


default search action
Journal of King Saud University - Computer and Information Sciences, Volume 35
Volume 35, Number 1, January 2023
- Abdullah Lakhan
, Mazin Abed Mohammed, Dheyaa Ahmed Ibrahim, Karrar Hameed Abdulkareem:
Bio-inspired robotics enabled schemes in blockchain-fog-cloud assisted IoMT environment. 1-12 - Salah Zidi, Alaeddine Mihoub, Saeed Mian Qaisar
, Moez Krichen, Qasem Abu Al-Haija
:
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment. 13-25 - Saeed Mian Qaisar
, Sibghatullah I. Khan
, Kathiravan Srinivasan, Moez Krichen:
Arrhythmia classification using multirate processing metaheuristic optimization and variational mode decomposition. 26-37 - Enwen Hu, Lei Sun:
VODRAC: Efficient and robust correspondence-based point cloud registration with extreme outlier ratios. 38-55 - Selcuk Aslan
, Tevfik Erkin:
An immune plasma algorithm based approach for UCAV path planning. 56-69 - Mouhamad Almakhour, Layth Sliman
, Abed Ellatif Samhat
, Abdelhamid Mellouk:
A formal verification approach for composite smart contracts security using FSM. 70-86 - Jagadeesha R. Bhat, Salman A. AlQahtani
, Maziar M. Nekovee
:
FinTech enablers, use cases, and role of future internet of things. 87-101 - Saleh M. Basalamah, Sultan Daud Khan, Emad A. Felemban, Atif Naseer
, Faizan Ur Rehman
:
Deep learning framework for congestion detection at public places via learning from synthetic data. 102-114 - Xiang Yu, Shui-Hua Wang, Yudong Zhang
:
Multiple-level thresholding for breast mass detection. 115-130 - Shiraz Ali Wagan, Jahwan Koo, Isma Farah Siddiqui
, Nawab Muhammad Faseeh Qureshi, Muhammad Attique, Dong Ryeol Shin:
A Fuzzy-Based Duo-Secure Multi-Modal Framework for IoMT Anomaly Detection. 131-144 - Asma Cherif, Arwa Badhib, Heyfa Ammar, Suhair Alshehri, Manal Kalkatawi
, Abdessamad Imine:
Credit card fraud detection in the era of disruptive technologies: A systematic review. 145-174 - Jaeuk Moon
, Yoona Noh, Sungwoo Park, Eenjun Hwang:
Model-agnostic meta-learning-based region-adaptive parameter adjustment scheme for influenza forecasting. 175-184 - Aminu Aminu Muazu, Ahmad Sobri Hashim, Aliza Sarlan, Mujaheed Abdullahi
:
SCIPOG: Seeding and constraint support in IPOG strategy for combinatorial t-way testing to generate optimum test cases. 185-201 - Mashail N. Alkhomsan
, Nouf Alturayeif
, Sahar Alwadei
, Malak Baslyman
:
UsAge guidelines: Toward usable Saudi M-Government applications for elderly users. 202-218 - Mohammad Abdul Mujeeb Khan
, Naveed Ahmed Azam, Umar Hayat, Hailiza Kamarulhaili:
A novel deterministic substitution box generator over elliptic curves for real-time applications. 219-236 - Yang Xu, Xuexian Hu, Jianghong Wei, Hongjian Yang, Kejia Li:
VF-CART: A communication-efficient vertical federated framework for the CART algorithm. 237-249 - Mehdi Malah
, Mounir Hemam
, Fayçal Abbas
:
3D face reconstruction from single image with generative adversarial networks. 250-256 - Md. Shahir Zaoad, M. M. Rushadul Mannan, Angshu Bikash Mandol
, Mostafizur Rahman, Md. Adnanul Islam
, Md. Mahbubur Rahman:
An attention-based hybrid deep learning approach for bengali video captioning. 257-269 - Yubo Wang, Shelesh Krishna Saraswat, Iraj Elyasi-Komari
:
Big data analysis using a parallel ensemble clustering architecture and an unsupervised feature selection approach. 270-282 - Shazia Riaz, Saqib Ali
, Guojun Wang, Asad Anees:
Differentially private block coordinate descent. 283-295 - Habibunnisha Nazeer, Nedumaran Damodaran:
FPGA-based point processing for denoising of the show-through effect in scanned document images. 296-309 - P. Karthik, P. Shanthi Bala, Akashdeep Bhardwaj
, Salil Bharany, Heejung Yu, Yousaf Bin Zikria:
A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses. 310-323 - Miao Tian, Yushu Zhang, Youwen Zhu, Wei Wang, Qihui Wu, Yong Xiang:
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds. 324-334 - Amina Tehseen, Toqeer Ehsan
