KSII Transactions on Internet and Information Systems

Papers
(The TQCC of KSII Transactions on Internet and Information Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
A Video Cache Replacement Scheme based on Local Video Popularity and Video Size for MEC Servers33
A Model for Machine Fault Diagnosis based on Mutual Exclusion Theory and Out-of-Distribution Detection25
A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field24
ISFRNet: A Deep Three-stage Identity and Structure Feature Refinement Network for Facial Image Inpainting20
An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing14
A data corruption detection scheme based on ciphertexts in cloud environment14
CutPaste-Based Anomaly Detection Model using Multi Scale Feature Extraction in Time Series Streaming Data13
User Bias Drift Social Recommendation Algorithm based on Metric Learning12
Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem12
A Study on the Protection of Biometric Information against Facial Recognition Technology11
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching11
Brand Fandom Dynamic Analysis Framework based on Customer Data in Online Communities9
Evaluating Relay Beamwidth for Enhanced Coverage and Data Rates in Buoy-Assisted Maritime Communications8
PATN: Polarized Attention based Transformer Network for Multi-focus image fusion8
Clustering-Based Federated Learning for Enhancing Data Privacy in Internet of Vehicles7
A Comprehensive Approach for Tamil Handwritten Character Recognition with Feature Selection and Ensemble Learning7
Multipath Routing Protocol Based on Flooding Constraints and Composite Metrics7
Identification of Demand Type Differences and Their Impact on Consumer Behavior: A Case Study Based on Smart Wearable Product Design7
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data7
Discovering Hidden Emotional Heterogeneity of Customers in Textual Reviews and its Influencing Factors6
Enhancing Similar Business Group Recommendation through Derivative Criteria and Web Crawling5
Complete State Critical Set Based SCLF Decoding Algorithm for Polar Codes5
Scalable Big Data Pipeline for Video Stream Analytics Over Commodity Hardware5
A Novel Social Aware Reverse Relay Selection Scheme for Underlaying Multi-Hop D2D Communications5
A Machine Learning Approach for Named Entity Recognition in Classical Arabic Natural Language Processing5
Data Framework Design of EDISON 2.0 Digital Platform for Convergence Research4
A Study on Finding Emergency Conditions for Automatic Authentication Applying Big Data Processing and AI Mechanism on Medical Information Platform4
Transfer Learning based Parameterized 3D Mesh Deformation with 2D Stylized Cartoon Character4
A new model and testing verification for evaluating the carbon efficiency of server4
Hot Topic Discovery across Social Networks Based on Improved LDA Model4
Interface Design for E-Learning: Investigating Design Characteristics of Colour and Graphic Elements for Generation Z4
TL-PBFT: An Improved PBFT Consensus Algorithm Based on Tree-layered Communication Structure4
Design of A new Algorithm by Using Standard Deviation Techniques in Multi Edge Computing with IoT Application4
Optimizations of Multi-hop Cooperative Molecular Communication in Cylindrical Anomalous-Diffusive Channel4
Immersive Virtual Learning for Technical Skills Training: A Comprehensive Structured Review4
A Typo Correction System Using Artificial Neural Networks for a Text-based Ornamental Fish Search Engine4
Google Play Malware Detection based on Search Rank Fraud Approach4
Adaptive data hiding scheme based on magic matrix of flexible dimension4
DDCP: The Dynamic Differential Clustering Protocol Considering Mobile Sinks for WSNs3
Multi-modal Pedestrian Trajectory Prediction based on Pedestrian Intention for Intelligent Vehicle3
Multiclass Skin Lesion Classification Using a Hybrid Symmetry-Aware and Soft Attention (HSASA) Model3
Cost-Efficient Framework for Mobile Video Streaming using Multi-Path TCP3
Using Fuzzy Neural Network to Assess Network Video Quality3
Multi-scale context fusion network for melanoma segmentation3
Lightweight Target Detection for Computationally Resource-Constrained and Low-cost UAV Platforms Using Dual-Weights Attention Technology3
