CMC-Computers Materials & Continua

Papers
(The TQCC of CMC-Computers Materials & Continua is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Machine Learning Model for Wind Power Forecasting Using Enhanced Multilayer Perceptron166
Comparative Analysis of COVID-19 Detection Methods Based on Neural Network161
Medical Image Fusion Based on Anisotropic Diffusion and Non-Subsampled Contourlet Transform148
Design and Analysis of Graphene Based Tunnel Field Effect Transistor with Various Ambipolar Reducing Techniques91
Unsupervised Log Anomaly Detection Method Based on Multi-Feature76
Royal Crown Shaped Polarization Insensitive Perfect Metamaterial Absorber for C-, X-, and Ku-Band Applications70
Spatial Correlation Module for Classification of Multi-Label Ocular Diseases Using Color Fundus Images67
Appearance Based Dynamic Hand Gesture Recognition Using 3D Separable Convolutional Neural Network67
Fault Diagnosis of Power Electronic Circuits Based on Adaptive Simulated Annealing Particle Swarm Optimization62
Stochastic Models to Mitigate Sparse Sensor Attacks in Continuous-Time Non-Linear Cyber-Physical Systems61
Deletion and Recovery Scheme of Electronic Health Records Based on Medical Certificate Blockchain61
CNN Based Features Extraction and Selection Using EPO Optimizer for Cotton Leaf Diseases Classification60
Image to Image Translation Based on Differential Image Pix2Pix Model53
Solar Power Plant Network Packet-Based Anomaly Detection System for Cybersecurity52
Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking51
Multi-Layer Deep Sparse Representation for Biological Slice Image Inpainting47
Fake News Detection Using Machine Learning and Deep Learning Methods46
VGWO: Variant Grey Wolf Optimizer with High Accuracy and Low Time Complexity46
A Deep Learning Based Sentiment Analytic Model for the Prediction of Traffic Accidents44
Fusion of Region Extraction and Cross-Entropy SVM Models for Wheat Rust Diseases Classification43
The Entity Relationship Extraction Method Using Improved RoBERTa and Multi-Task Learning42
A Trusted Edge Resource Allocation Framework for Internet of Vehicles42
A Nonstandard Computational Investigation of SEIR Model with Fuzzy Transmission, Recovery and Death Rates41
Approach to Simplify the Development of IoT Systems that Interconnect Embedded Devices Using a Single Program40
MF2-DMTD: A Formalism and Game-Based Reasoning Framework for Optimized Drone-Type Moving Target Defense40
Phase-Field Simulation of δ Hydride Precipitation with Interfacial Anisotropy39
Regional Economic Development Trend Prediction Method Based on Digital Twins and Time Series Network37
An Improved Honey Badger Algorithm through Fusing Multi-Strategies37
A Lightweight ABE Security Protection Scheme in Cloud Environment Based on Attribute Weight36
Exploiting Data Science for Measuring the Performance of Technology Stocks36
Priority Detector and Classifier Techniques Based on ML for the IoMT36
PLDMLT: Multi-Task Learning of Diabetic Retinopathy Using the Pixel-Level Labeled Fundus Images36
An Efficient Sleep Spindle Detection Algorithm Based on MP and LSBoost36
Fully Automated Density-Based Clustering Method35
Active Learning Strategies for Textual Dataset-Automatic Labelling35
Feature Enhanced Stacked Auto Encoder for Diseases Detection in Brain MRI35
A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model34
A Deep CNN-LSTM-Based Feature Extraction for Cyber-Physical System Monitoring33
A Secure and Efficient Information Authentication Scheme for E-Healthcare System33
AI-Driven FBMC-OQAM Signal Recognition via Transform Channel Convolution Strategy33
Developed Fall Detection of Elderly Patients in Internet of Healthcare Things32
The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network31
Aspect-Level Sentiment Analysis Based on Deep Learning31
E2E-MFERC: A Multi-Face Expression Recognition Model for Group Emotion Assessment31
Anomaly Detection Algorithm of Power System Based on Graph Structure and Anomaly Attention31
Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble31
Combined CNN-LSTM Deep Learning Algorithms for Recognizing Human Physical Activities in Large and Distributed Manners: A Recommendation System31
Developing a Model for Parkinson’s Disease Detection Using Machine Learning Algorithms29
An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment29
An Energy Trading Method Based on Alliance Blockchain and Multi-Signature28
