Citation Impact
Citing Papers
State-of-the-art in artificial neural network applications: A survey
2018 Standout
Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems
2017 Standout
The Precision-Recall Plot Is More Informative than the ROC Plot When Evaluating Binary Classifiers on Imbalanced Datasets
2015 Standout
A systematic study of the class imbalance problem in convolutional neural networks
2018 Standout
AdaBoost-Based Algorithm for Network Intrusion Detection
2008
A systematic review shows no performance benefit of machine learning over logistic regression for clinical prediction models
2019 Standout
An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics
2013 Standout
The Whale Optimization Algorithm
2016 Standout
Deep Learning Approach for Intelligent Intrusion Detection System
2019 Standout
Learning from Imbalanced Data
2009 Standout
Marine Predators Algorithm: A nature-inspired metaheuristic
2020 Standout
SCA: A Sine Cosine Algorithm for solving optimization problems
2016 Standout
Secure attribute-based data sharing for resource-limited users in cloud computing
2017
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
2023 Standout
Chimp optimization algorithm
2020 Standout
Mobility-Aware Multi-Hop Task Offloading for Autonomous Driving in Vehicular Edge Computing and Networks
2022 Standout
TraceChain: A blockchain‐based scheme to protect data confidentiality and traceability
2019
Multi-Verse Optimizer: a nature-inspired algorithm for global optimization
2015 Standout
A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
2017 Standout
Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
2020
MWMOTE--Majority Weighted Minority Oversampling Technique for Imbalanced Data Set Learning
2012 Standout
Beluga whale optimization: A novel nature-inspired metaheuristic algorithm
2022 Standout
Two-Factor Authentication for IoT With Location Information
2018
KGMO: A swarm optimization algorithm based on the kinetic energy of gas molecules
2014
Water wave optimization: A new nature-inspired metaheuristic
2014 Standout
Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network
2019 Standout
Intrusion detection using reduced-size RNN based on feature grouping
2010
Multiclass Imbalance Problems: Analysis and Potential Solutions
2012
Grasshopper Optimisation Algorithm: Theory and application
2017 Standout
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
An intrusion detection system using network traffic profiling and online sequential extreme learning machine
2015
Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
2022 Standout
Transforming geocentric cartesian coordinates to geodetic coordinates by using differential search algorithm
2011 Standout
Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm
2015 Standout
The Ant Lion Optimizer
2015 Standout
A Systematic Literature Review on Fault Prediction Performance in Software Engineering
2011 Standout
Improving imbalanced learning through a heuristic oversampling method based on k-means and SMOTE
2018 Standout
Harris hawks optimization: Algorithm and applications
2019 Standout
Grey Wolf Optimizer
2014 Standout
Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios
2018
Effective data generation for imbalanced learning using conditional generative adversarial networks
2017 Standout
Learning from class-imbalanced data: Review of methods and applications
2016 Standout
Equilibrium optimizer: A novel optimization algorithm
2019 Standout
The Arithmetic Optimization Algorithm
2021 Standout
INFO: An efficient optimization algorithm based on weighted mean of vectors
2022 Standout
A novel swarm intelligence optimization approach: sparrow search algorithm
2020 Standout
New certificateless short signature scheme
2013
Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition
2019 Standout
Black hole: A new heuristic optimization approach for data clustering
2012
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus
2018 Standout
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
Multiscale Convolutional Neural Networks for Fault Diagnosis of Wind Turbine Gearbox
2018 Standout
Aquila Optimizer: A novel meta-heuristic optimization algorithm
2021 Standout
An efficient improvement remote user mutual authentication and session key agreement scheme for E-health care systems
2016
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security
2018
Survey on deep learning with class imbalance
2019 Standout
A novel physical based meta-heuristic optimization method known as Lightning Attachment Procedure Optimization
2017 Standout
A new meta-heuristic method: Ray Optimization
2012 Standout
A modified Bee Colony Optimization (MBCO) and its hybridization with k-means for an application to data clustering
2018 Standout
FogHA: An efficient handover authentication for mobile devices in fog computing
2021
A review of novelty detection
2014 Standout
GSA: A Gravitational Search Algorithm
2009 Standout
Generalizing from a Few Examples
2020 Standout
Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
2018
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
2018 Standout
Works of Kefei Chen being referenced
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
2011
A genetic clustering method for intrusion detection
2004
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
2015
Self-generated-certificate public key encryption without pairing and its application
2011
Efficient Classification of Multi-label and Imbalanced Data using Min-Max Modular Classifiers
2006
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
2016
A tabu search approach for the minimum sum-of-squares clustering problem
2008
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
2017
Insight of the protection for data security under selective opening attacks
2017
Efficient Classification of Multi-label and Imbalanced Data using Min-Max Modular Classifiers
2006