KSII Transactions on Internet and Information Systems

Papers
(The TQCC of KSII Transactions on Internet and Information Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Semi-supervised Software Defect Prediction Model Based on Tri-training28
Challenges and Issues of Resource Allocation Techniques in Cloud Computing20
Redundant rule Detection for Software-Defined Networking20
An Effective WSSENet-Based Similarity Retrieval Method of Large Lung CT Image Databases19
Idle Slots Skipped Mechanism based Tag Identification Algorithm with Enhanced Collision Detection16
Empirical Analysis of a Fine-Tuned Deep Convolutional Model in Classifying and Detecting Malaria Parasites from Blood Smears13
Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System12
A new lightweight network based on MobileNetV312
Deep Learning Based Security Model for Cloud based Task Scheduling12
Automation Monitoring With Sensors For Detecting Covid Using Backpropagation Algorithm11
Plants Disease Phenotyping using Quinary Patterns as Texture Descriptor9
Learning Media on Mathematical Education based on Augmented Reality9
A Computer-Aided Diagnosis of Brain Tumors Using a Fine-Tuned YOLO-based Model with Transfer Learning9
DP-LinkNet: A convolutional network for historical document image binarization9
Mixed Reality System for Virtual Chemistry Lab8
An ANN-based gesture recognition algorithm for smart-home applications7
CAB: Classifying Arrhythmias based on Imbalanced Sensor Data7
Generative Adversarial Networks: A Literature Review7
Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server7
DeepPTP: A Deep Pedestrian Trajectory Prediction Model for Traffic Intersection7
An Improved Pseudorandom Sequence Generator and its Application to Image Encryption7
Land Registration: Use-case of e-Governance using Blockchain Technology6
Building Energy Time Series Data Mining for Behavior Analytics and Forecasting Energy consumption6
Fault Diagnosis of Bearing Based on Convolutional Neural Network Using Multi-Domain Features6
BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment6
Improving the Decision-Making Process in the Higher Learning Institutions via Electronic Records Management System Adoption5
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching5
Optimization Driven MapReduce Framework for Indexing and Retrieval of Big Data5
VLC4WoT : Visible Light Communication for Web of Things5
Statistical Profiles of Users’ Interactions with Videos in Large Repositories: Mining of Khan Academy Repository5
VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment5
Digital Tourism Security System for Nepal5
An Analysis of Correlation between Personality and Visiting Place using Spearman’s Rank Correlation Coefficient5
Application of YOLOv5 Neural Network Based on Improved Attention Mechanism in Recognition of Thangka Image Defects5
A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing5
Generative Linguistic Steganography: A Comprehensive Review5
Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach4
A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods4
QLGR: A Q-learning-based Geographic FANET Routing Algorithm Based on Multi-agent Reinforcement Learning4
Low-dose CT Image Denoising Using Classification Densely Connected Residual Network4
Maximizing Information Transmission for Energy Harvesting Sensor Networks by an Uneven Clustering Protocol and Energy Management4
A review of Chinese named entity recognition4
Resilience against Adversarial Examples: Data-Augmentation Exploiting Generative Adversarial Networks4
Robust URL Phishing Detection Based on Deep Learning4
Lightweight Single Image Super-Resolution Convolution Neural Network in Portable Device4
Energy-Efficient Resource Allocation for Application Including Dependent Tasks in Mobile Edge Computing4
Deep Learning-based Evolutionary Recommendation Model for Heterogeneous Big Data Integration4
Optimization of 3D Triangular Mesh Watermarking Using ACO-Weber’s Law4
Optimizations for Mobile MIMO Relay Molecular Communication via Diffusion with Network Coding4
A Survey on Content Aware Image Resizing Methods4
Auxiliary Stacked Denoising Autoencoder based Collaborative Filtering Recommendation4
IoT-Based Health Big-Data Process Technologies: A Survey4
Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme3
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective3
Interface Design for E-Learning: Investigating Design Characteristics of Colour and Graphic Elements for Generation Z3
Pest Prediction in Rice using IoT and Feed Forward Neural Network3
Intelligent Hybrid Fusion Algorithm with Vision Patterns for Generation of Precise Digital Road Maps in Self-driving Vehicles3
A Parallel Deep Convolutional Neural Network for Alzheimer’s disease classification on PET/CT brain images3
Web-based University Classroom Attendance System Based on Deep Learning Face Recognition3
An Optimized Mass-spring Model with Shape Restoration Ability Based on Volume Conservation3
Robot Manipulator Visual Servoing via Kalman Filter- Optimized Extreme Learning Machine and Fuzzy Logic3