GCATRL: Using deep reinforcement learning to optimize knowledge graph completion3
KI-HABS: Key Information Guided Hierarchical Abstractive Summarization3
Research on Relay Selection Technology Based on Regular Hexagon Region Segmentation in C-V2X3
Sustainable Smart City Building-energy Management Based on Reinforcement Learning and Sales of ESS Power3
Improved LDPC-like BPL Decoding Algorithm for Polar Code3
Open Source Tools for Digital Forensic Investigation: Capability, Reliability, Transparency and Legal Requirements3
Coordinated Direct and Relayed Transmission based on NOMA and Backscattering3
Agricultural Irrigation Control using Sensor-enabled Architecture3
Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm3
Research on UAV access deployment algorithm based on improved virtual force model3
Region-edge continuous enhancement network for salient object detection3
Visualization and Analysis for Mesh Surface Curvature Based on Interpolation3
The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic3
Development of Plantar Pressure Measurement System and Personal Classification Study based on Plantar Pressure Image3
Meta Learning based Object Tracking Technology: A Survey3
Using Syntax and Shallow Semantic Analysis for Vietnamese Question Generation3
Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server3
Parallel Dense Merging Network with Dilated Convolutions for Semantic Segmentation of Sports Movement Scene3
Point Cloud Semantic Segmentation Based on Geometric Feature Fusion3
An Improved Algorithm for Accelerating Modular Exponentiation with Periodic Bit Pattern Exponents3
Secure SLA Management Using Smart Contracts for SDN-Enabled WSN3
Intelligent LoRa-Based Positioning System3
Evaluation of Problems in Tourism Systems and Their Evolutionary Status Based on Self-Organization Theory2
Feature Selection Using CS - BPSO for Depression Detection Based on Profile Information2
Cyber threats: taxonomy, impact, policies, and way forward2
Design and Empirical Study of an Online Education Platform Based on B2B2C, Focusing on the Perspective of Art Education2
Ship Number Recognition Method Based on An improved CRNN Model2
Tri-training algorithm based on cross entropy and K-nearest neighbors for network intrusion detection2
2D-MELPP: A two dimensional matrix exponential based extension of locality preserving projections for dimensional reduction2
Semi-supervised Software Defect Prediction Model Based on Tri-training2
Spatial Correlation-based Resource Sharing in Cognitive Radio SWIPT Networks2
Active and Passive Beamforming for IRS-Aided Vehicle Communication2
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET2
Block-based Self-organizing TDMA for Reliable VDES in SANETs2
Robust Sentiment Classification of Metaverse Services Using a Pre-trained Language Model with Soft Voting2
Super-Resolution Reconstruction of Humidity Fields based on Wasserstein Generative Adversarial Network with Gradient Penalty2
IIoTBC: A Lightweight Block Cipher for Industrial IoT Security2
Speed-up of the Matrix Computation on the Ridge Regression2
Generalized Distributed Multiple Turbo Coded Cooperative Differential Spatial Modulation2
Identity-Based Key Management Scheme for Smart Grid over Lattice2
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks2
Optimized Deep Transfer Learning For Knee Osteoarthritis Classification Using X-Ray Images2
Resilience against Adversarial Examples: Data-Augmentation Exploiting Generative Adversarial Networks2
An optimized deployment strategy of smart smoke sensors in a large space2
802.11 practical improvements using low power technology2
Web-based University Classroom Attendance System Based on Deep Learning Face Recognition2
Resource allocation algorithm for space-based LEO satellite network based on satellite association2
Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing2
AI-Enabled Business Models and Innovations: A Systematic Literature Review2
Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security2
Multi-dimensional Analysis and Prediction Model for Tourist Satisfaction2
A Differential Privacy Approach to Preserve GWAS Data Sharing based on A Game Theoretic Perspective2
