KSII Transactions on Internet and Information Systems

Papers
(The median citation count of KSII Transactions on Internet and Information Systems is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Semi-supervised Software Defect Prediction Model Based on Tri-training28
An Effective WSSENet-Based Similarity Retrieval Method of Large Lung CT Image Databases21
Empirical Analysis of a Fine-Tuned Deep Convolutional Model in Classifying and Detecting Malaria Parasites from Blood Smears15
A new lightweight network based on MobileNetV314
A Computer-Aided Diagnosis of Brain Tumors Using a Fine-Tuned YOLO-based Model with Transfer Learning14
Learning Media on Mathematical Education based on Augmented Reality11
Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System11
Automation Monitoring With Sensors For Detecting Covid Using Backpropagation Algorithm10
DP-LinkNet: A convolutional network for historical document image binarization10
Generative Adversarial Networks: A Literature Review9
BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment8
DeepPTP: A Deep Pedestrian Trajectory Prediction Model for Traffic Intersection8
Fault Diagnosis of Bearing Based on Convolutional Neural Network Using Multi-Domain Features7
IoT-Based Health Big-Data Process Technologies: A Survey7
An Improved Pseudorandom Sequence Generator and its Application to Image Encryption7
Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach7
Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server7
A review of Chinese named entity recognition7
Building Energy Time Series Data Mining for Behavior Analytics and Forecasting Energy consumption7
CAB: Classifying Arrhythmias based on Imbalanced Sensor Data7
VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment6
Web-based University Classroom Attendance System Based on Deep Learning Face Recognition6
Digital Tourism Security System for Nepal6
Generative Linguistic Steganography: A Comprehensive Review6
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching6
A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing6
Improving the Decision-Making Process in the Higher Learning Institutions via Electronic Records Management System Adoption5
Resilience against Adversarial Examples: Data-Augmentation Exploiting Generative Adversarial Networks5
Interface Design for E-Learning: Investigating Design Characteristics of Colour and Graphic Elements for Generation Z5
QLGR: A Q-learning-based Geographic FANET Routing Algorithm Based on Multi-agent Reinforcement Learning5
Application of YOLOv5 Neural Network Based on Improved Attention Mechanism in Recognition of Thangka Image Defects4
Optimizations for Mobile MIMO Relay Molecular Communication via Diffusion with Network Coding4
Lightweight Single Image Super-Resolution Convolution Neural Network in Portable Device4
Public Sentiment Analysis and Topic Modeling Regarding COVID-19’s Three Waves of Total Lockdown: A Case Study on Movement Control Order in Malaysia4
A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods4
Incorporating Recognition in Catfish Counting Algorithm Using Artificial Neural Network and Geometry4
Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid4
Two-Stream Convolutional Neural Network for Video Action Recognition3
An Analysis of University Students’ Needs for Learning Support Functions of Learning Management System Augmented with Artificial Intelligence Technology3
Deeper SSD: Simultaneous Up-sampling and Down-sampling for Drone Detection3
A hidden anti-jamming method based on deep reinforcement learning3
Enhancing Location Privacy through P2P Network and Caching in Anonymizer3
A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT3
A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges3
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN3
Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network3
CutPaste-Based Anomaly Detection Model using Multi Scale Feature Extraction in Time Series Streaming Data3
Railroad Surface Defect Segmentation Using a Modified Fully Convolutional Network3
Improved marine predators algorithm for feature selection and SVM optimization3
An Improved Coyote Optimization Algorithm-Based Clustering for Extending Network Lifetime in Wireless Sensor Networks3
Intelligent Massive Traffic Handling Scheme in 5G Bottleneck Backhaul Networks3
Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme3
Research of 3D image processing of VR technology in medicine based on DNN3
Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment3
Robot Manipulator Visual Servoing via Kalman Filter- Optimized Extreme Learning Machine and Fuzzy Logic3
Pest Prediction in Rice using IoT and Feed Forward Neural Network3
Research Trend Analysis for Sustainable QR code use - Focus on Big Data Analysis3
STAR-24K: A Public Dataset for Space Common Target Detection3
Multi-dimensional Analysis and Prediction Model for Tourist Satisfaction3
Revolutionizing Brain Tumor Segmentation in MRI with Dynamic Fusion of Handcrafted Features and Global Pathway-based Deep Learning3
The Identification of Emerging Technologies of Automotive Semiconductor2
A Dissimilarity with Dice-Jaro-Winkler Test Case Prioritization Approach for Model-Based Testing in Software Product Line2
