CMC-Computers Materials & Continua

Papers
(The TQCC of CMC-Computers Materials & Continua is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Pseudo Label Purification with Dual Contrastive Learning for Unsupervised Vehicle Re-Identification178
Energy and Bandwidth Based Link Stability Routing Algorithm for IoT170
Efficient Load Balancing with MANET Propagation of Least Common Multiple Routing and Fuzzy Logic150
Unified FPGA Design for the HEVC Dequantization and Inverse Transform Modules93
SSABA: Search Step Adjustment Based Algorithm83
Grasshopper KUWAHARA and Gradient Boosting Tree for Optimal Features Classifications80
Intelligent Optimization-Based Clustering with Encryption Technique for Internet of Drones Environment76
Secure Cancelable Template Based on Double Random Phase Encoding and Entropy Segmentation75
Evolutionary Intelligence and Deep Learning Enabled Diabetic Retinopathy Classification Model72
Reconfigurable Sensing Time in Cooperative Cognitive Network Using Machine Learning66
CWoT-Share: Context-Based Web of Things Resource Sharing in Blockchain Environment66
High Performance Priority Packets Scheduling Mechanism for Big Data in Smart Cities64
An Integrated Framework for Cloud Service Selection Based on BOM and燭OPSIS61
AI-based Automated Extraction of Location-Oriented COVID-19 Sentiments59
Bayesian Group Chain Sampling Plan for Poisson Distribution with Gamma Prior55
OTP-Based Software-Defined Cloud Architecture for Secure Dynamic Routing53
An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks51
Aging Analysis Framework of Windows-Based Systems through Differential-Analysis of System Snapshots50
Efficiency Effect of Obstacle Margin on Line-of-Sight in Wireless Networks50
Real-Time Demand Response Management for Controlling Load Using Deep Reinforcement Learning47
Gaussian Optimized Deep Learning-based Belief Classification Model for Breast Cancer Detection47
Mean Opinion Score Estimation for Mobile Broadband Networks Using Bayesian Networks47
Adaptive Resource Planning for AI Workloads with Variable Real-Time Tasks46
A Novel Design of Antenna Array with Two K-Band Circularly Polarized燗ntenna46
Early-Stage Cervical Cancerous Cell Detection from Cervix Images Using YOLOv546
A Block Cipher Algorithm Based on Magic Square for Secure E-bank Systems45
Database Recovery Technique for Mobile Computing: A Game Theory Approach45
An EFSM-Based Test Data Generation Approach in Model-Based Testing44
SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps44
Emotion Based Signal Enhancement Through Multisensory Integration Using Machine Learning43
Comparative Study of Machine Learning Modeling for Unsteady Aerodynamics43
Impediments of Cognitive System Engineering in Machine-Human Modeling43
AI Cannot Understand Memes: Experiments with OCR and Facial Emotions42
Deep Image Restoration Model: A Defense Method Against Adversarial Attacks42
Sales Prediction and Product Recommendation Model Through User Behavior Analytics42
An Automated and Real-time Approach of Depression Detection from Facial Micro-expressions42
Deepfake Video Detection Based on Improved CapsNet and Temporal–Spatial Features42
A Combined Method of Temporal Convolutional Mechanism and Wavelet Decomposition for State Estimation of Photovoltaic Power Plants41
Integrating Ontology-Based Approaches with Deep Learning Models for Fine-Grained Sentiment Analysis41
Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation41
AI-Powered Innovations in High-Tech Research and Development: From Theory to Practice41
Survey on Video Security: Examining Threats, Challenges, and Future Trends40
Shear Let Transform Residual Learning Approach for Single-Image Super-Resolution38
IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN37
Developing a Model for Parkinson’s Disease Detection Using Machine Learning Algorithms36
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction36
Automatic Aggregation Enhanced Affinity Propagation Clustering Based on Mutually Exclusive Exemplar Processing36
A Federated Learning Framework with Blockchain-Based Auditable Participant Selection36
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence35
Malicious Traffic Compression and Classification Technique for Secure Internet of Things35
