ACM Computing Surveys

Papers
(The TQCC of ACM Computing Surveys is 29. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Generalizing from a Few Examples1210
A Survey on Bias and Fairness in Machine Learning1110
Deep Learning for Anomaly Detection915
Transformers in Vision: A Survey821
Deep Learning--based Text Classification658
Pre-train, Prompt, and Predict: A Systematic Survey of Prompting Methods in Natural Language Processing486
A Survey of Fake News437
Knowledge Graphs397
A Survey of Deep Active Learning316
Survey of Hallucination in Natural Language Generation302
A Review on Outlier/Anomaly Detection in Time Series Data289
k-Nearest Neighbour Classifiers - A Tutorial264
The Creation and Detection of Deepfakes235
A Survey on Ethereum Systems Security215
A Survey on Session-based Recommender Systems205
A Survey on Blockchain Interoperability: Past, Present, and Future Trends202
A Comprehensive Survey of Neural Architecture Search200
Tackling Climate Change with Machine Learning199
Graph Neural Networks in Recommender Systems: A Survey199
Efficient Transformers: A Survey195
A Comprehensive Survey of Privacy-preserving Federated Learning195
A Deep Journey into Super-resolution191
Generative Adversarial Networks184
Deep Learning for Sensor-based Human Activity Recognition175
A Survey of Android Malware Detection with Deep Neural Models163
Federated Learning for Smart Healthcare: A Survey155
When Machine Learning Meets Privacy150
Generative Adversarial Networks (GANs)148
An Overview of Service Placement Problem in Fog and Edge Computing146
Reinforcement Learning in Healthcare: A Survey136
Machine Learning at the Network Edge: A Survey134
A Survey on Conversational Recommender Systems124
Trustworthy Artificial Intelligence: A Review118
A Survey of Network Virtualization Techniques for Internet of Things Using SDN and NFV118
Outlier Detection114
Hierarchical Reinforcement Learning113
Deep Learning-based Anomaly Detection in Cyber-physical Systems111
Application Management in Fog Computing Environments111
Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems111
Driver Emotion Recognition for Intelligent Vehicles108
A Review on Fairness in Machine Learning108
Evolution of Semantic Similarity—A Survey104
A Survey on Differential Privacy for Unstructured Data Content104
Quantum Key Distribution103
A Survey on Generative Adversarial Networks: Variants, Applications, and Training102
Generative Adversarial Networks in Computer Vision100
Recommender Systems Leveraging Multimedia Content97
Deep Learning for Medical Anomaly Detection – A Survey97
Text Recognition in the Wild94
Reinforcement Learning based Recommender Systems: A Survey92
A Survey on Data Augmentation for Text Classification92
Causality-based Feature Selection90
Assuring the Machine Learning Lifecycle90
Challenges in Deploying Machine Learning: A Survey of Case Studies89
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators88
Natural Language Processing for Requirements Engineering87
Explainable AI (XAI): Core Ideas, Techniques, and Solutions87
A Survey of Information Cascade Analysis86
A Survey on Trajectory Data Management, Analytics, and Learning85
A Survey on Adversarial Recommender Systems84
A Survey of Multilingual Neural Machine Translation84
Location Privacy-preserving Mechanisms in Location-based Services83
Trade-offs between Distributed Ledger Technology Characteristics83
Principal Component Analysis82
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain81
Generative Adversarial Networks for face generation: A survey80
Blockchain Technology for Cloud Storage80
Survey of Post-OCR Processing Approaches79
A Survey on Deep Learning for Human Mobility78
Screen Content Quality Assessment: Overview, Benchmark, and Beyond78
An Overview of End-to-End Entity Resolution for Big Data78
A Survey of Smart Contract Formal Specification and Verification77
Evolutionary Large-Scale Multi-Objective Optimization: A Survey77
Membership Inference Attacks on Machine Learning: A Survey76
Security and Privacy in IoT Using Machine Learning and Blockchain75
A Survey on Deep Learning for Human Activity Recognition75
Evolutionary Machine Learning: A Survey74
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey74
Named Entity Recognition and Relation Extraction74
Fashion Meets Computer Vision73
A Survey of Learning Causality with Data72
Voice in Human–Agent Interaction72
Diffusion Models: A Comprehensive Survey of Methods and Applications72
Anomaly Detection in Road Traffic Using Visual Surveillance71
Adversarial Examples on Object Recognition71
