Journal of King Saud University-Computer and Information Sciences

Papers
(The median citation count of Journal of King Saud University-Computer and Information Sciences is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Novel hybrid model for organizations’ reputation in online social networks305
SLViT: Shuffle-convolution-based lightweight Vision transformer for effective diagnosis of sugarcane leaf diseases240
Optimal deploying IoT services on the fog computing: A metaheuristic-based multi-objective approach209
A performance analysis of transformer-based deep learning models for Arabic image captioning177
Enhanced computer vision applications with blockchain: A review of applications and opportunities160
Dense attentive GAN-based one-class model for detection of autism and ADHD142
Throughput optimization of interference limited cognitive radio-based Internet of Things (CR-IoT) network142
Dynamic offloading for energy-aware scheduling in a mobile cloud125
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication122
Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion117
ADHS-EL: Dynamic ensemble learning with adversarial augmentation for accurate and robust network intrusion detection115
A novel anomaly detection method for multivariate time series based on spatial-temporal graph learning111
Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity99
Automatic mapping of configuration options in software using static analysis95
A third generation genetic algorithm NSGAIII for task scheduling in cloud computing90
Influence maximization diffusion models based on engagement and activeness on instagram88
Spatial relaxation transformer for image super-resolution86
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism85
Outlier detection toward high-dimensional industrial data using extreme tensor-train learning machine with compression84
A survey on vehicular task offloading: Classification, issues, and challenges81
MO-CBACORP: A new energy-efficient secure routing protocol for underwater monitoring wireless sensor network80
Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation80
Classifying and diacritizing Arabic poems using deep recurrent neural networks79
The survey: Text generation models in deep learning79
Identifying cross-lingual plagiarism using rich semantic features and deep neural networks: A study on Arabic-English plagiarism cases77
A coding computation scheme for secure aggregation77
HLifeRL: A hierarchical lifelong reinforcement learning framework76
The ideal effect of Gabor filters and Uniform Local Binary Pattern combinations on deformed scanned paper images76
AUSS: An arabic query-based update-summarization system72
Addressing the Curse of Missing Data in Clinical Contexts: A Novel Approach to Correlation-based Imputation71
Achieving stepwise construction of cyber physical systems in EX-MAN component model71
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets70
A joint model for entity boundary detection and entity span recognition70
Certificateless multi-source signcryption with lattice70
A close contact identification algorithm using kernel density estimation for the ship passenger health69
Reconfigure and evaluate consumer satisfaction for Open API in advancing FinTech68
Investigating the law of tendential fall in the rate of profit based on feedback control68
LDPORR: A localized location privacy protection method based on optimized random response67
Combining reinforcement learning method to enhance LEDBAT++ over diversified network environments67
Providing contexts for classification of transients in a wide-area sky survey: An application of noise-induced cluster ensemble65
The Metaverse digital environments: A scoping review of the techniques, technologies, and applications63
Color image reversible data hiding based on multi-channel synchronized histogram63
Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems62
Structure recovery from single omnidirectional image with distortion-aware learning61
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing61
Knowledge ontology enhanced model for explainable knowledge tracing61
Punctuation and lexicon aid representation: A hybrid model for short text sentiment analysis on social media platform61
Efficient learning-driven data transmission algorithm for cloud-to-thing continuum59
Gradient-guided hierarchical feature attack for object detector59
Reversible data hiding based on global and local automatic contrast enhancement of low-light color images58
Bengali handwritten equation solving system55
Energy-aware task scheduling for streaming applications on NoC-based MPSoCs55
Model predictive control for non-holonomic robots with disturbances: A quasi-differential type event-driven method53
Using Twitter as a digital insight into public stance on societal behavioral dynamics53
Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis52
Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application52
Line graph contrastive learning for node classification52
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images51
An ensemble face recognition mechanism based on three-way decisions50
FUSE based file system for efficient storage and retrieval of fragmented multimedia files50
RUE: A robust personalized cost assignment strategy for class imbalance cost-sensitive learning50
C3MW: A novel comprehensive-monitoring-motivated multi-model watermarking scheme for tamper detection and self-recovery49
Dual-stream dynamic graph structure network for document-level relation extraction49