C2Net-YOLOv5: A Bidirectional Res2Net-Based Traffic Sign Detection Algorithm35
Navigating the Blockchain Trilemma: A Review of Recent Advances and Emerging Solutions in Decentralization, Security, and Scalability Optimization35
A Hybrid Attention-Based Residual Unet for Semantic Segmentation of Brain Tumor34
GENOME: Genetic Encoding for Novel Optimization of Malware Detection and Classification in Edge Computing34
Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems33
EACR-LEACH: Energy-Aware Cluster-based Routing Protocol for WSN Based IoT33
A Review of Knowledge Graph in Traditional Chinese Medicine: Analysis, Construction, Application and Prospects33
Reconfigurable Pattern Patch Antenna for Mid-Band 5G: A Review33
An Optimization-Driven Design Scheme of Lightweight Acoustic Metamaterials for Additive Manufacturing32
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution32
Explainable Artificial Intelligence Solution for Online Retail31
Machine Learning with Dimensionality Reduction for DDoS Attack Detection31
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms31
Multi-Robot Privacy-Preserving Algorithms Based on Federated Learning: A Review30
An Underwater Target Detection Algorithm Based on Attention Mechanism and Improved YOLOv730
Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network30
SAFT-VNDN: A Socially-Aware Forwarding Technique in Vehicular Named Data Detworking30
Bilateral Contract for Load Frequency and Renewable Energy Sources Using燗dvanced Controller30
Efficient Scalable Template-Matching Technique for Ancient Brahmi Script營mage30
BHGSO: Binary Hunger Games Search Optimization Algorithm for Feature Selection Problem30
IoT-Cloud Assisted Botnet Detection Using Rat Swarm Optimizer with燚eep燣earning30
An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment29
CNN Based Features Extraction and Selection Using EPO Optimizer for Cotton Leaf Diseases Classification29
Pulmonary Diseases Decision Support System Using Deep Learning Approach29
Privacy Preserving Image Encryption with Deep Learning Based IoT Healthcare Applications29
A Q-Learning-Assisted Co-Evolutionary Algorithm for Distributed Assembly Flexible Job Shop Scheduling Problems29
Binary Fruit Fly Swarm Algorithms for the Set Covering Problem29
ETM-IoT: Energy-Aware Threshold Model for Heterogeneous Communication in the Internet of Things28
Royal Crown Shaped Polarization Insensitive Perfect Metamaterial Absorber for C-, X-, and Ku-Band Applications28
Improving the Ambient Intelligence Living Using Deep Learning Classifier28
Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble28
GA-Stacking: A New Stacking-Based Ensemble Learning Method to Forecast the COVID-19 Outbreak28
Recognition and Tracking of Objects in a Clustered Remote Scene Environment27
Deep-piRNA: Bi-Layered Prediction Model for PIWI-Interacting RNA Using Discriminative Features27
A Hybrid Approach for Pavement Crack Detection Using Mask R-CNN and Vision Transformer Model27
A Fuzzy Multi-Objective Framework for Energy Optimization and Reliable Routing in Wireless Sensor Networks via Particle Swarm Optimization27
A Global-Local Parallel Dual-Branch Deep Learning Model with Attention-Enhanced Feature Fusion for Brain Tumor MRI Classification27
A Progressive Approach to Generic Object Detection: A Two-Stage Framework for Image Recognition27
Enhancing Tea Leaf Disease Identification with Lightweight MobileNetV226
A Novel Convolutional Neural Network Model for Malaria Cell Images Classification26
Secure and Robust Optical Multi-Stage Medical Image Cryptosystem26
MSADCN: Multi-Scale Attentional Densely Connected Network for Automated Bone Age Assessment26
AI-Driven Learning Management Systems: Modern Developments, Challenges and Future Trends during the Age of ChatGPT26
Deep Reinforcement Learning Enabled Smart City Recycling Waste Object Classification26
A Hybrid Deep Fused Learning Approach to Segregate Infectious Diseases25
Agricultural Supply Chain Risks Evaluation with Spherical Fuzzy Analytic Hierarchy Process25
An Efficient Security Solution for Industrial Internet of Things Applications25
Block-Wise Neural Network for Brain Tumor Identification in Magnetic Resonance Images25
