343(top 1%)
papers
8.8K(top 1%)
citations
47(top 1%)
h-index
83(top 1%)
g-index
657
all documents
11.6K
doc citations
1.6K
citing journals

Top Articles

#TitleJournalYearCitations
1Sensor networks: an overviewIEEE Potentials2003550
2Dynamic Security Risk Management Using Bayesian Attack GraphsIEEE Transactions on Dependable and Secure Computing2012457
3A comprehensive survey of Network Function VirtualizationComputer Networks2018361
4Automatic PCB Inspection Algorithms: A SurveyComputer Vision and Image Understanding1996295
5Real-Time Wireless Sensor-Actuator Networks for Industrial Cyber-Physical SystemsProceedings of the IEEE2016293
6iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task LearningIEEE Transactions on Information Forensics and Security2017260
7Neural network diagnosis of malignant melanoma from color imagesIEEE Transactions on Biomedical Engineering1994214
8Survey of Security Advances in Smart Grid: A Data Driven ApproachIEEE Communications Surveys and Tutorials2017191
9MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETsIEEE Transactions on Mobile Computing2017178
10<italic>k</italic>-Nearest Neighbor Classification over Semantically Secure Encrypted Relational DataIEEE Transactions on Knowledge and Data Engineering2015169
11Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image SharingIEEE Transactions on Information Forensics and Security2018166
12State-of-charge prediction of batteries and battery–supercapacitor hybrids using artificial neural networksJournal of Power Sources2011154
13Using Mobile Sensing to Test Clinical Models of Depression, Social Anxiety, State Affect, and Social Isolation Among College StudentsJournal of Medical Internet Research2017127
14Analysis of information flow security in cyber–physical systemsInternational Journal of Critical Infrastructure Protection2010125
15Ensuring Distributed Accountability for Data Sharing in the CloudIEEE Transactions on Dependable and Secure Computing2012124
16Advanced control of membrane fouling in filtration systems using artificial intelligence and machine learning techniques: A critical reviewChemical Engineering Research and Design2019121
17Understanding the phase contrast optics to restore artifact-free microscopy images for segmentationMedical Image Analysis2012119
18Time-Location-Relationship Combined Service Recommendation Based on Taxi Trajectory DataIEEE Transactions on Industrial Informatics2017113
19HARKE: Human Activity Recognition from Kinetic Energy Harvesting Data in Wearable DevicesIEEE Transactions on Mobile Computing2018111
20American Sign Language alphabet recognition using Convolutional Neural Networks with multiview augmentation and inference fusionEngineering Applications of Artificial Intelligence2018103
21Approximation Algorithms for Charging Reward Maximization in Rechargeable Sensor Networks via a Mobile ChargerIEEE/ACM Transactions on Networking2017100
22SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersIEEE Transactions on Cloud Computing201592
23Bio-inspired node localization in wireless sensor networks200990
24Million city traveling salesman problem solution by divide and conquer clustering with adaptive resonance neural networksNeural Networks200380
25Location-Aware Collaborative Filtering for QoS-Based Service Recommendation201280
26An Effective Web Service Recommendation Method Based on Personalized Collaborative Filtering201178
27Optimal security hardening on attack tree models of networks: a cost-benefit analysisInternational Journal of Information Security201276
28Worker Activity Recognition in Smart Manufacturing Using IMU and sEMG Signals with Convolutional Neural NetworksProcedia Manufacturing201874
29Reliable Energy-Efficient Uplink Transmission for Neighborhood Area Networks in Smart GridIEEE Transactions on Smart Grid201571
30Efficient privacy-preserving similar document detectionVLDB Journal201069
31A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of VehiclesIEEE Transactions on Vehicular Technology202069
32Associating Internet Usage with Depressive Behavior Among College StudentsIEEE Technology and Society Magazine201266
33Efficient Aerial Data Collection with UAV in Large-Scale Wireless Sensor NetworksInternational Journal of Distributed Sensor Networks201565
34Improving IoT Data Quality in Mobile Crowd Sensing: A Cross Validation ApproachIEEE Internet of Things Journal201963
35Software Defined Networking Meets Information Centric Networking: A SurveyIEEE Access201861
36Fine-Grained Multitask Allocation for Participatory Sensing With a Shared BudgetIEEE Internet of Things Journal201659
37Joint routing and link rate allocation under bandwidth and energy constraints in sensor networksIEEE Transactions on Wireless Communications200957
38Consistency Management Strategies for Data Replication in Mobile Ad Hoc NetworksIEEE Transactions on Mobile Computing200957
39Incentive Mechanism Design for Heterogeneous Crowdsourcing Using All-Pay ContestsIEEE Transactions on Mobile Computing201656
40Modified watershed technique and post-processing for segmentation of skin lesions in dermoscopy imagesComputerized Medical Imaging and Graphics201155
41Diversifying web service recommendation results via exploring service usage historyIEEE Transactions on Services Computing201655
42A Hierarchical Attention Model for Social Contextual Image RecommendationIEEE Transactions on Knowledge and Data Engineering202054
43Digital Twin Conceptual Model within the Context of Internet of ThingsFuture Internet202054
44SNOW201654
45Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesIEEE Transactions on Knowledge and Data Engineering201553
46An Adaptive Bayesian System for Context-Aware Data Fusion in Smart EnvironmentsIEEE Transactions on Mobile Computing201752
47Deza graphs: A generalization of strongly regular graphJournal of Combinatorial Designs199951
48Improving Network Formation in 6TiSCH NetworksIEEE Transactions on Mobile Computing201951
49A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc NetworksIEEE Transactions on Vehicular Technology201750
50Mobile data and transaction managementInformation Sciences200249