Collaborative Inference for Deep Neural Networks in Edge Environments2
Steganography: A Flexible Embedded Randomization Technique2
A Source Code Cross-site Scripting Vulnerability Detection Method2
Classification of Breast Cancer Histopathological Images using Residual Learning-based CNN2
An Efficient mmWave MIMO Transmission with Hybrid Precoding2
Adaptive Multi-class Segmentation Model of Aggregate Image Based on Improved Sparrow Search Algorithm2
Grant-Free Random Access in Multicell Massive MIMO Systems with Mixed-Type Devices: Backoff Mechanism Optimizations under Delay Constraints2
An Effective WSSENet-Based Similarity Retrieval Method of Large Lung CT Image Databases2
CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks2
Rationalization of Network Segregation for Continuity of Financial Services Following COVID-192
Research on Secure Sharing of AI-Generated Content Based on Multidimensional Virtual Permutation2
APMDI-CF: An Effective and Efficient Recommendation Algorithm for Online Users2
SDN-COR: An Efficient Network Coding Opportunistic Routing Method for Software-Defined Wireless Sensor Networks2
Advanced Energy Detector with Correlated Multiple Antennas2
A survey on cooperative fault-tolerant control for multiagent systems2
Optimizing Beamforming for Improving Secrecy Performance in Systems Enabled by Multiple Flying RISs2
Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation2
Recovery of underwater images based on the attention mechanism and SOS mechanism2
Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection2
Survey on Deep Learning-based Speech Technologies in Voice Chatbot Systems2
Machine learning-based nutrient classification recommendation algorithm and nutrient suitability assessment questionnaire1
A Comprehensive Study on Key Components of Grayscale-based Deepfake Detection1
Generating Radiology Reports via Multi-feature Optimization Transformer1
Enhancing User Mobility in Indoor Visible Light Communication System Using Intelligent Surface1
Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network1
Inhalation Configuration Detection for COVID-19 Patient Secluded Observing using Wearable IoTs Platform1
Video Frame Denoising via CNN and GAN Methods1
An Improved Coyote Optimization Algorithm-Based Clustering for Extending Network Lifetime in Wireless Sensor Networks1
Development and Validation of a Digital Literacy Scale in the Artificial Intelligence Era for College Students1
Verification Control Algorithm of Data Integrity Verification in Remote Data sharing1
A New Distributed Log Anomaly Detection Method based on Message Middleware and ATT-GRU1
Improved Metal Object Detection Circuits for Wireless Charging System of Electric Vehicles1
A hybrid model of regional path loss of wireless signals through the wall1
A many-objective evolutionary algorithm based on integrated strategy for skin cancer detection1
Research on detecting moving targets with an improved Kalman filter algorithm1
Knee-driven many-objective sine-cosine algorithm1
Priority of Challenges for Activation of MyData Business: K-MyData Case1
Hierarchical Classification of Animal Images Including Visually Similar Species: A Case Study on Parrot Images1
Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network1
UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments1
Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment1
Multivariate Congestion Prediction using Stacked LSTM Autoencoder based Bidirectional LSTM Model1
A Novel Grasshopper Optimization-based Particle Swarm Algorithm for Effective Spectrum Sensing in Cognitive Radio Networks1
Affection-enhanced Personalized Question Recommendation in Online Learning1
The Critical Success Factors Influencing the Use of Mobile Learning and its Perceived Impacts in Students’ Education: A Systematic Literature Review1
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications1
CORRECT? CORECT!: Classification of ESG Ratings with Earnings Call Transcript1
Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment1
Design of a MEMS sensor array for dam subsidence monitoring based on dual-sensor cooperative measurements1
Design of an Aquaculture Decision Support Model for Improving Profitability of Land-based Fish Farm Based on Statistical Data1