, Hannan Bin Liaqat, Amjad Ali, Ala I. Al-Fuqaha
:
Neural POS tagging of shahmukhi by using contextualized word representations. 335-356 - Guozhi Li, Yan Tong, Ge Zhang, Yue Zeng:
An energy fault and consumption optimization strategy in wireless sensor networks with edge computing. 357-367 - Mansoureh Zare, Yasser Elmi Sola
, Hesam Hasanpour:
Towards distributed and autonomous IoT service placement in fog computing using asynchronous advantage actor-critic algorithm. 368-381 - Mingyang Li, Lipeng Hu, Jinjun Tang:
MSSRGO: A multimeta-model-based global optimization method using a selection-rank-based infill sampling strategy. 382-392 - Boyu Li, Kun He:
Local generalization and bucketization technique for personalized privacy preservation. 393-404 - Elmokhtar Rachdi
, Issam El Khadiri
, Youssef El Merabet, Y. Rhazi, Cyril Meurie:
Texture and material classification with multi-scale ternary and septenary patterns. 405-415 - Jingnan Li, Chuan Lin, Ruizhang Huang, Yongbin Qin, Yanping Chen:
Intention-guided deep semi-supervised document clustering via metric learning. 416-425 - Azza Ali, Mervat Abu-Elkheir, Ahmed Atwan, Mohammed Elmogy:
Missing values imputation using Fuzzy K-Top Matching Value. 426-437 - Zhanhua Zhang, Hanqiao Yu, Fangzhou Wang:
Opt-CoInfer: Optimal collaborative inference across IoT and cloud for fast and accurate CNN inference. 438-448 - Manaf Mohammed Ali Alhaidery, Amir Hossein Taherinia
, Haider Ismael Shahadi:
A robust detection and localization technique for copy-move forgery in digital images. 449-461 - Hanane Elfaik, El Habib Nfaoui
:
Leveraging feature-level fusion representations and attentional bidirectional RNN-CNN deep models for Arabic affect analysis on Twitter. 462-482 - Ashima Kukkar, Umesh Kumar Lilhore
, Jaroslav Frnda, Jasminder Kaur Sandhu, Rashmi Das, Nitin Goyal, Arun Kumar, Kamalakanta Muduli
, Filip Rezac:
ProRE: An ACO- based programmer recommendation model to precisely manage software bugs. 483-498 - Luca Gerevini, Gianni Cerro, Alessandro Bria, Claudio Marrocco, Luigi Ferrigno, Michele Vitelli
, Andrea Ria, Mario Molinara
:
An end-to-end real-time pollutants spilling recognition in wastewater based on the IoT-ready SENSIPLUS platform. 499-513 - Nakyoung Kim
, Hyeontaek Oh
, Jun Kyun Choi:
A privacy scoring framework: Automation of privacy compliance and risk evaluation with standard indicators. 514-525
Volume 35, Number 2, February 2023
- Mariem Turki, Saoussen Cheikhrouhou, Bouthaina Dammak, Mouna Baklouti, Rawya Mars, Afef Dhahbi:
NFT-IoT Pharma Chain : IoT Drug traceability system based on Blockchain and Non Fungible Tokens (NFTs). 527-543 - Zubair Sharif, Low Tang Jung, Muhammad Ayaz
, Mazlaini Yahya, Shahneela Pitafi:
Priority-based task scheduling and resource allocation in edge computing for health monitoring system. 544-559 - Chaosheng Tang
, Bin Li, Junding Sun, Shui-Hua Wang, Yudong Zhang:
GAM-SpCaNet: Gradient awareness minimization-based spinal convolution attention network for brain tumor classification. 560-575 - Dezhi An, Dawei Hao
, Ruoyu Zhao, Jun Lu, Yan Li, Yushu Zhang:
A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system. 576-589 - Asadullah Safi
, Satwinder Singh
:
A systematic literature review on phishing website detection techniques. 590-611 - Tanu Sharma
, Kamaldeep Kaur:
Aspect sentiment classification using syntactic neighbour based attention network. 612-625 - Sehrish Munawar Cheema
, Saman Tariq, Ivan Miguel Pires
:
A natural language interface for automatic generation of data flow diagram using web extraction techniques. 626-640 - Peiheng Jia, Jie Zhang, Bowen Zhao, Hongtao Li, Ximeng Liu:
Privacy-preserving association rule mining via multi-key fully homomorphic encryption. 641-650 - Beneyaz A. Begum
, Satyanarayana V. Nandury
:
