Journal of Computer Science and Technology

Papers
(The median citation count of Journal of Computer Science and Technology is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Active Learning Query Strategies for Classification, Regression, and Clustering: A Survey87
A Survey on Blocking Technology of Entity Resolution75
Serendipity in Recommender Systems: A Systematic Literature Review48
CytoBrain: Cervical Cancer Screening System Based on Deep Learning Technology36
Diagnosis of COVID-19 Pneumonia via a Novel Deep Learning Architecture34
Lane Detection: A Survey with New Results33
Predicting Code Smells and Analysis of Predictions: Using Machine Learning Techniques and Software Metrics26
ATLRec: An Attentional Adversarial Transfer Learning Network for Cross-Domain Recommendation25
Distinguishing Computer-Generated Images from Natural Images Using Channel and Pixel Correlation23
Joint Label-Specific Features and Correlation Information for Multi-Label Learning22
Comparison Between Deep Learning Models and Traditional Machine Learning Approaches for Facial Expression Recognition in Ageing Adults21
Next POI Recommendation Based on Location Interest Mining with Recurrent Neural Networks20
Robust Needle Localization and Enhancement Algorithm for Ultrasound by Deep Learning and Beam Steering Methods20
Two-Stream Temporal Convolutional Networks for Skeleton-Based Human Action Recognition19
SIES: A Novel Implementation of Spiking Convolutional Neural Network Inference Engine on Field-Programmable Gate Array19
Verifying ReLU Neural Networks from a Model Checking Perspective18
A Survey on Performance Optimization of High-Level Synthesis Tools18
A Survey of Non-Volatile Main Memory Technologies: State-of-the-Arts, Practices, and Future Directions17
Learning Human-Written Commit Messages to Document Code Changes15
Data Security and Privacy in Bitcoin System: A Survey15
PetroKG: Construction and Application of Knowledge Graph in Upstream Area of PetroChina14
Incremental Multi-Label Learning with Active Queries14
WATuning: A Workload-Aware Tuning System with Attention-Based Deep Reinforcement Learning13
Performance Evaluation of Memory-Centric ARMv8 Many-Core Architectures: A Case Study with Phytium 2000+13
3D Object Tracking with Adaptively Weighted Local Bundles13
Constructing an Educational Knowledge Graph with Concepts Linked to Wikipedia12
Machine Learning Techniques for Software Maintainability Prediction: Accuracy Analysis11
PIM-Align: A Processing-in-Memory Architecture for FM-Index Search Algorithm11
SE-Chain: A Scalable Storage and Efficient Retrieval Model for Blockchain11
Window Detection in Facades Using Heatmap Fusion11
A Comparative Study of CNN- and Transformer-Based Visual Style Transfer11
A Revisit of Shape Editing Techniques: From the Geometric to the Neural Viewpoint11
Exploiting Multiple Correlations Among Urban Regions for Crowd Flow Prediction11
Source-Free Unsupervised Domain Adaptation with Sample Transport Learning10
Partial Label Learning via Conditional-Label-Aware Disambiguation10
A Comprehensive Pipeline for Complex Text-to-Image Synthesis10
Fault-Tolerant Hamiltonicity and Hamiltonian Connectivity of BCube with Various Faulty Elements9
FATOC: Bug Isolation Based Multi-Fault Localization by Using OPTICS Clustering9
EmotionMap: Visual Analysis of Video Emotional Content on a Map9
Semi-Supervised Classification of Data Streams by BIRCH Ensemble and Local Structure Mapping9
Predicting CircRNA-Disease Associations Based on Improved Weighted Biased Meta-Structure9
Optimistic Transaction Processing in Deterministic Database8
Cognition-Driven Traffic Simulation for Unstructured Road Networks8
Collaborative Matrix Factorization with Soft Regularization for Drug-Target Interaction Prediction8
Modelling and Verification of Real-Time Publish and Subscribe Protocol Using Uppaal and Simulink/Stateflow8
Efficient Multiagent Policy Optimization Based on Weighted Estimators in Stochastic Cooperative Environments8
A Heuristic Sampling Method for Maintaining the Probability Distribution8
Community Smell Occurrence Prediction on Multi-Granularity by Developer-Oriented Features and Process Metrics8
EasyModel: A Refinement-Based Modeling and Verification Approach for Self-Adaptive Software7
Pre-Train and Learn: Preserving Global Information for Graph Neural Networks7