Public Sentiment Analysis and Topic Modeling Regarding COVID-19’s Three Waves of Total Lockdown: A Case Study on Movement Control Order in Malaysia3
Adaptive k-means clustering for Flying Ad-hoc Networks3
A hidden anti-jamming method based on deep reinforcement learning3
Next Location Prediction with a Graph Convolutional Network Based on a Seq2seq Framework3
A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges3
Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network3
Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem3
Incorporating Recognition in Catfish Counting Algorithm Using Artificial Neural Network and Geometry3
Railroad Surface Defect Segmentation Using a Modified Fully Convolutional Network3
Road Damage Detection and Classification based on Multi-level Feature Pyramids3
Intelligent Massive Traffic Handling Scheme in 5G Bottleneck Backhaul Networks3
A Metaheuristic Approach Towards Enhancement of Network Lifetime in Wireless Sensor Networks2
Lightweight high-precision pedestrian tracking algorithm in complex occlusion scenarios2
A Review on Path Selection and Navigation Approaches Towards an Assisted Mobility of Visually Impaired People2
High-Quality Coarse-to-Fine Fruit Detector for Harvesting Robot in Open Environment2
Prioritized Data Transmission Mechanism for IoT2
An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction2
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN2
Improved marine predators algorithm for feature selection and SVM optimization2
Bitcoin and Its Energy Usage: Existing Approaches, Important Opinions, Current Trends, and Future Challenges2
An Improved Coyote Optimization Algorithm-Based Clustering for Extending Network Lifetime in Wireless Sensor Networks2
Robustness of Differentiable Neural Computer Using Limited Retention Vector-based Memory Deallocation in Language Model2
Automatic carrier phase delay synchronization of PGC demodulation algorithm in fiber-optic interferometric sensors2
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis2
Multi-dimensional Analysis and Prediction Model for Tourist Satisfaction2
Multicast Tree Generation using Meta Reinforcement Learning in SDN-based Smart Network Platforms2
Two-Stream Convolutional Neural Network for Video Action Recognition2
Anomaly Detection in Smart Homes Using Bayesian Networks2
Automated Analysis Approach for the Detection of High Survivable Ransomware2
SHOMY: Detection of Small Hazardous Objects using the You Only Look Once Algorithm2
Controller Backup and Replication for Reliable Multi-domain SDN2
A Reversible Data Hiding Method for AMBTC Compressed Image without Expansion inside Stego Format2
Enhancing Location Privacy through P2P Network and Caching in Anonymizer2
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications2
Research Trend Analysis for Sustainable QR code use - Focus on Big Data Analysis2
Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid2
Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid2
Hot Topic Discovery across Social Networks Based on Improved LDA Model2
Secured Different Disciplinaries in Electronic Medical Record based on Watermarking and Consortium Blockchain Technology2
A Protein-Protein Interaction Extraction Approach Based on Large Pre-trained Language Model and Adversarial Training2
Lightweight End-to-End Blockchain for IoT Applications2
Thermal Imaging Fire Detection Algorithm with Minimal False Detection2
An Analysis of University Students’ Needs for Learning Support Functions of Learning Management System Augmented with Artificial Intelligence Technology2
Segmented Douglas-Peucker Algorithm Based on the Node Importance2
Knowledge Representation Using Decision Trees Constructed Based on Binary Splits2
Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform2
Improvement of Vocal Detection Accuracy Using Convolutional Neural Networks2
A many-objective evolutionary algorithm based on integrated strategy for skin cancer detection2
PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation2
Design and Empirical Study of an Online Education Platform Based on B2B2C, Focusing on the Perspective of Art Education2
Lossless Compression for Hyperspectral Images based on Adaptive Band Selection and Adaptive Predictor Selection2
The Improved Estimation of the Least Upper Bound to Search for RSA’s Private key2
Defending and Detecting Audio Adversarial Example using Frame Offsets2
PoW-BC: A PoW Consensus Protocol Based on Block Compression2
Scalable Blockchain Storage Model Based on DHT and IPFS2
The Game Selection Model for the Payoff Strategy Optimization of Mobile CrowdSensing Task2
Image Deduplication Based on Hashing and Clustering in Cloud Storage2
A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT2
Deeper SSD: Simultaneous Up-sampling and Down-sampling for Drone Detection2
Verification Control Algorithm of Data Integrity Verification in Remote Data sharing2
A Dissimilarity with Dice-Jaro-Winkler Test Case Prioritization Approach for Model-Based Testing in Software Product Line2
A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value2
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data1
Infrared and visible image fusion based on Laplacian pyramid and generative adversarial network1