Spectrum- and Energy- Efficiency Analysis Under Sensing Delay Constraint for Cognitive Unmanned Aerial Vehicle Networks2
Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey2
Hot Topic Discovery across Social Networks Based on Improved LDA Model2
Controller Backup and Replication for Reliable Multi-domain SDN2
Robustness of Differentiable Neural Computer Using Limited Retention Vector-based Memory Deallocation in Language Model2
Applying Deep Reinforcement Learning to Improve Throughput and Reduce Collision Rate in IEEE 802.11 Networks2
A Protein-Protein Interaction Extraction Approach Based on Large Pre-trained Language Model and Adversarial Training2
Lightweight high-precision pedestrian tracking algorithm in complex occlusion scenarios2
Robust Generalized Labeled Multi-Bernoulli Filter and Smoother for Multiple Target Tracking using Variational Bayesian2
MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition2
The Game Selection Model for the Payoff Strategy Optimization of Mobile CrowdSensing Task2
A Quantitative Approach to Minimize Energy Consumption in Cloud Data Centres using VM Consolidation Algorithm2
A refinement and abstraction method of the SPZN formal model for intelligent networked vehicles systems2
Efficient Forest Fire Detection using Rule-Based Multi-color Space and Correlation Coefficient for Application in Unmanned Aerial Vehicles2
A Close Contact Tracing Method Based on Bluetooth Signals Applicable to Ship Environments2
Verification Control Algorithm of Data Integrity Verification in Remote Data sharing2
Multicast Tree Generation using Meta Reinforcement Learning in SDN-based Smart Network Platforms2
Lifetime Escalation and Clone Detection in Wireless Sensor Networks using Snowball Endurance Algorithm(SBEA)2
Micro-Expression Recognition Base on Optical Flow Features and Improved MobileNetV22
FakedBits- Detecting Fake Information on Social Platforms using Multi-Modal Features2
A Metaheuristic Approach Towards Enhancement of Network Lifetime in Wireless Sensor Networks2
Blind Quality Metric via Measurement of Contrast, Texture, and Colour in Night-Time Scenario2
SHOMY: Detection of Small Hazardous Objects using the You Only Look Once Algorithm2
Image Deduplication Based on Hashing and Clustering in Cloud Storage2
High-Quality Coarse-to-Fine Fruit Detector for Harvesting Robot in Open Environment2
Road Damage Detection and Classification based on Multi-level Feature Pyramids2
The Improved Estimation of the Least Upper Bound to Search for RSA’s Private key2
PoW-BC: A PoW Consensus Protocol Based on Block Compression2
Secured Different Disciplinaries in Electronic Medical Record based on Watermarking and Consortium Blockchain Technology2
The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic2
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications2
Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm2
Development and Validation of a Digital Literacy Scale in the Artificial Intelligence Era for College Students2
Defending and Detecting Audio Adversarial Example using Frame Offsets2
RadioCycle: Deep Dual Learning based Radio Map Estimation2
A Reversible Data Hiding Method for AMBTC Compressed Image without Expansion inside Stego Format2
Infrared and visible image fusion based on Laplacian pyramid and generative adversarial network2
Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem2
A many-objective evolutionary algorithm based on integrated strategy for skin cancer detection2
Scalable Blockchain Storage Model Based on DHT and IPFS2
Improvement of Vocal Detection Accuracy Using Convolutional Neural Networks2
A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment2
Speed-up of the Matrix Computation on the Ridge Regression2
Design and Empirical Study of an Online Education Platform Based on B2B2C, Focusing on the Perspective of Art Education2
AutoFe-Sel: A Meta-learning based methodology for Recommending Feature Subset Selection Algorithms2
Overview of Motion-to-Photon Latency Reduction for Mitigating VR Sickness2
Exploring the Key Factors that Lead to Intentions to Use AI Fashion Curation Services through Big Data Analysis2
A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution2
Blockchain-Assisted Trust Management Scheme for Securing VANETs2
LSTM-based Sales Forecasting Model2
Active and Passive Beamforming for IRS-Aided Vehicle Communication1
Semantic Conceptual Relational Similarity Based Web Document Clustering for Efficient Information Retrieval Using Semantic Ontology1
Cascaded-Hop For DeepFake Videos Detection1
Density-based Outlier Detection in Multi-dimensional Datasets1
FGW-FER: Lightweight Facial Expression Recognition with Attention1
An Integrated Accurate-Secure Heart Disease Prediction (IAS) Model using Cryptographic and Machine Learning Methods1
Adaptive low-resolution palmprint image recognition based on channel attention mechanism and modified deep residual network1
Stochastic Gradient Descent Optimization Model for Demand Response in a Connected Microgrid1
Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications1
An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing1
Traffic Forecast Assisted Adaptive VNF Dynamic Scaling1
