About
Technology
Issues
FAQ
Search
Profile
Top Authors
Prolific Authors
Top Journals
Main Disciplines
Main Topics
Most Cited Articles
Scientometrics
Avg Impact Factor
★★
Articles
★★★
Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Schools
›
Department of Computer Engineering
›
top-articles
Department of Computer Engineering
198
(top 1%)
papers
3.4K
(top 1%)
citations
32
(top 1%)
h
-index
53
(top 1%)
g
-index
370
all documents
4.7K
doc citations
749
citing journals
Top Articles
#
Title
Journal
Year
Citations
1
A survey on 5G: The next generation of mobile communication
Physical Communication
2016
387
2
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System
IEEE/CAA Journal of Automatica Sinica
2021
166
3
Hybrid technique for robust and imperceptible multiple watermarking using medical images
Multimedia Tools and Applications
2016
144
4
Hybrid Technique for Robust and Imperceptible Image Watermarking in DWT–DCT–SVD Domain
The National Academy of Sciences, India
2014
103
5
A trust infrastructure based authentication method for clustered vehicular ad hoc networks
Peer-to-Peer Networking and Applications
2021
82
6
Deep CNN models-based ensemble approach to driver drowsiness detection
Neural Computing and Applications
2021
81
7
A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service
IEEE Access
2018
78
8
The monarch butterfly optimization algorithm for solving feature selection problems
Neural Computing and Applications
2022
76
9
Boosting-Based DDoS Detection in Internet of Things Systems
IEEE Internet of Things Journal
2022
75
10
A Contrast Enhancement-Based Filter for Removal of Random Valued Impulse Noise
IEEE Signal Processing Letters
2010
70
11
A Hindi speech recognition system for connected words using HTK
International Journal of Computational Systems Engineering
2012
68
12
Myocardial infarction detection based on deep neural network on imbalanced data
Multimedia Systems
2022
66
13
A survey of phishing attack techniques, defence mechanisms and open research challenges
Enterprise Information Systems
2022
62
14
Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain
Wireless Personal Communications
2015
58
15
A survey on solving cold start problem in recommender systems
2017
58
16
Harmony search based remodularization for object-oriented software systems
Computer Languages, Systems and Structures
2017
57
17
PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach
Procedia Computer Science
2015
54
18
Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks
Wireless Personal Communications
2016
54
19
ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
2019
53
20
SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs
Wireless Personal Communications
2020
53
21
Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope
Journal of Intelligent and Robotic Systems: Theory and Applications
2021
53
22
Load Balancing Based Task Scheduling with ACO in Cloud Computing
2017
52
23
A Handheld Gun Detection using Faster R-CNN Deep Learning
2017
51
24
Improving modular structure of software system using structural and lexical dependency
Information and Software Technology
2017
50
25
Package Coupling Measurement in Object-Oriented Software
Journal of Computer Science and Technology
2009
49
26
A study of the dynamic features of recommender systems
Artificial Intelligence Review
2015
49
27
Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends
Wireless Personal Communications
2019
45
28
Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
Wireless Personal Communications
2019
44
29
A CNN–RNN–LSTM Based Amalgamation for Alzheimer’s Disease Detection
Journal of Medical and Biological Engineering
2020
43
30
Sentiment Analysis of Movie Reviews in Hindi Language Using Machine Learning
2018
42
31
An extensive evaluation of search-based software testing: a review
Soft Computing
2019
42
32
An evolutionary clustering algorithm based on temporal features for dynamic recommender systems
Swarm and Evolutionary Computation
2014
41
33
Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud
International Journal of Cloud Applications and Computing
2017
39
34
Rule-Based Framework for Detection of Smishing Messages in Mobile Environment
Procedia Computer Science
2018
38
35
Imposing voltage security and network radiality for reconfiguration of distribution systems using efficient heuristic and meta‐heuristic approach
IET Generation, Transmission and Distribution
2017
36
36
A novel fault detection and recovery technique for cluster‐based underwater wireless sensor networks
International Journal of Communication Systems
2018
36
37
Differential evolution optimization of intertwining logistic map-DNA based image encryption technique
Journal of Ambient Intelligence and Humanized Computing
2020
36
38
Network Partitioning Recovery Mechanisms in WSANs: a Survey
Wireless Personal Communications
2013
34
39
Sentiment analysis of the Uri terror attack using Twitter
2017
34
40
A Survey of Dynamic Software Metrics
Journal of Computer Science and Technology
2010
32
41
GFCC based discriminatively trained noise robust continuous ASR system for Hindi language
Journal of Ambient Intelligence and Humanized Computing
2019
32
42
A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform
Journal of Ambient Intelligence and Humanized Computing
2019
32
43
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
Complex & Intelligent Systems
2022
32
44
Image-to-Image Translation Using Generative Adversarial Network
2019
31
45
Attack and intrusion detection in cloud computing using an ensemble learning approach
International Journal of Information Technology (Singapore)
2021
31
46
Improved Data Aggregation for Cluster Based Underwater Wireless Sensor Networks
Proceedings of the National Academy of Sciences India Section A - Physical Sciences
2017
30
47
Fuzzy based clustering and aggregation technique for Under Water Wireless Sensor Networks
2014
28
48
A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs
Wireless Personal Communications
2014
26
49
Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches
International Journal of E-Services and Mobile Applications
2019
25
50
Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
2019
25
site/software ©
exaly
; All materials licenced under
CC by-SA
.