MSADCN: Multi-Scale Attentional Densely Connected Network for Automated Bone Age Assessment28
Binary Program Vulnerability Mining Based on Neural Network28
A Review of the Application of Artificial Intelligence in Orthopedic Diseases27
Multi-Stream Temporally Enhanced Network for Video Salient Object Detection27
Enhanced Differentiable Architecture Search Based on Asymptotic Regularization27
Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform27
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis27
Classification of Electrocardiogram Signals for Arrhythmia Detection Using Convolutional Neural Network27
Image Splicing Forgery Detection Using Feature-Based of Sonine Functions and Deep Features27
Identification of Important FPGA Modules Based on Complex Network26
Using Metaheuristic OFA Algorithm for Service Placement in Fog Computing26
Weber Law Based Approach for Multi-Class Image Forgery Detection26
Image Inpainting Technique Incorporating Edge Prior and Attention Mechanism26
Lightweight Malicious Code Classification Method Based on Improved SqueezeNet25
One Dimensional Conv-BiLSTM Network with Attention Mechanism for IoT Intrusion Detection25
A New Vehicle Detection Framework Based on Feature-Guided in the Road Scene25
Using MsfNet to Predict the ISUP Grade of Renal Clear Cell Carcinoma in Digital Pathology Images25
A Novel Fall Detection Framework Using Skip-DSCGAN Based on Inertial Sensor Data25
Enhancing Unsupervised Domain Adaptation for Person Re-Identification with the Minimal Transfer Cost Framework24
A Lightweight UAV Visual Obstacle Avoidance Algorithm Based on Improved YOLOv824
The Detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement24
YOLO and Blockchain Technology Applied to Intelligent Transportation License Plate Character Recognition for Security24
Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things24
Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations24
Fuzzy Multi-Criteria Decision Support System for the Best Anti-Aging Treatment Selection Process through Normal Wiggly Hesitant Fuzzy Sets24
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks24
Improving Video Watermarking through Galois Field <i>GF</i>(2<sup>4</sup>) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques24
Lightweight Underwater Target Detection Using YOLOv8 with Multi-Scale Cross-Channel Attention23
A Task Offloading Strategy Based on Multi-Agent Deep Reinforcement Learning for Offshore Wind Farm Scenarios23
Virtual Assembly Collision Detection Algorithm Using Backpropagation Neural Network23
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution23
Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation23
Elevating Localization Accuracy in Wireless Sensor Networks: A Refined DV-Hop Approach22
Adaptive Update Distribution Estimation under Probability Byzantine Attack22
Hierarchical Optimization Method for Federated Learning with Feature Alignment and Decision Fusion22
Graph Attention Residual Network Based Routing and Fault-Tolerant Scheduling Mechanism for Data Flow in Power Communication Network22
Paraelectric Doping Simultaneously Improves the Field Frequency Adaptability and Dielectric Properties of Ferroelectric Materials: A Phase-Field Study21
Knowledge Reasoning Method Based on Deep Transfer Reinforcement Learning: DTRLpath21
Blockchain-Enabled Federated Learning with Differential Privacy for Internet of Vehicles21
Fake News Detection Based on Cross-Modal Message Aggregation and Gated Fusion Network21
A Practical Study of Intelligent Image-Based Mobile Robot for Tracking Colored Objects20
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing20
A Quarterly High RFM Mining Algorithm for Big Data Management20
An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking20
AI-Driven Learning Management Systems: Modern Developments, Challenges and Future Trends during the Age of ChatGPT20
An Underwater Target Detection Algorithm Based on Attention Mechanism and Improved YOLOv720
Microstructure and Hot Tearing Sensitivity Simulation and Parameters Optimization for the Centrifugal Casting of Al-Cu Alloy19
A Review of Image Steganography Based on Multiple Hashing Algorithm19
MCWOA Scheduler: Modified Chimp-Whale Optimization Algorithm for Task Scheduling in Cloud Computing19
Multivariate Time Series Anomaly Detection Based on Spatial-Temporal Network and Transformer in Industrial Internet of Things19
IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN19
Adaptive Segmentation for Unconstrained Iris Recognition19
