ACM Computing Surveys

Papers
(The TQCC of ACM Computing Surveys is 37. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice2122
A Survey on Stability of Learning with Limited Labelled Data and its Sensitivity to the Effects of Randomness1686
Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models1561
Machine Learning and Physics: A Survey of Integrated Models1167
Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning773
A Survey of Heuristics for Profile and Wavefront Reductions565
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning555
A Comprehensive Review on IoT Marketplace Matchmaking: Approaches, Opportunities and Challenges526
Secure Robotics: Navigating Challenges at the Nexus of Safety, Trust, and Cybersecurity in Cyber-Physical Systems506
Data Readiness for AI: A 360-Degree Survey498
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions439
A Survey on Concept Drift in Process Mining387
A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures373
Neural Architecture Search Survey: A Hardware Perspective366
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware357
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences357
Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems353
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech339
A Comprehensive Analysis of Explainable AI for Malware Hunting325
Brave New GES World: A Systematic Literature Review of Gestures and Referents in Gesture Elicitation Studies304
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries282
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks271
Transformers in Vision: A Survey262
A Survey on Aspect-Based Sentiment Classification260
Diffusion Models: A Comprehensive Survey of Methods and Applications250
A Survey on Embedding Dynamic Graphs249
Demystify the Fuzzing Methods: A Comprehensive Survey248
A Review of Olfactory Display Designs for Virtual Reality Environments242
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges241
Transfer Learning in Sensor-Based Human Activity Recognition: A Survey240
Deep Learning Models for Serendipity Recommendations: A Survey and New Perspectives235
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions231
Personalization in Public Transport Passenger Information Systems: A Systematic Review and Framework224
How many FIDO protocols are needed? Analysing the technology, security and compliance221
Domain Generalization in Computational Pathology: Survey and Guidelines220
Bridging the Gap between Spatial and Spectral Domains: A Unified Framework for Graph Neural Networks217
Visual Tuning207
Text Classification Using Graph Convolutional Networks: A Comprehensive Survey205
State-of-the-Art and Challenges of Engineering ML- Enabled Software Systems in the Deep Learning Era198
A Survey on the State of the Art of Causally Consistent Cloud Systems197
Systematic Literature Review on Parallel Trajectory-based Metaheuristics195
A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos181
Explainability in Deep Reinforcement Learning: A Review into Current Methods and Applications180
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey179
On the Explainability of Natural Language Processing Deep Models178
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning170
Security and Privacy in Unified Communication169
ISP Meets Deep Learning: A Survey on Deep Learning Methods for Image Signal Processing166
Knowledge-based Cyber Physical Security at Smart Home: A Review164
A Survey on Virtual Network Functions for Media Streaming: Solutions and Future Challenges163
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey161
From Reactive to Active Sensing: A Survey on Information Gathering in Decision-theoretic Planning160
A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers159
A Practical Tutorial on Graph Neural Networks159
Dataset Discovery and Exploration: A Survey153
A Survey of Multi-modal Knowledge Graphs: Technologies and Trends150
A Survey of Security and Privacy Issues in V2X Communication Systems149
A Survey on Hypergraph Representation Learning147
Evolutionary Large-Scale Multi-Objective Optimization: A Survey146
A Survey and Taxonomy of Latency Compensation Techniques for Network Computer Games145
A Systematic Review of Cross-Lingual Sentiment Analysis: Tasks, Strategies, and Prospects144
A Contemporary Survey on Live Video Streaming from a Computation-Driven Perspective142
Multi-Class Imbalanced Data Handling with Concept Drift in Fog Computing: A Taxonomy, Review, and Future Directions141
