Mesfer Al Duhayyim

1.6k total citations
136 papers, 958 citations indexed

About

Mesfer Al Duhayyim is a scholar working on Artificial Intelligence, Computer Networks and Communications and Computer Vision and Pattern Recognition. According to data from OpenAlex, Mesfer Al Duhayyim has authored 136 papers receiving a total of 958 indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Artificial Intelligence, 50 papers in Computer Networks and Communications and 32 papers in Computer Vision and Pattern Recognition. Recurrent topics in Mesfer Al Duhayyim's work include Network Security and Intrusion Detection (28 papers), Advanced Malware Detection Techniques (21 papers) and IoT and Edge/Fog Computing (14 papers). Mesfer Al Duhayyim is often cited by papers focused on Network Security and Intrusion Detection (28 papers), Advanced Malware Detection Techniques (21 papers) and IoT and Edge/Fog Computing (14 papers). Mesfer Al Duhayyim collaborates with scholars based in Saudi Arabia, Egypt and Yemen. Mesfer Al Duhayyim's co-authors include Fahd N. Al‐Wesabi, Abdelwahed Motwakel, Anwer Mustafa Hilal, Manar Ahmed Hamza, Abu Sarwar Zamani, Mohamed K. Nour, Ishfaq Yaseen, Saud S. Alotaibi, Mohammed Rizwanullah and Marwa Obayya and has published in prestigious journals such as Scientific Reports, IEEE Access and Sensors.

In The Last Decade

Mesfer Al Duhayyim

116 papers receiving 897 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mesfer Al Duhayyim Saudi Arabia 16 320 248 144 121 114 136 958
Sarita Simaiya India 18 333 1.0× 347 1.4× 105 0.7× 208 1.7× 68 0.6× 88 1.2k
Manar Ahmed Hamza Saudi Arabia 16 333 1.0× 226 0.9× 199 1.4× 130 1.1× 105 0.9× 140 998
Pundru Chandra Shaker Reddy India 23 421 1.3× 158 0.6× 113 0.8× 84 0.7× 64 0.6× 93 1.1k
Maruthi Rohit Ayyagari United States 7 326 1.0× 129 0.5× 178 1.2× 77 0.6× 93 0.8× 10 940
Ashit Kumar Dutta Saudi Arabia 15 302 0.9× 159 0.6× 180 1.3× 124 1.0× 48 0.4× 159 1.1k
Saud S. Alotaibi Saudi Arabia 21 353 1.1× 186 0.8× 448 3.1× 101 0.8× 86 0.8× 111 1.2k
Piyush Kumar Pareek India 19 321 1.0× 219 0.9× 176 1.2× 153 1.3× 94 0.8× 173 1.0k
Ahmed A. Elngar Egypt 14 326 1.0× 119 0.5× 215 1.5× 111 0.9× 41 0.4× 84 855
S. Vimal India 19 376 1.2× 163 0.7× 157 1.1× 107 0.9× 48 0.4× 68 1.2k
Abdelwahed Motwakel Saudi Arabia 16 368 1.1× 272 1.1× 175 1.2× 101 0.8× 141 1.2× 150 942

Countries citing papers authored by Mesfer Al Duhayyim

Since Specialization
Citations

This map shows the geographic impact of Mesfer Al Duhayyim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mesfer Al Duhayyim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mesfer Al Duhayyim more than expected).

Fields of papers citing papers by Mesfer Al Duhayyim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mesfer Al Duhayyim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mesfer Al Duhayyim. The network helps show where Mesfer Al Duhayyim may publish in the future.

