IEEE Transactions on Emerging Topics in Computing

Papers
(The median citation count of IEEE Transactions on Emerging Topics in Computing is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions302
Guest Editorial: Special Section on Emerging Trends and Computing Paradigms for Testing, Reliability and Security in Future VLSI Systems176
Front Cover139
Resource Allocation Optimization by Quantum Computing for Shared Use of Standalone IRS126
Table of Contents116
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING113
An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems91
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons87
Front Cover79
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware76
Exploiting Asymmetry in eDRAM Errors for Redundancy-Free Error-Tolerant Design69
A Flexible and Reliable RRAM-Based In-Memory Computing Architecture for Data-Intensive Applications67
Path-Based Delay Variation Models for Parallel-Prefix Adders63
Fast Multiple-Precision Integer Division Using Intel AVX-51260
COACH: Consistency Aware Check-Pointing for Nonvolatile Processor in Energy Harvesting Systems60
EXSCALATE: An Extreme-Scale Virtual Screening Platform for Drug Discovery Targeting Polypharmacology to Fight SARS-CoV-258
Table of Contents57
Key-Components for Digital Twin Modeling With Granularity: Use Case Car-as-a-Service55
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices54
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities53
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks53
Combined Symbol Error Correction and Spare Through-Silicon Vias for 3D Memories50
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning46
IEEE Transactions on Emerging Topics in Computing Information for Authors45
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning45
Table of Contents44
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects42
Special Section on “Emerging and Impacting Trends on Computer Arithmetic”42
2021 Index IEEE Transactions on Emerging Topics in Computing Vol. 941
Area-Time Efficient Hardware Implementation for Binary Ring-LWE Based Post-Quantum Cryptography41
Low-Power Real-Time Seizure Monitoring using AI-Assisted Sonification of Neonatal EEG39
FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning39
Pip-SW: Pipeline Architectures for Accelerating Smith-Waterman Algorithm on FPGA Platforms39
A Novel Prediction Technique for Federated Learning38
Sparse Logistic Maximum Likelihood Estimation for Optimal Well-Being Determinants38
Probabilistic Interpolation Recoder for Energy-Error-Product Efficient DBNs With p-Bit Devices37
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics37
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs37
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City36
DECC: Delay-Aware Edge-Cloud Collaboration for Accelerating DNN Inference35
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment35
Gate-Level Side-Channel Leakage Ranking With Architecture Correlation Analysis35
SenseHash: Computing on Sensor Values Mystified at the Origin32
Maximizing Social Influence With Minimum Information Alteration32
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility31
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition31
PISA: A Non-Volatile Processing-in-Sensor Accelerator for Imaging Systems30
Bounding the Round-Off Error of the Upwind Scheme for Advection29
Virtual Reality Simulation of a Quadrotor to Monitor Dependent People at Home28
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks28
FTxAC: Leveraging the Approximate Computing Paradigm in the Design of Fault-Tolerant Embedded Systems to Reduce Overheads28
A Technique for Approximate Communication in Network-on-Chips for Image Classification27
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption27
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs27
Towards Optimization of Privacy-Utility Trade-Off Using Similarity and Diversity Based Clustering26
An Interrelated Imitation Learning Method for Heterogeneous Drone Swarm Coordination26
On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems26
Proposal and Performance Evaluation of Information Diffusion Technique with Novel Virtual-Cell-Based Wi-Fi Direct25
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs25
Side-Channel Attack Analysis on In-Memory Computing Architectures24
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment24
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT24
Secure Data Sequence Query Framework Based on Multiple Fogs24
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks23
A Privacy Enforcing Framework for Data Streams on the Edge23
IEEE Transactions on Emerging Topics in Computing Information for Authors23
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement23