Data aggregation protocols for WSN and IoT applications - A comprehensive survey. 651-681 - Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais:
An Enhanced Static Taint Analysis Approach to Detect Input Validation Vulnerability. 682-701 - Xianhui Deng
, Binyong Li, Shaowei Zhang, Liangming Deng:
Blockchain-based dynamic trust access control game mechanism. 702-725 - Osama Ahmed Khashan
, Nour Mahmoud Khafajah:
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. 726-739 - Tahir Mahmood, Jiho Choi, Kang Ryoung Park:
Artificial intelligence-based classification of pollen grains using attention-guided pollen features aggregation network. 740-756 - Ammar Mohammed
, Rania Kora:
A comprehensive review on ensemble deep learning: Opportunities and challenges. 757-774 - Yang Liu, Chaoqun Li, Yao Zhang, Mengying Xu, Jing Xiao, Jie Zhou:
DCC-IACJS: A novel bio-inspired duty cycle-based clustering approach for energy-efficient wireless sensor networks. 775-790 - Sudheer Mangalampalli
, Ganesh Reddy Karri
, Utku Kose
:
Multi objective trust aware task scheduling algorithm in cloud computing using whale optimization. 791-809 - Dianzhi Yu
, Jianwu Lin
, Tengbao Cao, Yang Chen, Mingfei Li, Xin Zhang
:
SECS: An effective CNN joint construction strategy for breast cancer histopathological image classification. 810-820 - Noureen Talpur
, Said Jadid Abdulkadir
, Emelia Akashah Patah Akhir
, Mohd Hilmi Hasan, Hitham Alhussian, Mohd Hafizul Afifi Abdullah:
A novel bitwise arithmetic optimization algorithm for the rule base optimization of deep neuro-fuzzy system. 821-842
Volume 35, Number 3, March 2023
- Zine El Abidine Bouneb:
An incremental approach to the n-queen problem with polynomial time. 1-7 - Ahmed Hany Fawzy, Khaled Wassif
, Hanan Moussa
:
Framework for automatic detection of anomalies in DevOps. 8-19 - Canh Hoang Ngoc, Minh Hieu Nguyen, Thuy Thu Thi Nguyen, Huy Quang Vu:
A novel method for designing indexes to support efficient substring queries on encrypted databases. 20-36 - Yang Lu
, Mengxin Gong, Lvchen Cao, Zhihua Gan, Xiuli Chai, Ang Li:
Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption. 37-58 - Qianfeng Lin
, Jooyoung Son, Hyeongseol Shin:
A self-learning mean optimization filter to improve bluetooth 5.1 AoA indoor positioning accuracy for ship environments. 59-73 - Muhammad Ayaz
, Mohammad Ammad Uddin, Zubair Sharif
, Mohammad Hijji, Ali Mansour:
A hybrid data collection scheme to achieve load balancing for underwater sensor networks. 74-86 - Zihao Chen, Alex Noel Joseph Raj, Vijayarajan Rajangam
, Wei Li
, Vijayalakshmi G. V. Mahesh, Zhemin Zhuang:
Twofold dynamic attention guided deep network and noise-aware mechanism for image denoising. 87-102 - Oumaima Chakir
, Abdeslam Rehaimi
, Yassine Sadqi, El Arbi Abdellaoui Alaoui, Moez Krichen, Gurjot Singh Gaba
, Andrei V. Gurtov
:
An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0. 103-119 - Zheng Tu
, Xu An Wang, Weidong Du, Zexi Wang, Ming Lv:
An improved multi-copy cloud data auditing scheme and its application. 120-130 - Hazem M. Bahig
, Khaled A. Fathy
:
Sequential and parallel sliding window algorithms for multiplying large integers. 131-140 - Ansam A. Abdulhussien
, Mohammad Faidzul Nasrudin, Saad M. Darwish, Zaid Abdi Alkareem Alyasseri:
Feature selection method based on quantum inspired genetic algorithm for Arabic signature verification. 141-156 - Zhijun Zhang, Hui Sun, Hajar Abutuqayqah:
An efficient and autonomous scheme for solving IoT service placement problem using the improved Archimedes optimization algorithm. 157-175 - Nauman Khan, Rosli Bin Salleh
, Anis Koubaa, Zahid Khan, Muhammad Khurram Khan
, Ihsan Ali:
Data plane failure and its recovery techniques in SDN: A systematic literature review. 176-201 - Da-Hee Yang, Joon-Hyuk Chang:
Attention-based latent features for jointly trained end-to-end automatic speech recognition with modified speech enhancement. 202-210 - Adnan Haider
