Frontiers of Computer Science

Papers
(The TQCC of Frontiers of Computer Science is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
Towards practical data alignment in production federated learning643
Communication-robust multi-agent learning by adaptable auxiliary multi-agent adversary generation120
Few-shot node classification via local adaptive discriminant structure learning99
Structure attack on full-round DBST92
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing91
Sub-Nyquist sampling-based wideband spectrum sensing: a compressed power spectrum estimation approach60
Self-corrected unsupervised domain adaptation52
Model-based diagnosis with low-cost fault identification50
cKBET: assessing goodness of batch effect correction for single-cell RNA-seq50
ReCSA: a dedicated sort accelerator using ReRAM-based content addressable memory42
Data quality matters: towards trajectory data collection under local differential privacy41
How graph convolutions amplify popularity bias for recommendation?38
Top Pass: improve code generation by pass@k-maximized code ranking38
Exploiting comments information to improve legal public opinion news abstractive summarization38
Pusher: an augmented fuzzer based on the connection between input and comparison operand37
Identifying useful learnwares via learnable specification36
Trajectory prediction based on grouped spatial-temporal encoder35
Informative and diverse emotional conversation generation with variational recurrent pointer-generator34
A lock-free approach to parallelizing personalized PageRank computations on GPU32
RE2: improving Chinese grammatical error correction via retrieving appropriate examples with explanation31
MiMu: mitigating multiple shortcut learning behavior of transformers27
An efficient atomic cross-chain commitment resisting fork fraud27
Protein acetylation sites with complex-valued polynomial model26
Revenue-maximizing online stable task assignment on taxi-dispatching platforms26
A comprehensive survey on graph neural network accelerators26
Minimizing the cost of periodically replicated systems via model and quantitative analysis25
ResLNet: deep residual LSTM network with longer input for action recognition25
Advanced persistent threat detection via mining long-term features in provenance graphs25
Tool learning with large language models: a survey24
Debiasing vision-language models for vision tasks: a survey24
VenomAttack: automated and adaptive activity hijacking in Android23
Underwater image enhancement by maximum-likelihood based adaptive color correction and robust scattering removal23
Person video alignment with human pose registration22
A data representation method using distance correlation22
Fixed-parameter tractability of capacitated k-facility location22
Erratum to: Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit21
E2CNN: entity-type-enriched cascaded neural network for Chinese financial relation extraction21
Inertial projection neural network for nonconvex sparse signal recovery with prior information21
SCG-tree: shortcut enhanced graph hierarchy tree for efficient spatial queries on massive road networks20
The governance technology for blockchain systems: a survey19
MILCAnet: a dominant feature attention framework for enhanced multimodal data analysis in depression detection19
Label distribution similarity-based noise correction for crowdsourcing19
Graph convolution machine for context-aware recommender system18
I know I don’t know: an evidential deep learning framework for traffic classification18
Representation learning via an integrated autoencoder for unsupervised domain adaptation18
Teachers cooperation: team-knowledge distillation for multiple cross-domain few-shot learning18
Rumor detection with self-supervised learning on texts and social graph18
Human-machine interactive streaming anomaly detection by online self-adaptive forest17
Bibliometric analysis of research talent evaluation in Chinese universities: data mining approach17
Incentive mechanism design via smart contract in blockchain-based edge-assisted crowdsensing17
Group control for procedural rules: parameterized complexity and consecutive domains16
Energy inefficiency diagnosis for Android applications: a literature review16
On the exact quantum query complexity of MOD and EXACT functions16
K-ary search tree revisited: improving construction and intersection efficiency15
A multi-projection recurrent model for hypernym detection and discovery15
TransRec++: Translation-based sequential recommendation with heterogeneous feedback14
Research on key technologies of edge cache in virtual data space across WAN14
RVAM16: a low-cost multiple-ISA processor based on RISC-V and ARM Thumb14
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer14
Integrating element correlation with prompt-based spatial relation extraction14
GaussDB-AISQL: a composable cloud-native SQL system with AI capabilities14
CAD-NeRF: learning NeRFs from uncalibrated few-view images by CAD model retrieval14
Towards kernelizing the classifier for hyperbolic data14
Robust AUC maximization for classification with pairwise confidence comparisons14
Spreadsheet quality assurance: a literature review14
Visibility restoration for real-world hazy images via improved physical model and Gaussian total variation14
Factor-wise disentangled contrastive learning for cross-domain few-shot molecular property prediction13
On the hardness of NTRU problems13
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs13
Multi-constraint reinforcement learning in complex robot environments13
MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy13
ncRNA2MetS v2.0: a manually curated database for metabolic syndrome-associated ncRNAs13
An approach for detecting LDoS attack based on cloud model12
Kronos: towards bus contention-aware job scheduling in warehouse scale computers12
Incorporating contextual evidence to improve implicit discourse relation recognition in Chinese12
BA-GNN: Behavior-aware graph neural network for session-based recommendation12
DualMamba: a patch-based model with dual mamba for long-term time series forecasting12
Learning multi-tasks with inconsistent labels by using auxiliary big task12
Improved paraphrase generation via controllable latent diffusion12