Data-Driven Approaches for Spatio-Temporal Analysis: A Survey of the State-of-the-Arts7
Differential Privacy via a Truncated and Normalized Laplace Mechanism7
FDGLib: A Communication Library for Efficient Large-Scale Graph Processing in FPGA-Accelerated Data Centers7
DG-CNN: Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images7
Multi-Feature Super-Resolution Network for Cloth Wrinkle Synthesis7
Chinese Word Segmentation via BiLSTM+Semi-CRF with Relay Node7
A Comprehensive Review of Redirected Walking Techniques: Taxonomy, Methods, and Future Directions6
COLIN: A Cache-Conscious Dynamic Learned Index with High Read/Write Performance6
Feature Selection for Malware Detection on the Android Platform Based on Differences of IDF Values6
Specification and Verification of the Zab Protocol with TLA+6
Discrimination-Aware Domain Adversarial Neural Network6
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures6
Sequential Recommendation via Cross-Domain Novelty Seeking Trait Mining6
Exploiting Structural and Temporal Influence for Dynamic Social-Aware Recommendation6
Detecting Duplicate Contributions in Pull-Based Model Combining Textual and Change Similarities6
A Survey of Text Summarization Approaches Based on Deep Learning6
Denoising Stochastic Progressive Photon Mapping Renderings Using a Multi-Residual Network6
Multi-Scale Deep Cascade Bi-Forest for Electrocardiogram Biometric Recognition6
Characterizing and Detecting Gas-Inefficient Patterns in Smart Contracts6
Interference Analysis of Co-Located Container Workloads: A Perspective from Hardware Performance Counters6
Synthetic Lethal Interactions Prediction Based on Multiple Similarity Measures Fusion5
Logistic Weighted Profile-Based Bi-Random Walk for Exploring MiRNA-Disease Associations5
A Study on Modeling and Optimization of Memory Systems5
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis5
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View4
Huge Page Friendly Virtualized Memory Management4
Discovering API Directives from API Specifications with Text Classification4
FDNet: A Deep Learning Approach with Two Parallel Cross Encoding Pathways for Precipitation Nowcasting4
User Account Linkage Across Multiple Platforms with Location Data4
Automatic Buffer Overflow Warning Validation4
xCCL: A Survey of Industry-Led Collective Communication Libraries for Deep Learning4
Probability-Based Channel Pruning for Depthwise Separable Convolutional Networks4
ARSlice: Head-Mounted Display Augmented with Dynamic Tracking and Projection4
Improving Entity Linking in Chinese Domain by Sense Embedding Based on Graph Clustering4
Impacts of Dirty Data on Classification and Clustering Models: An Experimental Evaluation4
Enriching Context Information for Entity Linking with Web Data4
Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems3
An Effective Discrete Artificial Bee Colony Based SPARQL Query Path Optimization by Reordering Triples3
Item Cold-Start Recommendation with Personalized Feature Selection3
DeltaFuzz: Historical Version Information Guided Fuzz Testing3
Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results3
Predicted Robustness as QoS for Deep Neural Network Models3
MPI-RCDD: A Framework for MPI Runtime Communication Deadlock Detection3
TOAST: Automated Testing of Object Transformers in Dynamic Software Updates3
Color Image Super-Resolution and Enhancement with Inter-Channel Details at Trivial Cost3
Neural Explainable Recommender Model Based on Attributes and Reviews3
Word-Pair Relevance Modeling with Multi-View Neural Attention Mechanism for Sentence Alignment3
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference3
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks3
A Machine Learning Framework with Feature Selection for Floorplan Acceleration in IC Physical Design3
SymPas: Symbolic Program Slicing3
ProSy: API-Based Synthesis with Probabilistic Model3
Single Image Deraining Using Residual Channel Attention Networks3
GAEBic: A Novel Biclustering Analysis Method for miRNA-Targeted Gene Data Based on Graph Autoencoder2
Minimum Time Extrema Estimation for Large-Scale Radio-Frequency Identification Systems2
Revisiting Persistent Indexing Structures on Intel Optane DC Persistent Memory2
