Computer Standards & Interfaces

Papers
(The median citation count of Computer Standards & Interfaces is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
Towards the automatic restructuring of structural aesthetic design of Android user interfaces100
Toward secure distributed data storage with error locating in blockchain enabled edge computing91
Detection of web service anti-patterns using weighted extreme learning machine75
Difference-based firefly programming for symbolic regression problems75
An analysis model for detecting misbehaviors in anonymous cryptocurrency69
Computing performance requirements for web service compositions55
Lattice based distributed threshold additive homomorphic encryption with application in federated learning54
Editorial Board54
Adaptive optimized residual convolutional image annotation model with bionic feature selection model49
A heuristic design toolkit for web conferencing software based on self-determination theory46
Hybrid collaborative filtering using matrix factorization and XGBoost for movie recommendation43
Editorial Board42
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester41
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption39
Practically secure linear-map vector commitment and its applications38
Editorial Board37
A novel small-scale pedestrian detection method base on residual block group of CenterNet36
Modelling web component quality using Delphi study35
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications35
Toward pre-standardization of reputation-based trust models beyond 5G31
Designing secure and lightweight user access to drone for smart city surveillance31
Proofs of retrievability with tag outsourcing based on Goppa codes29
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing29
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security27
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning26
Full black-box retrievable and accountable identity-based encryption26
Microservice based scalable IoT architecture for device interoperability25
Create your own MUSE: A method for updating security level evaluation instruments25
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network25
Adversarial examples generated from sample subspace25
Designing novel proxy-based access control scheme for implantable medical devices24
An extension of iStar for Machine Learning requirements by following the PRISE methodology24
Fast intensive validation on blockchain with scale-out dispute resolution24
Delta GUI change detection using inferred models23
Elliptic code-based oblivious polynomial evaluation23
Agile governance practices by aligning CMMI V2.0 with portfolio SAFe 5.022
Performance analysis of handover management in 5G small cells21
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment20
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses20
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique19
Framework of standards, guides and methodologies for project, program, portfolio, and PMO management19
Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain18
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet18
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm18
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping18
A family of standards for software and systems product lines17
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems16
Web service discovery: Rationale, challenges, and solution directions16
An ontology-based secure design framework for graph-based databases15
Sahand 1.0: A new model for extracting information from source code in object-oriented projects15
A novel and efficient index based web service discovery approach15
A BIPMU-based network security situation assessment method for wireless network15
BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records14
Privacy-preserving compromised credential checking protocol for account protection14
Practical reusable garbled circuits with parallel updates13
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry13
Multi-type requirements traceability prediction by code data augmentation and fine-tuning MS-CodeBERT13
Detecting deviations in the code using architecture view-based drift analysis12
Over-threshold multi-party private set operation protocols for lightweight clients12
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications12
An Identity-Based Encryption with Equality Test scheme for healthcare social apps12
LightBlocks: A trusted lightweight signcryption and consensus scheme for industrial IoT ecosystems12
A lightweight finger multimodal recognition model based on detail optimization and perceptual compensation embedding11
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare11
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction11
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis11
PSCBO: A provably secure consensus-based blockchain Oracle11
Provably secure multi-signature scheme based on the standard SM2 signature scheme10
A taxonomy of attack mechanisms in the automotive domain10
Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations10
Demand response process assessment model: Development and case study assessment10
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network10
A process assessment model for big data analytics10
Unveiling process insights from refactoring practices9
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture9
A new secure arrangement for privacy-preserving data collection9
Efficient public-key authenticated deniable encryption schemes9
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning8
Inner product encryption from Middle-Product Learning With Errors8
Construction of a high-precision general geographical location words dataset8
A lightweight delegated private set intersection cardinality protocol8
Certificateless ring signcryption for multi-source network coding8
Cryptanalysis of an additively homomorphic public key encryption scheme8
StopGuess: A framework for public-key authenticated encryption with keyword search8
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates8
Patient-centric medical service matching with fine-grained access control and dynamic user management7
Authentication communication by using visualization cryptography for UAV networks7
