Computer Science Review

Papers
(The median citation count of Computer Science Review is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-01-01 to 2025-01-01.)
ArticleCitations
A survey on legal question–answering systems783
Smart Farming in Europe430
Editorial Board235
A survey on system level energy optimisation for MPSoCs in IoT and consumer electronics175
Influence decision models: From cooperative game theory to social network analysis163
A survey: When moving target defense meets game theory154
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey150
A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions134
PCG signals for biometric authentication systems: An in-depth review131
A comprehensive review on transformer network for natural and medical image analysis120
More than a framework: Sketching out technical enablers for natural language-based source code generation117
A survey of set accumulators for blockchain systems114
Content-driven music recommendation: Evolution, state of the art, and challenges109
Web service adaptation: A decade’s overview107
Blockchain verification and validation: Techniques, challenges, and research directions106
A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes105
Cloud services selection: A systematic review and future research directions100
Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges92
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises87
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations81
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis80
Editorial Board79
A comprehensive survey on deep learning based malware detection techniques76
Deep learning with the generative models for recommender systems: A survey72
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges68
Synthetic data generation: State of the art in health care domain64
Summarization of legal documents: Where are we now and the way forward63
Securing microservices and microservice architectures: A systematic mapping study63
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language62
Optimized traffic engineering in Software Defined Wireless Network based IoT (SDWN-IoT): State-of-the-art, research opportunities and challenges62
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review61
A comprehensive survey on authentication and privacy-preserving schemes in VANETs56
Modelling web-service uncertainty: The angel/daemon approach56
Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams54
Abelian combinatorics on words: A survey54
Research communities in cyber security: A comprehensive literature review53
A survey of low-latency transmission strategies in software defined networking51
Editorial Board48
Backbones-review: Feature extractor networks for deep learning and deep reinforcement learning approaches in computer vision48
Editorial Board47
Editorial Board47
Editorial Board46
Uncertainty in runtime verification: A survey46
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey46
Compactors for parameterized counting problems46
System security assurance: A systematic literature review45
A survey of lattice based expressive attribute based encryption44
A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services41
A survey on computation offloading in edge systems: From the perspective of deep reinforcement learning approaches41
Vision-based approaches towards person identification using gait40
The interaction design of 3D virtual humans: A survey40
Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review40
Editorial Board40
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions37
Private set intersection: A systematic literature review37
A systematic review of federated learning incentive mechanisms and associated security challenges36
The future of computing paradigms for medical and emergency applications35
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions33
A search for good pseudo-random number generators: Survey and empirical studies33
Advances in online handwritten recognition in the last decades32
State of the art on quality control for data streams: A systematic literature review31
Future FANET with application and enabling techniques: Anatomization and sustainability issues30
Survey on 3D face reconstruction from uncalibrated images29
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain29
Hybridizations of evolutionary algorithms with Large Neighborhood Search29
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing29
Landscape of IoT security29
A survey of multidisciplinary domains contributing to affective computing29
Editorial Board27
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications27
Editorial Board27
Some results of Maria Serna on strategic games: Complexity of equilibria and models26
Some algorithms under non-parametric framework versus an unsupervised approach26
Aiming at methods’ wider adoption: Applicability determinants and metrics24
Editorial Board24
Review of the use of human senses and capabilities in cryptography23
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions23
A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks23
A survey on GANs for computer vision: Recent research, analysis and taxonomy23
IoT systems modeling and performance evaluation23
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns21
Digital image watermarking using deep learning: A survey21
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges21
A systematic survey on fault-tolerant solutions for distributed data analytics: Taxonomy, comparison, and future directions21
Model-based joint analysis of safety and security:Survey and identification of gaps21
Blockchain-based recommender systems: Applications, challenges and future opportunities21
Malicious application detection in android — A systematic literature review20
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey20
Secret sharing: A comprehensive survey, taxonomy and applications20
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems18
Software as storytelling: A systematic literature review18
A survey of deep learning techniques for detecting and recognizing objects in complex environments17
AI-driven cluster-based routing protocols in WSNs: A survey of fuzzy heuristics, metaheuristics, and machine learning models17
A survey of blockchain, artificial intelligence, and edge computing for Web 3.017
A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions16
ISO/IEC quality standards for AI engineering16
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges15
A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges15
Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review14
A survey of data center consolidation in cloud computing systems13
Digital to quantum watermarking: A journey from past to present and into the future13
Addressing the challenges of modern DNS a comprehensive tutorial13
Comprehensive survey on resource allocation for edge-computing-enabled metaverse13
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet12
A systematic review on Deep Learning approaches for IoT security12
Comparative analysis of Android and iOS from security viewpoint11
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review11
Systematic review on weapon detection in surveillance footage through deep learning10
Role of machine learning in medical research: A survey10
Systematic literature review: Quantum machine learning and its applications10
How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management10
Mobile robot localization: Current challenges and future prospective9
Energy aware optimized clustering for hierarchical routing in wireless sensor network9
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)9
Energy price prediction using data-driven models: A decade review9
Cyber security training for critical infrastructure protection: A literature review9
Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey9
Anonymity on blockchain based e-cash protocols—A survey9
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review9
Auto-scaling mechanisms in serverless computing: A comprehensive review8
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions8
Research communities in cyber security vulnerability assessments: A comprehensive literature review8
A decade: Review of scene text detection methods8
0.12549495697021