Communications of the ACM

(The median citation count of Communications of the ACM is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-06-01 to 2024-06-01.)
Generative adversarial networks5638
Understanding deep learning (still) requires rethinking generalization900
Datasheets for datasets475
Green AI422
Deep learning for AI302
Domain-specific hardware accelerators147
Some simple economics of the blockchain142
A decade of social bot detection136
A domain-specific supercomputer for training deep neural networks128
What serverless computing is and should become114
A review of the semantic web field110
The (Im)possibility of fairness109
Non-fungible tokens and the future of art93
Knowledge graphs90
Spectre attacks86
Trustworthy AI86
Threats of a replication crisis in empirical computer science80
Secure multiparty computation75
The future is big graphs70
Toward verified artificial intelligence68
Federated learning for privacy-preserving AI68
Methods included68
The limits of differential privacy (and its misuse in data release and machine learning)61
It is time for more critical CS education59
MIP* = RE52
Medical artificial intelligence47
Advances in the quantum internet44
A year in lockdown43
The hardware lottery41
Biases in AI systems40
The End of Programming39
Coding at a crossroads33
Operationalizing AI ethics principles32
On 6G and trustworthiness32
Responsible AI32
The graph isomorphism problem32
The dogged pursuit of bug-free C programs31
A panoramic survey of natural language processing in the Arab world30
On sampled metrics for item recommendation29
Digital agriculture for small-scale producers29
When permissioned blockchains deliver more decentralization than permissionless28
There is no AI without data28
Crowdsensing 2.027
The harm in conflating aging with accessibility27
Gender trends in computer science authorship26
Safe systems programming in Rust26
Measuring internet speed25
The decline of computers as a general purpose technology24
The state of virtual reality hardware24
Language models23
Formalizing and guaranteeing human-robot interaction23
What does saying that 'programming is hard' really say, and about whom?23
The data science life cycle23
An internet of things service roadmap23
Cyber reconnaissance techniques23
Why computing belongs within the social sciences22
From remote work to working from anywhere22
Reason-checking fake news21
Recommender systems under European AI regulations21
Digital twins and artificial intelligence21
When software engineering meets quantum computing20
What to do about deepfakes20
Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage20
Challenges, experiments, and computational solutions in peer review19
Trust, regulation, and human-in-the-loop AI19
Toward confidential cloud computing18
AI on edge18
Automating data science17
Deploying decentralized, privacy-preserving proximity tracing17
Federated learning and privacy17
The 2021 software developer shortage is coming16
The Principles of Data-Centric AI16
Virtual collaboration in the age of the coronavirus16
Constant overhead quantum fault tolerance with quantum expander codes16
Moore's Law15
The best of NLP14
Self-driving vehicle technology14
Keeping CALM14
Neural software analysis14
How reliable is smartphone-based electronic contact tracing for COVID-19?14
Preserving integrity in online social networks14
Six reasons why virtual reality is a game-changing computing and communication platform for organizations14
Dark patterns14
Polanyi's revenge and AI's new romance with tacit knowledge14
Collusion rings threaten the integrity of computer science research13
The Seattle report on database research13
Toward justice in computer science through community, criticality, and citizenship13
Automata modulo theories13
Non-traditional data sources13
Digital creativity support for original journalism13
Flexible work and personal digital infrastructures13
Blockchain in China12
Securing internet applications from routing attacks12
Competitive compatibility12
A recent renaissance in privacy law12
What do agile, lean, and ITIL mean to DevOps?12
Optimal auctions through deep learning12
Building a multilingual Wikipedia11
Can AI Demonstrate Creativity?11
Artificial intelligence for synthetic biology11
Does Facebook use sensitive data for advertising purposes?11
Artificial intelligence, machine learning, and the fight against world hunger11
AI and Neurotechnology11
How to transition incrementally to microservice architecture11
Eyelid gestures for people with motor impairments11
The worsening state of ransomware10
Responsible data management10
Connecting Arabs10
Technologies for the visually impaired10
Excessive use of technology10
Taking Flight with Copilot10
Fugaku takes the lead10
The growing cost of deep learning for source code10
Accelerator-level parallelism10
The dark triad and insider threats in cyber security10
Insights for AI from the human mind10
Responsible vulnerability disclosure in cryptocurrencies10
Still waiting for self-driving cars10
