Computer Standards & Interfaces

Papers
(The median citation count of Computer Standards & Interfaces is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Validation of the UEQ+ Scales for Voice Quality102
The use of large language models for program repair100
DWTAT-DASIS: Fusion of discrete wavelet transform and access tree for distributed authentication in secret image sharing91
A preliminary conceptual structure for Computer-based Process Maturity Models, using a Cone-Based Conceptual Network and NIAM diagrams90
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach77
Maintainable verifiable data streaming based on redactable blockchain60
Towards the automatic restructuring of structural aesthetic design of Android user interfaces54
Difference-based firefly programming for symbolic regression problems54
Detection of web service anti-patterns using weighted extreme learning machine50
Computing performance requirements for web service compositions49
An analysis model for detecting misbehaviors in anonymous cryptocurrency48
Lattice based distributed threshold additive homomorphic encryption with application in federated learning46
Editorial Board46
A heuristic design toolkit for web conferencing software based on self-determination theory44
Adaptive optimized residual convolutional image annotation model with bionic feature selection model44
Hybrid collaborative filtering using matrix factorization and XGBoost for movie recommendation43
Practically secure linear-map vector commitment and its applications41
Editorial Board41
Performance analysis of handover management in 5G small cells40
Editorial Board40
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications38
Modelling web component quality using Delphi study35
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing33
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning31
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security31
Full black-box retrievable and accountable identity-based encryption30
Adversarial examples generated from sample subspace27
Create your own MUSE: A method for updating security level evaluation instruments27
Microservice based scalable IoT architecture for device interoperability26
Designing novel proxy-based access control scheme for implantable medical devices26
Fast intensive validation on blockchain with scale-out dispute resolution25
Delta GUI change detection using inferred models25
An extension of iStar for Machine Learning requirements by following the PRISE methodology25
Elliptic code-based oblivious polynomial evaluation25
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm24
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping24
Framework of standards, guides and methodologies for project, program, portfolio, and PMO management24
Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain24
Toward pre-standardization of reputation-based trust models beyond 5G23
Toward secure distributed data storage with error locating in blockchain enabled edge computing22
Designing secure and lightweight user access to drone for smart city surveillance22
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester22
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique21
A novel small-scale pedestrian detection method base on residual block group of CenterNet19
Proofs of retrievability with tag outsourcing based on Goppa codes18
Fields of the Future: Digital Transformation in Smart Agriculture with Large Language Models and Generative AI18
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network18
Agile governance practices by aligning CMMI V2.0 with portfolio SAFe 5.017
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption16
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications16
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment16
PSCBO: A provably secure consensus-based blockchain Oracle16
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy16
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses16
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction16
Evaluating large language models for software testing15
A family of standards for software and systems product lines15
Efficient private information retrievals for single-server based on verifiable homomorphic encryption15
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet15
Enhancing cloud-native DevSecOps: A Zero Trust approach for the financial sector15
Post-quantum secure ID-based encryption with equality test against insider attacks from isogeny15
Web service discovery: Rationale, challenges, and solution directions14
A BIPMU-based network security situation assessment method for wireless network14
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems14
A novel and efficient index based web service discovery approach13
Privacy-preserving compromised credential checking protocol for account protection13
Sahand 1.0: A new model for extracting information from source code in object-oriented projects13
Multi-type requirements traceability prediction by code data augmentation and fine-tuning MS-CodeBERT12
Practical reusable garbled circuits with parallel updates12
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry12
An Identity-Based Encryption with Equality Test scheme for healthcare social apps11
LightBlocks: A trusted lightweight signcryption and consensus scheme for industrial IoT ecosystems11
Detecting deviations in the code using architecture view-based drift analysis11
Over-threshold multi-party private set operation protocols for lightweight clients11
Construction of a high-precision general geographical location words dataset10
Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations10
Efficient public-key authenticated deniable encryption schemes10
Provably secure multi-signature scheme based on the standard SM2 signature scheme10
Demand response process assessment model: Development and case study assessment10
A lightweight finger multimodal recognition model based on detail optimization and perceptual compensation embedding10
Cryptanalysis of an additively homomorphic public key encryption scheme9
StopGuess: A framework for public-key authenticated encryption with keyword search9
Inner product encryption from Middle-Product Learning With Errors9
Compact and efficient KEMs over NTRU lattices9
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates9
A lightweight delegated private set intersection cardinality protocol9
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems9
Quantifying heuristic evaluation8
People 4.0 — A model for Human-in-the-Loop CPS-based systems8
LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems8
