Computers & Electrical Engineering

Papers
(The TQCC of Computers & Electrical Engineering is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
A method of implanting combinational hardware Trojan based on evolvable hardware275
Ensemble deep generalized eigen-value random vector functional link network for classification problems239
Advancements in medical image segmentation: A review of transformer models165
PCB-integrated embedded planar magnetorquers for small satellites intelligent detumbling155
Cross-Modality Target Detection Using Infrared and Visible Image Fusion for Robust Objection recognition135
Dynamic malware detection based on supervised contrastive learning134
An optimization-based EVA-VCAS for effective voltage sag management122
Comprehensive attention transformer for multi-label segmentation of medical images based on multi-scale feature fusion120
Indoor localization by projecting magnetic field signals onto images with vision transformer119
Navigating cybersecurity training: A comprehensive review118
A current optimization model predictive control with common-mode voltage reduction for three-level T-type inverters102
HWDQT: A hybrid quantum machine learning method for ultra-short-term distributed photovoltaic power prediction102
Enhancing face anti-spoofing through domain generalization with nonlinear spinning neural P neuron fusion and dual feature extractors101
SAGIN-ID: A rapid intrusion detection method for space-air-ground integrated network based on smart contracts100
Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications99
Design of smoothed deep Q-network for excitation control of grid-tied diesel generator98
A hybrid approach for plant leaf detection using ResNet50- intuitionistic fuzzy RVFL (ResNet50-IFRVFLC) classifier91
Quantum-dot cellular automata based design of multifunction binary right shifter circuit87
Adaptive backstepping control of primary permanent magnet linear motor via radial basis function neural network and command filter85
Secure and pervasive communication framework using Named Data Networking for connected healthcare84
Open-set security authentication: A novel CAN-bus recognition algorithm based on metric learning83
EEG-CNN-Souping: Interpretable emotion recognition from EEG signals using EEG-CNN-souping model and explainable AI79
Objective-oriented efficient robotic manipulation: A novel algorithm for real-time grasping in cluttered scenes76
Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm76
Exploring text-to-image generation models: Applications and cloud resource utilization74
GAL-GAN: Global styles and local high-frequency learning based generative adversarial network for image cartoonization73
BirdsSong: A stylized generative audio steganography72
A privacy-preserving and robust aggregation scheme for multi-dimensional data in VANETs72
A novel chemical property-based, alignment-free scalable feature extraction method for genomic data clustering72
AI-driven dynamic trust management and blockchain-based security in industrial IoT71
On-chip kernel-based spatial filter for CMOS image sensor71
Efficient and secure integration of renewable energy sources in smart grids using hybrid fuzzy neural network and improved Diffie-Hellman key management70
LHTAM: Low-power and high-speed approximate multiplier for tiny inexact computing systems70
Hybrid-Network based Dynamic Wireless Power Transfer With Reduced Power Pulsation69
Complex chromatic imaging for enhanced radar face recognition69
Optimizing reliability and safety of wind turbine systems through a hybrid control technique for low-voltage ride-through capability69
Detection and localization of dynamic load altering attacks in power systems65
Efficient implementation of Montgomery modular multiplier on FPGA63
A collaborative approach to early detection of IoT Botnet62
Physical layer security communication for IoT-aided intelligent transport systems: An approach in WFRFT signal domain62
A comprehensive intrusion detection framework using boosting algorithms61
A current-based algorithm for one-end fault location in series capacitor compensated double-circuit transmission lines61
Optimizing resource allocation using proactive scaling with predictive models and custom resources61
Leveraging a novel grey wolf algorithm for optimization of photovoltaic-battery energy storage system under partial shading conditions61
Galactic swarm optimization with deep transfer learning driven colorectal cancer classification for image guided intervention60
Fault localization using sliding adaptive data segmentation and improved k-nearest neighbour with application to railway track circuits59
Simplified control algorithm for stable and efficient standalone PV systems: An assessment based on real climatic conditions59
