83(top 1%)
papers
2.6K(top 1%)
citations
24(top 1%)
h-index
50(top 1%)
g-index
147
all documents
3.3K
doc citations
637
citing journals

Top Articles

#TitleJournalYearCitations
1Convolutional neural network: a review of models, methodologies and applications to object detectionProgress in Artificial Intelligence2020506
2Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tagsJournal of Supercomputing2017196
3Machine Learning Based Intrusion Detection Systems for IoT ApplicationsWireless Personal Communications2020188
4Defending against phishing attacks: taxonomy of methods, current issues and future directionsTelecommunication Systems2018158
5Big Data Analysis Based Network Behavior Insight of Cellular Networks for Industry 4.0 ApplicationsIEEE Transactions on Industrial Informatics2020138
6Ensemble machine learning approach for classification of IoT devices in smart homeInternational Journal of Machine Learning and Cybernetics2021131
7Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domainMultimedia Tools and Applications2017112
8An efficient employment of internet of multimedia things in smart and future agricultureMultimedia Tools and Applications201991
9Phishing Website Detection With Semantic Features Based on Machine Learning ClassifiersInternational Journal on Semantic Web and Information Systems202266
10A SDN-based fine-grained measurement and modeling approach to vehicular communication network trafficInternational Journal of Communication Systems201957
11Load Balancing Based Task Scheduling with ACO in Cloud Computing201752
12Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network202050
13Compressive Sensing of Medical Images With Confidentially Homomorphic AggregationsIEEE Internet of Things Journal201949
14Classification of various attacks and their defence mechanism in online social networks: a surveyEnterprise Information Systems201948
15Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application VulnerabilitiesInternational Journal of Cloud Applications and Computing201746
16Emotion Recognition in Valence-Arousal Space from Multi-channel EEG data and Wavelet based Deep Learning FrameworkProcedia Computer Science202046
17Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of ThingsIEEE Transactions on Industrial Informatics202246
18Security challenges in cloud computing: state-of-artInternational Journal of Big Data Intelligence201743
19PHISH-SAFE: URL Features-Based Phishing Detection System Using Machine LearningAdvances in Intelligent Systems and Computing201843
20A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devicesInternational Journal of Advanced Intelligence Paradigms201742
21Sentiment Analysis of Movie Reviews in Hindi Language Using Machine Learning201842
22Data aggregation in underwater wireless sensor network: Recent approaches and issuesJournal of King Saud University - Computer and Information Sciences201940
23Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social networkFuture Generation Computer Systems201837
24Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networksTransactions on Emerging Telecommunications Technologies202036
25Multiagent Federated Reinforcement Learning for Secure Incentive Mechanism in Intelligent Cyber–Physical SystemsIEEE Internet of Things Journal202236
26Sentiment analysis of the Uri terror attack using Twitter201734
27Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selectionEnterprise Information Systems202032
28Fuzzy based clustering and aggregation technique for Under Water Wireless Sensor Networks201428
29JS‐SAN: defense mechanism for HTML5‐based web applications against javascript code injection vulnerabilitiesSecurity and Communication Networks201628
30Multi-orientation geometric medical volumes segmentation using 3D multiresolution analysisMultimedia Tools and Applications201927
31Sensor enabled Internet of Things for smart cities201626
32Medical image resolution enhancement for healthcare using nonlocal self-similarity and low-rank priorMultimedia Tools and Applications201926
33A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication SystemIEEE Transactions on Intelligent Transportation Systems202225
34Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiersComputers and Electrical Engineering202224
35Big data driven outlier detection for soybean straw near infrared spectroscopyJournal of Computational Science201822
36Enhanced XSS Defensive Framework for Web Applications Deployed in the Virtual Machines of Cloud Computing EnvironmentProcedia Technology201620
37A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectivesComputers and Security202220
38GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport SystemsIEEE Transactions on Network Science and Engineering202320
39Automated Discovery of JavaScript Code Injection Attacks in PHP Web ApplicationsProcedia Computer Science201617
40A Hindi Question Answering System using Machine Learning approach201617
41CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysisTelecommunication Systems202017
42Handling Data Heterogeneity in Electricity Load Disaggregation via Optimized Complete Ensemble Empirical Mode Decomposition and Wavelet Packet TransformSensors202117
43A secure and efficient key agreement framework for critical energy infrastructure using mobile deviceTelecommunication Systems202117
44HSCA: a novel harmony search based efficient clustering in heterogeneous WSNsTelecommunication Systems201816
45Extended-Range Prediction Model Using NSGA-III Optimized RNN-GRU-LSTM for Driver Stress and DrowsinessSensors202116
46Wild Animal Detection from Highly Cluttered Images Using Deep Convolutional Neural NetworkInternational Journal of Computational Intelligence and Applications201815
47Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning MethodIEEE Transactions on Network and Service Management202115
48GARCH and ANN-based DDoS detection and filtering in cloud computing environmentInternational Journal of Embedded Systems201714
49Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT EnvironmentIEEE Internet of Things Journal202214
50Translating controlled natural language query into SQL query using pattern matching technique201413