Sec-Auditor: A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness19
A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions19
LDAS&ET-AD: Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation18
Dynamic Multi-Layer Perceptron for Fetal Health Classification Using Cardiotocography Data18
A Pre-Selection-Based Ant Colony System for Integrated Resources Scheduling Problem at Marine Container Terminal18
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection18
Enhanced Hybrid Equilibrium Strategy in Fog-Cloud Computing Networks with Optimal Task Scheduling18
Shear Let Transform Residual Learning Approach for Single-Image Super-Resolution18
Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features18
Attention-Enhanced Voice Portrait Model Using Generative Adversarial Network18
Combo Packet: An Encryption Traffic Classification Method Based on Contextual Information18
Fusion of Spiral Convolution-LSTM for Intrusion Detection Modeling18
An Intelligent Framework for Resilience Recovery of FANETs with Spatio-Temporal Aggregation and Multi-Head Attention Mechanism18
Missing Value Imputation for Radar-Derived Time-Series Tracks of Aerial Targets Based on Improved Self-Attention-Based Network18
Density Clustering Algorithm Based on KD-Tree and Voting Rules18
Appropriate Combination of Crossover Operator and Mutation Operator in Genetic Algorithms for the Travelling Salesman Problem18
Improved YOLOv8n Model for Detecting Helmets and License Plates on Electric Bicycles17
Detecting XSS with Random Forest and Multi-Channel Feature Extraction17
A Novel Insertion Solution for the Travelling Salesman Problem17
Distributed Graph Database Load Balancing Method Based on Deep Reinforcement Learning17
Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network17
Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network17
Lightweight Cross-Modal Multispectral Pedestrian Detection Based on Spatial Reweighted Attention Mechanism17
Scientific Elegance in NIDS: Unveiling Cardinality Reduction, Box-Cox Transformation, and ADASYN for Enhanced Intrusion Detection17
Exploring Motor Imagery EEG: Enhanced EEG Microstate Analysis with GMD-Driven Density Canopy Method17
Enhancing Tea Leaf Disease Identification with Lightweight MobileNetV217
An Improved Iterated Greedy Algorithm for Solving Rescue Robot Path Planning Problem with Limited Survival Time17
Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias17
A Multi-Objective Optimization for Locating Maintenance Stations and Operator Dispatching of Corrective Maintenance17
A Novel Locomotion Rule Rmbedding Long Short-Term Memory Network with Attention for Human Locomotor Intent Classification Using Multi-Sensors Signals17
SMSTracker: A Self-Calibration Multi-Head Self-Attention Transformer for Visual Object Tracking16
Enhancing Malware Detection Resilience: A U-Net GAN Denoising Framework for Image-Based Classification16
FractalNet-LSTM Model for Time Series Forecasting16
Research on the IL-Bagging-DHKELM Short-Term Wind Power Prediction Algorithm Based on Error AP Clustering Analysis16
UNet Based on Multi-Object Segmentation and Convolution Neural Network for Object Recognition16
Ensemble Deep Learning Approaches in Health Care: A Review16
5G Resource Allocation Using Feature Selection and Greylag Goose Optimization Algorithm16
Development of a Novel Noise Reduction Algorithm for Smart Checkout RFID System in Retail Stores16
Multi-Order Neighborhood Fusion Based Multi-View Deep Subspace Clustering16
A Novel 3D Gait Model for Subject Identification Robust against Carrying and Dressing Variations16
Exploring Multi-Task Learning for Forecasting Energy-Cost Resource Allocation in IoT-Cloud Systems16
Federated Learning’s Role in Next-Gen TV Ad Optimization15
A Deep Learning Approach to Industrial Corrosion Detection15
Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network15
Integrating Ontology-Based Approaches with Deep Learning Models for Fine-Grained Sentiment Analysis15
Two-Stage Client Selection Scheme for Blockchain-Enabled Federated Learning in IoT15
Coupling Magneto-Electro-Elastic Multiscale Finite Element Method for Transient Responses of Heterogeneous MEE Structures15
A Novel Filtering-Based Detection Method for Small Targets in Infrared Images15
A Recurrent Neural Network for Multimodal Anomaly Detection by Using Spatio-Temporal Audio-Visual Data15