A ubiquitous architecture for wheelchair fall anomaly detection using low-cost embedded sensors and isolation forest algorithm59
DCL-net: Dual-level correlation learning network for image–text retrieval58
Dynamic risk management in office workspaces: Real-time analysis of staircase safety using computer vision and AI58
MSSTNet: A multi-stream time-distributed spatio-temporal deep learning model to detect mind wandering from electroencephalogram signals58
A new two-stage wire rope leakage signal noise reduction method57
MCM-ViT:Mask-guided context-enhanced multi-scale transformer for fine-grained visual classification57
A novel spatio-temporal attention mechanism model for car-following in autonomous driving57
An adaptive single-phase auto-reclosing scheme based on the Hausdorff distance algorithm for transmission lines with shunt reactors57
Opposition African vultures optimization based NFOPID controller for frequency stabilization of multi-microgrid network56
A blockchain and IPFS-Aided anonymous traitor tracing scheme based on puncturable encryption in Industrial Internet of Things56
BlockGuard: Advancing digital copyright integrity with blockchain technique56
Generalized Cost-effective Converter for Solar Street Lighting featuring Averaged State-space Model-based Sensorless MPPT55
A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques55
Editorial Board55
A hybrid-supervision learning algorithm for real-time un-completed face recognition55
Optimized resource allocation and trust management schemes for non-orthogonal multiple access on the internet of vehicles55
Autonomous navigation system based on a dynamic access control architecture for the internet of vehicles54
Hyperspectral Image Restoration via Tensor Multimode Low-Rank Prior and Spatial-Spectral Smoothness Regularization54
Voltage suppression strategy for multi-stage frequency regulation of DC-side energy storage batteries in doubly-fed induction generator54
Editorial Board53
Emotion-aware mobile edge computing system: A case study53
Distributed subgraph query for RDF graph data based on MapReduce53
Autonomous prediction of Type 2 Diabetes with high impact of glucose level53
Designing evaluation framework for the empirical assessment of COVID-19 mobile apps in Pakistan52
Point set registration via rigid transformation consensus51
Introduction to the special section on Artificial intelligence in Industrial applications (VSI-aiia)51
Integrating visual stimuli for enhancing neural text style transfer with EEG sensors50
Autonomous development of theoretical framework for intelligence automation system using decision tree algorithm49
Guest editorial: Introduction to the special section on recent advances and challenges in quantum-dot cellular automata (VSI-QCA)48
Efficient approximation algorithms for offline and online unit disk multiple coverage48
A coloring and timing brain-computer interface for the nursing bed robot47
On robustness against evacuees’ unexpected movement in automatic evacuation guiding47
Towards secured image steganography based on content-adaptive adversarial perturbation47
LMNet: Lightweight multi-scale convolutional neural network architecture for COVID-19 detection in IoMT environment46
Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps)46
Deep learning technique based real-time audio event detection experiment in a distributed system architecture45
Editorial Board45
Utilizing mobile phone sensors and machine learning to detect drivers through right leg motion44
BBBC-DDRL: A hybrid big-bang big-crunch optimization and deliberated deep reinforced learning mechanisms for cyber-attack detection44
Scalable Federated-Learning and Internet-of-Things enabled architecture for Chest Computer Tomography image classification44
Editorial Board44
A regular architecture for a low-quantum-cost n-bit multiplier44
Regional attention reinforcement learning for rapid object detection44
Exploiting feature space using overlapping windows for improving biometric recognition44
Energy efficient approximate multipliers compatible with error-tolerant application44
MapReduce framework based gridlet allocation technique in computational grid44
Editorial Board43
A secret image sharing method based on block-wise cheating detection and recovery on shadow images43
Application cost of intelligent intrusion detection in medical logistics management under public cloud environment43
E-commerce consumption data prediction and privacy protection based on improved neural network algorithm43
Intelligent framework for social robots based on artificial intelligence-driven mobile edge computing42
A novel prediction method for vulnerability outbreak trend42
Editorial Board42
