEdit: A novel error correction mechanism in compilers using spelling correction algorithms45
A close contact identification algorithm using kernel density estimation for the ship passenger health45
Mitigating 5G security challenges for next-gen industry using quantum computing45
Addressing the Curse of Missing Data in Clinical Contexts: A Novel Approach to Correlation-based Imputation45
A hierarchical approach based CBIR scheme using shape, texture, and color for accelerating retrieval process45
DRL-assisted delay optimized task offloading in automotive-industry 5.0 based VECNs45
A robust VVC video encryption scheme based on the dynamical chaotification model44
Towards deploying SFC with parallelized VNFs under resource demand uncertainty in mobile edge computing44
Cluster analysis of urdu tweets44
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing44
Lattice-based ring signcryption for consortium blockchain43
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation43
SLViT: Shuffle-convolution-based lightweight Vision transformer for effective diagnosis of sugarcane leaf diseases43
A proposed multi criteria indexing and ranking model for documents and web pages on large scale data43
Ensemble Neighborhood Search (ENS) for biclustering of gene expression microarray data and single cell RNA sequencing data42
A modified biogeography-based optimization algorithm with guided bed selection mechanism for patient admission scheduling problems42
Federated learning with hyper-parameter optimization42
The ideal effect of Gabor filters and Uniform Local Binary Pattern combinations on deformed scanned paper images41
Punctuation and lexicon aid representation: A hybrid model for short text sentiment analysis on social media platform41
A hybrid approach to secure and compress data streams in cloud computing environment41
An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal40
StackFBAs: Detection of fetal brain abnormalities using CNN with stacking strategy from MRI images40
Pavement damage identification and evaluation in UAV-captured images using gray level co-occurrence matrix and cloud model40
MO-CBACORP: A new energy-efficient secure routing protocol for underwater monitoring wireless sensor network40
C3MW: A novel comprehensive-monitoring-motivated multi-model watermarking scheme for tamper detection and self-recovery39
Performance evaluation of AMQP over QUIC in the internet-of-thing networks39
Personal authentication and cryptographic key generation based on electroencephalographic signals39
Enhanced computer vision applications with blockchain: A review of applications and opportunities39
A secure multifactor-based clustering scheme for internet of vehicles39
Efficient learning-driven data transmission algorithm for cloud-to-thing continuum38
RUE: A robust personalized cost assignment strategy for class imbalance cost-sensitive learning38
Handling data sparsity via item metadata embedding into deep collaborative recommender system38
Discovering Lin-Kernighan-Helsgaun heuristic for routing optimization using self-supervised reinforcement learning37
Dynamic offloading for energy-aware scheduling in a mobile cloud37
Multilingual hope speech detection: A Robust framework using transfer learning of fine-tuning RoBERTa model37
Model predictive control for non-holonomic robots with disturbances: A quasi-differential type event-driven method37
Data aggregation protocols for WSN and IoT applications – A comprehensive survey37
Music rhythm tree based partitioning approach to decision tree classifier37
Denoising of degraded face images sequence in PCA domain for recognition36
A performance analysis of transformer-based deep learning models for Arabic image captioning36
A Substitution Box for Lightweight Ciphers to Secure Internet of Things36
Automatic lung segmentation for the inclusion of juxtapleural nodules and pulmonary vessels using curvature based border correction36
Integration of artificial intelligence (AI) with sensor networks: Trends, challenges, and future directions36
IDSoft: A federated and softwarized intrusion detection framework for massive internet of things in 6G network35
A comparison of emotion recognition system using electrocardiogram (ECG) and photoplethysmogram (PPG)35
Optimal deploying IoT services on the fog computing: A metaheuristic-based multi-objective approach35
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data34
A lightweight object detection framework for underwater imagery with joint image restoration and color transformation34
Gradient-guided hierarchical feature attack for object detector34
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets34
Low-cost relay selection in multihop cooperative networks34
The resurrection of digital triplet: A cognitive pillar of human-machine integration at the dawn of industry 5.033
Integrating object-based and pixel-based segmentation for building footprint extraction from satellite images33
Color image reversible data hiding based on multi-channel synchronized histogram33
Robust distributed MPC for disturbed nonlinear multi-agent systems based on a mixed differential–integral event-triggered mechanism33
The Metaverse digital environments: A scoping review of the techniques, technologies, and applications33
Classifying and diacritizing Arabic poems using deep recurrent neural networks32
Investigating the law of tendential fall in the rate of profit based on feedback control32
A survey on vehicular task offloading: Classification, issues, and challenges32
Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review32
Reconfigure and evaluate consumer satisfaction for Open API in advancing FinTech32
An ensemble face recognition mechanism based on three-way decisions32