Dynamic SFC placement scheme with parallelized SFCs and reuse of initialized VNFs: An A3C-based DRL approach49
RA-MRS: A high efficient attribute reduction algorithm in big data49
Effective and scalable black-box fuzzing approach for modern web applications48
RAPID: Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection48
Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering48
A robust VVC video encryption scheme based on the dynamical chaotification model48
Discovering Lin-Kernighan-Helsgaun heuristic for routing optimization using self-supervised reinforcement learning48
Efficient resource allocation in the IEEE 802.11ax network leveraging OFDMA technology47
Comparative analysis of median filter and its variants for removal of impulse noise from gray scale images47
Big data analytics in telecommunications: Governance, architecture and use cases47
Application of soft computing techniques in machine reading of Quranic Kufic manuscripts46
Adaptive personalized privacy-preserving data collection scheme with local differential privacy46
A high speed inference architecture for multimodal emotion recognition based on sparse cross modal encoder46
Measuring the effect of monitoring on a cloud computing system by estimating the delay time of requests46
Energy-aware service composition in multi-Cloud46
A novel tree structure-based multi-prototype clustering algorithm46
Developing liver cancer drug response prediction system using late fusion of reduced deep features45
Outlier detection strategies for WSNs: A survey45
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection45
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods44
Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks44
Knowledge-embedded multi-layer collaborative adaptive fusion network: Addressing challenges in foggy conditions and complex imaging44
Enhancing foreign exchange reserve security for central banks using Blockchain, FHE, and AWS43
An analytical code quality methodology using Latent Dirichlet Allocation and Convolutional Neural Networks42
A classification framework for straggler mitigation and management in a heterogeneous Hadoop cluster: A state-of-art survey42
Enhanced DSSM (deep semantic structure modelling) technique for job recommendation42
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis42
DeSa COVID-19: Deep salient COVID-19 image-based quality assessment42
A label learning approach using competitive population optimization algorithm feature selection to improve multi-label classification algorithms42
Detecting anomalous traffic behaviors with seasonal deep Kalman filter graph convolutional neural networks42
Non-redundant shift-invariant complex wavelet transform and fractional gorilla troops optimization-based deep convolutional neural network for video watermarking41
Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey41
Simulated annealing based optimal controller placement in software defined networks with capacity constraint and failure awareness41
PFEL-Net: A lightweight network to enhance feature for multi-scale pedestrian detection40
Deep indoor illumination estimation based on spherical gaussian representation with scene prior knowledge40
Enhancing model quality and scalability for mining business processes with invisible tasks in non-free choice40
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature40
Memory-optimized distributed utility mining for big data39
Clus-DR: Cluster-based pre-trained model for diverse recommendation generation39
A particle swarm optimization approach for large-scale many-objective software architecture recovery39
Embedding and generalization of formula with context in the retrieval of mathematical information39
3D face reconstruction from single image with generative adversarial networks39
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review39
A Novel Metric based Detection of Temporary Field Code Smell and its Empirical Analysis38
QSST: A Quranic Semantic Search Tool based on word embedding38
Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic38
DeepFocus: A visual focus of attention detection framework using deep learning in multi-object scenarios38
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study38
DRL-assisted delay optimized task offloading in automotive-industry 5.0 based VECNs37
Explaining legal judgments: A multitask learning framework for enhancing factual consistency in rationale generation37
CoEdit: A novel error correction mechanism in compilers using spelling correction algorithms37
A spatiotemporal Order-Revealing query processing approach for Industrial Internet of Things37
Cluster analysis of urdu tweets37
Mitigating 5G security challenges for next-gen industry using quantum computing37
Lattice-based ring signcryption for consortium blockchain37
Towards deploying SFC with parallelized VNFs under resource demand uncertainty in mobile edge computing37
A hybrid approach to secure and compress data streams in cloud computing environment36
Ensemble Neighborhood Search (ENS) for biclustering of gene expression microarray data and single cell RNA sequencing data36
StackFBAs: Detection of fetal brain abnormalities using CNN with stacking strategy from MRI images36
A modified biogeography-based optimization algorithm with guided bed selection mechanism for patient admission scheduling problems36
A lightweight object detection framework for underwater imagery with joint image restoration and color transformation35
Music rhythm tree based partitioning approach to decision tree classifier35
An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal35
