Frontiers of Computer Science

Papers
(The TQCC of Frontiers of Computer Science is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Automated detection on the security of the linked-list operations407
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing87
Model-based diagnosis with low-cost fault identification85
Towards practical data alignment in production federated learning78
Structure attack on full-round DBST75
An algorithm for solving satisfiability problem based on the structural information of formulas65
Top Pass: improve code generation by pass@k-maximized code ranking54
cKBET: assessing goodness of batch effect correction for single-cell RNA-seq37
Self-corrected unsupervised domain adaptation34
ReCSA: a dedicated sort accelerator using ReRAM-based content addressable memory34
Communication-robust multi-agent learning by adaptable auxiliary multi-agent adversary generation34
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor34
Exploiting comments information to improve legal public opinion news abstractive summarization33
RS-store: RDMA-enabled skiplist-based key-value store for efficient range query33
Sub-Nyquist sampling-based wideband spectrum sensing: a compressed power spectrum estimation approach32
Semantic and secure search over encrypted outsourcing cloud based on BERT32
Compressed page walk cache31
How graph convolutions amplify popularity bias for recommendation?29
Few-shot node classification via local adaptive discriminant structure learning29
Revenue-maximizing online stable task assignment on taxi-dispatching platforms27
Pusher: an augmented fuzzer based on the connection between input and comparison operand26
Advanced persistent threat detection via mining long-term features in provenance graphs26
Informative and diverse emotional conversation generation with variational recurrent pointer-generator26
A lock-free approach to parallelizing personalized PageRank computations on GPU25
Identifying useful learnwares via learnable specification25
An efficient atomic cross-chain commitment resisting fork fraud23
Minimizing the cost of periodically replicated systems via model and quantitative analysis23
Trajectory prediction based on grouped spatial-temporal encoder22
Full friendly index sets of mCn22
Debiasing vision-language models for vision tasks: a survey22
Protein acetylation sites with complex-valued polynomial model21
Tool learning with large language models: a survey21
A comprehensive survey on graph neural network accelerators21
ResLNet: deep residual LSTM network with longer input for action recognition21
I know I don’t know: an evidential deep learning framework for traffic classification20
Graph convolution machine for context-aware recommender system19
Bibliometric analysis of research talent evaluation in Chinese universities: data mining approach19
Representation learning via an integrated autoencoder for unsupervised domain adaptation19
A data representation method using distance correlation19
Person video alignment with human pose registration17
SCG-tree: shortcut enhanced graph hierarchy tree for efficient spatial queries on massive road networks17
Underwater image enhancement by maximum-likelihood based adaptive color correction and robust scattering removal17
Inertial projection neural network for nonconvex sparse signal recovery with prior information17
VenomAttack: automated and adaptive activity hijacking in Android17
Incentive mechanism design via smart contract in blockchain-based edge-assisted crowdsensing16
Erratum to: Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit16
Fixed-parameter tractability of capacitated k-facility location16
Label distribution similarity-based noise correction for crowdsourcing16
Relation Reconstructive Binarization of word embeddings16
E2CNN: entity-type-enriched cascaded neural network for Chinese financial relation extraction15
Teachers cooperation: team-knowledge distillation for multiple cross-domain few-shot learning15
The governance technology for blockchain systems: a survey15
A multi-projection recurrent model for hypernym detection and discovery14
Human-machine interactive streaming anomaly detection by online self-adaptive forest14
Energy inefficiency diagnosis for Android applications: a literature review14
Rumor detection with self-supervised learning on texts and social graph14
Robust AUC maximization for classification with pairwise confidence comparisons13
K-ary search tree revisited: improving construction and intersection efficiency13
Group control for procedural rules: parameterized complexity and consecutive domains13
Research on key technologies of edge cache in virtual data space across WAN13
On the exact quantum query complexity of MOD and EXACT functions13
RVAM16: a low-cost multiple-ISA processor based on RISC-V and ARM Thumb12
Visibility restoration for real-world hazy images via improved physical model and Gaussian total variation12
TransRec++: Translation-based sequential recommendation with heterogeneous feedback12
Spreadsheet quality assurance: a literature review12
GaussDB-AISQL: a composable cloud-native SQL system with AI capabilities12
CAD-NeRF: learning NeRFs from uncalibrated few-view images by CAD model retrieval12
Towards kernelizing the classifier for hyperbolic data12
Model-based automated testing of JavaScript Web applications via longer test sequences12
Integrating element correlation with prompt-based spatial relation extraction12
Towards better entity linking12
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer12
