Theoretical Computer Science

Papers
(The TQCC of Theoretical Computer Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Efficient card-based zero-knowledge proof for Sudoku53
How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition34
An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs31
Physical zero-knowledge proof for Ripple Effect28
Community-based rumor blocking maximization in social networks: Algorithms and analysis27
Optimizing hybrid metaheuristic algorithm with cluster head to improve performance metrics on the IoT26
Securely computing the n-variable equality function with 2n cards26
Deep learning and natural language processing in computation for offensive language detection in online social networks by feature selection and ensemble classification techniques26
Card-based protocols for secure ranking computations23
Maximum Nash welfare and other stories about EFX23
Spiking neural P systems with target indications23
Structure connectivity and substructure connectivity of wheel networks23
Multiple birds with one stone: Beating 1/2 for EFX and GMMS via envy cycle elimination22
Identity-based encryption with equality test and datestamp-based authorization mechanism21
Almost envy-freeness in group resource allocation19
Fault-tolerant complete visibility for asynchronous robots with lights under one-axis agreement19
A Secure Energy Aware Meta-Heuristic Routing Protocol (SEAMHR) for sustainable IoT-Wireless Sensor Network (WSN)19
Fault diagnosability of Bicube networks under the PMC diagnostic model18
Structure and substructure connectivity of divide-and-swap cube18
Arbitrary pattern formation by asynchronous opaque robots with lights17
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing17
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model17
An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection16
On cherry-picking and network containment16
A combinatorial view on string attractors15
How majority-vote crossover and estimation-of-distribution algorithms cope with fitness valleys14
Dynamical behavior of additive cellular automata over finite abelian groups14
A proof system for disjoint parallel quantum programs14
Beyond pointwise submodularity: Non-monotone adaptive submodular maximization in linear time14
Byzantine-tolerant causal broadcast13
Rumor correction maximization problem in social networks13
Enumeration of subtrees and BC-subtrees with maximum degree no more than k in trees13
Measuring diversity in heterogeneous information networks13
Improved lower bounds for the radio number of trees13
The h-restricted connectivity of the generalized hypercubes13
Hardness results for three kinds of colored connections of graphs13
Embedded connectivity of ternary n-cubes12
Component conditional fault tolerance of hierarchical folded cubic networks12
On the performance of learned data structures12
A constrained two-stage submodular maximization12
Facility location games with optional preference12
DESN: An unsupervised MR image denoising network with deep image prior12
The 4-set tree connectivity of (n,k)-star networks12
Gathering robots in graphs: The central role of synchronicity12
Approximation algorithms for the minimum power cover problem with submodular/linear penalties12
Connectivity and super connectivity of the divide-and-swap cube12
Stagnation detection meets fast mutation11
Constructing dual-CISTs of folded divide-and-swap cubes11
Minimum power partial multi-cover on a line11
Edge-fault-tolerant strong Menger edge connectivity on regular graphs11
Super fault-tolerance assessment of locally twisted cubes based on the structure connectivity11
Speeding up the AIFV-2 dynamic programs by two orders of magnitude using Range Minimum Queries11
Analysis on methods to effectively improve transfer learning performance11
Fast algorithms for single and multiple pattern Cartesian tree matching11
The generalized 3-connectivity of two kinds of regular networks11
Attribute-based proxy re-encryption from standard lattices11
NextPriorityConcept: A new and generic algorithm computing concepts from complex and heterogeneous data11
Speech enhancement with noise estimation and filtration using deep learning models10
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents10
A logical and graphical framework for reaction systems10
Small SNQ P Systems with multiple types of spikes10
Chronic obstructive pulmonary disease prediction using Internet of things-spiro system and fuzzy-based quantum neural network classifier10
Optimizing flight trajectory of UAV for efficient data collection in wireless sensor networks10
Multistage graph problems on a global budget10
An approximation algorithm for General Energy Restricted Sweep Coverage problem10
Exponential slowdown for larger populations: The (μ + 1)-EA on monotone functions10
Reversible computing from a programming language perspective10
Formal verification of parallel prefix sum and stream compaction algorithms in CUDA10
Structure fault tolerance of balanced hypercubes10
A simplified run time analysis of the univariate marginal distribution algorithm on LeadingOnes10
Complexity of modification problems for best match graphs9
Stable matching with uncertain pairwise preferences9
Energy efficiency optimization for multiple chargers in Wireless Rechargeable Sensor Networks9
k-Critical graphs in P5-free graphs9
The complexity of dependency detection and discovery in relational databases9
Conditional diagnosability of Cayley graphs generated by wheel graphs under the PMC model9
Joint realizability of monotone Boolean functions9
Local certification of graphs on surfaces9
Reliability and hybrid diagnosis of exchanged hypercube9
Investigation of E-voting system using face recognition using convolutional neural network (CNN)9
influence: A partizan scoring game on graphs8
The t/s-diagnosability and t/s-diagnosis algorithm of folded hypercube under the PMC/MM* model8
