Frontiers of Computer Science

Papers
(The median citation count of Frontiers of Computer Science is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Ethereum smart contract security research: survey and future research opportunities100
A survey of density based clustering algorithms74
DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning56
DFD-Net: lung cancer detection from denoised CT scan image using deep learning51
Challenges and future directions of secure federated learning: a survey47
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform38
A survey of music emotion recognition30
Graph convolution machine for context-aware recommender system29
Image smog restoration using oblique gradient profile prior and energy minimization26
A survey of Intel SGX and its applications23
Protein interaction networks: centrality, modularity, dynamics, and applications23
Brain tumor localization and segmentation using mask RCNN23
Compositional metric learning for multi-label classification23
piEnPred: a bi-layered discriminative model for enhancers and their subtypes via novel cascade multi-level subset feature selection algorithm22
Derivative-free reinforcement learning: a review21
AIDEDNet: anti-interference and detail enhancement dehazing network for real-world scenes20
Practical age estimation using deep label distribution learning19
Cancer classification with data augmentation based on generative adversarial networks19
Towards a better prediction of subcellular location of long non-coding RNA19
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks16
A framework based on sparse representation model for time series prediction in smart city15
A mobile edge computing-based applications execution framework for Internet of Vehicles15
Identification of differential brain regions in MCI progression via clustering-evolutionary weighted SVM ensemble algorithm14
Mean estimation over numeric data with personalized local differential privacy14
Exploring associations between streetscape factors and crime behaviors using Google Street View images14
A subgraph matching algorithm based on subgraph index for knowledge graph13
Where to go? Predicting next location in IoT environment12
Determining node duty cycle using Q-learning and linear regression for WSN12
Rehearsal: learning from prediction to decision12
Entity set expansion in knowledge graph: a heterogeneous information network perspective11
String kernels construction and fusion: a survey with bioinformatics application11
Attention based simplified deep residual network for citywide crowd flows prediction11
Semi-supervised community detection on attributed networks using non-negative matrix tri-factorization with node popularity11
Instance-sequence reasoning for video question answering11
Fingerprint matching, spoof and liveness detection: classification and literature review11
Label distribution for multimodal machine learning11
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network10
SCENERY: a lightweight block cipher based on Feistel structure10
DRPS: efficient disk-resident parameter servers for distributed machine learning10
The mass, fake news, and cognition security10
Multiband decomposition and spectral discriminative analysis for motor imagery BCI via deep neural network9
Parallel exploration via negatively correlated search9
Hierarchical data replication strategy to improve performance in cloud computing9
Information retrieval: a view from the Chinese IR community9
ResLNet: deep residual LSTM network with longer input for action recognition9
Side-channel analysis attacks based on deep learning network9
ABDKS: attribute-based encryption with dynamic keyword search in fog computing9
A survey of operating system support for persistent memory9
Collaborative eye tracking based code review through real-time shared gaze visualization8
GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding8
Find truth in the hands of the few: acquiring specific knowledge with crowdsourcing8
A proactive secret sharing scheme based on Chinese remainder theorem8
Experience report: investigating bug fixes in machine learning frameworks/libraries8
Attribute augmentation-based label integration for crowdsourcing8
Cross-scene passive human activity recognition using commodity WiFi8
Machine learning after the deep learning revolution8
MSDA: multi-subset data aggregation scheme without trusted third party7
Domain-specific feature elimination: multi-source domain adaptation for image classification7
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage7
A Monte Carlo Neural Fictitious Self-Play approach to approximate Nash Equilibrium in imperfect-information dynamic games7
A bi-metric autoscaling approach for n-tier web applications on kubernetes7
A novel DNA-inspired encryption strategy for concealing cloud storage7
iNet: visual analysis of irregular transition in multivariate dynamic networks7
PSO-ACSC: a large-scale evolutionary algorithm for image matting7
Effort-aware cross-project just-in-time defect prediction framework for mobile apps7
An efficient and authenticated key establishment scheme based on fog computing for healthcare system7
Resource abstraction and data placement for distributed hybrid memory pool7
Using BiLSTM with attention mechanism to automatically detect self-admitted technical debt7
Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities7
A survey of discourse parsing7
Citywide package deliveries via crowdshipping: minimizing the efforts from crowdsourcers7
Visual abstraction of dynamic network via improved multi-class blue noise sampling7
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis7
Physical layer authentication for automotive cyber physical systems based on modified HB protocol6
An improved master-apprentice evolutionary algorithm for minimum independent dominating set problem6
A search-based identification of variable microservices for enterprise SaaS6
Endowing rotation invariance for 3D finger shape and vein verification6
circ2CBA: prediction of circRNA-RBP binding sites combining deep learning and attention mechanism6
New development of cognitive diagnosis models6
Properties of the satisfiability threshold of the strictly d-regular random (3,2s)-SAT problem6
Mathematical model and simulated annealing algorithm for Chinese high school timetabling problems under the new curriculum innovation6
Iterative Android automated testing6
