Theoretical Computer Science

Papers
(The TQCC of Theoretical Computer Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Improved adaptive genetic algorithm for the vehicle Insurance Fraud Identification Model based on a BP Neural Network46
Efficient card-based zero-knowledge proof for Sudoku45
Theory versus practice in annealing-based quantum computing38
Refining the r-index26
How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition26
Arbitrary pattern formation on infinite grid by asynchronous oblivious robots25
Structure connectivity and substructure connectivity of the crossed cube25
A fully distributed hierarchical attribute-based encryption scheme24
Fault-tolerant metric dimension of circulant graphs C(1,2,3)23
An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs23
kNN-P: A kNN classifier optimized by P systems23
Cell-like P systems with polarizations and minimal rules22
Physical zero-knowledge proof for Ripple Effect22
When hypermutations and ageing enable artificial immune systems to outperform evolutionary algorithms22
Relationship between extra edge connectivity and component edge connectivity for regular graphs21
Optimizing hybrid metaheuristic algorithm with cluster head to improve performance metrics on the IoT21
Maximum Nash welfare and other stories about EFX20
Structure connectivity and substructure connectivity of wheel networks19
Identity-based encryption with equality test and datestamp-based authorization mechanism19
Card-based protocols for secure ranking computations19
Gathering in dynamic rings18
Community-based rumor blocking maximization in social networks: Algorithms and analysis18
Spiking neural P systems with target indications18
Almost envy-freeness in group resource allocation18
Securely computing the n-variable equality function with 2n cards17
Multiple birds with one stone: Beating 1/2 for EFX and GMMS via envy cycle elimination17
Fault diagnosability of Bicube networks under the PMC diagnostic model16
Arbitrary pattern formation by asynchronous opaque robots with lights15
The component (edge) connectivity of shuffle-cubes15
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing15
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model15
Beyond pointwise submodularity: Non-monotone adaptive submodular maximization in linear time14
Lower bounds on the run time of the Univariate Marginal Distribution Algorithm on OneMax14
A new proof for exact relationship between extra connectivity and extra diagnosability of regular connected graphs under MM* model14
Multicarrier continuous-variable quantum key distribution14
Deep learning and natural language processing in computation for offensive language detection in online social networks by feature selection and ensemble classification techniques14
Quality gain analysis of the weighted recombination evolution strategy on general convex quadratic functions14
Fault-tolerant complete visibility for asynchronous robots with lights under one-axis agreement13
On cherry-picking and network containment13
From mathematical equivalence such as Ma equivalence to generalized Zhang equivalency including gradient equivalency13
Enumeration of subtrees and BC-subtrees with maximum degree no more than k in trees13
Reliability analysis of subsystem in dual cubes13
Approximate proof-labeling schemes13
Restricted connectivity and good-neighbor diagnosability of split-star networks13
Design and analysis of diversity-based parent selection schemes for speeding up evolutionary multi-objective optimisation12
The h-restricted connectivity of the generalized hypercubes12
Approximation algorithms for the minimum power cover problem with submodular/linear penalties12
Collaborative delivery with energy-constrained mobile robots12
A Secure Energy Aware Meta-Heuristic Routing Protocol (SEAMHR) for sustainable IoT-Wireless Sensor Network (WSN)11
Minimum power partial multi-cover on a line11
Analysis of the (1 + 1) EA on subclasses of linear functions under uniform and linear constraints11
Structure fault tolerance of balanced hypercubes11
Facility location games with optional preference11
Gathering Anonymous, Oblivious Robots on a Grid11
Fast string matching for DNA sequences11
Dynamical behavior of additive cellular automata over finite abelian groups11
Revocable identity-based encryption with server-aided ciphertext evolution11
A combinatorial view on string attractors11
Embedded connectivity of ternary n-cubes11
Connectivity and super connectivity of the divide-and-swap cube10
A note of vertex arboricity of planar graphs without 4-cycles intersecting with 6-cycles10
Pushing lines helps: Efficient universal centralised transformations for programmable matter10
Subset feedback vertex set on graphs of bounded independent set size10
Rumor correction maximization problem in social networks10
DESN: An unsupervised MR image denoising network with deep image prior10
Causality analysis and fault ascription in component-based systems10
A constrained two-stage submodular maximization10
Gathering robots in graphs: The central role of synchronicity10
Dynamic maintenance case base using knowledge discovery techniques for case based reasoning systems10
A code-based signature scheme from the Lyubashevsky framework10
Improved lower bounds for the radio number of trees10
Semitotal Domination: New hardness results and a polynomial-time algorithm for graphs of bounded mim-width10
On the performance of learned data structures10
Edge-fault-tolerant strong Menger edge connectivity on regular graphs10
A logic for Lawson compact algebraic L-domains10
Structure and substructure connectivity of divide-and-swap cube10
Optimizing flight trajectory of UAV for efficient data collection in wireless sensor networks10
Speeding up the AIFV-2 dynamic programs by two orders of magnitude using Range Minimum Queries9
Two-dimensional maximal repetitions9
