Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Validation of the UEQ+ Scales for Voice Quality102
The use of large language models for program repair100
DWTAT-DASIS: Fusion of discrete wavelet transform and access tree for distributed authentication in secret image sharing91
A preliminary conceptual structure for Computer-based Process Maturity Models, using a Cone-Based Conceptual Network and NIAM diagrams90
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach77
Maintainable verifiable data streaming based on redactable blockchain60
Difference-based firefly programming for symbolic regression problems54
Towards the automatic restructuring of structural aesthetic design of Android user interfaces54
Detection of web service anti-patterns using weighted extreme learning machine50
Computing performance requirements for web service compositions49
An analysis model for detecting misbehaviors in anonymous cryptocurrency48
Lattice based distributed threshold additive homomorphic encryption with application in federated learning46
Editorial Board46
A heuristic design toolkit for web conferencing software based on self-determination theory44
Adaptive optimized residual convolutional image annotation model with bionic feature selection model44
Hybrid collaborative filtering using matrix factorization and XGBoost for movie recommendation43
Practically secure linear-map vector commitment and its applications41
Editorial Board41
Performance analysis of handover management in 5G small cells40
Editorial Board40
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications38
Modelling web component quality using Delphi study35
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing33
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning31
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security31
Full black-box retrievable and accountable identity-based encryption30
Adversarial examples generated from sample subspace27
Create your own MUSE: A method for updating security level evaluation instruments27
Microservice based scalable IoT architecture for device interoperability26
Designing novel proxy-based access control scheme for implantable medical devices26
Elliptic code-based oblivious polynomial evaluation25
Fast intensive validation on blockchain with scale-out dispute resolution25
Delta GUI change detection using inferred models25
An extension of iStar for Machine Learning requirements by following the PRISE methodology25
Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain24
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm24
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping24
Framework of standards, guides and methodologies for project, program, portfolio, and PMO management24
Toward pre-standardization of reputation-based trust models beyond 5G23
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester22
Toward secure distributed data storage with error locating in blockchain enabled edge computing22
Designing secure and lightweight user access to drone for smart city surveillance22
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique21
A novel small-scale pedestrian detection method base on residual block group of CenterNet19
Proofs of retrievability with tag outsourcing based on Goppa codes18
Fields of the Future: Digital Transformation in Smart Agriculture with Large Language Models and Generative AI18
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network18
Agile governance practices by aligning CMMI V2.0 with portfolio SAFe 5.017
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption16
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications16
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment16
PSCBO: A provably secure consensus-based blockchain Oracle16
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy16
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses16
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction16
Evaluating large language models for software testing15
A family of standards for software and systems product lines15
Efficient private information retrievals for single-server based on verifiable homomorphic encryption15
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet15
Enhancing cloud-native DevSecOps: A Zero Trust approach for the financial sector15
Post-quantum secure ID-based encryption with equality test against insider attacks from isogeny15
Web service discovery: Rationale, challenges, and solution directions14
A BIPMU-based network security situation assessment method for wireless network14
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems14
Sahand 1.0: A new model for extracting information from source code in object-oriented projects13
A novel and efficient index based web service discovery approach13
Privacy-preserving compromised credential checking protocol for account protection13
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry12
Multi-type requirements traceability prediction by code data augmentation and fine-tuning MS-CodeBERT12
Practical reusable garbled circuits with parallel updates12
Over-threshold multi-party private set operation protocols for lightweight clients11
An Identity-Based Encryption with Equality Test scheme for healthcare social apps11
LightBlocks: A trusted lightweight signcryption and consensus scheme for industrial IoT ecosystems11
Detecting deviations in the code using architecture view-based drift analysis11
A lightweight finger multimodal recognition model based on detail optimization and perceptual compensation embedding10
Construction of a high-precision general geographical location words dataset10
Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations10
Efficient public-key authenticated deniable encryption schemes10
Provably secure multi-signature scheme based on the standard SM2 signature scheme10
Demand response process assessment model: Development and case study assessment10
Cryptanalysis of an additively homomorphic public key encryption scheme9
StopGuess: A framework for public-key authenticated encryption with keyword search9
Inner product encryption from Middle-Product Learning With Errors9
Compact and efficient KEMs over NTRU lattices9
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates9
A lightweight delegated private set intersection cardinality protocol9
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems9
LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems8
Authentication communication by using visualization cryptography for UAV networks8
Patient-centric medical service matching with fine-grained access control and dynamic user management8
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks8
Quantifying heuristic evaluation8
People 4.0 — A model for Human-in-the-Loop CPS-based systems8
0.049878120422363