Frontiers of Computer Science

Papers
(The TQCC of Frontiers of Computer Science is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Challenges and future directions of secure federated learning: a survey63
DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning62
A survey on large language model based autonomous agents60
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform60
A survey of music emotion recognition45
Graph convolution machine for context-aware recommender system41
Image smog restoration using oblique gradient profile prior and energy minimization37
A survey of Intel SGX and its applications32
Brain tumor localization and segmentation using mask RCNN31
Derivative-free reinforcement learning: a review28
Protein interaction networks: centrality, modularity, dynamics, and applications26
piEnPred: a bi-layered discriminative model for enhancers and their subtypes via novel cascade multi-level subset feature selection algorithm25
Practical age estimation using deep label distribution learning24
Compositional metric learning for multi-label classification24
AIDEDNet: anti-interference and detail enhancement dehazing network for real-world scenes23
Towards a better prediction of subcellular location of long non-coding RNA23
Cancer classification with data augmentation based on generative adversarial networks21
DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography20
Rumor detection with self-supervised learning on texts and social graph20
A subgraph matching algorithm based on subgraph index for knowledge graph19
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network18
String kernels construction and fusion: a survey with bioinformatics application17
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks17
Rehearsal: learning from prediction to decision16
Mean estimation over numeric data with personalized local differential privacy16
SCENERY: a lightweight block cipher based on Feistel structure16
A mobile edge computing-based applications execution framework for Internet of Vehicles16
Exploring associations between streetscape factors and crime behaviors using Google Street View images15
Identification of differential brain regions in MCI progression via clustering-evolutionary weighted SVM ensemble algorithm15
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis15
Label distribution for multimodal machine learning14
The mass, fake news, and cognition security14
Instance-sequence reasoning for video question answering14
Attention based simplified deep residual network for citywide crowd flows prediction13
ABDKS: attribute-based encryption with dynamic keyword search in fog computing13
Domain-specific feature elimination: multi-source domain adaptation for image classification12
A survey on federated learning: a perspective from multi-party computation12
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation12
Multiband decomposition and spectral discriminative analysis for motor imagery BCI via deep neural network12
Visual abstraction of dynamic network via improved multi-class blue noise sampling12
iNet: visual analysis of irregular transition in multivariate dynamic networks12
Semi-supervised community detection on attributed networks using non-negative matrix tri-factorization with node popularity12
New development of cognitive diagnosis models12
DBST: a lightweight block cipher based on dynamic S-box11
Parallel exploration via negatively correlated search11
Hierarchical data replication strategy to improve performance in cloud computing11
Large sequence models for sequential decision-making: a survey11
GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding11
Attribute augmentation-based label integration for crowdsourcing11
Vehicle color recognition based on smooth modulation neural network with multi-scale feature fusion11
Side-channel analysis attacks based on deep learning network10
DRPS: efficient disk-resident parameter servers for distributed machine learning10
Identification and classification of promoters using the attention mechanism based on long short-term memory10
BA-GNN: Behavior-aware graph neural network for session-based recommendation10
Effort-aware cross-project just-in-time defect prediction framework for mobile apps10
ResLNet: deep residual LSTM network with longer input for action recognition10
Collaborative eye tracking based code review through real-time shared gaze visualization10
A survey of discourse parsing10
A Monte Carlo Neural Fictitious Self-Play approach to approximate Nash Equilibrium in imperfect-information dynamic games10
A survey of operating system support for persistent memory10
Single image super-resolution: a comprehensive review and recent insight10
circ2CBA: prediction of circRNA-RBP binding sites combining deep learning and attention mechanism9
Pairwise tagging framework for end-to-end emotion-cause pair extraction9
Protein acetylation sites with complex-valued polynomial model9
Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities9
An efficient and authenticated key establishment scheme based on fog computing for healthcare system9
Community detection with attributed random walk via seed replacement9
A systematic study on the role of SentiWordNet in opinion mining9
Using BiLSTM with attention mechanism to automatically detect self-admitted technical debt8
An improved master-apprentice evolutionary algorithm for minimum independent dominating set problem8