A Survey on Synchronous Augmented, Virtual, andMixed Reality Remote Collaboration Systems139
Private Graph Data Release: A Survey138
Screen Content Quality Assessment: Overview, Benchmark, and Beyond135
From Perception to Computation: Revisiting Delay Optimization for Connected Autonomous Vehicles134
Class-Imbalanced Learning on Graphs: A Survey134
A Taxonomy and Survey on Grid-Based Routing Protocols Designed for Wireless Sensor Networks133
Visual Question Answering: A Survey of Methods, Datasets, Evaluation, and Challenges133
Distributed Scrum: A Case Meta-analysis132
State of Practical Applicability of Regression Testing Research: A Live Systematic Literature Review130
The Role of Multi-Agents in Digital Twin Implementation: Short Survey128
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities128
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems126
Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap126
Semantic Knowledge Graphs for the News: A Review125
Deep Learning on Monocular Object Pose Detection and Tracking: A Comprehensive Overview124
Eco-Friendly Route Planning Algorithms: Taxonomies, Literature Review and Future Directions124
A.I. Robustness: a Human-Centered Perspective on Technological Challenges and Opportunities124
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit123
Deep Generative Models for Therapeutic Peptide Discovery: A Comprehensive Review122
Deep Learning Library Testing: Definition, Methods and Challenges120
Cybersecurity of Industrial Cyber-Physical Systems: A Review120
Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey120
Private and Secure Distributed Deep Learning: A Survey118
A Systematic Literature Review on Multi-Robot Task Allocation117
Non-imaging Medical Data Synthesis for Trustworthy AI: A Comprehensive Survey116
Embedding Compression in Recommender Systems: A Survey116
FPGA/GPU-based Acceleration for Frequent Itemsets Mining: A Comprehensive Review115
A Review of Stability in Topic Modeling: Metrics for Assessing and Techniques for Improving Stability114
Deep Learning Methods for Abstract Visual Reasoning: A Survey on Raven's Progressive Matrices113
Machine Learning at the Network Edge: A Survey110
More than Privacy110
Adversary Models for Mobile Device Authentication109
A Survey of AI-enabled Dynamic Manufacturing Scheduling: From Directed Heuristics to Autonomous Learning109
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges107
Survey and Taxonomy of Adversarial Reconnaissance Techniques106
Heterogeneous Federated Learning: State-of-the-art and Research Challenges105
A Comprehensive Survey of Neural Architecture Search105
A Survey of Privacy Attacks in Machine Learning105
Knowledge Graph Embedding: A Survey from the Perspective of Representation Spaces104
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids103
A Survey of Tool Support for Working with Design Decisions in Code99
Computational Techniques in PET/CT Image Processing for Breast Cancer: A Systematic Mapping Review99
Mix-Zones as an Effective Privacy Enhancing Technique in Mobile and Vehicular Ad-hoc Networks99
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis98
Human Image Generation: A Comprehensive Survey97
Automatic Performance Assessment in Three-dimensional Interactive Haptic Medical Simulators: A Systematic Review97
IMPACTS Homeostasis Trust Management System: Optimizing Trust in Human-AI Teams93
Big Code Search: A Bibliography92
Heterogeneous Network Access and Fusion in Smart Factory: A Survey92
Natural Language–Based Conceptual Modelling Frameworks: State of the Art and Future Opportunities91
Deep Person Generation: A Survey from the Perspective of Face, Pose, and Cloth Synthesis91
Microarchitectural Attacks in Heterogeneous Systems: A Survey90
A Primer on Pretrained Multilingual Language Models89
Wireless Powered Mobile Edge Computing Networks: A Survey88
Aortic Vessel Tree Segmentation for Cardiovascular Diseases Treatment: Status Quo86
A Survey on Deep Learning for Human Mobility85
A Survey of Ambient Intelligence84
A Survey on Deep Learning for Symbolic Music Generation: Representations, Algorithms, Evaluations, and Challenges84
Machine Learning into Metaheuristics83
A Review on Tools, Mechanics, Benefits, and Challenges of Gamified Software Testing83
An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness83
Conversational Agents in Therapeutic Interventions for Neurodevelopmental Disorders: A Survey82
