Journal of King Saud University-Computer and Information Sciences

Papers
(The H4-Index of Journal of King Saud University-Computer and Information Sciences is 60. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-07-01 to 2025-07-01.)
ArticleCitations
Structure recovery from single omnidirectional image with distortion-aware learning426
LDPORR: A localized location privacy protection method based on optimized random response282
Dense attentive GAN-based one-class model for detection of autism and ADHD254
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario193
Enhanced computer vision applications with blockchain: A review of applications and opportunities180
Identifying the influential nodes in complex social networks using centrality-based approach173
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature164
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network151
Hurst exponent based approach for influence maximization in social networks146
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm139
Handling data sparsity via item metadata embedding into deep collaborative recommender system132
Music rhythm tree based partitioning approach to decision tree classifier127
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution116
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation112
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods106
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images105
Achieving stepwise construction of cyber physical systems in EX-MAN component model104
A COSMIC function points based test effort estimation model for mobile applications102
FogCom:SDN-enabled fog node selection for early detection of communicable diseases99
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism97
AUSS: An arabic query-based update-summarization system97
Multi-scale YOLACT for instance segmentation96
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis95
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images94
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter93
QSST: A Quranic Semantic Search Tool based on word embedding91
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram90
Fast and robust JND-guided video watermarking scheme in spatial domain90
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems90
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection88
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks86
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib85
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets84
A joint model for entity boundary detection and entity span recognition82
A review of IoT network management: Current status and perspectives81
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease79
Line graph contrastive learning for node classification78
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data77
A Q-learning-based smart clustering routing method in flying Ad Hoc networks75
Big data analytics in telecommunications: Governance, architecture and use cases75
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm75
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine74
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA73
Part-of-speech based label update network for aspect sentiment triplet extraction73
RIS-NOMA-assisted short-packet communication with direct links71
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆71
An empirical study of problems and evaluation of IoT malware classification label sources71
MSTFormer: multi-granularity spatial-temporal transformers for 3D human pose estimation70
Electrolytic capacitor surface defect detection based on deep convolution neural network70
Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm66
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment66
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime64
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning64
Parallel graph-based anomaly detection technique for sequential data64
Image steganography using exploiting modification direction for compressed encrypted data63
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction62
Improving outliers detection in data streams using LiCS and voting62
Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images61
A practical streaming approximate matrix multiplication algorithm61
Towards the design of personalized adaptive user interfaces for smart TV viewers61
Accepting multiple splicing systems60
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients60
A joint Multi-decoder Dual-attention U-Net framework for tumor segmentation in Whole Slide Images60
0.058536052703857