Frontiers of Computer Science

Papers
(The median citation count of Frontiers of Computer Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Challenges and future directions of secure federated learning: a survey63
DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning62
A survey on large language model based autonomous agents60
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform60
A survey of music emotion recognition45
Graph convolution machine for context-aware recommender system41
Image smog restoration using oblique gradient profile prior and energy minimization37
A survey of Intel SGX and its applications32
Brain tumor localization and segmentation using mask RCNN31
Derivative-free reinforcement learning: a review28
Protein interaction networks: centrality, modularity, dynamics, and applications26
piEnPred: a bi-layered discriminative model for enhancers and their subtypes via novel cascade multi-level subset feature selection algorithm25
Practical age estimation using deep label distribution learning24
Compositional metric learning for multi-label classification24
AIDEDNet: anti-interference and detail enhancement dehazing network for real-world scenes23
Towards a better prediction of subcellular location of long non-coding RNA23
Cancer classification with data augmentation based on generative adversarial networks21
DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography20
Rumor detection with self-supervised learning on texts and social graph20
A subgraph matching algorithm based on subgraph index for knowledge graph19
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network18
String kernels construction and fusion: a survey with bioinformatics application17
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks17
Rehearsal: learning from prediction to decision16
Mean estimation over numeric data with personalized local differential privacy16
SCENERY: a lightweight block cipher based on Feistel structure16
A mobile edge computing-based applications execution framework for Internet of Vehicles16
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis15
Exploring associations between streetscape factors and crime behaviors using Google Street View images15
Identification of differential brain regions in MCI progression via clustering-evolutionary weighted SVM ensemble algorithm15
Instance-sequence reasoning for video question answering14
Label distribution for multimodal machine learning14
The mass, fake news, and cognition security14
Attention based simplified deep residual network for citywide crowd flows prediction13
ABDKS: attribute-based encryption with dynamic keyword search in fog computing13
Domain-specific feature elimination: multi-source domain adaptation for image classification12
A survey on federated learning: a perspective from multi-party computation12
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation12
Multiband decomposition and spectral discriminative analysis for motor imagery BCI via deep neural network12
Visual abstraction of dynamic network via improved multi-class blue noise sampling12
iNet: visual analysis of irregular transition in multivariate dynamic networks12
Semi-supervised community detection on attributed networks using non-negative matrix tri-factorization with node popularity12
New development of cognitive diagnosis models12
DBST: a lightweight block cipher based on dynamic S-box11
Parallel exploration via negatively correlated search11
Hierarchical data replication strategy to improve performance in cloud computing11
Large sequence models for sequential decision-making: a survey11
GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding11
Attribute augmentation-based label integration for crowdsourcing11
Vehicle color recognition based on smooth modulation neural network with multi-scale feature fusion11
Single image super-resolution: a comprehensive review and recent insight10
Side-channel analysis attacks based on deep learning network10
DRPS: efficient disk-resident parameter servers for distributed machine learning10
Identification and classification of promoters using the attention mechanism based on long short-term memory10
BA-GNN: Behavior-aware graph neural network for session-based recommendation10
Effort-aware cross-project just-in-time defect prediction framework for mobile apps10
ResLNet: deep residual LSTM network with longer input for action recognition10
Collaborative eye tracking based code review through real-time shared gaze visualization10
A survey of discourse parsing10
A Monte Carlo Neural Fictitious Self-Play approach to approximate Nash Equilibrium in imperfect-information dynamic games10
A survey of operating system support for persistent memory10
A systematic study on the role of SentiWordNet in opinion mining9
circ2CBA: prediction of circRNA-RBP binding sites combining deep learning and attention mechanism9
Pairwise tagging framework for end-to-end emotion-cause pair extraction9
Protein acetylation sites with complex-valued polynomial model9
Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities9
An efficient and authenticated key establishment scheme based on fog computing for healthcare system9
Community detection with attributed random walk via seed replacement9
Using BiLSTM with attention mechanism to automatically detect self-admitted technical debt8
An improved master-apprentice evolutionary algorithm for minimum independent dominating set problem8
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage8
Representation learning via an integrated autoencoder for unsupervised domain adaptation8
Experience report: investigating bug fixes in machine learning frameworks/libraries8
Demystifying Ethereum account diversity: observations, models and analysis8
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint8
Citywide package deliveries via crowdshipping: minimizing the efforts from crowdsourcers8
Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm8
A novel DNA-inspired encryption strategy for concealing cloud storage8
Speech-driven facial animation with spectral gathering and temporal attention8
Iterative Android automated testing8
A search-based identification of variable microservices for enterprise SaaS8
Cross-scene passive human activity recognition using commodity WiFi8
Self-corrected unsupervised domain adaptation8
Resource abstraction and data placement for distributed hybrid memory pool7
Effective ensemble learning approach for SST field prediction using attention-based PredRNN7
Learning label-specific features for decomposition-based multi-class classification7