IP-geolocater: a more reliable IP geolocation algorithm based on router error training6
A systematic study on the role of SentiWordNet in opinion mining6
Speech-driven facial animation with spectral gathering and temporal attention6
Task assignment for social-oriented crowdsourcing6
Evaluating the usage of fault localization in automated program repair: an empirical study6
Matching user identities across social networks with limited profile data6
Pairwise tagging framework for end-to-end emotion-cause pair extraction6
Rumor detection with self-supervised learning on texts and social graph6
Identification and classification of promoters using the attention mechanism based on long short-term memory6
The utilization of algorithms for cloud internet of things application domains: a review6
DOF: a generic approach of domain ontology fuzzification5
Adversarial network embedding using structural similarity5
BIC-based node order learning for improving Bayesian network structure learning5
Controllable data synthesis method for grammatical error correction5
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators5
Community detection with attributed random walk via seed replacement5
On the analysis of ant colony optimization for the maximum independent set problem5
Defense against local model poisoning attacks to byzantine-robust federated learning5
Representation learning via an integrated autoencoder for unsupervised domain adaptation5
Full friendly index sets of mCn5
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service5
AE-TPGG: a novel autoencoder-based approach for single-cell RNA-seq data imputation and dimensionality reduction5
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes5
Physiological-physical feature fusion for automatic voice spoofing detection5
OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering5
Robust watermarking of databases in order-preserving encrypted domain5
Vehicle color recognition based on smooth modulation neural network with multi-scale feature fusion5
SSDBA: the stretch shrink distance based algorithm for link prediction in social networks5
Self-corrected unsupervised domain adaptation5
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor5
Prototyping federated learning on edge computing systems5
Demystifying Ethereum account diversity: observations, models and analysis5
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint5
An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities5
Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm5
Wi-Fi based non-invasive detection of indoor wandering using LSTM model4
Prediction of job characteristics for intelligent resource allocation in HPC systems: a survey and future directions4
VColor*: a practical approach for coloring large graphs4
A semi-transparent selective undo algorithm for multi-user collaborative editors4
Evolutionary selection for regression test cases based on diversity4
EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption4
Three-dimensional quantum wavelet transforms4
DBST: a lightweight block cipher based on dynamic S-box4
Performance analysis of ASR system in hybrid DNN-HMM framework using a PWL euclidean activation function4
Weakly supervised temporal action localization with proxy metric modeling4
Adaptive watermark generation mechanism based on time series prediction for stream processing4
Unsupervised statistical text simplification using pre-trained language modeling for initialization4
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation4
Label distribution learning for scene text detection4
Intellectual property protection for deep semantic segmentation models4
A multi-objective reinforcement learning algorithm for deadline constrained scientific workflow scheduling in clouds4
Data fusing and joint training for learning with noisy labels4
WaveLines: towards effective visualization and analysis of stability in power grid simulation4
A user requirements-oriented privacy policy self-adaption scheme in cloud computing4
A time-aware hybrid recommendation scheme combining content-based and collaborative filtering4
SeBROP: blind ROP attacks without returns4
Multi-granularity semantic alignment distillation learning for remote sensing image semantic segmentation4
Improving accuracy of automatic optical inspection with machine learning4
Improving neural sentence alignment with word translation4
Biologically inspired visual computing: the state of the art4
Predicting protein subchloroplast locations: the 10th anniversary4
Effective ensemble learning approach for SST field prediction using attention-based PredRNN4
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data4
FPGA sharing in the cloud: a comprehensive analysis4
TransRec++: Translation-based sequential recommendation with heterogeneous feedback4
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid4
Defocus blur detection using novel local directional mean patterns (LDMP) and segmentation via KNN matting3
Bidirectional Transformer with absolute-position aware relative position encoding for encoding sentences3
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing3
Fine-grained management of I/O optimizations based on workload characteristics3
An automated framework for advertisement detection and removal from sports videos using audio-visual cues3
Improving meta-learning model via meta-contrastive loss3
cKBET: assessing goodness of batch effect correction for single-cell RNA-seq3
Toward few-shot domain adaptation with perturbation-invariant representation and transferable prototypes3
Single image super-resolution: a comprehensive review and recent insight3
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services3
Pointwise manifold regularization for semi-supervised learning3
Towards better entity linking3
Return just your search: privacy-preserving homoglyph search for arbitrary languages3
Self-adaptive label filtering learning for unsupervised domain adaptation3
GCSS: a global collaborative scheduling strategy for wide-area high-performance computing3
Estimating posterior inference quality of the relational infinite latent feature model for overlapping community detection3
ReCSA: a dedicated sort accelerator using ReRAM-based content addressable memory3
Multi-dimensional information-driven many-objective software remodularization approach3
An integrated pipeline model for biomedical entity alignment3
