Journal of King Saud University-Computer and Information Sciences

Papers
(The TQCC of Journal of King Saud University-Computer and Information Sciences is 17. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
FogCom:SDN-enabled fog node selection for early detection of communicable diseases701
Line graph contrastive learning for node classification360
Structure recovery from single omnidirectional image with distortion-aware learning329
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods268
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism253
A new stemming model based on data generation to enhance Arabic information retrieval233
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign221
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks216
View-label driven cross-space structure alignment for incomplete multi-view partial multi-label classification181
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib178
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution172
AUSS: An arabic query-based update-summarization system159
Music rhythm tree based partitioning approach to decision tree classifier149
Achieving stepwise construction of cyber physical systems in EX-MAN component model149
Hurst exponent based approach for influence maximization in social networks140
A COSMIC function points based test effort estimation model for mobile applications138
Multi-modal fake news detection: A comprehensive survey on deep learning technology, advances, and challenges137
VTraceChain: A verifiable block chain with double-chain architecture for enhanced tracking137
QSST: A Quranic Semantic Search Tool based on word embedding129
A joint model for entity boundary detection and entity span recognition128
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram127
Big data analytics in telecommunications: Governance, architecture and use cases123
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets122
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease121
Multi-scale YOLACT for instance segmentation119
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems117
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection115
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature110
Dual-branch geometric algebra graph network with pyramid fusion for deformable medical image registration110
Handling data sparsity via item metadata embedding into deep collaborative recommender system109
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter109
Dense attentive GAN-based one-class model for detection of autism and ADHD109
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis103
A review of IoT network management: Current status and perspectives103
Identifying the influential nodes in complex social networks using centrality-based approach101
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network99
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images99
NMD-FusionNet: a multimodal fusion-based medical imaging-assisted diagnostic model for liver cancer96
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario95
A Secure & reserved pricing mechanism for peer-to-peer energy trading using additive secret sharing and blockchain94
LDPORR: A localized location privacy protection method based on optimized random response93
Enhanced computer vision applications with blockchain: A review of applications and opportunities92
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data90
Fast and robust JND-guided video watermarking scheme in spatial domain89
A Q-learning-based smart clustering routing method in flying Ad Hoc networks88
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice85
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation85
Accepting multiple splicing systems84
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment84
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients84
Parallel graph-based anomaly detection technique for sequential data83
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning83
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction82
ABF-RRT*: Bidirectional fast optimal rapidly-exploring random tree via adaptive sampling of a permissible hyper-ellipsoid82
DiagX-DT: diagnostic exclusion reasoning with dialectical thinking for traditional Chinese medicine in large language models81
An online multi-camera multi-vehicle tracking using lightweight YOLO11 and improved association strategies81
Improving artificial bee colony algorithm using modified nearest neighbor sequence80
An improved multi-copy cloud data auditing scheme and its application79
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme79
RIS-NOMA-assisted short-packet communication with direct links78
Enhanced sugeno fuzzy inference system with fuzzy AHP and coefficient of variation to diagnose cardiovascular disease during pregnancy78
Graph contrast learning for recommendation based on relational graph convolutional neural network77
Leukocyte segmentation based on DenseREU-Net77
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA76
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine75
Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images74
STORE: Security Threat Oriented Requirements Engineering Methodology74
A practical streaming approximate matrix multiplication algorithm73
C3CPS: CRITIC-CoCoSo-based caching placement strategy using multi-criteria decision method for efficient content distribution in Named Data Networking72
Association rules of fuzzy soft set based classification for text classification problem72
