KSII Transactions on Internet and Information Systems

Papers
(The TQCC of KSII Transactions on Internet and Information Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Semi-supervised Software Defect Prediction Model Based on Tri-training28
An Effective WSSENet-Based Similarity Retrieval Method of Large Lung CT Image Databases21
Empirical Analysis of a Fine-Tuned Deep Convolutional Model in Classifying and Detecting Malaria Parasites from Blood Smears15
A new lightweight network based on MobileNetV314
A Computer-Aided Diagnosis of Brain Tumors Using a Fine-Tuned YOLO-based Model with Transfer Learning14
Learning Media on Mathematical Education based on Augmented Reality11
Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System11
Automation Monitoring With Sensors For Detecting Covid Using Backpropagation Algorithm10
DP-LinkNet: A convolutional network for historical document image binarization10
Generative Adversarial Networks: A Literature Review9
BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment8
DeepPTP: A Deep Pedestrian Trajectory Prediction Model for Traffic Intersection8
A review of Chinese named entity recognition7
Building Energy Time Series Data Mining for Behavior Analytics and Forecasting Energy consumption7
CAB: Classifying Arrhythmias based on Imbalanced Sensor Data7
Fault Diagnosis of Bearing Based on Convolutional Neural Network Using Multi-Domain Features7
IoT-Based Health Big-Data Process Technologies: A Survey7
An Improved Pseudorandom Sequence Generator and its Application to Image Encryption7
Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach7
Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server7
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching6
A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing6
VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment6
Web-based University Classroom Attendance System Based on Deep Learning Face Recognition6
Digital Tourism Security System for Nepal6
Generative Linguistic Steganography: A Comprehensive Review6
QLGR: A Q-learning-based Geographic FANET Routing Algorithm Based on Multi-agent Reinforcement Learning5
Improving the Decision-Making Process in the Higher Learning Institutions via Electronic Records Management System Adoption5
Resilience against Adversarial Examples: Data-Augmentation Exploiting Generative Adversarial Networks5
Interface Design for E-Learning: Investigating Design Characteristics of Colour and Graphic Elements for Generation Z5
Application of YOLOv5 Neural Network Based on Improved Attention Mechanism in Recognition of Thangka Image Defects4
Optimizations for Mobile MIMO Relay Molecular Communication via Diffusion with Network Coding4
Lightweight Single Image Super-Resolution Convolution Neural Network in Portable Device4
Public Sentiment Analysis and Topic Modeling Regarding COVID-19’s Three Waves of Total Lockdown: A Case Study on Movement Control Order in Malaysia4
A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods4
Incorporating Recognition in Catfish Counting Algorithm Using Artificial Neural Network and Geometry4
Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid4
Pest Prediction in Rice using IoT and Feed Forward Neural Network3
Research Trend Analysis for Sustainable QR code use - Focus on Big Data Analysis3
STAR-24K: A Public Dataset for Space Common Target Detection3
Multi-dimensional Analysis and Prediction Model for Tourist Satisfaction3
Revolutionizing Brain Tumor Segmentation in MRI with Dynamic Fusion of Handcrafted Features and Global Pathway-based Deep Learning3
Two-Stream Convolutional Neural Network for Video Action Recognition3
An Analysis of University Students’ Needs for Learning Support Functions of Learning Management System Augmented with Artificial Intelligence Technology3
Deeper SSD: Simultaneous Up-sampling and Down-sampling for Drone Detection3
A hidden anti-jamming method based on deep reinforcement learning3
Enhancing Location Privacy through P2P Network and Caching in Anonymizer3
A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT3
A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges3
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN3
Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network3
CutPaste-Based Anomaly Detection Model using Multi Scale Feature Extraction in Time Series Streaming Data3
Railroad Surface Defect Segmentation Using a Modified Fully Convolutional Network3
Improved marine predators algorithm for feature selection and SVM optimization3
An Improved Coyote Optimization Algorithm-Based Clustering for Extending Network Lifetime in Wireless Sensor Networks3
Intelligent Massive Traffic Handling Scheme in 5G Bottleneck Backhaul Networks3
Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme3
Research of 3D image processing of VR technology in medicine based on DNN3
Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment3
Robot Manipulator Visual Servoing via Kalman Filter- Optimized Extreme Learning Machine and Fuzzy Logic3
A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment2
LSTM-based Sales Forecasting Model2
Overview of Motion-to-Photon Latency Reduction for Mitigating VR Sickness2
