Computer

Papers
(The TQCC of Computer is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A Research Agenda for Hybrid Intelligence: Augmenting Human Intellect With Collaborative, Adaptive, Responsible, and Explainable Artificial Intelligence113
The Carbon Footprint of Machine Learning Training Will Plateau, Then Shrink78
The Ten Commandments of Ethical Medical AI62
Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry60
Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading53
Toward Human–AI Interfaces to Support Explainability and Causability in Medical AI52
Generative Artificial Intelligence: Trends and Prospects46
Physical Computing: A Key Element of Modern Computer Science Education40
PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs38
The Rise of the Quantum Internet37
Virtual Worlds (Metaverse): From Skepticism, to Fear, to Immersive Opportunities35
Beyond Zero Trust: Trust Is a Vulnerability34
Deep Learning34
Blockchain for E-Health-Care Systems: Easier Said Than Done31
Scams, Frauds, and Crimes in the Nonfungible Token Market30
Let’s Rename Everything “the Metaverse!”29
The Edge-to-Cloud Continuum27
Cybertrust: From Explainable to Actionable and Interpretable Artificial Intelligence26
Digital Twins: Universal Interoperability for the Digital Age25
Zero Trust: The What, How, Why, and When24
To Improve Cyber Resilience, Measure It23
The Rise of Generative Artificial Intelligence and Its Impact on Education: The Promises and Perils22
Dynamic Assurance Cases: A Pathway to Trusted Autonomy21
Algorithm Auditing: Managing the Legal, Ethical, and Technological Risks of Artificial Intelligence, Machine Learning, and Associated Algorithms21
Blockchain Architecture for Auditing Automation and Trust Building in Public Markets21
Free and Open Source Software License Compliance: Tools for Software Composition Analysis19
The Cyberphysical Power System Resilience Testbed: Architecture and Applications19
National Varieties of Artificial Intelligence Discourses: Myth, Utopianism, and Solutionism in West European Policy Expectations19
Isomorphic Internet of Things Architectures With Web Technologies18
Blockchain: Can It Be Trusted?18
Transparency for Whom? Assessing Discriminatory Artificial Intelligence18
AI Ethics: A Long History and a Recent Burst of Attention18
Open Questions in Formal Methods18
Explainable Machine Learning for Fraud Detection18
Software-Engineering Design Patterns for Machine Learning Applications18
Autonomous Last-Mile Delivery Vehicles in Complex Traffic Environments18
Explainable AI for Chiller Fault-Detection Systems: Gaining Human Trust18
Explainable Recommendations and Calibrated Trust: Two Systematic User Errors17
A Comparison of Native and Cross-Platform Frameworks for Mobile Applications17
The International Roadmap for Devices and Systems: A Beacon for the Electronics Industry16
Computer Education in the Age of COVID-1915
The Top 10 Risks of Machine Learning Security15
Managing Artificial Intelligence Deployment in the Public Sector14
Managing Your Open Source Supply Chain-Why and How?14
Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches14
The Economics of Digital Twins14
Toward Improving Confidence in Autonomous Vehicle Software: A Study on Traffic Sign Recognition Systems13
Blockchain for Video Streaming: Opportunities, Challenges, and Open Issues13
Is Immersive Virtual Reality the Ultimate Interface for 3D Animators?13
Interactive Artificial Intelligence: Designing for the "Two Black Boxes" Problem13
Blockchain and Cyberphysical Systems13
Generative Artificial Intelligence and the Education Sector13
Token Economics in Real Life: Cryptocurrency and Incentives Design for Insolar's Blockchain Network13
Big Data: Present and Future12
State of Data Privacy During COVID-1912
Open Source Research Software12
21 Years of Distributed Denial-of Service: Current State of Affairs12
The Economics of Central Bank Digital Currency [Computing's Economics]12
The Cyberwarfare in Ukraine12
Autonomous Vehicles Digital Twin: A Practical Paradigm for Autonomous Driving System Development12
Multidrone Systems: More Than the Sum of the Parts12
Transparency as Threat at the Intersection of Artificial Intelligence and Cyberbiosecurity12
Contactless U: Higher Education in the Postcoronavirus World11
Attacking Electricity Markets Through IoT Devices11
Data-Centric Edge Computing to Defend Power Grids Against IoT-Based Attacks11
Trustworthy Artificial Intelligence Requirements in the Autonomous Driving Domain11
The Economics Behind Food Supply Blockchains11
21 Years of Distributed Denial-of-Service: A Call to Action11
Sensitive Detection of GPS Spoofing Attack in Phasor Measurement Units via Quasi-Dynamic State Estimation11
Cyber Resilience: by Design or by Intervention?11
Pushing the Limits of Autonomy for Enabling the Next Generation of Space Robotics Exploration Missions11
A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation11
Artificial Intelligence and Critical Systems: From Hype to Reality11
Federated Learning: The Pioneering Distributed Machine Learning and Privacy-Preserving Data Technology11