Authentication communication by using visualization cryptography for UAV networks8
Patient-centric medical service matching with fine-grained access control and dynamic user management8
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks8
Improving transferability of adversarial examples with powerful affine-shear transformation attack7
BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records7
Encrypted data inner product KNN secure query based on BALL-PB tree7
A parallel programming assessment for stream processing applications on multi-core systems7
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning7
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption7
Unveiling process insights from refactoring practices7
Local differential privacy and its applications: A comprehensive survey6
An ontology-based secure design framework for graph-based databases6
A process assessment model for big data analytics6
Abuse-resistant deniable encryption6
Certificateless ring signcryption for multi-source network coding6
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis6
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture6
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network6
A taxonomy of attack mechanisms in the automotive domain6
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus6
Energy aware fixed priority scheduling in mixed-criticality systems6
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare6
A new secure arrangement for privacy-preserving data collection6
Attribute-based proxy re-signature from standard lattices and its applications6
Pairing-free public-key authenticated encryption with keyword search6
Editorial Board5
Secure cloud file sharing scheme using blockchain and attribute-based encryption5
Editorial Board5
S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption5
Access network selection based on available bandwidth estimation for heterogeneous networks5
A blockchain-empowered crowdsourcing system for 5G-enabled smart cities5
A hybrid search and model-based approach for testing the self-adaptive unmanned aircraft system software5
Towards projection of the individualised risk assessment for the cybersecurity workforce5
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient5
Agile-CMMI V2.0 alignment: Bringing to light the agile artifacts pointed out by CMMI5
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system5
DOA tracking for seamless connectivity in beamformed IoT-based drones5
Efficient multi-party PSI and its application in port management5
Enhancing differential evolution with a target vector replacement strategy4
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology4
Enabling privacy and leakage resistance for dynamic blockchain-based access control systems4
Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems4
Lattice-based dynamic universal accumulator: Design and application4
Efficient dynamic multi-client searchable encryption supporting fuzzy search4
Public integrity auditing for dynamic group cooperation files with efficient user revocation4
Trusted data sharing with flexible access control based on blockchain4
Accountable outsourcing data storage atop blockchain4
Secure Transmission Lines Monitoring and Efficient Electricity Management in Ultra-Reliable Low Latency Industrial Internet of Things4
Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods4
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment4
A visual approach for identification and annotation of business process elements in process descriptions4
Integrating the manufacturer usage description standard in the modelling of cyber–physical systems4
Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systems3
Practical two-party SM2 signing using multiplicative-to-additive functionality3
Evaluating Incident Response in CSIRTs using Cube Socio-technical Systems Analysis3
Privacy-preserving COVID-19 contact tracing solution based on blockchain3
Hybrid unsupervised web-attack detection and classification – A deep learning approach3
GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism3
A consent-aware electronic medical records sharing method based on blockchain3
An effective image annotation using self-attention based stacked bidirectional capsule network3
A critical analysis of Zero Trust Architecture (ZTA)3
New tag-based signatures and their applications on linearly homomorphic signatures3
Lattice-based strong designated verifier signature with non-delegatability3
Blockchain-based cross-domain query integrity verification mechanism for outsourced database3
MRAN: Multimodal relationship-aware attention network for fake news detection3
Strategic IT alignment Projects. Towards Good Governance3
Mutual authentication scheme for smart devices in IoT-enabled smart home systems2
The MauMe network - A LoRa multi-hop collaborative protocol and low-cost implementation example2
Video image scaling technology based on adaptive interpolation algorithm and TTS FPGA implementation2
When deep learning meets watermarking: A survey of application, attacks and defenses2
A model-driven approach to adopt good practices for agile process configuration and certification2
Key-aggregate based access control encryption for flexible cloud data sharing2
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm2
Provable data deletion from efficient data integrity auditing and insertion in cloud storage2
A new modified Skew Tent Map and its application in pseudo-random number generator2
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption2
Round efficient privacy-preserving federated learning based on MKFHE2
Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming2
An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm2
Editorial Board2
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping2
A robust analysis of adversarial attacks on federated learning environments2
FFEC: Fast and forward-secure equivalence-based ciphertext comparability for multiple users in cloud environment2
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics2
Editorial Board2
Blockchain-based verifiable privacy-preserving data classification protocol for medical data2
Improving the scalability of a rating system for assessing safety of Internet of Toys2
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size2
Atmosphere: Context and situational-aware collaborative IoT architecture for edge-fog-cloud computing2
Editorial Board2
Securing social platform from misinformation using deep learning2
Revocable certificateless Provable Data Possession with identity privacy in cloud storage2
Editorial Board2
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud2
Editorial Board2
0.12121796607971