ACM Computing Surveys

Papers
(The TQCC of ACM Computing Surveys is 35. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Characterization of Android Malwares and their families2016
Review and Analysis of FPGA and ASIC Implementations of NIST Lightweight Cryptography Finalists1604
Deep Learning Based Image Aesthetic Quality Assessment- A Review1456
Data Readiness for AI: A 360-Degree Survey1064
Testbeds and Evaluation Frameworks for Anomaly Detection within Built Environments: A Systematic Review998
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech738
A Systematic Survey on Android API Usage for Data-driven Analytics with Smartphones553
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey524
Semantic Data Integration and Querying: A Survey and Challenges485
Handling Iterations in Distributed Dataflow Systems479
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security476
Cryptographic Primitives in Script-based and Scriptless Payment Channel Networks: A Survey449
A Survey on the Unmanned Aircraft System Traffic Management396
A Survey of Heuristics for Profile and Wavefront Reductions362
Regulating Information and Network Security: Review and Challenges360
Human Induction in Machine Learning353
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions345
Towards Smart Education through Internet of Things: A Survey339
Counterfactual Explanations and Algorithmic Recourses for Machine Learning: A Review338
A Comprehensive Survey on Biclustering-based Collaborative Filtering329
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols307
A Survey of Binary Code Similarity295
Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review269
A Comprehensive Review on Group Re-identification in Surveillance Videos257
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance251
A Comprehensive Survey of Benchmarks for Improvement of Software's Non-Functional Properties246
A Survey on Speech Deepfake Detection238
ENDEMIC: End-to-End Network Disruptions – Examining Middleboxes, Issues, and Countermeasures – A Survey237
Adaptive Strategies in Enhancing Physical Layer Security: A Comprehensive Survey233
Social Media Identity Deception Detection230
Secure Robotics: Navigating Challenges at the Nexus of Safety, Trust, and Cybersecurity in Cyber-Physical Systems229
A Systematic Mapping Study on Quantum and Quantum-inspired Algorithms in Operations Research228
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective216
Deep Learning for Variable Renewable Energy: A Systematic Review214
A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review214
A Survey on Stability of Learning with Limited Labelled Data and its Sensitivity to the Effects of Randomness210
Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models205
Fuzzy Logic in Surveillance Big Video Data Analysis200
3D Brain and Heart Volume Generative Models: A Survey197
A Survey on Mapping Semi-Structured Data and Graph Data to Relational Data192
The Role of Formalism in System Requirements190
A Survey on Seismic Sensor based Target Detection, Localization, Identification, and Activity Recognition188
Redefining Counterfactual Explanations for Reinforcement Learning: Overview, Challenges and Opportunities180
Intelligent Edge-powered Data Reduction: A Systematic Literature Review177
Defect Categorization in Compilers: A Multi-vocal Literature Review174
A Systematic Review of Data Quality in CPS and IoT for Industry 4.0173
Vision-based Autonomous Vehicle Recognition173
A Survey of Approaches to Unobtrusive Sensing of Humans169
3D Scene Geometry Estimation from 360° Imagery: A Survey161
Self-tuning Database Systems: A Systematic Literature Review of Automatic Database Schema Design and Tuning161
Extensions of Fuzzy Cognitive Maps: A Systematic Review156
Approaches to Conflict-free Replicated Data Types155
A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications155
A Review of Olfactory Display Designs for Virtual Reality Environments152
Sentiment Analysis for the Natural Environment: A Systematic Review152
Left Ventricle Segmentation in Cardiac MR: A Systematic Mapping of the Past Decade148
Machine Learning with Confidential Computing: A Systematization of Knowledge147
Cognition in Software Engineering: A Taxonomy and Survey of a Half-Century of Research145
A Scoping Survey on Cross-reality Systems143
A Meta-Study of Software-Change Intentions141
Image and Video Coding Techniques for Ultra-low Latency141
Digital Food Sensing and Ingredient Analysis Techniques to Facilitate Human-Food Interface Designs140
Automatic Story Generation138
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice138
Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models137
Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey135
Lexical Complexity Prediction: An Overview134
Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems129
Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review129
A Survey of Threats to Research Literature-dependent Medical AI Solutions126
Machine Learning and Physics: A Survey of Integrated Models124
Demystify the Fuzzing Methods: A Comprehensive Survey122
Defenses to Membership Inference Attacks: A Survey122
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks122
Comprehensive and Comparative Analysis of QCA-based Circuit Designs for Next-generation Computation122
Early Detection of Bark Beetle Attack Using Remote Sensing and Machine Learning: A Review122
A Survey of Deep Learning for Low-shot Object Detection121
Assessing the Performance of Interactive Multiobjective Optimization Methods121
A Survey of Generative Adversarial Networks for Synthesizing Structured Electronic Health Records121
From Detection to Application: Recent Advances in Understanding Scientific Tables and Figures120
