Computer Science Review

Papers
(The median citation count of Computer Science Review is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-10-01 to 2024-10-01.)
ArticleCitations
A survey on deep learning and its applications698
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)406
Big data and IoT-based applications in smart environments: A systematic review224
Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions197
A comprehensive survey and analysis of generative models in machine learning178
Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm163
A critical overview of outlier detection methods160
A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews159
A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy154
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations140
A comprehensive and systematic look up into deep learning based object detection techniques: A review132
Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019131
How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management129
Machine learning algorithms for social media analysis: A survey114
Smart Farming in Europe109
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review108
Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey107
Role of machine learning in medical research: A survey105
A survey on privacy and security of Internet of Things105
Future FANET with application and enabling techniques: Anatomization and sustainability issues100
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges92
Landscape of IoT security92
Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions88
Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation81
Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future 81
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges81
Asynchronous federated learning on heterogeneous devices: A survey77
Intelligent food processing: Journey from artificial neural network to deep learning75
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture73
Neural Natural Language Processing for unstructured data in electronic health records: A review72
A comprehensive survey on deep learning based malware detection techniques72
Moving objects detection with a moving camera: A comprehensive review69
Quantum walk and its application domains: A systematic review69
DevOps and software quality: A systematic mapping68
Cyber security training for critical infrastructure protection: A literature review67
Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions64
A systematic review on Deep Learning approaches for IoT security64
Blockchain-based recommender systems: Applications, challenges and future opportunities63
Blockchain technology in the energy sector: From basic research to real world applications63
Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review62
Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks62
A survey of malware detection in Android apps: Recommendations and perspectives for future research56
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions56
A survey of data center consolidation in cloud computing systems54
A comprehensive survey on authentication and privacy-preserving schemes in VANETs54
Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades54
Energy price prediction using data-driven models: A decade review51
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey48
Securing microservices and microservice architectures: A systematic mapping study48
Comparative analysis on cross-modal information retrieval: A review46
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions46
Adaptive user interfaces and universal usability through plasticity of user interface design44
Network embedding: Taxonomies, frameworks and applications44
Energy aware optimized clustering for hierarchical routing in wireless sensor network43
Malicious application detection in android — A systematic literature review42
The importance of selecting clustering parameters in VANETs: A survey42
Ontology learning: Grand tour and challenges41
A survey of android application and malware hardening40
Survey on 3D face reconstruction from uncalibrated images40
New trends in influence maximization models40
A survey of privacy-preserving mechanisms for heterogeneous data types40
Comparative analysis of Android and iOS from security viewpoint40
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems39
A search for good pseudo-random number generators: Survey and empirical studies37
A survey on deep matrix factorizations37
Successors of PEGASIS protocol: A comprehensive survey36
Synthetic data generation: State of the art in health care domain36
A survey of outlier detection in high dimensional data streams36
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions35
mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects34
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey34
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment33
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language33
Summarization of legal documents: Where are we now and the way forward32
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art30
Systematic analysis and review of path optimization techniques in WSN with mobile sink29
Machine learning through the lens of e-commerce initiatives: An up-to-date systematic literature review29
A survey of multidisciplinary domains contributing to affective computing29
Security of Power Line Communication systems: Issues, limitations and existing solutions29
A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes29
Affective recommender systems in the educational field. A systematic literature review28
A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions27
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions27
Visual SLAM for underwater vehicles: A survey27
A survey of live Virtual Machine migration techniques27
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review26
Deep Learning Methods for Multi-Species Animal Re-identification and Tracking – a Survey25
Energy, performance and cost efficient cloud datacentres: A survey24
Anonymity on blockchain based e-cash protocols—A survey24
Influence decision models: From cooperative game theory to social network analysis24
Automatic hand gesture recognition using hybrid meta-heuristic-based feature selection and classification with Dynamic Time Warping23
Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review23
A review on specification evaluation of broadcasting routing protocols in VANET23
Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges23
Offline recognition of handwritten Indic scripts: A state-of-the-art survey and future perspectives22
Event detection in online social network: Methodologies, state-of-art, and evolution21
A survey on GANs for computer vision: Recent research, analysis and taxonomy21
Facial expression and body gesture emotion recognition: A systematic review on the use of visual data in affective computing21
Adaptive gamification in Collaborative systems, a systematic mapping study21
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns21
System security assurance: A systematic literature review20
Security in fog computing: A systematic review on issues, challenges and solutions20
Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams20
Systematic literature review: Quantum machine learning and its applications20
Comprehensive analysis of embeddings and pre-training in NLP19
Beyond linear subspace clustering: A comparative study of nonlinear manifold clustering algorithms18
Arabic Machine Translation: A survey of the latest trends and challenges18
A review of IoT security and privacy using decentralized blockchain techniques18
A survey of low-latency transmission strategies in software defined networking18
Vision-based approaches towards person identification using gait17
A survey of neighborhood construction algorithms for clustering and classifying data points17
A survey on system level energy optimisation for MPSoCs in IoT and consumer electronics17
A comprehensive study of simulation frameworks and research directions in fog computing17
Advances in online handwritten recognition in the last decades16
Deep learning for unmanned aerial vehicles detection: A review16
Taxonomy, state-of-the-art, challenges and applications of visual understanding: A review15
Research communities in cyber security: A comprehensive literature review15
Neurological and physiological measures to evaluate the usability and user-experience (UX) of information systems: A systematic literature review15
Cloud services selection: A systematic review and future research directions13
Aspect based sentiment analysis using deep learning approaches: A survey13
A decade: Review of scene text detection methods13
Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review12
A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation12
Software as storytelling: A systematic literature review12
0.88163089752197