Theoretical Computer Science

Papers
(The TQCC of Theoretical Computer Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Improved adaptive genetic algorithm for the vehicle Insurance Fraud Identification Model based on a BP Neural Network49
Efficient card-based zero-knowledge proof for Sudoku45
Theory versus practice in annealing-based quantum computing39
How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition26
Arbitrary pattern formation on infinite grid by asynchronous oblivious robots25
Optimizing hybrid metaheuristic algorithm with cluster head to improve performance metrics on the IoT25
Structure connectivity and substructure connectivity of the crossed cube25
A fully distributed hierarchical attribute-based encryption scheme24
Fault-tolerant metric dimension of circulant graphs C(1,2,3)24
An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs24
Maximum Nash welfare and other stories about EFX23
Cell-like P systems with polarizations and minimal rules23
kNN-P: A kNN classifier optimized by P systems23
Physical zero-knowledge proof for Ripple Effect22
Relationship between extra edge connectivity and component edge connectivity for regular graphs21
When hypermutations and ageing enable artificial immune systems to outperform evolutionary algorithms21
Identity-based encryption with equality test and datestamp-based authorization mechanism20
Structure connectivity and substructure connectivity of wheel networks19
Multiple birds with one stone: Beating 1/2 for EFX and GMMS via envy cycle elimination19
Spiking neural P systems with target indications19
Almost envy-freeness in group resource allocation19
Card-based protocols for secure ranking computations19
Community-based rumor blocking maximization in social networks: Algorithms and analysis18
Deep learning and natural language processing in computation for offensive language detection in online social networks by feature selection and ensemble classification techniques17
Securely computing the n-variable equality function with 2n cards17
Fault diagnosability of Bicube networks under the PMC diagnostic model16
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing16
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model16
Arbitrary pattern formation by asynchronous opaque robots with lights16
The component (edge) connectivity of shuffle-cubes15
Fault-tolerant complete visibility for asynchronous robots with lights under one-axis agreement15
Quality gain analysis of the weighted recombination evolution strategy on general convex quadratic functions15
Reliability analysis of subsystem in dual cubes15
From mathematical equivalence such as Ma equivalence to generalized Zhang equivalency including gradient equivalency14
On cherry-picking and network containment14
A new proof for exact relationship between extra connectivity and extra diagnosability of regular connected graphs under MM* model14
Multicarrier continuous-variable quantum key distribution14
Beyond pointwise submodularity: Non-monotone adaptive submodular maximization in linear time14
Lower bounds on the run time of the Univariate Marginal Distribution Algorithm on OneMax14
A proof system for disjoint parallel quantum programs13
A Secure Energy Aware Meta-Heuristic Routing Protocol (SEAMHR) for sustainable IoT-Wireless Sensor Network (WSN)13
Enumeration of subtrees and BC-subtrees with maximum degree no more than k in trees13
An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection13
Restricted connectivity and good-neighbor diagnosability of split-star networks13
The h-restricted connectivity of the generalized hypercubes12
Embedded connectivity of ternary n-cubes12
Design and analysis of diversity-based parent selection schemes for speeding up evolutionary multi-objective optimisation12
Approximation algorithms for the minimum power cover problem with submodular/linear penalties12
Dynamical behavior of additive cellular automata over finite abelian groups11
Facility location games with optional preference11
Rumor correction maximization problem in social networks11
On the performance of learned data structures11
A combinatorial view on string attractors11
Byzantine-tolerant causal broadcast11
A code-based signature scheme from the Lyubashevsky framework11
Minimum power partial multi-cover on a line11
Component conditional fault tolerance of hierarchical folded cubic networks11
Analysis of the (1 + 1) EA on subclasses of linear functions under uniform and linear constraints11
Revocable identity-based encryption with server-aided ciphertext evolution11
Improved lower bounds for the radio number of trees11
DESN: An unsupervised MR image denoising network with deep image prior11
Gathering Anonymous, Oblivious Robots on a Grid11
Structure fault tolerance of balanced hypercubes11
Optimizing flight trajectory of UAV for efficient data collection in wireless sensor networks10
Hardness results for three kinds of colored connections of graphs10
The reliability analysis of k-ary n-cube networks10
Edge-fault-tolerant strong Menger edge connectivity on regular graphs10
Structure and substructure connectivity of divide-and-swap cube10
Connectivity and super connectivity of the divide-and-swap cube10
Pushing lines helps: Efficient universal centralised transformations for programmable matter10
A constrained two-stage submodular maximization10
Dynamic maintenance case base using knowledge discovery techniques for case based reasoning systems10
Causality analysis and fault ascription in component-based systems10
A note of vertex arboricity of planar graphs without 4-cycles intersecting with 6-cycles10
Gathering robots in graphs: The central role of synchronicity10
Measuring diversity in heterogeneous information networks9
Attribute-based proxy re-encryption from standard lattices9
Conditional diagnosability of Cayley graphs generated by wheel graphs under the PMC model9
An approximation algorithm for General Energy Restricted Sweep Coverage problem9
