About
Technology
Issues
FAQ
Search
Profile
Top Authors
Prolific Authors
Top Journals
Main Disciplines
Main Topics
Most Cited Articles
Scientometrics
Avg Impact Factor
★★
Articles
★★★
Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Schools
›
Department of Computer Science and Information Engineering
›
top-articles
Department of Computer Science and Information Engineering
672
(top 1%)
papers
17.8K
(top 1%)
citations
62
(top 1%)
h
-index
112
(top 1%)
g
-index
1.3K
all documents
21.8K
doc citations
2.3K
citing journals
Top Articles
#
Title
Journal
Year
Citations
1
Adaptive clustering for mobile wireless networks
IEEE Journal on Selected Areas in Communications
1997
1,204
2
Data Mining for Internet of Things: A Survey
IEEE Communications Surveys and Tutorials
2014
504
3
A review of industrial wireless networks in the context of Industry 4.0
Wireless Networks
2017
391
4
QoS routing in ad hoc wireless networks
IEEE Journal on Selected Areas in Communications
1999
370
5
Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health Monitoring
Mobile Networks and Applications
2016
320
6
SVD-based digital image watermarking scheme
Pattern Recognition Letters
2005
308
7
Multilevel reversible data hiding based on histogram modification of difference images
Pattern Recognition
2008
294
8
Digital Video Transcoding
Proceedings of the IEEE
2005
267
9
Reversible hiding in DCT-based compressed images
Information Sciences
2007
266
10
A steganographic method based upon JPEG and quantization table modification
Information Sciences
2002
253
11
Cloud-enabled wireless body area networks for pervasive healthcare
IEEE Network
2013
251
12
Sharing secrets in stego images with authentication
Pattern Recognition
2008
245
13
Registration of Challenging Image Pairs: Initialization, Estimation, and Decision
IEEE Transactions on Pattern Analysis and Machine Intelligence
2007
221
14
A new encryption algorithm for image cryptosystems
Journal of Systems and Software
2001
208
15
A steganographic method for digital images using side match
Pattern Recognition Letters
2004
202
16
A new remote user authentication scheme for multi-server architecture
Future Generation Computer Systems
2003
193
17
Automatic ultrasound segmentation and morphology based diagnosis of solid breast tumors
Breast Cancer Research and Treatment
2005
188
18
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
2009
187
19
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
1998
181
20
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization
IEEE Transactions on Circuits and Systems for Video Technology
2006
181
21
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
IEEE Transactions on Image Processing
2014
155
22
TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks
IEEE Systems Journal
2014
150
23
Reversible data hiding scheme based on exploiting modification direction with two steganographic images
Multimedia Tools and Applications
2015
147
24
Digital watermarking based on neural networks for color images
Signal Processing
2001
146
25
The location and translocation of ndh genes of chloroplast origin in the Orchidaceae family
Scientific Reports
2015
143
26
Sharing visual multi-secrets using circle shares
Computer Standards and Interfaces
2005
137
27
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
2006
136
28
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
Pattern Recognition Letters
2002
133
29
Classification of breast ultrasound images using fractal feature
Clinical Imaging
2005
130
30
Kernel Nonparametric Weighted Feature Extraction for Hyperspectral Image Classification
IEEE Transactions on Geoscience and Remote Sensing
2009
129
31
Improvement in breast tumor discrimination by support vector machines and speckle-emphasis texture analysis
Ultrasound in Medicine and Biology
2003
123
32
The benefits of a challenge: student motivation and flow experience in tablet-PC-game-based learning
Interactive Learning Environments
2015
122
33
A Nonparametric Feature Extraction and Its Application to Nearest Neighbor Classification for Hyperspectral Image Data
IEEE Transactions on Geoscience and Remote Sensing
2010
116
34
Breast Ultrasound Computer-Aided Diagnosis Using BI-RADS Features
Academic Radiology
2007
111
35
Lossless data hiding for color images based on block truncation coding
Pattern Recognition
2008
109
36
Support Vector Machines for Diagnosis of Breast Tumors on US Images
Academic Radiology
2003
104
37
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
Signal Processing
2012
104
38
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
Journal of Systems and Software
2009
102
39
Concomitant loss of
NDH
complex‐related genes within chloroplast and nuclear genomes in some orchids
Plant Journal
2017
99
40
Data mining with decision trees for diagnosis of breast tumor in medical ultrasonic images
Breast Cancer Research and Treatment
2001
98
41
Adaptive watermark mechanism for rightful ownership protection
Journal of Systems and Software
2008
97
42
A FAST AND SECURE IMAGE HIDING SCHEME BASED ON LSB SUBSTITUTION
International Journal of Pattern Recognition and Artificial Intelligence
2002
95
43
An Information Hiding Scheme Using Sudoku
2008
95
44
Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation
2007
94
45
A watermarking technique based on one-way hash functions
IEEE Transactions on Consumer Electronics
1999
90
46
NDH expression marks major transitions in plant evolution and reveals coordinate intracellular gene loss
BMC Plant Biology
2015
89
47
An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level
Applied Sciences (Switzerland)
2019
86
48
Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation
IEEE Transactions on Information Forensics and Security
2006
85
49
A memetic algorithm for extending wireless sensor network lifetime
Information Sciences
2010
80
50
Homopolish: a method for the removal of systematic errors in nanopore sequencing by homologous polishing
Genome Biology
2021
79
site/software ©
exaly
; All materials licenced under
CC by-SA
.