LMR-CBT: learning modality-fused representations with CB-Transformer for multimodal emotion recognition from unaligned multimodal sequences7
Endowing rotation invariance for 3D finger shape and vein verification7
Task assignment for social-oriented crowdsourcing7
Intellectual property protection for deep semantic segmentation models7
Controllable data synthesis method for grammatical error correction7
Physiological-physical feature fusion for automatic voice spoofing detection7
An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities7
Degradation-adaptive neural network for jointly single image dehazing and desnowing7
A bi-metric autoscaling approach for n-tier web applications on kubernetes7
A learnable self-supervised task for unsupervised domain adaptation on point cloud classification and segmentation7
The utilization of algorithms for cloud internet of things application domains: a review7
MSDA: multi-subset data aggregation scheme without trusted third party7
TransRec++: Translation-based sequential recommendation with heterogeneous feedback7
Quantifying predictability of sequential recommendation via logical constraints7
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes6
Joint user profiling with hierarchical attention networks6
Robust watermarking of databases in order-preserving encrypted domain6
Differential privacy histogram publishing method based on dynamic sliding window6
Prediction of job characteristics for intelligent resource allocation in HPC systems: a survey and future directions6
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor6
Physical layer authentication for automotive cyber physical systems based on modified HB protocol6
A framework combines supervised learning and dense subgraphs discovery to predict protein complexes6
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid6
Visibility restoration for real-world hazy images via improved physical model and Gaussian total variation6
Unsupervised statistical text simplification using pre-trained language modeling for initialization6
BIC-based node order learning for improving Bayesian network structure learning6
AE-TPGG: a novel autoencoder-based approach for single-cell RNA-seq data imputation and dimensionality reduction6
FPGA sharing in the cloud: a comprehensive analysis6
Weakly supervised temporal action localization with proxy metric modeling6
IP-geolocater: a more reliable IP geolocation algorithm based on router error training6
Defense against local model poisoning attacks to byzantine-robust federated learning6
Local feature aggregation algorithm based on graph convolutional network6
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals5
Three-dimensional quantum wavelet transforms5
Exploiting user behavior learning for personalized trajectory recommendations5
An efficient memory data organization strategy for application-characteristic graph processing5
A feature-wise attention module based on the difference with surrounding features for convolutional neural networks5
DOF: a generic approach of domain ontology fuzzification5
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing5
MAML2: meta reinforcement learning via meta-learning for task categories5
Toward few-shot domain adaptation with perturbation-invariant representation and transferable prototypes5
Multi-dimensional information-driven many-objective software remodularization approach5
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data5
A time-aware hybrid recommendation scheme combining content-based and collaborative filtering5
Bi-objective evolutionary Bayesian network structure learning via skeleton constraint5
Full friendly index sets of mCn5
Evolutionary selection for regression test cases based on diversity5
Unsupervised spectral feature selection algorithms for high dimensional data5
OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering5
On the analysis of ant colony optimization for the maximum independent set problem5
Self-adaptive label filtering learning for unsupervised domain adaptation5
Wi-Fi based non-invasive detection of indoor wandering using LSTM model5
Label distribution learning for scene text detection5
Semantic and secure search over encrypted outsourcing cloud based on BERT5
VColor*: a practical approach for coloring large graphs4
Fine-grained management of I/O optimizations based on workload characteristics4
Multi-affect(ed): improving recommendation with similarity-enhanced user reliability and influence propagation4
EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption4
Data fusing and joint training for learning with noisy labels4
Performance analysis of ASR system in hybrid DNN-HMM framework using a PWL euclidean activation function4
WaveLines: towards effective visualization and analysis of stability in power grid simulation4
Decoupled deep hough voting for point cloud registration4
Person video alignment with human pose registration4
Multi-granularity semantic alignment distillation learning for remote sensing image semantic segmentation4
Blockchain based federated learning for intrusion detection for Internet of Things4
A novel threshold changeable secret sharing scheme4
A new design of parity-preserving reversible multipliers based on multiple-control toffoli synthesis targeting emerging quantum circuits4
Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy4
Scene-adaptive crowd counting method based on meta learning with dual-input network DMNet4
ReCSA: a dedicated sort accelerator using ReRAM-based content addressable memory4
A user requirements-oriented privacy policy self-adaption scheme in cloud computing4
Fine-grained sequence-to-sequence lip reading based on self-attention and self-distillation4
A primal-dual approximation algorithm for the k-prize-collecting minimum vertex cover problem with submodular penalties4
A prompt-based approach to adversarial example generation and robustness enhancement4
Active label distribution learning via kernel maximum mean discrepancy4
SeBROP: blind ROP attacks without returns4
Improving accuracy of automatic optical inspection with machine learning4
A semi-transparent selective undo algorithm for multi-user collaborative editors4
Optimal location query based on k nearest neighbours4
A multi-objective reinforcement learning algorithm for deadline constrained scientific workflow scheduling in clouds4
Federated learning-outcome prediction with multi-layer privacy protection4
How graph convolutions amplify popularity bias for recommendation?4
