KSII Transactions on Internet and Information Systems

Papers
(The TQCC of KSII Transactions on Internet and Information Systems is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
A Video Cache Replacement Scheme based on Local Video Popularity and Video Size for MEC Servers32
A Model for Machine Fault Diagnosis based on Mutual Exclusion Theory and Out-of-Distribution Detection23
A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field22
ISFRNet: A Deep Three-stage Identity and Structure Feature Refinement Network for Facial Image Inpainting16
A data corruption detection scheme based on ciphertexts in cloud environment14
Scalable Big Data Pipeline for Video Stream Analytics Over Commodity Hardware14
An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing12
UML diagram-driven test scenarios generation based on the temporal graph grammar11
CutPaste-Based Anomaly Detection Model using Multi Scale Feature Extraction in Time Series Streaming Data11
User Bias Drift Social Recommendation Algorithm based on Metric Learning10
Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem10
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching10
Brand Fandom Dynamic Analysis Framework based on Customer Data in Online Communities8
Evaluating Relay Beamwidth for Enhanced Coverage and Data Rates in Buoy-Assisted Maritime Communications8
PATN: Polarized Attention based Transformer Network for Multi-focus image fusion8
A Study on the Protection of Biometric Information against Facial Recognition Technology8
Discovering Hidden Emotional Heterogeneity of Customers in Textual Reviews and its Influencing Factors7
A Comprehensive Approach for Tamil Handwritten Character Recognition with Feature Selection and Ensemble Learning7
Multipath Routing Protocol Based on Flooding Constraints and Composite Metrics7
Clustering-Based Federated Learning for Enhancing Data Privacy in Internet of Vehicles7
A Machine Learning Approach for Named Entity Recognition in Classical Arabic Natural Language Processing7
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data7
Identification of Demand Type Differences and Their Impact on Consumer Behavior: A Case Study Based on Smart Wearable Product Design7
A Novel Social Aware Reverse Relay Selection Scheme for Underlaying Multi-Hop D2D Communications6
Enhancing Similar Business Group Recommendation through Derivative Criteria and Web Crawling6
Complete State Critical Set Based SCLF Decoding Algorithm for Polar Codes5
Interface Design for E-Learning: Investigating Design Characteristics of Colour and Graphic Elements for Generation Z5
A Study on Finding Emergency Conditions for Automatic Authentication Applying Big Data Processing and AI Mechanism on Medical Information Platform4
Hot Topic Discovery across Social Networks Based on Improved LDA Model4
A new model and testing verification for evaluating the carbon efficiency of server4
Adaptive data hiding scheme based on magic matrix of flexible dimension4
Agricultural Irrigation Control using Sensor-enabled Architecture4
Data Framework Design of EDISON 2.0 Digital Platform for Convergence Research4
Design of A new Algorithm by Using Standard Deviation Techniques in Multi Edge Computing with IoT Application4
Research on UAV access deployment algorithm based on improved virtual force model4
Transfer Learning based Parameterized 3D Mesh Deformation with 2D Stylized Cartoon Character4
A Typo Correction System Using Artificial Neural Networks for a Text-based Ornamental Fish Search Engine4
Google Play Malware Detection based on Search Rank Fraud Approach4
Optimizations of Multi-hop Cooperative Molecular Communication in Cylindrical Anomalous-Diffusive Channel4
An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks4
The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic3
Meta Learning based Object Tracking Technology: A Survey3
Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server3
Using Fuzzy Neural Network to Assess Network Video Quality3
Parallel Dense Merging Network with Dilated Convolutions for Semantic Segmentation of Sports Movement Scene3
Region-edge continuous enhancement network for salient object detection3
Secure SLA Management Using Smart Contracts for SDN-Enabled WSN3
Intelligent LoRa-Based Positioning System3
DDCP: The Dynamic Differential Clustering Protocol Considering Mobile Sinks for WSNs3
Multi-modal Pedestrian Trajectory Prediction based on Pedestrian Intention for Intelligent Vehicle3
An Artificial Intelligence Approach for Word Semantic Similarity Measure of Hindi Language3
Multi-scale context fusion network for melanoma segmentation3
Open Source Tools for Digital Forensic Investigation: Capability, Reliability, Transparency and Legal Requirements3
Coordinated Direct and Relayed Transmission based on NOMA and Backscattering3