A Novel Grasshopper Optimization-based Particle Swarm Algorithm for Effective Spectrum Sensing in Cognitive Radio Networks1
Leveraging Deep Learning and Farmland Fertility Algorithm for Automated Rice Pest Detection and Classification Model1
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET1
A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems1
Machine Learning Methods for Trust-based Selection of Web Services1
Deep Facade Parsing with Occlusions1
A Multimodal Fusion Method Based on a Rotation Invariant Hierarchical Model for Finger-based Recognition1
Establishing Online Meeting Climate Types and Developing Measurements: Impact on Meeting Satisfaction1
Neo-Chinese Style Furniture Design Based on Semantic Analysis and Connection1
Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness1
Malware Detection with Directed Cyclic Graph and Weight Merging1
Machine learning-based nutrient classification recommendation algorithm and nutrient suitability assessment questionnaire1
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing1
Hybrid Fraud Detection Model: Detecting Fraudulent Information in the Healthcare Crowdfunding1
An indoor fusion positioning algorithm of Bluetooth and PDR based on particle filter with dynamic adjustment of weights calculation strategy1
Channel Capacity Analysis of DNA-based Molecular Communication with Length Encoding Mechanism1
Multi-Slice Joint Task Offloading and Resource Allocation Scheme for Massive MIMO Enabled Network1
Research on data augmentation algorithm for time series based on deep learning1
An IoT based Green Home Architecture for Green Score Calculation towards Smart Sustainable Cities1
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data1
The Impact of Transforming Unstructured Data into Structured Data on a Churn Prediction Model for Loan Customers1
Towards the Saturation Throughput Disparity of Flows in Directional CSMA/CA Networks: An Analytical Model1
Personality Characteristic-based Enhanced Software Testing Levels for Crowd Outsourcing Environment1
Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification1
Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network1
A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization1
Illumination correction via improved grey wolf optimizer for regularized random vector functional link network1
A Deep Learning Algorithm for Fusing Action Recognition and Psychological Characteristics of Wrestlers1
Network Traffic Classification Based on Deep Learning1
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching1
Mobile Robot Localization in Geometrically Similar Environment Combining Wi-Fi with Laser SLAM1
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption1
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing1
Research on the Security Level of μ2 against Impossible Differential cryptanalysis1
A Study on Personal Information Protection amid the COVID-19 Pandemic1
A Cyber-Physical Information System for Smart Buildings with Collaborative Information Fusion1
Keywords and Spatial Based Indexing for Searching the Things on Web1
Discovering AI-enabled convergences based on BERT and topic network1
RIS Selection and Energy Efficiency Optimization for Irregular Distributed RIS-assisted Communication Systems1
Dynamic Prime Chunking Algorithm for Data Deduplication in Cloud Storage1
Facial Feature Based Image-to-Image Translation Method1
Pose Tracking of Moving Sensor using Monocular Camera and IMU Sensor1
Face inpainting via Learnable Structure Knowledge of Fusion Network1
Research on Stress Reduction Model Based on Transformer1
Improving Web Service Recommendation using Clustering with K-NN and SVD Algorithms1
Technology forecasting from the perspective of integration of technologies: Drone technology1
Classification Trends Taxonomy of Model-based Testing for Software Product Line: A Systematic Literature Review1
Improved Maximum Access Delay Time, Noise Variance, and Power Delay Profile Estimations for OFDM Systems1
DA-Res2Net: a novel Densely connected residual Attention network for image semantic segmentation1
TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs1
Reinforcement Learning-Based Intelligent Decision-Making for Communication Parameters1
Visual Analysis of Deep Q-network1
Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation1
Energy-efficient Power Allocation based on worst-case performance optimization under channel uncertainties1
Scaling Up Face Masks Classification Using a Deep Neural Network and Classical Method Inspired Hybrid Technique1
Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging1
A Distributed Fog-based Access Control Architecture for IoT1
Polymorphic Path Transferring for Secure Flow Delivery1
Visual Object Tracking using Surface Fitting for Scale and Rotation Estimation1
Transfer Learning for Caladium bicolor Classification: Proof of Concept to Application Development1
A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays1
A ResNet based multiscale feature extraction for classifying multi-variate medical time series1
Bidirectional Link Resource Allocation Strategy in GFDM-based Multiuser SWIPT Systems1
A Lightweight Pedestrian Intrusion Detection and Warning Method for Intelligent Traffic Security1
