Frontiers of Computer Science

Papers
(The TQCC of Frontiers of Computer Science is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Compressed page walk cache235
RS-store: RDMA-enabled skiplist-based key-value store for efficient range query78
Automated detection on the security of the linked-list operations74
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs69
Announcement of the 2023 FCS Paper Awards62
BI-TE: achieving GNN-based bandwidth indistinguishable traffic engineering in multi-domain SDN51
Robust and semantic-faithful post-hoc watermarking of text generated by black-box language models37
Local feature aggregation algorithm based on graph convolutional network31
ReCSA: a dedicated sort accelerator using ReRAM-based content addressable memory31
ABLkit: a Python toolkit for abductive learning30
SS-Pro: a simplified Siamese contrastive learning approach for protein surface representation29
FIFAWC: a dataset with detailed annotation and rich semantics for group activity recognition29
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing27
ISM: intra-class similarity mixing for time series augmentation25
Automated GUI widgets classification25
Brain tumor localization and segmentation using mask RCNN24
EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption23
BIC-based node order learning for improving Bayesian network structure learning23
Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy22
A survey of estimating number of distinct values22
Self-corrected unsupervised domain adaptation22
A comprehensive perspective of contrastive self-supervised learning21
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT20
String kernels construction and fusion: a survey with bioinformatics application20
Communication-robust multi-agent learning by adaptable auxiliary multi-agent adversary generation20
Understanding the role of human-inspired heuristics for retrieval models19
A multi-objective reinforcement learning algorithm for deadline constrained scientific workflow scheduling in clouds19
CrowdDesigner: information-rich and personalized product description generation19
Instance-sequence reasoning for video question answering19
HSAEP: a new platform to evaluate hybrid simulation algorithms17
Weakly supervised action anticipation without object annotations17
A graph-based contrastive learning framework for medicare insurance fraud detection17
Sub-Nyquist sampling-based wideband spectrum sensing: a compressed power spectrum estimation approach16
Multi-key FHE without ciphertext-expansion in two-server model16
ForkXplorer: an approach of fork summary generation16
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis15
Efficient policy evaluation by matrix sketching15
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor15
Polynomial stacked-attention network for nationality classification14
Provable secure authentication key agreement for wireless body area networks14
Top Pass: improve code generation by pass@k-maximized code ranking14
Structure attack on full-round DBST14
Index-free triangle-based graph local clustering13
An algorithm for solving satisfiability problem based on the structural information of formulas13
New construction of highly nonlinear resilient S-boxes via linear codes13
Simplified multi-view graph neural network for multilingual knowledge graph completion12
Scalable and adaptive log manager in distributed systems12
Exploiting comments information to improve legal public opinion news abstractive summarization12
Robust load-balanced backbone-based multicast routing in mobile opportunistic networks12
Transferring priors from virtual data for crowd counting in real world12
MEGI: a comprehensive annotation dataset of mobile elements for genomic island detection12
A general tail item representation enhancement framework for sequential recommendation12
Power diagram based algorithm for the facility location and capacity acquisition problem with dense demand12
MAML2: meta reinforcement learning via meta-learning for task categories11
ICCG: low-cost and efficient consistency with adaptive synchronization for metadata replication11
Semantic and secure search over encrypted outsourcing cloud based on BERT11
Towards practical data alignment in production federated learning11
Few-shot node classification via local adaptive discriminant structure learning11
New logarithmic step size for stochastic gradient descent11
GRAMO: geometric resampling augmentation for monocular 3D object detection10
A new design of parity-preserving reversible multipliers based on multiple-control toffoli synthesis targeting emerging quantum circuits10
KD-Crowd: a knowledge distillation framework for learning from crowds10
On the upper bounds of (1,0)-super solutions for the regular balanced random (k,2s)-SAT problem10
Adaptive network combination for single-image reflection removal: a domain generalization perspective10
PBCounter: weighted model counting on pseudo-boolean formulas9
Computational approaches for circRNA-disease association prediction: a review9
Visual analysis approach for mutual fund selection9
SEOE: an option graph based semantically embedding method for prenatal depression detection9
Intellectual property protection for deep semantic segmentation models9
Fully distributed identity-based threshold signatures with identifiable aborts9
A survey on EOSIO systems security: vulnerability, attack, and mitigation9
Low-cost client-side encryption and secure Internet of things (IoT) provisioning9
Behaviour-diverse automatic penetration testing: a coverage-based deep reinforcement learning approach9
Model-based diagnosis with low-cost fault identification9