Distributed Indexing Schemes for K-Dominant Skyline Analytics on Uncertain Edge-IoT Data23
ARIS: Efficient Admitted Influence Maximizing in Large-Scale Networks Based on Valid Path Reverse Influence Sampling23
An Optimized Hardware Implementation of Modular Multiplication of Binary Ring LWE22
An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling22
Quantifying the Impact of Monolithic 3D (M3D) Integration on L1 Caches21
HREN: A Hybrid Reliable and Energy-Efficient Network-on-Chip Architecture21
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities20
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation20
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols20
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs20
Runtime System Support for CPS Software Rejuvenation20
A New Application for the Motor Rehabilitation at Home: Structure and Usability of Bal-App20
A Near-Sensor Processing Accelerator for Approximate Local Binary Pattern Networks20
Quantifying the Effects of Anonymization Techniques Over Micro-Databases19
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks18
Online Remaining Useful Lifetime Prediction Using Support Vector Regression18
PABLO: A Variation-Robust PIM Architecture for Bulk Bitwise Logical Operations in DRAM18
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy18
Efficient Ternary Logic Circuits Optimized by Ternary Arithmetic Algorithms18
Coupled Attention Networks for Multivariate Time Series Anomaly Detection18
AGSEI: Adaptive Graph Structure Estimation with Long-Tail Distributed Implicit Graphs18
The e-LocGov Model for Introducing e-Governance into Local Governments: An Estonian Case Study17
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs17
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks17
Guest Editorial Assistive Computing Technologies for Human Well-Being17
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting17
Reliability Evaluation and Fault Tolerant Design for KLL Sketches16
(In)Security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers16
Personalized Privacy-Preserving Framework for Cross-Silo Federated Learning16
Sparsity-Oriented MRAM-Centric Computing for Efficient Neural Network Inference15
Memristive Crossbar Array-Based Adversarial Defense Using Compression15
A virtual reality perceptual study of multi-Technique redirected walking method15
Rei: A Reconfigurable Interconnection Unit for Array-Based CNN Accelerators15
Graph Reconfigurable Pooling for Graph Representation Learning15
RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks15
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications15
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks15
A Survey of MRAM-Centric Computing: From Near Memory to In Memory15
Autonomous Scan Patterns for Laser Voltage Imaging15
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments14
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection14
The Self-Aware Information Processing Factory Paradigm for Mixed-Critical Multiprocessing14
BNN An Ideal Architecture for Acceleration With Resistive in Memory Computation14
Scheduling Coflows by Online Identification in Data Center Network14
Enabling Obfuscation Detection in Binary Software through eXplainable AI14
A Bio-inspired Implementation of A Sparse-learning Spike-based Hippocampus Memory Model14
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction14
Fair Influence Maximization in Social Networks: A Community-Based Evolutionary Algorithm14
A Design Framework for Hardware-Efficient Logarithmic Floating-Point Multipliers13
2021 Reviewers List13
Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications13
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING13
Extremely Energy-Efficient Non-Linear Function Approximation Framework Using Stochastic Superconductor Devices13
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud13
Engaging Primary and Secondary School Students in Computer Science Through Computational Thinking Training13
Engravings, Secrets, and Interpretability of Neural Networks12
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems12
A Binary-Activation, Multi-Level Weight RNN and Training Algorithm for ADC-/DAC-Free and Noise-Resilient Processing-in-Memory Inference With eNVM12
An Alternative Approach to Polynomial Modular Number System Internal Reduction12
An Experience Replay Method Based on Tree Structure for Reinforcement Learning12
Design Space Exploration of Stochastic Computing Architectures Implemented Using Integrated Optics12
Medical Systems Data Security and Biometric Authentication in Public Cloud Servers12
Deep Attentive Interest Collaborative Filtering for Recommender Systems12
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans12
