Computer Journal

Papers
(The median citation count of Computer Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Towards Accurate Smartphone Localization Using CSI Measurements117
Low-Data Cryptanalysis On SKINNY Block Cipher92
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem34
Developing an intelligent framework with Blockchain capabilities for environmental monitoring using a CubeSat33
Special Issue on Failed Approaches and Insightful Losses in Cryptology — Foreword33
Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges28
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda25
A hybrid architecture for secure data sharing in multi-clouds system24
2L-LSH: A Locality-Sensitive Hash Function-Based Method For Rapid Point Cloud Indexing24
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON21
Gaussian process regression based on random projections and dynamic pseudo-input selection20
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT19
Enhancing conversational agent responses with EXLNetT using learnable enhanced Laplacian kernel attention mechanism, deep bi-affine network, and hybrid positional encoding18
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters18
Some Scheduling Problems With Job Rejection And A Learning Effect16
A study of improved k-anonymity privacy-preserving algorithms for data sharing16
Online Optimization Method of Learning Process for Meta-Learning16
Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations15
Reliable broadcasting-based content acquisition for named data MANETs14
GUI: A Geolocation Method for Unreachable IP14
K-Nearest neighbor smart contract classification with semantic feature enhancement14
Spatial-Aware Multi-Directional Autoencoder For Pre-Training13
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT13
PCDP-CRLPPM: a classified regional location privacy-protection model based on personalized clustering with differential privacy in data management13
Reliability Analysis of the Cactus-Based Networks Based on Subsystem13
An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects13
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers13
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube13
Influence Maximization in Social Networks Using an Improved Multi-Objective Particle Swarm Optimization13
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications12
Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers12
A practical blockchain-based vaccine supply management framework with verifiability and traceability12
Optimization of Kleene closure regular path query on large RDF graphs12
Residual Closeness, Matching Number and Chromatic Number12
Mining Frequent Serial Positioning Episode Rules with Forward and Backward Search Technique from Event Sequences12
Lung Lobe Segmentation and Feature Extraction-Based Hierarchical Attention Network for COVID-19 Prediction from Chest X-Ray Images11
DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic11
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction11
Performance enhancement research on channel pruning and semantic decoupling in self-supervised learning networks11
Attack-Oblivious Node Protection Strategy for survivable routing in airborne tactical networks under uncertainty10
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain10
On The Batch Outsourcing Of Pairing Computations10
Software Failure Prediction Based On Program State and First-Error Characteristics10
Prediction of Student Performance Using Random Forest Combined With Naïve Bayes10
Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images10
Quadruplet network based template attack10
ProInfer: inference of binary protocol keywords based on probabilistic statistics10
Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science10
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation10
Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning10
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis9
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA9
Near Real-Time Social Distance Estimation In London9
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy9
GitHub project recommendation based on knowledge graph and developer similarity9
Deep Hashing and Sparse Representation of Abnormal Events Detection9
Research on blind reversible database watermarking algorithm based on dual embedding strategy9
The Orbits of Folded Crossed Cubes8
Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions8
SPDPOA: Student Psychology Dragonfly Political Optimizer Algorithm-Based Soil Moisture and Heat-Level Prediction for Plant Health Monitoring in Internet of Things8
HySELoc: a hybrid semantic-enhanced approach for interpretable vulnerability localization8
Coverless Image Steganography Using Content-Based Image Patch Retrieval8
Image sentiment analysis based on distillation and sentiment region localization network8
H2Sketch: real-time H-value measurement of key flows in high-speed networks8
Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion8
Automated irrelevant individuals recognition algorithm in video via motion trajectories8
Indistinguishable Leakage-Resilient Circuit Compiler8
On The Maximum Cliques Of The Subgraphs Induced By Binary Constant Weight Codes In Powers Of Hypercubes8
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting7
Strongly Menger Connectedness of a Class of Recursive Networks7
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile7
A bio-inspired and AI-driven approach to DDoS detection7
A Novel SGD-U-Network-Based Pixel-Level Road Crack Segmentation and Classification7
Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer7
An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors7
Knowledge distillation with adaptive frequency prompting7
Character-Based Value Factorization For MADRL7
A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking7
ChatGPT-driven machine learning code generation for android malware detection7
Anomaly Metrics on Class Variations For Face Anti-Spoofing7
Improved HotStuff consensus algorithm based on reputation mechanism grouping7
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction6
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes6
CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature6
Uniform k -circle formation by asynchronous fat robots6
An Efficient Deep Learning Approach To IoT Intrusion Detection6
Worst-Case Analysis of Heapsort, Exactly6
Learning to optimize based on rate decay6
Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs6
Gambling Domain Name Recognition via Certificate and Textual Analysis6
Detecting encrypted malicious traffic with HEAT: a header-focused deep learning approach6
Balancing privacy and model performance in federated learning through contract-based data trading6
An Adaptive MAC Protocol Based on Time-Domain Interference Alignment for UWANs6
Joint Alignment Networks For Few-Shot Website Fingerprinting Attack6
Privacy-Preserving Image Retrieval with Multi-Modal Query6
Weighted twin support vector machine with rescaled hinge loss6
Modelling and Predictive Analytics of COVID-19 Transmission Using Gustafson–Kessel Fuzzy Clustering Approach6
Improved YOLOv9 for underwater side scan sonar target detection6
CCESHP: Causal Consistency Model of Edge Storage Based on Hash Ring and Partial Geo-Replication6
EDTC: enhanced depth of text comprehension in automated audio captioning6
DGA domain embedding with deep metric learning5
LiteMixer: Cauliflower Disease Diagnosis based on a Novel Lightweight Neural Network5
CV content recognition using YOLOv8 and Tesseract-OCR deep learning5
Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search5
Improving LAMMPS performance for molecular dynamic simulation on large-scale HPC systems5
Link Residual Closeness of Graphs with Fixed Parameters5
NODSTAC: Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata5
Automated Computer-Aided Diagnosis of Diabetic Retinopathy Based on Segmentation and Classification using K-nearest neighbor algorithm in retinal images5
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS5
Time series forecasting with variable-centric spectral transformer5
Interactive Visualization of Large Point Clouds Using an Autotuning Multiresolution Out-Of-Core Strategy5
Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity5
Image retrieval based on auto-encoder and clustering with centroid update5
An optimized sparrow search algorithm for quantum circuit mapping5
Multimodal sentiment analysis based on expert feature-aligned diffusion under uncertain image modality5
REFS: a novel framework for accelerated receive encrypted flow steering5
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model5
An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction5
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism5
Automating the Deployment of Cyber Range with OpenStack4
Device placement using Laplacian PCA and graph attention networks4
ELSM: Evidence-Based Line Segment Merging4
Urdu Named Entity Recognition System Using Deep Learning Approaches4
Double-Lead Content Search And Producer Location Prediction Scheme For Producer Mobility In Named Data Networking4
KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers4
Error and attack vulnerability of Apollonian networks4
Supervisor synthesis for opacity enforcement in partially observed discrete event systems4
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware4
Deriving homing sequences for Finite State Machines with timeouts4
Fidelity Homogenous Genesis Recommendation Model for User Trust with Item Ratings4
Image classification with deconvolution operation and augmentation4
A resource-aware workload scheduling method for unbalanced GEMMs on GPUs4
A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems4
SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders4
A hybrid CNN-Transformer for lower limb motion classification via surface electromyography4
Verifiable attribute-based multi-keyword ranked search scheme in blockchain4
Pornographic video detection based on semantic and image enhancement4
Reliability analysis for the n th Cartesian product of the balanced complete multipartite graph under various hypotheses4
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records4
Joint optimization for collaborative data collection in wireless sensor networks with multi-UAV and multi-MUV4
Feature refinement and attention enhancement for click-through rate prediction4
Maximum fault-free enforcement in Petri nets using supervisory control4
Use of data Mining in Identifying the risk factors of optic neuropathy4
Edge-Based Congestion-Aware Datacenter Load Balancing with Smart Probing4
Discriminative Subspace Learning With Adaptive Graph Regularization4
Geometric Searchable Encryption Without False Positive And Its Applications4
Glaucoma Detection Using Multiple Feature Set With Recurrent Neural Network4
A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things4
A Roman Urdu Corpus for sentiment analysis4
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori4
Health status assessment method for electromechanical equipment based on explainable belief rule base with interval structure4
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud4
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network4
Visual Intrusion Detection Based On CBAM-Capsule Networks4
Dynamic compact data structure for temporal reachability with unsorted contact insertions4
Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection4
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth4
Kth min Threshold Encryption for Privacy-preserving Data Evaluation4
Approximation algorithms for maximum weighted internal spanning trees in regular graphs and subdivisions of graphs4
Coordinate System-Based Trust-Aware Web Services Composition in Edge and Cloud Environment4
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks4
Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples4
Improving recommendation fairness with dependency-based graph collaborative filtering4
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation4
Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model4
How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk3
Correction to: A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems3
High-quality recovery of digital images3
Customization effort estimation of Microsoft ERP projects3
