Frontiers of Computer Science

Papers
(The median citation count of Frontiers of Computer Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
RS-store: RDMA-enabled skiplist-based key-value store for efficient range query264
Automated detection on the security of the linked-list operations80
Semantic and secure search over encrypted outsourcing cloud based on BERT78
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing74
Sub-Nyquist sampling-based wideband spectrum sensing: a compressed power spectrum estimation approach66
Model-based diagnosis with low-cost fault identification51
Towards practical data alignment in production federated learning50
Structure attack on full-round DBST32
cKBET: assessing goodness of batch effect correction for single-cell RNA-seq32
Few-shot node classification via local adaptive discriminant structure learning31
An algorithm for solving satisfiability problem based on the structural information of formulas31
Compressed page walk cache31
Top Pass: improve code generation by pass@k-maximized code ranking31
How graph convolutions amplify popularity bias for recommendation?30
Communication-robust multi-agent learning by adaptable auxiliary multi-agent adversary generation28
Self-corrected unsupervised domain adaptation27
Exploiting comments information to improve legal public opinion news abstractive summarization26
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor25
Pusher: an augmented fuzzer based on the connection between input and comparison operand24
Revenue-maximizing online stable task assignment on taxi-dispatching platforms24
ReCSA: a dedicated sort accelerator using ReRAM-based content addressable memory24
Informative and diverse emotional conversation generation with variational recurrent pointer-generator24
Protein acetylation sites with complex-valued polynomial model23
A comprehensive survey on graph neural network accelerators23
Advanced persistent threat detection via mining long-term features in provenance graphs22
Identifying useful learnwares via learnable specification21
An efficient atomic cross-chain commitment resisting fork fraud21
A lock-free approach to parallelizing personalized PageRank computations on GPU21
Minimizing the cost of periodically replicated systems via model and quantitative analysis21
Debiasing vision-language models for vision tasks: a survey20
Full friendly index sets of mCn20
Tool learning with large language models: a survey19
ResLNet: deep residual LSTM network with longer input for action recognition19
Fixed-parameter tractability of capacitated k-facility location18
I know I don’t know: an evidential deep learning framework for traffic classification17
Adaptive watermark generation mechanism based on time series prediction for stream processing16
Graph convolution machine for context-aware recommender system16
GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding15
A data representation method using distance correlation15
Incentive mechanism design via smart contract in blockchain-based edge-assisted crowdsensing15
The governance technology for blockchain systems: a survey15
Rumor detection with self-supervised learning on texts and social graph15
VenomAttack: automated and adaptive activity hijacking in Android15
Relation Reconstructive Binarization of word embeddings14
Representation learning via an integrated autoencoder for unsupervised domain adaptation14
Underwater image enhancement by maximum-likelihood based adaptive color correction and robust scattering removal14
SCG-tree: shortcut enhanced graph hierarchy tree for efficient spatial queries on massive road networks14
Human-machine interactive streaming anomaly detection by online self-adaptive forest14
E2CNN: entity-type-enriched cascaded neural network for Chinese financial relation extraction14
Label distribution similarity-based noise correction for crowdsourcing14
Person video alignment with human pose registration13
Inertial projection neural network for nonconvex sparse signal recovery with prior information12
Research on key technologies of edge cache in virtual data space across WAN12
K-ary search tree revisited: improving construction and intersection efficiency12
A multi-projection recurrent model for hypernym detection and discovery12
Energy inefficiency diagnosis for Android applications: a literature review12
Follow the perturbed approximate leader for solving semi-bandit combinatorial optimization12
Group control for procedural rules: parameterized complexity and consecutive domains12
Teachers cooperation: team-knowledge distillation for multiple cross-domain few-shot learning12
On the exact quantum query complexity of MOD and EXACT functions12
Robust AUC maximization for classification with pairwise confidence comparisons12
Sub-Nyquist spectrum sensing and learning challenge11
Towards better entity linking11
TransRec++: Translation-based sequential recommendation with heterogeneous feedback11
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer11
Spreadsheet quality assurance: a literature review11
CAD-NeRF: learning NeRFs from uncalibrated few-view images by CAD model retrieval11
Towards kernelizing the classifier for hyperbolic data10
Model-based automated testing of JavaScript Web applications via longer test sequences10
Integrating element correlation with prompt-based spatial relation extraction10
GaussDB-AISQL: a composable cloud-native SQL system with AI capabilities10
Incorporating contextual evidence to improve implicit discourse relation recognition in Chinese10
RVAM16: a low-cost multiple-ISA processor based on RISC-V and ARM Thumb10
A Monte Carlo Neural Fictitious Self-Play approach to approximate Nash Equilibrium in imperfect-information dynamic games10
Visibility restoration for real-world hazy images via improved physical model and Gaussian total variation10
Multi-constraint reinforcement learning in complex robot environments9
Exploiting user behavior learning for personalized trajectory recommendations9
MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy9
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs9
A framework combines supervised learning and dense subgraphs discovery to predict protein complexes9