IEEE Transactions on Emerging Topics in Computing Information for Authors11
XpulpNN: Enabling Energy Efficient and Flexible Inference of Quantized Neural Networks on RISC-V Based IoT End Nodes11
Table of Contents11
Reliability Risks Due to Faults Affecting Selectors of ReRAMs and Possible Solutions11
PLAM: A Posit Logarithm-Approximate Multiplier11
swMR: A Framework for Accelerating MapReduce Applications on Sunway Taihulight10
Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults’ Functional Profile10
A Lightweight Robust Logic Locking Technique to Thwart Sensitization and Cone-Based Attacks10
ALP: Alleviating CPU-Memory Data Movement Overheads in Memory-Centric Systems10
Manifold-Inspired Search-Based Algorithm for Automated Test Case Generation10
Advancement of Textual Answer Triggering: Cognitive Boosting10
A Pervasive Edge Computing Model for Proactive Intelligent Data Migration10
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization10
Dynamically Activated De-glaring and Detail- Recovery for Low-light Image Enhancement Directly on Smart Cameras10
PLSM: A Parallelized Liquid State Machine for Unintentional Action Detection10
Front Cover9
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks9
Algebraic attacks on block ciphers using quantum annealing9
A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays9
Area Efficient Skyrmion Logic based Approximate Adder Architecture Design Methodology9
IEEE Transactions on Emerging Topics in Computing Information for Authors9
A VLSI Digital Circuit Platform for Performing Deterministic Stochastic Computing in the Time Dimension Using Fraction Operations on Rational Numbers9
Deep Recommendation With Adversarial Training9
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme9
Collaborative Trajectory Mining in Smart-Homes to Support Early Diagnosis of Cognitive Decline9
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges9
3DL-PIM: A Look-Up Table Oriented Programmable Processing in Memory Architecture Based on the 3-D Stacked Memory for Data-Intensive Applications8
Deep Reinforcement Learning With Curriculum Design for Quantum State Classification8
Age of Information Optimization for Privacy-Preserving Mobile Crowdsensing8
DALTON - Deep Local Learning in SNNs via local Weights and Surrogate-Derivative Transfer8
A Low-Cost Wireless Body Area Network for Human Activity Recognition in Healthy Life and Medical Applications8
Cost-Effective Software Rejuvenation Combining Time-Based and Inspection-Based Policies8
Anatomy of On-Chip Memory Hardware Fault Effects Across the Layers8
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications8
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning7
Design and Analysis of Secure Emerging Crypto-Hardware Using HyperFET Devices7
ACBAM-Accuracy-Configurable Sign Inclusive Broken Array Booth Multiplier Design7
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring7
Front Cover7
IEEE Transactions on Emerging Topics in Computing Information for Authors7
Quantum-Inspired Differential Evolution with Decoding using Hashing for Efficient User Allocation in Edge Computing Environment7
Front Cover7
Leveraging Communicating UAVs for Emergency Vehicle Guidance in Urban Areas7
Deep Learning based Intelligent Tumor Analytics Framework for Quantitative Grading and Analyzing Cancer Metastasis: Case of Lymph Node Breast Cancer7
ReaLPrune: ReRAM Crossbar-Aware Lottery Ticket Pruning for CNNs7
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing7
Transformer-Based Graph Neural Networks for Outfit Generation7
IEEE Transactions on Emerging Topics in Computing Information for Authors7
Hardware-Aware DNN Compression via Diverse Pruning and Mixed-Precision Quantization7
Blockchain-Based Trust Management for Internet of Vehicles7
Darwin: A DRAM-Based Multi-Level Processing-in-Memory Architecture for Column-Oriented Database7
Spiker+: a framework for the generation of efficient Spiking Neural Networks FPGA accelerators for inference at the edge7
A Computing System for Discovering Causal Relationships Among Human Genes to Improve Drug Repositioning7
Guest Editorial Special Section on Applied Software Aging and Rejuvenation6
Guest Editorial: Special Section on New Frontiers in Computing for Next-Generation Healthcare Systems6
Parallel Computing for Multi-Objective Train Rescheduling6
Guest Editorial: Thematic Section on Applications of Emerging Computing Technologies in Smart Manufacturing and Industry 4.06
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks6
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING6
Table of Contents6
PESKEA: Anomaly Detection Framework for Profiling Kernel Event Attributes in Embedded Systems6
Reconfigurable and Dense Analog Circuit Design Using Two Terminal Resistive Memory6