A new design of parity-preserving reversible multipliers based on multiple-control toffoli synthesis targeting emerging quantum circuits3
Accelerating local SGD for non-IID data using variance reduction3
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images3
Local feature aggregation algorithm based on graph convolutional network3
Learning label-specific features for decomposition-based multi-class classification3
Large sequence models for sequential decision-making: a survey3
Efficient protocols for heavy hitter identification with local differential privacy3
Document structure model for survey generation using neural network3
A primal-dual approximation algorithm for the k-prize-collecting minimum vertex cover problem with submodular penalties3
k-dominant Skyline query algorithm for dynamic datasets3
Active label distribution learning via kernel maximum mean discrepancy3
Degradation-adaptive neural network for jointly single image dehazing and desnowing3
A learnable self-supervised task for unsupervised domain adaptation on point cloud classification and segmentation3
RS-store: RDMA-enabled skiplist-based key-value store for efficient range query3
Unsupervised spectral feature selection algorithms for high dimensional data3
Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy3
Multi-affect(ed): improving recommendation with similarity-enhanced user reliability and influence propagation3
Exploiting user behavior learning for personalized trajectory recommendations3
BA-GNN: Behavior-aware graph neural network for session-based recommendation3
A fine-grained privacy protection data aggregation scheme for outsourcing smart grid3
Measuring code maintainability with deep neural networks3
MiTAR: a study on human activity recognition based on NLP with microscopic perspective3
A novel threshold changeable secret sharing scheme2
Fine-grained sequence-to-sequence lip reading based on self-attention and self-distillation2
Efficient policy evaluation by matrix sketching2
Text-enhanced network representation learning2
An algorithm for solving satisfiability problem based on the structural information of formulas2
A two-level meta-heuristic approach for the minimum dominating tree problem2
MAML2: meta reinforcement learning via meta-learning for task categories2
Sub-Nyquist spectrum sensing and learning challenge2
A survey on large language model based autonomous agents2
VulLoc: vulnerability localization based on inducing commits and fixing commits2
A blockchain-based framework for data quality in edge-computing-enabled crowdsensing2
A hybrid-order local search algorithm for set k-cover problem in wireless sensor networks2
Nested relation extraction with iterative neural network2
FragDPI: a novel drug-protein interaction prediction model based on fragment understanding and unified coding2
Accurate and efficient follower log repair for Raft-replicated database systems2
Rich-text document styling restoration via reinforcement learning2
Efficient multi-scale community search method based on spectral graph wavelet2
An enhanced authentication protocol for client server environment2
Transportation mode detection using cumulative acoustic sensing and analysis2
DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography2
Semantic and secure search over encrypted outsourcing cloud based on BERT2
A quality status encoding scheme for PCB-based products in IoT-enabled remanufacturing2
New construction of highly nonlinear resilient S-boxes via linear codes2
Forecasting technical debt evolution in software systems: an empirical study2
Polynomial stacked-attention network for nationality classification2
Research on key technologies of edge cache in virtual data space across WAN2
Heterogeneous-attributes enhancement deep framework for network embedding2
Simple index based symmetric searchable encryption with result verifiability2
Energy inefficiency diagnosis for Android applications: a literature review2
Accelerating temporal action proposal generation via high performance computing2
An improved multi-objective evolutionary algorithm for computation offloading in the multi-cloudlet environment2
A comprehensive study on fault tolerance in stream processing systems2
Gauze: enabling communication-friendly block synchronization with cuckoo filter2
An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network2
LIDAR: learning from imperfect demonstrations with advantage rectification2
An approach for detecting LDoS attack based on cloud model2
An evaluation and query algorithm for the influence of spatial location based on RkNN2
Sememe knowledge computation: a review of recent advances in application and expansion of sememe knowledge bases2
Model-based automated testing of JavaScript Web applications via longer test sequences2
How graph convolutions amplify popularity bias for recommendation?2
An optimal differentially private data release mechanism with constrained error2
Optimal location query based on k nearest neighbours2
On the use of formal methods to model and verify neuronal archetypes2
Exploiting comments information to improve legal public opinion news abstractive summarization2
Follow the perturbed approximate leader for solving semi-bandit combinatorial optimization2
Differential privacy histogram publishing method based on dynamic sliding window2
Siamese single object tracking algorithm with natural language prior2
Linguistic feature template integration for Chinese-Vietnamese neural machine translation2
User story clustering in agile development: a framework and an empirical study2
Scene-adaptive crowd counting method based on meta learning with dual-input network DMNet2
Efficient k-dominant skyline query over incomplete data using MapReduce2
Unpaired image to image transformation via informative coupled generative adversarial networks2
Quantifying predictability of sequential recommendation via logical constraints2
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs2
Accelerating the cryo-EM structure determination in RELION on GPU cluster2
Kronos: towards bus contention-aware job scheduling in warehouse scale computers2
Collecting and analyzing key-value data under shuffled differential privacy2
Low-cost client-side encryption and secure Internet of things (IoT) provisioning1
Multi-key FHE without ciphertext-expansion in two-server model1
A novel dense retrieval framework for long document retrieval1
HSAEP: a new platform to evaluate hybrid simulation algorithms1
0.026849031448364