Frontiers of Computer Science

Papers
(The median citation count of Frontiers of Computer Science is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
Few-shot node classification via local adaptive discriminant structure learning517
Towards practical data alignment in production federated learning94
Model-based diagnosis with low-cost fault identification92
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing90
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor82
Top Pass: improve code generation by pass@k-maximized code ranking57
Compressed page walk cache43
Structure attack on full-round DBST40
How graph convolutions amplify popularity bias for recommendation?39
Exploiting comments information to improve legal public opinion news abstractive summarization37
Sub-Nyquist sampling-based wideband spectrum sensing: a compressed power spectrum estimation approach37
Self-corrected unsupervised domain adaptation34
ReCSA: a dedicated sort accelerator using ReRAM-based content addressable memory34
Communication-robust multi-agent learning by adaptable auxiliary multi-agent adversary generation34
cKBET: assessing goodness of batch effect correction for single-cell RNA-seq32
Pusher: an augmented fuzzer based on the connection between input and comparison operand31
Identifying useful learnwares via learnable specification30
Full friendly index sets of mCn28
Debiasing vision-language models for vision tasks: a survey28
A comprehensive survey on graph neural network accelerators27
Trajectory prediction based on grouped spatial-temporal encoder26
Revenue-maximizing online stable task assignment on taxi-dispatching platforms24
Informative and diverse emotional conversation generation with variational recurrent pointer-generator24
Minimizing the cost of periodically replicated systems via model and quantitative analysis23
A lock-free approach to parallelizing personalized PageRank computations on GPU23
Incentive mechanism design via smart contract in blockchain-based edge-assisted crowdsensing22
Protein acetylation sites with complex-valued polynomial model22
ResLNet: deep residual LSTM network with longer input for action recognition22
Advanced persistent threat detection via mining long-term features in provenance graphs22
Tool learning with large language models: a survey22
An efficient atomic cross-chain commitment resisting fork fraud22
VenomAttack: automated and adaptive activity hijacking in Android20
Underwater image enhancement by maximum-likelihood based adaptive color correction and robust scattering removal20
Fixed-parameter tractability of capacitated k-facility location19
Inertial projection neural network for nonconvex sparse signal recovery with prior information19
SCG-tree: shortcut enhanced graph hierarchy tree for efficient spatial queries on massive road networks19
A data representation method using distance correlation19
Erratum to: Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit18
I know I don’t know: an evidential deep learning framework for traffic classification18
E2CNN: entity-type-enriched cascaded neural network for Chinese financial relation extraction18
Teachers cooperation: team-knowledge distillation for multiple cross-domain few-shot learning18
Graph convolution machine for context-aware recommender system17
Person video alignment with human pose registration17
The governance technology for blockchain systems: a survey17
Human-machine interactive streaming anomaly detection by online self-adaptive forest17
Representation learning via an integrated autoencoder for unsupervised domain adaptation17
Rumor detection with self-supervised learning on texts and social graph16
Bibliometric analysis of research talent evaluation in Chinese universities: data mining approach16
Energy inefficiency diagnosis for Android applications: a literature review15
K-ary search tree revisited: improving construction and intersection efficiency15
Group control for procedural rules: parameterized complexity and consecutive domains15
Towards better entity linking15
Label distribution similarity-based noise correction for crowdsourcing15
On the exact quantum query complexity of MOD and EXACT functions15
A multi-projection recurrent model for hypernym detection and discovery15
Research on key technologies of edge cache in virtual data space across WAN14
Integrating element correlation with prompt-based spatial relation extraction14
GaussDB-AISQL: a composable cloud-native SQL system with AI capabilities14
RVAM16: a low-cost multiple-ISA processor based on RISC-V and ARM Thumb14
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer14
Towards kernelizing the classifier for hyperbolic data13
CAD-NeRF: learning NeRFs from uncalibrated few-view images by CAD model retrieval13
