Journal of Computer Science and Technology

Papers
(The TQCC of Journal of Computer Science and Technology is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-07-01 to 2024-07-01.)
ArticleCitations
Active Learning Query Strategies for Classification, Regression, and Clustering: A Survey98
A Survey on Blocking Technology of Entity Resolution78
Serendipity in Recommender Systems: A Systematic Literature Review54
CytoBrain: Cervical Cancer Screening System Based on Deep Learning Technology46
Diagnosis of COVID-19 Pneumonia via a Novel Deep Learning Architecture40
Predicting Code Smells and Analysis of Predictions: Using Machine Learning Techniques and Software Metrics32
ATLRec: An Attentional Adversarial Transfer Learning Network for Cross-Domain Recommendation27
Comparison Between Deep Learning Models and Traditional Machine Learning Approaches for Facial Expression Recognition in Ageing Adults26
Robust Needle Localization and Enhancement Algorithm for Ultrasound by Deep Learning and Beam Steering Methods24
A Survey of Non-Volatile Main Memory Technologies: State-of-the-Arts, Practices, and Future Directions20
Verifying ReLU Neural Networks from a Model Checking Perspective19
Learning Human-Written Commit Messages to Document Code Changes17
Constructing an Educational Knowledge Graph with Concepts Linked to Wikipedia17
Performance Evaluation of Memory-Centric ARMv8 Many-Core Architectures: A Case Study with Phytium 2000+16
Data Security and Privacy in Bitcoin System: A Survey16
A Comprehensive Review of Redirected Walking Techniques: Taxonomy, Methods, and Future Directions16
WATuning: A Workload-Aware Tuning System with Attention-Based Deep Reinforcement Learning15
SE-Chain: A Scalable Storage and Efficient Retrieval Model for Blockchain14
Source-Free Unsupervised Domain Adaptation with Sample Transport Learning14
A Comparative Study of CNN- and Transformer-Based Visual Style Transfer14
A Revisit of Shape Editing Techniques: From the Geometric to the Neural Viewpoint13
3D Object Tracking with Adaptively Weighted Local Bundles13
PIM-Align: A Processing-in-Memory Architecture for FM-Index Search Algorithm12
Machine Learning Techniques for Software Maintainability Prediction: Accuracy Analysis11
Partial Label Learning via Conditional-Label-Aware Disambiguation11
A Survey of Text Summarization Approaches Based on Deep Learning11
Window Detection in Facades Using Heatmap Fusion11
FATOC: Bug Isolation Based Multi-Fault Localization by Using OPTICS Clustering11
Fault-Tolerant Hamiltonicity and Hamiltonian Connectivity of BCube with Various Faulty Elements11
COLIN: A Cache-Conscious Dynamic Learned Index with High Read/Write Performance10
Collaborative Matrix Factorization with Soft Regularization for Drug-Target Interaction Prediction10
Predicting CircRNA-Disease Associations Based on Improved Weighted Biased Meta-Structure10
Pre-Train and Learn: Preserving Global Information for Graph Neural Networks9
Characterizing and Detecting Gas-Inefficient Patterns in Smart Contracts9
Modelling and Verification of Real-Time Publish and Subscribe Protocol Using Uppaal and Simulink/Stateflow9
Chinese Word Segmentation via BiLSTM+Semi-CRF with Relay Node9
Cognition-Driven Traffic Simulation for Unstructured Road Networks9
DG-CNN: Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images9
A Heuristic Sampling Method for Maintaining the Probability Distribution8
Community Smell Occurrence Prediction on Multi-Granularity by Developer-Oriented Features and Process Metrics8
Differential Privacy via a Truncated and Normalized Laplace Mechanism8
User Account Linkage Across Multiple Platforms with Location Data7
Detecting Duplicate Contributions in Pull-Based Model Combining Textual and Change Similarities7
Multi-Scale Deep Cascade Bi-Forest for Electrocardiogram Biometric Recognition7
Multi-Feature Super-Resolution Network for Cloth Wrinkle Synthesis7
FDGLib: A Communication Library for Efficient Large-Scale Graph Processing in FPGA-Accelerated Data Centers7
EasyModel: A Refinement-Based Modeling and Verification Approach for Self-Adaptive Software7
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View6
Specification and Verification of the Zab Protocol with TLA+6
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures6
Feature Selection for Malware Detection on the Android Platform Based on Differences of IDF Values6
Impacts of Dirty Data on Classification and Clustering Models: An Experimental Evaluation6
A Study on Modeling and Optimization of Memory Systems6
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis6
Logistic Weighted Profile-Based Bi-Random Walk for Exploring MiRNA-Disease Associations6
Synthetic Lethal Interactions Prediction Based on Multiple Similarity Measures Fusion5
xCCL: A Survey of Industry-Led Collective Communication Libraries for Deep Learning5
FDNet: A Deep Learning Approach with Two Parallel Cross Encoding Pathways for Precipitation Nowcasting5
Discovering API Directives from API Specifications with Text Classification5
A Prefetch-Adaptive Intelligent Cache Replacement Policy Based on Machine Learning5
Learn Robust Pedestrian Representation Within Minimal Modality Discrepancy for Visible-Infrared Person Re-Identification5
Probability-Based Channel Pruning for Depthwise Separable Convolutional Networks4
Automatic Buffer Overflow Warning Validation4
The Memory-Bounded Speedup Model and Its Impacts in Computing4
ML-Parser: An Efficient and Accurate Online Log Parser4
Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks4
GAEBic: A Novel Biclustering Analysis Method for miRNA-Targeted Gene Data Based on Graph Autoencoder4
Improving Entity Linking in Chinese Domain by Sense Embedding Based on Graph Clustering4
Single Image Deraining Using Residual Channel Attention Networks4
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference4
Enriching Context Information for Entity Linking with Web Data4
ARSlice: Head-Mounted Display Augmented with Dynamic Tracking and Projection4
Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest4
Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results4
A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications4
SymPas: Symbolic Program Slicing3
Item Cold-Start Recommendation with Personalized Feature Selection3
Multimodal Interactive Network for Sequential Recommendation3
ProSy: API-Based Synthesis with Probabilistic Model3
Neural Explainable Recommender Model Based on Attributes and Reviews3
Predicted Robustness as QoS for Deep Neural Network Models3
Ubiquitous WiFi and Acoustic Sensing: Principles, Technologies, and Applications3
An Effective Discrete Artificial Bee Colony Based SPARQL Query Path Optimization by Reordering Triples3
Revisiting Persistent Indexing Structures on Intel Optane DC Persistent Memory3
Mixed Hierarchical Networks for Deep Entity Matching3
DeltaFuzz: Historical Version Information Guided Fuzz Testing3
ReLoc: Indoor Visual Localization with Hierarchical Sitemap and View Synthesis3
AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel3
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor3
Universal Image Steganalysis Based on Convolutional Neural Network with Global Covariance Pooling3
Method for Processing Graph Degeneracy in Dynamic Geometry Based on Domain Design3
Color Image Super-Resolution and Enhancement with Inter-Channel Details at Trivial Cost3
A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks3
Quality of Service Support in RPL Networks: Standing State and Future Prospects3
A Survey of Approximate Computing: From Arithmetic Units Design to High-Level Applications3
Conjugate-Gradient Progressive-Iterative Approximation for Loop and Catmull-Clark Subdivision Surface Interpolation3
Facebook and Tencent Data Fit a Cube Law Better than Metcalfe’s Law3
TOAST: Automated Testing of Object Transformers in Dynamic Software Updates3
0.2002329826355