Computer Standards & Interfaces

Papers
(The H4-Index of Computer Standards & Interfaces is 30. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board106
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing98
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications86
Toward secure distributed data storage with error locating in blockchain enabled edge computing81
A heuristic design toolkit for web conferencing software based on self-determination theory74
Periodic watermarking for copyright protection of large language models in cloud computing security64
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester63
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping57
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network55
Provably secure multi-signature scheme based on the standard SM2 signature scheme54
Construction of a high-precision general geographical location words dataset54
Practical reusable garbled circuits with parallel updates50
Over-threshold multi-party private set operation protocols for lightweight clients50
Patient-centric medical service matching with fine-grained access control and dynamic user management49
Evaluating large language models for software testing48
Unveiling process insights from refactoring practices47
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates46
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture45
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet44
An effective image annotation using self-attention based stacked bidirectional capsule network43
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud40
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system40
Key-aggregate based access control encryption for flexible cloud data sharing34
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology33
Towards projection of the individualised risk assessment for the cybersecurity workforce33
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures32
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size32
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co31
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities31
Can LLMs revolutionize text mining in chemistry? A comparative study with domain-specific tools31
0.077250957489014