Visibility restoration for real-world hazy images via improved physical model and Gaussian total variation13
Spreadsheet quality assurance: a literature review13
Incorporating contextual evidence to improve implicit discourse relation recognition in Chinese13
Robust AUC maximization for classification with pairwise confidence comparisons13
TransRec++: Translation-based sequential recommendation with heterogeneous feedback13
Single image super-resolution: a comprehensive review and recent insight12
Model-based automated testing of JavaScript Web applications via longer test sequences12
On the hardness of NTRU problems12
MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy12
ncRNA2MetS v2.0: a manually curated database for metabolic syndrome-associated ncRNAs12
A framework combines supervised learning and dense subgraphs discovery to predict protein complexes12
Multi-constraint reinforcement learning in complex robot environments12
Factor-wise disentangled contrastive learning for cross-domain few-shot molecular property prediction12
BA-GNN: Behavior-aware graph neural network for session-based recommendation11
An approach for detecting LDoS attack based on cloud model11
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs11
Exploiting user behavior learning for personalized trajectory recommendations11
Graph-Segmenter: graph transformer with boundary-aware attention for semantic segmentation11
Kronos: towards bus contention-aware job scheduling in warehouse scale computers11
Learning multi-tasks with inconsistent labels by using auxiliary big task11
A user requirements-oriented privacy policy self-adaption scheme in cloud computing11
D-Cubicle: boosting data transfer dynamically for large-scale analytical queries in single-GPU systems11
Generating empathetic responses through emotion tracking and constraint guidance10
Labeling-based centrality approaches for identifying critical edges on temporal graphs10
Accelerating temporal action proposal generation via high performance computing10
VSAN: A new visualization method for super-large-scale academic networks10
Referring image segmentation with attention guided cross modal fusion for semantic oriented languages10
Exact satisfiability and phase transition analysis of the regular (k, d)-CNF formula10
SR-AFU: super-resolution network using adaptive frequency component upsampling and multi-resolution features10
Exploring associations between streetscape factors and crime behaviors using Google Street View images10
Announcement of the 2024 FCS Paper Awards10
SCARE and power attack on AES-like block ciphers with secret S-box10
Unsupervised spectral feature selection algorithms for high dimensional data9
Exploiting blockchain for dependable services in zero-trust vehicular networks9
ForkXplorer: an approach of fork summary generation9
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT9
An efficient graph data compression model based on the germ quotient set structure9
Attribute augmentation-based label integration for crowdsourcing9
A graph-based contrastive learning framework for medicare insurance fraud detection9
Adaptive network combination for single-image reflection removal: a domain generalization perspective9
Index-free triangle-based graph local clustering9
Foundation model enhanced derivative-free cognitive diagnosis9
A survey of dynamic graph neural networks9
ISM: intra-class similarity mixing for time series augmentation9
ICCG: low-cost and efficient consistency with adaptive synchronization for metadata replication9
Multi-user reinforcement learning based task migration in mobile edge computing9
Joint fuzzy background and adaptive foreground model for moving target detection8
Multi-key FHE without ciphertext-expansion in two-server model8
On the upper bounds of (1,0)-super solutions for the regular balanced random (k,2s)-SAT problem8
SSA: semantic structure aware inference on CNN networks for weakly pixel-wise dense predictions without cost8
Accelerating the cryo-EM structure determination in RELION on GPU cluster8
ARCosmetics: a real-time augmented reality cosmetics try-on system8
Certificateless network coding proxy signatures from lattice8
Linkable and traceable anonymous authentication with fine-grained access control8
Foundation models for topic modeling: a case study8
Fully distributed identity-based threshold signatures with identifiable aborts8
Collective domain adversarial learning for unsupervised domain adaptation8
Super solutions of the model RB8
Accelerating constraint-based neural network repairs by example prioritization and selection8
Disk based pay-as-you-go record linkage8
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication8