A Dissimilarity with Dice-Jaro-Winkler Test Case Prioritization Approach for Model-Based Testing in Software Product Line2
Exploring the Key Factors that Lead to Intentions to Use AI Fashion Curation Services through Big Data Analysis2
Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey2
A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution2
Controller Backup and Replication for Reliable Multi-domain SDN2
Blockchain-Assisted Trust Management Scheme for Securing VANETs2
Applying Deep Reinforcement Learning to Improve Throughput and Reduce Collision Rate in IEEE 802.11 Networks2
The Identification of Emerging Technologies of Automotive Semiconductor2
Lightweight high-precision pedestrian tracking algorithm in complex occlusion scenarios2
Spectrum- and Energy- Efficiency Analysis Under Sensing Delay Constraint for Cognitive Unmanned Aerial Vehicle Networks2
Robust Generalized Labeled Multi-Bernoulli Filter and Smoother for Multiple Target Tracking using Variational Bayesian2
Hot Topic Discovery across Social Networks Based on Improved LDA Model2
MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition2
Robustness of Differentiable Neural Computer Using Limited Retention Vector-based Memory Deallocation in Language Model2
A Protein-Protein Interaction Extraction Approach Based on Large Pre-trained Language Model and Adversarial Training2
A Close Contact Tracing Method Based on Bluetooth Signals Applicable to Ship Environments2
The Game Selection Model for the Payoff Strategy Optimization of Mobile CrowdSensing Task2
Multicast Tree Generation using Meta Reinforcement Learning in SDN-based Smart Network Platforms2
A Quantitative Approach to Minimize Energy Consumption in Cloud Data Centres using VM Consolidation Algorithm2
Micro-Expression Recognition Base on Optical Flow Features and Improved MobileNetV22
A refinement and abstraction method of the SPZN formal model for intelligent networked vehicles systems2
A Metaheuristic Approach Towards Enhancement of Network Lifetime in Wireless Sensor Networks2
Efficient Forest Fire Detection using Rule-Based Multi-color Space and Correlation Coefficient for Application in Unmanned Aerial Vehicles2
SHOMY: Detection of Small Hazardous Objects using the You Only Look Once Algorithm2
Verification Control Algorithm of Data Integrity Verification in Remote Data sharing2
High-Quality Coarse-to-Fine Fruit Detector for Harvesting Robot in Open Environment2
Lifetime Escalation and Clone Detection in Wireless Sensor Networks using Snowball Endurance Algorithm(SBEA)2
Road Damage Detection and Classification based on Multi-level Feature Pyramids2
FakedBits- Detecting Fake Information on Social Platforms using Multi-Modal Features2
The Improved Estimation of the Least Upper Bound to Search for RSA’s Private key2
Blind Quality Metric via Measurement of Contrast, Texture, and Colour in Night-Time Scenario2
Image Deduplication Based on Hashing and Clustering in Cloud Storage2
PoW-BC: A PoW Consensus Protocol Based on Block Compression2
Development and Validation of a Digital Literacy Scale in the Artificial Intelligence Era for College Students2
Secured Different Disciplinaries in Electronic Medical Record based on Watermarking and Consortium Blockchain Technology2
RadioCycle: Deep Dual Learning based Radio Map Estimation2
The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic2
Infrared and visible image fusion based on Laplacian pyramid and generative adversarial network2
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications2
A many-objective evolutionary algorithm based on integrated strategy for skin cancer detection2
Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm2
Improvement of Vocal Detection Accuracy Using Convolutional Neural Networks2
Defending and Detecting Audio Adversarial Example using Frame Offsets2
Speed-up of the Matrix Computation on the Ridge Regression2
A Reversible Data Hiding Method for AMBTC Compressed Image without Expansion inside Stego Format2
Design and Empirical Study of an Online Education Platform Based on B2B2C, Focusing on the Perspective of Art Education2
Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem2
AutoFe-Sel: A Meta-learning based methodology for Recommending Feature Subset Selection Algorithms2
Scalable Blockchain Storage Model Based on DHT and IPFS2
Coordinated Millimeter Wave Beam Selection Using Fingerprint for Cellular-Connected Unmanned Aerial Vehicle1
Application and Research of Monte Carlo Sampling Algorithm in Music Generation1
Skin Lesion Segmentation with Codec Structure Based Upper and Lower Layer Feature Fusion Mechanism1
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks1
Machine Learning-based Prediction of Relative Regional Air Volume Change from Healthy Human Lung CTs1
In-depth Recommendation Model Based on Self-Attention Factorization1
Drug distribution management system based on IoT1
Effectiveness of e-health systems in improving hypertension management and awareness: a systematic review1
Backhaul transmission scheme for UAV based on improved Nash equilibrium strategy1
Active and Passive Beamforming for IRS-Aided Vehicle Communication1
MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights1