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm72
Estimating the relative importance of nodes in complex networks based on network embedding and gravity model71
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention71
Optimized 3D path planning for UAVs using a multi-strategy snow avalanches algorithm70
Graph-based reinforcement learning for software-defined networking traffic engineering69
Emotion recognition in speech signals using optimization based multi-SVNN classifier69
General secure encryption algorithm for separable reversible data hiding in encrypted domain68
An empirical study of problems and evaluation of IoT malware classification label sources68
A forward-backward smoothing algorithm for extended object tracking based on the PMBM filter68
Adaptive heterogeneous multi-agent debate for enhanced educational and factual reasoning in large language models68
Communication and computational resource optimization for Industry 5.0 smart devices empowered by MEC66
A joint Multi-decoder Dual-attention U-Net framework for tumor segmentation in Whole Slide Images66
A two-stage feature aggregation network for multi-category soybean leaf disease identification66
Towards the design of personalized adaptive user interfaces for smart TV viewers66
A deep learning based intelligent framework to mitigate DDoS attack in fog environment65
ESCALB: An effective slave controller allocation-based load balancing scheme for multi-domain SDN-enabled-IoT networks65
Distance-based confidence generation and aggregation of classifier for unstructured road detection64
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime64
Image steganography using exploiting modification direction for compressed encrypted data64
Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm64
Part-of-speech based label update network for aspect sentiment triplet extraction64
Electrolytic capacitor surface defect detection based on deep convolution neural network64
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment63
Precision agriculture using IoT data analytics and machine learning63
Integrating LLM-based code optimization with human-like exclusionary reasoning for computational education63
MSTFormer: multi-granularity spatial-temporal transformers for 3D human pose estimation63
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆62
Leveraging artificial intelligence and mutual authentication to optimize content caching in edge data centers61
TempoX: A disciplined approach for data management in multi-temporal and multi-schema-version XML databases61
Towards an integrated swarm intelligence framework for urban mobility:A systematic review and proposed theoretical model60
Image block generation from block-based SMRT in colour image encryption and its performance analysis59
Quality guided reversible data hiding with contrast enhancement59
Multi-level feature re-weighted fusion for the semantic segmentation of crops and weeds58
Firefly forest: A swarm iteration-free swarm intelligence clustering algorithm58
Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain58
Efficient Wear-Leveling-Aware Data Placement for LSM-Tree based key-value store on ZNS SSDs58
Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN58
Palm tree structure based data aggregation and routing in underwater wireless acoustic sensor networks: Agent oriented approach58
An enhanced deadline constraint based task scheduling mechanism for cloud environment58
A review of diabetic retinopathy: Datasets, approaches, evaluation metrics and future trends57
Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps56
Ensemble Stacking Model for Sentiment Analysis of Emirati and Arabic Dialects56
A scoping review of privacy protection in LBS: Architectures, Threats, and Defense mechanisms56
An improved hidden behavioral pattern mining approach to enhance the performance of recommendation system in a big data environment55
On QoS evaluation for ZigBee incorporated Wireless Sensor Network (IEEE 802.15.4) using mobile sensor nodes55
TMCNet: A few-shot defect segmentation method based on triplet-based feature enhancement and multi-scale cascaded decoding55
Memory-based collaborative filtering based on matrix factorization and Gower's set rank55
State-of-art review of information diffusion models and their impact on social network vulnerabilities54
DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering54
Contrast and brightness balance in image enhancement using Cuckoo Search-optimized image fusion54
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare54
Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions54
Score level fusion in multi-biometric identification based on zones of interest54
Courtroom-FND: a multi-role fake news detection method based on argument switching-based courtroom debate54
Novel logic mining incorporating log linear approach53
A novel optic disc and optic cup segmentation technique to diagnose glaucoma using deep learning convolutional neural network over retinal fundus images53
FedAware: a distributed IoT intrusion detection method based on fractal shrinking autoencoder53
An enhanced adaptive 3D path planning algorithm for mobile robots with obstacle buffering and improved Theta* using minimum snap trajectory smoothing52
MATADOR: a magic matrix-based framework for tamper detection and image recovery52
A lightweight secure retrieval model applied to intranet51
Design of pedestrian detectors using combinations of scale spaces and classifiers50
Enhanced IPCGAN-Alexnet model for new face image generating on age target50