Dynamic traveling time forecasting based on spatial-temporal graph convolutional networks8
VIS+AI: integrating visualization with artificial intelligence for efficient data analysis8
EMP3D: an emergency medical procedures 3D dataset with pose and shape8
An effective fault localization approach for Verilog based on enhanced contexts8
Genome-wide primer scan (GPS): a python package for a flexible, reliable and large-scale primer design toolkit8
Monotonicity and nonmonotonicity in L3-valued propositional logic8
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs8
Generalized splitting-ring number theoretic transform7
Differential privacy histogram publishing method based on dynamic sliding window7
CRD-CGAN: category-consistent and relativistic constraints for diverse text-to-image generation7
Large language models make sample-efficient recommender systems7
Graph neural networks for financial fraud detection: a review7
Dynamic-EC: an efficient dynamic erasure coding method for permissioned blockchain systems7
Combating with extremely noisy samples in weakly supervised slot filling for automatic diagnosis7
FedTop: a constraint-loosed federated learning aggregation method against poisoning attack7
Quantifying predictability of sequential recommendation via logical constraints7
Endowing rotation invariance for 3D finger shape and vein verification7
Learning from shortcut: a shortcut-guided approach for explainable graph learning7
A hybrid memory architecture supporting fine-grained data migration7
On the use of formal methods to model and verify neuronal archetypes7
Precise control of page cache for containers7
Learning group interaction for sports video understanding from a perspective of athlete7
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform7
EduStudio: towards a unified library for student cognitive modeling6
Exploring the tidal effect of urban business district with large-scale human mobility data6
The future of cognitive strategy-enhanced persuasive dialogue agents: new perspectives and trends6
Accelerating local SGD for non-IID data using variance reduction6
A network integrated performance evaluation method based on multi-attribute decisions of topology and traffic6
Aspect-level sentiment analysis based on semantic heterogeneous graph convolutional network6
Expanding the sequence spaces of synthetic binding protein using deep learning-based framework ProteinMPNN6
Domain-specific feature elimination: multi-source domain adaptation for image classification6
Delegable zk-SNARKs with proxies6
Further study on indecomposable cryptographic functions6
Efficient multi-scale community search method based on spectral graph wavelet6
IXT: Improved searchable encryption for multi-word queries based on PSI6
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme6
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals6
Cryptanalysis of DBST, a lightweight block cipher6
Interpretation with baseline shapley value for feature groups on tree models6
Clustered Reinforcement Learning6
A comprehensive survey of federated transfer learning: challenges, methods and applications6
Improved differential-neural cryptanalysis for round-reduced SIMECK32/646
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice6
Shape-intensity knowledge distillation for robust medical image segmentation6
IP2vec: an IP node representation model for IP geolocation6
PyABV: a framework for enhancing PyRTL with assertion-based verification5
CW-YOLO: joint learning for mask wearing detection in low-light conditions5
SEOE: an option graph based semantically embedding method for prenatal depression detection5
Label distribution learning for scene text detection5
Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy5
Data fusing and joint training for learning with noisy labels5
New logarithmic step size for stochastic gradient descent5
FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack5
Collecting and analyzing key-value data under shuffled differential privacy5
Introducing on-chain graph data to consortium blockchain for commercial transactions5
Bidirectional Transformer with absolute-position aware relative position encoding for encoding sentences5
Line drawing via saliency map and ETF5
Dynamic depth-width optimization for capsule graph convolutional network5
Deep active sampling with self-supervised learning5
MAML2: meta reinforcement learning via meta-learning for task categories5
A survey on EOSIO systems security: vulnerability, attack, and mitigation5
Robust and semantic-faithful post-hoc watermarking of text generated by black-box language models5
Automated GUI widgets classification5
Provable secure authentication key agreement for wireless body area networks5