Hardness results for three kinds of colored connections of graphs9
The metric linear-time branching-time spectrum on nondeterministic probabilistic processes9
Constructing dual-CISTs of folded divide-and-swap cubes9
Conditional diagnosability of Cayley graphs generated by wheel graphs under the PMC model9
The reliability analysis of k-ary n-cube networks9
A proof system for disjoint parallel quantum programs9
Component conditional fault tolerance of hierarchical folded cubic networks9
An approximation algorithm for General Energy Restricted Sweep Coverage problem9
Time-free cell-like P systems with multiple promoters/inhibitors8
Approximate pattern matching on elastic-degenerate text8
Attribute-based proxy re-encryption from standard lattices8
Recognizing the tractability in big data computing8
k-Critical graphs in P5-free graphs8
A simplified run time analysis of the univariate marginal distribution algorithm on LeadingOnes8
Small SNQ P Systems with multiple types of spikes8
Byzantine-tolerant causal broadcast8
Quantum algorithm for the multicollision problem8
Mixed integer programming with convex/concave constraints: Fixed-parameter tractability and applications to multicovering and voting8
Energy efficiency optimization for multiple chargers in Wireless Rechargeable Sensor Networks8
Solving hard stable matching problems involving groups of similar agents8
R conditional diagnosability: A novel generalized measure of system-level diagnosis8
The 4-set tree connectivity of (n,k)-star networks8
Super fault-tolerance assessment of locally twisted cubes based on the structure connectivity8
An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection8
Calibration scheduling with time slot cost8
Complexity of modification problems for best match graphs8
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents8
NextPriorityConcept: A new and generic algorithm computing concepts from complex and heterogeneous data8
Constrained synchronization and commutativity8
Maximize a monotone function with a generic submodularity ratio8
Joint realizability of monotone Boolean functions7
M UFLP: Universal facility location problem in the p-th power of metric space7
The complexity of dependency detection and discovery in relational databases7
Subversion-resilient signatures: Definitions, constructions and applications7
Speech enhancement with noise estimation and filtration using deep learning models7
Generalized abstraction-refinement for game-based CTL lifted model checking7
On scheduling multiple two-stage flowshops7
A class of Recursive Permutations which is Primitive Recursive complete7
Makespan minimization on unrelated parallel machines with a few bags7
Group sweep coverage with guaranteed approximation ratio7
Stable matching with uncertain pairwise preferences7
Reliability and hybrid diagnosis of exchanged hypercube7
influence: A partizan scoring game on graphs7
An improved ranking methodology for malignant carcinoma in multicriterian decision making using hesitant VIKOR fuzzy7
Leader election in SINR model with arbitrary power control7
Blocking total dominating sets via edge contractions7
Note on R-conditional diagnosability of hypercube7
Fast algorithms for single and multiple pattern Cartesian tree matching7
Measuring diversity in heterogeneous information networks7
On a simple hard variant of Not-All-Equal 3-Sat7
The generalized 3-connectivity of two kinds of regular networks7
Novel algorithms for maximum DS decomposition7
Multistage graph problems on a global budget7
Compressed range minimum queries6
Absolutely no free lunches!6
On the g-extra diagnosability of enhanced hypercubes6
Physarum-inspired multi-commodity flow dynamics6
Exponential upper bounds for the runtime of randomized search heuristics6
Interaction-aware influence maximization and iterated sandwich method6
Efficient scheduling of a mobile charger in large-scale sensor networks6
On dispersable book embeddings6
Exponential slowdown for larger populations: The (μ + 1)-EA on monotone functions6
Tight security for the generic construction of identity-based signature (in the multi-instance setting)6
Reallocating multiple facilities on the line6
Sequential reprogramming of biological network fate6
On the complexity of solution extension of optimization problems6
Delivery Route Optimization with automated vehicle in smart urban environment6
On the steady state analysis of covariance matrix self-adaptation evolution strategies on the noisy ellipsoid model6
Bicriteria algorithms to balance coverage and cost in team formation under online model6
Chronic obstructive pulmonary disease prediction using Internet of things-spiro system and fuzzy-based quantum neural network classifier6
Disjoint paths and connected subgraphs for H-free graphs6
Stagnation detection meets fast mutation6
Tightly secure inner product functional encryption: Multi-input and function-hiding constructions6
The component connectivity, component diagnosability, and t/k-diagnosability of Bicube networks6
Local certification of graphs on surfaces6
Diagnosability for two families of composition networks6
Maximum star deleted from Ramsey graphs of book and tree6
Eccentricity function in distance-hereditary graphs6
The unpaired many-to-many k-disjoint paths in bipartite hypercube-like networks6
Control languages accepted by labeled spiking neural P systems with rules on synapses6
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting6
Representable Markov categories and comparison of statistical experiments in categorical probability6
Survivability development of wireless sensor networks using neuro fuzzy-clonal selection optimization6
Generalised information systems capture L-domains6
Computing longest palindromic substring after single-character or block-wise edits6
Matching influence maximization in social networks6
Wireless evacuation on m rays with k searchers6