Keypoints class distribution based entropy for weighting scheme on image classification50
Sound to expression: Using emotional sound to guide facial expression editing50
LSDK-LegalSum: improving legal judgment summarization using logical structure and domain knowledge49
Patterns in time series to image phase and multi-step forecasting of financial indices49
Achieving scalable and decentralized blockchain systems: a filecoin-based solution to the blockchain trilemma48
A smart filtering-based adaptive optimized link state routing protocol in flying ad hoc networks for traffic monitoring48
Radiogenomic analysis: 1p/19q codeletion based subtyping of low-grade glioma by analysing advanced biomedical texture descriptors48
Enhancing next POI recommendation via multi-graph modeling and multi-granularity contrastive learning48
Deep reinforcement learning-based local path planning in dynamic environments for mobile robot47
Attention mechanism and mixup data augmentation for classification of COVID-19 Computed Tomography images47
EnhancedBERT: A feature-rich ensemble model for Arabic word sense disambiguation with statistical analysis and optimized data collection47
eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles47
Performance analysis of PHY layer for RIS-assisted wireless communication systems with retransmission protocols47
Fine-grained named entity recognition of ancient texts based on multi-view semantic fusion and deep learning47
An immune chaotic adaptive evolutionary algorithm for energy-efficient clustering management in LPWSN47
A robust voice spoofing detection system using novel CLS-LBP features and LSTM47
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds47
Abnormal lower limb posture recognition based on spatial gait feature dynamic threshold detection46
Adaptive density guided network with CNN and Transformer for underwater fish counting46
IDaPS — Improved data-locality aware data placement strategy based on Markov clustering to enhance MapReduce performance on Hadoop45
MCA framework: a novel multi-dimensional cooperative analysis framework for Alzheimer's disease diagnosis45
Vision-inertial collaborative localization of multi-agents with remote interaction45
Prediction of hand grip strength based on surface electromyographic signals45
Query-efficient model extraction for text classification model in a hard label setting45
Secure and load balanced routing model for wireless sensor networks45
Q-learning enhanced differential evolution for feature selection in high-dimensional medical data analysis45
An enhanced hybrid chaotic system and its application in image encryption45
CLIPCMIC: a zero-shot text classification framework based on cross-modal information completion45
GeneRetinaNet: a weighted aligned pyramid structure chip text localization network based on Graph-based Recursive Convolution45
DWLBF: a deletable weighted learned Bloom Filter based on data temperature45
Advancements in 3-D object detection: A comprehensive review45
An enhanced dynamic KC-slice model for privacy preserving data publishing with multiple sensitive attributes by inducing sensitivity44
Enhanced UrduAspectNet: Leveraging Biaffine Attention for superior Aspect-Based Sentiment Analysis44
Image generation models from scene graphs and layouts: A comparative analysis44
Moroccan Arabic vocabulary generation using a rule-based approach43
Encryption-then-embedding-based hybrid data hiding scheme for medical images43
High-capacity reversible data hiding in encrypted images based on MSB sharing and overlapping sawtooth partition43
WQCrowd: Secure blockchain-based crowdsourcing framework with multi-tier worker quality evaluation43
On forecasting the intraday Bitcoin price using ensemble of variational mode decomposition and generalized additive model43
Decoding ChatGPT: A taxonomy of existing research, current challenges, and possible future directions43
Action knowledge for video captioning with graph neural networks43
Modernizing the multi-temporal multispectral remotely sensed image change detection for global maxima through binary particle swarm optimization43
Influence of conditional holoentropy-based feature selection on automatic recommendation system in E-commerce sector42
A federated reinforcement learning framework for balancing rapidity and availability in deep space networks42
Enhanced Indonesian Ethnic Speaker Recognition using Data Augmentation Deep Neural Network42
Multi-party reversible data hiding in shared medical images based on texture-guided hierarchical quantization coding42
Reliable paths prediction with intelligent data plane monitoring enabled reinforcement learning in SD-IoT42
Pseudorandom number generators based on neural networks: a review42
Container scheduling techniques: A Survey and assessment42
Secret image sharing with multi-sized shadow images: Balancing concealment and communication overhead42
Research on traditional and deep learning strategies based on optical flow estimation - a review41
An ensemble approach for spam detection in Arabic opinion texts41
Highly efficient secure linear algebra for private machine learning classifications over malicious clients in the post-quantum world40
Multi-view ensemble learning using multi-objective particle swarm optimization for high dimensional data classification40
MED-Prompt: A novel prompt engineering framework for medicine prediction on free-text clinical notes40
Modeling UAV swarm flight trajectories using Rapidly-exploring Random Tree algorithm40