Efficient protocols for heavy hitter identification with local differential privacy4
Model-based automated testing of JavaScript Web applications via longer test sequences4
A fine-grained privacy protection data aggregation scheme for outsourcing smart grid4
Adaptive watermark generation mechanism based on time series prediction for stream processing4
PSLDA: a novel supervised pseudo document-based topic model for short texts4
FragDPI: a novel drug-protein interaction prediction model based on fragment understanding and unified coding4
Bidirectional Transformer with absolute-position aware relative position encoding for encoding sentences4
A location-based fog computing optimization of energy management in smart buildings: DEVS modeling and design of connected objects3
Efficient multi-scale community search method based on spectral graph wavelet3
Sememe knowledge computation: a review of recent advances in application and expansion of sememe knowledge bases3
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services3
An integrated pipeline model for biomedical entity alignment3
Measuring code maintainability with deep neural networks3
Sub-Nyquist spectrum sensing and learning challenge3
Document structure model for survey generation using neural network3
VulLoc: vulnerability localization based on inducing commits and fixing commits3
An evaluation and query algorithm for the influence of spatial location based on RkNN3
High-availability in-memory key-value store using RDMA and Optane DCPMM3
Identification of human microRNA-disease association via low-rank approximation-based link propagation and multiple kernel learning3
Model learning: a survey of foundations, tools and applications3
LIDAR: learning from imperfect demonstrations with advantage rectification3
Gauze: enabling communication-friendly block synchronization with cuckoo filter3
A comprehensive study on fault tolerance in stream processing systems3
Transportation mode detection using cumulative acoustic sensing and analysis3
IXT: Improved searchable encryption for multi-word queries based on PSI3
A lock-free approach to parallelizing personalized PageRank computations on GPU3
Graph-Segmenter: graph transformer with boundary-aware attention for semantic segmentation3
GRAMO: geometric resampling augmentation for monocular 3D object detection3
Kronos: towards bus contention-aware job scheduling in warehouse scale computers3
Research on key technologies of edge cache in virtual data space across WAN3
A graph-based contrastive learning framework for medicare insurance fraud detection3
User story clustering in agile development: a framework and an empirical study3
MiTAR: a study on human activity recognition based on NLP with microscopic perspective3
An improved multi-objective evolutionary algorithm for computation offloading in the multi-cloudlet environment3
Incorporating metapath interaction on heterogeneous information network for social recommendation3
An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network3
GCSS: a global collaborative scheduling strategy for wide-area high-performance computing3
Unpaired image to image transformation via informative coupled generative adversarial networks3
Teachers cooperation: team-knowledge distillation for multiple cross-domain few-shot learning3
Deep active sampling with self-supervised learning3
Improving meta-learning model via meta-contrastive loss3
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services3
In silico prediction methods of self-interacting proteins: an empirical and academic survey3
Collecting and analyzing key-value data under shuffled differential privacy3
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images3
Few-shot node classification via local adaptive discriminant structure learning3
A novel dense retrieval framework for long document retrieval3
A MLP-Mixer and mixture of expert model for remaining useful life prediction of lithium-ion batteries3
Return just your search: privacy-preserving homoglyph search for arbitrary languages3
cKBET: assessing goodness of batch effect correction for single-cell RNA-seq3
Towards better entity linking3
Distant supervised relation extraction based on residual attention3
A hybrid-order local search algorithm for set k-cover problem in wireless sensor networks3
A blockchain-based framework for data quality in edge-computing-enabled crowdsensing3
Human-machine interactive streaming anomaly detection by online self-adaptive forest3
APPCorp: a corpus for Android privacy policy document structure analysis3
Accelerating the cryo-EM structure determination in RELION on GPU cluster3
Defocus blur detection using novel local directional mean patterns (LDMP) and segmentation via KNN matting3
Accelerating temporal action proposal generation via high performance computing3
Financial performance evaluation and forecasting of enterprises by the combination of PCA and CNN deep learning3
Accelerating local SGD for non-IID data using variance reduction3
VenomAttack: automated and adaptive activity hijacking in Android2
Non-salient region erasure for time series augmentation2
DiagDO: an efficient model based diagnosis approach with multiple observations2
Fully distributed identity-based threshold signatures with identifiable aborts2
New construction of highly nonlinear resilient S-boxes via linear codes2
Low-cost client-side encryption and secure Internet of things (IoT) provisioning2
Polynomial stacked-attention network for nationality classification2
BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning2
Semantic similarity-based program retrieval: a multi-relational graph perspective2
Classification-oriented dawid skene model for transferring intelligence from crowds to machines2
Scalable and adaptive log manager in distributed systems2
An algorithm for solving satisfiability problem based on the structural information of formulas2
Transferring priors from virtual data for crowd counting in real world2
Exploiting comments information to improve legal public opinion news abstractive summarization2
Heterogeneous information network embedding with incomplete multi-view fusion2
Answering reachability queries with ordered label constraints over labeled graphs2
Representation learning: serial-autoencoder for personalized recommendation2
THS-GWNN: a deep learning framework for temporal network link prediction2
A comprehensive perspective of contrastive self-supervised learning2
Efficient policy evaluation by matrix sketching2
RS-store: RDMA-enabled skiplist-based key-value store for efficient range query2
0.053695917129517