Visualization and Analysis for Mesh Surface Curvature Based on Interpolation3
KI-HABS: Key Information Guided Hierarchical Abstractive Summarization3
Research on Relay Selection Technology Based on Regular Hexagon Region Segmentation in C-V2X3
Development of Plantar Pressure Measurement System and Personal Classification Study based on Plantar Pressure Image3
Improved LDPC-like BPL Decoding Algorithm for Polar Code3
Trade-off between Resource Efficiency and Fast Protection for Shared Mesh Protection3
Cost-Efficient Framework for Mobile Video Streaming using Multi-Path TCP3
Using Syntax and Shallow Semantic Analysis for Vietnamese Question Generation3
Sustainable Smart City Building-energy Management Based on Reinforcement Learning and Sales of ESS Power3
Web-based University Classroom Attendance System Based on Deep Learning Face Recognition3
Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm3
802.11 practical improvements using low power technology2
A Differential Privacy Approach to Preserve GWAS Data Sharing based on A Game Theoretic Perspective2
An Effective WSSENet-Based Similarity Retrieval Method of Large Lung CT Image Databases2
Adaptive Multi-class Segmentation Model of Aggregate Image Based on Improved Sparrow Search Algorithm2
Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme2
Generalized Distributed Multiple Turbo Coded Cooperative Differential Spatial Modulation2
AI-Enabled Business Models and Innovations: A Systematic Literature Review2
Cyber threats: taxonomy, impact, policies, and way forward2
Multi-dimensional Analysis and Prediction Model for Tourist Satisfaction2
An Improved Algorithm for Accelerating Modular Exponentiation with Periodic Bit Pattern Exponents2
Active and Passive Beamforming for IRS-Aided Vehicle Communication2
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks2
Optimizing Beamforming for Improving Secrecy Performance in Systems Enabled by Multiple Flying RISs2
IIoTBC: A Lightweight Block Cipher for Industrial IoT Security2
Tri-training algorithm based on cross entropy and K-nearest neighbors for network intrusion detection2
Evaluation of Problems in Tourism Systems and Their Evolutionary Status Based on Self-Organization Theory2
Rationalization of Network Segregation for Continuity of Financial Services Following COVID-192
Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection2
Overview of Motion-to-Photon Latency Reduction for Mitigating VR Sickness2
Design and Empirical Study of an Online Education Platform Based on B2B2C, Focusing on the Perspective of Art Education2
Collaborative Inference for Deep Neural Networks in Edge Environments2
Ship Number Recognition Method Based on An improved CRNN Model2
A survey on cooperative fault-tolerant control for multiagent systems2
Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation2
GCATRL: Using deep reinforcement learning to optimize knowledge graph completion2
CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks2
An optimized deployment strategy of smart smoke sensors in a large space2
Robust Sentiment Classification of Metaverse Services Using a Pre-trained Language Model with Soft Voting2
Grant-Free Random Access in Multicell Massive MIMO Systems with Mixed-Type Devices: Backoff Mechanism Optimizations under Delay Constraints2
SDN-COR: An Efficient Network Coding Opportunistic Routing Method for Software-Defined Wireless Sensor Networks2
A Source Code Cross-site Scripting Vulnerability Detection Method2
Semi-supervised Software Defect Prediction Model Based on Tri-training2
Speed-up of the Matrix Computation on the Ridge Regression2
Classification of Breast Cancer Histopathological Images using Residual Learning-based CNN2
Feature Selection Using CS - BPSO for Depression Detection Based on Profile Information2
Block-based Self-organizing TDMA for Reliable VDES in SANETs2
Identity-Based Key Management Scheme for Smart Grid over Lattice2
Resource allocation algorithm for space-based LEO satellite network based on satellite association2
Super-Resolution Reconstruction of Humidity Fields based on Wasserstein Generative Adversarial Network with Gradient Penalty2
FD-StackGAN: Face De-occlusion Using Stacked Generative Adversarial Networks2
2D-MELPP: A two dimensional matrix exponential based extension of locality preserving projections for dimensional reduction2
Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security2
Steganography: A Flexible Embedded Randomization Technique2
An Efficient mmWave MIMO Transmission with Hybrid Precoding2
DQN Trading System with limited API calls for Stocks with Large Trading Volume Per Second: Design and Real Market Implementation1
CORRECT? CORECT!: Classification of ESG Ratings with Earnings Call Transcript1
Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model1
MalDC: Malicious Software Detection and Classification using Machine Learning1
