IEEE Access

Papers
(The H4-Index of IEEE Access is 98. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
A Metaverse: Taxonomy, Components, Applications, and Open Challenges665
U-Net and Its Variants for Medical Image Segmentation: A Review of Theory and Applications579
Enabling Large Intelligent Surfaces With Compressive Sensing and Deep Learning282
Machine Learning Applications for Precision Agriculture: A Comprehensive Review279
Plant Disease Detection and Classification by Deep Learning—A Review276
Ebola Optimization Search Algorithm: A New Nature-Inspired Metaheuristic Optimization Algorithm265
Particle Swarm Optimization: A Comprehensive Survey246
Metaheuristic Algorithms on Feature Selection: A Survey of One Decade of Research (2009-2019)233
A Survey on Beyond 5G Network With the Advent of 6G: Architecture and Emerging Technologies222
Convergent Communication, Sensing and Localization in 6G Systems: An Overview of Technologies, Opportunities and Challenges222
A Term Weighted Neural Language Model and Stacked Bidirectional LSTM Based Framework for Sarcasm Identification221
INet: Convolutional Networks for Biomedical Image Segmentation220
DC Microgrid Planning, Operation, and Control: A Comprehensive Review215
Efficient Prediction of Cardiovascular Disease Using Machine Learning Algorithms With Relief and LASSO Feature Selection Techniques212
A Comprehensive Review on NSGA-II for Multi-Objective Combinatorial Optimization Problems205
Joint Design of Communication and Sensing for Beyond 5G and 6G Systems203
A Review on Deep Learning Techniques for the Diagnosis of Novel Coronavirus (COVID-19)197
Improving the Prediction of Heart Failure Patients’ Survival Using SMOTE and Effective Data Mining Techniques191
A Review on Microgrids’ Challenges & Perspectives184
A Survey on Blockchain Technology: Evolution, Architecture and Security178
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning175
A Short-Term Load Forecasting Method Using Integrated CNN and LSTM Network173
Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks162
Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning158
6G Wireless Communications Networks: A Comprehensive Survey158
Inductive Wireless Power Transfer Charging for Electric Vehicles–A Review157
A Novel Deep-Learning Model for Automatic Detection and Classification of Breast Cancer Using the Transfer-Learning Technique157
The Role of AI, Machine Learning, and Big Data in Digital Twinning: A Systematic Literature Review, Challenges, and Opportunities155
Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset154
Geometric A-Star Algorithm: An Improved A-Star Algorithm for AGV Path Planning in a Port Environment154
A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain153
Grid Forming Inverter Modeling, Control, and Applications150
A Comprehensive Review of Power Converter Topologies and Control Methods for Electric Vehicle Fast Charging Applications148
Classification of Remote Sensing Images Using EfficientNet-B3 CNN Model With Attention144
A Review of Bidirectional On-Board Chargers for Electric Vehicles142
The Matthews Correlation Coefficient (MCC) is More Informative Than Cohen’s Kappa and Brier Score in Binary Classification Assessment142
Robots Under COVID-19 Pandemic: A Comprehensive Survey142
Machine Learning for Anomaly Detection: A Systematic Review138
A Survey of Contrastive and Counterfactual Explanation Generation Methods for Explainable Artificial Intelligence138
A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare137
On the History and Future of 100% Renewable Energy Systems Research136
Deep Learning for Anomaly Detection in Time-Series Data: Review, Analysis, and Guidelines135
A Comprehensive Review on Structural Topologies, Power Levels, Energy Storage Systems, and Standards for Electric Vehicle Charging Stations and Their Impacts on Grid134
Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network133
War Strategy Optimization Algorithm: A New Effective Metaheuristic Algorithm for Global Optimization132
MOSMA: Multi-Objective Slime Mould Algorithm Based on Elitist Non-Dominated Sorting132
Grasshopper Optimization Algorithm: Theory, Variants, and Applications132
Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities129