DSAFF-Net: A Backbone Network Based on Mask R-CNN for Small Object Detection25
Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles24
Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps24
Density Clustering Algorithm Based on KD-Tree and Voting Rules24
Application Research on Two-Layer Threat Prediction Model Based on Event Graph24
Single Sign-On Security and Privacy: A Systematic Literature Review24
Utilizing Machine Learning with Unique Pentaplet Data Structure to Enhance Data Integrity23
Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with燛rrors Problem23
DM Code Key Point Detection Algorithm Based on CenterNet23
MOALG: A Metaheuristic Hybrid of Multi-Objective Ant Lion Optimizer and Genetic Algorithm for Solving Design Problems23
Association Rule Analysis-Based Identification of Influential Users in爐he燬ocial Media22
Optimization Model in Manufacturing Scheduling for the Garment Industry22
Stackelberg Game-Based Resource Allocation with Blockchain for Cold-Chain Logistics System22
Modeling of Computer Virus Propagation with Fuzzy Parameters22
Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication21
Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks21
Optimized Stacked Autoencoder for IoT Enabled Financial Crisis Prediction Model21
Modelling of Wideband Concentric Ring Frequency Selective Surface for�G燚evices21
An Optimized Neural Network with Bat Algorithm for DNA Sequence Classification21
Swarm Optimization and Machine Learning for Android Malware Detection21
Modified Wild Horse Optimization with Deep Learning Enabled Symmetric Human Activity Recognition Model21
An Enhanced Fuzzy Routing Protocol for Energy Optimization in the Underwater Wireless Sensor Networks21
Leveraging Edge Optimize Vision Transformer for Monkeypox Lesion Diagnosis on Mobile Devices21
Deep Learning Enabled Microarray Gene Expression Classification for Data Science Applications21
COVID19 Outbreak: A Hierarchical Framework for User Sentiment Analysis21
Robust Image Watermarking Using LWT and Stochastic Gradient Firefly Algorithm21
Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission21
Heterogeneous Task Allocation Model and Algorithm for Intelligent Connected Vehicles21
Leveraging Transformers for Detection of Arabic Cyberbullying on Social Media: Hybrid Arabic Transformers21
A Hybrid Deep Learning-Based Unsupervised Anomaly Detection in High Dimensional Data20
MLA: A New Mutated Leader Algorithm for Solving Optimization Problems20
A Review of Computing with Spiking Neural Networks20
Deep Learning Based Underground Sewer Defect Classification Using a Modified RegNet20
A Perfect Knob to Scale Thread Pool on Runtime20
Intelligent Traffic Surveillance through Multi-Label Semantic Segmentation and Filter-Based Tracking20
LKPNR: Large Language Models and Knowledge Graph for Personalized News Recommendation Framework20
Enhancing the Prediction of User Satisfaction with Metaverse Service Through Machine Learning20
AG-GCN: Vehicle Re-Identification Based on Attention-Guided Graph Convolutional Network20
Optimization of Coronavirus Pandemic Model Through Artificial Intelligence20
NTSSA: A Novel Multi-Strategy Enhanced Sparrow Search Algorithm with Northern Goshawk Optimization and Adaptive <i>t</i>-Distribution for Global Optimization19
Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning19
Profiling Casualty Severity Levels of Road Accident Using Weighted Majority Voting19
A Deep Two-State Gated Recurrent Unit for Particulate Matter (PM2.5) Concentration Forecasting19
Upholding Academic Integrity amidst Advanced Language Models: Evaluating BiLSTM Networks with GloVe Embeddings for Detecting AI-Generated Scientific Abstracts19
Fuzzy Based Hybrid Focus Value Estimation for Multi Focus Image Fusion19
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning19
A Metamodeling Approach to Enforcing the No-Cloning Theorem in Quantum Software Engineering19
Graph-Embedded Neural Architecture Search: A Variational Approach for Optimized Model Design19
SDN Based DDos Mitigating Approach Using Traffic Entropy for IoT Network18
Automatic Detection of Nephrops Norvegicus Burrows from Underwater Imagery Using Deep Learning18
SP-DSTS-MIMO Scheme-Aided H.266 for Reliable High Data Rate Mobile Video Communication18