Matching influence maximization in social networks8
Solving hard stable matching problems involving groups of similar agents8
Generalised information systems capture L-domains8
Blocking total dominating sets via edge contractions8
Maximize a monotone function with a generic submodularity ratio8
On the g-extra diagnosability of enhanced hypercubes8
Cryptanalysis of the RSA variant based on cubic Pell equation8
A new quantum random number generator certified by value indefiniteness8
Novel algorithms for maximum DS decomposition8
Unified graphical co-modeling, analysis and verification of cyber-physical systems by combining AADL and Simulink/Stateflow8
Physarum-inspired multi-commodity flow dynamics8
Optimal radio labellings of block graphs and line graphs of trees8
Constrained synchronization and commutativity8
Running time analysis of the (1+1)-EA for robust linear optimization8
Arbitrary pattern formation on infinite regular tessellation graphs8
A study on the effects of normalized TSP features for automated algorithm selection8
Modelling of oppositional Aquila Optimizer with machine learning enabled secure access control in Internet of drones environment8
The component connectivity, component diagnosability, and t/k-diagnosability of Bicube networks8
An improved ranking methodology for malignant carcinoma in multicriterian decision making using hesitant VIKOR fuzzy8
Reliability assessment of the divide-and-swap cube in terms of generalized connectivity8
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security8
Single- and multi-objective evolutionary algorithms for the knapsack problem with dynamically changing constraints8
Encoding Boolean networks into reaction systems for investigating causal dependencies in gene regulation8
Note on R-conditional diagnosability of hypercube8
Time-free cell-like P systems with multiple promoters/inhibitors8
Quantum algorithm for the multicollision problem8
The vertex-pancyclicity of data center networks8
Faster balanced clusterings in high dimension7
Universal product learning with errors: A new variant of LWE for lattice-based cryptography7
Control languages accepted by labeled spiking neural P systems with rules on synapses7
Towards more efficient methods for solving regular-expression heavy string constraints7
Absolutely no free lunches!7
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation7
A hierarchy of local decision7
Multi-objective evolutionary algorithms are generally good: Maximizing monotone submodular functions over sequences7
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model7
Exponential upper bounds for the runtime of randomized search heuristics7
Time sensitive sweep coverage with minimum UAVs7
Tight security for the generic construction of identity-based signature (in the multi-instance setting)7
Subnetwork reliability analysis of bubble-sort graph networks7
Survivability development of wireless sensor networks using neuro fuzzy-clonal selection optimization7
Computational power of dynamic threshold neural P systems for generating string languages7
A topological perspective on distributed network algorithms7
Online presentations of finitely generated structures7
Simultaneous FPQ-ordering and hybrid planarity testing7
The diagnosability of Möbius cubes for the g-extra condition7
Model independent approach to probabilistic models7
Efficient scheduling of a mobile charger in large-scale sensor networks7
Constructing dual-CISTs with short diameters using a generic adjustment scheme on bicubes7
Sequential reprogramming of biological network fate7
Exploring the gap between treedepth and vertex cover through vertex integrity7
Bicriteria algorithms to balance coverage and cost in team formation under online model7
A trusted effective approach for forecasting the failure of data link and intrusion in wireless sensor networks7
Computational power of sequential dendrite P systems7
Variety of mutual-visibility problems in graphs7
Multi-attribute based influence maximization in social networks: Algorithms and analysis7
New bounds for energy complexity of Boolean functions7
Computing longest palindromic substring after single-character or block-wise edits6
On the complexity of solution extension of optimization problems6
Being a permutation is also orthogonal to one-wayness in quantum world: Impossibilities of quantum one-way permutations from one-wayness primitives6
The perfect matching cut problem revisited6
On approximation algorithm for the edge metric dimension problem6
Determinisability of unary weighted automata over the rational numbers6
Rewriting theory for the life sciences: A unifying theory of CTMC semantics6
Complexity assessments for decidable fragments of set theory. II: A taxonomy for ‘small’ languages involving membership6
Embedding algorithm of spined cube into grid structure and its wirelength computation6
Finding patterns and periods in Cartesian tree matching6
Fixed-parameter tractable algorithms for Tracking Shortest Paths6
Power, positive closure, and quotients on convex languages6
Approximation algorithms for the dynamic k-level facility location problems6
Spectral concepts in genome informational analysis6
Finding Cheeger cuts in hypergraphs via heat equation6
New results for the k-secretary problem6
A fixed point theorem in rough semi-linear uniform spaces6
Multiple facility location games with envy ratio6
The unpaired many-to-many k-disjoint paths in bipartite hypercube-like networks6
Parameterized algorithms and kernels for almost induced matching6
Model checking QCTL plus on quantum Markov chains6
Differential logical relations, part II increments and derivatives6
Representable Markov categories and comparison of statistical experiments in categorical probability6
Identity-based encryption with security against the KGC: A formal model and its instantiations6
Tight FPT approximation for constrained k-center and k-supplier6