Co-authorship network of co-authors of Mesfer Al Duhayyim

This figure shows the co-authorship network connecting the top 25 collaborators of Mesfer Al Duhayyim. A scholar is included among the top collaborators of Mesfer Al Duhayyim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mesfer Al Duhayyim. Mesfer Al Duhayyim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Wan, et al.. (2024). Deep learning-based photoplethysmography biometric authentication for continuous user verification. Applied Soft Computing. 156. 111461–111461. 4 indexed citations
2.
Maashi, Mashael, Eatedal Alabdulkreem, Noha Negm, et al.. (2024). Energy efficiency optimization for 6G multi-IRS multi-cell NOMA vehicle-to-infrastructure communication networks. Computer Communications. 225. 350–360.
3.
Alotaibi, Faiz Abdullah, et al.. (2024). Modeling of Hyperparameter Tuned Fuzzy Deep Neural Network–Based Human Activity Recognition for Disabled People. Journal of Mathematics. 2024(1).
5.
Nour, Mohamed K., Hassan A. Alshamrani, Mesfer Al Duhayyim, et al.. (2023). Gender Identification Using Marginalised Stacked Denoising Autoencoders on Twitter Data. Intelligent Automation & Soft Computing. 36(3). 2529–2544. 1 indexed citations
6.
Duhayyim, Mesfer Al, Jaber S. Alzahrani, Abdullah Mohamed, et al.. (2023). Multi-Versus Optimization with Deep Reinforcement Learning Enabled Affect Analysis on Arabic Corpus. Computer Systems Science and Engineering. 47(3). 3049–3065. 1 indexed citations
7.
Alalayah, Khaled M., Fatma S. Alrayes, Jaber S. Alzahrani, et al.. (2023). Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment. Computer Systems Science and Engineering. 46(3). 3121–3139. 8 indexed citations
8.
Duhayyim, Mesfer Al, et al.. (2023). An Ensemble Machine Learning Technique for Stroke Prognosis. Computer Systems Science and Engineering. 47(1). 413–429. 7 indexed citations
9.
Alohali, Manal Abdullah, et al.. (2023). Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme. Computer Systems Science and Engineering. 46(3). 3583–3598. 4 indexed citations
10.
Alalayah, Khaled M., Fatma S. Alrayes, Mohamed K. Nour, et al.. (2023). Learning-Based Artificial Algae Algorithm with Optimal Machine Learning Enabled Malware Detection. Computer Systems Science and Engineering. 46(3). 3103–3119.
11.
Alohali, Manal Abdullah, et al.. (2023). Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment. Applied Sciences. 13(4). 2580–2580. 14 indexed citations
12.
Alrowais, Fadwa, Noha Negm, Majdi Khalid, et al.. (2023). Modified Earthworm Optimization With Deep Learning Assisted Emotion Recognition for Human Computer Interface. IEEE Access. 11. 35089–35096. 7 indexed citations
13.
Duhayyim, Mesfer Al. (2023). Parameter-Tuned Deep Learning-Enabled Activity Recognition for Disabled People. Computers, materials & continua/Computers, materials & continua (Print). 75(3). 6587–6603. 6 indexed citations
14.
Duhayyim, Mesfer Al, Heba G. Mohamed, Jaber S. Alzahrani, et al.. (2022). Sandpiper Optimization with a Deep Learning Enabled Fault Diagnosis Model for Complex Industrial Systems. Electronics. 11(24). 4190–4190. 5 indexed citations
15.
Duhayyim, Mesfer Al, Areej Malibari, Abdullah Alharbi, et al.. (2022). Road Damage Detection Using the Hunger Games Search with Elman Neural Network on High-Resolution Remote Sensing Images. Remote Sensing. 14(24). 6222–6222. 9 indexed citations
16.
Duhayyim, Mesfer Al, Heba G. Mohamed, Jaber S. Alzahrani, et al.. (2022). Modeling of Fuzzy Cognitive Maps with a Metaheuristics-Based Rainfall Prediction System. Sustainability. 15(1). 25–25. 2 indexed citations
17.
Alrowais, Fadwa, Saud S. Alotaibi, Fahd N. Al‐Wesabi, et al.. (2022). Deep Transfer Learning Enabled Intelligent Object Detection for Crowd Density Analysis on Video Surveillance Systems. Applied Sciences. 12(13). 6665–6665. 14 indexed citations
18.
Alqahtani, Hamed, Saud S. Alotaibi, Fatma S. Alrayes, et al.. (2022). Evolutionary Algorithm with Deep Auto Encoder Network Based Website Phishing Detection and Classification. Applied Sciences. 12(15). 7441–7441. 8 indexed citations
19.
Alissa, Khalid, Dalia H. Elkamchouchi, Ayman Yafoz, et al.. (2022). Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment. Applied Sciences. 12(19). 9513–9513. 24 indexed citations
20.
Shaiba, Hadil, Ayman Yafoz, Raed Alsini, et al.. (2022). Feature Subset Selection Hybrid Deep Belief Network Based Cybersecurity Intrusion Detection Model. Electronics. 11(19). 3077–3077. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026