Enhancing Solar Energy Production Forecasting Using Advanced Machine Learning and Deep Learning Techniques: A Comprehensive Study on the Impact of Meteorological Data15
First Principles Calculations for Corrosion in Mg-Li-Al Alloys with Focus on Corrosion Resistance: A Comprehensive Review15
A Combined Method of Temporal Convolutional Mechanism and Wavelet Decomposition for State Estimation of Photovoltaic Power Plants15
Mural Anomaly Region Detection Algorithm Based on Hyperspectral Multiscale Residual Attention Network15
An Adaptive Congestion Control Optimization Strategy in SDN-Based Data Centers15
Multiscale Simulation of Microstructure Evolution during Preparation and Service Processes of Physical Vapor Deposited c-TiAlN Coatings14
GENOME: Genetic Encoding for Novel Optimization of Malware Detection and Classification in Edge Computing14
Research on Multi-Scale Feature Fusion Network Algorithm Based on Brain Tumor Medical Image Classification14
A Federated Learning Framework with Blockchain-Based Auditable Participant Selection14
An Iterative PRISMA Review of GAN Models for Image Processing, Medical Diagnosis, and Network Security14
A Hybrid Deep Learning Approach for Green Energy Forecasting in Asian Countries14
A Novel Approach Based on Graph Attention Networks for Fruit Recognition14
Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework14
Research on Multimodal Brain Tumor Segmentation Algorithm Based on Feature Decoupling and Information Bottleneck Theory14
An Overview of LoRa Localization Technologies14
A Comprehensive Survey on Joint Resource Allocation Strategies in Federated Edge Learning14
An Investigation of Frequency-Domain Pruning Algorithms for Accelerating Human Activity Recognition Tasks Based on Sensor Data14
CAMSNet: Few-Shot Semantic Segmentation via Class Activation Map and Self-Cross Attention Block14
An Improved Knowledge Distillation Algorithm and Its Application to Object Detection14
Dual-Task Contrastive Meta-Learning for Few-Shot Cross-Domain Emotion Recognition14
A Software Defect Prediction Method Using a Multivariate Heterogeneous Hybrid Deep Learning Algorithm14
HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things13
YOLO-LFD: A Lightweight and Fast Model for Forest Fire Detection13
An Arrhythmia Intelligent Recognition Method Based on a Multimodal Information and Spatio-Temporal Hybrid Neural Network Model13
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models13
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives13
A Novel Scheduling Framework for Multi-Programming Quantum Computing in Cloud Environment13
A Cooperated Imperialist Competitive Algorithm for Unrelated Parallel Batch Machine Scheduling Problem13
Context Awareness by Noise-Pattern Analysis of a Smart Factory13
A Boundary-Type Meshless Method for Traction Identification in Two-Dimensional Anisotropic Elasticity and Investigating the Effective Parameters13
Lip-Audio Modality Fusion for Deep Forgery Video Detection13
A Text Image Watermarking Algorithm Based on Image Enhancement13
A Study on the Explainability of Thyroid Cancer Prediction: SHAP Values and Association-Rule Based Feature Integration Framework13
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence13
A Machine Learning-Based Distributed Denial of Service Detection Approach for Early Warning in Internet Exchange Points13
Salient Object Detection Based on Multi-Strategy Feature Optimization13
Intermediary RRT*-PSO: A Multi-Directional Hybrid Fast Convergence Sampling-Based Path Planning Algorithm13
Convolution-Based Heterogeneous Activation Facility for Effective Machine Learning of ECG Signals13
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction13
Automatic Aggregation Enhanced Affinity Propagation Clustering Based on Mutually Exclusive Exemplar Processing13
Advancing Breast Cancer Diagnosis: The Development and Validation of the HERA-Net Model for Thermographic Analysis12
A Hybrid Approach for Pavement Crack Detection Using Mask R-CNN and Vision Transformer Model12
A Novel Optimized Deep Convolutional Neural Network for Efficient Seizure Stage Classification12
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System12
A Novel Hybrid Ensemble Learning Approach for Enhancing Accuracy and Sustainability in Wind Power Forecasting12
Augmented Deep Multi-Granularity Pose-Aware Feature Fusion Network for Visible-Infrared Person Re-Identification12
From Social Media to Ballot Box: Leveraging Location-Aware Sentiment Analysis for Election Predictions12