A dependable and secure consensus algorithm for blockchain assisted microservice architecture42
The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis42
Robotics for control strategy optimization and simulation in automatic cigarette sorter42
An efficient graph clustering algorithm by exploiting k-core decomposition and motifs42
Feature tracking and matching for wide-baseline images with closed-loop sequence41
Fusion of vertical and oblique images using Intra-Cluster-Classification for building damage assessment40
Editorial Board40
Wind potential investigation with turbine siting control for improved energy yield at El-Tor Region, Egypt40
An Osmotic Computing Enabled Domain Naming System (OCE-DNS) for distributed service relocation between cloud and edge40
Field programmable gate array-based new fusion control for photovoltaic inverter39
A quad-form clustered mapping approach for large-scale applications of reconfigurable computing systems39
Analyzing accessibility of car campgrounds through road network structure software in Beijing39
Implementation of quantum gates using decision diagrams38
Predictive text analysis using eye blinks38
Drone-assisted smart data gathering for pandemic situations38
CBA-GAN: Cartoonization style transformation based on the convolutional attention module38
Editorial Board38
Discovery of medical pathways considering complications38
A comprehensive E-commerce customer behavior analysis using convolutional methods38
An efficient convergence-boosted salp swarm optimizer-based artificial neural network for the development of software fault prediction models37
Complex chain integration and normalization model-based risk prediction in multiplex networked industrial chains37
Spilled load detection based on lightweight YOLOv4 trained with easily accessible synthetic dataset37
Impact of Interface Trap Charges on the Performances of Junctionless MOSFET in Sub-Threshold Regime37
Editorial Board37
Editorial Board37
Autonomous detection of malevolent nodes using secure heterogeneous cluster protocol37
Predicting activities of daily living via temporal point processes: Approaches and experimental results36
An exploratory study of transfer learning frameworks in the context of few available shots of neurophysiological signals36
Privacy-preserving Blockchain-assisted private-parking scheme with efficient matching36
Multi-agent collaborative path planning algorithm with reinforcement learning and combined prioritized experience replay in Internet of Things36
Economic efficiency of high-performance electric vehicle operation based on neural network algorithm36
A novel hybrid Chaotic Aquila Optimization algorithm with Simulated Annealing for Unmanned Aerial Vehicles path planning36
A cross-scale framework for low-light image enhancement using spatial–spectral information35
Hybrid deep learning with improved Salp swarm optimization based multi-class grape disease classification model35
Combined image encryption and steganography technique for enhanced security using multiple chaotic maps35
Low-light robust face super resolution via morphological transformation based locality-constrained representation35
Scalable priority-based resource allocation scheme for M2M communication in LTE/LTE-A network35
An efficient anonymous authentication scheme for blockchain assisted and fog-enabled smart grid35
Adaptive neural network-based sliding mode tracking control for agricultural quadrotor with variable payload35
Secure authentication and privacy-preserving blockchain for industrial internet of things35
An optimized ensemble classifier for mammographic mass classification35
Inverter Open Circuit fault diagnosis method based on ISMO for Improved Efficiency34
Blockchain and game theory enable high-efficiency data sharing in the IIoT34
An efficient, robust optimization model for the unit commitment considering renewable uncertainty and pumped-storage hydropower34
A data-driven approach for diagnosing degradation in lithium-ion batteries using data transformation techniques and a novel deep neural network34
Covid-19 fake news sentiment analysis34
SAARC super smart grid: Navigating the future - unleashing the power of an energy-efficient integration of renewable energy resources in the saarc region34
A hybrid multi-population metaheuristic applied to load-sharing optimization of gas compressor stations34
Lower limb motion recognition based on surface electromyography signals and its experimental verification on a novel multi-posture lower limb rehabilitation robots☆34
A finite time composite control method for quadrotor UAV with wind disturbance rejection33
Market behavior-oriented deep learning-based secure data analysis in smart cities33
Energy-efficient and fast IMPLY-based approximate full adder applying NAND gates for image processing33