Incorporating contextual evidence to improve implicit discourse relation recognition in Chinese12
On the hardness of NTRU problems11
A user requirements-oriented privacy policy self-adaption scheme in cloud computing11
Factor-wise disentangled contrastive learning for cross-domain few-shot molecular property prediction11
A framework combines supervised learning and dense subgraphs discovery to predict protein complexes11
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs11
Multi-constraint reinforcement learning in complex robot environments11
MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy11
Learning multi-tasks with inconsistent labels by using auxiliary big task10
Single image super-resolution: a comprehensive review and recent insight10
Graph-Segmenter: graph transformer with boundary-aware attention for semantic segmentation10
ncRNA2MetS v2.0: a manually curated database for metabolic syndrome-associated ncRNAs10
Exploiting user behavior learning for personalized trajectory recommendations10
Exploring associations between streetscape factors and crime behaviors using Google Street View images10
An approach for detecting LDoS attack based on cloud model10
Kronos: towards bus contention-aware job scheduling in warehouse scale computers10
D-Cubicle: boosting data transfer dynamically for large-scale analytical queries in single-GPU systems10
Exact satisfiability and phase transition analysis of the regular (k, d)-CNF formula9
Accelerating temporal action proposal generation via high performance computing9
VSAN: A new visualization method for super-large-scale academic networks9
An efficient graph data compression model based on the germ quotient set structure9
Labeling-based centrality approaches for identifying critical edges on temporal graphs9
ISM: intra-class similarity mixing for time series augmentation9
Announcement of the 2024 FCS Paper Awards9
SR-AFU: super-resolution network using adaptive frequency component upsampling and multi-resolution features9
Referring image segmentation with attention guided cross modal fusion for semantic oriented languages9
Exploiting blockchain for dependable services in zero-trust vehicular networks9
A comprehensive study on fault tolerance in stream processing systems9
Unsupervised spectral feature selection algorithms for high dimensional data9
ForkXplorer: an approach of fork summary generation9
BA-GNN: Behavior-aware graph neural network for session-based recommendation9
SCARE and power attack on AES-like block ciphers with secret S-box9
Generating empathetic responses through emotion tracking and constraint guidance9
Foundation model enhanced derivative-free cognitive diagnosis9
Multi-user reinforcement learning based task migration in mobile edge computing9
A survey of dynamic graph neural networks9
Attribute augmentation-based label integration for crowdsourcing9
Index-free triangle-based graph local clustering8
Adaptive network combination for single-image reflection removal: a domain generalization perspective8
On the upper bounds of (1,0)-super solutions for the regular balanced random (k,2s)-SAT problem8
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis8
Learning group interaction for sports video understanding from a perspective of athlete8
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs8
EMP3D: an emergency medical procedures 3D dataset with pose and shape8
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT8
Multi-key FHE without ciphertext-expansion in two-server model8
An effective fault localization approach for Verilog based on enhanced contexts8
ICCG: low-cost and efficient consistency with adaptive synchronization for metadata replication8
Linkable and traceable anonymous authentication with fine-grained access control8
Accelerating constraint-based neural network repairs by example prioritization and selection8
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication8
SSA: semantic structure aware inference on CNN networks for weakly pixel-wise dense predictions without cost8
A graph-based contrastive learning framework for medicare insurance fraud detection8
Fully distributed identity-based threshold signatures with identifiable aborts8
Local feature aggregation algorithm based on graph convolutional network8
Foundation models for topic modeling: a case study8
Dynamic traveling time forecasting based on spatial-temporal graph convolutional networks8
Super solutions of the model RB8
Certificateless network coding proxy signatures from lattice8
Joint fuzzy background and adaptive foreground model for moving target detection8
Accelerating the cryo-EM structure determination in RELION on GPU cluster7
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform7
Large language models make sample-efficient recommender systems7
Wi-Fi based non-invasive detection of indoor wandering using LSTM model7
Endowing rotation invariance for 3D finger shape and vein verification7
Learning from shortcut: a shortcut-guided approach for explainable graph learning7
Generalized splitting-ring number theoretic transform7
Graph neural networks for financial fraud detection: a review7
Monotonicity and nonmonotonicity in L3-valued propositional logic7
Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit7
Quantifying predictability of sequential recommendation via logical constraints7
Return just your search: privacy-preserving homoglyph search for arbitrary languages7
Disk based pay-as-you-go record linkage7
ARCosmetics: a real-time augmented reality cosmetics try-on system7
0.1356201171875