ACM Computing Surveys

Papers
(The H4-Index of ACM Computing Surveys is 103. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice2122
A Survey on Stability of Learning with Limited Labelled Data and its Sensitivity to the Effects of Randomness1686
Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models1561
Machine Learning and Physics: A Survey of Integrated Models1167
Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning773
A Survey of Heuristics for Profile and Wavefront Reductions565
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning555
A Comprehensive Review on IoT Marketplace Matchmaking: Approaches, Opportunities and Challenges526
Secure Robotics: Navigating Challenges at the Nexus of Safety, Trust, and Cybersecurity in Cyber-Physical Systems506
Data Readiness for AI: A 360-Degree Survey498
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions439
A Survey on Concept Drift in Process Mining387
A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures373
Neural Architecture Search Survey: A Hardware Perspective366
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware357
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences357
Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems353
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech339
A Comprehensive Analysis of Explainable AI for Malware Hunting325
Brave New GES World: A Systematic Literature Review of Gestures and Referents in Gesture Elicitation Studies304
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries282
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks271
Transformers in Vision: A Survey262
A Survey on Aspect-Based Sentiment Classification260
Diffusion Models: A Comprehensive Survey of Methods and Applications250
A Survey on Embedding Dynamic Graphs249
Demystify the Fuzzing Methods: A Comprehensive Survey248
A Review of Olfactory Display Designs for Virtual Reality Environments242
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges241
Transfer Learning in Sensor-Based Human Activity Recognition: A Survey240
Deep Learning Models for Serendipity Recommendations: A Survey and New Perspectives235
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions231
Personalization in Public Transport Passenger Information Systems: A Systematic Review and Framework224
How many FIDO protocols are needed? Analysing the technology, security and compliance221
Domain Generalization in Computational Pathology: Survey and Guidelines220
Bridging the Gap between Spatial and Spectral Domains: A Unified Framework for Graph Neural Networks217
Visual Tuning207
Text Classification Using Graph Convolutional Networks: A Comprehensive Survey205
State-of-the-Art and Challenges of Engineering ML- Enabled Software Systems in the Deep Learning Era198
A Survey on the State of the Art of Causally Consistent Cloud Systems197
Systematic Literature Review on Parallel Trajectory-based Metaheuristics195
A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos181
Explainability in Deep Reinforcement Learning: A Review into Current Methods and Applications180
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey179
On the Explainability of Natural Language Processing Deep Models178
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning170
Security and Privacy in Unified Communication169
ISP Meets Deep Learning: A Survey on Deep Learning Methods for Image Signal Processing166
Knowledge-based Cyber Physical Security at Smart Home: A Review164
A Survey on Virtual Network Functions for Media Streaming: Solutions and Future Challenges163
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey161
From Reactive to Active Sensing: A Survey on Information Gathering in Decision-theoretic Planning160
A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers159
A Practical Tutorial on Graph Neural Networks159
Dataset Discovery and Exploration: A Survey153
A Survey of Multi-modal Knowledge Graphs: Technologies and Trends150
A Survey of Security and Privacy Issues in V2X Communication Systems149
A Survey on Hypergraph Representation Learning147
Evolutionary Large-Scale Multi-Objective Optimization: A Survey146
A Survey and Taxonomy of Latency Compensation Techniques for Network Computer Games145
A Systematic Review of Cross-Lingual Sentiment Analysis: Tasks, Strategies, and Prospects144
A Contemporary Survey on Live Video Streaming from a Computation-Driven Perspective142
Multi-Class Imbalanced Data Handling with Concept Drift in Fog Computing: A Taxonomy, Review, and Future Directions141
A Survey on Synchronous Augmented, Virtual, andMixed Reality Remote Collaboration Systems139
Private Graph Data Release: A Survey138
Screen Content Quality Assessment: Overview, Benchmark, and Beyond135
From Perception to Computation: Revisiting Delay Optimization for Connected Autonomous Vehicles134
Class-Imbalanced Learning on Graphs: A Survey134
A Taxonomy and Survey on Grid-Based Routing Protocols Designed for Wireless Sensor Networks133
Visual Question Answering: A Survey of Methods, Datasets, Evaluation, and Challenges133
Distributed Scrum: A Case Meta-analysis132
State of Practical Applicability of Regression Testing Research: A Live Systematic Literature Review130
The Role of Multi-Agents in Digital Twin Implementation: Short Survey128
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities128
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems126
Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap126
Semantic Knowledge Graphs for the News: A Review125
Deep Learning on Monocular Object Pose Detection and Tracking: A Comprehensive Overview124
Eco-Friendly Route Planning Algorithms: Taxonomies, Literature Review and Future Directions124
A.I. Robustness: a Human-Centered Perspective on Technological Challenges and Opportunities124
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit123
Deep Generative Models for Therapeutic Peptide Discovery: A Comprehensive Review122
Deep Learning Library Testing: Definition, Methods and Challenges120
Cybersecurity of Industrial Cyber-Physical Systems: A Review120
Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey120
Private and Secure Distributed Deep Learning: A Survey118
A Systematic Literature Review on Multi-Robot Task Allocation117
Non-imaging Medical Data Synthesis for Trustworthy AI: A Comprehensive Survey116
Embedding Compression in Recommender Systems: A Survey116
FPGA/GPU-based Acceleration for Frequent Itemsets Mining: A Comprehensive Review115
A Review of Stability in Topic Modeling: Metrics for Assessing and Techniques for Improving Stability114
Deep Learning Methods for Abstract Visual Reasoning: A Survey on Raven's Progressive Matrices113
Machine Learning at the Network Edge: A Survey110
More than Privacy110
Adversary Models for Mobile Device Authentication109
A Survey of AI-enabled Dynamic Manufacturing Scheduling: From Directed Heuristics to Autonomous Learning109
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges107
Survey and Taxonomy of Adversarial Reconnaissance Techniques106
Heterogeneous Federated Learning: State-of-the-art and Research Challenges105
A Comprehensive Survey of Neural Architecture Search105
A Survey of Privacy Attacks in Machine Learning105
Knowledge Graph Embedding: A Survey from the Perspective of Representation Spaces104
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids103
0.072945117950439