circ2CBA: prediction of circRNA-RBP binding sites combining deep learning and attention mechanism5
Towards spatial computing: recent advances in multimodal natural interaction for Extended Reality headsets5
ACbot: an IIoT platform for industrial robots5
Cross-scene passive human activity recognition using commodity WiFi5
Numerical evaluation on sub-Nyquist spectrum reconstruction methods5
A feature-wise attention module based on the difference with surrounding features for convolutional neural networks5
Mask guided diverse face image synthesis5
Improving accuracy of automatic optical inspection with machine learning5
ROS package search for robot software development: a knowledge graph-based approach5
BI-TE: achieving GNN-based bandwidth indistinguishable traffic engineering in multi-domain SDN5
Implementing a sidechain-based asynchronous DPKI5
Robust load-balanced backbone-based multicast routing in mobile opportunistic networks5
A novel dense retrieval framework for long document retrieval5
An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network5
ABLkit: a Python toolkit for abductive learning5
Metric learning for domain adversarial network5
BGNN: Behavior-aware graph neural network for heterogeneous session-based recommendation5
The most tenuous group query5
A perspective on Petri Net learning5
Distortion-free PCA on sample space for highly variable gene detection from single-cell RNA-seq data5
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid4
Robust domain adaptation with noisy and shifted label distribution4
Massively parallel algorithms for fully dynamic all-pairs shortest paths4
Cascade context-oriented spatio-temporal attention network for efficient and fine-grained video-grounded dialogues4
Offline model-based reinforcement learning with causal structured world models4
Multi-granularity semantic alignment distillation learning for remote sensing image semantic segmentation4
Community search over heterogeneous information networks via weighting strategy and query replacement4
ECG-I2S: a method for extracting heartbeat cycle and numerical signals from ECG captured images4
COURIER: contrastive user intention reconstruction for large-scale visual recommendation4
Accelerating BERT inference with GPU-efficient exit prediction4
Decoupled deep hough voting for point cloud registration4
LMR-CBT: learning modality-fused representations with CB-Transformer for multimodal emotion recognition from unaligned multimodal sequences4
Defense against local model poisoning attacks to byzantine-robust federated learning4
SharpSMT: a scalable toolkit for measuring solution spaces of SMT(LA) formulas4
FLAPS: fluctuation-aware power auction strategy for reducing the power overload probability4
Embracing connected intelligence with the YuanOS architecture: one OS kit for all4
FragDPI: a novel drug-protein interaction prediction model based on fragment understanding and unified coding4
A two-level meta-heuristic approach for the minimum dominating tree problem4
A program logic for obstruction-freedom4
A multi-stream network for retrosynthesis prediction4
Pairwise tagging framework for end-to-end emotion-cause pair extraction4
A privacy-preserving group encryption scheme with identity exposure4
Comment on “SAT requires exhaustive search”4
CompactChain: an efficient stateless chain for UTXO-model blockchain4
ProSyno: context-free prompt learning for synonym discovery4
Flexibility and rigidity index for chromosome packing, flexibility and dynamics analysis4
PSLDA: a novel supervised pseudo document-based topic model for short texts4
A review on multi-view learning4
A search-based identification of variable microservices for enterprise SaaS4
A MLP-Mixer and mixture of expert model for remaining useful life prediction of lithium-ion batteries4
Graph foundation model4
System log isolation for containers3
Announcement of the 2023 FCS Paper Awards3
APPCorp: a corpus for Android privacy policy document structure analysis3
XGCN: a library for large-scale graph neural network recommendations3
String kernels construction and fusion: a survey with bioinformatics application3
Deterministic streaming algorithms for non-monotone submodular maximization3
A comprehensive framework for predicting public opinion by tracking multi-informational dynamics3
MSDA: multi-subset data aggregation scheme without trusted third party3
Simplified multi-view graph neural network for multilingual knowledge graph completion3
An extension of process calculus for asynchronous communications between agents with epistemic states3
MMCo: using multimodal deep learning to detect malicious traffic with noisy labels3
Selecting text classification model through maximizing posterior evidence over informative sub-space3
0.070585012435913