Computer Science Review

Papers
(The median citation count of Computer Science Review is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
Editorial Board190
Characterising harmful API uses and repair techniques: Insights from a systematic review185
Blockchain verification and validation: Techniques, challenges, and research directions182
The ML-based sensor data deception targeting cyber–physical systems: A review170
A comprehensive review of usage control frameworks153
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture153
Editorial Board117
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review114
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language114
A systematic review of federated learning incentive mechanisms and associated security challenges114
Non-square grids: A new trend in imaging and modeling?100
A search for good pseudo-random number generators: Survey and empirical studies97
Research communities in cyber security: A comprehensive literature review89
Model-based joint analysis of safety and security:Survey and identification of gaps84
A survey of blockchain, artificial intelligence, and edge computing for Web 3.082
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications67
A survey of deep learning techniques for detecting and recognizing objects in complex environments67
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems66
Software as storytelling: A systematic literature review66
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges66
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review66
Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques65
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey64
A decade: Review of scene text detection methods63
Auto-scaling mechanisms in serverless computing: A comprehensive review61
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions58
WebAssembly and security: A review57
Adding relevance to rigor: Assessing the contributions of SLRs in Software Engineering through Citation Context Analysis54
A survey on deep matrix factorizations49
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives49
Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions45
Negative selection in anomaly detection—A survey45
Reproducibility, Replicability and Repeatability: A survey of reproducible research with a focus on high performance computing43
Towards data augmentation in graph neural network: An overview and evaluation42
Future of cyberspace: A critical review of standard security protocols in the post-quantum era40
Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions40
Review of Distributed Quantum Computing: From single QPU to High Performance Quantum Computing37
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis37
Ontology learning towards expressiveness: A survey37
A comprehensive survey on deep learning based malware detection techniques36
Editorial Board34
A survey of set accumulators for blockchain systems34
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey34
Editorial Board33
A survey of lattice based expressive attribute based encryption33
Advances in online handwritten recognition in the last decades33
The future of computing paradigms for medical and emergency applications33
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions32
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions31
A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions31
Addressing the challenges of modern DNS a comprehensive tutorial31
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey30
Editorial Board30
Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages30
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet29
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns28
A survey on GANs for computer vision: Recent research, analysis and taxonomy26
A systematic review of quantum image processing: Representation, applications and future perspectives26
Secure storage—Confidentiality and authentication23
Comprehensive survey of the solving puzzle problems23
Knowledge graph representation learning: A comprehensive and experimental overview22
A survey on algorithms for Nash equilibria in finite normal-form games22
Multimodal missing data in healthcare: A comprehensive review and future directions21
Image processing and artificial intelligence for apple detection and localization: A comprehensive review21
Intelligent visual analytics for food safety: A comprehensive review21
Facial expression and body gesture emotion recognition: A systematic review on the use of visual data in affective computing21
Design practices in visualization driven data exploration for non-expert audiences20
DDoS attacks & defense mechanisms in SDN-enabled cloud: Taxonomy, review and research challenges20
Defense strategies for Adversarial Machine Learning: A survey20
Offloading decision and resource allocation in aerial computing: A comprehensive survey19
Editorial Board19
Task scheduling in fog environment — Challenges, tools & methodologies: A review19
A systematic literature review on the use of machine learning in code clone research18
Parameterized analysis and crossing minimization problems18
A comprehensive survey of golden jacal optimization and its applications18
Editorial Board17
Editorial Board17
A survey on detecting mental disorders with natural language processing: Literature review, trends and challenges17
A comprehensive review on applications of Raspberry Pi17
Advances in attention mechanisms for medical image segmentation15
Deep learning for unmanned aerial vehicles detection: A review15
A systematic literature review on chaotic maps-based image security techniques15
Virtual Customer Assistants in finance: From state of the art and practices to design guidelines15
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey14
A systematic review on cover selection methods for steganography: Trend analysis, novel classification and analysis of the elements13
Secret sharing: A comprehensive survey, taxonomy and applications13
Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges13
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing13
Advancing smart transportation: A review of computer vision and photogrammetry in learning-based dimensional road pavement defect detection13
State of the art on quality control for data streams: A systematic literature review13
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges13
Editorial Board13
Digital to quantum watermarking: A journey from past to present and into the future12
Multiple clusterings: Recent advances and perspectives12
Harnessing Heterogeneous Information Networks: A systematic literature review12
Towards accessible chart visualizations for the non-visuals: Research, applications and gaps12
Research communities in cyber security vulnerability assessments: A comprehensive literature review12
Unsupervised affinity learning based on manifold analysis for image retrieval: A survey12
Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities11
Integrating Explainable AI with Federated Learning for Next-Generation IoT: A comprehensive review and prospective insights11
An empirical investigation of task scheduling and VM consolidation schemes in cloud environment10
An inclusive analysis for performance and efficiency of graph neural network models for node classification10
Graph-based deep learning techniques for remote sensing applications: Techniques, taxonomy, and applications — A comprehensive review10
A survey on the Distributed Computing stack10
Neural Natural Language Processing for unstructured data in electronic health records: A review10
0.20109915733337