Computer Standards & Interfaces

Papers
(The median citation count of Computer Standards & Interfaces is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Optimal 5G network slicing using machine learning and deep learning concepts95
A blockchain-empowered crowdsourcing system for 5G-enabled smart cities91
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester75
6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission72
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment66
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses53
Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing49
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning48
Designing secure and lightweight user access to drone for smart city surveillance44
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications44
A microservice architecture for real-time IoT data processing: A reusable Web of things approach for smart ports42
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications41
Toward secure distributed data storage with error locating in blockchain enabled edge computing36
Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO35
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption35
Atmosphere: Context and situational-aware collaborative IoT architecture for edge-fog-cloud computing33
Performance evaluation of secured network traffic classification using a machine learning approach32
DOA tracking for seamless connectivity in beamformed IoT-based drones31
Blockchain-empowered security and privacy protection technologies for smart grid30
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud30
Privacy-preserving Byzantine-robust federated learning29
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior27
Trusted data sharing with flexible access control based on blockchain27
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient25
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA25
Generic server-aided secure multi-party computation in cloud computing24
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis24
A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks23
A taxonomy of attack mechanisms in the automotive domain22
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture22
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud22
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing21
A new secure arrangement for privacy-preserving data collection21
Energy trading scheme based on consortium blockchain and game theory21
Blockchain-based verifiable privacy-preserving data classification protocol for medical data20
A robust analysis of adversarial attacks on federated learning environments20
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health19
Privacy-preserving COVID-19 contact tracing solution based on blockchain19
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack19
Provable data deletion from efficient data integrity auditing and insertion in cloud storage18
Accountable outsourcing data storage atop blockchain18
Secure deduplication with efficient user revocation in cloud storage18
Performance analysis of handover management in 5G small cells18
AgentDSM-Eval: A framework for the evaluation of domain-specific modeling languages for multi-agent systems16
Secure Transmission Lines Monitoring and Efficient Electricity Management in Ultra-Reliable Low Latency Industrial Internet of Things16
DTMR: An adaptive Distributed Tree-based Multicast Routing protocol for vehicular networks16
Predicting the security threats of internet rumors and spread of false information based on sociological principle15
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption15
Attribute-based proxy re-signature from standard lattices and its applications15
Public-key encryption with bidirectional keyword search and its application to encrypted emails14
Web service reliability prediction based on machine learning14
Verifiable database supporting keyword searches with forward security14
Energy aware algorithm based on actual utilization for periodic tasks in mixed-criticality real-time systems14
An efficient multivariate threshold ring signature scheme14
An adaptive access control scheme based on trust degrees for edge computing13
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network13
A reference framework for the implementation of data governance systems for industry 4.013
Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications12
Energy aware fixed priority scheduling in mixed-criticality systems12
Securing social platform from misinformation using deep learning12
Lattice-based signcryption with equality test in standard model11
A novel small-scale pedestrian detection method base on residual block group of CenterNet11
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems11
Detection of web service anti-patterns using weighted extreme learning machine11
Revocable attribute-based encryption from standard lattices11
Microservice based scalable IoT architecture for device interoperability11
Proposal for a maintenance management system in industrial environments based on ISO 9001 and ISO 14001 standards10
Toward pre-standardization of reputation-based trust models beyond 5G10
Agile-CMMI V2.0 alignment: Bringing to light the agile artifacts pointed out by CMMI10
PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks9
Improving open data web API documentation through interactivity and natural language generation9
Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids9
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs9
Commodity anti-counterfeiting decision in e-commerce trade based on machine learning and Internet of Things9
Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA9
Mutual authentication scheme for smart devices in IoT-enabled smart home systems8
A consensus mechanism based on multi-round concession negotiation8
Analysis and practical validation of a standard SDN-based framework for IPsec management8
A parallel programming assessment for stream processing applications on multi-core systems8
Intelligent and trusted metaheuristic optimization model for reliable agricultural network8
A critical analysis of Zero Trust Architecture (ZTA)8
FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice8
Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits8
EDALoCo: Enhancing the accessibility of blockchains through a low-code approach to the development of event-driven applications for smart contract management7
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare7
Enabling privacy and leakage resistance for dynamic blockchain-based access control systems7
Full black-box retrievable and accountable identity-based encryption7
A BERT-Based Sequential POI Recommender system in Social Media7
Requirements capture and comparative analysis of open source versus proprietary service oriented architecture7
Hybrid unsupervised web-attack detection and classification – A deep learning approach6
Improving transferability of adversarial examples with powerful affine-shear transformation attack6
A BIPMU-based network security situation assessment method for wireless network6
Model-driven approach running route two-level SVD with context information and feature entities in recommender system6
A blockchain-based compact audit-enabled deduplication in decentralized storage6
A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain6
Repudiable ring signature: Stronger security and logarithmic-size6
Secure cloud file sharing scheme using blockchain and attribute-based encryption6
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption6
A process assessment model for big data analytics6
Influencing factors of mobile instant messaging applications between single- and multi- platform use cases6
Information technologies exposing children to privacy risks: Domains and children-specific technical controls6
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints6
Enhancing differential evolution with a target vector replacement strategy6
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning6
A novel and efficient index based web service discovery approach6
Injecting domain knowledge in multi-objective optimization problems: A semantic approach6
An intelligent blockchain-based access control framework with federated learning for genome-wide association studies6
On the effects of continuous delivery on code quality: A case study in industry6
A robust stochastic stability analysis approach for power system considering wind speed prediction error based on Markov model6
On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method5
A new modified Skew Tent Map and its application in pseudo-random number generator5
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network5
Exploring users’ switching intention and behavior on social networking sites: Linear and nonlinear perspectives5
An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm5
An analysis model for detecting misbehaviors in anonymous cryptocurrency5
A fault-tolerant and distributed capacitated connected dominating set algorithm for wireless sensor networks5
A visual approach for identification and annotation of business process elements in process descriptions5
Comparing coverage criteria for dynamic web application: An empirical evaluation4
ANDES: An approach to embed search services on the Web browser4
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates4
Certificateless ring signcryption for multi-source network coding4
Module learning with rounding based key agreement scheme with modified reconciliation4
Advanced Electronic Signatures and eIDAS – Analysis of the Concept4
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities4
Public integrity auditing for dynamic group cooperation files with efficient user revocation4
Unveiling process insights from refactoring practices4
Towards the automatic restructuring of structural aesthetic design of Android user interfaces4
Packet loss concealment method based on interpolation in packet voice coding4
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property4
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system4
An IoT-based approach for optimal relative positioning of solar panel arrays during backtracking4
Video image scaling technology based on adaptive interpolation algorithm and TTS FPGA implementation4
Efficient public-key authenticated deniable encryption schemes4
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing4
Online/offline remote data auditing with strong key-exposure resilience for cloud storage4
Efficient multi-party private set intersection protocols for large participants and small sets4
0.021493911743164