# | Title | Journal | Year | Citations |
---|
1 | Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications | IEEE Communications Surveys and Tutorials | 2015 | 5,614 |
2 | Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges | IEEE Access | 2019 | 1,221 |
3 | Deep Learning for IoT Big Data and Streaming Analytics: A Survey | IEEE Communications Surveys and Tutorials | 2018 | 905 |
4 | An effective key management scheme for heterogeneous sensor networks | Ad Hoc Networks | 2007 | 427 |
5 | Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks | IEEE Transactions on Wireless Communications | 2009 | 321 |
6 | Semisupervised Deep Reinforcement Learning in Support of IoT and Smart City Services | IEEE Internet of Things Journal | 2018 | 293 |
7 | Call Admission Control Optimization in WiMAX Networks | IEEE Transactions on Vehicular Technology | 2008 | 216 |
8 | Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges | IEEE Access | 2019 | 206 |
9 | ASD-DiagNet: A Hybrid Learning Approach for Detection of Autism Spectrum Disorder Using fMRI Data | Frontiers in Neuroinformatics | 2019 | 188 |
10 | Software-Defined Networking for RSU Clouds in Support of the Internet of Vehicles | IEEE Internet of Things Journal | 2015 | 184 |
11 | Twitter sentiment analysis with a deep neural network: An enhanced approach using user behavioral information | Cognitive Systems Research | 2019 | 140 |
12 | A Cooperation Strategy Based on Nash Bargaining Solution in Cooperative Relay Networks | IEEE Transactions on Vehicular Technology | 2008 | 137 |
13 | Leveraging Machine Learning and Big Data for Smart Buildings: A Comprehensive Survey | IEEE Access | 2019 | 125 |
14 | Software defect prediction based on kernel PCA and weighted extreme learning machine | Information and Software Technology | 2019 | 119 |
15 | A survey on particle swarm optimization with emphasis on engineering and network applications | Evolutionary Intelligence | 2019 | 107 |
16 | Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks | IEEE Transactions on Wireless Communications | 2007 | 81 |
17 | A framework for a distributed key management scheme in heterogeneous wireless sensor networks | IEEE Transactions on Wireless Communications | 2008 | 78 |
18 | Double proportional fair user pairing algorithm for uplink virtual MIMO systems | IEEE Transactions on Wireless Communications | 2008 | 76 |
19 | The Impact of Feature Selection on Defect Prediction Performance: An Empirical Comparison | IEEE Transactions on Wireless Communications | 2016 | 75 |
20 | Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks | IEEE Transactions on Vehicular Technology | 2008 | 74 |
21 | An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing | IEEE Transactions on Vehicular Technology | 2010 | 72 |
22 | On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization | IEEE Transactions on Vehicular Technology | 2014 | 72 |
23 | Stream-based cipher feedback mode in wireless error channel | IEEE Transactions on Wireless Communications | 2009 | 64 |
24 | Integration of GRACE (Gravity Recovery and Climate Experiment) data with traditional data sets for a better understanding of the time-dependent water partitioning in African watersheds | Geology | 2011 | 63 |
25 | Protection of Identity Information in Cloud Computing without Trusted Third Party | Geology | 2010 | 62 |
26 | Building k edge-disjoint spanning trees of minimum total length for isometric data embedding | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2005 | 55 |
27 | Opportunistic Bandwidth Sharing Through Reinforcement Learning | IEEE Transactions on Vehicular Technology | 2010 | 52 |
28 | An Automatic Testing Approach for Compiler Based on Metamorphic Testing Technique | IEEE Transactions on Vehicular Technology | 2010 | 52 |
29 | Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework | IEEE Transactions on Vehicular Technology | 2007 | 51 |
30 | Tourism Mobile App With Aspect-Based Sentiment Classification Framework for Tourist Reviews | IEEE Transactions on Consumer Electronics | 2019 | 49 |
31 | Pruning and visualizing generalized association rules in parallel coordinates | IEEE Transactions on Knowledge and Data Engineering | 2005 | 48 |
32 | A scheme for privacy-preserving data dissemination | IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans | 2006 | 46 |
33 | Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks | IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans | 2008 | 45 |
34 | Alignment of Overlapping Locally Scaled Patches for Multidimensional Scaling and Dimensionality Reduction | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2008 | 44 |
35 | On Next Generation CDMA Technologies: The REAL Approach for Perfect Orthogonal Code Generation | IEEE Transactions on Vehicular Technology | 2008 | 43 |
36 | Computation of loop integrals using extrapolation | Computer Physics Communications | 2004 | 40 |
37 | Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences | IEEE Transactions on Software Engineering | 2015 | 40 |
38 | Machine Learning Methods for Diagnosing Autism Spectrum Disorder and Attention- Deficit/Hyperactivity Disorder Using Functional and Structural MRI: A Survey | Frontiers in Neuroinformatics | 2020 | 39 |
39 | ElementRank: Ranking Java Software Classes and Packages using a Multilayer Complex Network-Based Approach | IEEE Transactions on Software Engineering | 2021 | 38 |
40 | sCompile: Critical Path Identification and Analysis for Smart Contracts | Lecture Notes in Computer Science | 2019 | 38 |
41 | Scalable tag recommendation for software information sites | Lecture Notes in Computer Science | 2017 | 36 |
42 | Incomplete hypercubes: Algorithms and embeddings | Journal of Supercomputing | 1994 | 35 |
43 | Evaluating pattern conformance of UML models: a divide-and-conquer approach and case studies | Software Quality Journal | 2008 | 35 |
44 | A provably good multilayer topological planar routing algorithm in IC layout designs | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 1993 | 33 |
45 | Model checking C programs using F-Soft | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 0 | 33 |
46 | A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks | Journal of Network and Computer Applications | 2014 | 33 |
47 | Student's perspective on distance learning during COVID-19 pandemic: A case study of Western Michigan University, United States | International Journal of Educational Research Open | 2021 | 33 |
48 | Building k-connected neighborhood graphs for isometric data embedding | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2006 | 32 |
49 | Symbolic Analysis of Concurrency Errors in OpenMP Programs | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2013 | 32 |
50 | Qn: Quality and Quantity Based Unified Approach for Secure and Trustworthy Mobile Crowdsensing | IEEE Transactions on Mobile Computing | 2020 | 32 |