Computer

Papers
(The TQCC of Computer is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
AI and Big Data in Contemporary Marketing162
IEEE Volunteer Service Awards139
Rise of the Autonomous Machines76
IEEE Computer Society Diversity and Inclusion Fund71
IEEE Transactions on Big Data56
IEEE Jobs Boards53
Table of Contents48
IEEE Computer Graphics and Applications46
IEEE Computer Society Diversity and Inclusion Fund46
Masthead36
IEEE Search for New Editor In Chief (generic)35
OJ CS filler31
IEEE Computer Graphics and Applications30
IEEE Transactions on Computing in Science30
Machine Learning Security: Threat Model, Attacks, and Challenges28
IEEE Computer Society24
Masthead22
IEEE Open Journal of the Computer Society22
Table of Contents22
Software Engineering’s Adolescent Growing Pains21
Using Machine Learning to Work Around the Operational and Cybersecurity Limitations of Legacy Process Sensors21
Will Data Science Outrun the Data Scientist?21
Overcoming the Barriers of Using Linked Open Data in Smart City Applications20
Labeling “Things”19
Trustworthy AI—Part II18
Software Engineering for Responsible AI18
Smart City as an Urban Intelligent Digital System: The Case of Parma18
Serverless Electrocardiogram Stream Processing in Federated Clouds With Lambda Architecture17
Visualizing Scanner Utilization From MRI Metadata and Clinical Data17
In this Issue15
“Thirsty” Computing15
How Lithography and Metrology Are Enabling Yield in the Next Generation of Semiconductor Patterning15
Resilient Virtualization14
Charging Support Communication System Based on Vehicle-to-Vehicle Communication for Electric Vehicles14
Redux: Corporate Governance and Management of AI-Driven Product Development13
Empowering Diversity and Innovation: Jyotika Athavale Led the Charge This Year as 2024 IEEE Computer Society President13
CISE filler13
50 & 25 Years Ago13
From Concept to Reality: Leveraging Correctness-by-Construction for Better Algorithm Design13
AI Failures13
IEEE IT Professional Call for Articles12
Validating “Data Validation”12
Ethics in Autonomous Vehicle Software: The Dilemmas12
Experiencing Hyperloops: The Transit of the Future12
Future Computers: Digital, Quantum, Biological12
Low Code/No Code Meets the Metaverse11
IEEE Annals of the History of Computing11
Front Cover11
IEEE Transactions on Big Data11
Secure and Intelligent Systems11
IEEE Computer Society Awards11
IEEE Computers In Science and Engineering11
IEEE Computer Society Information11
Computer Highlights Society Magazines11
Technology Predictions 202510
Blockchain’s Carbon and Environmental Footprints10
Computing Through Time: Architecture10
IEEE Career Center10
2023 IEEE Conference on Artificial Intelligence10
Colors of Artificial Intelligence10
Evolving AI: What Lies Beyond Today’s Language Models10
IEEE Open Journal Computer Society10
IEEE Computers in Science & Engineering10
A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems10
A Framework for Trustworthy AI in Credit Risk Management: Perspectives and Practices10
Machine Learning Security Against Data Poisoning: Are We There Yet?10
IEEE Transactions on Computers Call for Papers10
IEEE Computer Society Member Benefits10
IEEE Transactions on Big Data9
IEEE Computer Society Call for Papers9
Computer Highlights Society Magazines9
Masthead9
IEEE Transactions on Sustainable Computing9
IEEE Transactions on Sustainable Computing9
Human-Centered AI: A Framework for Green and Sustainable AI9
IEEE Transactions on Sustainable Computing9
Computer Highlights Society Magazines9
Front Cover9
Will I See Sensor-Based Games Happen Before I Die?9
IEEE Open Journal of the Computer Society9
50 & 25 Years Ago9
Toward a Universal Cryptographic Accelerator8
IEEE Author’s Choice8
IEEE Computing Edge8
IEEE Computer Society Career Center8
A Typology of Metaverses8
From Big Data Technologies to Big Data Benefits8
