Computer Standards & Interfaces

Papers
(The H4-Index of Computer Standards & Interfaces is 28. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Periodic watermarking for copyright protection of large language models in cloud computing security130
A heuristic design toolkit for web conferencing software based on self-determination theory110
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing99
Editorial Board92
Lattice-based dynamic decentralized anonymous credential scheme supporting batch verification71
Sharing as You Desire: A fuzzy certificateless proxy re-encryption scheme for efficient and privacy-preserving cloud data sharing70
MExpm: Fair computation offloading for batch modular exponentiation with improved privacy and checkability in IoV65
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester63
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping60
Over-threshold multi-party private set operation protocols for lightweight clients58
Practical reusable garbled circuits with parallel updates55
Evaluating large language models for software testing50
Fuzzy Password Authentication Key Exchange protocol in universal composable framework for blockchain privacy protection46
Patient-centric medical service matching with fine-grained access control and dynamic user management40
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates38
Provably secure multi-signature scheme based on the standard SM2 signature scheme37
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet36
Construction of a high-precision general geographical location words dataset36
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network35
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size34
Towards projection of the individualised risk assessment for the cybersecurity workforce34
An effective image annotation using self-attention based stacked bidirectional capsule network31
FGPB-EMR: Fine-grained privacy blockchain for electronic medical record sharing30
Key-aggregate based access control encryption for flexible cloud data sharing30
AdaTraj-DP: An adaptive privacy framework for context-aware trajectory data publishing30
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system30
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud29
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology29
0.084724187850952