SIMAD: Secure Intelligent Method for IoT-Fog Environments Attacks Detection18
Supplier Selection Fuzzy Model in Supply Chain Management: Vietnamese Cafe Industry Case18
Query Optimization Framework for Graph Database in Cloud Dew Environment18
Artificial Intelligence-Enabled Cooperative Cluster-Based Data Collection for燯nmanned Aerial Vehicles18
Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node18
Lightweight Authentication Protocol Based on Physical Unclonable Function18
Binocular Vision Positioning Method for Safety Monitoring of Solitary Elderly18
Position Control of Flexible Joint Carts Using Adaptive Generalized Dynamics Inversion18
Survey of Indoor Localization Based on Deep Learning17
YOLOCSP-PEST for Crops Pest Localization and Classification17
LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques17
Non-Negative Minimum Volume Factorization (NMVF) for Hyperspectral Images (HSI) Unmixing: A Hybrid Approach17
Optimizing Airline Review Sentiment Analysis: A Comparative Analysis of LLaMA and BERT Models through Fine-Tuning and Few-Shot Learning17
Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method17
A Novel Proactive AI-Based Agents Framework for an IoE-Based Smart Things Monitoring System with Applications for Smart Vehicles17
Improved Particle Swarm Optimization for Parameter Identification of Permanent Magnet Synchronous Motor17
Nondestructive Testing of Bridge Stay Cable Surface Defects Based on Computer Vision17
Wheat Breeding Strategies under Climate Change based on CERES-Wheat Model17
Impact of Magnetic Field on a Peristaltic Flow with Heat Transfer of a Fractional Maxwell Fluid in a Tube17
Improving Machine Translation Formality with Large Language Models17
Adaptive Successive POI Recommendation via Trajectory Sequences Processing and Long Short-Term Preference Learning17
Hyperspectral Image Based Interpretable Feature Clustering Algorithm17
Heuristic Feature Engineering for Enhancing Neural Network Performance in Spatiotemporal Traffic Prediction17
Innovative Fungal Disease Diagnosis System Using Convolutional Neural燦etwork17
Big Data Testing Techniques: Taxonomy, Challenges and Future Trends17
Research on Defect Detection of Wind Turbine Blades Based on Morphology and Improved Otsu Algorithm Using Infrared Images17
A DDoS Identification Method for Unbalanced Data CVWGG17
PhotoGAN: A Novel Style Transfer Model for Digital Photographs16
Cluster Representation of the Structural Description of Images for Effective Classification16
Internet of Things Enabled DDoS Attack Detection Using Pigeon Inspired Optimization Algorithm with Deep Learning Approach16
Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning16
An Innovative Approach Utilizing Binary-View Transformer for Speech Recognition Task16
A Comprehensive Study of Resource Provisioning and Optimization in Edge Computing16
A Hybrid Feature Selection Framework for Predicting Students Performance16
Unsupervised Low-Light Image Enhancement Based on Explicit Denoising and Knowledge Distillation16
Root Security Parameter Generation Mechanism Based on SRAM PUF for Smart Terminals in Power IoT16
Research on Stock Price Prediction Method Based on the GAN-LSTM-Attention Model16
A Joint Resource Allocation Algorithm for D2D Communication16
Dual-Classifier Label Correction Network for Carotid Plaque Classification on Multi-Center Ultrasound Images16
Securing Internet of Things Devices with Federated Learning: A Privacy-Preserving Approach for Distributed Intrusion Detection16
An Improved Hybrid Deep Learning Approach for Security Requirements Classification16
A Low-Collision and Efficient Grasping Method for Manipulator Based on Safe Reinforcement Learning16
Malware Detection in Android IoT Systems Using Deep Learning16
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation16
Embedding Extraction for Arabic Text Using the AraBERT Model15
Through-Wall Multihuman Activity Recognition Based on MIMO Radar15
Billiards Optimization Algorithm: A New Game-Based Metaheuristic Approach15
Diabetic Retinopathy Detection Using Classical-Quantum Transfer Learning Approach and Probability Model15
An Early Warning Model of Telecommunication Network Fraud Based on User Portrait15
Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples15