Toward Trustworthy Artificial Intelligence (TAI) in the Context of Explainability and Robustness117
Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines114
DevOps Metrics and KPIs: A Multivocal Literature Review114
The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A Survey114
A Comprehensive Review and New Taxonomy on Superpixel Segmentation114
A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures113
Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach112
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation112
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features112
Qualitative Approaches to Voice UX111
A Survey of Protocol Fuzzing111
Machine Learning for Detecting Data Exfiltration110
A Survey on String Constraint Solving109
Temporal Relation Extraction in Clinical Texts109
A Survey of Next-generation Computing Technologies in Space-air-ground Integrated Networks107
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges106
Survey on Haptic Feedback through Sensory Illusions in Interactive Systems105
Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review104
A Survey on Embedding Dynamic Graphs103
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning102
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware101
Gotta CAPTCHA ’Em All: A Survey of 20 Years of the Human-or-computer Dilemma99
Dimensionality Reduction Methods for Brain Imaging Data Analysis99
Probabilistic Rule Learning Systems98
Scarcity of Labels in Non-Stationary Data Streams: A Survey97
Neural Architecture Search Survey: A Hardware Perspective96
A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation, and Research Challenges96
A Survey of Computer Vision Technologies in Urban and Controlled-environment Agriculture95
Igniting Language Intelligence: The Hitchhiker’s Guide from Chain-of-Thought Reasoning to Language Agents92
A Comprehensive Review on IoT Marketplace Matchmaking: Approaches, Opportunities and Challenges92
Self-adaptive Federated Learning in Internet of Things Systems: A Review91
Explainable Deep Learning Methods in Medical Image Classification: A Survey90
A Comprehensive Survey and Taxonomy on Single Image Dehazing Based on Deep Learning90
A Systematic Review of API Evolution Literature89
Explainable Reinforcement Learning: A Survey and Comparative Review89
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT85
The Eye in Extended Reality: A Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality85
A Survey on Semi-supervised Learning for Delayed Partially Labelled Data Streams84
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries84
Optimization Techniques for GPU Programming83
Code Search: A Survey of Techniques for Finding Code82
Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement82
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey81
A Comprehensive Analysis of Explainable AI for Malware Hunting80
Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning79
A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations78
A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT78
Automated Analysis of Blood Smear Images for Leukemia Detection: A Comprehensive Review77
Utilizing BERT for Information Retrieval: Survey, Applications, Resources, and Challenges76
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges76
Malware Detection with Artificial Intelligence: A Systematic Literature Review76
Efficient Transformers: A Survey75
Brave New GES World: A Systematic Literature Review of Gestures and Referents in Gesture Elicitation Studies75
A Joint Study of the Challenges, Opportunities, and Roadmap of MLOps and AIOps: A Systematic Survey75
Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems74
Graph Neural Networks in Recommender Systems: A Survey74
Explainable AI (XAI): Core Ideas, Techniques, and Solutions73
Deep Learning for Medical Anomaly Detection – A Survey72
A Survey on Data-driven Network Intrusion Detection70
Survey on Digital Sovereignty and Identity: From Digitization to Digitalization70
A Survey and an Empirical Evaluation of Multi-View Clustering Approaches70
A Survey on Concept Drift in Process Mining69
Trojan Attacks and Countermeasures on Deep Neural Networks from Life-Cycle Perspective: A Review68
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions68
A Survey of Graph Neural Networks for Social Recommender Systems67
Principal Component Analysis67
Deep Multimodal Data Fusion67
A Comprehensive Survey of Privacy-preserving Federated Learning67
A Comprehensive Review on Autonomous Navigation67
Assuring the Machine Learning Lifecycle66
A Systematic Literature Review on Hardware Reliability Assessment Methods for Deep Neural Networks66
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences65
Transformers in Vision: A Survey65
A Survey on Aspect-Based Sentiment Classification65
Diffusion Models: A Comprehensive Survey of Methods and Applications65
A Review on Fairness in Machine Learning65
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better64
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions63
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications63
Trustworthy Artificial Intelligence: A Review63
Making Sense of Big Data in Intelligent Transportation Systems: Current Trends, Challenges and Future Directions62
Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey62
Efficient Automation of Neural Network Design: A Survey on Differentiable Neural Architecture Search62
Adversarial Patterns: Building Robust Android Malware Classifiers61
Personalization in Public Transport Passenger Information Systems: A Systematic Review and Framework61
I/O in Machine Learning Applications on HPC Systems: A 360-degree Survey61
Vehicle Trajectory Data Processing, Analytics, and Applications: A Survey61
Human Factors in Phishing Attacks: A Systematic Literature Review60