Cascaded-Hop For DeepFake Videos Detection1
Sensor Density for Full-View Problem in Heterogeneous Deployed Camera Sensor Networks1
An Integrated Accurate-Secure Heart Disease Prediction (IAS) Model using Cryptographic and Machine Learning Methods1
Predicting Urban Tourism Flow with Tourism Digital Footprints Based on Deep Learning1
Stochastic Gradient Descent Optimization Model for Demand Response in a Connected Microgrid1
Parallel Algorithm of Improved FunkSVD Based on Spark1
Traffic Forecast Assisted Adaptive VNF Dynamic Scaling1
Bird's Eye View Semantic Segmentation based on Improved Transformer for Automatic Annotation1
Leveraging Deep Learning and Farmland Fertility Algorithm for Automated Rice Pest Detection and Classification Model1
Measuring Psychological Support for the Unemployed: The Case of Kakao NEET Project1
Research on 5G Core Network Trust Model Based on NF Interaction Behavior1
Machine Learning Methods for Trust-based Selection of Web Services1
Key-based dynamic S-Box approach for PRESENT lightweight block cipher1
A Multimodal Fusion Method Based on a Rotation Invariant Hierarchical Model for Finger-based Recognition1
Establishing Online Meeting Climate Types and Developing Measurements: Impact on Meeting Satisfaction1
Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey1
Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness1
Improved AP Deployment Optimization Scheme Based on Multi-objective Particle Swarm Optimization Algorithm1
Machine learning-based nutrient classification recommendation algorithm and nutrient suitability assessment questionnaire1
Efficient Illegal Contents Detection and Attacker Profiling in Real Environments1
Hybrid Fraud Detection Model: Detecting Fraudulent Information in the Healthcare Crowdfunding1
Generative Adversarial Networks for single image with high quality image1
Channel Capacity Analysis of DNA-based Molecular Communication with Length Encoding Mechanism1
Energy-efficiency Optimization Schemes Based on SWIPT in Distributed Antenna Systems1
Research on data augmentation algorithm for time series based on deep learning1
The Interactive Modeling Method of Virtual City Scene Based on Building Codes1
A Many-objective Particle Swarm Optimization Algorithm Based on Multiple Criteria for Hybrid Recommendation System1
Towards Improving Causality Mining using BERT with Multi-level Feature Networks1
Towards the Saturation Throughput Disparity of Flows in Directional CSMA/CA Networks: An Analytical Model1
An Improved ViBe Algorithm of Moving Target Extraction for Night Infrared Surveillance Video1
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data1
Semantic Conceptual Relational Similarity Based Web Document Clustering for Efficient Information Retrieval Using Semantic Ontology1
Density-based Outlier Detection in Multi-dimensional Datasets1
Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification1
FGW-FER: Lightweight Facial Expression Recognition with Attention1
A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization1
Adaptive low-resolution palmprint image recognition based on channel attention mechanism and modified deep residual network1
Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications1
A Deep Learning Algorithm for Fusing Action Recognition and Psychological Characteristics of Wrestlers1
An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing1
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching1
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption1
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET1
Research on the Security Level of μ2 against Impossible Differential cryptanalysis1
A Novel Grasshopper Optimization-based Particle Swarm Algorithm for Effective Spectrum Sensing in Cognitive Radio Networks1
Keywords and Spatial Based Indexing for Searching the Things on Web1
Deep Facade Parsing with Occlusions1
RIS Selection and Energy Efficiency Optimization for Irregular Distributed RIS-assisted Communication Systems1
A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems1
Pose Tracking of Moving Sensor using Monocular Camera and IMU Sensor1
Neo-Chinese Style Furniture Design Based on Semantic Analysis and Connection1
Research on Stress Reduction Model Based on Transformer1
Malware Detection with Directed Cyclic Graph and Weight Merging1
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing1
DA-Res2Net: a novel Densely connected residual Attention network for image semantic segmentation1
An indoor fusion positioning algorithm of Bluetooth and PDR based on particle filter with dynamic adjustment of weights calculation strategy1
Classification Trends Taxonomy of Model-based Testing for Software Product Line: A Systematic Literature Review1
Multi-Slice Joint Task Offloading and Resource Allocation Scheme for Massive MIMO Enabled Network1
Reinforcement Learning-Based Intelligent Decision-Making for Communication Parameters1
An IoT based Green Home Architecture for Green Score Calculation towards Smart Sustainable Cities1
Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation1
Scaling Up Face Masks Classification Using a Deep Neural Network and Classical Method Inspired Hybrid Technique1
