198(top 1%)
papers
3.4K(top 1%)
citations
32(top 1%)
h-index
53(top 1%)
g-index
370
all documents
4.7K
doc citations
749
citing journals

Top Articles

#TitleJournalYearCitations
1A survey on 5G: The next generation of mobile communicationPhysical Communication2016387
2Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical SystemIEEE/CAA Journal of Automatica Sinica2021166
3Hybrid technique for robust and imperceptible multiple watermarking using medical imagesMultimedia Tools and Applications2016144
4Hybrid Technique for Robust and Imperceptible Image Watermarking in DWT–DCT–SVD DomainThe National Academy of Sciences, India2014103
5A trust infrastructure based authentication method for clustered vehicular ad hoc networksPeer-to-Peer Networking and Applications202182
6Deep CNN models-based ensemble approach to driver drowsiness detectionNeural Computing and Applications202181
7A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud ServiceIEEE Access201878
8The monarch butterfly optimization algorithm for solving feature selection problemsNeural Computing and Applications202276
9Boosting-Based DDoS Detection in Internet of Things SystemsIEEE Internet of Things Journal202275
10A Contrast Enhancement-Based Filter for Removal of Random Valued Impulse NoiseIEEE Signal Processing Letters201070
11A Hindi speech recognition system for connected words using HTKInternational Journal of Computational Systems Engineering201268
12Myocardial infarction detection based on deep neural network on imbalanced dataMultimedia Systems202266
13A survey of phishing attack techniques, defence mechanisms and open research challengesEnterprise Information Systems202262
14Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT DomainWireless Personal Communications201558
15A survey on solving cold start problem in recommender systems201758
16Harmony search based remodularization for object-oriented software systemsComputer Languages, Systems and Structures201757
17PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic ApproachProcedia Computer Science201554
18Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor NetworksWireless Personal Communications201654
19ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things201953
20SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNsWireless Personal Communications202053
21Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future ScopeJournal of Intelligent and Robotic Systems: Theory and Applications202153
22Load Balancing Based Task Scheduling with ACO in Cloud Computing201752
23A Handheld Gun Detection using Faster R-CNN Deep Learning201751
24Improving modular structure of software system using structural and lexical dependencyInformation and Software Technology201750
25Package Coupling Measurement in Object-Oriented SoftwareJournal of Computer Science and Technology200949
26A study of the dynamic features of recommender systemsArtificial Intelligence Review201549
27Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New TrendsWireless Personal Communications201945
28Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoTWireless Personal Communications201944
29A CNN–RNN–LSTM Based Amalgamation for Alzheimer’s Disease DetectionJournal of Medical and Biological Engineering202043
30Sentiment Analysis of Movie Reviews in Hindi Language Using Machine Learning201842
31An extensive evaluation of search-based software testing: a reviewSoft Computing201942
32An evolutionary clustering algorithm based on temporal features for dynamic recommender systemsSwarm and Evolutionary Computation201441
33Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in CloudInternational Journal of Cloud Applications and Computing201739
34Rule-Based Framework for Detection of Smishing Messages in Mobile EnvironmentProcedia Computer Science201838
35Imposing voltage security and network radiality for reconfiguration of distribution systems using efficient heuristic and meta‐heuristic approachIET Generation, Transmission and Distribution201736
36A novel fault detection and recovery technique for cluster‐based underwater wireless sensor networksInternational Journal of Communication Systems201836
37Differential evolution optimization of intertwining logistic map-DNA based image encryption techniqueJournal of Ambient Intelligence and Humanized Computing202036
38Network Partitioning Recovery Mechanisms in WSANs: a SurveyWireless Personal Communications201334
39Sentiment analysis of the Uri terror attack using Twitter201734
40A Survey of Dynamic Software MetricsJournal of Computer Science and Technology201032
41GFCC based discriminatively trained noise robust continuous ASR system for Hindi languageJournal of Ambient Intelligence and Humanized Computing201932
42A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transformJournal of Ambient Intelligence and Humanized Computing201932
43Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-securityComplex & Intelligent Systems202232
44Image-to-Image Translation Using Generative Adversarial Network201931
45Attack and intrusion detection in cloud computing using an ensemble learning approachInternational Journal of Information Technology (Singapore)202131
46Improved Data Aggregation for Cluster Based Underwater Wireless Sensor NetworksProceedings of the National Academy of Sciences India Section A - Physical Sciences201730
47Fuzzy based clustering and aggregation technique for Under Water Wireless Sensor Networks201428
48A Hybrid Timer Based Single Node Failure Recovery Approach for WSANsWireless Personal Communications201426
49Towards Privacy Risk Analysis in Android Applications Using Machine Learning ApproachesInternational Journal of E-Services and Mobile Applications201925
50Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks201925