672(top 1%)
papers
17.8K(top 1%)
citations
62(top 1%)
h-index
112(top 1%)
g-index
1.3K
all documents
21.8K
doc citations
2.3K
citing journals

Top Articles

#TitleJournalYearCitations
1Adaptive clustering for mobile wireless networksIEEE Journal on Selected Areas in Communications19971,204
2Data Mining for Internet of Things: A SurveyIEEE Communications Surveys and Tutorials2014504
3A review of industrial wireless networks in the context of Industry 4.0Wireless Networks2017391
4QoS routing in ad hoc wireless networksIEEE Journal on Selected Areas in Communications1999370
5Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health MonitoringMobile Networks and Applications2016320
6SVD-based digital image watermarking schemePattern Recognition Letters2005308
7Multilevel reversible data hiding based on histogram modification of difference imagesPattern Recognition2008294
8Digital Video TranscodingProceedings of the IEEE2005267
9Reversible hiding in DCT-based compressed imagesInformation Sciences2007266
10A steganographic method based upon JPEG and quantization table modificationInformation Sciences2002253
11Cloud-enabled wireless body area networks for pervasive healthcareIEEE Network2013251
12Sharing secrets in stego images with authenticationPattern Recognition2008245
13Registration of Challenging Image Pairs: Initialization, Estimation, and DecisionIEEE Transactions on Pattern Analysis and Machine Intelligence2007221
14A new encryption algorithm for image cryptosystemsJournal of Systems and Software2001208
15A steganographic method for digital images using side matchPattern Recognition Letters2004202
16A new remote user authentication scheme for multi-server architectureFuture Generation Computer Systems2003193
17Automatic ultrasound segmentation and morphology based diagnosis of solid breast tumorsBreast Cancer Research and Treatment2005188
18Enhanced authentication scheme with anonymity for roaming service in global mobility networksComputer Communications2009187
19A virtual image cryptosystem based upon vector quantizationIEEE Transactions on Image Processing1998181
20A Reversible Data Hiding Scheme Based on Side Match Vector QuantizationIEEE Transactions on Circuits and Systems for Video Technology2006181
21A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image InpaintingIEEE Transactions on Image Processing2014155
22TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc NetworksIEEE Systems Journal2014150
23Reversible data hiding scheme based on exploiting modification direction with two steganographic imagesMultimedia Tools and Applications2015147
24Digital watermarking based on neural networks for color imagesSignal Processing2001146
25The location and translocation of ndh genes of chloroplast origin in the Orchidaceae familyScientific Reports2015143
26Sharing visual multi-secrets using circle sharesComputer Standards and Interfaces2005137
27A watermarking-based image ownership and tampering authentication schemePattern Recognition Letters2006136
28An image intellectual property protection scheme for gray-level images using visual secret sharing strategyPattern Recognition Letters2002133
29Classification of breast ultrasound images using fractal featureClinical Imaging2005130
30Kernel Nonparametric Weighted Feature Extraction for Hyperspectral Image ClassificationIEEE Transactions on Geoscience and Remote Sensing2009129
31Improvement in breast tumor discrimination by support vector machines and speckle-emphasis texture analysisUltrasound in Medicine and Biology2003123
32The benefits of a challenge: student motivation and flow experience in tablet-PC-game-based learningInteractive Learning Environments2015122
33A Nonparametric Feature Extraction and Its Application to Nearest Neighbor Classification for Hyperspectral Image DataIEEE Transactions on Geoscience and Remote Sensing2010116
34Breast Ultrasound Computer-Aided Diagnosis Using BI-RADS FeaturesAcademic Radiology2007111
35Lossless data hiding for color images based on block truncation codingPattern Recognition2008109
36Support Vector Machines for Diagnosis of Breast Tumors on US ImagesAcademic Radiology2003104
37Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanismSignal Processing2012104
38An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environmentsJournal of Systems and Software2009102
39Concomitant loss of NDH complex‐related genes within chloroplast and nuclear genomes in some orchidsPlant Journal201799
40Data mining with decision trees for diagnosis of breast tumor in medical ultrasonic imagesBreast Cancer Research and Treatment200198
41Adaptive watermark mechanism for rightful ownership protectionJournal of Systems and Software200897
42A FAST AND SECURE IMAGE HIDING SCHEME BASED ON LSB SUBSTITUTIONInternational Journal of Pattern Recognition and Artificial Intelligence200295
43An Information Hiding Scheme Using Sudoku200895
44Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation200794
45A watermarking technique based on one-way hash functionsIEEE Transactions on Consumer Electronics199990
46NDH expression marks major transitions in plant evolution and reveals coordinate intracellular gene lossBMC Plant Biology201589
47An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet LevelApplied Sciences (Switzerland)201986
48Reversible Steganography for VQ-Compressed Images Using Side Matching and RelocationIEEE Transactions on Information Forensics and Security200685
49A memetic algorithm for extending wireless sensor network lifetimeInformation Sciences201080
50Homopolish: a method for the removal of systematic errors in nanopore sequencing by homologous polishingGenome Biology202179