ACM Computing Surveys

Papers
(The TQCC of ACM Computing Surveys is 33. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-07-01 to 2024-07-01.)
ArticleCitations
A Survey on Bias and Fairness in Machine Learning1323
Deep Learning for Anomaly Detection1042
Transformers in Vision: A Survey988
Deep Learning--based Text Classification733
Pre-train, Prompt, and Predict: A Systematic Survey of Prompting Methods in Natural Language Processing672
A Survey of Fake News475
Knowledge Graphs473
Survey of Hallucination in Natural Language Generation460
A Survey of Deep Active Learning387
A Review on Outlier/Anomaly Detection in Time Series Data339
k-Nearest Neighbour Classifiers - A Tutorial302
The Creation and Detection of Deepfakes273
Graph Neural Networks in Recommender Systems: A Survey268
Tackling Climate Change with Machine Learning248
A Comprehensive Survey of Neural Architecture Search241
A Comprehensive Survey of Privacy-preserving Federated Learning234
A Survey on Blockchain Interoperability: Past, Present, and Future Trends231
Efficient Transformers: A Survey227
A Survey on Session-based Recommender Systems226
Deep Learning for Sensor-based Human Activity Recognition198
Generative Adversarial Networks195
Federated Learning for Smart Healthcare: A Survey192
Generative Adversarial Networks (GANs)192
When Machine Learning Meets Privacy186
A Survey of Android Malware Detection with Deep Neural Models176
Reinforcement Learning in Healthcare: A Survey166
Trustworthy Artificial Intelligence: A Review165
Machine Learning at the Network Edge: A Survey155
A Review on Fairness in Machine Learning150
A Survey on Conversational Recommender Systems149
Diffusion Models: A Comprehensive Survey of Methods and Applications142
Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems135
Hierarchical Reinforcement Learning132
Challenges in Deploying Machine Learning: A Survey of Case Studies127
Deep Learning-based Anomaly Detection in Cyber-physical Systems125
Recent Advances in Natural Language Processing via Large Pre-trained Language Models: A Survey123
Explainable AI (XAI): Core Ideas, Techniques, and Solutions123
A Survey on Differential Privacy for Unstructured Data Content122
A Survey on Generative Adversarial Networks: Variants, Applications, and Training122
Deep Learning for Medical Anomaly Detection – A Survey121
Driver Emotion Recognition for Intelligent Vehicles119
Application Management in Fog Computing Environments119
Generative Adversarial Networks in Computer Vision118
Evolution of Semantic Similarity—A Survey118
Quantum Key Distribution116
A Survey on Data Augmentation for Text Classification113
Reinforcement Learning based Recommender Systems: A Survey110
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain108
Natural Language Processing for Requirements Engineering107
Recommender Systems Leveraging Multimedia Content107
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better105
Assuring the Machine Learning Lifecycle104
Text Recognition in the Wild104
Principal Component Analysis104
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators103
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey101
A Survey of Information Cascade Analysis101
Membership Inference Attacks on Machine Learning: A Survey101
A Survey on Trajectory Data Management, Analytics, and Learning99
Edge Computing with Artificial Intelligence: A Machine Learning Perspective98
A Survey on Adversarial Recommender Systems96
Screen Content Quality Assessment: Overview, Benchmark, and Beyond94
EEG Based Emotion Recognition: A Tutorial and Review93
Generative Adversarial Networks for face generation: A survey92
Causality-based Feature Selection92
Evolutionary Large-Scale Multi-Objective Optimization: A Survey90
Location Privacy-preserving Mechanisms in Location-based Services90
Avoiding Overfitting: A Survey on Regularization Methods for Convolutional Neural Networks89
Voice in Human–Agent Interaction88
A Survey on Deep Learning for Human Activity Recognition88
A Survey of Multilingual Neural Machine Translation88
Named Entity Recognition and Relation Extraction88
A Survey on Deep Learning for Human Mobility87
An Overview of End-to-End Entity Resolution for Big Data86
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions85
Survey of Post-OCR Processing Approaches85
A Survey of Smart Contract Formal Specification and Verification85
Evolutionary Machine Learning: A Survey85
Fashion Meets Computer Vision83
Trustworthy AI: From Principles to Practices83
A Survey on Automated Log Analysis for Reliability Engineering83
Security and Privacy in IoT Using Machine Learning and Blockchain83
Blockchain Technology for Cloud Storage82
