ICT Express

Papers
(The TQCC of ICT Express is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-09-01 to 2024-09-01.)
ArticleCitations
The effect of batch size on the generalizability of the convolutional neural networks on a histopathology dataset306
A comparison of machine learning algorithms for diabetes prediction199
Breast cancer detection by leveraging Machine Learning143
A survey of IoT malware and detection methods based on static features141
A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges133
The role of 5G for digital healthcare against COVID-19 pandemic: Opportunities and challenges124
Feature selection for intrusion detection system in Internet-of-Things (IoT)103
Permissioned blockchain frameworks in the industry: A comparison102
An optimized technique for copy–move forgery localization using statistical features98
Digitization of healthcare sector: A study on privacy and security concerns94
A hybrid algorithm for lung cancer classification using SVM and Neural Networks93
Towards 6G Internet of Things: Recent advances, use cases, and open challenges76
Unsupervised log message anomaly detection74
Improving Data Quality of Low-cost IoT Sensors in Environmental Monitoring Networks Using Data Fusion and Machine Learning Approach74
Blockchain and central bank digital currency74
Key management for blockchain technology72
A comparative study of classification and prediction of Cardio-Vascular Diseases (CVD) using Machine Learning and Deep Learning techniques72
Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G69
An algorithm and method for sentiment analysis using the text and emoticon65
Identifying machine learning techniques for classification of target advertising60
Detection of fake news using deep learning CNN–RNN based methods59
Edge computational task offloading scheme using reinforcement learning for IIoT scenario59
The Xception model: A potential feature extractor in breast cancer histology images classification55
Ransomware Detection using Random Forest Technique55
Uniting cyber security and machine learning: Advantages, challenges and future research48
Environment indoor air quality assessment using fuzzy inference system48
Sentiment analysis of malayalam tweets using machine learning techniques46
Distributed deep reinforcement learning for autonomous aerial eVTOL mobility in drone taxi applications45
Intrusion detection for network based cloud computing by custom RC-NN and optimization44
A vision on the artificial intelligence for 6G communication43
DFU_SPNet: A stacked parallel convolution layers based CNN to improve Diabetic Foot Ulcer classification43
Real-time license plate detection for non-helmeted motorcyclist using YOLO43
Utilization of mobile edge computing on the Internet of Medical Things: A survey36
A sensor fusion system with thermal infrared camera and LiDAR for autonomous vehicles and deep learning based object detection35
BLOSOM: BLOckchain technology for Security Of Medical records35
An efficient feature reduction method for the detection of DoS attack33
Deep transductive transfer learning framework for zero-day attack detection32
Deep learning based detection and localization of road accidents from traffic surveillance videos32
Implementing action mask in proximal policy optimization (PPO) algorithm31
Utilizing machine learning on freight transportation and logistics applications: A review31
Disturbed-entropy: A simple data quality assessment approach31
AgriOnBlock: Secured data harvesting for agriculture sector using blockchain technology30
Enabling technologies for AI empowered 6G massive radio access networks30
A Novel Fuzzy C-Means based Chameleon Swarm Algorithm for Segmentation and Progressive Neural Architecture Search for Plant Disease Classification30
A deep learning based HTTP slow DoS classification approach using flow data29
Hockey activity recognition using pre-trained deep learning model29
Developmental dyslexia detection using machine learning techniques : A survey29
Perspectives on 6G wireless communications29
Retinal disease identification using upgraded CLAHE filter and transfer convolution neural network28
Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing28
Supervised ECG wave segmentation using convolutional LSTM28
A Bayesian probability model for Android malware detection27
Cross validation methods: Analysis based on diagnostics of thyroid cancer metastasis27
Accurate detecting concept drift in evolving data streams25
Deep learning for radio propagation: Using image-driven regression to estimate path loss in urban areas25
Cloud task scheduling using enhanced sunflower optimization algorithm24
A survey on UAV placement and trajectory optimization in communication networks: From the perspective of air-to-ground channel models24
Real-time Bhutanese Sign Language digits recognition system using Convolutional Neural Network23
Securing biometric authentication system using blockchain23
The classification of EEG-based wink signals: A CWT-Transfer Learning pipeline22
Big data analytics in health care by data mining and classification techniques21
A machine learning approach for detecting and tracking road boundary lanes21
Evaluation of the machine learning classifier in wafer defects classification21
Surgical instrument posture estimation and tracking based on LSTM20
A Deep Gated Recurrent Unit based model for wireless intrusion detection system20
Intelligent coordinated self-optimizing handover scheme for 4G/5G heterogeneous networks20
Autocorrelation of gradients based violence detection in surveillance videos20
Novel hyper-tuned ensemble Random Forest algorithm for the detection of false basic safety messages in Internet of Vehicles19
A compression strategy to accelerate LSTM meta-learning on FPGA19