Practitioners’ Perspectives on and Prospects for Usable Security8
Accountable Deep-Learning-Based Vision Systems for Preterm Infant Monitoring8
Reliability, Security, and Privacy in Power Grids8
Changing the Paradigm of Control System Cybersecurity8
The Forgotten Potential: Why Aspect-Oriented Programming Faded Away8
Leadership and Engagement: IEEE Computer Society 2025 Key Strategies8
Information-Driven Security Analysis: Tools and Techniques for the Study and Practice of Security Engineering8
Cui Bono? Software Professionals Should Always Ask “Who Benefits?”8
Russian Cyber Onslaught Was Blunted by Ukrainian Cyber Resilience, Not Merely Security8
Reshaping the Landscape of the Future: Software-Defined Manufacturing8
Table of Contents8
IEEE Computer Society: Call for Papers8
Learning Continually in Silicon8
Hardware/Software Co-Design for Sensor Security8
Dependability Improvement Depends on Dependable Measurement8
Toward a Regulatory-Compliant Lifecycle for Artificial-Intelligence-Based Medical Devices in the European Union: Industry Perspectives8
Energy Considerations7
Scientific Visualization Using Neural Networks7
Explainable Machine Learning for Fraud Detection7
IEEE Computer Society Call for Papers7
Engaging More Students in Formal Methods Education: A Practical Approach Using Temporal Logic of Actions7
IEEE Transactions on Big Data7
IEEE Computer Society Call for Papers7
Challenging the Digital Divide: Factors Affecting the Availability, Adoption, and Acceptance of Future Technology in Elderly User Communities7
Explaining the Walking Through of a Team of Algorithms7
eCloud: A Vision for the Evolution of the Edge-Cloud Continuum7
IEEE Dataport7
Federated Learning: The Pioneering Distributed Machine Learning and Privacy-Preserving Data Technology7
IEEE Pervasive Computing Call for Articles7
IEEE Computing Science Engineering filler6
Masthead6
Masthead6
El Salvador’s Bitcoin Gamble6
Self-Directing AI: The Road to Fully Autonomous AI Agents6
IEEE Computer Society Has You Covered!6
A Collapsing Academy IV: How Did Memory and Gag Laws Gain Admission?6
IEEE Pervasive Computing Call for Articles6
50 & 25 Years Ago6
Advancing Reproducibility in Parallel and Distributed Systems Research6
IEEE Annals of the History of Computing6
50 & 25 Years Ago6
Cybersecurity Risks Unique to Open Source and What Communities Are Doing to Reduce Them6
Computer-Enhanced Communication Among Deaf, Hard of Hearing, and Hearing People6
Revisiting Software Metrology6
Table of Contents6
IEEE Transactions on Big Data6
Front Cover6
Table of Contents6
Avoiding Past Mistakes in Unethical Human Subjects Research: Moving From Artificial Intelligence Principles to Practice6
Cyberphysical Systems in K–12 Education6
IEEE Annals of the History of Computing6
IEEE Annals of the History of Computing6
Front Cover6
IEEE Job Boards6
Toward Population Health Intelligence: When Artificial Intelligence Meets Population Health Research5
The Rise of Generative Artificial Intelligence and Its Impact on Education: The Promises and Perils5
NIST Cybersecurity for IoT Program5
IEEE Computer Society Benefits5
IEEE Career Center5
IEEE Jobs Board filler5
CS Connection5
Computer Highlights Society Magazines [Elsewhere in the CS]5
AI for Cloud and SaaS: Technologies and Business Models5
Understanding Smart Medical Devices5
A Forward Speculative Interference Attack5
Artificial Intelligence Failures in Autonomous Vehicles: Causes, Implications, and Prevention5
Can OpenAI’s Sora Generate Pixar’s Toy Story?5
Making Large Language Models More Reliable and Beneficial: Taking ChatGPT as a Case Study5
Redefining Circular Cities: Regulation, Governance, Infrastructure, and Technology5
Protecting AI: We Built the Brains, but What About Helmets?5
Table of Contents5
Front Cover5
IEEE Pervasive Computing Call For Articles5
How Virtual Agents Learn to Speak Expressively5