A Survey on Automated Log Analysis for Reliability Engineering71
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions70
Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics69
Topic Modeling Using Latent Dirichlet allocation68
A Survey of State-of-the-Art on Blockchains68
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better68
Cyberattacks and Countermeasures for In-Vehicle Networks68
EEG Based Emotion Recognition: A Tutorial and Review67
A Systematic Literature Review on Federated Machine Learning66
Smart Home Personal Assistants66
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions65
Machine Learning into Metaheuristics64
Parallel Genetic Algorithms64
Edge Computing with Artificial Intelligence: A Machine Learning Perspective64
Using Social Media for Mental Health Surveillance63
Fuzzing: A Survey for Roadmap63
The Hypervolume Indicator62
Recent Advances of Monocular 2D and 3D Human Pose Estimation: A Deep Learning Perspective62
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures61
Avoiding Overfitting: A Survey on Regularization Methods for Convolutional Neural Networks61
A Survey on Bayesian Deep Learning61
PLS-SEM for Software Engineering Research60
Towards Indistinguishable Augmented Reality60
Implementations in Machine Ethics60
Orchestration in Fog Computing: A Comprehensive Survey60
Machine Learning–based Cyber Attacks Targeting on Controlled Information58
A Survey on Applications of Artificial Intelligence in Fighting Against COVID-1957
D’ya Like DAGs? A Survey on Structure Learning and Causal Discovery57
AI in Finance: Challenges, Techniques, and Opportunities57
AutoML to Date and Beyond: Challenges and Opportunities56
Cybersecurity of Industrial Cyber-Physical Systems: A Review56
Attribute-based Encryption for Cloud Computing Access Control55
Generative Adversarial Networks in Time Series: A Systematic Literature Review54
A Survey on Automatic Parameter Tuning for Big Data Processing Systems53
Deep Learning for Source Code Modeling and Generation53
A Survey of Knowledge-enhanced Text Generation53
SDN Controllers52
A Survey of Reinforcement Learning Algorithms for Dynamically Varying Environments52
A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses52
Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s Perspective52
Deep Learning-based Face Super-resolution: A Survey52
Decentralised Learning in Federated Deployment Environments52
Trustworthy AI: From Principles to Practices52
Blockchain-enabled Federated Learning: A Survey52
A Survey of Binary Code Similarity52
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications51
Blockchains50
Serverless Computing: A Survey of Opportunities, Challenges, and Applications49
A Survey of IIoT Protocols49
A Survey of Machine Learning for Computer Architecture and Systems48
A Survey on Subgraph Counting47
The Evolution of Topic Modeling47
A Survey on Data-driven Network Intrusion Detection47
Recent Advances in Natural Language Processing via Large Pre-trained Language Models: A Survey47
The Programmable Data Plane46
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions46
The Future of False Information Detection on Social Media46
Understanding Optical Music Recognition46
From Anecdotal Evidence to Quantitative Evaluation Methods: A Systematic Review on Evaluating Explainable AI46
A Survey of Nature-Inspired Computing46
A Survey on Fuzzy Deep Neural Networks45
Deep Learning on Mobile and Embedded Devices45
Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example45
Resource Allocation and Task Scheduling in Fog Computing and Internet of Everything Environments: A Taxonomy, Review, and Future Directions45
Knowledge Tracing: A Survey45
Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications45
Self-calibration and Collaborative Localization for UWB Positioning Systems44
Kubernetes Scheduling: Taxonomy, Ongoing Issues and Challenges44
A Survey on IoT Big Data44
Security Vulnerabilities of SGX and Countermeasures43
Content Delivery Networks43
A Survey on Aspect-Based Sentiment Classification43
Edge-computing-driven Internet of Things: A Survey42
Security in Brain-Computer Interfaces42
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges42
Biometric Systems Utilising Health Data from Wearable Devices41
Survey on Blockchain Networking41
The Elements of End-to-end Deep Face Recognition: A Survey of Recent Advances41
Deep Learning for Time Series Forecasting: Tutorial and Literature Survey41
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges41
Post-hoc Interpretability for Neural NLP: A Survey40
Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues40
