Journal of King Saud University-Computer and Information Sciences

Papers
(The H4-Index of Journal of King Saud University-Computer and Information Sciences is 53. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Novel hybrid model for organizations’ reputation in online social networks305
SLViT: Shuffle-convolution-based lightweight Vision transformer for effective diagnosis of sugarcane leaf diseases240
Optimal deploying IoT services on the fog computing: A metaheuristic-based multi-objective approach209
A performance analysis of transformer-based deep learning models for Arabic image captioning177
Enhanced computer vision applications with blockchain: A review of applications and opportunities160
Dense attentive GAN-based one-class model for detection of autism and ADHD142
Throughput optimization of interference limited cognitive radio-based Internet of Things (CR-IoT) network142
Dynamic offloading for energy-aware scheduling in a mobile cloud125
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication122
Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion117
ADHS-EL: Dynamic ensemble learning with adversarial augmentation for accurate and robust network intrusion detection115
A novel anomaly detection method for multivariate time series based on spatial-temporal graph learning111
Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity99
Automatic mapping of configuration options in software using static analysis95
A third generation genetic algorithm NSGAIII for task scheduling in cloud computing90
Influence maximization diffusion models based on engagement and activeness on instagram88
Spatial relaxation transformer for image super-resolution86
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism85
Outlier detection toward high-dimensional industrial data using extreme tensor-train learning machine with compression84
A survey on vehicular task offloading: Classification, issues, and challenges81
MO-CBACORP: A new energy-efficient secure routing protocol for underwater monitoring wireless sensor network80
Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation80
The survey: Text generation models in deep learning79
Classifying and diacritizing Arabic poems using deep recurrent neural networks79
A coding computation scheme for secure aggregation77
Identifying cross-lingual plagiarism using rich semantic features and deep neural networks: A study on Arabic-English plagiarism cases77
HLifeRL: A hierarchical lifelong reinforcement learning framework76
The ideal effect of Gabor filters and Uniform Local Binary Pattern combinations on deformed scanned paper images76
AUSS: An arabic query-based update-summarization system72
Addressing the Curse of Missing Data in Clinical Contexts: A Novel Approach to Correlation-based Imputation71
Achieving stepwise construction of cyber physical systems in EX-MAN component model71
Certificateless multi-source signcryption with lattice70
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets70
A joint model for entity boundary detection and entity span recognition70
A close contact identification algorithm using kernel density estimation for the ship passenger health69
Investigating the law of tendential fall in the rate of profit based on feedback control68
Reconfigure and evaluate consumer satisfaction for Open API in advancing FinTech68
LDPORR: A localized location privacy protection method based on optimized random response67
Combining reinforcement learning method to enhance LEDBAT++ over diversified network environments67
Providing contexts for classification of transients in a wide-area sky survey: An application of noise-induced cluster ensemble65
The Metaverse digital environments: A scoping review of the techniques, technologies, and applications63
Color image reversible data hiding based on multi-channel synchronized histogram63
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems62
Punctuation and lexicon aid representation: A hybrid model for short text sentiment analysis on social media platform61
Structure recovery from single omnidirectional image with distortion-aware learning61
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing61
Knowledge ontology enhanced model for explainable knowledge tracing61
Gradient-guided hierarchical feature attack for object detector59
Efficient learning-driven data transmission algorithm for cloud-to-thing continuum59
Reversible data hiding based on global and local automatic contrast enhancement of low-light color images58
Energy-aware task scheduling for streaming applications on NoC-based MPSoCs55
Bengali handwritten equation solving system55
Model predictive control for non-holonomic robots with disturbances: A quasi-differential type event-driven method53
Using Twitter as a digital insight into public stance on societal behavioral dynamics53
0.099695920944214