The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve1
A Dual-scale Network with Spatial-temporal Attention for 12-lead ECG Classification1
Hybrid Group Management MAC Protocol for Smart Grid Communication Topology and Big Data Processing1
DQN Trading System with limited API calls for Stocks with Large Trading Volume Per Second: Design and Real Market Implementation1
Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits1
VR-based annotation assistance system for volumetric medical image segmentation1
Five Forces Model of Computational Power: A Comprehensive Measure Method1
Design of Teaching Resource Recommendation Platform Based on Fuzzy Recommendation Algorithm in the Context of Education Informatization1
Scaling Up Face Masks Classification Using a Deep Neural Network and Classical Method Inspired Hybrid Technique1
A hidden anti-jamming method based on deep reinforcement learning1
Edge Computing Task Offloading of Internet of Vehicles Based on Improved MADDPG Algorithm1
TripleOptim: A Comprehensive Optimization Framework for GPTQ Quantization Inference on Heterogeneous Platforms1
Robust Generalized Labeled Multi-Bernoulli Filter and Smoother for Multiple Target Tracking using Variational Bayesian1
Self-Organization of Multi-UAVs for Improving QoE in Unequal User Distribution1
Effectiveness of Fuzzy Graph Based Document Model1
Digital Modulation Recognition Based on High-Order Cumulants and P-LSTM1
Incremental Health Improvement through Advanced Response-Based Treatment Recommendation (HMIPRTR): Integrating LSTM, GRU, and BFO for Enhanced Patient Care1
Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network1
Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications1
DGA Domain Name Detection Model Based on Gated Convolution and LSTM1
Demand Response Based Optimal Microgrid Scheduling Problem Using A Multi-swarm Sine Cosine Algorithm1
Scalable Blockchain Storage Model Based on DHT and IPFS1
Frequency domain oversampled OFDM with Index modulation for SFBC-based MIMO system in high-speed wireless communications1
Fault-Resilient Hopping-Capable Cluster Header Management of Mobile IoT Networks1
Utilizing Transformer Models To Detect Vietnamese Fake News on Social Media Platforms1
Emotion-aware Task Scheduling for Au-tonomous Vehicles in Software-defined Edge Networks1
Profane or Not: Improving Korean Profane Detection using Deep Learning1
Challenges in the Establishment of Cloud Enterprise Resource Planning Systems1
A new framework for Person Re-identification: Integrated level feature pattern (ILEP)1
SWITCH: SDN-WLAN Integrated Handover Scheme for QoS-Guaranteed Mobile Service1
Memory Propagation-based Target-aware Segmentation Tracker with Adaptive Mask-attention Decision Network1
Secure Beamforming Optimization in IRS-assisted CR-SWIPT MIMO System1
A novel watermarking scheme for authenticating individual data integrity of WSNs1
Dynamics-Based Location Prediction and Neural Network Fine-Tuning for Task Offloading in Vehicular Networks1
Energy Efficient Cluster Head Selection and Routing Algorithm using Hybrid Firefly Glow-Worm Swarm Optimization in WSN1
FCBAFL: An Energy-Conserving Federated Learning Approach in Industrial Internet of Things1
Face inpainting via Learnable Structure Knowledge of Fusion Network1
Attention-based for Multiscale Fusion Underwater Image Enhancement1
Advanced Information Data-interactive Learning System Effect for Creative Design Project1
Enhancing Transparency and Trust in Agrifood Supply Chains through Novel Blockchain-based Architecture1
MIMO-aided Efficient Communication Resource Scheduling Scheme in VDES1
Many-objective Evolutionary Algorithm with Knee point-based Reference Vector Adaptive Adjustment Strategy1
Knowledge Based Recommender System for Disease Diagnostic and Treatment Using Adaptive Fuzzy-Blocks1
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing1
Resource Allocation and Offloading Decisions of D2D Collaborative UAV-assisted MEC Systems1
An indoor fusion positioning algorithm of Bluetooth and PDR based on particle filter with dynamic adjustment of weights calculation strategy1
Intelligent Optimization and Deep Learning Approaches to Pomegranate Disease Detection1