Feature selection method based on quantum inspired genetic algorithm for Arabic signature verification32
Heuristic initialization of PSO task scheduling algorithm in cloud computing32
An end-to-end real-time pollutants spilling recognition in wastewater based on the IoT-ready SENSIPLUS platform32
Identifying cross-lingual plagiarism using rich semantic features and deep neural networks: A study on Arabic-English plagiarism cases32
The survey: Text generation models in deep learning32
Knowledge graph representation learning model based on meta-information and logical rule enhancements32
Influence maximization diffusion models based on engagement and activeness on instagram32
Framework for automatic detection of anomalies in DevOps32
RTSLPS: Real time server load prediction system for the ever-changing cloud computing environment32
An immune plasma algorithm based approach for UCAV path planning31
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network31
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems31
Achieving stepwise construction of cyber physical systems in EX-MAN component model30
A novel robust approach for image copyright protection based on concentric rectangles30
ProRE: An ACO- based programmer recommendation model to precisely manage software bugs30
Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering30
Dense attentive GAN-based one-class model for detection of autism and ADHD30
Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach30
Arrhythmia classification using multirate processing metaheuristic optimization and variational mode decomposition30
Fingerprint liveness detection through fusion of pores perspiration and texture features30
Video anomaly detection using Cross U-Net and cascade sliding window29
Blockchain-based dynamic trust access control game mechanism29
Ulcer detection in Wireless Capsule Endoscopy images using deep CNN28
Dynamic neutrosophic cognitive map with improved cuckoo search algorithm (DNCM-ICSA) and ensemble classifier for rheumatoid arthritis (RA) disease28
A Q-learning-based smart clustering routing method in flying Ad Hoc networks28
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses28
Admittance swarm-based adaptive controller for lower limb exoskeleton with gait trajectory shaping28
Certificateless multi-source signcryption with lattice28
A modified Boneh-Lynn-Shacham signing dynamic auditing in cloud computing28
A multiple clustering combination approach based on iterative voting process28
Next syllables prediction system in Dzongkha using long short-term memory28
A review of IoT network management: Current status and perspectives28
Detailed analysis of implementation of aviation NMT system and the effects of aviation post-processing tools on TDIL tourism corpus27
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution27
Comparative analysis of median filter and its variants for removal of impulse noise from gray scale images27
Throughput optimization of interference limited cognitive radio-based Internet of Things (CR-IoT) network27
Gastrointestinal polyp detection through a fusion of contourlet transform and Neural features26
Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application26
Dual-stream dynamic graph structure network for document-level relation extraction26
Multi-objective optimization in order to allocate computing and telecommunication resources based on non-orthogonal access, participation of cloud server and edge server in 5G networks26
Fast and robust JND-guided video watermarking scheme in spatial domain26
A classification framework for straggler mitigation and management in a heterogeneous Hadoop cluster: A state-of-art survey25
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease25
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram25
Enhancing foreign exchange reserve security for central banks using Blockchain, FHE, and AWS25
A third generation genetic algorithm NSGAIII for task scheduling in cloud computing25
A trust enhancement model based on distributed learning and blockchain in service ecosystems25
Detecting anomalous traffic behaviors with seasonal deep Kalman filter graph convolutional neural networks25
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking25
RA-MRS: A high efficient attribute reduction algorithm in big data25
A formal specification language and automatic modeling method of asset securitization contract25
Enhanced DSSM (deep semantic structure modelling) technique for job recommendation25
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis25
DeSa COVID-19: Deep salient COVID-19 image-based quality assessment25
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods25
Reversible data hiding based on global and local automatic contrast enhancement of low-light color images25
HLifeRL: A hierarchical lifelong reinforcement learning framework25
Knowledge ontology enhanced model for explainable knowledge tracing24
A label learning approach using competitive population optimization algorithm feature selection to improve multi-label classification algorithms24
Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey24
Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity24
Normalized square difference based multilevel thresholding technique for multispectral images using leader slime mould algorithm24
A fast and efficient green apple object detection model based on Foveabox24
Vector relation acquisition and scene knowledge for solving arithmetic word problems24
An analytical code quality methodology using Latent Dirichlet Allocation and Convolutional Neural Networks24
Novel hybrid model for organizations’ reputation in online social networks24
A survey on PSO based meta-heuristic scheduling mechanism in cloud computing environment24
