Frontiers of Computer Science

Papers
(The median citation count of Frontiers of Computer Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Communication-robust multi-agent learning by adaptable auxiliary multi-agent adversary generation1017
How graph convolutions amplify popularity bias for recommendation?189
Top Pass: improve code generation by pass@k-maximized code ranking101
cKBET: assessing goodness of batch effect correction for single-cell RNA-seq80
Embracing the overlooked: harnessing feature disentanglement for cross-domain learning74
Towards practical data alignment in production federated learning68
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing66
Structure attack on full-round DBST65
Few-shot node classification via local adaptive discriminant structure learning61
Data quality matters: towards trajectory data collection under local differential privacy58
Model-based diagnosis with low-cost fault identification55
Sub-Nyquist sampling-based wideband spectrum sensing: a compressed power spectrum estimation approach52
ReCSA: a dedicated sort accelerator using ReRAM-based content addressable memory50
Enhancing model-based diagnosis with multiple pseudo-normal observations by Key nodes and IterativeDFS43
A lock-free approach to parallelizing personalized PageRank computations on GPU42
Trajectory prediction based on grouped spatial-temporal encoder42
Identifying useful learnwares via learnable specification42
Debiasing vision-language models for vision tasks: a survey40
An efficient atomic cross-chain commitment resisting fork fraud37
Minimizing the cost of periodically replicated systems via model and quantitative analysis36
MiMu: mitigating multiple shortcut learning behavior of transformers36
Protein acetylation sites with complex-valued polynomial model36
Advanced persistent threat detection via mining long-term features in provenance graphs32
A comprehensive survey on graph neural network accelerators30
RE2: improving Chinese grammatical error correction via retrieving appropriate examples with explanation30
Person video alignment with human pose registration29
VenomAttack: automated and adaptive activity hijacking in Android29
Tool learning with large language models: a survey29
Inertial projection neural network for nonconvex sparse signal recovery with prior information28
Bibliometric analysis of research talent evaluation in Chinese universities: data mining approach27
Human-machine interactive streaming anomaly detection by online self-adaptive forest27
Erratum to: Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit26
Label distribution similarity-based noise correction for crowdsourcing26
SCG-tree: shortcut enhanced graph hierarchy tree for efficient spatial queries on massive road networks24
I know I don’t know: an evidential deep learning framework for traffic classification24
MILCAnet: a dominant feature attention framework for enhanced multimodal data analysis in depression detection24
ProbDiffFlow: an efficient learning-free framework for probabilistic single-image optical flow estimation23
Representation learning via an integrated autoencoder for unsupervised domain adaptation23
A data representation method using distance correlation23
Teachers cooperation: team-knowledge distillation for multiple cross-domain few-shot learning22
Adaptive load balance scheme for the distributed control plane in SDN21
E2CNN: entity-type-enriched cascaded neural network for Chinese financial relation extraction21
OCACO: an operator-level cardinality and cost joint estimator21
Rumor detection with self-supervised learning on texts and social graph20
Exact acceleration of subgraph graph neural networks by eliminating computation redundancy20
The governance technology for blockchain systems: a survey19
Incentive mechanism design via smart contract in blockchain-based edge-assisted crowdsensing19
Underwater image enhancement by maximum-likelihood based adaptive color correction and robust scattering removal18
A multi-projection recurrent model for hypernym detection and discovery17
Fixed-parameter tractability of capacitated k-facility location17
Energy inefficiency diagnosis for Android applications: a literature review17
On the exact quantum query complexity of MOD and EXACT functions17
Integrating element correlation with prompt-based spatial relation extraction16
Spreadsheet quality assurance: a literature review16
A novel efficient model for testing diagnosability of discrete event systems under sensor attacks16
Robust AUC maximization for classification with pairwise confidence comparisons16
Research on key technologies of edge cache in virtual data space across WAN16
Visibility restoration for real-world hazy images via improved physical model and Gaussian total variation15
3D asset generation: a survey of evolution towards autoregressive and agent-driven paradigms15
Towards kernelizing the classifier for hyperbolic data15
