Computer Journal

Papers
(The median citation count of Computer Journal is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori148
Mean Error Rate Weighted Online Boosting Method101
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT76
A hybrid architecture for secure data sharing in multi-clouds system51
Fault tolerance assessment of the data center network DPCell based on g-good-neighbor conditions43
Developing an intelligent framework with Blockchain capabilities for environmental monitoring using a CubeSat41
A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things37
Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation37
Authenticated Tree-Based R-LWE Group Key Exchange35
Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons35
CWOA: Hybrid Approach for Task Scheduling in Cloud Environment30
A General Condition of Structural Distinguisher26
An Intelligent Security System Using Enhanced Anomaly-Based Detection Scheme23
Closeness Centralities of Lollipop Graphs21
SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders21
Clinical Dataset Classification Using Feature Ranking And Satin Bower Bird Optimized SVMs19
Privacy-Preserving Confidential Reporting System With Designated Reporters18
Semantic-Based Hybrid Query Reformulation for Biomedical Information Retrieval16
Distributed Partial Simulation for Graph Pattern Matching16
Pancyclic And Hamiltonian Properties Of Dragonfly Networks15
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise15
Towards Accurate Smartphone Localization Using CSI Measurements14
A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks14
NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN14
Single-Point And Triple-Point Queries Visibility Constrained Minimum Link Paths In Simple Polygons13
Erratum to: A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications13
Special Issue on Failed Approaches and Insightful Losses in Cryptology — Foreword13
Quantum Guess and Determine Attack on Stream Ciphers13
Proof Automation in the Theory of Finite Sets and Finite Set Relation Algebra13
A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images13
Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion12
Real-world continuous smartwatch-based user authentication11
A New Ensemble Approach for Congestive Heart Failure and Arrhythmia Classification Using Shifted One-Dimensional Local Binary Patterns with Long Short-Term Memory11
SAAChain: release and storage platform of digital works based on non-fungible tokens11
Thematic editorial: sentiment analysis11
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation10
Online/Offline Attribute-Based Boolean Keyword Search For Internet Of Things10
Flower pollination-enhanced CNN for lung disease diagnosis10
Neural-Aided Statistical Attack for Cryptanalysis10
A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications10
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda10
P-TIMA: a framework of T witter threat intelligence mining and analysis based on a prompt-learning NER model10
L-graph Automata And Some Applications9
Optimal Text Document Clustering Enabled by Weighed Similarity Oriented Jaya With Grey Wolf Optimization Algorithm9
CFAuditChain: Audit BlockChain Based On Cuckoo Filter9
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems9
Multi-key Fully Homomorphic Encryption from Additive Homomorphism9
Link Residual Closeness of Graphs with Fixed Parameters9
Some Scheduling Problems With Job Rejection And A Learning Effect9
Borehole Depth Recognition Based on Improved YOLOX Detection9
Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs9
Efficient object detector via dynamic prior and dynamic feature fusion8
2L-LSH: A Locality-Sensitive Hash Function-Based Method For Rapid Point Cloud Indexing8
On the Modulus in Matching Vector Codes8
IPOD2: an irrecoverable and verifiable deletion scheme for outsourced data8
Intrusion detection based on hybrid metaheuristic feature selection8
An improved DNN model for WLAN intrusion detection8
Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges8
Concept Drift–Based Intrusion Detection For Evolving Data Stream Classification In IDS: Approaches And Comparative Study8
Device placement using Laplacian PCA and graph attention networks8
A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding8
A Novel Approach to Adaptive Resource Allocation for Energy Saving in Reconfigurable Heterogeneous Networks7
Specifying and Model Checking Distributed Control Algorithms at Meta-level7
Sentiment Classification of Tourist’s Opinion on Tourist Places of Interest in South India using Tweet Reviews7
Aging Facial Recognition for Feature Extraction Using Adaptive Fully Recurrent Deep Neural Learning7
Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity7
Laser Beam Welded Aluminum-Titanium Dissimilar Sheet Metals: Neural Network Based Strength and Hardness Prediction Model7
Accelerating Analytics Using Improved Binary Particle Swarm Optimization for Discrete Feature Selection7
Approximating Closest Vector Problem in ∞-Norm Revisited7
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing7
Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network7
New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey7
Precise Point Set Registration Based on Feature Fusion7
On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers7
Two-Hop Relay Deployment Based on User Trajectory in Wireless Networks7
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud7
Multiple Blind Signature for e-Voting and e-Cash7
The Path-Structure Connectivity of Augmented k-ary n-cubes6
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning6
Low-Data Cryptanalysis On SKINNY Block Cipher6
Multi-View Spatial–Temporal Graph Neural Network for Traffic Prediction6
Ensemble Framework Combining Family Information for Android Malware Detection6