A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm3
CATI++: empirical study and evaluation for adjacent instruction enhanced type inference3
A Robust Blockchain-Based Distribution Master For Distributing Root Zone Data In DNS3
Analysis Performance Of Image Processing Technique Its Application by Decision Support Systems On Covid-19 Disease Prediction Using Convolution Neural Network3
Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems3
Impact of COVID-19 on the Human Personality: An Analysis Based on Document Modeling Using Machine Learning Tools3
An optimized hardware implementation of SHA-256 round computation3
Resistance Distances In Simplicial Networks3
High dynamic camera design for night use combined with AI-ISP3
Withdrawn: Editorial3
Deep Learning Model for Tamil Part-of-Speech Tagging3
Enhancing Deep-Learning Based Side-Channel Analysis Through Simultaneously Multi-Byte Training3
Correction to: Adaptive Laplacian Support Vector Machine for Semi-supervised Learning3
A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs3
A Large-Scale Mobile Traffic Dataset For Mobile Application Identification3
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring3
Trapezoidal Sketch: A Sketch Structure for Frequency Estimation of Data Streams3
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model3
Optimizing arrhythmia identification using chaos theory and deep learning analysis3
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage3
CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain3
Pattern Models: A Dynamic Epistemic Logic For Distributed Systems3
On the Longest Common Cartesian Substring Problem3
AdvBiTrans: an efficient botnet detection method based on adversarial BiLSTM-Transformer in IIoT3
How To Bind A TPM’s Attestation Keys With Its Endorsement Key3
DHCL-BR: Dual Hypergraph Contrastive Learning for Bundle Recommendation3
Generating training events for building cyber-physical security skills3
On 2-Interval Pairwise Compatibility Properties of Two Classes of Grid Graphs3
Chinese RoBERTa Distillation For Emotion Classification3
Human Visual System Guided Reversible Data Hiding Based On Multiple Histograms Modification3
Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment3
Adaptively Secure KP-ABE For Circuits With Fan-In n And Fan-Out 13
TranRAT: a lightweight anomaly detection model based on unsupervised learning for insider stealthy attacks in SAS3
Threshold Homomorphic Encryption From Provably Secure NTRU3
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator3
Offset attention with seed generation for point cloud completion3
Wearable Sensor-Based Human Activity Recognition System Employing Bi-LSTM Algorithm3
LAM: Scrutinizing Leading APIs For Detecting Suspicious Call Sequences3
Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance3
STPCH: strongly traceable policy-based chameleon hash for blockchain rewriting3
Anti-Occlusion Target Tracking Based on Joint Confidence3
Algorithm for solving quantum linear systems of equations with coherent superposition and extended applications3
A Transformer Based Encodings for Detection of Semantically Equivalent Questions in cQA3
Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm3
Can LLMs deeply detect complex malicious queries? A framework for jailbreaking via obfuscating intent3
An enhanced dynamic multi-grouping approach for AMBTC images using pairwise grouping3
Relinearization Attack On LPN Over Large Fields3
Failing to Hash Into Supersingular Isogeny Graphs3
On adversarial attack detection in intrusion detection system with graph neural network3
ASCUE: An Adversarial Network-Based Semantical Conformance Checking Method for Unsupervised Event Extraction in Social Internet of Things3
Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism3
zk-DCIAExchange: SGX protected fair exchange with distributed zero knowledge proof for data confidentiality and authentication3
Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification3
Scalable Misinformation Mitigation in Social Networks Using Reverse Sampling3
A novel curriculum learning framework for multi-label emotion classification2
Designing Scenarios for In-Organization Training Using the CyberCIEGE Game2
Rethinking adversarial transferability from a random and average perspective2
Multimodal sentiment analysis with interactive gated attention network2
Fault tolerance of hierarchical cubic networks based on cluster fault pattern2
Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts2
BlkInfoM: versatile blockchain-based mapping mechanism for secure information transmission2
BotGSL: Twitter Bot Detection with Graph Structure Learning2
Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features2
Multiple Histograms-Based Reversible Data Hiding Using Fast Performance Optimization and Adaptive Pixel Distribution2
CR Loss: Improving Biometric Using ClassRoom Learning Approach2
Dragonfly Political Optimizer Algorithm-Based Rider Deep Long Short-Term Memory for Soil Moisture and Heat Level Prediction in IoT2
Secure multi-party shuffling with optimal communication2
Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network2
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus2
Node-edge hybrid diagnosability and conditional node-edge hybrid diagnosability under the HPMC* model2
Comparative Analysis of Overlap Community Detection Techniques on Social Media Platform2
Advanced code slicing with pre-trained model fine-tuned for open-source component malware detection2
Multiscale fingerprinting for robust website fingerprinting attack2
Structure connectivity of folded cross cubes2
FLDS: differentially private federated learning with double shufflers2
Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem2
Hybrid intelligent systems for safer traffic: intersection collision avoidance through vehicle to everything and machine learning2
A Hybrid BERT-CNN Approach for Depression Detection on Social Media Using Multimodal Data2
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions2
BioElectra-BiLSTM-Dual Attention classifier for optimizing multilabel scientific literature classification2
A dual protection technology to thwart hardware Trojan insertion based on observability2
0.11468005180359