A Review on Mental Stress Detection Using Wearable Sensors and Machine Learning Techniques129
A Comprehensive Review of Blockchain Consensus Mechanisms127
Northern Goshawk Optimization: A New Swarm-Based Algorithm for Solving Optimization Problems126
Peer-to-Peer Energy Trading Mechanism Based on Blockchain and Machine Learning for Sustainable Electrical Power Supply in Smart Grid124
Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies122
6G Ecosystem: Current Status and Future Perspective120
Improving Visual Reasoning Through Semantic Representation120
Privacy and Security Issues in Deep Learning: A Survey119
Prediction of User’s Intention to Use Metaverse System in Medical Education: A Hybrid SEM-ML Learning Approach119
On Short-Term Load Forecasting Using Machine Learning Techniques and a Novel Parallel Deep LSTM-CNN Approach118
Energy Harvesting Techniques for Internet of Things (IoT)118
A Comparative Study: Blockchain Technology Utilization Benefits, Challenges and Functionalities117
An Efficient Fuzzy-Logic Based Variable-Step Incremental Conductance MPPT Method for Grid-Connected PV Systems112
Weed Identification Using Deep Learning and Image Processing in Vegetable Plantation111
Machine Learning Techniques for 5G and Beyond110
Prediction of Chronic Kidney Disease - A Machine Learning Perspective110
Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review110
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies109
Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions108
Image Steganography: A Review of the Recent Advances108
Edge Intelligence and Internet of Things in Healthcare: A Survey108
Foundations and Modeling of Dynamic Networks Using Dynamic Graph Neural Networks: A Survey107
Smart Grid Cyber-Physical Attack and Defense: A Review107
DEMNET: A Deep Learning Model for Early Diagnosis of Alzheimer Diseases and Dementia From MR Images107
Secure Healthcare Data Aggregation and Transmission in IoT—A Survey106
Rolling Element Fault Diagnosis Based on VMD and Sensitivity MCKD106
Fault Diagnosis of Wind Turbines Based on a Support Vector Machine Optimized by the Sparrow Search Algorithm106
A Comprehensive Survey on Antennas On-Chip Based on Metamaterial, Metasurface, and Substrate Integrated Waveguide Principles for Millimeter-Waves and Terahertz Integrated Circuits and Systems105
Method of Reaching Consensus on Probability of Food Safety Based on the Integration of Finite Credible Data on Block Chain105
Survey on Anti-Drone Systems: Components, Designs, and Challenges105
Automating Procurement Contracts in the Healthcare Supply Chain Using Blockchain Smart Contracts104
Towards Industrialization of FOPID Controllers: A Survey on Milestones of Fractional-Order Control and Pathways for Future Developments104
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis104
Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset104
A New Image Encryption Algorithm for Grey and Color Medical Images104
Point Transformer104
Big Data and AI Revolution in Precision Agriculture: Survey and Challenges104
A New Arithmetic Optimization Algorithm for Solving Real-World Multiobjective CEC-2021 Constrained Optimization Problems: Diversity Analysis and Validations104
A Review on UAV Wireless Charging: Fundamentals, Applications, Charging Techniques and Standards102
A Comprehensive Review of Speech Emotion Recognition Systems101
A Survey of Ensemble Learning: Concepts, Algorithms, Applications, and Prospects101
Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning101
Crystal Structure Algorithm (CryStAl): A Metaheuristic Optimization Method101
The Longest Month: Analyzing COVID-19 Vaccination Opinions Dynamics From Tweets in the Month Following the First Vaccine Announcement100
A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products100
Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract99
An Improved Hybrid Secure Multipath Routing Protocol for MANET99
DMPPT Control of Photovoltaic Microgrid Based on Improved Sparrow Search Algorithm99
A Survey of Free Space Optics (FSO) Communication Systems, Links, and Networks98
Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications98
A Survey on Semi-, Self- and Unsupervised Learning for Image Classification98
Grid Integration Challenges and Solution Strategies for Solar PV Systems: A Review98
0.041922092437744