Computer Science Review

Papers
(The TQCC of Computer Science Review is 32. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-12-01 to 2024-12-01.)
ArticleCitations
A survey on deep learning and its applications739
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)430
Big data and IoT-based applications in smart environments: A systematic review235
A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews175
Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm163
A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy154
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations150
How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management134
Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019131
Machine learning algorithms for social media analysis: A survey120
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review117
Role of machine learning in medical research: A survey114
Smart Farming in Europe109
Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey107
Landscape of IoT security100
Future FANET with application and enabling techniques: Anatomization and sustainability issues100
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges93
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges92
Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future 87
Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation81
Asynchronous federated learning on heterogeneous devices: A survey80
A comprehensive survey on deep learning based malware detection techniques79
Quantum walk and its application domains: A systematic review76
Neural Natural Language Processing for unstructured data in electronic health records: A review72
Cyber security training for critical infrastructure protection: A literature review68
A systematic review on Deep Learning approaches for IoT security64
Blockchain technology in the energy sector: From basic research to real world applications63
Blockchain-based recommender systems: Applications, challenges and future opportunities63
Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks62
Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review62
A comprehensive survey on authentication and privacy-preserving schemes in VANETs58
A survey of malware detection in Android apps: Recommendations and perspectives for future research56
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions56
A survey of data center consolidation in cloud computing systems54
Energy price prediction using data-driven models: A decade review51
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey48
Securing microservices and microservice architectures: A systematic mapping study48
Comparative analysis on cross-modal information retrieval: A review46
Energy aware optimized clustering for hierarchical routing in wireless sensor network46
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions46
The importance of selecting clustering parameters in VANETs: A survey44
Adaptive user interfaces and universal usability through plasticity of user interface design44
Synthetic data generation: State of the art in health care domain43
Malicious application detection in android — A systematic literature review42
Ontology learning: Grand tour and challenges41
A survey of privacy-preserving mechanisms for heterogeneous data types41
New trends in influence maximization models40
Comparative analysis of Android and iOS from security viewpoint40
A survey of android application and malware hardening40
Survey on 3D face reconstruction from uncalibrated images40
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems39
A search for good pseudo-random number generators: Survey and empirical studies37
A survey on deep matrix factorizations37
Successors of PEGASIS protocol: A comprehensive survey36
A survey of outlier detection in high dimensional data streams36
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions35
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey34
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language33
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment33
Summarization of legal documents: Where are we now and the way forward32
0.048299789428711