Smart Farming for Poultry: Enhancing Growth and Efficiency With Low-Cost Internet of Things Solutions5
IEEE IT Professional Call for Articles5
Value by Squares5
A Story Arc From TRON to Sora: An Interview With Judson Rosebush—Part 15
IEEE Annals of the History of Computing5
Compositional Thinking in Cyberphysical Systems Theory5
What’s in an AI’s Mind’s Eye? We Must Know5
Large Language Models and Generative AI, Oh My!5
IEEE Computer Society Election5
IEEE Computer Society Call for 2023 Major Awards Nominations5
Table of Contents5
IEEE Computer Society Information5
Front Cover5
IEEE Security and Privacy Subscribe5
IEEE Computer Society: Call for Papers5
IEEE Computer Graphics and Applications5
IEEE Computer Society5
Tailoring Requirements Engineering for Responsible AI5
"What We Do Now, Kemosabe?"5
Ethics, Safety, and Autonomous Vehicles5
AI Robustness Against Attacks in City-Scale Autonomous Drone Deployments4
Decoding Real-World Artificial Intelligence Incidents4
In-Network Computing With Function as a Service at the Edge4
Table of Contents4
IEEE Computer Society Social Newworking4
Considerations for Decision Makers and Developers Toward the Adoption of Decentralized Key Management Systems Technology in Emerging Applications4
Women in Open Source: We Need to Talk About It4
Software Development Metrics With a Purpose4
Evolution of Winning Solutions in the 2021 Low-Power Computer Vision Challenge4
Table of Contents4
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices4
Front Cover4
Get Published in the New IEEE Transactions on Privacy4
IEEE IT Professionals4
Table of Contents4
IEEE Computer Society Benefits4
Front Cover4
A Research Agenda for NFTs4
Front Cover4
Masthead4
Front Cover4
Data and Disinformation4
Technology Predictions: Technologies that Advance Humanity and Broad AI Adoption4
IEEE Pervasive Computing Call for Articles4
Mitigating Privacy and Cybersecurity Risks Affecting Telehealth Remote Patient Monitoring Ecosystems4
Efficient Computer Vision for Embedded Systems4
Combinatorial Fusion Analysis4
IEEE Computer Society Call for Papers4
IEEE Over the Rainbow Podcast4
IEEE Computer Society Information4
In this Issue4
IEEE Open Journal of the Computer Society4
IEEE Computer Society Information4
IEEE Transaction on Privacy4
How to Foster Responsible and Resilient Data: The Ethical Data Initiative4
American Professor4
Bungie: Improving Fault Tolerance via Extensible Application-Level Protocols4
Computing in Telemedicine—Part II4
Computer Highlights Society Magazines4
Computing Through Time4
Table of Contents4
IEEE IT Professionals Call for Articles4
50 & 25 Years Ago4
IEEE Computer Society Diversity & Integrity Fund4
Deepfake: Risks and Opportunities4
IoTility: A Contemporary View3
IEEE Pervasive Computing call for Articles3
CS Connection3
IEEE Computer Society Volunteer Service Awards3
Front Cover3
Homework [EIC'S Message]3
“Free” Online Services and Gonzo Capitalism3
Standing on the Shoulders of AI Giants3
Data-Driven System-Level Design Framework for Responsible Cyber-Physical-Social Systems3
How Do I Get a Position in the Games Industry? The FAQ3
Strategy and Tactics Against Ransomware3
A Collapsing Academy, Part III: Scientometrics and Metric Mania3
Time and Money3
Design Automation Standards Committee: Setting Tomorrow's Standards3
Lessons Learned From the Ant Group Open Source Program Office3
Wholesale Central Bank Digital Currencies in Asia: Current Status and Motivation3
A Vision for Transformative Intersections3
Machine Learning for Enhancing Public Safety in Modern Cities3
Convergence of Energy and IT Sectors3
Table of Contents3
Applying Machine Learning and Data Fusion to the “Missing Person” Problem3
For the Common Defense3
What C-Suites Should Expect From Business Schools3
Urgent Computing for Protecting People From Natural Disasters3
0.24432921409607