Skip to main content

Articles

Page 1 of 18

  1. Internet of Things (IoT) devices are widely used but also vulnerable to cyberattacks that can cause security issues. To protect against this, machine learning approaches have been developed for network intrusi...

    Authors: Jing Li, Mohd Shahizan Othman, Hewan Chen and Lizawati Mi Yusuf
    Citation: Journal of Big Data 2024 11:36
  2. Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities. Machine Learni...

    Authors: Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Khondokar Fida Hasan, Selina Sharmin, Salem A. Alyami and Mohammad Ali Moni
    Citation: Journal of Big Data 2024 11:33
  3. The flourishing realm of advanced driver-assistance systems (ADAS) as well as autonomous vehicles (AVs) presents exceptional opportunities to enhance safe driving. An essential aspect of this transformation in...

    Authors: Fangming Qu, Nolan Dang, Borko Furht and Mehrdad Nojoumian
    Citation: Journal of Big Data 2024 11:32
  4. Google trends (GT), a service aggregating search queries on Google, has been used to predict various outcomes such as as the spread of influenza, automobile sales, unemployment claims, and travel destination p...

    Authors: Jan Behnert, Dean Lajic and Paul C. Bauer
    Citation: Journal of Big Data 2024 11:30
  5. The recruitment of thermogenic adipocytes in human fat depots markedly improves metabolic disorders such as type 2 diabetes mellitus (T2DM). However, identification and quantification of thermogenic cells in h...

    Authors: Yuxin Wang, Shiman Zuo, Nanfei Yang, Ani Jian, Wei Zheng, Zichun Hua and Pingping Shen
    Citation: Journal of Big Data 2024 11:29
  6. Pre-trained BERT models have demonstrated exceptional performance in the context of text classification tasks. Certain problem domains necessitate data distribution without data sharing. Federated Learning (FL...

    Authors: Omar Galal, Ahmed H. Abdel-Gawad and Mona Farouk
    Citation: Journal of Big Data 2024 11:28
  7. Patents are indicators of technological developments. The science & technology categories, to which they are assigned to, form a directed, weighted network where the links are the references between patents be...

    Authors: József Baranyi, Szilveszter Csorba, Zsuzsa Farkas, Tünde Pacza and Ákos Józwiak
    Citation: Journal of Big Data 2024 11:27
  8. Recent evidence suggests that allergic asthma (AA) decreases the risk of Coronavirus Disease 2019 (COVID-19). However, the reasons remain unclear. Here, we systematically explored data from GWAS (18 cohorts wi...

    Authors: Hua Liu, Siting Huang, Liting Yang, Hongshu Zhou, Bo Chen, Lisha Wu and Liyang Zhang
    Citation: Journal of Big Data 2024 11:26
  9. Credit risk prediction is a crucial task for financial institutions. The technological advancements in machine learning, coupled with the availability of data and computing power, has given rise to more credit...

    Authors: Ileberi Emmanuel, Yanxia Sun and Zenghui Wang
    Citation: Journal of Big Data 2024 11:23
  10. The extensive use of HPC infrastructures and frameworks for running data-intensive applications has led to a growing interest in data partitioning techniques and strategies. In fact, application performance ca...

    Authors: Riccardo Cantini, Fabrizio Marozzo, Alessio Orsino, Domenico Talia, Paolo Trunfio, Rosa M. Badia, Jorge Ejarque and Fernando Vázquez-Novoa
    Citation: Journal of Big Data 2024 11:19
  11. Deep learning has seen significant growth recently and is now applied to a wide range of conventional use cases, including graphs. Graph data provides relational information between elements and is a standard ...

    Authors: Bharti Khemani, Shruti Patil, Ketan Kotecha and Sudeep Tanwar
    Citation: Journal of Big Data 2024 11:18
  12. Many video platforms rely on the descriptions that uploaders provide for video retrieval. However, this reliance may cause inaccuracies. Although deep learning-based video captioning can resolve this problem, ...

    Authors: Norah Alrebdi and Amal A. Al-Shargabi
    Citation: Journal of Big Data 2024 11:17
  13. This paper proposes an intelligent hybrid model that leverages machine learning and artificial intelligence to enhance the security of Wireless Sensor Networks (WSNs) by identifying and preventing cyberattacks...

    Authors: Mohamed H. Behiry and Mohammed Aly
    Citation: Journal of Big Data 2024 11:16
  14. This paper introduces a new transformer-based model for the problem of travel time estimation. The key feature of the proposed GCT-TTE architecture is the utilization of different data modalities capturing dif...

    Authors: Vladimir Mashurov, Vaagn Chopuryan, Vadim Porvatov, Arseny Ivanov and Natalia Semenova
    Citation: Journal of Big Data 2024 11:15
  15. Chest diseases, especially COVID-19, have quickly spread throughout the world and caused many deaths. Finding a rapid and accurate diagnostic tool was indispensable to combating these diseases. Therefore, scie...

    Authors: Mohamed Abdel-Basset, Reda Mohamed, Ibrahim Alrashdi, Karam M. Sallam and Ibrahim A. Hameed
    Citation: Journal of Big Data 2024 11:13
  16. The earliest detection of rumors across social media is the need to the hour in present global village. User’s are seamlessly connected in an unstructured network leading to rapid flow of information. User’s o...

    Authors: Zafran Khan, Jeonghwan Gwak, Naima Iltaf, Witold Pedrycz and Moongu Jeon
    Citation: Journal of Big Data 2024 11:12
  17. Blockchain and machine learning are two rapidly growing technologies that are increasingly being used in various industries. Blockchain technology provides a secure and transparent method for recording transac...