Five Forces Model of Computational Power: A Comprehensive Measure Method1
An IoT based Green Home Architecture for Green Score Calculation towards Smart Sustainable Cities1
Digital Modulation Recognition Based on High-Order Cumulants and P-LSTM1
Adaptive low-resolution palmprint image recognition based on channel attention mechanism and modified deep residual network1
Improved Metal Object Detection Circuits for Wireless Charging System of Electric Vehicles1
RadioCycle: Deep Dual Learning based Radio Map Estimation1
Challenges in the Establishment of Cloud Enterprise Resource Planning Systems1
Optimizing Energy-Latency Tradeoff for Computation Offloading in SDIN-Enabled MEC-based IIoT1
Many-objective Evolutionary Algorithm with Knee point-based Reference Vector Adaptive Adjustment Strategy1
Traffic Engineering with Segment Routing under Uncertain Failures1
Self-Organization of Multi-UAVs for Improving QoE in Unequal User Distribution1
Determinants of Live Commerce Acceptance: Focusing on the Extended Technology Acceptance Model (TAM)1
DeepPTP: A Deep Pedestrian Trajectory Prediction Model for Traffic Intersection1
Scaling Up Face Masks Classification Using a Deep Neural Network and Classical Method Inspired Hybrid Technique1
Emotion-aware Task Scheduling for Au-tonomous Vehicles in Software-defined Edge Networks1
Research on detecting moving targets with an improved Kalman filter algorithm1
Knowledge Based Recommender System for Disease Diagnostic and Treatment Using Adaptive Fuzzy-Blocks1
Evolutionary Neural Network based on Quantum Elephant Herding Algorithm for Modulation Recognition in Impulse Noise1
A Dual-scale Network with Spatial-temporal Attention for 12-lead ECG Classification1
Knee-driven many-objective sine-cosine algorithm1
Improved marine predators algorithm for feature selection and SVM optimization1
Video Frame Denoising via CNN and GAN Methods1
Design of a MEMS sensor array for dam subsidence monitoring based on dual-sensor cooperative measurements1
Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things1
Hierarchical Classification of Animal Images Including Visually Similar Species: A Case Study on Parrot Images1
FCBAFL: An Energy-Conserving Federated Learning Approach in Industrial Internet of Things1
Impact of Moral Intensity on Moral Behavior in the context of Artificial Intelligence: The Mediating Role of Technology Moral Sense1
Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network1
A Case Study of Combining Two Cross-platform Development Frameworks for Storybook Mobile App1
Recovery of underwater images based on the attention mechanism and SOS mechanism1
Time-Matching Poisson Multi-Bernoulli Mixture Filter For Multi-Target Tracking In Sensor Scanning Mode1
Trajectory Distance Algorithm Based on Segment Transformation Distance1
Profane or Not: Improving Korean Profane Detection using Deep Learning1
FGW-FER: Lightweight Facial Expression Recognition with Attention1
APMDI-CF: An Effective and Efficient Recommendation Algorithm for Online Users1
Development and Validation of a Digital Literacy Scale in the Artificial Intelligence Era for College Students1
MRU-Net: A remote sensing image segmentation network for enhanced edge contour Detection1
Edge Computing Task Offloading of Internet of Vehicles Based on Improved MADDPG Algorithm1
UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments1
Energy Efficient Cluster Head Selection and Routing Algorithm using Hybrid Firefly Glow-Worm Swarm Optimization in WSN1
Generating Radiology Reports via Multi-feature Optimization Transformer1
Secure Beamforming Optimization in IRS-assisted CR-SWIPT MIMO System1
VR-based annotation assistance system for volumetric medical image segmentation1
Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting1
Study on Machine Learning Techniques for Malware Classification and Detection1
Demand Response Based Optimal Microgrid Scheduling Problem Using A Multi-swarm Sine Cosine Algorithm1
Optimal Power Allocation for NOMA-based Cellular Two-Way Relaying1
Multivariate Congestion Prediction using Stacked LSTM Autoencoder based Bidirectional LSTM Model1
Building Energy Time Series Data Mining for Behavior Analytics and Forecasting Energy consumption1
Machine learning-based nutrient classification recommendation algorithm and nutrient suitability assessment questionnaire1
Enhancing User Mobility in Indoor Visible Light Communication System Using Intelligent Surface1
Saliency-Assisted Collaborative Learning Network for Road Scene Semantic Segmentation1
Representative Batch Normalization for Scene Text Recognition1
A new framework for Person Re-identification: Integrated level feature pattern (ILEP)1
Safeguarding Privacy by utilizing SC-DℓDA Algorithm in Cloud-Enabled Multi Party Computation1
Emotion Recognition using Short-Term Multi-Physiological Signals1
