About
Technology
Issues
FAQ
Search
Profile
Top Authors
Prolific Authors
Top Journals
Main Disciplines
Main Topics
Most Cited Articles
Scientometrics
Avg Impact Factor
★★
Articles
★★★
Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Schools
›
Department of Computer Science
›
top-articles
Department of Computer Science
209
(top 1%)
papers
7.3K
(top 1%)
citations
43
(top 1%)
h
-index
81
(top 1%)
g
-index
329
all documents
8.8K
doc citations
1.3K
citing journals
Top Articles
#
Title
Journal
Year
Citations
1
A Deep Learning Approach to Network Intrusion Detection
IEEE Transactions on Emerging Topics in Computational Intelligence
2018
944
2
Analysis of Dimensionality Reduction Techniques on Big Data
IEEE Access
2020
458
3
Comparison and Modelling of Country-level Microblog User and Activity in Cyber-physical-social Systems Using Weibo and Twitter Data
ACM Transactions on Intelligent Systems and Technology
2019
311
4
Advanced internet of things for personalised healthcare systems: A survey
Pervasive and Mobile Computing
2017
291
5
Classification of acute lymphoblastic leukemia using deep learning
Microscopy Research and Technique
2018
193
6
Secure and Robust Fragile Watermarking Scheme for Medical Images
IEEE Access
2018
189
7
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
Sensors
2019
182
8
GDPR-Compliant Personal Data Management: A Blockchain-Based Solution
IEEE Transactions on Information Forensics and Security
2020
181
9
An energy-aware service composition algorithm for multiple cloud-based IoT applications
Journal of Network and Computer Applications
2017
162
10
Image compression techniques: A survey in lossless and lossy algorithms
Neurocomputing
2018
153
11
PestNet: An End-to-End Deep Learning Approach for Large-Scale Multi-Class Pest Detection and Classification
IEEE Access
2019
142
12
Deep Convolutional Neural Networks for Human Action Recognition Using Depth Maps and Postures
IEEE Transactions on Systems, Man, and Cybernetics: Systems
2019
132
13
Examining sensor-based physical activity recognition and monitoring for healthcare using Internet of Things: A systematic review
Journal of Biomedical Informatics
2018
124
14
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems
Information Processing and Management
2020
120
15
Application of Convolutional Neural Networks for Automated Ulcer Detection in Wireless Capsule Endoscopy Images
Sensors
2019
119
16
F
og-2-
F
og collaboration">Improving fog computing performance via
F
og-2-
F
og collaboration
Future Generation Computer Systems
2019
104
17
Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks
IEEE Transactions on Vehicular Technology
2016
102
18
Lesson Learned from Collecting Quantified Self Information via Mobile and Wearable Devices
Journal of Sensor and Actuator Networks
2015
100
19
Short term power load forecasting using Deep Neural Networks
2017
92
20
Toward a Trust Evaluation Mechanism in the Social Internet of Things
Sensors
2017
88
21
A Mechanism for Securing IoT-enabled Applications at the Fog Layer
Journal of Sensor and Actuator Networks
2019
88
22
An overview of data fusion techniques for Internet of Things enabled physical activity recognition and measure
Information Fusion
2020
88
23
A Deep Learning Approach for Energy Efficient Computational Offloading in Mobile Edge Computing
IEEE Access
2019
85
24
Analysis and Optimization of Unmanned Aerial Vehicle Swarms in Logistics: An Intelligent Delivery Platform
IEEE Access
2019
80
25
Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks
IEEE Transactions on Vehicular Technology
2015
79
26
Trust Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing in the Internet of Things
IEEE Transactions on Information Forensics and Security
2019
78
27
COMITMENT: A Fog Computing Trust Management Approach
Journal of Parallel and Distributed Computing
2020
78
28
Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data
IEEE Transactions on Knowledge and Data Engineering
2016
75
29
PriNergy: a priority-based energy-efficient routing method for IoT systems
Journal of Supercomputing
2020
75
30
CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things
IEEE Internet of Things Journal
2019
72
31
Machine learning ensemble modelling to classify caesarean section and vaginal delivery types using Cardiotocography traces
Computers in Biology and Medicine
2018
64
32
Image Enhancement and Segmentation Techniques for Detection of Knee Joint Diseases: A Survey
Current Medical Imaging
2018
58
33
Iot Forensics: Challenges for the Ioa Era
2018
56
34
TrustChain: A Privacy Preserving Blockchain with Edge Computing
Wireless Communications and Mobile Computing
2019
56
35
A Task Scheduling Algorithm With Improved Makespan Based on Prediction of Tasks Computation Time algorithm for Cloud Computing
IEEE Access
2019
56
36
Boundary Delineation of MRI Images for Lumbar Spinal Stenosis Detection Through Semantic Segmentation Using Deep Neural Networks
IEEE Access
2019
56
37
Deep gesture interaction for augmented anatomy learning
International Journal of Information Management
2019
56
38
A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT
Journal of Parallel and Distributed Computing
2019
55
39
Automatic Choroid Layer Segmentation from Optical Coherence Tomography Images Using Deep Learning
Scientific Reports
2019
53
40
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks
IEEE Access
2018
51
41
GAN-Based Semi-Supervised Learning Approach for Clinical Decision Support in Health-IoT Platform
IEEE Access
2019
51
42
3-D Deployment Optimization for Heterogeneous Wireless Directional Sensor Networks on Smart City
IEEE Transactions on Industrial Informatics
2019
51
43
PMU Placement in Electric Transmission Networks for Reliable State Estimation Against False Data Injection Attacks
IEEE Internet of Things Journal
2017
48
44
IoT-Fog Optimal Workload via Fog Offloading
2018
47
45
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel
Journal of Information Security and Applications
2018
46
46
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
Sensors
2019
46
47
A secure fog‐based platform for SCADA‐based IoT critical infrastructure
Software - Practice and Experience
2020
46
48
3-D Multiobjective Deployment of an Industrial Wireless Sensor Network for Maritime Applications Utilizing a Distributed Parallel Algorithm
IEEE Transactions on Industrial Informatics
2018
45
49
ControCity: An Autonomous Approach for Controlling Elasticity Using Buffer Management in Cloud Computing Environment
IEEE Access
2019
45
50
Open Knowledge Accessing Method in IoT-Based Hospital Information System for Medical Record Enrichment
IEEE Access
2018
44
site/software ©
exaly
; All materials licenced under
CC by-SA
.