Personality Characteristic-based Enhanced Software Testing Levels for Crowd Outsourcing Environment1
A Distributed Fog-based Access Control Architecture for IoT1
The Impact of Transforming Unstructured Data into Structured Data on a Churn Prediction Model for Loan Customers1
Visual Object Tracking using Surface Fitting for Scale and Rotation Estimation1
Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network1
A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays1
Illumination correction via improved grey wolf optimizer for regularized random vector functional link network1
Bidirectional Link Resource Allocation Strategy in GFDM-based Multiuser SWIPT Systems1
Network Traffic Classification Based on Deep Learning1
The Internet Design Framework for Improvement of Users’ Positive Emotions1
Mobile Robot Localization in Geometrically Similar Environment Combining Wi-Fi with Laser SLAM1
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing1
A Study on Personal Information Protection amid the COVID-19 Pandemic1
AP-SDN: Action Program enabled Software-Defined Networking Architecture1
A Cyber-Physical Information System for Smart Buildings with Collaborative Information Fusion1
The Impact of Online Reviews on Hotel Ratings through the Lens of Elaboration Likelihood Model: A Text Mining Approach1
Discovering AI-enabled convergences based on BERT and topic network1
Dynamic Prime Chunking Algorithm for Data Deduplication in Cloud Storage1
The Approaches of Positive Experience Design on IoT Intelligent Products1
Facial Feature Based Image-to-Image Translation Method1
Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network1
Face inpainting via Learnable Structure Knowledge of Fusion Network1
Improving Web Service Recommendation using Clustering with K-NN and SVD Algorithms1
Research on UAV access deployment algorithm based on improved virtual force model1
Technology forecasting from the perspective of integration of technologies: Drone technology1
Efficient Proxy Re-encryption Scheme for E-Voting System1
Voice Frequency Synthesis using VAW-GAN based Amplitude Scaling for Emotion Transformation1
TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs1
Applications of Intelligent Radio Technologies in Unlicensed Cellular Networks - A Survey1
Improved Maximum Access Delay Time, Noise Variance, and Power Delay Profile Estimations for OFDM Systems1
Integral Attacks on Some Lightweight Block Ciphers1
Visual Analysis of Deep Q-network1
Eyeglass Remover Network based on a Synthetic Image Dataset1
Energy-efficient Power Allocation based on worst-case performance optimization under channel uncertainties1
Time-Series Forecasting Based on Multi-Layer Attention Architecture1
Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging1
Saliency-Assisted Collaborative Learning Network for Road Scene Semantic Segmentation1
Polymorphic Path Transferring for Secure Flow Delivery1
Transfer Learning for Caladium bicolor Classification: Proof of Concept to Application Development1
Long Short-Term Memory Neural Network assisted Peak to Average Power Ratio Reduction for Underwater Acoustic Orthogonal Frequency Division Multiplexing Communication1
A ResNet based multiscale feature extraction for classifying multi-variate medical time series1
Analyzing Factors Contributing to Research Performance using Backpropagation Neural Network and Support Vector Machine1
A Lightweight Pedestrian Intrusion Detection and Warning Method for Intelligent Traffic Security1
Semi-supervised based Unknown Attack Detection in EDR Environment1
The Investigation of Employing Supervised Machine Learning Models to Predict Type 2 Diabetes Among Adults1
Community Detection using Closeness Similarity based on Common Neighbor Node Clustering Entropy1
Classifying Indian Medicinal Leaf Species Using LCFN-BRNN Model1
Real-time RL-based 5G Network Slicing Design and Traffic Model Distribution: Implementation for V2X and eMBB Services1
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance1
Block-chain based Secure Data Access over Internet of Health Application Things (IHoT)1
Vertical Handoff Decision Algorithm combined Improved Entropy Weighting with GRA for Heterogeneous Wireless Networks1
Adaptive High-order Variation De-noising Method for Edge Detection with Wavelet Coefficients1
EvaluationOf LoRaWAN In A Highly Dense Environment With Design Of Common Automated Metering Platform (CAMP) Based On LoRaWAN Protocol1
Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination1
Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption1
An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks1
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid1
Q-Learning based Collision Avoidance for 802.11 Stations with Maximum Requirements1
MAGRU: Multi-layer Attention with GRU for Logistics Warehousing Demand Prediction1
A Dynamic Adjustment Method of Service Function Chain Resource Configuration1
Intelligent Piracy Site Detection Technique with High Accuracy1
Attention-based for Multiscale Fusion Underwater Image Enhancement1
Centralized Machine Learning Versus Federated Averaging: A Comparison using MNIST Dataset1
0.056682109832764