Study on data storage and verification methods based on improved Merkle mountain range in IoT scenarios23
A preference random walk algorithm for link prediction through mutual influence nodes in complex networks23
Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion23
Deep indoor illumination estimation based on spherical gaussian representation with scene prior knowledge23
Spatial relaxation transformer for image super-resolution23
Automatic Brain Tumor Segmentation from MRI using Greedy Snake Model and Fuzzy C-Means Optimization23
Simulated annealing based optimal controller placement in software defined networks with capacity constraint and failure awareness23
A hybrid IoT services recommender system using social IoT23
Structure recovery from single omnidirectional image with distortion-aware learning23
Non-redundant shift-invariant complex wavelet transform and fractional gorilla troops optimization-based deep convolutional neural network for video watermarking23
PFEL-Net: A lightweight network to enhance feature for multi-scale pedestrian detection23
RSA-RRT: A path planning algorithm based on restricted sampling area23
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter22
RAPID: Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection22
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm22
Memory-optimized distributed utility mining for big data22
A Fuzzy-Based Duo-Secure Multi-Modal Framework for IoMT Anomaly Detection22
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature22
Clus-DR: Cluster-based pre-trained model for diverse recommendation generation22
Embedding and generalization of formula with context in the retrieval of mathematical information22
3D face reconstruction from single image with generative adversarial networks22
The multi-objective task assignment scheme for software crowdsourcing platforms involving new workers22
Enhancing model quality and scalability for mining business processes with invisible tasks in non-free choice22
IoT-edge anomaly detection for covariate shifted and point time series health data22
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review22
Integrated deep learning paradigm for document-based sentiment analysis22
Automatic detection of tree cutting in forests using acoustic properties21
Improved colorization and classification of intracranial tumor expanse in MRI images via hybrid scheme of Pix2Pix-cGANs and NASNet-large21
IoT and artificial intelligence implementations for remote healthcare monitoring systems: A survey21
Providing contexts for classification of transients in a wide-area sky survey: An application of noise-induced cluster ensemble21
Outlier detection strategies for WSNs: A survey21
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection21
Multimodal plant recognition through hybrid feature fusion technique using imaging and non-imaging hyper-spectral data21
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario21
Artificial intelligence-based fault prediction framework for WBAN21
WITHDRAWN: New obstacle detection method for a mobile robot based on improved disparity map processing21
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks21
GCNT: Identify influential seed set effectively in social networks by integrating graph convolutional networks with graph transformers21
Energy-aware task scheduling for streaming applications on NoC-based MPSoCs21
A COSMIC function points based test effort estimation model for mobile applications21
A coding computation scheme for secure aggregation21
A high speed inference architecture for multimodal emotion recognition based on sparse cross modal encoder21
Developing liver cancer drug response prediction system using late fusion of reduced deep features21
Knowledge-embedded multi-layer collaborative adaptive fusion network: Addressing challenges in foggy conditions and complex imaging21
Using Twitter as a digital insight into public stance on societal behavioral dynamics21
An efficient data hiding for ECG signals based on the integer wavelet transform and block standard deviation21
A particle swarm optimization approach for large-scale many-objective software architecture recovery21
The recent trends in cyber security: A review20
Robust regularization for single image dehazing20
Deep reinforcement learning aided secure UAV communications in the presence of moving eavesdroppers20
Performance evaluation of text-mining models with Hindi stopwords lists20
A hybrid framework based on genetic algorithm and simulated annealing for RNA structure prediction with pseudoknots20
Image steganography using exploiting modification direction for compressed encrypted data20
UBMTR: Unsupervised Boltzmann machine-based time-aware recommendation system20
A hybrid multi-stage learning technique based on brain storming optimization algorithm for breast cancer recurrence prediction20
GHFormer-Net: Towards more accurate small green apple/begonia fruit detection in the nighttime19
S-KMN: Integrating semantic features learning and knowledge mapping network for automatic quiz question annotation19
Top data mining tools for the healthcare industry19
Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover19
A hybrid genetic algorithm and tabu search for minimizing makespan in flow shop scheduling problem19
Scalability and diversity of StarGANv2-VC in Arabic emotional voice conversion: Overcoming data limitations and enhancing performance19
Towards a unified ontology for IoT fabric with SDDC19
Cryptanalyzing an image cipher using multiple chaos and DNA operations19
Laser simulator logic: A novel inference system for highly overlapping of linguistic variable in membership functions19
Hierarchical graph-based text classification framework with contextual node embedding and BERT-based dynamic fusion19
0.15247797966003