Computer Standards & Interfaces

Papers
(The H4-Index of Computer Standards & Interfaces is 29. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial Board106
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing91
Toward secure distributed data storage with error locating in blockchain enabled edge computing83
A heuristic design toolkit for web conferencing software based on self-determination theory80
Periodic watermarking for copyright protection of large language models in cloud computing security64
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester63
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping60
Provably secure multi-signature scheme based on the standard SM2 signature scheme57
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network57
Construction of a high-precision general geographical location words dataset54
Unveiling process insights from refactoring practices53
Over-threshold multi-party private set operation protocols for lightweight clients51
Practical reusable garbled circuits with parallel updates51
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet48
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates48
Evaluating large language models for software testing46
Patient-centric medical service matching with fine-grained access control and dynamic user management45
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture44
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system42
Towards projection of the individualised risk assessment for the cybersecurity workforce40
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology35
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size34
An effective image annotation using self-attention based stacked bidirectional capsule network33
Key-aggregate based access control encryption for flexible cloud data sharing33
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures32
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud32
Can LLMs revolutionize text mining in chemistry? A comparative study with domain-specific tools31
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities31
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co29
Designing usability/user experience heuristics to evaluate e-assessments administered to children29
Prototype, method, and experiment for evaluating usability of smart home user interfaces29
0.068631887435913