Computer Journal

Papers
(The TQCC of Computer Journal is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications151
Some Scheduling Problems With Job Rejection And A Learning Effect102
Accelerating Analytics Using Improved Binary Particle Swarm Optimization for Discrete Feature Selection78
Sentiment Classification of Tourist’s Opinion on Tourist Places of Interest in South India using Tweet Reviews43
Low-Data Cryptanalysis On SKINNY Block Cipher42
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON41
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem39
Online Optimization Method of Learning Process for Meta-Learning37
Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges36
2L-LSH: A Locality-Sensitive Hash Function-Based Method For Rapid Point Cloud Indexing26
Multi-key Fully Homomorphic Encryption from Additive Homomorphism23
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT23
Special Issue on Failed Approaches and Insightful Losses in Cryptology — Foreword23
Towards Accurate Smartphone Localization Using CSI Measurements21
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters19
Developing an intelligent framework with Blockchain capabilities for environmental monitoring using a CubeSat18
A hybrid architecture for secure data sharing in multi-clouds system18
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda16
Residual Closeness, Matching Number and Chromatic Number15
Gaze Estimation Using Neural Network And Logistic Regression15
Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers15
CWOA: Hybrid Approach for Task Scheduling in Cloud Environment15
GUI: A Geolocation Method for Unreachable IP14
DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic14
PCDP-CRLPPM: a classified regional location privacy-protection model based on personalized clustering with differential privacy in data management14
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation14
Lung Lobe Segmentation and Feature Extraction-Based Hierarchical Attention Network for COVID-19 Prediction from Chest X-Ray Images14
Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations13
Mining Frequent Serial Positioning Episode Rules with Forward and Backward Search Technique from Event Sequences13
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT13
On the g-Extra Connectivity of the Enhanced Hypercubes13
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube12
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction12
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers11
K-Nearest neighbor smart contract classification with semantic feature enhancement11
Reliability Analysis of the Cactus-Based Networks Based on Subsystem11
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications11
Influence Maximization in Social Networks Using an Improved Multi-Objective Particle Swarm Optimization11
Reliable broadcasting-based content acquisition for named data MANETs11
Severity Level Classification of Brain Tumor based on MRI Images using Fractional-Chicken Swarm Optimization Algorithm10
GitHub project recommendation based on knowledge graph and developer similarity10
Spatial-Aware Multi-Directional Autoencoder For Pre-Training10
Coverless Image Steganography Using Content-Based Image Patch Retrieval10
Prediction of Student Performance Using Random Forest Combined With Naïve Bayes10
An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects10
Attack-Oblivious Node Protection Strategy for survivable routing in airborne tactical networks under uncertainty10
Near Real-Time Social Distance Estimation In London10
The Matching Preclusion of Enhanced Hypercubes9
Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning9
Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images9
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis9
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain9
The Orbits of Folded Crossed Cubes9
How Many Pop-Stacks Does It Take To Sort A Permutation?9
Deep Hashing and Sparse Representation of Abnormal Events Detection9
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy9
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning8
Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer8
Character-Based Value Factorization For MADRL8
ProInfer: inference of binary protocol keywords based on probabilistic statistics8
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA8
A Novel SGD-U-Network-Based Pixel-Level Road Crack Segmentation and Classification8
SPDPOA: Student Psychology Dragonfly Political Optimizer Algorithm-Based Soil Moisture and Heat-Level Prediction for Plant Health Monitoring in Internet of Things8
Anomaly Metrics on Class Variations For Face Anti-Spoofing8
Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions8
On The Batch Outsourcing Of Pairing Computations8
Research on blind reversible database watermarking algorithm based on dual embedding strategy8
Contact Tracing Solution for Global Community8
On The Maximum Cliques Of The Subgraphs Induced By Binary Constant Weight Codes In Powers Of Hypercubes8
Image sentiment analysis based on distillation and sentiment region localization network8
Indistinguishable Leakage-Resilient Circuit Compiler8
Software Failure Prediction Based On Program State and First-Error Characteristics8
Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science8
Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion8
Potential of Machine Learning Based Support Vector Regression for Solar Radiation Prediction7
A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking7
On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes7
Joint Alignment Networks For Few-Shot Website Fingerprinting Attack7
Performance Evaluation of Machine Learning Techniques for Fault Diagnosis in Vehicle Fleet Tracking Modules7
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting7
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction7
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile7
A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions7
Learning Saliency-Aware Correlation Filters for Visual Tracking7
Strongly Menger Connectedness of a Class of Recursive Networks7
CCESHP: Causal Consistency Model of Edge Storage Based on Hash Ring and Partial Geo-Replication6
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS6
An Ensemble-Based Credit Card Fraud Detection Algorithm Using an Efficient Voting Strategy6
ChatGPT-driven machine learning code generation for android malware detection6
SS6: Online Short-Code RAID-6 Scaling by Optimizing New Disk Location and Data Migration6
The Collision Avoidance and Situation-Aware Media Access Scheme Using the Registered-Backoff-Time Method for the IEEE 802.11ah-Based IoT Wireless Networks6
Particle Rider Mutual Information and Dendritic-Squirrel Search Algorithm With Artificial Immune Classifier for Brain Tumor Classification6
Modelling and Predictive Analytics of COVID-19 Transmission Using Gustafson–Kessel Fuzzy Clustering Approach6
An Adaptive MAC Protocol Based on Time-Domain Interference Alignment for UWANs6
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes6
Weighted twin support vector machine with rescaled hinge loss6
An Efficient Deep Learning Approach To IoT Intrusion Detection6
An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors6
Balancing privacy and model performance in federated learning through contract-based data trading6
Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search6
CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature6
Improved YOLOv9 for underwater side scan sonar target detection6
Guess-and-Determine Attacks on AEGIS6
Learning to optimize based on rate decay6
Provable Data Possession Schemes from Standard Lattices for Cloud Computing6
Gambling Domain Name Recognition via Certificate and Textual Analysis6
Privacy-Preserving Image Retrieval with Multi-Modal Query6
LraSched: Admitting More Long-Running Applications via Auto-Estimating Container Size and Affinity6
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori5
Link Residual Closeness of Graphs with Fixed Parameters5
Approximating Closest Vector Problem in ∞-Norm Revisited5
A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things5
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud5
An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction5
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model5
An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study5
Interactive Visualization of Large Point Clouds Using an Autotuning Multiresolution Out-Of-Core Strategy5
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism5
Device placement using Laplacian PCA and graph attention networks5
Specifying and Model Checking Distributed Control Algorithms at Meta-level5
A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks5
Improving LAMMPS performance for molecular dynamic simulation on large-scale HPC systems5
Automated Computer-Aided Diagnosis of Diabetic Retinopathy Based on Segmentation and Classification using K-nearest neighbor algorithm in retinal images5
Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs5
LiteMixer: Cauliflower Disease Diagnosis based on a Novel Lightweight Neural Network5
Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity5
Precise Point Set Registration Based on Feature Fusion5
SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders5
Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons5
Worst-Case Analysis of Heapsort, Exactly5
Image retrieval based on auto-encoder and clustering with centroid update5
NODSTAC: Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata5
DGA domain embedding with deep metric learning5
Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples4
Edge-Based Congestion-Aware Datacenter Load Balancing with Smart Probing4
A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset4
Maximum fault-free enforcement in Petri nets using supervisory control4
Measuring and Evaluating the Visual Complexity Of Chinese Ink Paintings4
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks4
Discriminative Subspace Learning With Adaptive Graph Regularization4
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network4
Kth min Threshold Encryption for Privacy-preserving Data Evaluation4
Social Network Analysis of the Panama Papers Concentrating on the MENA Region4
Automating the Deployment of Cyber Range with OpenStack4
A resource-aware workload scheduling method for unbalanced GEMMs on GPUs4
Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model4
Coordinate System-Based Trust-Aware Web Services Composition in Edge and Cloud Environment4
Pornographic video detection based on semantic and image enhancement4
Image classification with deconvolution operation and augmentation4
Improved Collision Detection Of MD5 Using Sufficient Condition Combination4
A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems4
A Roman Urdu Corpus for sentiment analysis4
Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure4
A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification4
Cryptanalysis of Modular Exponentiation Outsourcing Protocols4
Energy-Efficient Cluster-Based Routing Protocol for WSN Based on Hybrid BSO–TLBO Optimization Model4
Fidelity Homogenous Genesis Recommendation Model for User Trust with Item Ratings4
Verifiable attribute-based multi-keyword ranked search scheme in blockchain4
Glaucoma Detection Using Multiple Feature Set With Recurrent Neural Network4
Error and attack vulnerability of Apollonian networks4
Improving recommendation fairness with dependency-based graph collaborative filtering4
DCAF: Dynamic Cross-Chain Anchoring Framework using Smart Contracts4
Geometric Searchable Encryption Without False Positive And Its Applications4
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware4
ELSM: Evidence-Based Line Segment Merging4
On the Security of the Stream Ciphers RCR-64 and RCR-324
Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection4
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation4
Visual Intrusion Detection Based On CBAM-Capsule Networks3
Double-Lead Content Search And Producer Location Prediction Scheme For Producer Mobility In Named Data Networking3
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth3
Dynamic compact data structure for temporal reachability with unsorted contact insertions3
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems3
Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance3
Threshold Homomorphic Encryption From Provably Secure NTRU3
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model3
How To Bind A TPM’s Attestation Keys With Its Endorsement Key3
A Robust Blockchain-Based Distribution Master For Distributing Root Zone Data In DNS3
Efficient Realizability Checking by Modularization of LTL Specifications3
Relinearization Attack On LPN Over Large Fields3
IoT Data Quality Issues and Potential Solutions: A Literature Review3
Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews3
Deriving homing sequences for Finite State Machines with timeouts3
Optimizing arrhythmia identification using chaos theory and deep learning analysis3
Feature refinement and attention enhancement for click-through rate prediction3
Approximation algorithms for maximum weighted internal spanning trees in regular graphs and subdivisions of graphs3
How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk3
Pattern Matching Model for Recognition of Stone Inscription Characters3
MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks3
Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment3
Correction to: A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems3
Can LLMs deeply detect complex malicious queries? A framework for jailbreaking via obfuscating intent3
Be Scalable and Rescue My Slices During Reconfiguration3
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain3
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records3
On the Longest Common Cartesian Substring Problem3
KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers3
Supervisor synthesis for opacity enforcement in partially observed discrete event systems3
Performance Evaluation of Learning Models for Identification of Suicidal Thoughts3
Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm3
Trapezoidal Sketch: A Sketch Structure for Frequency Estimation of Data Streams3
Urdu Named Entity Recognition System Using Deep Learning Approaches3
Chinese RoBERTa Distillation For Emotion Classification3
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring3
Generating training events for building cyber-physical security skills3
A One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability3
Offset attention with seed generation for point cloud completion3
A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm3
0.10436701774597