CAD-NeRF: learning NeRFs from uncalibrated few-view images by CAD model retrieval15
A survey of controllable learning: methods and applications in information retrieval15
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer15
Self-supervised representation learning with ID-Content modality alignment for sequential recommendation15
RVAM16: a low-cost multiple-ISA processor based on RISC-V and ARM Thumb15
ncRNA2MetS v2.0: a manually curated database for metabolic syndrome-associated ncRNAs14
Factor-wise disentangled contrastive learning for cross-domain few-shot molecular property prediction14
Group control for procedural rules: parameterized complexity and consecutive domains14
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs14
GaussDB-AISQL: a composable cloud-native SQL system with AI capabilities14
The rhythm of execution: unveiling the impact of sandbox execution time on cyber threat intelligence data14
System dynamics based evolutionary game model for data transaction quality regulation13
Incorporating contextual evidence to improve implicit discourse relation recognition in Chinese13
BA-GNN: Behavior-aware graph neural network for session-based recommendation13
DualMamba: a patch-based model with dual mamba for long-term time series forecasting13
Kronos: towards bus contention-aware job scheduling in warehouse scale computers12
A survey on learning from graphs with heterophily: recent advances and future directions12
Bidirectional chain-of-thought for zero-shot object navigation12
Multi-constraint reinforcement learning in complex robot environments12
Learning multi-tasks with inconsistent labels by using auxiliary big task12
Improved paraphrase generation via controllable latent diffusion12
Dynamic scene representation in the era of neural rendering: from NeRFs to 3DGSs12
D-Cubicle: boosting data transfer dynamically for large-scale analytical queries in single-GPU systems12
A user requirements-oriented privacy policy self-adaption scheme in cloud computing12
A graph embedding-based dynamic update method for intelligence knowledge graphs11
SR-AFU: super-resolution network using adaptive frequency component upsampling and multi-resolution features11
Streaming algorithms for triangle counting: adversarial robustness and the weighted case11
Announcement of the 2024 FCS Paper Awards11
Patching the visual ability of large multimodal models by collaborating with small models11
Graph-Segmenter: graph transformer with boundary-aware attention for semantic segmentation11
Generating empathetic responses through emotion tracking and constraint guidance11
Registered attribute-based encryption with reliable outsourced decryption based on blockchain11
Unsupervised spectral feature selection algorithms for high dimensional data11
Foundation model enhanced derivative-free cognitive diagnosis11
MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy11
Single image super-resolution: a comprehensive review and recent insight11
Exact satisfiability and phase transition analysis of the regular (k, d)-CNF formula11
Exploring speech clues for Chinese aspect-based sentiment analysis11
Efficient message passing architecture for GCN training on HBM-based FPGAs with orthogonal topology on-chip networks11
A survey of dynamic graph neural networks10
On the upper bounds of (1,0)-super solutions for the regular balanced random (k,2s)-SAT problem10
Adaptive network combination for single-image reflection removal: a domain generalization perspective10
Fine-grained master data curation for time series10
Labeling-based centrality approaches for identifying critical edges on temporal graphs10
Exploiting blockchain for dependable services in zero-trust vehicular networks10
Fully distributed identity-based threshold signatures with identifiable aborts10
VSAN: A new visualization method for super-large-scale academic networks10
Detection of blending interest flooding attacks in named data networking10
Multi-user reinforcement learning based task migration in mobile edge computing10
Index-free triangle-based graph local clustering10
ICCG: low-cost and efficient consistency with adaptive synchronization for metadata replication10
Attribute augmentation-based label integration for crowdsourcing10
Collective domain adversarial learning for unsupervised domain adaptation9
CZone: memory-efficient serverless container management with MCPV model9
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis9
Linkable and traceable anonymous authentication with fine-grained access control9
Joint fuzzy background and adaptive foreground model for moving target detection9
Adaptive detection of encrypted malware traffic via fully convolutional masked autoencoders9
ISM: intra-class similarity mixing for time series augmentation9
Certificateless network coding proxy signatures from lattice9
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs9