Factor-wise disentangled contrastive learning for cross-domain few-shot molecular property prediction9
BA-GNN: Behavior-aware graph neural network for session-based recommendation9
On the hardness of NTRU problems9
A user requirements-oriented privacy policy self-adaption scheme in cloud computing9
ncRNA2MetS v2.0: a manually curated database for metabolic syndrome-associated ncRNAs9
Labeling-based centrality approaches for identifying critical edges on temporal graphs8
Referring image segmentation with attention guided cross modal fusion for semantic oriented languages8
VSAN: A new visualization method for super-large-scale academic networks8
Graph-Segmenter: graph transformer with boundary-aware attention for semantic segmentation8
Learning multi-tasks with inconsistent labels by using auxiliary big task8
A quality status encoding scheme for PCB-based products in IoT-enabled remanufacturing8
Variant quantifiers in L3-valued first-order logic8
SCARE and power attack on AES-like block ciphers with secret S-box8
Generating empathetic responses through emotion tracking and constraint guidance8
Unsupervised spectral feature selection algorithms for high dimensional data8
Exploring associations between streetscape factors and crime behaviors using Google Street View images8
Single image super-resolution: a comprehensive review and recent insight8
Performance analysis of ASR system in hybrid DNN-HMM framework using a PWL euclidean activation function8
Exact satisfiability and phase transition analysis of the regular (k, d)-CNF formula8
Accelerating temporal action proposal generation via high performance computing8
SR-AFU: super-resolution network using adaptive frequency component upsampling and multi-resolution features8
D-Cubicle: boosting data transfer dynamically for large-scale analytical queries in single-GPU systems8
Kronos: towards bus contention-aware job scheduling in warehouse scale computers8
An approach for detecting LDoS attack based on cloud model8
Multi-user reinforcement learning based task migration in mobile edge computing7
A comprehensive study on fault tolerance in stream processing systems7
Index-free triangle-based graph local clustering7
ForkXplorer: an approach of fork summary generation7
Adaptive network combination for single-image reflection removal: a domain generalization perspective7
Foundation model enhanced derivative-free cognitive diagnosis7
An efficient graph data compression model based on the germ quotient set structure7
Exploiting blockchain for dependable services in zero-trust vehicular networks7
On the upper bounds of (1,0)-super solutions for the regular balanced random (k,2s)-SAT problem7
Multi-key FHE without ciphertext-expansion in two-server model7
ICCG: low-cost and efficient consistency with adaptive synchronization for metadata replication7
Announcement of the 2024 FCS Paper Awards7
A survey of dynamic graph neural networks7
Attribute augmentation-based label integration for crowdsourcing7
ISM: intra-class similarity mixing for time series augmentation7
Local feature aggregation algorithm based on graph convolutional network7
A graph-based contrastive learning framework for medicare insurance fraud detection7
Learning group interaction for sports video understanding from a perspective of athlete6
Linkable and traceable anonymous authentication with fine-grained access control6
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT6
Joint fuzzy background and adaptive foreground model for moving target detection6
Dynamic traveling time forecasting based on spatial-temporal graph convolutional networks6
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs6
Quantifying predictability of sequential recommendation via logical constraints6
Certificateless network coding proxy signatures from lattice6
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis6
Super solutions of the model RB6
Large language models make sample-efficient recommender systems6
Accelerating constraint-based neural network repairs by example prioritization and selection6
Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit6
Fully distributed identity-based threshold signatures with identifiable aborts6
An effective fault localization approach for Verilog based on enhanced contexts6
Foundation models for topic modeling: a case study6
SSA: semantic structure aware inference on CNN networks for weakly pixel-wise dense predictions without cost6
Differential privacy histogram publishing method based on dynamic sliding window5
CRD-CGAN: category-consistent and relativistic constraints for diverse text-to-image generation5
A comprehensive survey of federated transfer learning: challenges, methods and applications5
Efficient multi-scale community search method based on spectral graph wavelet5
Further study on indecomposable cryptographic functions5
Dynamic-EC: an efficient dynamic erasure coding method for permissioned blockchain systems5
Generalized splitting-ring number theoretic transform5
Interpretation with baseline shapley value for feature groups on tree models5
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform5
Spatio-temporal keyword query in semantic trajectories5
Wi-Fi based non-invasive detection of indoor wandering using LSTM model5
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication5
Accelerating the cryo-EM structure determination in RELION on GPU cluster5
On the use of formal methods to model and verify neuronal archetypes5
Improved differential-neural cryptanalysis for round-reduced SIMECK32/645
Clustered Reinforcement Learning5
Delegable zk-SNARKs with proxies5
piEnPred: a bi-layered discriminative model for enhancers and their subtypes via novel cascade multi-level subset feature selection algorithm5
A hybrid memory architecture supporting fine-grained data migration5
Siamese single object tracking algorithm with natural language prior5
Endowing rotation invariance for 3D finger shape and vein verification5
ARCosmetics: a real-time augmented reality cosmetics try-on system5
Disk based pay-as-you-go record linkage5
Learning from shortcut: a shortcut-guided approach for explainable graph learning5
Combating with extremely noisy samples in weakly supervised slot filling for automatic diagnosis5