A novel processor for dynamic evolution of constrained SAT problems: The dynamic evolution variant of the discrete Hopfield neural network satisfiability model40
RFM model for customer purchase behavior using K-Means algorithm40
An efficient method to build music generative model by controlling both general and local note characteristics39
Real-coded multi-objective genetic algorithm with effective queuing model for efficient job scheduling in heterogeneous Hadoop environment39
Machine learning model design for high performance cloud computing & load balancing resiliency: An innovative approach39
An in-depth exploration of automated jackfruit disease recognition39
Arabic duplicate questions detection based on contextual representation, class label matching, and structured self attention39
Physical layer security and covert communication in UAV-ISAC networks: A comprehensive survey39
A hybrid quantum annealing method for generating ensemble classifiers39
Secure Internet Voting Protocol (SIVP): A secure option for electoral processes39
Gravitational search algorithm based strategy for combinatorial t-way test suite generation39
DCIV: Decentralized cross-chain data integrity verification with blockchain39
Evolutionary computing for clinical dataset classification using a novel feature selection algorithm39
Multiple-level thresholding for breast mass detection38
Improving software maintenance with improved bug triaging38
Pairing-free certificateless blind signature scheme for smart grid38
Enhancing autonomous driving through intelligent navigation: A comprehensive improvement approach38
Machine learning-aided differential-linear attacks with applications to Des and Speck32/6438
An efficient colossal closed itemset mining algorithm for a dataset with high dimensionality38
CE-PBFT: A high availability consensus algorithm for large-scale consortium blockchain37
The semi-supervised medical image segmentation method based on adaptive perturbation enhancement and progressive consistency propagation37
HiveNet: a high-performance, hybrid, and cost-effective architecture for data center networks37
Research on identity authentication system of Internet of Things based on blockchain technology37
A robust RGBT tracking framework with temporal information enhancement and backward trajectory verification37
A few-shot learning approach based on Brownian distance covariance for plant disease classification37
Advancing speed limit detection in ADAS: A novel data-driven approach using Pareto-GBDTMO37
Priority-aware task offloading for LEO satellite edge computing network: a multi-agent deep reinforcement learning-based approach37
Content-based medical image retrieval by spatial matching of visual words36
Facilitating the communication with deaf people: Building a largest Saudi sign language dataset36
Driveshield: Unmasking stealthy attacks on CAN bus via adversarial spatiotemporal feature learning36
Completely fair energy scheduling mechanism in a smart distributed multi-microgrid system36
DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing36
Self-attention negative feedback network for real-time image super-resolution36
Lightweight deep learning model to secure authentication in Mobile Cloud Computing36
Emotion recognition from facial images with simultaneous occlusion, pose and illumination variations using meta-learning36
Performance analysis of NOMA enabled multi-user co-operative IoT network with SWIPT protocol36
A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization36
Adaptive mean center of mass particle swarm optimizer for auto-localization in 3D wireless sensor networks36
IPSRM: An intent perceived sequential recommendation model36
A novel model compression method based on joint distillation for deepfake video detection36
Intrinsic decomposition with deep supervision from a single image36
Accurate prediction of international trade flows: Leveraging knowledge graphs and their embeddings36
Multi-level residual network VGGNet for fish species classification35
SSIM-based sparse image restoration35
A dynamic planning model for deploying service functions chain in fog-cloud computing35
Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects35
A three-stage layer-based heuristic to solve the 3D bin-packing problem under balancing constraint35
A lightweight threshold signature scheme for internet of things devices35
MTAGEC: Multi-Task Arabic Grammatical Error Correction as a sequence generation with synthetic data34
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration34
Stereo matching algorithm based on deep learning: A survey34
Sector influence aware stock trend prediction using 3D convolutional neural network33
A Comprehensive Survey on the Application of Deep and Reinforcement Learning Approaches in Autonomous Driving33
CHDPL-Net: a lightweight network for Chinese herbal decoction pieces detection33
ADCGNet: Attention-based dual channel Gabor network towards efficient detection and classification of electrocardiogram images33
Modular models for systems based on multi-tenant services: A multi-level petri-net-based approach33
Metrics for reusability of java language components33
A novel image recommendation model based on user preferences and social relationships33
An unsupervised method for word sense disambiguation33
A dual scheduling framework for task and resource allocation in clouds using deep reinforcement learning33
Architecture and optimization of data mining modeling for visualization of knowledge extraction: Patient safety care33
Towards energy-efficient and time-sensitive task assignment in cross-silo federated learning33
0.14239120483398