Frontiers of Computer Science

Papers
(The TQCC of Frontiers of Computer Science is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Ethereum smart contract security research: survey and future research opportunities100
A survey of density based clustering algorithms74
DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning56
DFD-Net: lung cancer detection from denoised CT scan image using deep learning51
Challenges and future directions of secure federated learning: a survey47
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform38
A survey of music emotion recognition30
Graph convolution machine for context-aware recommender system29
Image smog restoration using oblique gradient profile prior and energy minimization26
A survey of Intel SGX and its applications23
Protein interaction networks: centrality, modularity, dynamics, and applications23
Brain tumor localization and segmentation using mask RCNN23
Compositional metric learning for multi-label classification23
piEnPred: a bi-layered discriminative model for enhancers and their subtypes via novel cascade multi-level subset feature selection algorithm22
Derivative-free reinforcement learning: a review21
AIDEDNet: anti-interference and detail enhancement dehazing network for real-world scenes20
Cancer classification with data augmentation based on generative adversarial networks19
Towards a better prediction of subcellular location of long non-coding RNA19
Practical age estimation using deep label distribution learning19
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks16
A framework based on sparse representation model for time series prediction in smart city15
A mobile edge computing-based applications execution framework for Internet of Vehicles15
Mean estimation over numeric data with personalized local differential privacy14
Exploring associations between streetscape factors and crime behaviors using Google Street View images14
Identification of differential brain regions in MCI progression via clustering-evolutionary weighted SVM ensemble algorithm14
A subgraph matching algorithm based on subgraph index for knowledge graph13
Where to go? Predicting next location in IoT environment12
Determining node duty cycle using Q-learning and linear regression for WSN12
Rehearsal: learning from prediction to decision12
Entity set expansion in knowledge graph: a heterogeneous information network perspective11
String kernels construction and fusion: a survey with bioinformatics application11
Attention based simplified deep residual network for citywide crowd flows prediction11
Semi-supervised community detection on attributed networks using non-negative matrix tri-factorization with node popularity11
Instance-sequence reasoning for video question answering11
Fingerprint matching, spoof and liveness detection: classification and literature review11
Label distribution for multimodal machine learning11
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network10
SCENERY: a lightweight block cipher based on Feistel structure10
DRPS: efficient disk-resident parameter servers for distributed machine learning10
The mass, fake news, and cognition security10
Parallel exploration via negatively correlated search9
Hierarchical data replication strategy to improve performance in cloud computing9
Information retrieval: a view from the Chinese IR community9
ResLNet: deep residual LSTM network with longer input for action recognition9
Side-channel analysis attacks based on deep learning network9
ABDKS: attribute-based encryption with dynamic keyword search in fog computing9
A survey of operating system support for persistent memory9
Multiband decomposition and spectral discriminative analysis for motor imagery BCI via deep neural network9
A proactive secret sharing scheme based on Chinese remainder theorem8
Experience report: investigating bug fixes in machine learning frameworks/libraries8
Attribute augmentation-based label integration for crowdsourcing8
Cross-scene passive human activity recognition using commodity WiFi8
Machine learning after the deep learning revolution8
Collaborative eye tracking based code review through real-time shared gaze visualization8
GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding8
Find truth in the hands of the few: acquiring specific knowledge with crowdsourcing8
MSDA: multi-subset data aggregation scheme without trusted third party7
Domain-specific feature elimination: multi-source domain adaptation for image classification7
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage7
A Monte Carlo Neural Fictitious Self-Play approach to approximate Nash Equilibrium in imperfect-information dynamic games7
A bi-metric autoscaling approach for n-tier web applications on kubernetes7
A novel DNA-inspired encryption strategy for concealing cloud storage7
iNet: visual analysis of irregular transition in multivariate dynamic networks7
PSO-ACSC: a large-scale evolutionary algorithm for image matting7
Effort-aware cross-project just-in-time defect prediction framework for mobile apps7
An efficient and authenticated key establishment scheme based on fog computing for healthcare system7
Resource abstraction and data placement for distributed hybrid memory pool7
Using BiLSTM with attention mechanism to automatically detect self-admitted technical debt7
Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities7
A survey of discourse parsing7
Citywide package deliveries via crowdshipping: minimizing the efforts from crowdsourcers7
Visual abstraction of dynamic network via improved multi-class blue noise sampling7
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis7