Dynamic traveling time forecasting based on spatial-temporal graph convolutional networks9
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT9
MedFuse: a multi-source data fusion framework for diabetic retinopathy lesion segmentation9
A graph-based contrastive learning framework for medicare insurance fraud detection9
Achieving >97% on GSM8K: deeply understanding the problems makes LLMs better solvers for math word problems9
Task-aware pre-training for facial action analysis9
An effective fault localization approach for Verilog based on enhanced contexts9
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform8
Differential privacy histogram publishing method based on dynamic sliding window8
CRD-CGAN: category-consistent and relativistic constraints for diverse text-to-image generation8
Learning group interaction for sports video understanding from a perspective of athlete8
Chinese and Vietnamese bilingual news topic discovery via association graph clustering8
Learning from shortcut: a shortcut-guided approach for explainable graph learning8
EMP3D: an emergency medical procedures 3D dataset with pose and shape8
Quantifying predictability of sequential recommendation via logical constraints8
CP-SuperSpartan: commit-and-prove SNARKs for customizable constraint systems8
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack8
A hybrid memory architecture supporting fine-grained data migration8
Graph neural networks for financial fraud detection: a review8
Precise control of page cache for containers8
Physically resource disaggregated data center: technique routes, design, and open issues8
ARCosmetics: a real-time augmented reality cosmetics try-on system8
Foundation models for topic modeling: a case study8
Hierarchical long and short-term user preference modeling for sequential recommendation8
Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit8
DMCGuard: risky perils and fine-grained control on IoT multiple device management channels8
Generalized splitting-ring number theoretic transform8
Large language models make sample-efficient recommender systems8
Exploiting large language model with reinforcement learning for generative job recommendations8
Accelerating constraint-based neural network repairs by example prioritization and selection8
Deep learning for time series forecasting: a survey of recent advances8
SSA: semantic structure aware inference on CNN networks for weakly pixel-wise dense predictions without cost8
AllDiff-LS: solving alldifferent constraints with efficient local search7
DTIBFAI: drug-target interaction prediction based on BERT and feature augment of Informer7
EpiSight: an intelligent EEG automated analysis platform for clinical epilepsy diagnosis7
GenSC: a novel and general local search framework for set covering problem7
A survey on 3D editing based on NeRF and 3DGS7
Traceable and revocable multi-authority ABE supporting decryption outsourcing and policy update for cloud data access control7
Further study on indecomposable cryptographic functions7
ArtEEGAttention: an advanced deep learning approach for art brain decoding7
Dynamic-EC: an efficient dynamic erasure coding method for permissioned blockchain systems7
TPGNN-FedGPR: triple level privacy-preserving graph neural network for federated geographic POI recommendation7
Improved differential-neural cryptanalysis for round-reduced SIMECK32/647
Clustered Reinforcement Learning7
EduStudio: towards a unified library for student cognitive modeling7
Leveraging auxiliary-tasks for height and weight estimation with pose-disentanglement7
Graph contrastive learning view construction methods in recommender systems: a survey7
Why not transform chat large language models to non-English?7
Combating with extremely noisy samples in weakly supervised slot filling for automatic diagnosis7
Enhancing data quality with effective feature selection and privacy protection7
The future of cognitive strategy-enhanced persuasive dialogue agents: new perspectives and trends7
Efficient multi-scale community search method based on spectral graph wavelet7
AutoCache: an online and automatic caching solution for Spark7
Exploring the tidal effect of urban business district with large-scale human mobility data7
A survey on EOSIO systems security: vulnerability, attack, and mitigation6
IP2vec: an IP node representation model for IP geolocation6
A comprehensive survey of federated transfer learning: challenges, methods and applications6
Interpretation with baseline shapley value for feature groups on tree models6
A network integrated performance evaluation method based on multi-attribute decisions of topology and traffic6
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network6
IXT: Improved searchable encryption for multi-word queries based on PSI6
End-to-end congestion control in datacenter networks: a survey6
Shape-intensity knowledge distillation for robust medical image segmentation6