Making Open Source Project Health Transparent11
Large-Scale Artificial Intelligence Models11
Real-Time Systems Implications in the Blockchain-Based Vertical Integration of Industry 4.010
2021 State of the Practice in Data Privacy and Security10
Hybrid Human-Artificial Intelligence10
An Approach for Detection of Advanced Persistent Threat Attacks10
Computational Intelligence for Safety Assurance of Cooperative Systems of Systems10
Edge Artificial Intelligence Chips for the Cyberphysical Systems Era10
A Secure and Flexible FPGA-Based Blockchain System for the IIoT10
Explainability as a User Requirement for Artificial Intelligence Systems9
Bungie: Improving Fault Tolerance via Extensible Application-Level Protocols9
The Role of Data and Artificial Intelligence in Driving Diversity, Equity, and Inclusion9
Denial-of-Service Resilient Frameworks for Synchrophasor-Based Wide Area Monitoring Systems9
A Survey on Deep Learning Resilience Assessment Methodologies9
A Typology of Metaverses9
Blockchain’s Carbon and Environmental Footprints9
Deep Learning and the Oceans9
Adversarial Machine Learning: Attacks From Laboratories to the Real World9
Single-Vendor Open Source Firms9
Artificial Intelligence and Software Engineering: Are We Ready?8
Toward Formal Methods for Smart Cities8
Wasabi: A Conceptual Model for Trustworthy Artificial Intelligence8
Documenting High-Risk AI: A European Regulatory Perspective8
Defending IEEE Software Standards in Federal Criminal Court8
Public Strategies for Artificial Intelligence: Which Value Drivers?8
El Salvador’s Bitcoin Gamble8
ChatGPT and Chat History: Challenges for the New Wave8
Security Awareness Training for the Workforce: Moving Beyond "Check-the-Box" Compliance8
Open Banking: Definition and Description8
Digital Humanism: The Time Is Now8
Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk?8
Indian Sign Language Generation System7
Protocols Over Things: A Decentralized Programming Model for the Internet of Things7
Compositional Thinking in Cyberphysical Systems Theory7
Big Data Pipelines on the Computing Continuum: Tapping the Dark Data7
Cyberphysical Security Through Resiliency: A Systems-Centric Approach7
Cybersecurity for the Smart Grid7
Delivering Software- and Systems-Engineering Standards for Small Teams7
A Novel Reputation System for Mobile App Stores Using Blockchain7
eCloud: A Vision for the Evolution of the Edge-Cloud Continuum7
Three Levels of AI Transparency7
Worlds Apart: Technology, Remote Work, and Equity7
Transformers for GUI Testing: A Plausible Solution to Automated Test Case Generation and Flaky Tests7
Digital Storage and Memory7
Interpretable Fault Diagnosis for Cyberphysical Systems: A Learning Perspective6
Digital Self: The Next Evolution of the Digital Human6
Privacy-Preserved Optimal Energy Trading, Statistics, and Forecasting for a Neighborhood Area Network6
COVID-19 Meets Big Tech6
Artificial Intelligence in Government6
Efficient Computer Vision for Embedded Systems6
National Metaverse Strategies6
Reshaping the Landscape of the Future: Software-Defined Manufacturing6
A Brief History of Free, Open Source Software and Its Communities6
Digital Twins: From Conceptual Views to Industrial Applications in the Electrical Domain6
Zero-Trust Artificial Intelligence?6
Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks6
Virtualization Over Multiprocessor Systems-on-Chip: An Enabling Paradigm for the Industrial Internet of Things6
Smart City Intersections: Intelligence Nodes for Future Metropolises6
Architectural Design Decisions for the Machine Learning Workflow6
Crowd-Machine Hybrid Urban Sensing and Computing6
Data Privacy Considerations for Central Bank Digital Currencies in Asia–Pacific Countries6
Artificial Intelligence in Critical Infrastructure Systems6
Green Configuration: Can Artificial Intelligence Help Reduce Energy Consumption of Configurable Software Systems?6
Π-RT: A Runtime Framework to Enable Energy-Efficient Real-Time Robotic Vision Applications on Heterogeneous Architectures6
A Trusted Federated System to Share Granular Data Among Disparate Database Resources5
Supervisor Synthesis: Bridging Theory and Practice5
Building a Human-Intelligent Metaverse5
Challenging the Digital Divide: Factors Affecting the Availability, Adoption, and Acceptance of Future Technology in Elderly User Communities5
Environment Modeling During Model Checking of Cyberphysical Systems5
Economics of Artificial Intelligence in the Gulf Cooperation Council Countries5
Do Data Almost Always Eventually Leak?5
Edge Computing: The Computing Infrastructure for the Smart Megacities of the Future5
DNA Data Storage: Automated DNA Synthesis and Sequencing Are Key to Unlocking Virtually Unlimited Data Storage5
Strategy and Tactics Against Ransomware5
Data and Disinformation5
From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively5
Toward Smart Manufacturing: Key Technologies and Trends Driving Standardization5
AI Maintenance: A Robustness Perspective5
Reliability, Security, and Privacy in Power Grids5
The Equifax Hack Revisited and Repurposed5
Formal Methods in Cyberphysical Systems5
When Scientific Software Meets Software Engineering5