Compact and efficient KEMs over NTRU lattices7
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy7
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks7
Local differential privacy and its applications: A comprehensive survey7
People 4.0 — A model for Human-in-the-Loop CPS-based systems7
LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems7
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems7
Quantifying heuristic evaluation6
A parallel programming assessment for stream processing applications on multi-core systems6
Energy aware fixed priority scheduling in mixed-criticality systems6
Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods6
Secure cloud file sharing scheme using blockchain and attribute-based encryption6
A critical analysis of Zero Trust Architecture (ZTA)6
Encrypted data inner product KNN secure query based on BALL-PB tree6
Improving transferability of adversarial examples with powerful affine-shear transformation attack6
Enhancing differential evolution with a target vector replacement strategy6
Agile-CMMI V2.0 alignment: Bringing to light the agile artifacts pointed out by CMMI6
Efficient dynamic multi-client searchable encryption supporting fuzzy search6
Public integrity auditing for dynamic group cooperation files with efficient user revocation6
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption6
Attribute-based proxy re-signature from standard lattices and its applications6
Efficient multi-party PSI and its application in port management6
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size6
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment6
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient5
Abuse-resistant deniable encryption5
Pairing-free public-key authenticated encryption with keyword search5
A robust analysis of adversarial attacks on federated learning environments5
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus5
Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems4
Accountable outsourcing data storage atop blockchain4
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption4
Access network selection based on available bandwidth estimation for heterogeneous networks4
Provable data deletion from efficient data integrity auditing and insertion in cloud storage4
Trusted data sharing with flexible access control based on blockchain4
A visual approach for identification and annotation of business process elements in process descriptions4
Key-aggregate based access control encryption for flexible cloud data sharing4
Enabling privacy and leakage resistance for dynamic blockchain-based access control systems4
Strategic IT alignment Projects. Towards Good Governance4
DOA tracking for seamless connectivity in beamformed IoT-based drones4
Atmosphere: Context and situational-aware collaborative IoT architecture for edge-fog-cloud computing4
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud4
Blockchain-based verifiable privacy-preserving data classification protocol for medical data4
Mutual authentication scheme for smart devices in IoT-enabled smart home systems4
Secure Transmission Lines Monitoring and Efficient Electricity Management in Ultra-Reliable Low Latency Industrial Internet of Things4
Video image scaling technology based on adaptive interpolation algorithm and TTS FPGA implementation4
Privacy-preserving COVID-19 contact tracing solution based on blockchain4
Editorial Board4
Integrating the manufacturer usage description standard in the modelling of cyber–physical systems3
When deep learning meets watermarking: A survey of application, attacks and defenses3
Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming3
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics3
Lattice-based dynamic universal accumulator: Design and application3
MRAN: Multimodal relationship-aware attention network for fake news detection3
GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism3
Revocable certificateless Provable Data Possession with identity privacy in cloud storage3
A consent-aware electronic medical records sharing method based on blockchain3
New tag-based signatures and their applications on linearly homomorphic signatures3
Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systems3
Blockchain-based cross-domain query integrity verification mechanism for outsourced database3
MDICA: Maintenance of data integrity in column-oriented database applications2
Heuristics-based mediation for building smart architectures at run-time2
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs2
Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications2
Detection of DDoS attacks in SDN-based VANET using optimized TabNet2
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology2
A new modified Skew Tent Map and its application in pseudo-random number generator2
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA2
Repudiable ring signature: Stronger security and logarithmic-size2
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints2
Application of ISO/IEC TR 33014 to the improvement of Green IT processes2
Secure deduplication with efficient user revocation in cloud storage2
An adaptive access control scheme based on trust degrees for edge computing2
Practical two-party SM2 signing using multiplicative-to-additive functionality2
Lattice-based strong designated verifier signature with non-delegatability2
Hybrid unsupervised web-attack detection and classification – A deep learning approach2
A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks2
Determining a core view of research quality in empirical software engineering2
Analysis and practical validation of a standard SDN-based framework for IPsec management2
A robust stochastic stability analysis approach for power system considering wind speed prediction error based on Markov model2
A model-driven approach to adopt good practices for agile process configuration and certification2
A blockchain-empowered crowdsourcing system for 5G-enabled smart cities2
An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm2
A fault-tolerant and distributed capacitated connected dominating set algorithm for wireless sensor networks2
Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises2
0.12437796592712