Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Periodic watermarking for copyright protection of large language models in cloud computing security130
A heuristic design toolkit for web conferencing software based on self-determination theory110
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing99
Editorial Board92
Lattice-based dynamic decentralized anonymous credential scheme supporting batch verification71
Sharing as You Desire: A fuzzy certificateless proxy re-encryption scheme for efficient and privacy-preserving cloud data sharing70
MExpm: Fair computation offloading for batch modular exponentiation with improved privacy and checkability in IoV65
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester63
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping60
Over-threshold multi-party private set operation protocols for lightweight clients58
Practical reusable garbled circuits with parallel updates55
Evaluating large language models for software testing50
Fuzzy Password Authentication Key Exchange protocol in universal composable framework for blockchain privacy protection46
Patient-centric medical service matching with fine-grained access control and dynamic user management40
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates38
Provably secure multi-signature scheme based on the standard SM2 signature scheme37
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet36
Construction of a high-precision general geographical location words dataset36
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network35
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size34
Towards projection of the individualised risk assessment for the cybersecurity workforce34
An effective image annotation using self-attention based stacked bidirectional capsule network31
FGPB-EMR: Fine-grained privacy blockchain for electronic medical record sharing30
Key-aggregate based access control encryption for flexible cloud data sharing30
AdaTraj-DP: An adaptive privacy framework for context-aware trajectory data publishing30
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system30
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud29
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology29
Round efficient privacy-preserving federated learning based on MKFHE27
An autonomous deep reinforcement learning-based approach for memory configuration in serverless computing26
Traceable signatures from lattices26
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures26
Prototype, method, and experiment for evaluating usability of smart home user interfaces26
Can LLMs revolutionize text mining in chemistry? A comparative study with domain-specific tools25
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm24
Logarithmic identity-based ring signature over lattices and linkable variant24
Securing social platform from misinformation using deep learning24
Designing usability/user experience heuristics to evaluate e-assessments administered to children24
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co24
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities23
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks23
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption22
Advanced Electronic Signatures and eIDAS – Analysis of the Concept22
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing21
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks21
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse21
Optimal shard number determination algorithm based on security and performance in sharded blockchain20
ScaFedCrowd: A secure cross-system anonymous authentication and privacy-preserving task recommendation scheme for federated crowdsourcing20
Information technologies exposing children to privacy risks: Domains and children-specific technical controls20
Securing Wireless Body Area Network with lightweight certificateless signcryption scheme using equality test20
HT20
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR19
Multiuser data integrity auditing atop blockchain with secure user revocation for cognitive IoT networks19
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property19
Online/offline remote data auditing with strong key-exposure resilience for cloud storage18
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage18
Exploring users’ switching intention and behavior on social networking sites: Linear and nonlinear perspectives17
Can a conventional email phishing nudge help fight SMiShing attacks?17
State of the art of Agile User Experience: Challenges and solution approaches17
Testability-driven development: An improvement to the TDD efficiency17
Towards a new standard for network access authentication: EAP-EDHOC17
SiamIDS: A novel cloud-centric Siamese Bi-LSTM framework for interpretable intrusion detection in large-scale IoT networks17
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare16
Certificate-based proxy signature scheme with revocation for Industrial Internet of Things16
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms16
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques16
Large language models for code completion: A systematic literature review15
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior14
An analysis model for detecting misbehaviors in anonymous cryptocurrency14
Breaking cross-domain model protection via surrogate-guided unsupervised distribution transformation13
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption13
Designing novel proxy-based access control scheme for implantable medical devices13
Fields of the future: Digital transformation in smart agriculture with large language models and generative AI13
Proofs of retrievability with tag outsourcing based on Goppa codes13
Computing performance requirements for web service compositions13
Create your own MUSE: A method for updating security level evaluation instruments13
Difference-based firefly programming for symbolic regression problems13
Time-controlled proxy searchable re-encryption against collusion attacks12
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach12
A Dynamic Multimodal Causal Graph framework for standardized Emotion Recognition in Conversations12
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm12
Full black-box retrievable and accountable identity-based encryption11
A parallel programming assessment for stream processing applications on multi-core systems11
Enhanced YOLOv8 model for accurate and real-time remote sensing target detection11
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks11
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry11
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction11
FedSam: Enhancing federated learning accuracy with differential privacy and data heterogeneity mitigation11
Privacy-preserving compromised credential checking protocol for account protection11
Inner product encryption from Middle-Product Learning With Errors11
Collaboration with Generative AI to improve Requirements Change11
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare11
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient10
New tag-based signatures and their applications on linearly homomorphic signatures10
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics10
A critical analysis of Zero Trust Architecture (ZTA)10
Efficient dynamic multi-client searchable encryption supporting fuzzy search10
Cryptanalysis of an additively homomorphic public key encryption scheme10
Pypen: Code instrumentation tool for dynamic analysis and energy efficiency evaluation10
Enhancing security, privacy, and usability in social robots: A software development framework10
Abuse-resistant deniable encryption10
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment10
A hybrid search and model-based approach for testing the self-adaptive unmanned aircraft system software9
A robust analysis of adversarial attacks on federated learning environments9
MRAN: Multimodal relationship-aware attention network for fake news detection9
Publicly verifiable secret sharing: Generic constructions and lattice-based instantiations in the standard model9
A hybrid coot based CNN model for thyroid cancer detection9
Determining a core view of research quality in empirical software engineering9
Efficient encrypted conjunctive search with volume and result pattern leakage resistance9
Using a process algebra interface for verification and validation of UML statecharts9
Blockchain-based verifiable privacy-preserving data classification protocol for medical data9
0.078328847885132