From Anecdotal Evidence to Quantitative Evaluation Methods: A Systematic Review on Evaluating Explainable AI81
Machine Learning into Metaheuristics81
A Survey of Learning Causality with Data81
A Systematic Literature Review on Federated Machine Learning80
Fuzzing: A Survey for Roadmap80
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions80
Cyberattacks and Countermeasures for In-Vehicle Networks78
Topic Modeling Using Latent Dirichlet allocation78
Parallel Genetic Algorithms78
Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics77
Smart Home Personal Assistants77
Anomaly Detection in Road Traffic Using Visual Surveillance76
A Survey of State-of-the-Art on Blockchains75
Recent Advances of Monocular 2D and 3D Human Pose Estimation: A Deep Learning Perspective75
Generative Adversarial Networks in Time Series: A Systematic Literature Review75
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures75
A Comprehensive Survey of Few-shot Learning: Evolution, Applications, Challenges, and Opportunities74
Towards Indistinguishable Augmented Reality74
The Hypervolume Indicator74
Using Social Media for Mental Health Surveillance72
Orchestration in Fog Computing: A Comprehensive Survey72
Deep Learning-based Human Pose Estimation: A Survey71
AutoML to Date and Beyond: Challenges and Opportunities70
A Survey on Bayesian Deep Learning69
Cybersecurity of Industrial Cyber-Physical Systems: A Review69
Serverless Computing: A Survey of Opportunities, Challenges, and Applications69
AI in Finance: Challenges, Techniques, and Opportunities69
Knowledge Tracing: A Survey69
D’ya Like DAGs? A Survey on Structure Learning and Causal Discovery68
Blockchain-enabled Federated Learning: A Survey68
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions66
PLS-SEM for Software Engineering Research66
Implementations in Machine Ethics65
Attribute-based Encryption for Cloud Computing Access Control65
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications65
A Survey of Knowledge-enhanced Text Generation65
Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s Perspective64
A Survey of Machine Learning for Computer Architecture and Systems64
The Evolution of Topic Modeling64
Machine Learning–based Cyber Attacks Targeting on Controlled Information64
A Survey of Reinforcement Learning Algorithms for Dynamically Varying Environments62
Resource Allocation and Task Scheduling in Fog Computing and Internet of Everything Environments: A Taxonomy, Review, and Future Directions61
A Survey of Binary Code Similarity60
Kubernetes Scheduling: Taxonomy, Ongoing Issues and Challenges60
A Survey on Data-driven Network Intrusion Detection60
A Survey on Applications of Artificial Intelligence in Fighting Against COVID-1959
The Eye in Extended Reality: A Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality58
A Survey on Aspect-Based Sentiment Classification57
Anomaly Detection and Failure Root Cause Analysis in (Micro) Service-Based Cloud Applications: A Survey57
Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges57
Blockchains56
SDN Controllers56
Deep Learning-based Face Super-resolution: A Survey56
A Survey of Nature-Inspired Computing55
Edge-computing-driven Internet of Things: A Survey55
Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues54
Deep Learning for Time Series Forecasting: Tutorial and Literature Survey54
Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example54
The Serverless Computing Survey: A Technical Primer for Design Architecture53
Decentralised Learning in Federated Deployment Environments53
Evaluating Recommender Systems: Survey and Framework52
Post-hoc Interpretability for Neural NLP: A Survey52
Neural Machine Translation for Low-resource Languages: A Survey52
Self-calibration and Collaborative Localization for UWB Positioning Systems51
A Survey on Subgraph Counting51
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning51
The Elements of End-to-end Deep Face Recognition: A Survey of Recent Advances51
Understanding Optical Music Recognition51
A Survey on IoT Big Data51
The Future of False Information Detection on Social Media50
A Survey of Blockchain Consensus Protocols50
The Programmable Data Plane50
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges50
Deep Learning on Mobile and Embedded Devices50
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education50
A Survey on Active Deep Learning: From Model Driven to Data Driven49
A Survey on Deep Learning for Software Engineering49
Community Detection in Multiplex Networks49
Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications49
A Survey on Embedding Dynamic Graphs48
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN47
Five Facets of 6G: Research Challenges and Opportunities47
Multimodality in VR: A Survey47