Deep reinforcement learning-based model-free path planning and collision avoidance for UAVs: A soft actor–critic with hindsight experience replay approach19
D-LIA: Dynamic congestion control algorithm for MPTCP19
An Enhanced Energy Efficient Lightweight Cryptography Method for various IoT devices18
Security of Internet of Things (IoT) using federated learning and deep learning — Recent advancements, issues and prospects18
Peer-to-peer trust management in intelligent transportation system: An Aumann’s agreement theorem based approach18
Design of a fingerprint template protection scheme using elliptical structures18
Quantum distributed deep learning architectures: Models, discussions, and applications18
Effective heterogeneous ensemble classification: An alternative approach for selecting base classifiers17
SAR ship detection based on improved YOLOv5 and BiFPN17
Fusion of visible and infrared image via compressive sensing using convolutional sparse representation17
Edge AI prospect using the NeuroEdge computing system: Introducing a novel neuromorphic technology17
HADR: A Hybrid Adaptive Data Rate in LoRaWAN for Internet of Things17
Self-gated rectified linear unit for performance improvement of deep neural networks16
A light-weight dynamic ontology for Internet of Things using machine learning technique16
Enhancing sentiment classification performance using hybrid Query Expansion Ranking and Binary Particle Swarm Optimization with Adaptive Inertia Weights15
A novel optimized routing algorithm for QoS traffic engineering in SDN-based mobile networks15
BlockHealth: Blockchain-based secure and peer-to-peer health information sharing with data protection and right to be forgotten15
Human activity recognition based on wrist PPG via the ensemble method15
Combining transformer and CNN for object detection in UAV imagery15
The role of vehicular applications in the design of future 6G infrastructures15
Dysarthric-speech detection using transfer learning with convolutional neural networks15
A Bio-inspired VM Migration using Re-initialization and Decomposition Based-Whale Optimization15
A group preference-based privacy-preserving POI recommender system14
Electromagnetic machine learning for estimation and mitigation of mutual coupling in strongly coupled arrays14
LSTM-based throughput prediction for LTE networks14
Compressive sensing based PAPR reduction in OFDM systems: Modified orthogonal matching pursuit approach14
Integrating oversampling and ensemble-based machine learning techniques for an imbalanced dataset in dyslexia screening tests14
Categorization of actions in soccer videos using a combination of transfer learning and Gated Recurrent Unit14
UAVs-assisted passive source localization using robust TDOA ranging for search and rescue14
An efficient parallel machine learning-based blockchain framework14
BrainyEdge: An AI-enabled framework for IoT edge computing14
Vehicles communications handover in 5G: A survey13
Mitigation of nonlinearities in analog radio over fiber links using machine learning approach13
SMSPROTECT: An automatic smishing detection mobile application13
Reinforcement learning for QoS-guaranteed intelligent routing in Wireless Mesh Networks with heavy traffic load13
DQ: Two approaches to measure the degree of decentralization of blockchain13
A high-precision feature extraction network of fatigue speech from air traffic controller radiotelephony based on improved deep learning13
Quality of experience assessment of calling services in social network12
Temperature monitoring techniques of power cable joints in underground utility tunnels using a fiber Bragg grating12
Automatic Smart Contract generation for Internet of Media Things12
Adaptive rule: A novel framework for recommender system12
Information-theoretic privacy in federated submodel learning12
MAT-AGCA: Multi Augmentation Technique on small dataset for Balinese character recognition using Convolutional Neural Network12
Dew-based offline computing architecture for healthcare IoT11
Particle Swarm Optimization-based dummy sub-carriers insertion for peak to average power ratio reduction in OFDM systems11
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures11
Blockchain side implementation of Pure Wallet (PW): An offline transaction architecture11
Effects of co-channel interference on RIS empowered wireless networks amid multiple eavesdropping attempts11
Edge computing based surveillance framework for real time activity recognition11
On the effect of shadowing correlation and pilot assignment on hybrid precoding performance for cell-free mmWave massive MIMO UDN system11
Integration of context awareness in Internet of Agricultural Things11
Towards 6G: Key technological directions11
Users emulation attack management in the massive internet of things enabled environment11
Mathematical models of the information interaction process in 5G-IoT ecosystem: Different functional scenarios11
A novel study on subjective driver readiness in terms of non-driving related tasks and take-over performance11
Implementation of four kriging models for depth inpainting11
Cryptanalysis of a Pairing-free Certificateless Signcryption scheme10
Generative adversarial networks for unbalanced fetal heart rate signal classification10
Exploiting an Elitist Barnacles Mating Optimizer implementation for substitution box optimization10
CNN-32DC: An improved radar-based drone recognition system based on Convolutional Neural Network10
An optimal location strategy for multiple drone base stations in massive MIMO10
Deep Q-learning-based resource allocation for solar-powered users in cognitive radio networks10
Searching similar weather maps using convolutional autoencoder and satellite images10
Scalability improvement and analysis of permissioned-blockchain10
0.066452980041504