Journal of Computer Science and Technology

Papers
(The TQCC of Journal of Computer Science and Technology is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Serendipity in Recommender Systems: A Systematic Literature Review56
CytoBrain: Cervical Cancer Screening System Based on Deep Learning Technology55
Diagnosis of COVID-19 Pneumonia via a Novel Deep Learning Architecture43
Predicting Code Smells and Analysis of Predictions: Using Machine Learning Techniques and Software Metrics34
Robust Needle Localization and Enhancement Algorithm for Ultrasound by Deep Learning and Beam Steering Methods28
A Survey of Non-Volatile Main Memory Technologies: State-of-the-Arts, Practices, and Future Directions21
A Comprehensive Review of Redirected Walking Techniques: Taxonomy, Methods, and Future Directions19
Learning Human-Written Commit Messages to Document Code Changes19
Verifying ReLU Neural Networks from a Model Checking Perspective19
Constructing an Educational Knowledge Graph with Concepts Linked to Wikipedia18
WATuning: A Workload-Aware Tuning System with Attention-Based Deep Reinforcement Learning17
Performance Evaluation of Memory-Centric ARMv8 Many-Core Architectures: A Case Study with Phytium 2000+16
SE-Chain: A Scalable Storage and Efficient Retrieval Model for Blockchain16
A Revisit of Shape Editing Techniques: From the Geometric to the Neural Viewpoint16
A Comparative Study of CNN- and Transformer-Based Visual Style Transfer16
PIM-Align: A Processing-in-Memory Architecture for FM-Index Search Algorithm14
A Survey of Text Summarization Approaches Based on Deep Learning14
Partial Label Learning via Conditional-Label-Aware Disambiguation14
Source-Free Unsupervised Domain Adaptation with Sample Transport Learning14
3D Object Tracking with Adaptively Weighted Local Bundles13
Characterizing and Detecting Gas-Inefficient Patterns in Smart Contracts12
Predicting CircRNA-Disease Associations Based on Improved Weighted Biased Meta-Structure11
Pre-Train and Learn: Preserving Global Information for Graph Neural Networks11
Differential Privacy via a Truncated and Normalized Laplace Mechanism11
COLIN: A Cache-Conscious Dynamic Learned Index with High Read/Write Performance11
Collaborative Matrix Factorization with Soft Regularization for Drug-Target Interaction Prediction10
DG-CNN: Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images10
Modelling and Verification of Real-Time Publish and Subscribe Protocol Using Uppaal and Simulink/Stateflow9
A Heuristic Sampling Method for Maintaining the Probability Distribution9
Community Smell Occurrence Prediction on Multi-Granularity by Developer-Oriented Features and Process Metrics8
Detecting Duplicate Contributions in Pull-Based Model Combining Textual and Change Similarities8
Multi-Scale Deep Cascade Bi-Forest for Electrocardiogram Biometric Recognition8
Impacts of Dirty Data on Classification and Clustering Models: An Experimental Evaluation8
FDGLib: A Communication Library for Efficient Large-Scale Graph Processing in FPGA-Accelerated Data Centers7
Logistic Weighted Profile-Based Bi-Random Walk for Exploring MiRNA-Disease Associations7
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis7
Multi-Feature Super-Resolution Network for Cloth Wrinkle Synthesis7
Ubiquitous WiFi and Acoustic Sensing: Principles, Technologies, and Applications7
xCCL: A Survey of Industry-Led Collective Communication Libraries for Deep Learning7
A Study on Modeling and Optimization of Memory Systems6
Specification and Verification of the Zab Protocol with TLA+6
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View6
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference6
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures6
Improving Entity Linking in Chinese Domain by Sense Embedding Based on Graph Clustering6
Learn Robust Pedestrian Representation Within Minimal Modality Discrepancy for Visible-Infrared Person Re-Identification5
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks5
SymPas: Symbolic Program Slicing5
DeltaFuzz: Historical Version Information Guided Fuzz Testing5
Discovering Cohesive Temporal Subgraphs with Temporal Density Aware Exploration5
FDNet: A Deep Learning Approach with Two Parallel Cross Encoding Pathways for Precipitation Nowcasting5
Synthetic Lethal Interactions Prediction Based on Multiple Similarity Measures Fusion5
Discovering API Directives from API Specifications with Text Classification5
GAEBic: A Novel Biclustering Analysis Method for miRNA-Targeted Gene Data Based on Graph Autoencoder5
A Prefetch-Adaptive Intelligent Cache Replacement Policy Based on Machine Learning5
Improving BERT Fine-Tuning via Self-Ensemble and Self-Distillation4
Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance Pooling4
ARSlice: Head-Mounted Display Augmented with Dynamic Tracking and Projection4
Automatic Buffer Overflow Warning Validation4
Connecting the Dots in Self-Supervised Learning: A Brief Survey for Beginners4
Single Image Deraining Using Residual Channel Attention Networks4
Towards Defense Against Adversarial Attacks on Graph Neural Networks via Calibrated Co-Training4
Seg-CapNet: A Capsule-Based Neural Network for the Segmentation of Left Ventricle from Cardiac Magnetic Resonance Imaging4
Towards Exploring Large Molecular Space: An Efficient Chemical Genetic Algorithm4
Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest4
The Memory-Bounded Speedup Model and Its Impacts in Computing4
HXPY: A High-Performance Data Processing Package for Financial Time-Series Data4
Verification of Real Time Operating System Exception Management Based on SPARCv84
Probability-Based Channel Pruning for Depthwise Separable Convolutional Networks4
VPI: Vehicle Programming Interface for Vehicle Computing4
WavEnhancer: Unifying Wavelet and Transformer for Image Enhancement4
ML-Parser: An Efficient and Accurate Online Log Parser4
Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results4
Revisiting Persistent Indexing Structures on Intel Optane DC Persistent Memory3
ReLoc: Indoor Visual Localization with Hierarchical Sitemap and View Synthesis3
A Survey on Clock Synchronization in the Industrial Internet3
Mixed Hierarchical Networks for Deep Entity Matching3
Correlated Differential Privacy of Multiparty Data Release in Machine Learning3
ProSy: API-Based Synthesis with Probabilistic Model3
Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing3
Neural Explainable Recommender Model Based on Attributes and Reviews3
Method for Processing Graph Degeneracy in Dynamic Geometry Based on Domain Design3
TOAST: Automated Testing of Object Transformers in Dynamic Software Updates3
AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel3
A Survey of Approximate Computing: From Arithmetic Units Design to High-Level Applications3
Trace Semantics and Algebraic Laws for Total Store Order Memory Model3
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor3
Multimodal Interactive Network for Sequential Recommendation3
Conjugate-Gradient Progressive-Iterative Approximation for Loop and Catmull-Clark Subdivision Surface Interpolation3
A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks3
An Effective Discrete Artificial Bee Colony Based SPARQL Query Path Optimization by Reordering Triples3
Document-Level Neural Machine Translation with Hierarchical Modeling of Global Context3
Symbolic Reasoning About Quantum Circuits in Coq3
Novel Positive Multi-Layer Graph Based Method for Collaborative Filtering Recommender Systems3
Topic Modeling Based Warning Prioritization from Change Sets of Software Repository3
Synthetic Data Generation and Shuffled Multi-Round Training Based Offline Handwritten Mathematical Expression Recognition3
Test-Driven Feature Extraction of Web Components3
Quality of Service Support in RPL Networks: Standing State and Future Prospects3
Facebook and Tencent Data Fit a Cube Law Better than Metcalfe’s Law3
0.028106927871704