Quantum algorithm for the multicollision problem9
Constructing dual-CISTs of folded divide-and-swap cubes9
Multistage graph problems on a global budget9
The 4-set tree connectivity of (n,k)-star networks9
Super fault-tolerance assessment of locally twisted cubes based on the structure connectivity9
Speeding up the AIFV-2 dynamic programs by two orders of magnitude using Range Minimum Queries9
Energy efficiency optimization for multiple chargers in Wireless Rechargeable Sensor Networks9
Exponential slowdown for larger populations: The (μ + 1)-EA on monotone functions9
Investigation of E-voting system using face recognition using convolutional neural network (CNN)8
Constrained synchronization and commutativity8
Makespan minimization on unrelated parallel machines with a few bags8
Complexity of modification problems for best match graphs8
Fast algorithms for single and multiple pattern Cartesian tree matching8
influence: A partizan scoring game on graphs8
Recognizing the tractability in big data computing8
Solving hard stable matching problems involving groups of similar agents8
Generalised information systems capture L-domains8
Maximize a monotone function with a generic submodularity ratio8
Running time analysis of the (1+1)-EA for robust linear optimization8
A simplified run time analysis of the univariate marginal distribution algorithm on LeadingOnes8
The complexity of dependency detection and discovery in relational databases8
Calibration scheduling with time slot cost8
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents8
NextPriorityConcept: A new and generic algorithm computing concepts from complex and heterogeneous data8
k-Critical graphs in P5-free graphs8
Small SNQ P Systems with multiple types of spikes8
Time-free cell-like P systems with multiple promoters/inhibitors8
Reliability and hybrid diagnosis of exchanged hypercube8
The generalized 3-connectivity of two kinds of regular networks8
On the g-extra diagnosability of enhanced hypercubes7
Local certification of graphs on surfaces7
Cryptanalysis of the RSA variant based on cubic Pell equation7
Stable matching with uncertain pairwise preferences7
An improved ranking methodology for malignant carcinoma in multicriterian decision making using hesitant VIKOR fuzzy7
The t/s-diagnosability and t/s-diagnosis algorithm of folded hypercube under the PMC/MM* model7
Blocking total dominating sets via edge contractions7
Joint realizability of monotone Boolean functions7
Group sweep coverage with guaranteed approximation ratio7
Eccentricity function in distance-hereditary graphs7
Efficient scheduling of a mobile charger in large-scale sensor networks7
Delivery Route Optimization with automated vehicle in smart urban environment7
Speech enhancement with noise estimation and filtration using deep learning models7
Bicriteria algorithms to balance coverage and cost in team formation under online model7
A logical and graphical framework for reaction systems7
M UFLP: Universal facility location problem in the p-th power of metric space7
Chronic obstructive pulmonary disease prediction using Internet of things-spiro system and fuzzy-based quantum neural network classifier7
Subversion-resilient signatures: Definitions, constructions and applications7
On a simple hard variant of Not-All-Equal 3-Sat7
Generalized abstraction-refinement for game-based CTL lifted model checking7
Novel algorithms for maximum DS decomposition7
On scheduling multiple two-stage flowshops7
Note on R-conditional diagnosability of hypercube7
Fixed-parameter tractable algorithms for Tracking Shortest Paths6
Stagnation detection meets fast mutation6
The vertex-pancyclicity of data center networks6
Robust biomolecular finite automata6
Control languages accepted by labeled spiking neural P systems with rules on synapses6
Representable Markov categories and comparison of statistical experiments in categorical probability6
Exploring the gap between treedepth and vertex cover through vertex integrity6
Analysis on methods to effectively improve transfer learning performance6
Identity-based authenticated encryption with identity confidentiality6
Absolutely no free lunches!6
Puncturable identity-based and attribute-based encryption from lattices6
Physarum-inspired multi-commodity flow dynamics6
A study on the effects of normalized TSP features for automated algorithm selection6
A decision procedure and complete axiomatization for projection temporal logic6
An incentive compatible, efficient market for air traffic flow management6
Maximum star deleted from Ramsey graphs of book and tree6
Diagnosability for two families of composition networks6
Model independent approach to probabilistic models6
Polynomial kernels for hitting forbidden minors under structural parameterizations6
On the complexity of solution extension of optimization problems6
The unpaired many-to-many k-disjoint paths in bipartite hypercube-like networks6
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting6
On the steady state analysis of covariance matrix self-adaptation evolution strategies on the noisy ellipsoid model6
Survivability development of wireless sensor networks using neuro fuzzy-clonal selection optimization6
Computing longest palindromic substring after single-character or block-wise edits6
Embedding algorithm of spined cube into grid structure and its wirelength computation6
Exponential upper bounds for the runtime of randomized search heuristics6
Disjoint paths and connected subgraphs for H-free graphs6
Exact algorithms for the repetition-bounded longest common subsequence problem6
The impact of lexicographic parsimony pressure for ORDER/MAJORITY on the run time6
Universal product learning with errors: A new variant of LWE for lattice-based cryptography6
Tightly secure inner product functional encryption: Multi-input and function-hiding constructions6
On approximation algorithm for the edge metric dimension problem6
Tight security for the generic construction of identity-based signature (in the multi-instance setting)6