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges47
AUC Maximization in the Era of Big Data and AI: A Survey46
Object Detection Using Deep Learning Methods in Traffic Scenarios46
A Survey on Concept Drift in Process Mining46
Survey on Blockchain Networking46
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols45
A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations45
Face Image Quality Assessment: A Literature Survey45
Security Vulnerabilities of SGX and Countermeasures45
Biometric Systems Utilising Health Data from Wearable Devices45
Vehicle Trajectory Similarity44
Biomedical Question Answering: A Survey of Approaches and Challenges44
Video Generative Adversarial Networks: A Review44
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures43
A Survey on End-User Robot Programming43
Security in Brain-Computer Interfaces43
Deep AI Enabled Ubiquitous Wireless Sensing43
Application Domain-Based Overview of IoT Network Traffic Characteristics43
Fairness in Machine Learning: A Survey43
Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions43
A Survey on Trust Evaluation Based on Machine Learning42
A Holistic View on Resource Management in Serverless Computing Environments: Taxonomy and Future Directions41
Artificial Intelligence Security: Threats and Countermeasures41
The Application of the Blockchain Technology in Voting Systems41
Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap41
Human Factors in Phishing Attacks: A Systematic Literature Review41
Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding40
Scheduling IoT Applications in Edge and Fog Computing Environments: A Taxonomy and Future Directions40
Wireless Powered Mobile Edge Computing Networks: A Survey40
A Survey of Controllable Text Generation Using Transformer-based Pre-trained Language Models40
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey40
Generative Adversarial Networks for Face Generation: A Survey40
Big Data Systems40
A Survey of Network-on-Chip Security Attacks and Countermeasures40
A Survey on Haptic Technologies for Mobile Augmented Reality40
Hardware Approximate Techniques for Deep Neural Network Accelerators: A Survey40
Deep Learning on Monocular Object Pose Detection and Tracking: A Comprehensive Overview39
Coordination of Autonomous Vehicles39
Open-world Machine Learning: Applications, Challenges, and Opportunities39
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions38
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges38
Camera Measurement of Physiological Vital Signs38
A Survey on Resilience in the IoT38
A Survey of Natural Language Generation38
SoK: Deep Learning-based Physical Side-channel Analysis37
Event Prediction in the Big Data Era37
Cyber-aggression, Cyberbullying, and Cyber-grooming37
Synchronous Transmissions in Low-Power Wireless37
Automated Text Simplification36
Path-Planning for Unmanned Aerial Vehicles with Environment Complexity Considerations: A Survey36
Visual Affordance and Function Understanding36
A Survey of Joint Intent Detection and Slot Filling Models in Natural Language Understanding35
Level-5 Autonomous Driving—Are We There Yet? A Review of Research Literature35
A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective35
A Survey on Document-level Neural Machine Translation35
Evolutionary Dynamic Multi-objective Optimisation: A Survey35
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey35
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT35
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms35
A Taxonomy and Survey of Power Models and Power Modeling for Cloud Servers35
Recurrent Neural Networks for Edge Intelligence35
A Survey of Cybersecurity Certification for the Internet of Things35
Computation Offloading and Retrieval for Vehicular Edge Computing35
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography34
Application Layer Denial-of-Service Attacks and Defense Mechanisms34
Self-Supervised Learning for Videos: A Survey34
Multi-core Devices for Safety-critical Systems34
A Survey on Measuring Cognitive Workload in Human-Computer Interaction34
Multi-document Summarization via Deep Learning Techniques: A Survey34
Connect API with Blockchain: A Survey on Blockchain Oracle Implementation34
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats34
A Survey on Edge Performance Benchmarking33
Recent Advances in Bayesian Optimization33
QA Dataset Explosion: A Taxonomy of NLP Resources for Question Answering and Reading Comprehension33
On the Edge of the Deployment: A Survey on Multi-access Edge Computing33
Uncertainty-aware Decisions in Cloud Computing33
Hardware Information Flow Tracking33
Gait Recognition Based on Deep Learning: A Survey33
0.10643291473389