IDSoft: A federated and softwarized intrusion detection framework for massive internet of things in 6G network35
Handling data sparsity via item metadata embedding into deep collaborative recommender system35
Denoising of degraded face images sequence in PCA domain for recognition35
Personal authentication and cryptographic key generation based on electroencephalographic signals35
Integrating object-based and pixel-based segmentation for building footprint extraction from satellite images34
Low-cost relay selection in multihop cooperative networks34
Feature selection method based on quantum inspired genetic algorithm for Arabic signature verification34
The resurrection of digital triplet: A cognitive pillar of human-machine integration at the dawn of industry 5.034
Knowledge graph representation learning model based on meta-information and logical rule enhancements34
A novel robust approach for image copyright protection based on concentric rectangles33
RTSLPS: Real time server load prediction system for the ever-changing cloud computing environment33
Fingerprint liveness detection through fusion of pores perspiration and texture features33
ProRE: An ACO- based programmer recommendation model to precisely manage software bugs33
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network33
Enhanced Zone-Based Energy Aware Data Collection Protocol for WSNs (E-ZEAL)32
Hurst exponent based approach for influence maximization in social networks32
Next syllables prediction system in Dzongkha using long short-term memory32
Integrating social media as cooperative learning tool in higher education classrooms: An empirical study32
Forwarding strategies in vehicular named data networks: A survey32
A multiple clustering combination approach based on iterative voting process32
A modified Boneh-Lynn-Shacham signing dynamic auditing in cloud computing32
Improving the efficiency of network controllability processes on temporal networks32
Dynamic neutrosophic cognitive map with improved cuckoo search algorithm (DNCM-ICSA) and ensemble classifier for rheumatoid arthritis (RA) disease32
Multi-objective optimization in order to allocate computing and telecommunication resources based on non-orthogonal access, participation of cloud server and edge server in 5G networks31
Hybridization of meta-heuristic algorithm for load balancing in cloud computing environment31
Gastrointestinal polyp detection through a fusion of contourlet transform and Neural features31
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram31
Detailed analysis of implementation of aviation NMT system and the effects of aviation post-processing tools on TDIL tourism corpus31
A COSMIC function points based test effort estimation model for mobile applications30
Light weight approach for secure backbone construction for MANETs30
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer’s disease30
WITHDRAWN: New obstacle detection method for a mobile robot based on improved disparity map processing30
Improved colorization and classification of intracranial tumor expanse in MRI images via hybrid scheme of Pix2Pix-cGANs and NASNet-large30
Computability evaluation of RESTful API using Primitive Recursive Function30
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images30
Multimodal plant recognition through hybrid feature fusion technique using imaging and non-imaging hyper-spectral data30
Automatic detection of tree cutting in forests using acoustic properties30
GCNT: Identify influential seed set effectively in social networks by integrating graph convolutional networks with graph transformers30
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking29
Pavement damage identification and evaluation in UAV-captured images using gray level co-occurrence matrix and cloud model29
A secure multifactor-based clustering scheme for internet of vehicles29
Fast and robust JND-guided video watermarking scheme in spatial domain29
Federated learning with hyper-parameter optimization29
Automatic Brain Tumor Segmentation from MRI using Greedy Snake Model and Fuzzy C-Means Optimization29
The multi-objective task assignment scheme for software crowdsourcing platforms involving new workers29
Multilingual hope speech detection: A Robust framework using transfer learning of fine-tuning RoBERTa model29
Admittance swarm-based adaptive controller for lower limb exoskeleton with gait trajectory shaping29
A formal specification language and automatic modeling method of asset securitization contract29
Arrhythmia classification using multirate processing metaheuristic optimization and variational mode decomposition28
Advance brain tumor segmentation using feature fusion methods with deep U-Net model with CNN for MRI data28
Artificial intelligence-based fault prediction framework for WBAN28
RSA-RRT: A path planning algorithm based on restricted sampling area28
Cloud center energy consumption control for predictability in neural fuzzy systems28
Robust distributed MPC for disturbed nonlinear multi-agent systems based on a mixed differential–integral event-triggered mechanism28
Link prediction using extended neighborhood based local random walk in multilayer social networks28
A preference random walk algorithm for link prediction through mutual influence nodes in complex networks27
A Survey on Human Face Expression Recognition Techniques27
Automatic lung segmentation for the inclusion of juxtapleural nodules and pulmonary vessels using curvature based border correction27
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses27
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario27
