Computer Science and Information Systems

Papers
(The TQCC of Computer Science and Information Systems is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Optimized placement of symmetrical service function chain in network function virtualization33
The analysis of intelligent urban form generation design based on deep learning33
Echo state network for features extraction and segmentation of tomography images27
Guest editorial: Explainable and trustworthy methods for next-generation artificial intelligence for reasonable data size26
Research on problem formulations in resource-aware problems across scientific domains and applications24
Comparing reinforcement learning algorithms for a trip building task: A multi-objective approach using non-local information20
A hierarchical federated learning model with adaptive model parameter aggregation16
A novel approach for sEMG gesture recognition using resource-constrained hardware platforms16
MCClusteringSM: An approach for the multicriteria clustering problem based on a credibility similarity measure16
Semantic feature-based test selection for deep neural networks: A frequency domain perspective15
Evaluation of deep learning techniques for plant disease detection14
Solution for TSP/mTSP with an improved parallel clustering and elitist ACO14
A practical and UC-secure decentralized key management and authentication scheme based on blockchain for VNDN12
Building of online evaluation system based on socket protocol12
A Dockerized big data architecture for sports analytics11
PI2M-ITGov - panel of indicators for monitoring and maintaining the information technology governance: Method and artefacts11
Explainable information retrieval using deep learning for medical images11
Development of recommendation systems using game theoretic techniques10
Editorial10
On the effectiveness of Gated Echo State Networks for data exhibiting long-term dependencies10
Effective methods for email classification: Is it a business or personal email?10
ECW-EGNet: Exploring Cross-ModalWeighting and edge-guided decoder network for RGB-D salient object detection10
Guest editorial: Papers selected from European conference on advances in databases and information systems9
Human action recognition using a depth sequence key-frames based on discriminative collaborative representation classifier for healthcare analytics9
Medical record information storage scheme based on blockchain and attribute role-based access control8
MakeCode arcade platform for game-based learning8
GCN-LSTM: multi-label educational emotion prediction based on graph Convolutional network and long and short term memory network fusion label correlation in online social networks8
Operational semantics in a domain-specific robot control language: A pedagogical use case8
Read between the interactions: Understanding non-interacted items for accurate multimedia recommendation8
Construction of innovative thinking training system for computer majors under the background of new engineering subject8
TRL-PROTAC: A pre-trained generator of PROTACs targeting specific proteins optimized by reinforcement learning8
Spatio-temporal-based multi-level aggregation network for physical action recognition7
Data-centric UML profile for agroecology applications: Agricultural autonomous robots monitoring case study7
Fire detection models based on attention mechanisms and multiscale features7
Heterogenous-view occluded expression data recognition based on cycle-consistent adversarial network and K-SVD dictionary learning under intelligent cooperative robot environment7
Data-driven traffic management: Enhancing road safety through integrated digital twin technology7
Towards addressing item cold-start problem in collaborative filtering by embedding agglomerative clustering and FP-growth into the recommendation system7
The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review7
Scaling industrial applications for the Big Data era7
A fast non-dominated sorting multi-objective symbiotic organism search algorithm for energy efficient locomotion of snake robot7
Trustless exchange for personal data: Adapting intellectual property trading security protocols for data sovereignty6
Resource-aware object detection and recognition using edge AI across the edge-fog computing continuum6
Energy-efficiency of software and hardware algorithms6
Distributed ledger technology: State-of-the-art and current challenges6
Deep RNN-based network traffic classification scheme in edge computing system6
MEC-MS: A novel optimized coverage algorithm with mobile edge computing of migration strategy in WSNs6
The duration threshold of video content observation: An experimental investigation of visual perception efficiency6
Adaptive multiscale sparse unmixing for hyperspectral remote sensing image6
Biometric lock with facial recognition implemented with deep learning techniques6
Guest editorial - Management of digital ecosystems6
Guest editorial: Deep meta-learning and explainable artificial intelligence (XAI): Methodologies, interactivity and applications6
The application of machine learning techniques in prediction of quality of life features for cancer patients5
TS-GCN: Aspect-level sentiment classification model for consumer reviews5
Automatic conceptual database design based on heterogeneous source artifacts5
Editorial5
Anomalous traffic identification method for POST messages based on gambling website templates5
Semantic web based platform for the harmonization of teacher education curricula5
Recent advancements in privacy-aware protocols of source location privacy in wireless sensor networks: A survey4
Guest editorial - applications of intelligent systems4
Matching business process behavior with encoding techniques via meta-learning: An anomaly detection study4
An approach for selecting countermeasures against harmful information based on uncertainty management4
A novel industrial big data fusion method based on Q-learning and cascade classifier4
Application of the Inception-ResNet-V2 algorithm to the analysis of embryo microscope images for the prediction model of assisted reproduction4
A new frog leaping algorithm-oriented fully convolutional neural network for dance motion object saliency detection4
A consortium blockchain-based information management system for unmanned vehicle logistics4
DRN-SEAM: A deep residual network based on squeeze-and-excitation attention mechanism for motion recognition in education4
A novel deep fully convolutional encoder-decoder network and similarity analysis for English education text event clustering analysis4
Improved session recommendation using contrastive learning based tail adjusted repeat aware graph neural network4
Neural coreference resolution for Slovene language3
Applying SPIN checker on 5G EAP-TLS authentication protocol analysis3
A novel deep LeNet-5 convolutional neural network model for image recognition3
CTA-Net: A gaze estimation network based on dual feature aggregation and attention cross fusion3
Editorial3
Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping3
A hybrid GA-powell algorithm for geometric constraint solving3
Teaching computational thinking in primary schools: Worldwide trends and teachers’ attitudes3
VSAF: Verifiable and secure aggregation scheme for federated learning in edge computing3
An ANN-WSM hybrid framework for sustainable personalized learning in smart education3
Sternum age estimation with dual channel fusion CNN model3
An effective method for determining consensus in large collectives3
Sentiment polarity analysis of love letters: Evaluation of TextBlob, Vader, Flair, and Hugging Face transformer3
The integration of artificial intelligence and ethnic music cultural inheritance under deep learning3
A novel feature fusion model based on non-subsampled shear-wave transform for retinal blood vessel segmentation3
GAN-DNADE: Image encryption algorithm based on generative adversarial network and DNA dynamic encoding3
LUN-BiSeNetV2: A lightweight unstructured network based on BiSeNetV2 for road scene segmentation3
A machine learning approach for learning temporal point process3
Editorial3
Federated learning with committee mechanism for class imbalance3
Guest editorial - real-time image processing with deep neural networks and optimization algorithms3
Entropy-based network traffic anomaly classification method resilient to deception3
DomiCom: Discovery of top-k dominant communities in networks with node attributes3
A multi-feature fusion model based on long and short term memory network and improved artificial bee colony algorithm for Esnglish text classification3
0.16143798828125