On parameterized algorithms for fixed-order book thickness with respect to the pathwidth of the vertex ordering6
Physical ZKP protocols for Nurimisaki and Kurodoko6
Puncturable identity-based and attribute-based encryption from lattices6
Monotone k-submodular secretary problems: Cardinality and knapsack constraints6
Chosen-ciphertext lattice-based public key encryption with equality test in standard model6
Operator precedence temporal logic and model checking6
On dispersable book embeddings6
Cryptographic reverse firewalls for interactive proof systems6
A unique secure multimodal biometrics-based user anonymous authenticated key management protocol (SMUAAKAP) based on block chain mechanism for generic HIoTNs6
Computing a longest common almost-increasing subsequence of two sequences6
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions6
Identity-based authenticated encryption with identity confidentiality6
Connectivity and constructive algorithms of disjoint paths in dragonfly networks6
Modified Schelling games6
Multidimensional data organization and random access in large-scale DNA storage systems6
Concentration of rainbow k-connectivity of a multiplex random graph6
Disjoint paths and connected subgraphs for H-free graphs6
Polynomial kernels for hitting forbidden minors under structural parameterizations6
Uncertainty representation in dynamical systems using rough set theory6
Two-way and one-way quantum and classical automata with advice for online minimization problems6
Kindergarden quantum mechanics graduates ...or how I learned to stop gluing LEGO together and love the ZX-calculus6
Profit maximization for competitive social advertising6
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification6
Reallocating multiple facilities on the line6
h-extra r-component connectivity of interconnection networks with application to hypercubes5
On fan-crossing graphs5
Two-stage pricing strategy with price discount in online social networks5
Strongly Menger-edge-connectedness of DCell networks5
Generating, computing and recognizing with virus machines5
How to compute digraph width measures on directed co-graphs5
A refinement on the structure of vertex-critical (P5, gem)-free graphs5
An optimal online algorithm for single-processor scheduling problem with learning effect5
Recognizing DAGs with page-number 2 is NP-complete5
k-Circle formation by disoriented asynchronous robots5
Collaborative coalitions-based joint service caching and task offloading for edge networks5
Component edge connectivity of hypercube-like networks5
Approximation algorithms for fuzzy C-means problem based on seeding method5
Tracking routes in communication networks5
Hybrid fault-tolerant prescribed hyper-hamiltonian laceability of hypercubes5
New sufficient conditions on the degree sequences of uniform hypergraphs5
On coresets for support vector machines5
Satisfiability threshold for power law random 2-SAT in configuration model5
On k-ary n-cubes and isometric words5
Approximation algorithms for spherical k-means problem using local search scheme5
Online graph exploration on a restricted graph class: Optimal solutions for tadpole graphs5
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix5
Improved bi-criteria approximation schemes for load balancing on unrelated machines with cost constraints5
On invertible and stably reversible non-uniform cellular automata5
Optimal dispersion on an anonymous ring in the presence of weak Byzantine robots5
Alternation in two-way finite automata5
Moment-based analysis of Bayesian network properties5
A substructure based lower bound for eternal vertex cover number5
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations5
Priority evacuation from a disk: The case of n ≥ 45
Experimental evaluation of algorithms for computing quasiperiods5
Improved Budgeted Connected Domination and Budgeted Edge-Vertex Domination5
The R-conditional diagnosability of international networks5
Two-machine open shop problem with a single server and set-up time considerations5
Quantum clustering with k-Means: A hybrid approach5
Step-by-step community detection in volume-regular graphs5
QUBO formulations of the longest path problem5
Complexity and approximability of the happy set problem5
Online parameterized dictionary matching with one gap5
Divide-and-conquer based all spanning tree generation algorithm of a simple connected graph5
Numerical spiking neural P systems with production functions on synapses5
Efficient revocable identity-based encryption with short public parameters5
Secure connected domination and secure total domination in unit disk graphs and rectangle graphs5
The undirected repetition threshold and undirected pattern avoidance5
On the longest common prefix of suffixes in an inverse Lyndon factorization and other properties5
Vertex-pancyclicity of the (n,k)-bubble-sort networks5
Polynomial kernels for paw-free edge modification problems5
Injective coloring of planar graphs5
Reliability analysis of the generalized balanced hypercube5
Conditional probability logic, lifted Bayesian networks, and almost sure quantifier elimination5
Computing a metric basis of a bipartite distance-hereditary graph5
A process algebraic approach to reaction systems5
The longest cycle problem is polynomial on interval graphs5
On the complexity of matching cut for graphs of bounded radius and H-free graphs5
Privacy-preserving file sharing on cloud storage with certificateless signcryption5
On the complexity of minimum maximal uniquely restricted matching5
Self-assembly of and optimal encoding within thin rectangles at temperature-1 in 3D4
Temporal logic specification mining of programs4
Local-entity resolution for building location-based social networks by using stay points4
The Steiner k-eccentricity on trees4
A process calculus approach to detection and mitigation of PLC malware4
A data structure for substring-substring LCS length queries4
0.054316997528076