ACM Computing Surveys

(The TQCC of ACM Computing Surveys is 68. The table below lists those papers that are above that threshold based on CrossRef citation counts. The publications cover those that have been published in the past four years, i.e., from 2019-03-01 to 2023-03-01.)
A Survey of Methods for Explaining Black Box Models1247
Deep Learning Based Recommender System532
A Survey on Deep Learning513
A Survey of Predictive Modeling on Imbalanced Domains483
Facial Expression Analysis under Partial Occlusion451
Security and Privacy on Blockchain340
A Survey on Homomorphic Encryption Schemes340
Detection and Resolution of Rumours in Social Media325
2D Euclidean distance transform algorithms316
A Comprehensive Survey of Deep Learning for Image Captioning274
A Survey on Automatic Detection of Hate Speech in Text265
A Survey of Machine Learning for Big Code and Naturalness249
A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration244
WiFi Sensing with Channel State Information241
Community Discovery in Dynamic Networks223
Machine Learning for Survival Analysis205
A Survey of Symbolic Execution Techniques204
The Evolution of Android Malware and Android Analysis Techniques202
Spatio-Temporal Data Mining195
Visual SLAM and Structure from Motion in Dynamic Environments194
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems185
Sequence-Aware Recommender Systems184
Demystifying Parallel and Distributed Deep Learning182
A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms180
Technical Privacy Metrics166
Metamorphic Testing166
Quality Control in Crowdsourcing162
Resource Management in Fog/Edge Computing158
Demystifying Arm TrustZone146
Automatic Software Repair146
Understanding Deep Learning Techniques for Image Segmentation143
A Manifesto for Future Generation Cloud Computing142
Multimedia Big Data Analytics141
Deep Learning for Biometrics140
Quality Evaluation of Solution Sets in Multiobjective Optimisation138
How Generative Adversarial Networks and Their Variants Work138
Privacy in mobile technology for personal healthcare133
A Survey of Random Forest Based Methods for Intrusion Detection Systems126
Graph Summarization Methods and Applications126
QoS-Aware Autonomic Resource Management in Cloud Computing124
Cooperative Heterogeneous Multi-Robot Systems119
Auto-Scaling Web Applications in Clouds117
Survey of Temporal Information Retrieval and Related Applications116
A Survey of DevOps Concepts and Challenges112
A Systematic Review on Imbalanced Data Challenges in Machine Learning111
Edge-Oriented Computing Paradigms111
A Survey on Gait Recognition110
Formal Specification and Verification of Autonomous Robotic Systems110
Towards the Decentralised Cloud108
Auctions and bidding107
A Perspective Analysis of Handwritten Signature Technology107
Analytics for the Internet of Things106
A Survey on Food Computing105
Toolflows for Mapping Convolutional Neural Networks on FPGAs101
A Survey on NoSQL Stores98
Dynamic Malware Analysis in the Modern Era—A State of the Art Survey96
FPGA Dynamic and Partial Reconfiguration93
Issues and Challenges of Load Balancing Techniques in Cloud Computing91
Underwater Wireless Sensor Networks91
Remote Data Auditing in Cloud Computing Environments88
Insight Into Insiders and IT87
Indoor Localization Improved by Spatial Context—A Survey87
Integrated NFV/SDN Architectures83
Edge Cloud Offloading Algorithms83
A Survey on Multidimensional Scaling82
Post-Quantum Lattice-Based Cryptography Implementations81
A Survey on Malicious Domains Detection through DNS Data Analysis81
A Survey on Compiler Autotuning using Machine Learning81
How Complex Is Your Classification Problem?80
Engagement in HCI78
Handcrafted and Deep Trackers71
A Survey of Coarse-Grained Reconfigurable Architecture and Design71
A Systematic Review of Cloud Modeling Languages70
Machine Learning Methods for Reliable Resource Provisioning in Edge-Cloud Computing69
Deep Neural Network Approximation for Custom Hardware69
HPC Cloud for Scientific and Business Applications68
A Survey on the Usage of Eye-Tracking in Computer Programming68