About
Technology
Issues
FAQ
Search
Profile
Top Authors
Prolific Authors
Top Journals
Main Disciplines
Main Topics
Most Cited Articles
Scientometrics
Avg Impact Factor
★★
Articles
★★★
Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Schools
›
Department of Computer Engineering
›
top-articles
Department of Computer Engineering
83
(top 1%)
papers
2.6K
(top 1%)
citations
24
(top 1%)
h
-index
50
(top 1%)
g
-index
147
all documents
3.3K
doc citations
637
citing journals
Top Articles
#
Title
Journal
Year
Citations
1
Convolutional neural network: a review of models, methodologies and applications to object detection
Progress in Artificial Intelligence
2020
506
2
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
Journal of Supercomputing
2017
196
3
Machine Learning Based Intrusion Detection Systems for IoT Applications
Wireless Personal Communications
2020
188
4
Defending against phishing attacks: taxonomy of methods, current issues and future directions
Telecommunication Systems
2018
158
5
Big Data Analysis Based Network Behavior Insight of Cellular Networks for Industry 4.0 Applications
IEEE Transactions on Industrial Informatics
2020
138
6
Ensemble machine learning approach for classification of IoT devices in smart home
International Journal of Machine Learning and Cybernetics
2021
131
7
Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain
Multimedia Tools and Applications
2017
112
8
An efficient employment of internet of multimedia things in smart and future agriculture
Multimedia Tools and Applications
2019
91
9
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers
International Journal on Semantic Web and Information Systems
2022
66
10
A SDN-based fine-grained measurement and modeling approach to vehicular communication network traffic
International Journal of Communication Systems
2019
57
11
Load Balancing Based Task Scheduling with ACO in Cloud Computing
2017
52
12
Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network
2020
50
13
Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations
IEEE Internet of Things Journal
2019
49
14
Classification of various attacks and their defence mechanism in online social networks: a survey
Enterprise Information Systems
2019
48
15
Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities
International Journal of Cloud Applications and Computing
2017
46
16
Emotion Recognition in Valence-Arousal Space from Multi-channel EEG data and Wavelet based Deep Learning Framework
Procedia Computer Science
2020
46
17
Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things
IEEE Transactions on Industrial Informatics
2022
46
18
Security challenges in cloud computing: state-of-art
International Journal of Big Data Intelligence
2017
43
19
PHISH-SAFE: URL Features-Based Phishing Detection System Using Machine Learning
Advances in Intelligent Systems and Computing
2018
43
20
A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices
International Journal of Advanced Intelligence Paradigms
2017
42
21
Sentiment Analysis of Movie Reviews in Hindi Language Using Machine Learning
2018
42
22
Data aggregation in underwater wireless sensor network: Recent approaches and issues
Journal of King Saud University - Computer and Information Sciences
2019
40
23
Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network
Future Generation Computer Systems
2018
37
24
Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks
Transactions on Emerging Telecommunications Technologies
2020
36
25
Multiagent Federated Reinforcement Learning for Secure Incentive Mechanism in Intelligent Cyber–Physical Systems
IEEE Internet of Things Journal
2022
36
26
Sentiment analysis of the Uri terror attack using Twitter
2017
34
27
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
Enterprise Information Systems
2020
32
28
Fuzzy based clustering and aggregation technique for Under Water Wireless Sensor Networks
2014
28
29
JS‐SAN: defense mechanism for HTML5‐based web applications against javascript code injection vulnerabilities
Security and Communication Networks
2016
28
30
Multi-orientation geometric medical volumes segmentation using 3D multiresolution analysis
Multimedia Tools and Applications
2019
27
31
Sensor enabled Internet of Things for smart cities
2016
26
32
Medical image resolution enhancement for healthcare using nonlocal self-similarity and low-rank prior
Multimedia Tools and Applications
2019
26
33
A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System
IEEE Transactions on Intelligent Transportation Systems
2022
25
34
Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers
Computers and Electrical Engineering
2022
24
35
Big data driven outlier detection for soybean straw near infrared spectroscopy
Journal of Computational Science
2018
22
36
Enhanced XSS Defensive Framework for Web Applications Deployed in the Virtual Machines of Cloud Computing Environment
Procedia Technology
2016
20
37
A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives
Computers and Security
2022
20
38
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems
IEEE Transactions on Network Science and Engineering
2023
20
39
Automated Discovery of JavaScript Code Injection Attacks in PHP Web Applications
Procedia Computer Science
2016
17
40
A Hindi Question Answering System using Machine Learning approach
2016
17
41
CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis
Telecommunication Systems
2020
17
42
Handling Data Heterogeneity in Electricity Load Disaggregation via Optimized Complete Ensemble Empirical Mode Decomposition and Wavelet Packet Transform
Sensors
2021
17
43
A secure and efficient key agreement framework for critical energy infrastructure using mobile device
Telecommunication Systems
2021
17
44
HSCA: a novel harmony search based efficient clustering in heterogeneous WSNs
Telecommunication Systems
2018
16
45
Extended-Range Prediction Model Using NSGA-III Optimized RNN-GRU-LSTM for Driver Stress and Drowsiness
Sensors
2021
16
46
Wild Animal Detection from Highly Cluttered Images Using Deep Convolutional Neural Network
International Journal of Computational Intelligence and Applications
2018
15
47
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method
IEEE Transactions on Network and Service Management
2021
15
48
GARCH and ANN-based DDoS detection and filtering in cloud computing environment
International Journal of Embedded Systems
2017
14
49
Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment
IEEE Internet of Things Journal
2022
14
50
Translating controlled natural language query into SQL query using pattern matching technique
2014
13
site/software ©
exaly
; All materials licenced under
CC by-SA
.