A Jaya algorithm based wrapper method for optimal feature selection in supervised classification27
Heuristic initialization of PSO task scheduling algorithm in cloud computing27
Data aggregation protocols for WSN and IoT applications – A comprehensive survey27
A proposed multi criteria indexing and ranking model for documents and web pages on large scale data26
Integrated deep learning paradigm for document-based sentiment analysis26
FPGA implementation of a chaos-based image encryption algorithm26
Vector relation acquisition and scene knowledge for solving arithmetic word problems26
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter26
A Substitution Box for Lightweight Ciphers to Secure Internet of Things26
Framework for automatic detection of anomalies in DevOps26
A hierarchical approach based CBIR scheme using shape, texture, and color for accelerating retrieval process26
IoT-edge anomaly detection for covariate shifted and point time series health data26
An end-to-end real-time pollutants spilling recognition in wastewater based on the IoT-ready SENSIPLUS platform25
A Fuzzy-Based Duo-Secure Multi-Modal Framework for IoMT Anomaly Detection25
A comparison of emotion recognition system using electrocardiogram (ECG) and photoplethysmogram (PPG)25
Skin cancer image segmentation utilizing a novel EN-GWO based hyper-parameter optimized FCEDN25
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm25
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib25
Improving Sentiment Analysis of Arabic Tweets by One-way ANOVA25
Expert systems in oil palm precision agriculture: A decade systematic review25
Multi-scale YOLACT for instance segmentation25
Blockchain-based dynamic trust access control game mechanism25
Ulcer detection in Wireless Capsule Endoscopy images using deep CNN24
Enhancing high-speed digital systems: MVL circuit design with CNTFET and RRAM24
An immune plasma algorithm based approach for UCAV path planning24
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm24
FogCom:SDN-enabled fog node selection for early detection of communicable diseases24
MP-UnSciBioSum: a multi-phase unsupervised document summarization method in scientific and biomedical domains24
Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach24
Normalized square difference based multilevel thresholding technique for multispectral images using leader slime mould algorithm24
Hybrid Salp Swarm Algorithm for integrating renewable distributed energy resources in distribution systems considering annual load growth24
Performance evaluation of AMQP over QUIC in the internet-of-thing networks24
SRSegNet: Super-resolution-assisted small targets polyp segmentation network with combined high and low resolution24
A survey on PSO based meta-heuristic scheduling mechanism in cloud computing environment24
Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review23
A fast and efficient green apple object detection model based on Foveabox23
Integration of artificial intelligence (AI) with sensor networks: Trends, challenges, and future directions23
A Q-learning-based smart clustering routing method in flying Ad Hoc networks23
A trust enhancement model based on distributed learning and blockchain in service ecosystems23
IoT and artificial intelligence implementations for remote healthcare monitoring systems: A survey23
An efficient data hiding for ECG signals based on the integer wavelet transform and block standard deviation23
Energy efficient cluster head selection using improved Sparrow Search Algorithm in Wireless Sensor Networks23
CDBR: A semi-automated collaborative execute-before-after dependency-based requirement prioritization approach23
A review of IoT network management: Current status and perspectives23
Identifying the influential nodes in complex social networks using centrality-based approach23
Video anomaly detection using Cross U-Net and cascade sliding window23
Feature extraction and analysis of adjustable surfaces in computer graphics22
Robust regularization for single image dehazing22
Provable Data Possession using Additive Homomorphic Encryption22
Study on data storage and verification methods based on improved Merkle mountain range in IoT scenarios22
An algorithmic implementation of entropic ternary reduct soft sentiment set (ETRSSS) using soft computing technique on big data sentiment analysis (BDSA) for optimal selection of a decision based on r22
Image steganography using exploiting modification direction for compressed encrypted data22
Deep reinforcement learning aided secure UAV communications in the presence of moving eavesdroppers22
A hybrid IoT services recommender system using social IoT22
UBMTR: Unsupervised Boltzmann machine-based time-aware recommendation system22
Data encoding techniques to improve the performance of System on Chip22
A hybrid framework based on genetic algorithm and simulated annealing for RNA structure prediction with pseudoknots22
A dynamic window-size based segmentation technique to detect driver entry and exit from a car21
Leveraging syntax-aware models and triaffine interactions for nominal compound chain extraction21
Distance-based confidence generation and aggregation of classifier for unstructured road detection21
General secure encryption algorithm for separable reversible data hiding in encrypted domain21
Towards a unified ontology for IoT fabric with SDDC21
A fast algorithm for constructing suffix arrays for DNA alphabets21
LaMeta: An efficient locality aware metadata management technique for an ultra-large distributed storage system21
0.19551205635071