120(top 1%)
papers
1.1K(top 2%)
citations
16(top 2%)
h-index
29(top 2%)
g-index
176
all documents
1.4K
doc citations
416
citing journals

Top Articles

#TitleJournalYearCitations
1Airtime Fairness for IEEE 802.11 Multirate NetworksIEEE Transactions on Mobile Computing200890
2Comprehensive, integrated, and phased whole-genome analysis of the primary ENCODE cell line K562Genome Research201978
3Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural NetworksApplied Sciences (Switzerland)201965
4Household Appliance Classification Using Lower Odd-Numbered Harmonics and the Bagging Decision TreeIEEE Access202059
5Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP MethodSensors202259
6Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor NodesIEEE Transactions on Information Forensics and Security201653
7Toward Load Identification Based on the Hilbert Transform and Sequence to Sequence Long Short-Term MemoryIEEE Transactions on Smart Grid202149
8Haplotype-resolved and integrated genome analysis of the cancer cell line HepG2Nucleic Acids Research201945
9Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge ComputingSensors202044
10Non-Intrusive Load Monitoring Based on Novel Transient Signal in Household Appliances with Low Sampling RateEnergies201842
11Software-Defined Network-Based Vehicular Networks: A Position Paper on Their Modeling and ImplementationSensors201928
12Multi-precision Squaring for Public-Key Cryptography on Embedded MicroprocessorsLecture Notes in Computer Science201327
13A Partition-Based LEACH Algorithm for Wireless Sensor Networks200926
14High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGASensors202121
15Applying Recurrent Neural Network to Intrusion Detection with Hessian Free OptimizationLecture Notes in Computer Science201619
16Medical Specialty Recommendations by an Artificial Intelligence Chatbot on a Smartphone: Development and DeploymentJournal of Medical Internet Research202119
17Real-Time and Robust Hydraulic System Fault Detection via Edge ComputingApplied Sciences (Switzerland)202018
18Mobile Sensor Relocation to Prolong the Lifetime of Wireless Sensor NetworksIEEE Vehicular Technology Conference200817
19Improved Computation of Square Roots in Specific Finite FieldsIEEE Transactions on Computers200917
20Predicting aptamer sequences that interact with target proteins using an aptamer-protein interaction classifier and a Monte Carlo tree search approachPLoS ONE202117
21CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability DetectionIEEE Access202217
22Attention-Based Distributed Deep Learning Model for Air Quality ForecastingSustainability202217
23An Effective Classification for DoS Attacks in Wireless Sensor Networks201816
24PrOS: Light-Weight Privatized Se cure OSes in ARM TrustZoneIEEE Transactions on Mobile Computing202016
25Applying Movement Constraints to BLE RSSI-Based Indoor Positioning for Extracting Valid Semantic TrajectoriesSensors202016
26Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor NodesLecture Notes in Computer Science201315
27Cell Planning for Indoor Object Tracking Based on RFID200914
28CNN-Peaks: ChIP-Seq peak detection pipeline using convolutional neural networks that imitate human visual inspectionScientific Reports202014
29A Bit collision detection based Query Tree protocol for anti-collision in RFID system201013
30Design and Implementation of Real-Time Vehicular Camera for Driver Assistance and Traffic Congestion EstimationSensors201512
31Design and implementation of practical asset tracking system in container terminalsInternational Journal of Precision Engineering and Manufacturing201211
32Parallel Implementations of SIMON and SPECK201611
33Background Load Denoising across Complex Load Based on Generative Adversarial Network to Enhance Load IdentificationSensors202011
34The Impacts of Visual Effects on User Perception With a Virtual Human in Augmented Reality Conflict SituationsIEEE Access202111
35Unsupervised multi-stage attack detection framework without details on single-stage attacksFuture Generation Computer Systems201910
36Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular NetworksSensors20179
37Authentication of differential gene expression in oral squamous cell carcinoma using machine learning applicationsBMC Oral Health20219
38Practical Particulate Matter Sensing and Accurate Calibration System Using Low-Cost Commercial SensorsSensors20219
39Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR ProcessorsLecture Notes in Computer Science20159
40RFID reader and tag multi-hop communication for port logistics20098
41Distributed Bottleneck Node Detection in Wireless Sensor Network20108
42Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack20178
43DISPAQ: Distributed Profitable-Area Query from Big Taxi Trip DataSensors20178
44A oneM2M-Based Query Engine for Internet of Things (IoT) Data StreamsSensors20188
45Sensor-Based Extraction Approaches of In-Vehicle Information for Driver Behavior AnalysisSensors20208
46MusQ: A Multi-Store Query System for IoT Data Using a Datalog-Like LanguageIEEE Access20208
47Compact Implementations of LEA Block Cipher for Low-End MicroprocessorsLecture Notes in Computer Science20168
48A DNA sequence alignment algorithm using quality information and a fuzzy inference methodProgress in Natural Science: Materials International20087
49A Reputation Management Scheme Improving the Trustworthiness of P2P Networks20087
50A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future ChallengesJournal of Computer Science and Technology20167