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention6
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem6
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control6
Loading Cost-Aware Model Caching And Request Routing In Edge-enabled Wireless Sensor Networks6
A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees6
Robust Image Hashing Combining 3D Space Contour and Vector Angle Features6
Improved Linear Cryptanalysis of Block Cipher BORON6
FPGA-CPU Architecture Accelerated Regular Expression Matching With Fast Preprocessing6
Cryptanalysis on Reduced-Round 3D and Saturnin6
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks6
Prediction of Li-Ion Battery Discharge Patterns in IoT Devices Under Random Use Via Machine Learning Algorithms6
RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model6
Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study5
A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort5
A Refinement of Key Mismatch Attack on NewHope5
Robust Object Detection and Localization Using Semantic Segmentation Network5
A New Code-Based Blind Signature Scheme5
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters5
Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher5
Improving Science That Uses Code5
Cryptanalysis of Reduced-Round SipHash5
Structure Fault Tolerance of Exchanged Hypercube5
Prediction of Stock Prices Using Statistical and Machine Learning Models: A Comparative Analysis5
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing5
Tactics And Techniques Classification In Cyber Threat Intelligence5
A Modified Firefly Deep Ensemble for Microarray Data Classification5
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search5
Adaptive Laplacian Support Vector Machine for Semi-supervised Learning5
Online Optimization Method of Learning Process for Meta-Learning5
Automating the Deployment of Cyber Range with OpenStack5
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON5
Decreasing Proof Size of BLS Scheme5
BLFair: enabling proportional I/O sharing for NVMe SSD in SPDK para-virtualization architecture5
A Novel Decision-Making Process for COVID-19 Fighting Based on Association Rules and Bayesian Methods5
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption5
GRAN: a SDN intrusion detection model based on graph attention network and residual learning5
A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability5
A White-box Implementation of SM4 with Self-equivalence Encoding5
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism5
Energy-Efficient Cluster-Based Routing Protocol for WSN Based on Hybrid BSO–TLBO Optimization Model4
DuoSQL: towards elastic data warehousing via separated data management and processing4
Dragonfly Political Optimizer Algorithm-Based Rider Deep Long Short-Term Memory for Soil Moisture and Heat Level Prediction in IoT4
Fractional Sailfish Optimizer with Deep Convolution Neural Network for Compressive Sensing Based Magnetic Resonance Image Reconstruction4
Cryptanalysis of Modular Exponentiation Outsourcing Protocols4
Pruning of Health Data in Mobile-Assisted Remote Healthcare Service Delivery4
Social Network Analysis of the Panama Papers Concentrating on the MENA Region4
ELSM: Evidence-Based Line Segment Merging4
COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis4
Discriminative Subspace Learning With Adaptive Graph Regularization4
Non-negative Matrix Factorization: A Survey4
Tor Trace in Images: A Novel Multi-Tab Website Fingerprinting Attack With Object Detection4
CSEA: A Fine-Grained Framework of Climate-Season-Based Energy-Aware in Cloud Storage Systems4
A Roman Urdu Corpus for sentiment analysis4
Maximum fault-free enforcement in Petri nets using supervisory control4
COVID-19 virus mutation prediction with LSTM and attention mechanisms4
Behavior Analysis-Based IoT Services For Crowd Management4
PBFL: Communication-Efficient Federated Learning via Parameter Predicting4
Verifiable attribute-based multi-keyword ranked search scheme in blockchain4
A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE4
A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification4
Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples4
Rare Correlated Coherent Association Rule Mining With CLS-MMS4
Compression Cryptosystem4
A Federated Learning Approach for Privacy Protection in Context-Aware Recommender Systems4
Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection4
Taylor Sun Flower Optimization-Based Compressive Sensing for Image Compression and Recovery4
Ant Cat Swarm Optimization-Enabled Deep Recurrent Neural Network for Big Data Classification Based on Map Reduce Framework4
On the Security of the Stream Ciphers RCR-64 and RCR-324
New Meet-in-the-Middle Attacks on FOX Block Cipher4
Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers4
A Hybrid Solution For The Cold Start Problem In Recommendation4
A new DDoS attack detection model based on improved stacked autoencoder and gated recurrent unit for software defined network4
A resource-aware workload scheduling method for unbalanced GEMMs on GPUs4
Gaze Estimation Using Neural Network And Logistic Regression4
Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain3
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation3
Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure3
Intermittent Fault Diagnosis Of Product Network Based On PMC Model3
Remote sensing image dehazing method in mountaineering equipment3
An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects3
Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations3
K-Nearest neighbor smart contract classification with semantic feature enhancement3
DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic3
Kth min Threshold Encryption for Privacy-preserving Data Evaluation3
Image classification with deconvolution operation and augmentation3
Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features3
A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset3
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction3
Reliable broadcasting-based content acquisition for named data MANETs3
Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications3
Youtube Trending Videos: Boosting Machine Learning Results Using Exploratory Data Analysis3
Improving recommendation fairness with dependency-based graph collaborative filtering3
A Unified Framework to Discover Permutation Generation Algorithms3
Reliability Analysis of the Cactus-Based Networks Based on Subsystem3
MAPBFT: multilevel adaptive PBFT algorithm based on discourse and reputation models3
Detection of E-Commerce Fraud Review via Self-Paced Graph Contrast Learning3
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning3
GRNet: a graph reasoning network for enhanced multi-modal learning in scene text recognition3
Global and Local Structure Preservation for Nonlinear High-dimensional Spectral Clustering3
Gathering Over Heterogeneous Meeting Nodes3
FLDS: differentially private federated learning with double shufflers3
A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems3
Face recognition using deep learning on Raspberry Pi3
A Fuzzy Inference-Based Decision Support System for Disease Diagnosis3
Joining Formal Concept Analysis to Feature Extraction for Data Pruning in Cloud of Things3
Declarative Programming with Intensional Sets in Java Using JSetL3
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications3
DCAF: Dynamic Cross-Chain Anchoring Framework using Smart Contracts3
Breast Cancer Mass Classification Using Machine Learning, Binary-Coded Genetic Algorithms and an Ensemble of Deep Transfer Learning3
Panoptic Segmentation with Convex Object Representation3
Residual Closeness, Matching Number and Chromatic Number3
Influence Maximization in Social Networks Using an Improved Multi-Objective Particle Swarm Optimization3
A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems3
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube3
A Light Weight Depthwise Separable Layer Optimized CNN Architecture for Object-Based Forgery Detection in Surveillance Videos3
API Recommendation For Mashup Creation: A Comprehensive Survey3
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks3
The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices3
Hitting Times of Random Walks on Edge Corona Product Graphs2
Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples2
Irreducible Fuzzy Multiset Finite Automaton2
Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts2
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers2
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA2
On The Batch Outsourcing Of Pairing Computations2
Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC2
Structure connectivity of folded cross cubes2
Performance Evaluation of Learning Models for Identification of Suicidal Thoughts2
IoT Data Quality Issues and Potential Solutions: A Literature Review2
Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning2
Prediction of Student Performance Using Random Forest Combined With Naïve Bayes2
Data transmission optimization based on multi-objective deep reinforcement learning2
Face Identification Using Conditional Generative Adversarial Network2
Social Media Analysis of Customer Emotions in Pizza Industry2
Feature Extraction Based Deep Indexing by Deep Fuzzy Clustering for Image Retrieval Using Jaro Winkler Distance2
Deep Hashing and Sparse Representation of Abnormal Events Detection2
Optimizing arrhythmia identification using chaos theory and deep learning analysis2
sasa: a SimulAtor of Self-stabilizing Algorithms2
Flush+Reload Attacks on SEED2
An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer2
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks2
Practical Attacks on Reduced-Round 3D and Saturnin2
CR Loss: Improving Biometric Using ClassRoom Learning Approach2
Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science2
Relationship Between Component Connectivity And Component Diagnosability Of Some Regular Networks2
Deriving homing sequences for Finite State Machines with timeouts2
Detecting Affine Equivalence Of Boolean Functions And Circuit Transformation2
An improved sensing data cleaning scheme for object localization in edge computing environment2
Optimal Symmetric Ratcheting for Secure Communication2
Smart Multimedia Compressor—Intelligent Algorithms for Text and Image Compression2
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy2
Double-Lead Content Search And Producer Location Prediction Scheme For Producer Mobility In Named Data Networking2
Toward a Novel RESTFUL Big Data-Based Urban Traffic Incident Data Web Service for Connected Vehicles2
Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach2
A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents2
Improved Related-Key Rectangle Attacks On GIFT2
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT2
An Advanced EEG Motion Artifacts Eradication Algorithm2
Near Real-Time Social Distance Estimation In London2
Assessment and Monitoring of Salinity of Soils After Tsunami in Nagapattinam Area Using Fuzzy Logic-Based Classification2
Multi-Class Liver Cancer Diseases Classification Using CT Images2
Urdu Named Entity Recognition System Using Deep Learning Approaches2
Approximation algorithms for maximum weighted internal spanning trees in regular graphs and subdivisions of graphs2
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm2
Dynamic compact data structure for temporal reachability with unsorted contact insertions2
Reversible Circuit Synthesis Method Using Sub-graphs of Shared Functional Decision Diagrams2
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth2
A Clothoid Curve-Based Intersection Collision Warning Scheme in Internet of Vehicles2
0.051944017410278