Computer Journal

Papers
(The TQCC of Computer Journal is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Towards Accurate Smartphone Localization Using CSI Measurements124
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem99
Special Issue on Failed Approaches and Insightful Losses in Cryptology — Foreword36
Thematic Editorial: Mostly Artificial Intelligence (AI) or Machine Learning (ML) Now in the Engine Room, in Pursuit of a Green Agenda33
A hybrid architecture for secure data sharing in multi-clouds system31
Developing an intelligent framework with Blockchain capabilities for environmental monitoring using a CubeSat29
Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges25
2L-LSH: A Locality-Sensitive Hash Function-Based Method For Rapid Point Cloud Indexing24
Gaussian process regression based on random projections and dynamic pseudo-input selection23
Authentication safety: safe on-demand concurrent authentication under transient faults and arbitrary initialization22
Online Optimization Method of Learning Process for Meta-Learning22
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON22
Enhancing conversational agent responses with EXLNetT using learnable enhanced Laplacian kernel attention mechanism, deep bi-affine network, and hybrid positional encoding21
RPKClust: region-partitioned keywords inference for binary protocol reverse19
Time-Aware Data Partition Optimization and Heterogeneous Task Scheduling Strategies in Spark Clusters18
Singular value decomposition-based graph densification for link prediction in sparse graphs18
PixMSE: detecting GAN-generated images through local roughness17
Minority sample selection in fraud detection with classifier-based reinforcement learning17
A study of improved k-anonymity privacy-preserving algorithms for data sharing16
Reliable broadcasting-based content acquisition for named data MANETs15
Spatial-Aware Multi-Directional Autoencoder For Pre-Training15
Performance enhancement research on channel pruning and semantic decoupling in self-supervised learning networks15
K-Nearest neighbor smart contract classification with semantic feature enhancement15
Multi-agent and knowledge graph-based social and emotional learning question-answering14
PCDP-CRLPPM: a classified regional location privacy-protection model based on personalized clustering with differential privacy in data management14
An Ontology as Support for Specification of Non-functional Requirements of AAL Systems Considering Compliance Aspects14
Reliability Analysis of the Cactus-Based Networks Based on Subsystem14
A System For Storing Anonymous Patient Healthcare Data Using Blockchain And Its Applications13
DTRB-Net: a dual-teacher network with adaptive reliable bank for SAR image classification13
Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers12
Optimization of Kleene closure regular path query on large RDF graphs12
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction12
Influence Maximization in Social Networks Using an Improved Multi-Objective Particle Swarm Optimization12
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube12
A practical blockchain-based vaccine supply management framework with verifiability and traceability12
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation11
On The Batch Outsourcing Of Pairing Computations11
GUI: A Geolocation Method for Unreachable IP11
Deterministic trigger chain generation unambiguous deep learning model backdoor watermarking algorithm combined with Borderline-SMOTE11
Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning11
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT11
Lung Lobe Segmentation and Feature Extraction-Based Hierarchical Attention Network for COVID-19 Prediction from Chest X-Ray Images11
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers11
Attack-Oblivious Node Protection Strategy for survivable routing in airborne tactical networks under uncertainty10
Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images10
Automated irrelevant individuals recognition algorithm in video via motion trajectories10
Deep Hashing and Sparse Representation of Abnormal Events Detection10
Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science10
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain10
GitHub project recommendation based on knowledge graph and developer similarity9
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA9
Coverless Image Steganography Using Content-Based Image Patch Retrieval9
Near Real-Time Social Distance Estimation In London9
HySELoc: a hybrid semantic-enhanced approach for interpretable vulnerability localization9
Hallux valgus diagnosis on X-rays with skeleton-guided diffusion8
Stand-up indulgent gathering on lines for myopic luminous robots8
Quadruplet network based template attack8
Prediction of Student Performance Using Random Forest Combined With Naïve Bayes8
The Orbits of Folded Crossed Cubes8
Software Failure Prediction Based On Program State and First-Error Characteristics8
Adaptive real-time key–value stream statistics and publishing with local differential privacy8
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis8
Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion8
Research on blind reversible database watermarking algorithm based on dual embedding strategy8
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy8
ProInfer: inference of binary protocol keywords based on probabilistic statistics8
Correction to: An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions8
On The Maximum Cliques Of The Subgraphs Induced By Binary Constant Weight Codes In Powers Of Hypercubes7
Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer7
Indistinguishable Leakage-Resilient Circuit Compiler7
Anomaly Metrics on Class Variations For Face Anti-Spoofing7
Knowledge distillation with adaptive frequency prompting7
SPDPOA: Student Psychology Dragonfly Political Optimizer Algorithm-Based Soil Moisture and Heat-Level Prediction for Plant Health Monitoring in Internet of Things7
H2Sketch: real-time H -value measurement of key flows in high-speed networks7
Improved HotStuff consensus algorithm based on reputation mechanism grouping7
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting6
Weighted twin support vector machine with rescaled hinge loss6
An Efficient Deep Learning Approach To IoT Intrusion Detection6
A Dynamic Heterogeneous Graph Convolution Network For Traffic Flow Prediction6