Verification of Real Time Operating System Exception Management Based on SPARCv82
Seg-CapNet: A Capsule-Based Neural Network for the Segmentation of Left Ventricle from Cardiac Magnetic Resonance Imaging2
Document-Level Neural Machine Translation with Hierarchical Modeling of Global Context2
Reference Image Guided Super-Resolution via Progressive Channel Attention Networks2
Apollo: Rapidly Picking the Optimal Cloud Configurations for Big Data Analytics Using a Data-Driven Approach2
Enhancing N-Gram Based Metrics with Semantics for Better Evaluation of Abstractive Text Summarization2
Usage Scenarios for Byte-Addressable Persistent Memory in High-Performance and Data Intensive Computing2
Simulation Might Change Your Results: A Comparison of Context-Aware System Input Validation in Simulated and Physical Environments2
AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel2
Correlated Differential Privacy of Multiparty Data Release in Machine Learning2
A Survey on Clock Synchronization in the Industrial Internet2
Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance Pooling2
A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications2
Efficient Partitioning Method for Optimizing the Compression on Array Data2
Harmonia: Explicit Congestion Notification and Credit-Reservation Transport Converged Congestion Control in Datacenters2
Deploy Efficiency Driven k-Barrier Construction Scheme Based on Target Circle in Directional Sensor Network2
Imputing DNA Methylation by Transferred Learning Based Neural Network2
Mixed Hierarchical Networks for Deep Entity Matching2
Language Adaptation for Entity Relation Classification via Adversarial Neural Networks2
ReLoc: Indoor Visual Localization with Hierarchical Sitemap and View Synthesis2
Local Homography Estimation on User-Specified Textureless Regions2
Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing2
CGTracker: Center Graph Network for One-Stage Multi-Pedestrian-Object Detection and Tracking2
A Prefetch-Adaptive Intelligent Cache Replacement Policy Based on Machine Learning2
You Are How You Behave – Spatiotemporal Representation Learning for College Student Academic Achievement2
Towards Accurate Bit Error Simulation in Wireless Sensor Networks Including Environmental Influences2
Towards Defense Against Adversarial Attacks on Graph Neural Networks via Calibrated Co-Training2
Method for Processing Graph Degeneracy in Dynamic Geometry Based on Domain Design2
Event-Based Semantics of UML 2.X Concurrent Sequence Diagrams for Formal Verification2
Topic Modeling Based Warning Prioritization from Change Sets of Software Repository2
Unimem: Runtime Data Management on Non-Volatile Memory-Based Heterogeneous Main Memory for High Performance Computing2
A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks2
Quality of Service Support in RPL Networks: Standing State and Future Prospects2
Using Markov Chain Based Estimation of Distribution Algorithm for Model-Based Safety Analysis of Graph Transformation2
Learn Robust Pedestrian Representation Within Minimal Modality Discrepancy for Visible-Infrared Person Re-Identification2
Conjugate-Gradient Progressive-Iterative Approximation for Loop and Catmull-Clark Subdivision Surface Interpolation2
Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation2
Automatically Identifying Calling-Prone Higher-Order Functions of Scala Programs to Assist Testers1
A Real-Time Multi-Stage Architecture for Pose Estimation of Zebrafish Head with Convolutional Neural Networks1
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor1
Learning Local Contrast for Crisp Edge Detection1
An Efficient Scheme to Defend Data-to-Control-Plane Saturation Attacks in Software-Defined Networking1
Intent-Slot Correlation Modeling for Joint Intent Prediction and Slot Filling1
Improving Ocean Data Services with Semantics and Quick Index1
Write-Optimized B+ Tree Index Technology for Persistent Memory1
TLP-LDPC: Three-Level Parallel FPGA Architecture for Fast Prototyping of LDPC Decoder Using High-Level Synthesis1
The Memory-Bounded Speedup Model and Its Impacts in Computing1
Facebook and Tencent Data Fit a Cube Law Better than Metcalfe’s Law1
A Survey of Non-Volatile Main Memory File Systems1
A Character Flow Framework for Multi-Oriented Scene Text Detection1
IMPULP: A Hardware Approach for In-Process Memory Protection via User-Level Partitioning1