The Internet Design Framework for Improvement of Users’ Positive Emotions1
The Investigation of Employing Supervised Machine Learning Models to Predict Type 2 Diabetes Among Adults1
The Impact of Online Reviews on Hotel Ratings through the Lens of Elaboration Likelihood Model: A Text Mining Approach1
Block-chain based Secure Data Access over Internet of Health Application Things (IHoT)1
AP-SDN: Action Program enabled Software-Defined Networking Architecture1
Real-time RL-based 5G Network Slicing Design and Traffic Model Distribution: Implementation for V2X and eMBB Services1
The Approaches of Positive Experience Design on IoT Intelligent Products1
Adaptive High-order Variation De-noising Method for Edge Detection with Wavelet Coefficients1
Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network1
Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination1
Research on UAV access deployment algorithm based on improved virtual force model1
Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption1
Efficient Proxy Re-encryption Scheme for E-Voting System1
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid1
Voice Frequency Synthesis using VAW-GAN based Amplitude Scaling for Emotion Transformation1
MAGRU: Multi-layer Attention with GRU for Logistics Warehousing Demand Prediction1
Applications of Intelligent Radio Technologies in Unlicensed Cellular Networks - A Survey1
A Dynamic Adjustment Method of Service Function Chain Resource Configuration1
Attention-based for Multiscale Fusion Underwater Image Enhancement1
Integral Attacks on Some Lightweight Block Ciphers1
Coordinated Millimeter Wave Beam Selection Using Fingerprint for Cellular-Connected Unmanned Aerial Vehicle1
Eyeglass Remover Network based on a Synthetic Image Dataset1
Application and Research of Monte Carlo Sampling Algorithm in Music Generation1
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks1
Time-Series Forecasting Based on Multi-Layer Attention Architecture1
In-depth Recommendation Model Based on Self-Attention Factorization1
Saliency-Assisted Collaborative Learning Network for Road Scene Semantic Segmentation1
Effectiveness of e-health systems in improving hypertension management and awareness: a systematic review1
Analyzing Factors Contributing to Research Performance using Backpropagation Neural Network and Support Vector Machine1
Sensor Density for Full-View Problem in Heterogeneous Deployed Camera Sensor Networks1
Long Short-Term Memory Neural Network assisted Peak to Average Power Ratio Reduction for Underwater Acoustic Orthogonal Frequency Division Multiplexing Communication1
MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights1
Semi-supervised based Unknown Attack Detection in EDR Environment1
Predicting Urban Tourism Flow with Tourism Digital Footprints Based on Deep Learning1
Community Detection using Closeness Similarity based on Common Neighbor Node Clustering Entropy1
Parallel Algorithm of Improved FunkSVD Based on Spark1
Classifying Indian Medicinal Leaf Species Using LCFN-BRNN Model1
Bird's Eye View Semantic Segmentation based on Improved Transformer for Automatic Annotation1
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance1
Measuring Psychological Support for the Unemployed: The Case of Kakao NEET Project1
Vertical Handoff Decision Algorithm combined Improved Entropy Weighting with GRA for Heterogeneous Wireless Networks1
Research on 5G Core Network Trust Model Based on NF Interaction Behavior1
EvaluationOf LoRaWAN In A Highly Dense Environment With Design Of Common Automated Metering Platform (CAMP) Based On LoRaWAN Protocol1
Key-based dynamic S-Box approach for PRESENT lightweight block cipher1
Q-Learning based Collision Avoidance for 802.11 Stations with Maximum Requirements1
Improved AP Deployment Optimization Scheme Based on Multi-objective Particle Swarm Optimization Algorithm1
An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks1
Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey1
Intelligent Piracy Site Detection Technique with High Accuracy1
Efficient Illegal Contents Detection and Attacker Profiling in Real Environments1
Centralized Machine Learning Versus Federated Averaging: A Comparison using MNIST Dataset1
Generative Adversarial Networks for single image with high quality image1
Skin Lesion Segmentation with Codec Structure Based Upper and Lower Layer Feature Fusion Mechanism1
Energy-efficiency Optimization Schemes Based on SWIPT in Distributed Antenna Systems1
Machine Learning-based Prediction of Relative Regional Air Volume Change from Healthy Human Lung CTs1
The Interactive Modeling Method of Virtual City Scene Based on Building Codes1
Drug distribution management system based on IoT1
A Many-objective Particle Swarm Optimization Algorithm Based on Multiple Criteria for Hybrid Recommendation System1
Backhaul transmission scheme for UAV based on improved Nash equilibrium strategy1
Towards Improving Causality Mining using BERT with Multi-level Feature Networks1
An Improved ViBe Algorithm of Moving Target Extraction for Night Infrared Surveillance Video1
A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field0
Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers0
0.056401968002319