CCESHP: Causal Consistency Model of Edge Storage Based on Hash Ring and Partial Geo-Replication6
Improved YOLOv9 for underwater side scan sonar target detection6
EDTC: enhanced depth of text comprehension in automated audio captioning6
An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors6
Joint Alignment Networks For Few-Shot Website Fingerprinting Attack6
FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile6
Dense structure distillation towards recurrent scene flow estimation for sparse point cloud6
ChatGPT-driven machine learning code generation for android malware detection6
Image sentiment analysis based on distillation and sentiment region localization network6
An Adaptive MAC Protocol Based on Time-Domain Interference Alignment for UWANs6
Uniform k -circle formation by asynchronous fat robots6
A bio-inspired and AI-driven approach to DDoS detection6
Learning to optimize based on rate decay6
Character-Based Value Factorization For MADRL6
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes6
Privacy-Preserving Image Retrieval with Multi-Modal Query6
Worst-Case Analysis of Heapsort, Exactly6
Detecting encrypted malicious traffic with HEAT: a header-focused deep learning approach6
Strongly Menger Connectedness of a Class of Recursive Networks6
Balancing privacy and model performance in federated learning through contract-based data trading6
An optimized sparrow search algorithm for quantum circuit mapping5
PNCTS: A Prediction and Network Coding-Based Transmission Scheme for Efficient Screen Updates Delivery in DaaS5
Correction to: Hitting Times of Random Walks on Edge Corona Product Graphs5
Automated Computer-Aided Diagnosis of Diabetic Retinopathy Based on Segmentation and Classification using K-nearest neighbor algorithm in retinal images5
LiteMixer: Cauliflower Disease Diagnosis based on a Novel Lightweight Neural Network5
Phishing fraud identity inference based on temporal transaction graph attention network5
SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders5
Automating the Deployment of Cyber Range with OpenStack5
Traffic-Aware Re-Grouping for Load Balance in IEEE 802.11ah IoT Network Based on the Registered Backoff Time Mechanism5
Image retrieval based on auto-encoder and clustering with centroid update5
Multimodal sentiment analysis based on expert feature-aligned diffusion under uncertain image modality5
DGA domain embedding with deep metric learning5
CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature5
Time series forecasting with variable-centric spectral transformer5
The Cyclic Diagnosability Of Hypercubes Under The PMC Model And The MM* Model5
Health status assessment method for electromechanical equipment based on explainable belief rule base with interval structure5
A hybrid CNN-Transformer for lower limb motion classification via surface electromyography5
Device placement using Laplacian PCA and graph attention networks5
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori5
NODSTAC: Novel Outlier Detection Technique Based on Spatial, Temporal and Attribute Correlations on IoT Bigdata5
Improving LAMMPS performance for molecular dynamic simulation on large-scale HPC systems5
REFS: a novel framework for accelerated receive encrypted flow steering5
CV content recognition using YOLOv8 and Tesseract-OCR deep learning5
Interactive Visualization of Large Point Clouds Using an Autotuning Multiresolution Out-Of-Core Strategy5
A resource-aware workload scheduling method for unbalanced GEMMs on GPUs5
A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things5
Balanced Off-Chain Payment Channel Network Routing Strategy Based On Weight Calculation5
Link Residual Closeness of Graphs with Fixed Parameters5
WHPar: a novel API parameter handling method for malware detection5
Pornographic video detection based on semantic and image enhancement4
Kth min Threshold Encryption for Privacy-preserving Data Evaluation4
Geometric Searchable Encryption Without False Positive And Its Applications4
Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model4
High-quality recovery of digital images4
Dynamic compact data structure for temporal reachability with unsorted contact insertions4
KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers4
Use of data Mining in Identifying the risk factors of optic neuropathy4
Maximum fault-free enforcement in Petri nets using supervisory control4
Discriminative Subspace Learning With Adaptive Graph Regularization4
A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems4
Glaucoma Detection Using Multiple Feature Set With Recurrent Neural Network4
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks4
Edge-Based Congestion-Aware Datacenter Load Balancing with Smart Probing4
Correction to: Perceptual Image Hashing Based on Canny Operator and Tensor for Copy-Move Forgery Detection4
Error and attack vulnerability of Apollonian networks4
A multimodal outfit recommendation Q&A system based on LLMs and KGs4
Double-Lead Content Search And Producer Location Prediction Scheme For Producer Mobility In Named Data Networking4
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth4
Verifiable attribute-based multi-keyword ranked search scheme in blockchain4
Key Node Identification Method Integrating Information Transmission Probability and Path Diversity in Complex Network4
Efficient neural inertial localization4
Approximation algorithms for maximum weighted internal spanning trees in regular graphs and subdivisions of graphs4
Image classification with deconvolution operation and augmentation4
Explainable electrocardiogram-based atrial fibrillation detection using deep learning4
Coordinate System-Based Trust-Aware Web Services Composition in Edge and Cloud Environment4
Correction to: Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples4
ELSM: Evidence-Based Line Segment Merging4
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware4
Visual Intrusion Detection Based On CBAM-Capsule Networks4
Deriving homing sequences for Finite State Machines with timeouts4
A Roman Urdu Corpus for sentiment analysis4
Improving recommendation fairness with dependency-based graph collaborative filtering4
Joint optimization for collaborative data collection in wireless sensor networks with multi-UAV and multi-MUV4
PLCDroid: enhancing android malware detection by mitigating pseudo-label noise in the presence of concept drift4
0.16497397422791