About
Technology
Issues
FAQ
Search
Profile
Top Authors
Prolific Authors
Top Journals
Main Disciplines
Main Topics
Most Cited Articles
Scientometrics
Avg Impact Factor
★★
Articles
★★★
Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Schools
›
School of Computer Science and Software Engineer
›
Most Cited Articles
School of Computer Science and Software Engineering
320
(top 1%)
papers
7.6K
(top 1%)
citations
48
(top 1%)
h
-index
74
(top 1%)
g
-index
444
all documents
8.8K
doc citations
1.1K
citing journals
314
times ranked
Top Articles
#
Title
Journal
Year
Citations
1
Public Key Encryption with Keyword Search Revisited
Lecture Notes in Computer Science
2008
268
2
On Similarity Preserving Feature Selection
IEEE Transactions on Knowledge and Data Engineering
2013
249
3
Trapdoor security in a searchable public-key encryption scheme with a designated tester
Journal of Systems and Software
2010
235
4
Human detection from images and videos: A survey
Pattern Recognition
2016
208
5
Certificateless Signature Revisited
Pattern Recognition
2007
169
6
Multiple kernel extreme learning machine
Neurocomputing
2015
157
7
Auditing Business Process Compliance
Lecture Notes in Computer Science
2007
151
8
CP-ABE With Constant-Size Keys for Lightweight Devices
IEEE Transactions on Information Forensics and Security
2014
133
9
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation
IEEE Transactions on Information Forensics and Security
2017
131
10
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
IEEE Transactions on Parallel and Distributed Systems
2012
126
11
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
IEEE Transactions on Information Forensics and Security
2015
117
12
Efficient Fair Conditional Payments for Outsourcing Computations
IEEE Transactions on Information Forensics and Security
2012
112
13
A Survey of Self-Organization Mechanisms in Multiagent Systems
IEEE Transactions on Systems, Man, and Cybernetics: Systems
2017
110
14
Threshold Anonymous Announcement in VANETs
IEEE Journal on Selected Areas in Communications
2011
108
15
Improvements on an authentication scheme for vehicular sensor networks
Expert Systems With Applications
2014
106
16
Asymmetric Group Key Agreement
Lecture Notes in Computer Science
2009
106
17
From Regional to Global Brain: A Novel Hierarchical Spatial-Temporal Neural Network Model for EEG Emotion Recognition
IEEE Transactions on Affective Computing
2022
100
18
A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Wireless Sensor Networks
IEEE Transactions on Cybernetics
2018
97
19
Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding
Journal of Lightwave Technology
2013
88
20
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security
Journal of Lightwave Technology
2013
85
21
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
IEEE Transactions on Information Forensics and Security
2014
85
22
Conceptual Design of A Multi-Agent System for Interconnected Power Systems Restoration
IEEE Transactions on Power Systems
2012
84
23
Identity-based data storage in cloud computing
Future Generation Computer Systems
2013
83
24
Simultaneous nitrification/denitrification and trace organic contaminant (TrOC) removal by an anoxic–aerobic membrane bioreactor (MBR)
Bioresource Technology
2014
82
25
Certificateless Signatures: New Schemes and Security Models
Computer Journal
2012
72
26
A Hybrid Multiagent Framework With Q-Learning for Power Grid Systems Restoration
IEEE Transactions on Power Systems
2011
70
27
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks
Wireless Personal Communications
2013
70
28
A New Payment System for Enhancing Location Privacy of Electric Vehicles
IEEE Transactions on Vehicular Technology
2014
70
29
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation
IEEE Transactions on Information Forensics and Security
2014
70
30
Automated functional testing of online search services
Software Testing Verification and Reliability
2012
69
31
Linkable Ring Signature with Unconditional Anonymity
IEEE Transactions on Knowledge and Data Engineering
2014
68
32
Semi-Proving: An Integrated Method for Program Proving, Testing, and Debugging
IEEE Transactions on Software Engineering
2011
64
33
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
International Journal of Information Security
2015
64
34
Efficient algorithms for secure outsourcing of bilinear pairings
Theoretical Computer Science
2015
64
35
The Theory of Quaternion Orthogonal Designs
IEEE Transactions on Signal Processing
2008
63
36
Strongly secure certificateless short signatures
Journal of Systems and Software
2012
62
37
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
Lecture Notes in Computer Science
2009
61
38
An Empirical Study of Model-Agnostic Techniques for Defect Prediction Models
IEEE Transactions on Software Engineering
2022
60
39
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage
IEEE Transactions on Parallel and Distributed Systems
2014
59
40
A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion
IEEE Transactions on Information Forensics and Security
2015
59
41
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
Lecture Notes in Computer Science
2007
59
42
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
2013
57
43
Self-Adaptation-Based Dynamic Coalition Formation in a Distributed Agent Network: A Mechanism and a Brief Survey
IEEE Transactions on Parallel and Distributed Systems
2013
56
44
A revisit of three studies related to random testing
Science China Information Sciences
2015
56
45
Certificate-Based Signature: Security Model and Efficient Construction
Lecture Notes in Computer Science
2007
54
46
Process SEER: A Tool for Semantic Effect Annotation of Business Process Models
Lecture Notes in Computer Science
2009
54
47
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
IEEE Transactions on Information Forensics and Security
2015
54
48
Process Discovery from Model and Text Artefacts
IEEE Transactions on Information Forensics and Security
2007
52
49
A novel shape-based non-redundant local binary pattern descriptor for object detection
Pattern Recognition
2013
52
50
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System
IEEE Access
2019
52
site/software ©
exaly
; All materials licenced under
CC by-SA
.