New development of cognitive diagnosis models6
The utilization of algorithms for cloud internet of things application domains: a review6
Mathematical model and simulated annealing algorithm for Chinese high school timetabling problems under the new curriculum innovation6
Iterative Android automated testing6
IP-geolocater: a more reliable IP geolocation algorithm based on router error training6
A systematic study on the role of SentiWordNet in opinion mining6
Task assignment for social-oriented crowdsourcing6
circ2CBA: prediction of circRNA-RBP binding sites combining deep learning and attention mechanism6
Properties of the satisfiability threshold of the strictly d-regular random (3,2s)-SAT problem6
Evaluating the usage of fault localization in automated program repair: an empirical study6
Matching user identities across social networks with limited profile data6
Pairwise tagging framework for end-to-end emotion-cause pair extraction6
Rumor detection with self-supervised learning on texts and social graph6
Identification and classification of promoters using the attention mechanism based on long short-term memory6
Speech-driven facial animation with spectral gathering and temporal attention6
Physical layer authentication for automotive cyber physical systems based on modified HB protocol6
An improved master-apprentice evolutionary algorithm for minimum independent dominating set problem6
A search-based identification of variable microservices for enterprise SaaS6
Endowing rotation invariance for 3D finger shape and vein verification6
Robust watermarking of databases in order-preserving encrypted domain5
Vehicle color recognition based on smooth modulation neural network with multi-scale feature fusion5
SSDBA: the stretch shrink distance based algorithm for link prediction in social networks5
Self-corrected unsupervised domain adaptation5
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor5
Prototyping federated learning on edge computing systems5
Demystifying Ethereum account diversity: observations, models and analysis5
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint5
An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities5
Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm5
DOF: a generic approach of domain ontology fuzzification5
Adversarial network embedding using structural similarity5
BIC-based node order learning for improving Bayesian network structure learning5
Controllable data synthesis method for grammatical error correction5
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators5
Community detection with attributed random walk via seed replacement5
On the analysis of ant colony optimization for the maximum independent set problem5
Defense against local model poisoning attacks to byzantine-robust federated learning5
Representation learning via an integrated autoencoder for unsupervised domain adaptation5
Full friendly index sets of mCn5
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service5
AE-TPGG: a novel autoencoder-based approach for single-cell RNA-seq data imputation and dimensionality reduction5
Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes5
Physiological-physical feature fusion for automatic voice spoofing detection5
OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering5
A time-aware hybrid recommendation scheme combining content-based and collaborative filtering4
SeBROP: blind ROP attacks without returns4
Multi-granularity semantic alignment distillation learning for remote sensing image semantic segmentation4
Improving accuracy of automatic optical inspection with machine learning4
Improving neural sentence alignment with word translation4
Biologically inspired visual computing: the state of the art4
Predicting protein subchloroplast locations: the 10th anniversary4
Effective ensemble learning approach for SST field prediction using attention-based PredRNN4
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data4
FPGA sharing in the cloud: a comprehensive analysis4
TransRec++: Translation-based sequential recommendation with heterogeneous feedback4
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid4
Wi-Fi based non-invasive detection of indoor wandering using LSTM model4
Prediction of job characteristics for intelligent resource allocation in HPC systems: a survey and future directions4
VColor*: a practical approach for coloring large graphs4
A semi-transparent selective undo algorithm for multi-user collaborative editors4
Evolutionary selection for regression test cases based on diversity4
EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption4
Three-dimensional quantum wavelet transforms4
DBST: a lightweight block cipher based on dynamic S-box4
Performance analysis of ASR system in hybrid DNN-HMM framework using a PWL euclidean activation function4
Weakly supervised temporal action localization with proxy metric modeling4
Adaptive watermark generation mechanism based on time series prediction for stream processing4
Unsupervised statistical text simplification using pre-trained language modeling for initialization4
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation4
Label distribution learning for scene text detection4
Intellectual property protection for deep semantic segmentation models4
A multi-objective reinforcement learning algorithm for deadline constrained scientific workflow scheduling in clouds4
Data fusing and joint training for learning with noisy labels4
WaveLines: towards effective visualization and analysis of stability in power grid simulation4
A user requirements-oriented privacy policy self-adaption scheme in cloud computing4
0.027156829833984