A Survey on Deep Learning for Human Activity Recognition81
Pushing the Level of Abstraction of Digital System Design: A Survey on How to Program FPGAs80
A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments79
Survey on Blockchain Networking79
A Survey on Deep Learning for Design and Generation of Virtual Architecture78
Racial Bias within Face Recognition: A Survey78
A Survey of Hardware Improvements to Secure Program Execution77
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques77
Recent Advances for Aerial Object Detection: A Survey75
Artificial Intelligence for Web 3.0: A Comprehensive Survey75
Data Mining on Smartphones: An Introduction and Survey73
Separation of Duty in Information Security73
FairSNA: Algorithmic Fairness in Social Network Analysis73
Survey of Approaches for Postprocessing of Static Analysis Alarms72
Honeyword-based Authentication Techniques for Protecting Passwords: A Survey71
A Survey on Deep Learning and Explainability for Automatic Report Generation from Medical Images71
Strategic Decisions: Survey, Taxonomy, and Future Directions from Artificial Intelligence Perspective71
Firmware Over-the-air Programming Techniques for IoT Networks - A Survey71
Hardware Information Flow Tracking71
A Brief Overview of Universal Sentence Representation Methods: A Linguistic View71
Cross-Chain Smart Contract Invocations: A Systematic Multi-Vocal Literature Review70
Self-calibration and Collaborative Localization for UWB Positioning Systems70
Federated Learning for Computationally Constrained Heterogeneous Devices: A Survey70
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms70
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT69
A Survey of Network-on-Chip Security Attacks and Countermeasures68
A survey of 3D Space Path-Planning Methods and Algorithms68
A Survey of Hardware-Based AES SBoxes: Area, Performance, and Security68
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking68
A Survey on Task Assignment in Crowdsourcing67
BFT in Blockchains: From Protocols to Use Cases67
Android Source Code Vulnerability Detection: A Systematic Literature Review66
Deep Learning for Time Series Classification and Extrinsic Regression: A Current Survey65
Emotion Ontology Studies: A Framework for Expressing Feelings Digitally and its Application to Sentiment Analysis65
Neural Network–Based Financial Volatility Forecasting: A Systematic Review65
Connect API with Blockchain: A Survey on Blockchain Oracle Implementation65
Fairness in Ranking, Part I: Score-Based Ranking65
A Comprehensive Survey of Few-shot Learning: Evolution, Applications, Challenges, and Opportunities64
Tackling Climate Change with Machine Learning64
Integration of Sensing, Communication, and Computing for Metaverse: A Survey64
A Survey on Generative Adversarial Networks: Variants, Applications, and Training64
Public Datasets for Cloud Computing: A Comprehensive Survey63
Automated Program Repair: Emerging Trends Pose and Expose Problems for Benchmarks63
3D Face Reconstruction: The Road to Forensics63
Distributed Machine Learning in Edge Computing: Challenges, Solutions and Future Directions61
A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks61
A Taxonomy of Live Migration Management in Cloud Computing61
Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: A Comprehensive Review61
A Knowledge Graph-Based Survey on Distributed Ledger Technology for IoT Verticals60
Survey on Redundancy Based-Fault tolerance methods for Processors and Hardware accelerators - Trends in Quantum Computing, Heterogeneous Systems and Reliability60
Computer-aided Design Techniques for Flow-based Microfluidic Lab-on-a-chip Systems60
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey60
Maintenance Operations on Cloud, Edge, and IoT Environments: Taxonomy, Survey, and Research Challenges59
Resource-Efficient Convolutional Networks: A Survey on Model-, Arithmetic-, and Implementation-Level Techniques58
Transforming Large-Size to Lightweight Deep Neural Networks for IoT Applications58
A Systematic Collection of Medical Image Datasets for Deep Learning58
Proof Scores: A Survey57
A Survey on Services Placement Algorithms in Integrated Cloud-Fog / Edge Computing57
Security and Privacy on Generative Data in AIGC: A Survey57
Energy-Efficient Database Systems: A Systematic Survey56
Explainable Deep Reinforcement Learning: State of the Art and Challenges56
Backdoor Attacks against Voice Recognition Systems: A Survey56
Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions56
AutoML to Date and Beyond: Challenges and Opportunities56
Software-Based Dialogue Systems: Survey, Taxonomy, and Challenges55
Camera Measurement of Physiological Vital Signs55
The Evolution of Distributed Systems for Graph Neural Networks and Their Origin in Graph Processing and Deep Learning: A Survey55
Video Generative Adversarial Networks: A Review55
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey55
Constructing Neural Network Based Models for Simulating Dynamical Systems54
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures54
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols54
Energy Efficient Computing Systems: Architectures, Abstractions and Modeling to Techniques and Standards54
From Anecdotal Evidence to Quantitative Evaluation Methods: A Systematic Review on Evaluating Explainable AI53
Lightweight Deep Learning for Resource-Constrained Environments: A Survey53
DevOps Metrics and KPIs: A Multivocal Literature Review53
Explainable Artificial Intelligence: Importance, Use Domains, Stages, Output Shapes, and Challenges53
The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A Survey53
A Survey on Mapping Semi-Structured Data and Graph Data to Relational Data53
From Detection to Application: Recent Advances in Understanding Scientific Tables and Figures53
Cryptographic Primitives in Script-based and Scriptless Payment Channel Networks: A Survey52
Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach52
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features51
A Survey of Next-generation Computing Technologies in Space-air-ground Integrated Networks51
A Comprehensive Review on Autonomous Navigation51
Toward Trustworthy Artificial Intelligence (TAI) in the Context of Explainability and Robustness51
Igniting Language Intelligence: The Hitchhiker’s Guide from Chain-of-Thought Reasoning to Language Agents51
A Systematic Review of Data Quality in CPS and IoT for Industry 4.051
A Survey of Deep Learning for Low-shot Object Detection50
A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT50
War on JITs: Software-Based Attacks and Hybrid Defenses for JIT Compilers - A Comprehensive Survey50
3D Scene Geometry Estimation from 360° Imagery: A Survey49
Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review49
A Joint Study of the Challenges, Opportunities, and Roadmap of MLOps and AIOps: A Systematic Survey48
Malware Detection with Artificial Intelligence: A Systematic Literature Review48
Towards Smart Education through Internet of Things: A Survey47
Optimization Techniques for GPU Programming47
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey47
A Survey and an Empirical Evaluation of Multi-View Clustering Approaches47
A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation, and Research Challenges46
Vehicle Trajectory Data Processing, Analytics, and Applications: A Survey46
A Comprehensive Review and New Taxonomy on Superpixel Segmentation46
Recent Advances of Differential Privacy in Centralized Deep Learning: A Systematic Survey46
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications46
Deep Multimodal Data Fusion46
Synthetic Data for Deep Learning in Computer Vision & Medical Imaging: A Means to Reduce Data Bias45
A Survey on Exploring Real and Virtual Social Network Rumors: State-of-the-Art and Research Challenges45
IoT Cloud Security Review45
A Survey on IoT Programming Platforms: A Business-Domain Experts Perspective45
Landscape of High-Performance Python to Develop Data Science and Machine Learning Applications45
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions44
A Generic Taxonomy for Steganography Methods44
A Systematic Literature Review of Novelty Detection in Data Streams: Challenges and Opportunities44
Guided Depth Map Super-Resolution: A Survey44
Computational Politeness in Natural Language Processing: A Survey44
Few-Shot Object Detection: A Survey44
A Survey on Recent Approaches to Question Difficulty Estimation from Text44
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN43
Mouse Dynamics Behavioral Biometrics: A Survey43
Deep Learning for Sensor-based Human Activity Recognition43
GraphQL: A Systematic Mapping Study43
A Survey on Perfectly Secure Verifiable Secret-sharing43
A Model and Survey of Distributed Data-Intensive Systems43
A Survey on Data-driven Software Vulnerability Assessment and Prioritization43
Deep Reinforcement Learning Verification: A Survey43
0.10589718818665