Traditional Chinese medicine constitution intelligent identification system based on graph search mode and deep learning algorithm1
Optimizing Energy-Latency Tradeoff for Computation Offloading in SDIN-Enabled MEC-based IIoT1
A Real Time Traffic Flow Model Based on Deep Learning1
Determinants of Live Commerce Acceptance: Focusing on the Extended Technology Acceptance Model (TAM)1
Leveraging Planar Prior Knowledge for Regularization in 3D Gaussian Splatting Optimization1
Emotion Recognition using Short-Term Multi-Physiological Signals1
Research on The SWIPT System Throughput Based on Interference Signal Energy Collecting1
A Study on Personal Information Protection amid the COVID-19 Pandemic1
Machine Learning-Enhanced Survival Analysis: Identifying Significant Predictors of Mortality in Heart Failure1
Enhanced Distance-based Weighted K-Nearest Neighbor Algorithm for Data Classification1
Public Sentiment Analysis and Topic Modeling Regarding COVID-19’s Three Waves of Total Lockdown: A Case Study on Movement Control Order in Malaysia1
A Study on The Conversion Factor between Heterogeneous DBMS for Cloud Migration1
Study on Machine Learning Techniques for Malware Classification and Detection1
Corrosion damage segmentation network based on multi-scale feature mapping fusion1
Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles1
Energy Forecasting Information System of Optimal Electricity Generation using Fuzzy-based RERNN with GPC1
RadioCycle: Deep Dual Learning based Radio Map Estimation1
MRU-Net: A remote sensing image segmentation network for enhanced edge contour Detection1
Multiple Node Flip Fast-SSC Decoding Algorithm for Polar Codes Based on Node Reliability1
Impact of Moral Intensity on Moral Behavior in the context of Artificial Intelligence: The Mediating Role of Technology Moral Sense1
Optimal Power Allocation for NOMA-based Cellular Two-Way Relaying1
A Novel Collaborative Filtering Recommendation Method Based on Weight Determination1
AI-Driven Cryptographic Framework for Secure Wireless Communication: A Self-Evolving Approach Against Adversarial Threats1
Safeguarding Privacy by utilizing SC-DℓDA Algorithm in Cloud-Enabled Multi Party Computation1
Time-Matching Poisson Multi-Bernoulli Mixture Filter For Multi-Target Tracking In Sensor Scanning Mode1
MalDC: Malicious Software Detection and Classification using Machine Learning1
Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things1
Crowd Psychological and Emotional Computing Based on PSMU Algorithm1
An Investigation into the Relationship between Metaverse Usage Patterns and Cultural Tastes: A Study of Avatar Formation among Generation Z1
A Case Study of Combining Two Cross-platform Development Frameworks for Storybook Mobile App1
Adaptive Success Rate-based Sensor Relocation for IoT Applications1
Link Quality Enhancement with Beamforming Using Kalman-based Motion Tracking for Maritime Communication1
Adaptive low-resolution palmprint image recognition based on channel attention mechanism and modified deep residual network1
FGW-FER: Lightweight Facial Expression Recognition with Attention1
Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting1
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDS1
DABC: A dynamic ARX-based lightweight block cipher with high diffusion1
Reducing In-swarm Verification Cost: A Dynamic Mutual Authentication Scheme for UAV Swarms1
Adaptive Optimization and Performance Analysis of Resource Reservation in C-V2X1
Reliable blockchain-based ring signature protocol for online financial transactions1
CenterNet Based on Diagonal Half-length and Center Angle Regression for Object Detection1
Trajectory Distance Algorithm Based on Segment Transformation Distance1
Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme1
Representative Batch Normalization for Scene Text Recognition1
Saliency-Assisted Collaborative Learning Network for Road Scene Semantic Segmentation1
Android Botnet Detection Using Hybrid Analysis1
Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model1
Fine-Grained Real-Time Flow Scheduling in Wireless TSCH Networks1
Improved marine predators algorithm for feature selection and SVM optimization1
0.56967878341675