Algorithms for Artificial Intelligence5
Stateful Function as a Service at the Edge5
WiF0: All Your Passphrase Are Belong to Us5
Sustainability: Fundamentals-Based Approach to Paying It Forward5
Continuous Open Source License Compliance5
Challenges and Issues in Data Science Education5
Can We Prevent a Technological Arms Race in University Student Cheating?5
The Open Source Distributor Business Model4
Multilayered Diagnostics for Smart Cities4
Ethics, Safety, and Autonomous Vehicles4
Embracing Physical Keyboards for Virtual Reality4
Digital Transformation: Lights and Shadows4
Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems4
Attacking Machine Learning Systems4
Lightweight Authenticated Key Exchange With EDHOC4
Aging, Fast and Slow4
Experiencing Hyperloops: The Transit of the Future4
Is Privacy Regulation Slowing Down Research on Pervasive Computing?4
BeeMe: Real-Time Internet Control of Situated Human Agents4
Developing IoT Systems: It's All About the Software4
Computing Nearer to Data4
Understanding Smart Medical Devices4
On the High-Energy Consumption of Bitcoin Mining4
Internet of Telemedicine4
The Convergence of Hyperscale Data Center and High-Performance Computing Networks4
Artificial Intelligence-Based Referral System for Patients With Diabetic Retinopathy4
Decentralized Machine Learning for Intelligent Health-Care Systems on the Computing Continuum4
Engineering Education in the Age of Autonomous Machines4
Making Digital Twins Work4
Rise of the Autonomous Machines4
Research Challenges for Heterogeneous Cyberphysical System Design4
Democratizing Science Through Advanced Cyberinfrastructure4
Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity4
Formal Verification of Cyberphysical Systems4
Controller Resynthesis for Multirobot System When Changes Happen4
Trusting Digital Twins4
Embedded Artificial Intelligence: The ARTEMIS Vision4
The Cities Challenge: Driving a Green and Digital Recovery and Social Resilience4
The Path to a Consensus on Artificial Intelligence Assurance4
Multiple-Deep Neural Network Accelerators for Next-Generation Artificial Intelligence Systems4
Unconventional Concerns for Human-Centered Artificial Intelligence4
The Metaverse University4
Blockchain: From Technology to Marketplaces4
Technology Predictions4
Standardizing Open Source License Compliance With OpenChain4
Conversational Artificial Intelligence: Changing Tomorrow’s Health Care Today4
The Promises and Challenges of Open Source Hardware4
Can You Trust Zero Trust?4
Collaboration Stability: Quantifying the Success and Failure of Opportunistic Collaboration3
From Big Data Technologies to Big Data Benefits3
Centering the Law in the Digital State3
Future of the Workforce3
Where’s the Silicon?3
Deep Conversational Recommender Systems: Challenges and Opportunities3
A Taxonomy for Distributed Ledger Analytics3
Project moveSMART: When Physical Education Meets Computational Thinking in Elementary Classrooms3
Scarcity3
Software Development Metrics With a Purpose3
Explainable artificial intelligence and machine learning [Guest Editors’ introduction]3
Taming Memory With Disaggregation3
The Importance of Interoperability in Functional Safety Standards3
Defensive AI: The Future Is Yesterday3
Open Source Community Governance the Apache Way3
Economics of Nonfungible Tokens3
A Comprehensive Inspection of the Straggler Problem3
Predicting Technologies That Advance Humanity3
Discovering Opioid Use Patterns From Social Media for Relapse Prevention3
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE3
Collaborative Artificial Intelligence Needs Stronger Assurances Driven by Risks3
20 Years of Software Security3
Trustworthy AI—Part 13
Building an Internet of Secure Things3
Data-Centric Artificial Intelligence, Preprocessing, and the Quest for Transformative Artificial Intelligence Systems Development3
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices3
An Enterprise Transformation Guide for the Inevitable Blockchain Disruption3
Information-Operation Technology Integration in Industrial Cyberphysical Systems3
Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?3
12 Flavors of IoT3
The QAnon Phenomenon: The Storm Has Always Been Among Us3
IEEE Standard 1838 Is on the Move3
The Economics of Blockchain-Based Supply Chain Traceability in Developing Countries3
Machine-Learned Verification and Advance Notice Oracles for Autonomous Systems3
Algorithmic Nudge: An Approach to Designing Human-Centered Generative Artificial Intelligence3
A Collapsing Academy, Part III: Scientometrics and Metric Mania3
Security or Privacy: Can You Have Both?3
ChatGPT and AIChat Epistemology3
A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems3
A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation3
Technomoral Affordances of Artificial Intelligence in Data-Driven Systems3
Open Banking: What It Is, Where It’s at, and Where It’s Going3
Explaining the Walking Through of a Team of Algorithms3
Commercial Participation in OpenStack: Two Sides of a Coin3
TikTok in 2022: Revisiting Data and Privacy3
The Monkey, the Ant, and the Elephant: Addressing Safety in Smart Spaces3
0.034588098526001