Domain-specific feature elimination: multi-source domain adaptation for image classification5
Exploring the tidal effect of urban business district with large-scale human mobility data5
The future of cognitive strategy-enhanced persuasive dialogue agents: new perspectives and trends5
Improvement on a batch authenticated key agreement scheme5
Return just your search: privacy-preserving homoglyph search for arbitrary languages5
Precise control of page cache for containers5
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack5
Graph neural networks for financial fraud detection: a review5
Experience report: investigating bug fixes in machine learning frameworks/libraries5
Monotonicity and nonmonotonicity in L3-valued propositional logic5
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals4
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme4
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice4
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network4
New logarithmic step size for stochastic gradient descent4
THS-GWNN: a deep learning framework for temporal network link prediction4
BI-TE: achieving GNN-based bandwidth indistinguishable traffic engineering in multi-domain SDN4
Label distribution learning for scene text detection4
ROS package search for robot software development: a knowledge graph-based approach4
Automated GUI widgets classification4
FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack4
A network integrated performance evaluation method based on multi-attribute decisions of topology and traffic4
Data fusing and joint training for learning with noisy labels4
Cryptanalysis of DBST, a lightweight block cipher4
Expanding the sequence spaces of synthetic binding protein using deep learning-based framework ProteinMPNN4
Mean estimation over numeric data with personalized local differential privacy4
A novel dense retrieval framework for long document retrieval4
ABLkit: a Python toolkit for abductive learning4
Mask guided diverse face image synthesis4
Robust load-balanced backbone-based multicast routing in mobile opportunistic networks4
Collecting and analyzing key-value data under shuffled differential privacy4
Provable secure authentication key agreement for wireless body area networks4
circ2CBA: prediction of circRNA-RBP binding sites combining deep learning and attention mechanism4
IP2vec: an IP node representation model for IP geolocation4
An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network4
IXT: Improved searchable encryption for multi-word queries based on PSI4
EduStudio: towards a unified library for student cognitive modeling4
Accelerating local SGD for non-IID data using variance reduction4
BIC-based node order learning for improving Bayesian network structure learning4
Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy4
A survey on EOSIO systems security: vulnerability, attack, and mitigation4
Metric learning for domain adversarial network4
SEOE: an option graph based semantically embedding method for prenatal depression detection4
Robust and semantic-faithful post-hoc watermarking of text generated by black-box language models4
MAML2: meta reinforcement learning via meta-learning for task categories4
Shape-intensity knowledge distillation for robust medical image segmentation4
A subgraph matching algorithm based on subgraph index for knowledge graph4
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation3
A review on multi-view learning3
A MLP-Mixer and mixture of expert model for remaining useful life prediction of lithium-ion batteries3
Decoupled deep hough voting for point cloud registration3
A two-level meta-heuristic approach for the minimum dominating tree problem3
ProSyno: context-free prompt learning for synonym discovery3
Defense against local model poisoning attacks to byzantine-robust federated learning3
The most tenuous group query3
A search-based identification of variable microservices for enterprise SaaS3
Numerical evaluation on sub-Nyquist spectrum reconstruction methods3
Introducing on-chain graph data to consortium blockchain for commercial transactions3
MiTAR: a study on human activity recognition based on NLP with microscopic perspective3
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks3
Bidirectional Transformer with absolute-position aware relative position encoding for encoding sentences3
Offline model-based reinforcement learning with causal structured world models3
Graph foundation model3
A privacy-preserving group encryption scheme with identity exposure3
COURIER: contrastive user intention reconstruction for large-scale visual recommendation3
Accelerating BERT inference with GPU-efficient exit prediction3
SharpSMT: a scalable toolkit for measuring solution spaces of SMT(LA) formulas3
FragDPI: a novel drug-protein interaction prediction model based on fragment understanding and unified coding3
Dynamic depth-width optimization for capsule graph convolutional network3
A perspective on Petri Net learning3
DP-UserPro: differentially private user profile construction and publication3
Improving accuracy of automatic optical inspection with machine learning3
Implementing a sidechain-based asynchronous DPKI3
Line drawing via saliency map and ETF3
Cascade context-oriented spatio-temporal attention network for efficient and fine-grained video-grounded dialogues3
Pairwise tagging framework for end-to-end emotion-cause pair extraction3
Label distribution for multimodal machine learning3
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid3
A multi-stream network for retrosynthesis prediction3
PSLDA: a novel supervised pseudo document-based topic model for short texts3
Rich-text document styling restoration via reinforcement learning3
CompactChain: an efficient stateless chain for UTXO-model blockchain3
PyABV: a framework for enhancing PyRTL with assertion-based verification3
ACbot: an IIoT platform for industrial robots3
Community search over heterogeneous information networks via weighting strategy and query replacement3
Deep active sampling with self-supervised learning3
Distortion-free PCA on sample space for highly variable gene detection from single-cell RNA-seq data3
0.040776014328003