The rhythm of execution: unveiling the impact of sandbox execution time on cyber threat intelligence data12
Bidirectional chain-of-thought for zero-shot object navigation12
A user requirements-oriented privacy policy self-adaption scheme in cloud computing11
SR-AFU: super-resolution network using adaptive frequency component upsampling and multi-resolution features11
Exact satisfiability and phase transition analysis of the regular (k, d)-CNF formula11
A survey on learning from graphs with heterophily: recent advances and future directions11
Single image super-resolution: a comprehensive review and recent insight11
Generating empathetic responses through emotion tracking and constraint guidance11
An efficient graph data compression model based on the germ quotient set structure11
System dynamics based evolutionary game model for data transaction quality regulation11
Graph-Segmenter: graph transformer with boundary-aware attention for semantic segmentation11
D-Cubicle: boosting data transfer dynamically for large-scale analytical queries in single-GPU systems11
Referring image segmentation with attention guided cross modal fusion for semantic oriented languages11
Multi-user reinforcement learning based task migration in mobile edge computing11
VSAN: A new visualization method for super-large-scale academic networks10
Exploring speech clues for Chinese aspect-based sentiment analysis10
Attribute augmentation-based label integration for crowdsourcing10
Announcement of the 2024 FCS Paper Awards10
Streaming algorithms for triangle counting: adversarial robustness and the weighted case10
Labeling-based centrality approaches for identifying critical edges on temporal graphs10
A survey of dynamic graph neural networks10
Foundation model enhanced derivative-free cognitive diagnosis10
Unsupervised spectral feature selection algorithms for high dimensional data10
Exploiting blockchain for dependable services in zero-trust vehicular networks10
Index-free triangle-based graph local clustering10
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT9
ICCG: low-cost and efficient consistency with adaptive synchronization for metadata replication9
Adaptive detection of encrypted malware traffic via fully convolutional masked autoencoders9
Foundation models for topic modeling: a case study9
Fully distributed identity-based threshold signatures with identifiable aborts9
ISM: intra-class similarity mixing for time series augmentation9
On the upper bounds of (1,0)-super solutions for the regular balanced random (k,2s)-SAT problem9
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis9
Dynamic traveling time forecasting based on spatial-temporal graph convolutional networks9
Adaptive network combination for single-image reflection removal: a domain generalization perspective9
Collective domain adversarial learning for unsupervised domain adaptation9
A graph-based contrastive learning framework for medicare insurance fraud detection9
Linkable and traceable anonymous authentication with fine-grained access control9
Super solutions of the model RB8
Certificateless network coding proxy signatures from lattice8
Accelerating constraint-based neural network repairs by example prioritization and selection8
Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit8
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform8
ARCosmetics: a real-time augmented reality cosmetics try-on system8
Disk based pay-as-you-go record linkage8
EMP3D: an emergency medical procedures 3D dataset with pose and shape8
SSA: semantic structure aware inference on CNN networks for weakly pixel-wise dense predictions without cost8
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication8
Learning from shortcut: a shortcut-guided approach for explainable graph learning8
Quantifying predictability of sequential recommendation via logical constraints8
Precise control of page cache for containers8
Exploiting large language model with reinforcement learning for generative job recommendations8
Achieving >97% on GSM8K: deeply understanding the problems makes LLMs better solvers for math word problems8
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs8
Task-aware pre-training for facial action analysis8
Joint fuzzy background and adaptive foreground model for moving target detection8
Endowing rotation invariance for 3D finger shape and vein verification8
Learning group interaction for sports video understanding from a perspective of athlete8
Graph neural networks for financial fraud detection: a review8
Large language models make sample-efficient recommender systems8
An effective fault localization approach for Verilog based on enhanced contexts8
Further study on indecomposable cryptographic functions7
CRD-CGAN: category-consistent and relativistic constraints for diverse text-to-image generation7
Combating with extremely noisy samples in weakly supervised slot filling for automatic diagnosis7
EduStudio: towards a unified library for student cognitive modeling7
A comprehensive survey of federated transfer learning: challenges, methods and applications7
Enhancing data quality with effective feature selection and privacy protection7
A survey on 3D editing based on NeRF and 3DGS7
The future of cognitive strategy-enhanced persuasive dialogue agents: new perspectives and trends7
Dynamic-EC: an efficient dynamic erasure coding method for permissioned blockchain systems7
Generalized splitting-ring number theoretic transform7
Exploring the tidal effect of urban business district with large-scale human mobility data7
Interpretation with baseline shapley value for feature groups on tree models7
Improved differential-neural cryptanalysis for round-reduced SIMECK32/647
Traceable and revocable multi-authority ABE supporting decryption outsourcing and policy update for cloud data access control7
Differential privacy histogram publishing method based on dynamic sliding window7
A hybrid memory architecture supporting fine-grained data migration7
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack7
Delegable zk-SNARKs with proxies7
Domain-specific feature elimination: multi-source domain adaptation for image classification7
Efficient multi-scale community search method based on spectral graph wavelet7
Leveraging auxiliary-tasks for height and weight estimation with pose-disentanglement7
0.16406106948853