An incentive compatible, efficient market for air traffic flow management6
Polynomial kernels for hitting forbidden minors under structural parameterizations6
Universal product learning with errors: A new variant of LWE for lattice-based cryptography6
Running time analysis of the (1+1)-EA for robust linear optimization6
Cryptanalysis of the RSA variant based on cubic Pell equation6
A decision procedure and complete axiomatization for projection temporal logic6
How majority-vote crossover and estimation-of-distribution algorithms cope with fitness valleys6
Binary-decision-diagram-based decomposition of Boolean functions into reversible logic elements6
A new quantum random number generator certified by value indefiniteness6
Exploring the gap between treedepth and vertex cover through vertex integrity6
Divide-and-conquer based all spanning tree generation algorithm of a simple connected graph5
A topological perspective on distributed network algorithms5
Constructing dual-CISTs with short diameters using a generic adjustment scheme on bicubes5
Identity-based encryption with security against the KGC: A formal model and its instantiations5
Two-way and one-way quantum and classical automata with advice for online minimization problems5
Analysis on methods to effectively improve transfer learning performance5
Injective coloring of planar graphs5
Hybrid fault-tolerant prescribed hyper-hamiltonian laceability of hypercubes5
Faster balanced clusterings in high dimension5
On RAC drawings of graphs with one bend per edge5
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions5
Arbitrary pattern formation on infinite regular tessellation graphs5
Reversible computing from a programming language perspective5
Robust biomolecular finite automata5
Simultaneous FPQ-ordering and hybrid planarity testing5
Multiple facility location games with envy ratio5
Tracking routes in communication networks5
Identity-based authenticated encryption with identity confidentiality5
Approximation algorithms for spherical k-means problem using local search scheme5
Visualizing co-phylogenetic reconciliations5
The diagnosability of Möbius cubes for the g-extra condition5
Rewriting theory for the life sciences: A unifying theory of CTMC semantics5
Parameterized model checking of networks of timed automata with Boolean guards5
Convergence of the non-uniform directed Physarum model5
Spectral concepts in genome informational analysis5
On the longest common prefix of suffixes in an inverse Lyndon factorization and other properties5
Information coverage maximization for multiple products in social networks5
Concentration of rainbow k-connectivity of a multiplex random graph5
Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms5
Kindergarden quantum mechanics graduates ...or how I learned to stop gluing LEGO together and love the ZX-calculus5
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations5
Efficient decision procedure for propositional projection temporal logic5
Convergence of the non-uniform Physarum dynamics5
The impact of lexicographic parsimony pressure for ORDER/MAJORITY on the run time5
Cryptographic reverse firewalls for interactive proof systems5
Connectivity and constructive algorithms of disjoint paths in dragonfly networks5
A logical and graphical framework for reaction systems5
The Alternating BWT: An algorithmic perspective5
Destructiveness of lexicographic parsimony pressure and alleviation by a concatenation crossover in genetic programming5
Power, positive closure, and quotients on convex languages5
On approximation algorithm for the edge metric dimension problem5
Complexity and approximability of the happy set problem5
On parameterized algorithms for fixed-order book thickness with respect to the pathwidth of the vertex ordering5
On fan-crossing graphs5
Online parameterized dictionary matching with one gap5
Multi-attribute based influence maximization in social networks: Algorithms and analysis5
The t/s-diagnosability and t/s-diagnosis algorithm of folded hypercube under the PMC/MM* model5
Model independent approach to probabilistic models5
Investigation of E-voting system using face recognition using convolutional neural network (CNN)5
Improved bi-criteria approximation schemes for load balancing on unrelated machines with cost constraints5
Online presentations of finitely generated structures5
Puncturable identity-based and attribute-based encryption from lattices5
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation5
k-Circle formation by disoriented asynchronous robots5
A hierarchy of local decision5
Fixed-parameter tractable algorithms for Tracking Shortest Paths5
Computing a metric basis of a bipartite distance-hereditary graph5
The R-conditional diagnosability of international networks5
Effectful applicative similarity for call-by-name lambda calculi5
Whom to befriend to influence people5
How long it takes for an ordinary node with an ordinary id to output?5
On coresets for support vector machines5
Modelling of oppositional Aquila Optimizer with machine learning enabled secure access control in Internet of drones environment5
The vertex-pancyclicity of data center networks5
Monotone k-submodular secretary problems: Cardinality and knapsack constraints5
How to compute digraph width measures on directed co-graphs5
Satisfiability threshold for power law random 2-SAT in configuration model5
Optimal dispersion on an anonymous ring in the presence of weak Byzantine robots5
Operator precedence temporal logic and model checking5
Unified graphical co-modeling, analysis and verification of cyber-physical systems by combining AADL and Simulink/Stateflow5
New results for the k-secretary problem5
Modified Schelling games5
A data structure for substring-substring LCS length queries4
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more4
0.029559850692749