Integral Attacks on Some Lightweight Block Ciphers1
Blind Quality Metric via Measurement of Contrast, Texture, and Colour in Night-Time Scenario1
Weather Recognition Based on 3C-CNN1
The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic1
E-customized Product: User-centered Co-design Experiences1
Multi-Slice Joint Task Offloading and Resource Allocation Scheme for Massive MIMO Enabled Network1
A Quantitative Approach to Minimize Energy Consumption in Cloud Data Centres using VM Consolidation Algorithm1
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance1
Classifying Indian Medicinal Leaf Species Using LCFN-BRNN Model1
TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs1
Improved AP Deployment Optimization Scheme Based on Multi-objective Particle Swarm Optimization Algorithm1
Age Estimation via Selecting Discriminated Features and Preserving Geometry1
EvaluationOf LoRaWAN In A Highly Dense Environment With Design Of Common Automated Metering Platform (CAMP) Based On LoRaWAN Protocol1
Channel Capacity Analysis of DNA-based Molecular Communication with Length Encoding Mechanism1
Attention-based for Multiscale Fusion Underwater Image Enhancement1
Exploring the Key Factors that Lead to Intentions to Use AI Fashion Curation Services through Big Data Analysis1
Blockchain-Assisted Trust Management Scheme for Securing VANETs1
Centralized Machine Learning Versus Federated Averaging: A Comparison using MNIST Dataset1
Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging1
Illumination correction via improved grey wolf optimizer for regularized random vector functional link network1
The Internet Design Framework for Improvement of Users’ Positive Emotions1
Research on UAV access deployment algorithm based on improved virtual force model1
Machine Learning-based Prediction of Relative Regional Air Volume Change from Healthy Human Lung CTs1
Adaptive High-order Variation De-noising Method for Edge Detection with Wavelet Coefficients1
The Interactive Modeling Method of Virtual City Scene Based on Building Codes1
Classification Trends Taxonomy of Model-based Testing for Software Product Line: A Systematic Literature Review1
Research of 3D image processing of VR technology in medicine based on DNN1
DA-Res2Net: a novel Densely connected residual Attention network for image semantic segmentation1
Network Traffic Classification Based on Deep Learning1
Robust Generalized Labeled Multi-Bernoulli Filter and Smoother for Multiple Target Tracking using Variational Bayesian1
Deep Learning-Based Modulation Detection for NOMA Systems1
A Hierarchical deep model for food classification from photographs1
Energy-efficiency Optimization Schemes Based on SWIPT in Distributed Antenna Systems1
RIS Selection and Energy Efficiency Optimization for Irregular Distributed RIS-assisted Communication Systems1
Efficient Illegal Contents Detection and Attacker Profiling in Real Environments1
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid1
Lifetime Escalation and Clone Detection in Wireless Sensor Networks using Snowball Endurance Algorithm(SBEA)1
Dynamic Prime Chunking Algorithm for Data Deduplication in Cloud Storage1
First Smart Contract Allowing Cryptoasset Recovery1
Traffic Flow Prediction Model Based on Spatio-Temporal Dilated Graph Convolution1
Visual Analysis of Deep Q-network1
A Comprehensive Review on Regression Test Case Prioritization Techniques for Web Services1
Semi-supervised based Unknown Attack Detection in EDR Environment1
Deep Facade Parsing with Occlusions1
Active and Passive Beamforming for IRS-Aided Vehicle Communication1
PC-SAN: Pretraining-Based Contextual Self-Attention Model for Topic Essay Generation1
Parallel Multi-task Cascade Convolution Neural Network Optimization Algorithm for Real-time Dynamic Face Recognition1
A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution1
A Distributed Fog-based Access Control Architecture for IoT1
Vertical Handoff Decision Algorithm combined Improved Entropy Weighting with GRA for Heterogeneous Wireless Networks1
Deep CNN based Pilot Allocation Scheme in Massive MIMO systems1
Pose Tracking of Moving Sensor using Monocular Camera and IMU Sensor1
A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays1
Machine learning-based nutrient classification recommendation algorithm and nutrient suitability assessment questionnaire1
The Impact of Transforming Unstructured Data into Structured Data on a Churn Prediction Model for Loan Customers1
Trajectory-prediction based relay scheme for time-sensitive data communication in VANETs1
FakedBits- Detecting Fake Information on Social Platforms using Multi-Modal Features1
A reliable quasi-dense corresponding points for structure from motion1
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET1
Speed-up of the Matrix Computation on the Ridge Regression1
Comparison of Different CNN Models in Tuberculosis Detecting1
Skin Lesion Segmentation with Codec Structure Based Upper and Lower Layer Feature Fusion Mechanism1
A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization1
RadioCycle: Deep Dual Learning based Radio Map Estimation1