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme6
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice6
Cryptanalysis of DBST, a lightweight block cipher6
Delegable zk-SNARKs with proxies6
Expanding the sequence spaces of synthetic binding protein using deep learning-based framework ProteinMPNN6
FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack6
Enhancing job salary prediction with disentangled composition effect modeling: a neural prototyping approach6
GFAKaleidos: a tool for computing and comparing pangenome graph statistics6
Accelerating local SGD for non-IID data using variance reduction6
circ2CBA: prediction of circRNA-RBP binding sites combining deep learning and attention mechanism6
Domain-specific feature elimination: multi-source domain adaptation for image classification6
A hybrid approach to formulaic alpha discovery with large language model assistance6
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals6
FedSIN: information network representation based on federated self-adaptive learning6
Large language models meet NLP: a survey6
PediaBench: a comprehensive Chinese pediatric dataset for benchmarking large language models5
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation5
Label distribution learning for scene text detection5
Dynamic depth-width optimization for capsule graph convolutional network5
A novel dense retrieval framework for long document retrieval5
GUI test migration via LLM with scenario-granularity understanding5
Robust load-balanced backbone-based multicast routing in mobile opportunistic networks5
ROS package search for robot software development: a knowledge graph-based approach5
Automated GUI widgets classification5
Towards spatial computing: recent advances in multimodal natural interaction for Extended Reality headsets5
Defense against data poisoning attacks in robot vision systems based on adversarial example detection5
Collecting and analyzing key-value data under shuffled differential privacy5
Deep active sampling with self-supervised learning5
Robust and semantic-faithful post-hoc watermarking of text generated by black-box language models5
BI-TE: achieving GNN-based bandwidth indistinguishable traffic engineering in multi-domain SDN5
New logarithmic step size for stochastic gradient descent5
Visual wings for textual prompts: infusing textual prompts with visual features for open-set recognition5
ABLkit: a Python toolkit for abductive learning5
A perspective on Petri Net learning5
Numerical evaluation on sub-Nyquist spectrum reconstruction methods5
Hacking reference-free image captioning metrics5
Introducing on-chain graph data to consortium blockchain for commercial transactions5
Bidirectional Transformer with absolute-position aware relative position encoding for encoding sentences5
Efficient shapley-based data valuation for federated trajectories5
Provable secure authentication key agreement for wireless body area networks5
Efficient improvement of lower bounds in equitable coloring5
SEOE: an option graph based semantically embedding method for prenatal depression detection5
MAML2: meta reinforcement learning via meta-learning for task categories5
PyABV: a framework for enhancing PyRTL with assertion-based verification5
Survey on recent progress of AI for chemistry: methods, applications, and opportunities4
A multi-stream network for retrosynthesis prediction4
A generative 3D asset encryption scheme with tiered visual effect after decryption4
Robust domain adaptation with noisy and shifted label distribution4
FedPD: personalized federated learning based on partial distillation4
Vision-based 3D occupancy prediction in autonomous driving: a review and outlook4
SharpSMT: a scalable toolkit for measuring solution spaces of SMT(LA) formulas4
CompactChain: an efficient stateless chain for UTXO-model blockchain4
A two-level meta-heuristic approach for the minimum dominating tree problem4
Graph foundation model4
Decoupled deep hough voting for point cloud registration4
FragDPI: a novel drug-protein interaction prediction model based on fragment understanding and unified coding4
ACbot: an IIoT platform for industrial robots4
Offline model-based reinforcement learning with causal structured world models4
ProSyno: context-free prompt learning for synonym discovery4
Pairwise tagging framework for end-to-end emotion-cause pair extraction4
Joint task and distribution generalization via graph substructure prompting4
Fault-tolerant encoding and decoding method in Steane code: comprehensive analysis of maximum threshold4
Accelerating BERT inference with GPU-efficient exit prediction4
CW-YOLO: joint learning for mask wearing detection in low-light conditions4
Cascade context-oriented spatio-temporal attention network for efficient and fine-grained video-grounded dialogues4
Distortion-free PCA on sample space for highly variable gene detection from single-cell RNA-seq data4
0.13825607299805