Computer Science Review

Papers
(The median citation count of Computer Science Review is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
Editorial Board841
A survey on system level energy optimisation for MPSoCs in IoT and consumer electronics430
Web service adaptation: A decade’s overview177
A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions176
A comprehensive review on transformer network for natural and medical image analysis175
More than a framework: Sketching out technical enablers for natural language-based source code generation160
A survey of set accumulators for blockchain systems150
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges124
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations123
Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges123
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture120
Editorial Board115
Editorial Board105
Deep learning with the generative models for recommender systems: A survey100
PCG signals for biometric authentication systems: An in-depth review96
Blockchain verification and validation: Techniques, challenges, and research directions87
A comprehensive survey on deep learning based malware detection techniques79
Synthetic data generation: State of the art in health care domain72
A survey: When moving target defense meets game theory71
A survey on legal question–answering systems66
Cloud services selection: A systematic review and future research directions63
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises62
Content-driven music recommendation: Evolution, state of the art, and challenges61
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey56
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis56
Optimized traffic engineering in Software Defined Wireless Network based IoT (SDWN-IoT): State-of-the-art, research opportunities and challenges55
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language48
A comprehensive survey on authentication and privacy-preserving schemes in VANETs47
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing46
A survey of lattice based expressive attribute based encryption46
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions46
Research communities in cyber security: A comprehensive literature review45
Editorial Board44
Editorial Board43
Editorial Board41
Editorial Board40
System security assurance: A systematic literature review40
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey40
A survey on computation offloading in edge systems: From the perspective of deep reinforcement learning approaches39
A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services38
Editorial Board37
The interaction design of 3D virtual humans: A survey37
Vision-based approaches towards person identification using gait35
A search for good pseudo-random number generators: Survey and empirical studies33
Private set intersection: A systematic literature review33
A survey of multidisciplinary domains contributing to affective computing31
Summarization of legal documents: Where are we now and the way forward30
Survey on 3D face reconstruction from uncalibrated images30
Landscape of IoT security29
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions29
The future of computing paradigms for medical and emergency applications29
A survey of low-latency transmission strategies in software defined networking29
Securing microservices and microservice architectures: A systematic mapping study27
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review26
Advances in online handwritten recognition in the last decades26
Abelian combinatorics on words: A survey25
State of the art on quality control for data streams: A systematic literature review24
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain23
Backbones-review: Feature extractor networks for deep learning and deep reinforcement learning approaches in computer vision23
A systematic review of federated learning incentive mechanisms and associated security challenges23
Uncertainty in runtime verification: A survey23
A systematic survey on fault-tolerant solutions for distributed data analytics: Taxonomy, comparison, and future directions21
Addressing the challenges of modern DNS a comprehensive tutorial21
Model-based joint analysis of safety and security:Survey and identification of gaps21
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges21
A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks20
Comprehensive survey on resource allocation for edge-computing-enabled metaverse20
From accuracy to approximation: A survey on approximate homomorphic encryption and its applications20
Cyber security training for critical infrastructure protection: A literature review18
A systematic review on Deep Learning approaches for IoT security17
Role of machine learning in medical research: A survey17
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges16
Hybridizations of evolutionary algorithms with Large Neighborhood Search16
Software as storytelling: A systematic literature review16
Mobile robot localization: Current challenges and future prospective15
Comparative analysis of Android and iOS from security viewpoint15
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications15
IoT systems modeling and performance evaluation14
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions13
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)13
Energy aware optimized clustering for hierarchical routing in wireless sensor network13
Anonymity on blockchain based e-cash protocols—A survey13
Blockchain-based recommender systems: Applications, challenges and future opportunities13
A survey on GANs for computer vision: Recent research, analysis and taxonomy12
A survey of deep learning techniques for detecting and recognizing objects in complex environments12
Secret sharing: A comprehensive survey, taxonomy and applications12
Digital image watermarking using deep learning: A survey12
ISO/IEC quality standards for AI engineering11
A survey of blockchain, artificial intelligence, and edge computing for Web 3.011
A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions11
AI-driven cluster-based routing protocols in WSNs: A survey of fuzzy heuristics, metaheuristics, and machine learning models11
A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges10
Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review10
Editorial Board9
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review9
Digital to quantum watermarking: A journey from past to present and into the future9
Systematic review on weapon detection in surveillance footage through deep learning8
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns8
Systematic literature review: Quantum machine learning and its applications8
Aiming at methods’ wider adoption: Applicability determinants and metrics8
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet8
Editorial Board8
Malicious application detection in android — A systematic literature review7
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems7
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey7
Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities7
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey7
Systematic analysis and review of path optimization techniques in WSN with mobile sink7
0.090370178222656