Computer Science Review

Papers
(The TQCC of Computer Science Review is 39. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-08-01 to 2024-08-01.)
ArticleCitations
A survey on deep learning and its applications644
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)380
A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability236
Big data and IoT-based applications in smart environments: A systematic review217
Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions189
Integrating blockchain technology into the energy sector — from theory of blockchain to research and application of energy blockchain176
A comprehensive survey and analysis of generative models in machine learning161
Community detection in node-attributed social networks: A survey159
Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm149
A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews147
A critical overview of outlier detection methods144
A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy143
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations129
A comprehensive and systematic look up into deep learning based object detection techniques: A review125
How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management125
Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions124
Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019124
Smart Farming in Europe106
Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey106
Machine learning algorithms for social media analysis: A survey104
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review103
Context Aware Recommendation Systems: A review of the state of the art techniques101
A survey on privacy and security of Internet of Things100
Future FANET with application and enabling techniques: Anatomization and sustainability issues98
Role of machine learning in medical research: A survey96
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges88
Landscape of IoT security88
Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions87
Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future 80
Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation77
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges73
Intelligent food processing: Journey from artificial neural network to deep learning70
Improved node localization using K-means clustering for Wireless Sensor Networks68
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture68
Quantum walk and its application domains: A systematic review66
Asynchronous federated learning on heterogeneous devices: A survey65
Moving objects detection with a moving camera: A comprehensive review65
Neural Natural Language Processing for unstructured data in electronic health records: A review65
Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions64
A systematic review on Deep Learning approaches for IoT security63
Cyber security training for critical infrastructure protection: A literature review63
A comprehensive survey on deep learning based malware detection techniques62
Blockchain-based recommender systems: Applications, challenges and future opportunities62
Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review61
DevOps and software quality: A systematic mapping61
Blockchain technology in the energy sector: From basic research to real world applications60
Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks58
A survey of malware detection in Android apps: Recommendations and perspectives for future research55
Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades54
A survey of data center consolidation in cloud computing systems52
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions52
A comprehensive survey on authentication and privacy-preserving schemes in VANETs51
Energy price prediction using data-driven models: A decade review49
Multidisciplinary Pattern Recognition applications: A review48
When machine learning meets medical world: Current status and future challenges47
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions44
Network embedding: Taxonomies, frameworks and applications42
Malicious application detection in android — A systematic literature review42
Comparative analysis on cross-modal information retrieval: A review42
Securing microservices and microservice architectures: A systematic mapping study42
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey41
A survey of android application and malware hardening40
Ontology learning: Grand tour and challenges40
The importance of selecting clustering parameters in VANETs: A survey39
Energy aware optimized clustering for hierarchical routing in wireless sensor network39
A survey of privacy-preserving mechanisms for heterogeneous data types39
0.051055192947388