A Survey of mmWave Backscatter: Applications, Platforms, and Technologies60
A Survey on Resilience in the IoT59
A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective59
A Survey of Multi-modal Knowledge Graphs: Technologies and Trends58
Intelligent Wearable Systems: Opportunities and Challenges in Health and Sports58
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions57
A Survey of Privacy Vulnerabilities of Mobile Device Sensors57
A Survey on the Applications of Semi-supervised Learning to Cyber-security57
Security Threats, Countermeasures, and Challenges of Digital Supply Chains57
A Survey of Software Log Instrumentation55
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators55
Natural Language Processing Methods for Symbolic Music Generation and Information Retrieval: A Survey54
LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey54
A Survey on Exploring Real and Virtual Social Network Rumors: State-of-the-Art and Research Challenges54
Knowledge Distillation on Graphs: A Survey54
Topic-based Video Analysis54
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges53
Contactless Diseases Diagnoses Using Wireless Communication Sensing: Methods and Challenges Survey53
Security Assessment and Evaluation of VPNs: A Comprehensive Survey53
Private Graph Data Release: A Survey53
Deep Learning for Plant Identification and Disease Classification from Leaf Images: Multi-prediction Approaches53
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks53
Machine Learning in Metaverse Security: Current Solutions and Future Challenges52
A Survey of Multimodal Learning: Methods, Applications, and Future52
Towards a Better Understanding of Evaluating Trustworthiness in AI Systems52
Images in Space and Time52
Dynamic Testing Techniques of Non-functional Requirements in Mobile Apps: A Systematic Mapping Study52
An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools52
A Review on Trustworthiness of Digital Assistants for Personal Healthcare51
Deep Learning Models for Serendipity Recommendations: A Survey and New Perspectives51
Uncertainty-aware Decisions in Cloud Computing51
Recent Advances of Differential Privacy in Centralized Deep Learning: A Systematic Survey51
A Systematic Review of Cross-Lingual Sentiment Analysis: Tasks, Strategies, and Prospects51
Security and Privacy in Unified Communication51
A Survey on End-User Robot Programming51
Advancing SDN from OpenFlow to P4: A Survey51
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey50
Constraint Enforcement on Decision Trees: A Survey49
Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding49
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN49
A Survey on Voice Assistant Security: Attacks and Countermeasures49
Evolutionary Machine Learning: A Survey48
PLS-SEM for Software Engineering Research48
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey48
Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges48
Rearrangement Distance Problems: An updated survey48
Introduction to Special Issue on Trustworthy Artificial Intelligence (Part II)48
A Survey on Hypergraph Mining: Patterns, Tools, and Generators48
Deep Learning for Cross-Domain Few-Shot Visual Recognition: A Survey48
Deep Learning Approaches on Image Captioning: A Review47
Benchmarking Quantum Computers and the Impact of Quantum Noise46
A Survey on Automated Log Analysis for Reliability Engineering46
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions46
Software Visualizations to Analyze Memory Consumption: A Literature Review45
A Systematic Literature Review of Enterprise Architecture Evaluation Methods45
Knowledge-based Cyber Physical Security at Smart Home: A Review45
State of the Art and Potentialities of Graph-level Learning45
Socially Enhanced Situation Awareness from Microblogs Using Artificial Intelligence: A Survey45
A Systematic Review on Graph Neural Network-based Methods for Stock Market Forecasting45
SoK: Access Control Policy Generation from High-level Natural Language Requirements45
Synthetic Data for Deep Learning in Computer Vision & Medical Imaging: A Means to Reduce Data Bias44
Toward a Privacy-Preserving Face Recognition System: A Survey of Leakages and Solutions44
Macro Ethics Principles for Responsible AI Systems: Taxonomy and Directions44
Advancements in Federated Learning: Models, Methods, and Privacy44
A Survey on Perfectly Secure Verifiable Secret-sharing44
Mobility Trace Analysis for Intelligent Vehicular Networks43
A Survey of Oblivious Transfer Protocol43
A Review of Explainable Fashion Compatibility Modeling Methods43
40 Years of Designing Code Comprehension Experiments: A Systematic Mapping Study43
Survey on the Objectives of Recommender Systems: Measures, Solutions, Evaluation Methodology, and New Perspectives43
IoT Cloud Security Review43
Controllable Data Generation by Deep Learning: A Review43
Multi-Class Imbalanced Data Handling with Concept Drift in Fog Computing: A Taxonomy, Review, and Future Directions43
Explainability in Deep Reinforcement Learning: A Review into Current Methods and Applications43
A Survey of Text Watermarking in the Era of Large Language Models42
The Gap Between Trustworthy AI Research and Trustworthy Software Research: A Tertiary Study42
A Systematic Literature Review on the Influence of Enhanced Developer Experience on Developers' Productivity: Factors, Practices, and Recommendations41
A Survey and Taxonomy of Latency Compensation Techniques for Network Computer Games41
Gender Bias in Natural Language Processing and Computer Vision: A Comparative Survey41
Learning-based Artificial Intelligence Artwork: Methodology Taxonomy and Quality Evaluation40
A Survey on IoT Programming Platforms: A Business-Domain Experts Perspective40
A Review on the Use of Physiological Signals for Assessing Postoperative Pain40
0.07880711555481