Enhancing Breast Cancer Diagnosis with Channel-Wise Attention Mechanisms in Deep Learning15
A Double-Branch Xception Architecture for Acute Hemorrhage Detection and Subtype Classification15
Enhancing Fire Detection with YOLO Models: A Bayesian Hyperparameter Tuning Approach15
Abnormal Traffic Detection for Internet of Things Based on an Improved Residual Network15
Deep Learning Based Audio Assistive System for Visually Impaired People15
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map15
Double-Layer-Optimizing Method of Hybrid Energy Storage Microgrid Based on Improved Grey Wolf Optimization15
Lightweight Multi-scale Convolutional Neural Network for Rice Leaf Disease燫ecognition15
An Improved Harris Hawk Optimization Algorithm for Flexible Job Shop Scheduling Problem15
LP-CRI: Label Propagation Immune Generation Algorithm Based on Clustering and Rebound Mechanism15
Deep Learning-based Environmental Sound Classification Using Feature Fusion and Data Enhancement15
A Lightweight Deep Learning-Based Model for Tomato Leaf Disease Classification15
SEFormer: A Lightweight CNN-Transformer Based on Separable Multiscale Depthwise Convolution and Efficient Self-Attention for Rotating Machinery Fault Diagnosis15
A Quantum Algorithm for Evaluating the Hamming Distance15
Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications15
Blockchain-Enabled Edge Computing Techniques for Advanced Video Surveillance in Autonomous Vehicles14
Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security14
Multi-Perspective Data Fusion Framework Based on Hierarchical BERT: Provide Visual Predictions of Business Processes14
Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model14
Steel Surface Defect Detection Using Learnable Memory Vision Transformer14
Modeling and TOPSIS-GRA Algorithm for Autonomous Driving Decision-Making Under 5G-V2X Infrastructure14
Swarming Computational Approach for the Heartbeat Van Der Pol Nonlinear System14
Hyperchaos and MD5 Based Efficient Color Image Cipher14
Two-Hop Delay-Aware Energy Efficiency Resource Allocation in Space-Air-Ground Integrated Smart Grid Network14
Detecting Double JPEG Compressed Color Images via an Improved Approach14
Scalable Blockchain Technology for Tracking the Provenance of the Agri-Food14
ATS: A Novel Time-Sharing CPU Scheduling Algorithm Based on Features Similarities14
A Machine Learning Approach to Cyberbullying Detection in Arabic Tweets14
Hunter Prey Optimization with Hybrid Deep Learning for Fake News Detection on Arabic Corpus14
Your CAPTCHA Recognition Method Based on DEEP Learning Using MSER Descriptor14
Automated Artificial Intelligence Empowered Colorectal Cancer Detection and Classification Model14
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net14
A Prototype for Diagnosis of Psoriasis in Traditional Chinese Medicine14
A Multi-Level Circulant Cross-Modal Transformer for Multimodal Speech Emotion Recognition14
DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning14
Hybrid Evolutionary Algorithm Based Relevance Feedback Approach for Image Retrieval14
A Query-Based Greedy Approach for Authentic Influencer Discovery in SIoT14
A Novel Approach for Security Enhancement of Data Encryption Standard14
Support-Vector-Machine-based Adaptive Scheduling in Mode 4 Communication14
Deep Neural Artificial Intelligence for IoT Based Tele Health Data Analytics13
E-mail Spam Classification Using Grasshopper Optimization Algorithm and Neural Networks13
Interest Points Analysis for Internet Forum Based on Long-Short Windows Similarity13
An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures13
Graphical Transformation of OWL Ontologies to Event-B Formal Models13
Voice to Face Recognition Using Spectral ERB-DMLP Algorithms13
An Artificial Heart System for Testing and Evaluation of Cardiac Pacemakers13
Compact Bat Algorithm with Deep Learning Model for Biomedical EEG EyeState Classification13
Hybrid Deep Learning Enabled Air Pollution Monitoring in ITS Environment13
Multi-Attribute Selection Procedures Based on Regret and Rejoice for the Decision-Maker13
A Steganography Model Data Protection Method Based on Scrambling Encryption13
Data Wipe-Off Technique for Tracking Weak GPS Signals13
1.9155728816986