, Muhammad Arsalan
, Se Hyun Nam, Haseeb Sultan, Kang Ryoung Park:
Computer-aided fish assessment in an underwater marine environment using parallel and progressive spatial information fusion. 211-226 - Pinar Savci, Bihter Das
:
Prediction of the customers' interests using sentiment analysis in e-commerce data for comparison of Arabic, English, and Turkish languages. 227-237 - Ammar Ali Neamah
:
An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal's matrix. 238-248 - Guangju Li, Dehu Jin, Qi Yu, Meng Qi:
IB-TransUNet: Combining Information Bottleneck and Transformer for Medical Image Segmentation. 249-258 - Guangsheng Chen, Hailiang Lu, Weitao Zou, Linhui Li, Mahmoud Emam
, Xuebin Chen, Weipeng Jing, Jian Wang, Chao Li
:
Spatiotemporal fusion for spectral remote sensing: A statistical analysis and review. 259-273 - Qiang Zhi
, Chenyang Guo, Zhengshu Zhou, Shuo Meng, Jianguo Ren
:
A lightweight secure retrieval model applied to intranet. 274-282 - Vyacheslav Petrenko
, Fariza Tebueva
, Vladimir Antonov
, Sergey Ryabtsev, Artur Sakolchik, Dina Satybaldina
:
Evaluation of the iterative method of task distribution in a swarm of unmanned aerial vehicles in a clustered field of targets. 283-291 - Hui Jin
, Senlei Zhang, Bin Zhang, Shuqin Dong, Xiaohu Liu, Hengwei Zhang
, Jinglei Tan
:
Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm. 292-302
Volume 35, Number 4, April 2023
- Faheem Iqbal, Moneeb Gohar, Hani Alquhayz, Seok-Joo Koh, Jin-Ghoo Choi:
Performance evaluation of AMQP over QUIC in the internet-of-thing networks. 1-9 - Hao Peng, Shixin Guo, Dandan Zhao, Yiming Wu, Jianming Han, Zhe Wang, Shouling Ji, Ming Zhong:
Query-efficient model extraction for text classification model in a hard label setting. 10-20 - Heling Cao, Fei Wang, Miaolei Deng, Xianyong Wang, Yonghe Chu:
Software multiple-fault localization using particle swarm optimization via genetic operation. 21-35 - Shanlin Zhou, Yan Gu, Hualong Yu
, Xibei Yang, Shang Gao:
RUE: A robust personalized cost assignment strategy for class imbalance cost-sensitive learning. 36-49 - Willy Fitra Hendria
, Vania Velda, Bahy Helmi Hartoyo Putra, Fikriansyah Adzaka, Cheol Jeong:
Action knowledge for video captioning with graph neural networks. 50-62 - Jianfeng Lu, Bangqi Pan, Juan Yu, Wenchao Jiang, Jianmin Han, Zhiwei Ye:
Towards energy-efficient and time-sensitive task assignment in cross-silo federated learning. 63-74 - Panchami V, Mahima Mary Mathews
:
A Substitution Box for Lightweight Ciphers to Secure Internet of Things. 75-89 - Fengkai Dong, Xiaoqiang Zou, Jiahui Wang, Xiyao Liu:
Contrastive learning-based general Deepfake detection with multi-scale RGB frequency clues. 90-99 - Jianhong Zhang, Chenghe Dong:
Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators. 100-111 - Ling Wang
, Jicang Lu, Yepeng Sun:
Knowledge graph representation learning model based on meta-information and logical rule enhancements. 112-125 - Martina Sestak, Muhamed Turkanovic:
Extended Property-level k-vertex Cardinality Constraints Model for Graph Databases. 126-138 - Tianhui Sha, Yong Peng
:
Orthogonal semi-supervised regression with adaptive label dragging for cross-session EEG emotion recognition. 139-151 - Bing Yang, Chen Wang
, Sai Ji, Yang Zhou, Nawab Muhammad Faseeh Qureshi:
An effective revocable and traceable public auditing scheme for sensor-based urban cities. 152-160 - Qing Wang, Jia Zhu
, Hongji Shu, Kwame Omono Asamoah, Jianyang Shi, Cong Zhou:
GUDN: A novel guide network with label reinforcement strategy for extreme multi-label text classification. 161-171 - M. Fathima Begum
, Subhashini Narayan:
A pattern mixture model with long short-term memory network for acute kidney injury prediction. 172-182 - Xiangbin Liu, Shufen Hou, Shuai Liu
, Weiping Ding, Yudong Zhang:
Attention-based multimodal glioma segmentation with multi-attention layers for small-intensity dissimilarity. 183-195 - Anwar Shah