Attacks Toward Wireless Network-on-Chip and Countermeasures6
CANNON: Communication-Aware Sparse Neural Network Optimization6
Enhancing Knowledge Reusability: A Distributed Multitask Machine Learning Approach6
Tight Bound on NewHope Failure Probability6
IEEE Transactions on Emerging Topics in Computing6
2022 Reviewers List*6
Joint Partial Offloading and Resource Allocation for Parked Vehicle-Assisted Multi-Access Edge Computing5
Polynomial Vault: A Secure and Robust Fingerprint based Authentication5
A Crowdsourcing-driven AI Model Design Framework to Public Health Policy-Adherence Assessment5
ARMOR: An Anti-Counterfeit Security Mechanism for Low Cost Radio Frequency Identification Systems5
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach5
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm5
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking5
Integrated Edge Computing and Blockchain: A General Medical Data Sharing Framework5
TampML: Tampering Attack Detection and Malicious Nodes Localization in NoC-based MPSoC5
Architecture Support for Bitslicing5
Dynamic Reconfiguration for Resilient State Estimation Against Cyber Attacks5
Toward Designing High-Speed Cost-Efficient Quantum Reversible Carry Select Adders5
Algorithm-Hardware Co-Design of Split-Radix Discrete Galois Transformation for KyberKEM5
BIC Codes: Bit Insertion-Based Constrained Codes With Error Correction for DNA Storage5
Performability of Service Chains with Rejuvenation: A Multidimensional Universal Generating Function Approach5
Transfer Learning Realized With Nonlinearly Transformed Input Space5
TCAM-GNN: A TCAM-Based Data Processing Strategy for GNN Over Sparse Graphs5
Guest Editorial: IEEE Transactions on Emerging Topics in Computing Thematic Section on Memory- Centric Designs: Processing-in-Memory, In-Memory Computing, and Near-Memory Computing for Real-World Appl5
A Graph-Incorporated Latent Factor Analysis Model for High-Dimensional and Sparse Data5
Efficient Crowdsourced Pareto-Optimal Queries Over Partial Orders With Quality Guarantee4
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems4
Frequency Estimation Mechanisms Under ϵδ-Utility-Optimized Local Differential Privacy4
Reduced Precision Redundancy for Reliable Processing of Data4
Goal and Elite-Data-Driven Anthropomorphic Learning for Streaming-Image Analytics4
PresQ: Discovery of Multidimensional Equally-Distributed Dependencies via Quasi-Cliques on Hypergraphs4
QuripfeNet: Quantum-Resistant IPFE-Based Neural Network4
A Comparative Analysis of Software Aging in Relational Database System Environments4
Edgeless-GNN: Unsupervised Representation Learning for Edgeless Nodes4
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems4
Defect and Fault Modeling Framework for STT-MRAM Testing4
A Statistical Gate Sizing Method for Timing Yield and Lifetime Reliability Optimization of Integrated Circuits4
Notice of Violation of IEEE Publication Principles: An Energy-Efficient Heterogeneous Memory Architecture for Future Dark Silicon Embedded Chip-Multiprocessors4
Live Wire – A Low-Complexity Body Channel Communication System for Landmark Identification4
X-RAFT: Improve RAFT Consensus To Make Blockchain Better Secure EdgeAI-Human-IoT Data4
Computing the Similarity Estimate Using Approximate Memory4
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network4
Graph Embedding Techniques for Predicting Missing Links in Biological Networks: An Empirical Evaluation4
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure against Side Channel Attack and its Complexity Verification4
Multi-Layer Personalized Federated Learning for Mitigating Biases in Student Predictive Analytics4
IoTility: Architectural Requirements for Enabling Health IoT Ecosystems4
Software Aging Prediction for Cloud Services Using a Gate Recurrent Unit Neural Network Model Based on Time Series Decomposition4
Indoor Geo-Indistinguishability: Adopting Differential Privacy for Indoor Location Data Protection4
Special Section on Community Detection in Time-Varying Information and Computing Networks: Theory, Models, and Applications4
Highly-Parallel FPGA Accelerator for Simulated Quantum Annealing4
Boosting Extra-Functional Code Reusability in Cyber-Physical Production Systems: The Error Handling Case Study4
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing4
Learning With Sharing: An Edge-Optimized Incremental Learning Method for Deep Neural Networks4
DT2CAM: A Decision Tree to Content Addressable Memory Framework3
Algorithms for Stochastically Rounded Elementary Arithmetic Operations in IEEE 754 Floating-Point Arithmetic3
A BF16 FMA is All You Need for DNN Training3
DICO: A Graph-DB Framework for Community Detection on Big Scholarly Data3
0.067198038101196