Application Domain-Based Overview of IoT Network Traffic Characteristics40
Object Detection Using Deep Learning Methods in Traffic Scenarios40
Face Image Quality Assessment: A Literature Survey40
A Comprehensive Survey of Few-shot Learning: Evolution, Applications, Challenges, and Opportunities40
Anomaly Detection and Failure Root Cause Analysis in (Micro) Service-Based Cloud Applications: A Survey40
A Survey on Trust Evaluation Based on Machine Learning39
The Serverless Computing Survey: A Technical Primer for Design Architecture39
Deep Learning-based Human Pose Estimation: A Survey39
Biomedical Question Answering: A Survey of Approaches and Challenges39
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures38
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN38
Coordination of Autonomous Vehicles38
A Survey on Embedding Dynamic Graphs38
Community Detection in Multiplex Networks38
The Application of the Blockchain Technology in Voting Systems38
The Eye in Extended Reality: A Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality37
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols37
A Survey on Active Deep Learning: From Model Driven to Data Driven37
Evaluating Recommender Systems: Survey and Framework36
Neural Machine Translation for Low-resource Languages: A Survey36
A Survey on Concept Drift in Process Mining36
Video Generative Adversarial Networks: A Review36
Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions36
A Taxonomy of Supervised Learning for IDSs in SCADA Environments36
Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding36
Computation Offloading and Retrieval for Vehicular Edge Computing35
A Holistic View on Resource Management in Serverless Computing Environments: Taxonomy and Future Directions35
Event Prediction in the Big Data Era35
Vehicle Trajectory Similarity35
A Survey on Renamings of Software Entities35
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education35
A Survey on Haptic Technologies for Mobile Augmented Reality34
Synchronous Transmissions in Low-Power Wireless34
Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges34
A Survey of Network-on-Chip Security Attacks and Countermeasures34
Big Data Systems34
Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap34
Five Facets of 6G: Research Challenges and Opportunities34
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning34
Deep AI Enabled Ubiquitous Wireless Sensing34
A Survey of Cybersecurity Certification for the Internet of Things34
A Survey on End-User Robot Programming34
Camera Measurement of Physiological Vital Signs33
Wireless Powered Mobile Edge Computing Networks: A Survey32
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions32
A Survey of Natural Language Generation32
A Survey on Deep Learning for Software Engineering32
Exploiting Errors for Efficiency32
Visual Affordance and Function Understanding32
Resource Management and Scheduling in Distributed Stream Processing Systems32
Scheduling IoT Applications in Edge and Fog Computing Environments: A Taxonomy and Future Directions32
Cyber-aggression, Cyberbullying, and Cyber-grooming31
Deep Learning on Monocular Object Pose Detection and Tracking: A Comprehensive Overview31
Gait Recognition Based on Deep Learning: A Survey31
Human Factors in Phishing Attacks: A Systematic Literature Review31
Level-5 Autonomous Driving—Are We There Yet? A Review of Research Literature31
A Survey on Resilience in the IoT31
Mobility Management in 5G-enabled Vehicular Networks30
Automated Text Simplification30
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography30
Uncertainty-aware Decisions in Cloud Computing30
A Survey on Document-level Neural Machine Translation30
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT30
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms29
A Taxonomy and Survey of Power Models and Power Modeling for Cloud Servers29
A Survey on Edge Performance Benchmarking29
Generative Adversarial Networks for Face Generation: A Survey29
Multi-core Devices for Safety-critical Systems29
Application Layer Denial-of-Service Attacks and Defense Mechanisms29
Open-world Machine Learning: Applications, Challenges, and Opportunities29
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey29
Multi-document Summarization via Deep Learning Techniques: A Survey29
Artificial Intelligence Security: Threats and Countermeasures29
Multimodality in VR: A Survey29
A Survey of Joint Intent Detection and Slot Filling Models in Natural Language Understanding29
A Survey of Blockchain Consensus Protocols29
0.071179866790771