[Retracted] Deep Learning‐Based Sentiment Analysis of COVID‐19 Vaccination Responses from Twitter Data KN Alam, MS Khan, AR Dhruba, MM Khan, JF Al-Amri, M Masud, ... Computational and Mathematical Methods in Medicine 2021 (1), 4321131, 2021 | 102 | 2021 |
A sequential roadmap to Industry 6.0: Exploring future manufacturing trends AS Duggal, PK Malik, A Gehlot, R Singh, GS Gaba, M Masud, JF Al‐Amri Iet Communications 16 (5), 521-531, 2022 | 85 | 2022 |
Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications OS Faragallah, A Afifi, W El-Shafai, HS El-Sayed, EA Naeem, MA Alzain, ... IEEE Access 8, 42491-42503, 2020 | 72 | 2020 |
Block-based optical color image encryption based on double random phase encoding OS Faragallah, MA Alzain, HS El-Sayed, JF Al-Amri, W El-Shafai, A Afifi, ... IEEE Access 7, 4184-4194, 2018 | 66 | 2018 |
Secure color image cryptosystem based on chaotic logistic in the FrFT domain OS Faragallah, MA AlZain, HS El-Sayed, JF Al-Amri, W El-Shafai, A Afifi, ... Multimedia Tools and Applications 79, 2495-2519, 2020 | 55 | 2020 |
Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication OS Faragallah, W El-Shafai, AI Sallam, I Elashry, ESM EL-Rabaie, A Afifi, ... Journal of Ambient Intelligence and Humanized Computing, 1-25, 2022 | 49 | 2022 |
Efficiently encrypting color images with few details based on RC6 and different operation modes for cybersecurity applications OS Faragallah, A Afifi, W El-Shafai, HS El-Sayed, MA Alzain, JF Al-Amri, ... IEEE Access 8, 103200-103218, 2020 | 46 | 2020 |
Evaluation of sentiment analysis via word embedding and RNN variants for Amazon online reviews NM Alharbi, NS Alghamdi, EH Alkhammash, JF Al Amri Mathematical Problems in Engineering 2021 (1), 5536560, 2021 | 45 | 2021 |
Improvement of PMSG-based wind energy conversion system using developed sliding mode control B Majout, B Bossoufi, M Bouderbala, M Masud, JF Al-Amri, M Taoussi, ... Energies 15 (5), 1625, 2022 | 42 | 2022 |
Development of IoT Based Fish Monitoring System for Aquaculture. AT Tamim, H Begum, SA Shachcho, MM Khan, B Yeboah-Akowuah, ... Intelligent Automation & Soft Computing 32 (1), 2022 | 41 | 2022 |
Efficient HEVC integrity verification scheme for multimedia cybersecurity applications OS Faragallah, A Afifi, HS El-Sayed, MA Alzain, JF Al-Amri, ... IEEE Access 8, 167069-167089, 2020 | 41 | 2020 |
A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability KY Najmi, MA AlZain, M Masud, NZ Jhanjhi, J Al-Amri, M Baz Materials Today: Proceedings 81, 377-382, 2023 | 39 | 2023 |
[Retracted] Predicting the Risk of Depression Based on ECG Using RNN ST Noor, ST Asad, MM Khan, GS Gaba, JF Al-Amri, M Masud Computational intelligence and neuroscience 2021 (1), 1299870, 2021 | 34 | 2021 |
Four most famous cyber attacks for financial gains AF Altwairqi, MA AlZain, B Soh, M Masud, J Al-Amri Int. J. Eng. Adv. Technol 9, 2131-2139, 2019 | 28 | 2019 |
Cyber attacks and impacts: A case study in saudi arabia RK Alqurashi, MA AlZain, B Soh, M Masud, J Al-Amri International Journal 9 (1), 10, 2020 | 25 | 2020 |
Hybrid computational modeling for web application security assessment AH Seh, JF Al-Amri, AF Subahi, MTJ Ansari, R Kumar, MU Bokhari, ... CMC-Comput., Mater. Continua 70 (1), 469-489, 2022 | 21 | 2022 |
Healthcare device security assessment through computational methodology. M Ahmad, JF Al-Amri, AF Subahi, S Khatri, AH Seh, M Nadeem, ... Computer Systems Science & Engineering 41 (2), 2022 | 19 | 2022 |
Associating measles vaccine uptake classification and its underlying factors using an ensemble of machine learning models MK Hasan, MT Jawad, A Dutta, MA Awal, MA Islam, M Masud, JF Al-Amri IEEE Access 9, 119613-119628, 2021 | 19 | 2021 |
Application of data steganographic method in video sequences using histogram shifting in the discrete wavelet transform MA AlZain, JF Al-Amri International Journal of Applied Engineering Research 13 (8), 6380-6387, 2018 | 18 | 2018 |
Multi-level hesitant fuzzy based model for usable-security assessment M Nadeem, JF Al-Amri, AF Subahi, AH Seh, SA Khan, A Agrawal, ... Intelligent Automation & Soft Computing 31 (1), 61-82, 2022 | 17 | 2022 |