Transformers aftermath9
A technological and innovative approach to COVID-19 in Uruguay9
Contextualized interpretable machine learning for medical diagnosis9
Toward Practices for Human-Centered Machine Learning9
A federated infrastructure for European data spaces9
Enabling AI at the edge with XNOR-networks9
Algorithms with predictions9
Democratizing Domain-Specific Computing9
Ethical AI is Not about AI8
Fifty years of P vs. NP and the possibility of the impossible8
Digital contact tracing may protect privacy, but it is unlikely to stop the pandemic8
Keeping science on keel when software moves8
Computational thinking in the era of data science8
Cookie monster8
Real time spent on real time8
AI authorship?8
Explainable AI8
GDPR anti-patterns8
Abstractions, their algorithms, and their compilers8
Scalable linear algebra on a relational database system8
Applying the metaverse8
A vision to compute like nature8
Rateless codes for near-perfect load balancing in distributed matrix-vector multiplication8
Neuromorphic chips take shape8
Digital instruments as invention machines8
Data science meets law7
A Tale of Two Markets: Investigating the Ransomware Payments Economy7
Data Science---A Systematic Treatment7
U.S. states must broaden participation while expanding access to computer science education7
Heads-Up Computing Moving Beyond the Device-Centered Paradigm7
Legal Challenges to Generative AI, Part I7
PL and HCI7
ACM, ethics, and corporate behavior7
For impactful community engagement7
Toward systematic architectural design of near-term trapped ion quantum computers7
Declarative machine learning systems7
Privacy-preserving AI for future networks7
Differential privacy7
The history, status, and future of FPGAs7
The pushback effects of race, ethnicity, gender, and age in code review6
Filtering for beauty6
Cyber Efficiency and Cyber Resilience6
Human detection of machine-manipulated media6
Energy informatics6
Driving the cloud to true zero carbon6
Low-Code Programming Models6
Mobile-app privacy nutrition labels missing key ingredients for success6
'In situ' data rights6
A battery-free internet of things6
Supporting people with autism spectrum disorders in the exploration of PoIs6
AI Rewrites Coding6
From Code Complexity Metrics to Program Comprehension6
Resolution of the burrows-wheeler transform conjecture6
Can Generative AI Bots Be Trusted?6
Toward a broad AI6
Informing California privacy regulations with evidence from research6
CS unplugged or coding classes?6
The Lean Data Scientist6
Interpretable machine learning6
The Latin American supercomputing ecosystem for science6
The Premature Obituary of Programming6
The Silent (R)evolution of SAT5
'Have you thought about…'5
Digital healthcare in Latin America5
Geometric deep learning advances data science5
Subfield prestige and gender inequality among U.S. computing faculty5
Neurosymbolic AI5
Entrepreneurship ecosystem in Lebanon5
Reimagining chess with AlphaZero5
Battery day5
Dilemma of the Artificial Intelligence Regulatory Landscape5
A tale of three datasets5
Shortcut Learning of Large Language Models in Natural Language Understanding5
Multimedia data delivery based on IoT clouds5
Why computing students should contribute to open source software projects5
Producing competent HPC graduates5
Artificial intelligence across company borders5
The evolution of mathematical software5
What can the maker movement teach us about the digitization of creativity?5
On the Implicit Bias in Deep-Learning Algorithms5
The role of professional certifications in computer occupations5
Fact-finding mission5
Are Software Updates Useless against Advanced Persistent Threats?5
Isomorphism, canonization, and definability for graphs of bounded rank width5
Text and data mining of in-copyright works5
Security analysis of SMS as a second factor of authentication5
Trustworthy scientific computing5
Computational thinking for professionals5
Hoping for the Best as AI Evolves5
Internet of production5
Fixing the internet5
Dynamics of gender bias in computing5
Managing IT professional turnover5
A Linearizability-based Hierarchy for Concurrent Specifications5
Futures of digital governance4
ASIC clouds4
The identity in everyone's pocket4
Extracting the Essential Simplicity of the Internet4
Software Engineering of Machine Learning Systems4
Our house is on fire4
Virtual duplicates4
The ethics of zero-day exploits---4
Static analysis4
Holograms on the horizon?4
Why universities must resist GPA-based enrollment caps in the face of surging enrollments4
Natural language misunderstanding4
New Threats to Society from Free-Speech Social Media Platforms4
The SolarWinds hack, and a grand challenge for CS education4
Understanding law and the rule of law4
Software development in disruptive times4
Digging into big provenance (with SPADE)4
Cybersecurity research for the future4
Talking about Large Language Models4
Application frameworks4
Transitioning to distance learning and virtual conferencing4
Building a new economy4