Computer Science Review

Papers
(The median citation count of Computer Science Review is 15. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A survey on deep learning and its applications520
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)317
A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability209
Big data and IoT-based applications in smart environments: A systematic review196
Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions170
Integrating blockchain technology into the energy sector — from theory of blockchain to research and application of energy blockchain151
Community detection in node-attributed social networks: A survey133
Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm125
A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy123
A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews117
A comprehensive survey and analysis of generative models in machine learning117
A comprehensive and systematic look up into deep learning based object detection techniques: A review110
A critical overview of outlier detection methods107
How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management107
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations107
Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions104
Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019101
Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey95
Smart Farming in Europe91
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review90
A survey on privacy and security of Internet of Things88
Context Aware Recommendation Systems: A review of the state of the art techniques86
Future FANET with application and enabling techniques: Anatomization and sustainability issues86
Machine learning algorithms for social media analysis: A survey84
Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions83
Role of machine learning in medical research: A survey81
Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future 71
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges68
Intelligent food processing: Journey from artificial neural network to deep learning62
Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation61
Landscape of IoT security61
Improved node localization using K-means clustering for Wireless Sensor Networks60
Conversational agents in business: A systematic literature review and future research directions60
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture60
Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions54
A systematic review on Deep Learning approaches for IoT security54
Moving objects detection with a moving camera: A comprehensive review54
Blockchain technology in the energy sector: From basic research to real world applications54
DevOps and software quality: A systematic mapping53
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges53
Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review52
Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks51
Quantum walk and its application domains: A systematic review50
Blockchain-based recommender systems: Applications, challenges and future opportunities50
Cyber security training for critical infrastructure protection: A literature review48
Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades48
A survey of malware detection in Android apps: Recommendations and perspectives for future research47
A comprehensive survey on deep learning based malware detection techniques44
Neural Natural Language Processing for unstructured data in electronic health records: A review43
Homomorphic encryption systems statement: Trends and challenges43
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions42
Energy price prediction using data-driven models: A decade review42
Multidisciplinary Pattern Recognition applications: A review41
A survey of data center consolidation in cloud computing systems40
A comprehensive survey on authentication and privacy-preserving schemes in VANETs40
When machine learning meets medical world: Current status and future challenges40
Energy aware optimized clustering for hierarchical routing in wireless sensor network37
A survey of android application and malware hardening36
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions36
A survey of privacy-preserving mechanisms for heterogeneous data types36
Network embedding: Taxonomies, frameworks and applications36
Asynchronous federated learning on heterogeneous devices: A survey36
The importance of selecting clustering parameters in VANETs: A survey36
Ontology learning: Grand tour and challenges35
Securing microservices and microservice architectures: A systematic mapping study35
Comparative analysis on cross-modal information retrieval: A review35
Julia language in machine learning: Algorithms, applications, and open issues35
Multilayer network simplification: Approaches, models and methods34
Comparative analysis of Android and iOS from security viewpoint33
Survey on 3D face reconstruction from uncalibrated images33
Successors of PEGASIS protocol: A comprehensive survey33
New trends in influence maximization models32
Malicious application detection in android — A systematic literature review32
Adaptive user interfaces and universal usability through plasticity of user interface design31
A survey on deep matrix factorizations30
mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects30
Graph spanners: A tutorial review29
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey28
Motif discovery in networks: A survey28
Localization schemes for Underwater Acoustic Sensor Networks - A Review28
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art27
A search for good pseudo-random number generators: Survey and empirical studies26
A survey of outlier detection in high dimensional data streams26
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems26
Big networks: A survey25
A survey of live Virtual Machine migration techniques24
Summarization of legal documents: Where are we now and the way forward24
Affective recommender systems in the educational field. A systematic literature review23
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment23
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language23
Visual SLAM for underwater vehicles: A survey22
A survey of multidisciplinary domains contributing to affective computing22
Machine learning through the lens of e-commerce initiatives: An up-to-date systematic literature review22
A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes22
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions22
Synthetic data generation: State of the art in health care domain21
Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review21
Deep Learning Methods for Multi-Species Animal Re-identification and Tracking – a Survey21
Systematic analysis and review of path optimization techniques in WSN with mobile sink21
I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion20
Offline recognition of handwritten Indic scripts: A state-of-the-art survey and future perspectives20
Security of Power Line Communication systems: Issues, limitations and existing solutions20
Influence decision models: From cooperative game theory to social network analysis19
A review on specification evaluation of broadcasting routing protocols in VANET19
Automatic hand gesture recognition using hybrid meta-heuristic-based feature selection and classification with Dynamic Time Warping18
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey18
A review of using object-orientation properties of C++ for designing expert system in strategic planning18
Anonymity on blockchain based e-cash protocols—A survey17
Adaptive gamification in Collaborative systems, a systematic mapping study17
System security assurance: A systematic literature review17
Energy, performance and cost efficient cloud datacentres: A survey17
A survey of neighborhood construction algorithms for clustering and classifying data points16
Development of improved whale optimization-based FCM clustering for image watermarking16
Security in fog computing: A systematic review on issues, challenges and solutions16
Comprehensive analysis of embeddings and pre-training in NLP16
Event detection in online social network: Methodologies, state-of-art, and evolution16
Comparative study for 8 computational intelligence algorithms for human identification16
A survey of low-latency transmission strategies in software defined networking15
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review15
Arabic Machine Translation: A survey of the latest trends and challenges15
0.056607961654663