Interaction-aware influence maximization and iterated sandwich method6
New results for the k-secretary problem6
Reallocating multiple facilities on the line6
Sequential reprogramming of biological network fate6
How majority-vote crossover and estimation-of-distribution algorithms cope with fitness valleys6
A new quantum random number generator certified by value indefiniteness6
Rewriting theory for the life sciences: A unifying theory of CTMC semantics6
Encoding Boolean networks into reaction systems for investigating causal dependencies in gene regulation6
Modelling of oppositional Aquila Optimizer with machine learning enabled secure access control in Internet of drones environment6
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation6
Two-way and one-way quantum and classical automata with advice for online minimization problems6
Matching influence maximization in social networks6
Multiple facility location games with envy ratio6
The component connectivity, component diagnosability, and t/k-diagnosability of Bicube networks6
Arbitrary pattern formation on infinite regular tessellation graphs6
On dispersable book embeddings6
A hierarchy of local decision6
Being a permutation is also orthogonal to one-wayness in quantum world: Impossibilities of quantum one-way permutations from one-wayness primitives6
Visualizing co-phylogenetic reconciliations5
Complexity and approximability of the happy set problem5
Divide-and-conquer based all spanning tree generation algorithm of a simple connected graph5
Optimal radio labellings of block graphs and line graphs of trees5
Improved bi-criteria approximation schemes for load balancing on unrelated machines with cost constraints5
A topological perspective on distributed network algorithms5
On modification of Boyer-Moore-horspool's algorithm for tree pattern matching in linearised trees5
Identity-based encryption with security against the KGC: A formal model and its instantiations5
Subnetwork reliability analysis of bubble-sort graph networks5
Recognizing DAGs with page-number 2 is NP-complete5
Variety of mutual-visibility problems in graphs5
k-Circle formation by disoriented asynchronous robots5
On RAC drawings of graphs with one bend per edge5
Constructing dual-CISTs with short diameters using a generic adjustment scheme on bicubes5
Hybrid fault-tolerant prescribed hyper-hamiltonian laceability of hypercubes5
The R-conditional diagnosability of international networks5
Uncertainty representation in dynamical systems using rough set theory5
New bounds for energy complexity of Boolean functions5
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions5
Optimal dispersion on an anonymous ring in the presence of weak Byzantine robots5
Modified Schelling games5
On fan-crossing graphs5
Unified graphical co-modeling, analysis and verification of cyber-physical systems by combining AADL and Simulink/Stateflow5
How to compute digraph width measures on directed co-graphs5
Approximation algorithms for spherical k-means problem using local search scheme5
On parameterized algorithms for fixed-order book thickness with respect to the pathwidth of the vertex ordering5
A trusted effective approach for forecasting the failure of data link and intrusion in wireless sensor networks5
Computing a longest common almost-increasing subsequence of two sequences5
Towards more efficient methods for solving regular-expression heavy string constraints5
A fixed point theorem in rough semi-linear uniform spaces5
On the longest common prefix of suffixes in an inverse Lyndon factorization and other properties5
Information coverage maximization for multiple products in social networks5
Concentration of rainbow k-connectivity of a multiplex random graph5
Monotone k-submodular secretary problems: Cardinality and knapsack constraints5
Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms5
On coresets for support vector machines5
Connectivity and constructive algorithms of disjoint paths in dragonfly networks5
Power, positive closure, and quotients on convex languages5
Model checking QCTL plus on quantum Markov chains5
Computing a metric basis of a bipartite distance-hereditary graph5
Parameterized algorithms and kernels for almost induced matching5
Destructiveness of lexicographic parsimony pressure and alleviation by a concatenation crossover in genetic programming5
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification5
Satisfiability threshold for power law random 2-SAT in configuration model5
Operator precedence temporal logic and model checking5
Differential logical relations, part II increments and derivatives5
Efficient revocable identity-based encryption with short public parameters5
Convergence of the non-uniform directed Physarum model5
Spectral concepts in genome informational analysis5
Alternation in two-way finite automata5
Reversible computing from a programming language perspective5
Online presentations of finitely generated structures5
Injective coloring of planar graphs5
Tight FPT approximation for constrained k-center and k-supplier5
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations5
Complexity assessments for decidable fragments of set theory. II: A taxonomy for ‘small’ languages involving membership5
Simultaneous FPQ-ordering and hybrid planarity testing5
Faster balanced clusterings in high dimension5
Kindergarden quantum mechanics graduates ...or how I learned to stop gluing LEGO together and love the ZX-calculus5
Tracking routes in communication networks5
Efficient decision procedure for propositional projection temporal logic5
Multi-attribute based influence maximization in social networks: Algorithms and analysis5
Convergence of the non-uniform Physarum dynamics5
The diagnosability of Möbius cubes for the g-extra condition5
PSPACE-completeness of two graph coloring games5
Cryptographic reverse firewalls for interactive proof systems5
Online parameterized dictionary matching with one gap5
0.039064168930054