Incremental Health Improvement through Advanced Response-Based Treatment Recommendation (HMIPRTR): Integrating LSTM, GRU, and BFO for Enhanced Patient Care1
Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network1
A Novel Collaborative Filtering Recommendation Method Based on Weight Determination1
Robust Generalized Labeled Multi-Bernoulli Filter and Smoother for Multiple Target Tracking using Variational Bayesian1
Reliable blockchain-based ring signature protocol for online financial transactions1
Design of Teaching Resource Recommendation Platform Based on Fuzzy Recommendation Algorithm in the Context of Education Informatization1
Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment1
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET1
Enhancing Transparency and Trust in Agrifood Supply Chains through Novel Blockchain-based Architecture1
A many-objective evolutionary algorithm based on integrated strategy for skin cancer detection1
Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles1
Affection-enhanced Personalized Question Recommendation in Online Learning1
Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing1
Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme1
SWITCH: SDN-WLAN Integrated Handover Scheme for QoS-Guaranteed Mobile Service1
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing1
Crowd Psychological and Emotional Computing Based on PSMU Algorithm1
Resilience against Adversarial Examples: Data-Augmentation Exploiting Generative Adversarial Networks1
Design of an Aquaculture Decision Support Model for Improving Profitability of Land-based Fish Farm Based on Statistical Data1
A Novel Algorithm of Joint Probability Data Association Based on Loss Function1
Machine Learning-Enhanced Survival Analysis: Identifying Significant Predictors of Mortality in Heart Failure1
A novel watermarking scheme for authenticating individual data integrity of WSNs1
The Critical Success Factors Influencing the Use of Mobile Learning and its Perceived Impacts in Students’ Education: A Systematic Literature Review1
DGA Domain Name Detection Model Based on Gated Convolution and LSTM1
Verification Control Algorithm of Data Integrity Verification in Remote Data sharing1
Public Sentiment Analysis and Topic Modeling Regarding COVID-19’s Three Waves of Total Lockdown: A Case Study on Movement Control Order in Malaysia1
Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment1
A New Distributed Log Anomaly Detection Method based on Message Middleware and ATT-GRU1
An Improved Coyote Optimization Algorithm-Based Clustering for Extending Network Lifetime in Wireless Sensor Networks1
Fast Channel Allocation for Ultra-dense D2D-enabled Cellular Network with Interference Constraint in Underlaying Mode1
Adaptive Success Rate-based Sensor Relocation for IoT Applications1
Utilizing Transformer Models To Detect Vietnamese Fake News on Social Media Platforms1
Research on The SWIPT System Throughput Based on Interference Signal Energy Collecting1
Enhanced Distance-based Weighted K-Nearest Neighbor Algorithm for Data Classification1
Scalable Blockchain Storage Model Based on DHT and IPFS1
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDS1
Multiple Node Flip Fast-SSC Decoding Algorithm for Polar Codes Based on Node Reliability1
A Novel Grasshopper Optimization-based Particle Swarm Algorithm for Effective Spectrum Sensing in Cognitive Radio Networks1
Advanced Information Data-interactive Learning System Effect for Creative Design Project1
The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve1
An Investigation into the Relationship between Metaverse Usage Patterns and Cultural Tastes: A Study of Avatar Formation among Generation Z1
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications1
Memory Propagation-based Target-aware Segmentation Tracker with Adaptive Mask-attention Decision Network1
Joint Optimization Algorithm Based on DCA for Three-tier Caching in Heterogeneous Cellular Networks1
Link Quality Enhancement with Beamforming Using Kalman-based Motion Tracking for Maritime Communication1
Face inpainting via Learnable Structure Knowledge of Fusion Network1
Dynamics-Based Location Prediction and Neural Network Fine-Tuning for Task Offloading in Vehicular Networks1
Advanced Energy Detector with Correlated Multiple Antennas1
Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network1
Priority of Challenges for Activation of MyData Business: K-MyData Case1
An indoor fusion positioning algorithm of Bluetooth and PDR based on particle filter with dynamic adjustment of weights calculation strategy1
Attention-based for Multiscale Fusion Underwater Image Enhancement1
Spatial Correlation-based Resource Sharing in Cognitive Radio SWIPT Networks1
CAB: Classifying Arrhythmias based on Imbalanced Sensor Data1
0.053830862045288