Mining Design Pattern Use Scenarios and Related Design Pattern Pairs: A Case Study on Online Posts1
Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization1
A Blockchain-Based Protocol for Malicious Price Discrimination1
Extracting Variable-Depth Logical Document Hierarchy from Long Documents: Method, Evaluation, and Application1
6D Object Pose Estimation in Cluttered Scenes from RGB Images1
Leveraging Document-Level and Query-Level Passage Cumulative Gain for Document Ranking1
Detecting Anomalous Bus-Driving Behaviors from Trajectories1
Test-Driven Feature Extraction of Web Components1
Cardinality Estimator: Processing SQL with a Vertical Scanning Convolutional Neural Network1
Connecting the Dots in Self-Supervised Learning: A Brief Survey for Beginners1
Machine Learning Aided Key-Guessing Attack Paradigm Against Logic Block Encryption1
Vulnerable Region-Aware Greybox Fuzzing1
DEM: Deep Entity Matching Across Heterogeneous Information Networks1
HXPY: A High-Performance Data Processing Package for Financial Time-Series Data1
DeepHBSP: A Deep Learning Framework for Predicting Human Blood-Secretory Proteins Using Transfer Learning1
Temperature-Aware Electromigration Analysis with Current-Tracking in Power Grid Networks1
Preface1
ML-Parser: An Efficient and Accurate Online Log Parser1
Element-Arrangement Context Network for Facade Parsing1
A Multi-Agent Spatial Logic for Scenario-Based Decision Modeling and Verification in Platoon Systems1
Probabilistic Fault Diagnosis of Clustered Faults for Multiprocessor Systems1
Evaluating and Constraining Hardware Assertions with Absent Scenarios1
SMART: Speedup Job Completion Time by Scheduling Reduce Tasks1
Inversion Optimization Strategy Based on Primitives with Complement Attributes1
Verifying Contextual Refinement with Ownership Transfer1
Towards Efficient Short-Range Pair Interaction on Sunway Many-Core Architecture1
Checking Causal Consistency of MongoDB1
Multimodal Interactive Network for Sequential Recommendation1
Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism1
Approximate Processing Element Design and Analysis for the Implementation of CNN Accelerators1
Synthetic Data Generation and Shuffled Multi-Round Training Based Offline Handwritten Mathematical Expression Recognition1
Trace Semantics and Algebraic Laws for Total Store Order Memory Model1
Ubiquitous WiFi and Acoustic Sensing: Principles, Technologies, and Applications1
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller1
Jupiter Made Abstract, and Then Refined1
Bigflow: A General Optimization Layer for Distributed Computing Frameworks1
Unraveling Iterative Control Structures from Business Processes1
Modular Verification of SPARCv8 Code1
I/O Efficient Early Bursting Cohesive Subgraph Discovery in Massive Temporal Networks1
A Semi-Tensor Product Based All Solutions Boolean Satisfiability Solver1
RC-Net: Row and Column Network with Text Feature for Parsing Floor Plan Images1
CNLPA-MVS: Coarse-Hypotheses Guided Non-Local PatchMatch Multi-View Stereo1
GridDroid—An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface1
Is It Easy to Recognize Baby’s Age and Gender?1
SOCA-DOM: A Mobile System-on-Chip Array System for Analyzing Big Data on the Move1
Accelerating DAG-Style Job Execution via Optimizing Resource Pipeline Scheduling1
A Survey of Approximate Computing: From Arithmetic Units Design to High-Level Applications1
Information Superbahn: Towards a Planet-Scale, Low-Entropy and High-Goodput Computing Utility1
Novel Positive Multi-Layer Graph Based Method for Collaborative Filtering Recommender Systems1
Towards Exploring Large Molecular Space: An Efficient Chemical Genetic Algorithm1
PCRTAM-Net: A Novel Pre-Activated Convolution Residual and Triple Attention Mechanism Network for Retinal Vessel Segmentation1
Multi-Attribute Preferences Mining Method for Group Users with the Process of Noise Reduction1
Self-Supervised Music Motion Synchronization Learning for Music-Driven Conducting Motion Generation1
Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest1
Area Efficient Pattern Representation of Binary Neural Networks on RRAM1
Minimum Epsilon-Kernel Computation for Large-Scale Data Processing1
NfvInsight: A Framework for Automatically Deploying and Benchmarking VNF Chains1
0.033324956893921