    Authors: Safak Kayikci and Taghi M. Khoshgoftaar
    Citation: Journal of Big Data 2024 11:9
  18. In the domain of Medicare insurance fraud detection, handling imbalanced Big Data and high dimensionality remains a significant challenge. This study assesses the combined efficacy of two data reduction techni...

    Authors: John T. Hancock, Huanjing Wang, Taghi M. Khoshgoftaar and Qianxin Liang
    Citation: Journal of Big Data 2024 11:8
  19. There is currently no consensus on the impact of class imbalance methods on the performance of clinical prediction models. We aimed to empirically investigate the impact of random oversampling and random under...

    Authors: Cynthia Yang, Egill A. Fridgeirsson, Jan A. Kors, Jenna M. Reps and Peter R. Rijnbeek
    Citation: Journal of Big Data 2024 11:7
  20. Distributed deep learning is a promising approach for training and deploying large and complex deep learning models. This paper presents a comprehensive workflow for deploying and optimizing the YOLACT instanc...

    Authors: Mohammed Elhmadany, Islam Elmadah and Hossam E. Abdelmunim
    Citation: Journal of Big Data 2024 11:6
  21. 3D road user detection is an essential task for autonomous vehicles and mobile robots, and it plays a key role, for instance, in obstacle avoidance and route planning tasks. Existing solutions for detection re...

    Authors: Alvari Seppänen, Eerik Alamikkotervo, Risto Ojala, Giacomo Dario and Kari Tammi
    Citation: Journal of Big Data 2024 11:2
  22. The tasks of few-shot, one-shot, and zero-shot learning—or collectively “low-shot learning” (LSL)—at first glance are quite similar to the long-standing task of class imbalanced learning; specifically, they ai...

    Authors: Preston Billion Polak, Joseph D. Prusa and Taghi M. Khoshgoftaar
    Citation: Journal of Big Data 2024 11:1
  23. Flight delay prediction is one of the most significant components of intelligent aviation systems that may spread throughout the whole aviation network and cause multi-billion-dollar losses faced by airlines a...

    Authors: Maged Mamdouh, Mostafa Ezzat and Hesham A.Hefny
    Citation: Journal of Big Data 2023 10:179
  24. In smart cities, communication and information exchange for the Internet of Vehicles rely on open and closed infrastructures along the roadside. Secure communications rely on the sender and receiver devices ha...

    Authors: Nadhir Ben Halima, Ala Saleh Alluhaidan, Mohammad Zunnun Khan, Mohd Shahid Husain and Mohammad Ayoub Khan
    Citation: Journal of Big Data 2023 10:178
  25. Machine learning (ML) methods for uncovering single nucleotide polymorphisms (SNPs) in genome-wide association study (GWAS) data that can be used to predict disease outcomes are becoming increasingly used in g...

    Authors: R. Onur Öztornaci, Hamzah Syed, Andrew P. Morris and Bahar Taşdelen
    Citation: Journal of Big Data 2023 10:174
  26. In this big data era, multitudes of data are generated and collected which contain the potential to gain new insights, e.g., for enhancing business models. To leverage this potential through, e.g., data scienc...

    Authors: Rebecca Eichler, Christoph Gröger, Eva Hoos, Christoph Stach, Holger Schwarz and Bernhard Mitschang
    Citation: Journal of Big Data 2023 10:173
  27. Distributed database system (DDBS) design is still an open challenge even after decades of research, especially in a dynamic network setting. Hence, to meet the demands of high-speed data gathering and for the...

    Authors: Hassan I. Abdalla, Ali A. Amer and Sri Devi Ravana
    Citation: Journal of Big Data 2023 10:172
  28. Recently, governments and organizations have repeatedly pressed manufacturing enterprises to promote the ethical and transparent use of natural resources, lessen their negative effects on national and internat...

    Authors: Lahcen Tamym, Lyes Benyoucef, Ahmed Nait Sidi Moh and Moulay Driss El Ouadghiri
    Citation: Journal of Big Data 2023 10:170
  29. The search-engine-based surveillance methods for the early warning and prediction of infectious diseases cannot achieve search engine keywords automatic filtering and real-time updating, lead to powerless for ...

    Authors: Ligui Wang, Yuqi Liu, Hui Chen, Shaofu Qiu, Yonghong Liu, Mingjuan Yang, Xinying Du, Zhenjun Li, Rongzhang Hao, Huaiyu Tian and Hongbin Song
    Citation: Journal of Big Data 2023 10:169
  30. The task of insights extraction from unstructured text poses significant challenges for big data analytics because it contains subjective intentions, different contextual perspectives, and information about th...

    Authors: Kiran Adnan, Rehan Akbar and Khor Siak Wang
    Citation: Journal of Big Data 2023 10:168
  31. Network intrusion detection systems (NIDSs) are one of the main tools used to defend against cyber-attacks. Deep learning has shown remarkable success in network intrusion detection. However, the effect of fea...

    Authors: Abiodun Ayantayo, Amrit Kaur, Anit Kour, Xavier Schmoor, Fayyaz Shah, Ian Vickers, Paul Kearney and Mohammed M. Abdelsamea
    Citation: Journal of Big Data 2023 10:167

Annual Journal Metrics

  • 2022 Citation Impact
    8.1 - 2-year Impact Factor
    5.095 - SNIP (Source Normalized Impact per Paper)
    2.714 - SJR (SCImago Journal Rank)

    2022 Speed
    85 days submission to first editorial decision for all manuscripts (Median)
    181 days submission to accept (Median)

    2022 Usage
    2,250,289 downloads
    1,798 Altmetric mentions