Citation Impact

Citing Papers

Modeling and analyses of IP spoofing attack in 6LoWPAN network
2017
A Secure Authentication Scheme for Telecare Medicine Information Systems
2010 Standout
A More Secure Authentication Scheme for Telecare Medicine Information Systems
2011 Standout
Internet of Medical Things (IOMT): Applications, Benefits and Future Challenges in Healthcare Domain
2017 Standout
Hyperspectral Image Classification Based on Semi-Supervised Rotation Forest
2017
A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids
2019 Standout
Discriminative Spatiotemporal Local Binary Pattern with Revisited Integral Projection for Spontaneous Facial Micro-Expression Recognition
2017
Cyber security of a power grid: State-of-the-art
2018
Industry 4.0: state of the art and future trends
2018 Standout
EEG Emotion Recognition Using Dynamical Graph Convolutional Neural Networks
2018 Standout
Mobile Applications to Improve Emotional Intelligence in Autism – A Review
2018 Standout
Wireless Networks With RF Energy Harvesting: A Contemporary Survey
2014 Standout
Survivable RFID Systems: Issues, Challenges, and Techniques
2010
An Emotion Recognition System for Mobile Applications
2017
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
2017 Standout
Hybrid privacy-preserving clinical decision support system in fog–cloud computing
2017
Embedding Blockchain Technology Into IoT for Security: A Survey
2021
A Facial-Expression Monitoring System for Improved Healthcare in Smart Cities
2017
Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions
2017
Blockchain Security: A Survey of Techniques and Research Directions
2020
How to protect security and privacy in the IoT: a policy‐based RFID tag management protocol
2011
Energy system resilience – A review
2021 Standout
Enhancement of Patient Facial Recognition through Deep Learning Algorithm: ConvNet
2021 Standout
Cyber-physical systems and their security issues
2018 Standout
Infrared and visible image fusion methods and applications: A survey
2018 Standout
BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation
2018
A survey on ensemble learning
2019 Standout
20 years of Electronic Commerce Research
2021 Standout
Synergetic Classification of Long-Wave Infrared Hyperspectral and Visible Images
2015
The Internet of Things: Review and theoretical framework
2019 Standout
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
2018
Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city
2020 Standout
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
DAG-based attack and defense modeling: Don’t miss the forest for the attack trees
2014
INFO: An efficient optimization algorithm based on weighted mean of vectors
2022 Standout
GPU-Accelerated Compression and Visualization of Large-Scale Vessel Trajectories in Maritime IoT Industries
2020
A Survey on Internet of Things and Cloud Computing for Healthcare
2019 Standout
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
A SWOT analysis of ChatGPT: Implications for educational practice and research
2023 Standout
Deep Learning-Powered Vessel Trajectory Prediction for Improving Smart Traffic Services in Maritime Internet of Things
2022 Standout
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
2020 Standout
Information Security in Big Data: Privacy and Data Mining
2014
Secure State Estimation and Control of Cyber-Physical Systems: A Survey
2020 Standout
A survey on blockchain technology and its security
2022 Standout
A survey of approaches combining safety and security for industrial control systems
2015 Standout
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
2019
Automatic facial expression recognition using features of salient facial patches
2014
Hunger games search: Visions, conception, implementation, deep analysis, perspectives, and towards performance shifts
2021
The design of an m-Health monitoring system based on a cloud computing platform
2015
A Micro-GA Embedded PSO Feature Selection Approach to Intelligent Facial Emotion Recognition
2016 Standout
The Impact of Artificial Intelligence and Blockchain on the Accounting Profession
2020 Standout
Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities
2019
ECC-based untraceable authentication for large-scale active-tag RFID systems
2014

Works of Raphaël C.‐W. Phan being referenced

Quality of detectability (QoD) and QoD-aware AAT-based attack detection
2010
Vickrey-Clarke-Groves for privacy-preserving collaborative classification
2013
On the security & design of MyKad
2004
Augmented attack tree modeling of SQL injection attacks
2010
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
2008
Sparsity in Dynamics of Spontaneous Subtle Emotions: Analysis and Application
2016
Optical strain based recognition of subtle emotions
2014
Authenticated Modbus Protocol for Critical Infrastructure Protection
2012
Monogenic Riesz wavelet representation for micro-expression recognition
2015
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification
2013
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
2014
Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI
2009
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU
2018
Detection of energy theft and defective smart meters in smart grids using linear regression
2017
Attribution of attack trees
2011
Effective recognition of facial micro-expressions with video motion magnification
2016
Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis
2012
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption
2017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
2015
Rankless by CCL
2026