, Bahar Ali, Masood Habib
, Jaroslav Frnda, Inam Ullah, Muhammad Shahid Anwar
:
An ensemble face recognition mechanism based on three-way decisions. 196-208 - Ako A. Jaafar
, Dayang N. A. Jawawi
, Mohd Adham Isa, Nor Azizah Saadon:
Service selection model based on user intention and context. 209-223 - Rini Wijayanti
, Masayu Leylia Khodra
, Kridanto Surendro, Dwi H. Widyantoro:
Learning bilingual word embedding for automatic text summarization in low resource language. 224-235
Volume 35, Number 5, May 2023
- Kayode Yakub Saheed
, Oluwadamilare Harazeem Abdulganiyu
, Taha Ait Tchakoucht:
A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures. 101532 - Hao Peng, Zhe Wang, Dandan Zhao, Yiming Wu, Jianming Han, Shixin Guo, Shouling Ji, Ming Zhong
:
Efficient text-based evolution algorithm to hard-label adversarial attacks on text. 101539 - Eman A. Abdel-Ghaffar
, Mohamed Daoudi:
Personal authentication and cryptographic key generation based on electroencephalographic signals. 101541 - Muhammad Umair Hassan, Saleh Alaliyat, Ibrahim A. Hameed:
Image generation models from scene graphs and layouts: A comparative analysis. 101543 - Fatima Boumahdi, Hadi Oqaibi
, Rachid Chalal, Hamza Hentabli, Amina Madani:
MDA4SOA+d: A new model driven architecture to supporting decision making in SOA. 101544 - Hao Chen, Jieyu Zhao:
3D Mesh classification and panoramic image segmentation using spherical vector networks with rotation-equivariant self-attention mechanism. 101546 - Jidong Lv, Yang Yang, Liangliang Niu, Xiaoqin Sun, Lingyun Wang, Wei Lin, Hailong Rong, Ling Zou:
Prediction of hand grip strength based on surface electromyographic signals. 101548 - Pengcheng Wei, Yushan Zeng, Bei Yan, Jiahui Zhou, Elaheh Nikougoftar:
VMP-A3C: Virtual machines placement in cloud computing based on asynchronous advantage actor-critic algorithm. 101549 - Abdul Alif Zakaria
, A. H. Azni
, Farida Ridzuan
, Nur Hafiza Zakaria, Maslina Daud:
Systematic literature review: Trend analysis on the design of lightweight block cipher. 101550 - Zineb Ellaky
, Faouzia Benabbou
, Sara Ouahabi
:
Systematic Literature Review of Social Media Bots Detection Systems. 101551 - A. N. Omara, Nouf Saeed Alotaibi:
BTGP: Enhancing the perceptual recovery of the image compressive sensing using a backtracking greedy pursuit algorithm. 101552 - Junding Sun, Jiuqiang Zhao, Xiaosheng Wu, Chaosheng Tang, Shuihua Wang, Yudong Zhang:
DSGA-Net: Deeply separable gated transformer and attention strategy for medical image segmentation network. 101553 - Nur 'Afifah Rusdi, Mohd Shareduwan Mohd Kasihmuddin, Nurul Atiqah Romli, Gaeithry Manoharam, Mohd. Asyraf Mansor:
Multi-unit Discrete Hopfield Neural Network for higher order supervised learning through logic mining: Optimal performance design and attribute selection. 101554 - Guowei Dai
, Jingchao Fan
, Zhimin Tian
, Chaoyu Wang
:
PPLC-Net:Neural network-based plant disease identification model supported by weather data augmentation and multi-level attention mechanism. 101555 - Seong In Jeong, Min Su Jeong, Seon Jong Kang, Kyung Bong Ryu, Kang Ryoung Park:
SDAN-MD: Supervised dual attention network for multi-stage motion deblurring in frontal-viewing vehicle-camera images. 101556 - Iyad Abu Doush, Basem H. Ahmed
, Mohammed A. Awadallah, Mohammed Azmi Al-Betar, Aaron Rasheed Rababaah:
Enhancing multilayer perceptron neural network using archive-based harris hawks optimizer to predict gold prices. 101557 - Boxing Zhang, Huan Lei, Yingjie Cai, Zhenyu Zhong, Zeyu Jiao:
COVID-19 contact tracking based on person reidentification and geospatial data. 101558 - Muhammad Imran Nadeem
, Kanwal Ahmed
, Zhiyun Zheng, Dun Li, Muhammad Assam, Yazeed Yasin Ghadi
, Fatemah H. Alghamedy, Elsayed Tag-Eldin:
SSM: Stylometric and semantic similarity oriented multimodal fake news detection. 101559