Deterministic streaming algorithms for non-monotone submodular maximization9
Image smog restoration using oblique gradient profile prior and energy minimization9
How graph convolutions amplify popularity bias for recommendation?8
EMPSI: Efficient multiparty private set intersection (with cardinality)8
ARCHER: a ReRAM-based accelerator for compressed recommendation systems8
HeterMM: applying in-DRAM index to heterogeneous memory-based key-value stores8
DVRE: dominator-based variables reduction of encoding for model-based diagnosis8
ROS package search for robot software development: a knowledge graph-based approach8
Stability-aware data offloading optimization in edge-based mobile crowdsensing8
cKBET: assessing goodness of batch effect correction for single-cell RNA-seq8
Improving accuracy of automatic optical inspection with machine learning8
The parametric complexity of bisimulation equivalence of normed pushdown automata8
A federated anti-forgetting representation method based on hybrid model architecture and gradient truncation8
A novel dense retrieval framework for long document retrieval8
A learnable self-supervised task for unsupervised domain adaptation on point cloud classification and segmentation8
SCENERY: a lightweight block cipher based on Feistel structure8
Automatic bug assignments without texts: a study8
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation8
Non-salient region erasure for time series augmentation8
(Full) Leakage resilience of Fiat-Shamir signatures over lattices7
Debiasing vision-language models for vision tasks: a survey7
VColor*: a practical approach for coloring large graphs7
D2-GCN: a graph convolutional network with dynamic disentanglement for node classification7
EvolveKG: a general framework to learn evolving knowledge graphs7
Identification and classification of promoters using the attention mechanism based on long short-term memory7
Code context-based reviewer recommendation7
Lightweight axiom pinpointing via replicated driver and customized SAT-solving7
Revenue-maximizing online stable task assignment on taxi-dispatching platforms7
Fast and efficient parallel breadth-first search with power-law graph transformation7
Metric learning for domain adversarial network7
Informative and diverse emotional conversation generation with variational recurrent pointer-generator7
Local holographic transformations: tractability and hardness7
Performance issue monitoring, identification and diagnosis of SaaS software: a survey7
Mask guided diverse face image synthesis7
Representation learning: serial-autoencoder for personalized recommendation6
Minimizing the cost of periodically replicated systems via model and quantitative analysis6
Joint fuzzy background and adaptive foreground model for moving target detection6
A semi-transparent selective undo algorithm for multi-user collaborative editors6
Linkable and traceable anonymous authentication with fine-grained access control6
Super solutions of the model RB6
Introducing on-chain graph data to consortium blockchain for commercial transactions6
A proof system of the CaIT calculus6
SSA: semantic structure aware inference on CNN networks for weakly pixel-wise dense predictions without cost6
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs6
A structural variation genotyping algorithm enhanced by CNV quantitative transfer6
An effective fault localization approach for Verilog based on enhanced contexts6
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks6
Implementing a sidechain-based asynchronous DPKI6
Protein acetylation sites with complex-valued polynomial model6
Pusher: an augmented fuzzer based on the connection between input and comparison operand6
Open and real-world human-AI coordination by heterogeneous training with communication5
Blockchain based federated learning for intrusion detection for Internet of Things5
Efficient and stable quorum-based log replication and replay for modern cluster-databases5
A novel threshold changeable secret sharing scheme5
PyABV: a framework for enhancing PyRTL with assertion-based verification5
Numerical evaluation on sub-Nyquist spectrum reconstruction methods5
Bidirectional Transformer with absolute-position aware relative position encoding for encoding sentences5
Classification-oriented dawid skene model for transferring intelligence from crowds to machines5
WOBTree: a write-optimized B+-tree for non-volatile memory5
Sememe knowledge computation: a review of recent advances in application and expansion of sememe knowledge bases5
Predicting miRNA-drug interactions via dual-channel network based on TCN and BiLSTM5
Degradation-adaptive neural network for jointly single image dehazing and desnowing5
Graph-decomposed k-NN searching algorithm on road network5
New development of cognitive diagnosis models5
Tool learning with large language models: a survey5
DiagDO: an efficient model based diagnosis approach with multiple observations5
BestMan: a modular mobile manipulator platform for embodied AI with unified simulation-hardware APIs5
Certificateless network coding proxy signatures from lattice5
A lock-free approach to parallelizing personalized PageRank computations on GPU5
Full friendly index sets of mCn5
Deep active sampling with self-supervised learning5
Semantic similarity-based program retrieval: a multi-relational graph perspective5
A bi-metric autoscaling approach for n-tier web applications on kubernetes5
A perspective on Petri Net learning5
Dynamic depth-width optimization for capsule graph convolutional network5
Large language model for table processing: a survey5
Foundation models for topic modeling: a case study5
An efficient atomic cross-chain commitment resisting fork fraud5
0.70216703414917