A systematic literature review on downlink frames in LoRaWAN33
Data quality assessment and analysis for pest identification in smart agriculture33
Multi-scale vision transformer classification model with self-supervised learning and dilated convolution33
A lightweight authentication scheme with privacy preservation for vehicular networks33
Course design process in a technology-enhanced learning environment33
Extraction and analysis algorithms for Sanxingdui cultural relics based on hyperspectral imaging33
Fault diagnosis for cell voltage inconsistency of a battery pack in electric vehicles based on real-world driving data33
Energy-efficient and self-organizing Internet of Things networks for soil monitoring in smart farming33
Image encryption using modified perfect shuffle-based bit level permutation and learning with errors based diffusion for IoT devices33
IoT-powered deep learning brain network for assisting quadriplegic people33
Design of new low-power and high-speed quaternary flip-flops based on CNTFETs32
Intelligent algorithms for incident detection and management in smart transportation systems32
Multi-valued logic arbiter PUF designs based on CNTFETs32
Cloud computing-oriented big data analysis-based intelligent university talent development mechanism32
One-pass streaming algorithm for DR-submodular maximization with a knapsack constraint over the integer lattice32
Distribution network forecasting and expansion planning with optimal location and sizing of solar photovoltaic-based distributed generation32
Cognitive cloud framework for waste dumping analysis using deep learning vision computing in healthy environment32
BiGResi: Robust bit-level fault injection framework for assessing intrinsic software resilience against soft errors32
Agricultural monitoring system in video surveillance object detection using feature extraction and classification by deep learning techniques31
Programmable logic controller based lithium-ion battery management system for accurate state of charge estimation31
Explainable tweet credibility ranker: A comprehensive credibility solution31
Reliability enhancement of hybrid microgrid protection against communication data loss and converter faults using cubic-spline interpolation, Savitzky Golay filtering and GRU network31
A robust spatial-temporal prediction model for photovoltaic power generation based on deep learning31
A novel robust reset controller implemented through field programmable gate array for oxygen ratio regulation of proton exchange membrane fuel cell31
Key strategies for synthetic data generation for training intelligent systems based on people detection from omnidirectional cameras31
Smart microgrid with the internet of things for adequate energy management and analysis30
Intrusion detection based on hybrid classifiers for smart grid30
Performance of a novel DC-DC low voltage stress boost converter for fuel-cell vehicle30
A new boost type single source seven-level switched-capacitor based inverter with reduced current stress over the components30
Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface30
Energy efficient topology control in Underwater Wireless Sensor Networks30
SCR-Spectre: Spectre gadget detection method with strengthened context relevance29
Design and implementation of compact and efficient EMI filter based on CM and DM noise analysis of a transition mode PFC29
Lightweight emotion analysis solution using tiny machine learning for portable devices29
An automated incremental density-based clustering approach using unsupervised deep learning and multi-objective optimization29
Modeling and control design for half electric vehicle with wheel BLDC actuator and Pacejka's tire29
A fully distributed model for coordinated operation of distribution generators and electric vehicle aggregators29
A new approach to low peak sidelobe level signal design in MIMO radars29
Reinforced learning for demand side management of smart microgrid based forecasted hybrid renewable energy scenarios28
6G enabled federated learning for secure IoMT resource recommendation and propagation analysis28
Performance enhancement of normally off InAlN/AlN/GaN HEMT using aluminium gallium nitride back barrier28
Malaria parasite detection using deep learning algorithms based on (CNNs) technique28
Human-robot interaction in higher education for predicting student engagement28
A zonal optimization solution to reliability security constraint unit commitment with wind uncertainty28
Key technologies towards smart manufacturing based on swarm intelligence and edge computing28
Scalable COVID-19 classification using map reduce framework and deep learning enabled hunter Jaya African vultures optimization28