Intelligence COVID-19 Monitoring Framework Based on Deep Learning and Smart Wearable IoT Sensors12
Byzantine Robust Federated Learning Scheme Based on Backdoor Triggers12
Assessor Feedback Mechanism for Machine Learning Model12
A Generative Model-Based Network Framework for Ecological Data Reconstruction12
CHART: Intelligent Crime Hotspot Detection and Real-Time Tracking Using Machine Learning12
RepBoTNet-CESA: An Alzheimer’s Disease Computer Aided Diagnosis Method Using Structural Reparameterization BoTNet and Cubic Embedding Self Attention12
Multiclass Classification for Cyber Threats Detection on Twitter12
Visual SLAM Based on Object Detection Network: A Review12
Survey on Deep Learning Approaches for Detection of Email Security Threat12
Survey on Video Security: Examining Threats, Challenges, and Future Trends12
Coordinate Descent K-means Algorithm Based on Split-Merge12
Improving the Position Accuracy and Computational Efficiency of UAV Terrain Aided Navigation Using a Two-Stage Hybrid Fuzzy Particle Filtering Method12
Modeling and Predictive Analytics of Breast Cancer Using Ensemble Learning Techniques: An Explainable Artificial Intelligence Approach12
Enhancing Software Cost Estimation Using Feature Selection and Machine Learning Techniques12
Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things12
Fusion of Hash-Based Hard and Soft Biometrics for Enhancing Face Image Database Search and Retrieval12
Multi-Robot Privacy-Preserving Algorithms Based on Federated Learning: A Review12
Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization12
Poisson-Gumbel Model for Wind Speed Threshold Estimation of Maximum Wind Speed11
A Review of Knowledge Graph in Traditional Chinese Medicine: Analysis, Construction, Application and Prospects11
Computer Vision with Machine Learning Enabled Skin Lesion Classification Model11
Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments11
Controller Placement in Software Defined Internet of Things Using Optimization Algorithm11
Quaternion Integers Based Higher Length Cyclic Codes and Their Decoding Algorithm11
A Location Trajectory Privacy Protection Method Based on Generative Adversarial Network and Attention Mechanism11
Entropy-Bottleneck-Based Privacy Protection Mechanism for Semantic Communication11
Data and Ensemble Machine Learning Fusion Based Intelligent Software Defect Prediction System11
Optimal Deep Convolution Neural Network for Cervical Cancer Diagnosis Model11
Energy and Bandwidth Based Link Stability Routing Algorithm for IoT11
MSEs Credit Risk Assessment Model Based on Federated Learning and Feature Selection11
SEF: A Smart and Energy-Aware Forwarding Strategy for NDN-Based Internet of Healthcare11
Modeling and Performance Evaluation of Streaming Data Processing System in IoT Architecture11
A Defect Detection Method for the Primary Stage of Software Development11
Image Steganalysis Based on Deep Content Features Clustering11
Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems11
Pseudo Label Purification with Dual Contrastive Learning for Unsupervised Vehicle Re-Identification10
Advancing Railway Infrastructure Monitoring: A Case Study on Railway Pole Detection10
A Transformer Network Combing CBAM for Low-Light Image Enhancement10
Deep Reinforcement Learning Enabled Smart City Recycling Waste Object Classification10
Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier10
A Base Station Deployment Algorithm for Wireless Positioning Considering Dynamic Obstacles10
C2Net-YOLOv5: A Bidirectional Res2Net-Based Traffic Sign Detection Algorithm10
Deep Convolution Neural Networks for Image-Based Android Malware Classification10
SVM and KNN Based CNN Architectures for Plant Classification10
Deepfake Detection Method Based on Spatio-Temporal Information Fusion10
Blur-Deblur Algorithm for Pressure-Sensitive Paint Image Based on Variable Attention Convolution10
An AI-Enabled Framework for Transparency and Interpretability in Cardiovascular Disease Risk Prediction10
Modified Neural Network Used for Host Utilization Predication in Cloud Computing Environment10
Reinforcing Artificial Neural Networks through Traditional Machine Learning Algorithms for Robust Classification of Cancer10
Improving the Segmentation of Arabic Handwriting Using Ligature Detection Technique10
DCS-SOCP-SVM: A Novel Integrated Sampling and Classification Algorithm for Imbalanced Datasets10
Learning Temporal User Features for Repost Prediction with Large Language Models10
0.38340091705322