115(top 1%)
papers
2.2K(top 1%)
citations
26(top 1%)
h-index
42(top 1%)
g-index
131
all documents
2.4K
doc citations
390
citing journals

Top Articles

#TitleJournalYearCitations
1Constructing dummy query sequences to protect location privacy and query privacy in location-based servicesWorld Wide Web2021160
2An effective approach for the protection of user commodity viewing privacy in e-commerce websiteKnowledge-Based Systems2021129
3A dummy-based user privacy protection approach for text information retrievalKnowledge-Based Systems2020124
4Multilevel threshold image segmentation for COVID-19 chest radiography: A framework using horizontal and vertical multiverse optimizationComputers in Biology and Medicine2022101
5Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT NetworksIEEE Internet of Things Journal201891
6How to ensure the confidentiality of electronic medical records on the cloud: A technical perspectiveComputers in Biology and Medicine202281
7A Location Privacy-Preserving System Based on Query Range Cover-Up or Location-Based ServicesIEEE Transactions on Vehicular Technology202077
8Accurate Image-Guided Stereo Matching With Efficient Matching Cost and Disparity RefinementIEEE Transactions on Circuits and Systems for Video Technology201675
9A novel object tracking algorithm by fusing color and depth information based on single valued neutrosophic cross-entropyJournal of Intelligent and Fuzzy Systems201764
10Popularity-Aware and Diverse Web APIs Recommendation Based on Correlation GraphIEEE Transactions on Computational Social Systems202350
11Time series classification based on multi-feature dictionary representation and ensemble learningExpert Systems With Applications202146
12Extracting diverse-shapelets for early classification on time seriesWorld Wide Web202042
13A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge CloudIEEE Internet of Things Journal202142
14Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid AttacksIEEE Transactions on Systems, Man, and Cybernetics: Systems202241
15A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusionJournal of Network and Computer Applications201737
16Malware propagation model in wireless sensor networks under attack–defense confrontationComputer Communications202037
17MSEva: A Musculoskeletal Rehabilitation Evaluation System Based on EMG SignalsACM Transactions on Sensor Networks202336
18Time-Aware Missing Healthcare Data Prediction Based on ARIMA ModelIEEE/ACM Transactions on Computational Biology and Bioinformatics202436
19PGCN-TCA: Pseudo Graph Convolutional Network With Temporal and Channel-Wise Attention for Skeleton-Based Action RecognitionIEEE Access202035
20Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-CloudsIEEE Transactions on Information Forensics and Security201834
21A comprehensive exploration of semantic relation extraction via pre-trained CNNsKnowledge-Based Systems202032
22Violence detection and face recognition based on deep learningPattern Recognition Letters202131
23Recognition of Imbalanced Epileptic EEG Signals by a Graph-Based Extreme Learning MachineWireless Communications and Mobile Computing202130
24HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNsJournal of Network and Computer Applications201929
25Online Visual Tracking of Weighted Multiple Instance Learning via Neutrosophic Similarity-Based Objectness EstimationSymmetry201928
26A multi-objective adaptive evolutionary algorithm to extract communities in networksSwarm and Evolutionary Computation202028
27Reliability Evaluation for Clustered WSNs under Malware PropagationSensors201626
28Data sharing in VANETs based on evolutionary fuzzy gameFuture Generation Computer Systems201825
29Intelligent Jamming Defense Using DNN Stackelberg Game in Sensor Edge CloudIEEE Internet of Things Journal202225
30Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNsMobile Information Systems201524
31A Local Extended Algorithm Combined with Degree and Clustering Coefficient to Optimize Overlapping Community DetectionComplexity202124
32FDSA-STG: Fully Dynamic Self-Attention Spatio-Temporal Graph Networks for Intelligent Traffic Flow PredictionIEEE Transactions on Vehicular Technology202224
33Unknown hostile environment-oriented autonomous WSN deployment using a mobile robotJournal of Network and Computer Applications202123
34SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor NetworksIEEE Access201921
35Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemesDigital Communications and Networks202321
36Trust Dynamics in WSNs: An Evolutionary Game-Theoretic ApproachJournal of Sensors201620
37Consensus of nonlinear second-order multi-agent systems with mixed time-delays and intermittent communicationsNeurocomputing201720
38Graph representation learning with encoding edgesNeurocomputing201919
39Multimodal Information Fusion for Automatic Aesthetics Evaluation of Robotic Dance PosesInternational Journal of Social Robotics202019
40Kalman Filter for Spatial-Temporal Regularized Correlation FiltersIEEE Transactions on Image Processing202119
41Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie AlgebraIEEE Transactions on Information Forensics and Security202219
42New NOMA-Based Two-Way Relay NetworksIEEE Transactions on Vehicular Technology202018
43Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automatonInternational Journal of Distributed Sensor Networks202016
44How to protect reader lending privacy under a cloud environment: a technical methodLibrary Hi Tech202216
45Incorporating Distributed DRL Into Storage Resource Optimization of Space-Air-Ground Integrated Wireless Communication NetworkIEEE Journal on Selected Topics in Signal Processing202216
46Exponential Synchronization of Stochastic Neural Networks with Time-Varying Delays and Lévy Noises via Event-Triggered ControlNeural Processing Letters202115
47Energy-efficient coding for electromagnetic nanonetworks in the Terahertz bandAd Hoc Networks201614
48Three-dimensional robot localization using cameras in wireless multimedia sensor networksJournal of Network and Computer Applications201914
49String Prediction for 4:2:0 Format Screen Content Coding and Its Implementation in AVS3IEEE Transactions on Multimedia202114
50UCoin: An Efficient Privacy Preserving Scheme for CryptocurrenciesIEEE Transactions on Dependable and Secure Computing202314