Computer Standards & Interfaces

Papers
(The H4-Index of Computer Standards & Interfaces is 28. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Editorial Board109
A heuristic design toolkit for web conferencing software based on self-determination theory103
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications102
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester94
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing81
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping69
Toward secure distributed data storage with error locating in blockchain enabled edge computing60
Patient-centric medical service matching with fine-grained access control and dynamic user management57
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network54
Unveiling process insights from refactoring practices52
Provably secure multi-signature scheme based on the standard SM2 signature scheme51
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet48
Practical reusable garbled circuits with parallel updates47
Over-threshold multi-party private set operation protocols for lightweight clients47
Construction of a high-precision general geographical location words dataset46
Evaluating large language models for software testing44
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates44
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture43
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology42
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size40
Key-aggregate based access control encryption for flexible cloud data sharing40
Towards projection of the individualised risk assessment for the cybersecurity workforce37
An effective image annotation using self-attention based stacked bidirectional capsule network36
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system33
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud31
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks30
Round efficient privacy-preserving federated learning based on MKFHE30
Prototype, method, and experiment for evaluating usability of smart home user interfaces29
Designing usability/user experience heuristics to evaluate e-assessments administered to children28
0.053604125976562