Building construction based on video surveillance and deep reinforcement learning using smart grid power system28
FIDO-enabled universal authenticator with Web usability and privacy preservation28
More diversity, less redundancy: Feature refinement network for few-shot SAR image classification28
Operator-centric joystick mapping for intuitive manual operation of differential drive robots28
YOLOv8-QR: An improved YOLOv8 model via attention mechanism for object detection of QR code defects28
A real time crime scene intelligent video surveillance systems in violence detection framework using deep learning techniques28
Service caching and user association in cache enabled multi-UAV assisted MEN for latency-sensitive applications27
A Self-supervised CNN-GCN hybrid network based on latent graph representation for retinal disease diagnosis27
HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection27
Utilization of H∞ robust and damping controllers with notch filters to reduce SSR in doubly-fed induction generator wind farms27
Editorial Board27
Prediction of rainy-day photovoltaic power generation based on Generative Adversarial Networks and enhanced Sparrow Search Algorithm27
Using Bluetooth Low Energy for positioning systems within overcrowded environments: A real in-field evaluation27
A fusion wavelet-based binary pattern approach for enhanced electroencephalogram signal classification27
Generative Robotic Grasping Using Depthwise Separable Convolution27
A novel Penta-jet VTOL aerial robot: Modeling, control, and simulation verification27
GR-LO: A specific lidar odometry system optimized with ground and road edges27
MCS-ML based line vulnerability for infrastructural resilience assessment with multi-wind speed cyclonic zones27
Multilevel-based algorithm for hyperspectral image interpretation26
Editorial Board26
MLSR: Missing information-based fidelity and learned regularization for single-image super-resolution26
A binary Bi-phase mutation-based hybrid Equilibrium Optimizer for feature selection in medical datasets classification26
Low power design methodology in quantum-dot cellular automata26
Strategic guidance of carbon emission reduction in industrial parks based on dynamic evolution game26
Blockchain: A comparative analysis of hybrid consensus algorithm and performance evaluation26
Time series analysis and anomaly detection for trustworthy smart homes26
An intelligent algorithmically generated domain detection system26
Blockchain-based cyber physical systems: Comprehensive model for challenge assessment26
STP-KDE: A spatiotemporal trajectory protection and publishing method based on kernel density estimation26
Non-bias self-attention learning for weakly supervised semantic segmentation26
From interpretation to explanation: An analytical examination of deep neural network with linguistic rule-based model26
Design and implementation of a wireless control system applied to a 3-DoF redundant robot using Raspberry Pi interface and User Datagram Protocol26
Optimization of PV array tilt angle for minimum levelized cost of energy25
Parallelized maximization of nonmonotone one-sided σ-smooth function25
A three-dimensional clustered peer-to-peer overlay protocol for mobile ad hoc networks25
Obstacle detection and tracking for intelligent agricultural machinery25
Combinatorial optimization and local search: A case study of the discount knapsack problem25
Anti-occlusion face recognition algorithm based on a deep convolutional neural network25
A look-up table-based processing-in-SRAM architecture for energy-efficient search applications25
Route recommendation based on temporal–spatial metric25
Quadruple phase watermarking during high level synthesis for securing reusable hardware intellectual property cores25
Explainable Cross-domain Evaluation of ML-based Network Intrusion Detection Systems25
Dynamic context management in context-aware recommender systems25
A LSTM-FCNN based multi-class intrusion detection using scalable framework25
A centralized architecture for autonomic quality of experience oriented handover in dense networks25
An energy-aware resource allocation method for avionics systems based on improved ant colony optimization algorithm25
A cross-process Spectre attack via cache on RISC-V processor with trusted execution environment25
Object extraction from image with big size based on bilateral grid25
DeepBP: A bilinear model integrating multi-order statistics for fine-grained recognition25
High capacity reversible data hiding with contiguous space in encrypted images25
STI-TP: A Spatio-temporal interleaved model for multi-modal trajectory prediction of heterogeneous traffic agents24
A hybrid behavior- and Bayesian network-based framework for cyber–physical anomaly detection24
0.12971305847168