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage8
Representation learning via an integrated autoencoder for unsupervised domain adaptation8
Experience report: investigating bug fixes in machine learning frameworks/libraries8
Demystifying Ethereum account diversity: observations, models and analysis8
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint8
Citywide package deliveries via crowdshipping: minimizing the efforts from crowdsourcers8
Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm8
A novel DNA-inspired encryption strategy for concealing cloud storage8
Speech-driven facial animation with spectral gathering and temporal attention8
Iterative Android automated testing8
A search-based identification of variable microservices for enterprise SaaS8
Cross-scene passive human activity recognition using commodity WiFi8
Self-corrected unsupervised domain adaptation8
Resource abstraction and data placement for distributed hybrid memory pool7
Controllable data synthesis method for grammatical error correction7
Physiological-physical feature fusion for automatic voice spoofing detection7
An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities7
Degradation-adaptive neural network for jointly single image dehazing and desnowing7
Task assignment for social-oriented crowdsourcing7
Intellectual property protection for deep semantic segmentation models7
The utilization of algorithms for cloud internet of things application domains: a review7
MSDA: multi-subset data aggregation scheme without trusted third party7
TransRec++: Translation-based sequential recommendation with heterogeneous feedback7
Quantifying predictability of sequential recommendation via logical constraints7
A bi-metric autoscaling approach for n-tier web applications on kubernetes7
A learnable self-supervised task for unsupervised domain adaptation on point cloud classification and segmentation7
Effective ensemble learning approach for SST field prediction using attention-based PredRNN7
Learning label-specific features for decomposition-based multi-class classification7
LMR-CBT: learning modality-fused representations with CB-Transformer for multimodal emotion recognition from unaligned multimodal sequences7
Endowing rotation invariance for 3D finger shape and vein verification7
Visibility restoration for real-world hazy images via improved physical model and Gaussian total variation6
Unsupervised statistical text simplification using pre-trained language modeling for initialization6
BIC-based node order learning for improving Bayesian network structure learning6
AE-TPGG: a novel autoencoder-based approach for single-cell RNA-seq data imputation and dimensionality reduction6
FPGA sharing in the cloud: a comprehensive analysis6
Weakly supervised temporal action localization with proxy metric modeling6
IP-geolocater: a more reliable IP geolocation algorithm based on router error training6
Defense against local model poisoning attacks to byzantine-robust federated learning6
Local feature aggregation algorithm based on graph convolutional network6
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes6
Joint user profiling with hierarchical attention networks6
Robust watermarking of databases in order-preserving encrypted domain6
Differential privacy histogram publishing method based on dynamic sliding window6
Prediction of job characteristics for intelligent resource allocation in HPC systems: a survey and future directions6
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor6
Physical layer authentication for automotive cyber physical systems based on modified HB protocol6
A framework combines supervised learning and dense subgraphs discovery to predict protein complexes6
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid6
Toward few-shot domain adaptation with perturbation-invariant representation and transferable prototypes5
Multi-dimensional information-driven many-objective software remodularization approach5
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data5
A time-aware hybrid recommendation scheme combining content-based and collaborative filtering5
Bi-objective evolutionary Bayesian network structure learning via skeleton constraint5
Full friendly index sets of mCn5
Evolutionary selection for regression test cases based on diversity5
Unsupervised spectral feature selection algorithms for high dimensional data5
OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering5
On the analysis of ant colony optimization for the maximum independent set problem5
Self-adaptive label filtering learning for unsupervised domain adaptation5
Wi-Fi based non-invasive detection of indoor wandering using LSTM model5
Label distribution learning for scene text detection5
Semantic and secure search over encrypted outsourcing cloud based on BERT5
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals5
Three-dimensional quantum wavelet transforms5
Exploiting user behavior learning for personalized trajectory recommendations5
An efficient memory data organization strategy for application-characteristic graph processing5
A feature-wise attention module based on the difference with surrounding features for convolutional neural networks5
DOF: a generic approach of domain ontology fuzzification5
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing5
MAML2: meta reinforcement learning via meta-learning for task categories5
0.035182952880859