Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Optimal 5G network slicing using machine learning and deep learning concepts95
A blockchain-empowered crowdsourcing system for 5G-enabled smart cities91
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester75
6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission72
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment66
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses53
Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing49
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning48
Designing secure and lightweight user access to drone for smart city surveillance44
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications44
A microservice architecture for real-time IoT data processing: A reusable Web of things approach for smart ports42
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications41
Toward secure distributed data storage with error locating in blockchain enabled edge computing36
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption35
Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO35
Atmosphere: Context and situational-aware collaborative IoT architecture for edge-fog-cloud computing33
Performance evaluation of secured network traffic classification using a machine learning approach32
DOA tracking for seamless connectivity in beamformed IoT-based drones31
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud30
Blockchain-empowered security and privacy protection technologies for smart grid30
Privacy-preserving Byzantine-robust federated learning29
Trusted data sharing with flexible access control based on blockchain27
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior27
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA25
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient25
Generic server-aided secure multi-party computation in cloud computing24
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis24
A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks23
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud22
A taxonomy of attack mechanisms in the automotive domain22
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture22
Energy trading scheme based on consortium blockchain and game theory21
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing21
A new secure arrangement for privacy-preserving data collection21
Blockchain-based verifiable privacy-preserving data classification protocol for medical data20
A robust analysis of adversarial attacks on federated learning environments20
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack19
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health19
Privacy-preserving COVID-19 contact tracing solution based on blockchain19
Secure deduplication with efficient user revocation in cloud storage18
Performance analysis of handover management in 5G small cells18
Provable data deletion from efficient data integrity auditing and insertion in cloud storage18
Accountable outsourcing data storage atop blockchain18
DTMR: An adaptive Distributed Tree-based Multicast Routing protocol for vehicular networks16
AgentDSM-Eval: A framework for the evaluation of domain-specific modeling languages for multi-agent systems16
Secure Transmission Lines Monitoring and Efficient Electricity Management in Ultra-Reliable Low Latency Industrial Internet of Things16
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption15
Attribute-based proxy re-signature from standard lattices and its applications15
Predicting the security threats of internet rumors and spread of false information based on sociological principle15
Energy aware algorithm based on actual utilization for periodic tasks in mixed-criticality real-time systems14
An efficient multivariate threshold ring signature scheme14
Public-key encryption with bidirectional keyword search and its application to encrypted emails14
Web service reliability prediction based on machine learning14
Verifiable database supporting keyword searches with forward security14
A reference framework for the implementation of data governance systems for industry 4.013
An adaptive access control scheme based on trust degrees for edge computing13
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network13
Securing social platform from misinformation using deep learning12
Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications12
Energy aware fixed priority scheduling in mixed-criticality systems12
Revocable attribute-based encryption from standard lattices11
Microservice based scalable IoT architecture for device interoperability11
Lattice-based signcryption with equality test in standard model11
A novel small-scale pedestrian detection method base on residual block group of CenterNet11
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems11
Detection of web service anti-patterns using weighted extreme learning machine11
0.025768041610718