AutoFe-Sel: A Meta-learning based methodology for Recommending Feature Subset Selection Algorithms1
STAR-24K: A Public Dataset for Space Common Target Detection1
Backhaul transmission scheme for UAV based on improved Nash equilibrium strategy1
The Design, Implementation, Demonstration of the Architecture, Service Framework, and Applications for a Connected Car1
Density-based Outlier Detection in Multi-dimensional Datasets1
An Improved ViBe Algorithm of Moving Target Extraction for Night Infrared Surveillance Video1
The Approaches of Positive Experience Design on IoT Intelligent Products1
Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks1
Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications1
An Empirical Study on the Intention to Reuse Computational Science and Engineering Platforms: A Case Study of EDISON1
Efficient Forest Fire Detection using Rule-Based Multi-color Space and Correlation Coefficient for Application in Unmanned Aerial Vehicles1
An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission1
A Smart Framework for Mobile Botnet Detection Using Static Analysis1
Applying Deep Reinforcement Learning to Improve Throughput and Reduce Collision Rate in IEEE 802.11 Networks1
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks1
Reinforcement Learning-Based Intelligent Decision-Making for Communication Parameters1
Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems1
Energy Efficiency Maximization for Energy Harvesting Bidirectional Cooperative Sensor Networks with AF Mode1
Q-Learning based Collision Avoidance for 802.11 Stations with Maximum Requirements1
Effectiveness of e-health systems in improving hypertension management and awareness: a systematic review1
An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing1
Scaling Up Face Masks Classification Using a Deep Neural Network and Classical Method Inspired Hybrid Technique1
Neo-Chinese Style Furniture Design Based on Semantic Analysis and Connection1
Community Detection using Closeness Similarity based on Common Neighbor Node Clustering Entropy1
Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness1
Research on 5G Core Network Trust Model Based on NF Interaction Behavior1
Feature Analysis and Detection Techniques for Piracy Sites1
Multi-Task FaceBoxes: A Lightweight Face Detector Based on Channel Attention and Context Information1
CutPaste-Based Anomaly Detection Model using Multi Scale Feature Extraction in Time Series Streaming Data1
A Lightweight Pedestrian Intrusion Detection and Warning Method for Intelligent Traffic Security1
Traffic Forecast Assisted Adaptive VNF Dynamic Scaling1
Psychological contract-based Consumer Repurchase behavior On Social commerce platform: An Empirical study1
Visual Object Tracking using Surface Fitting for Scale and Rotation Estimation1
A Cyber-Physical Information System for Smart Buildings with Collaborative Information Fusion1
Revolutionizing Brain Tumor Segmentation in MRI with Dynamic Fusion of Handcrafted Features and Global Pathway-based Deep Learning1
Cascaded-Hop For DeepFake Videos Detection1
The Impact of Online Reviews on Hotel Ratings through the Lens of Elaboration Likelihood Model: A Text Mining Approach1
Improving Web Service Recommendation using Clustering with K-NN and SVD Algorithms1
Generative Adversarial Networks for single image with high quality image1
Research on data augmentation algorithm for time series based on deep learning1
A Deep Learning Algorithm for Fusing Action Recognition and Psychological Characteristics of Wrestlers1
Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network1
Joint wireless and computational resource allocation for ultra-dense mobile-edge computing networks1
Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination1
A Multimodal Fusion Method Based on a Rotation Invariant Hierarchical Model for Finger-based Recognition1
The Identification of Emerging Technologies of Automotive Semiconductor1
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching1
Micro-Expression Recognition Base on Optical Flow Features and Improved MobileNetV21
Decoding Brain Patterns for Colored and Grayscale Images using Multivariate Pattern Analysis1
Research on the Security Level of μ2 against Impossible Differential cryptanalysis1
Efficient Proxy Re-encryption Scheme for E-Voting System1
MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights1
Applications of Intelligent Radio Technologies in Unlicensed Cellular Networks - A Survey1
Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption1
SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game1
Stochastic Gradient Descent Optimization Model for Demand Response in a Connected Microgrid1
Towards Improving Causality Mining using BERT with Multi-level Feature Networks1
Chatbot Design Method Using Hybrid Word Vector Expression Model Based on Real Telemarketing Dat1
Establishing Online Meeting Climate Types and Developing Measurements: Impact on Meeting Satisfaction1
A GQM Approach to Evaluation of the Quality of SmartThings Applications Using Static Analysis1
Exploiting Correlation Characteristics to Detect Covert digital communication1
0.16434001922607