Journal of King Saud University-Computer and Information Sciences

Papers
(The H4-Index of Journal of King Saud University-Computer and Information Sciences is 62. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Structure recovery from single omnidirectional image with distortion-aware learning479
LDPORR: A localized location privacy protection method based on optimized random response295
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network265
Hurst exponent based approach for influence maximization in social networks198
Line graph contrastive learning for node classification181
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images177
A Q-learning-based smart clustering routing method in flying Ad Hoc networks158
Achieving stepwise construction of cyber physical systems in EX-MAN component model150
Music rhythm tree based partitioning approach to decision tree classifier144
QSST: A Quranic Semantic Search Tool based on word embedding137
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature135
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets122
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis121
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm118
Handling data sparsity via item metadata embedding into deep collaborative recommender system110
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution109
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation108
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods104
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images103
A COSMIC function points based test effort estimation model for mobile applications102
AUSS: An arabic query-based update-summarization system101
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism100
Multi-scale YOLACT for instance segmentation100
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram99
Fast and robust JND-guided video watermarking scheme in spatial domain98
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems96
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib94
A joint model for entity boundary detection and entity span recognition92
Big data analytics in telecommunications: Governance, architecture and use cases90
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection90
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks88
Enhanced computer vision applications with blockchain: A review of applications and opportunities88
FogCom:SDN-enabled fog node selection for early detection of communicable diseases85
NMD-FusionNet: a multimodal fusion-based medical imaging-assisted diagnostic model for liver cancer84
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign84
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario83
A review of IoT network management: Current status and perspectives80
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease80
Identifying the influential nodes in complex social networks using centrality-based approach79
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data79
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter79
Dense attentive GAN-based one-class model for detection of autism and ADHD76
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine75
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm75
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA73
Electrolytic capacitor surface defect detection based on deep convolution neural network72
RIS-NOMA-assisted short-packet communication with direct links72
MSTFormer: multi-granularity spatial-temporal transformers for 3D human pose estimation71
An empirical study of problems and evaluation of IoT malware classification label sources71
Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment69
Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm69
Parallel graph-based anomaly detection technique for sequential data68
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime67
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning67
Towards the design of personalized adaptive user interfaces for smart TV viewers66
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction66
Improving outliers detection in data streams using LiCS and voting66
A practical streaming approximate matrix multiplication algorithm65
Accepting multiple splicing systems64
A joint Multi-decoder Dual-attention U-Net framework for tumor segmentation in Whole Slide Images64
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients63
General secure encryption algorithm for separable reversible data hiding in encrypted domain62
0.15293407440186