IEEE Transactions on Emerging Topics in Computing

Papers
(The median citation count of IEEE Transactions on Emerging Topics in Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Smart Resource Allocation for Mobile Edge Computing: A Deep Reinforcement Learning Approach256
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City164
Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT158
Removal Attacks on Logic Locking and Camouflaging Techniques148
Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection120
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services102
A Mental Health Chatbot for Regulating Emotions (SERMO) - Concept and Usability Test88
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence88
Academic Influence Aware and Multidimensional Network Analysis for Research Collaboration Navigation Based on Scholarly Big Data88
Minimizing Convergecast Time and Energy Consumption in Green Internet of Things85
Blockchain Mutability: Challenges and Proposed Solutions83
A Survey of Incentive Mechanism Design for Federated Learning81
An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems75
Leveraging Communicating UAVs for Emergency Vehicle Guidance in Urban Areas74
Exploring Research in Blockchain for Healthcare and a Roadmap for the Future70
Radiation Hardened Latch Designs for Double and Triple Node Upsets69
Novel Low Cost, Double-and-Triple-Node-Upset-Tolerant Latch Designs for Nano-scale CMOS68
HCP: Heterogeneous Computing Platform for Federated Learning Based Collaborative Content Caching Towards 6G Networks66
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage61
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs60
Sway: Traffic-Aware QoS Routing in Software-Defined IoT60
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing57
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs55
Edge Cloud Server Deployment With Transmission Power Control Through Machine Learning for 6G Internet of Things54
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme51
Blockchain-Based Trust Management for Internet of Vehicles51
VOPRec: Vector Representation Learning of Papers with Text Information and Structural Identity for Recommendation49
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments49
Design and Analysis of Majority Logic-Based Approximate Adders and Multipliers46
Online Fall Detection Using Recurrent Neural Networks on Smart Wearable Devices45
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition43
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts40
A Novel TDMA-Based Fault Tolerance Technique for the TSVs in 3D-ICs Using Honeycomb Topology39
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment39
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network39
A Quantum Mechanics-Based Framework for EEG Signal Feature Extraction and Classification38
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network38
A Comparative Study of Virtual Reality Methods of Interaction and Locomotion Based on Presence, Cybersickness, and Usability37
Surrogate-Assisted Evolutionary Framework with Adaptive Knowledge Transfer for Multi-Task Optimization37
RDAM: A Reinforcement Learning Based Dynamic Attribute Matrix Representation for Virtual Network Embedding36
The Effects of Approximate Multiplication on Convolutional Neural Networks35
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes34
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy34
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks34
A Flip-Flop Based Arbiter Physical Unclonable Function (APUF) Design with High Entropy and Uniqueness for FPGA Implementation33
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data33
Quantum Circuit Designs of Integer Division Optimizing T-count and T-depth32
SEARE: A System for Exercise Activity Recognition and Quality Evaluation Based on Green Sensing32
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons31
Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter31
A Novel Bio-Inspired Approach for High-Performance Management in Service-Oriented Networks30
Graph Learning for Cognitive Digital Twins in Manufacturing Systems29
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation29
A 3.3 Gbps CCSDS 123.0-B-1 Multispectral & Hyperspectral Image Compression Hardware Accelerator on a Space-Grade SRAM FPGA29
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment29
Community Detection by Fuzzy Relations28
Time-Bounded Activity Recognition for Ambient Assisted Living28
Cyber-Enabled Well-Being Oriented Daily Living Support Based on Personal Data Analysis28
StreamFlow: Cross-Breeding Cloud With HPC28
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing26
DICO: A Graph-DB Framework for Community Detection on Big Scholarly Data26
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs26
Weird Machines, Exploitability, and Provable Unexploitability25
Scalable Design Methodology and Online Algorithm for TSV-Cluster Defects Recovery in Highly Reliable 3D-NoC Systems25
Lightweight Privacy-Preserving Raw Data Publishing Scheme24
A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips24
Automatic Signature Verification in the Mobile Cloud Scenario: Survey and Way Ahead24
A Machine-Learning Model for Automatic Detection of Movement Compensations in Stroke Patients23
ScanSAT: Unlocking Static and Dynamic Scan Obfuscation23
Privacy-Preserving Deep Learning NLP Models for Cancer Registries23
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning23
Secrecy Driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization22
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers22
High Quality Down-Sampling for Deterministic Approaches to Stochastic Computing21
Design of Anonymous Endorsement System in Hyperledger Fabric21
A Novel Quantum-Inspired Fuzzy Based Neural Network for Data Classification21
Reformative Noise-Immune Neural Network for Equality-Constrained Optimization Applied to Image Target Detection21
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks21
Defect and Fault Modeling Framework for STT-MRAM Testing20
Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems20
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework20
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks19
XpulpNN: Enabling Energy Efficient and Flexible Inference of Quantized Neural Networks on RISC-V Based IoT End Nodes19
A Blockchain-Powered Decentralized and Secure Computing Paradigm19
SDLSC-TA: Subarea Division Learning Based Task Allocation in Sparse Mobile Crowdsensing19
PLAM: A Posit Logarithm-Approximate Multiplier19
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability19
Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images19
Secure Data Sequence Query Framework Based on Multiple Fogs19
Skeleton-Based Action Segmentation With Multi-Stage Spatial-Temporal Graph Convolutional Neural Networks18
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring18
FarSight: Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes18
Highly-Parallel FPGA Accelerator for Simulated Quantum Annealing18
DiabDeep: Pervasive Diabetes Diagnosis Based on Wearable Medical Sensors and Efficient Neural Networks18
Energy- and Quality-Efficient Approximate Multipliers for Neural Network and Image Processing Applications18
Fast and Robust UAV to UAV Detection and Tracking From Video17
The Role of Explainability in Assuring Safety of Machine Learning in Healthcare17
Collaborative Trajectory Mining in Smart-Homes to Support Early Diagnosis of Cognitive Decline17
First Tests of a New Facility for Device-Level, Board-Level and System-Level Neutron Irradiation of Microelectronics17
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols17
A Service-based Joint Model Used for Distributed Learning: Application for Smart Agriculture16
Detection and Threat Prioritization of Pivoting Attacks in Large Networks16
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications16
Authenticated Data Redaction with Fine-Grained Control16
Value of Information Based Sensor Ranking for Efficient Sensor Service Allocation in Service Oriented Wireless Sensor Networks16
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing16
A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data15
DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems15
LEXACT: Low Energy N-Modular Redundancy Using Approximate Computing for Real-Time Multicore Processors15
I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis15
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain15
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems15
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects15
Fast Networking for Disaster Recovery14
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking14
Polynomial Vault: A Secure and Robust Fingerprint based Authentication14
Quantifying the Impact of Monolithic 3D (M3D) Integration on L1 Caches14
SPRING: A Sparsity-Aware Reduced-Precision Monolithic 3D CNN Accelerator Architecture for Training and Inference14
Approximate Recursive Multipliers Using Low Power Building Blocks14
ARMOR: An Anti-Counterfeit Security Mechanism for Low Cost Radio Frequency Identification Systems14
The e-LocGov Model for Introducing e-Governance into Local Governments: An Estonian Case Study14
Detection of Limited Magnitude Errors in Emerging Multilevel Cell Memories by One-Bit Parity (OBP) or Two-Bit Parity (TBP)14
Incremental Learning Using a Grow-and-Prune Paradigm With Efficient Neural Networks14
Mitigating Process Variability for Non-Volatile Cache Resilience and Yield14
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases14
Low-Energy Acceleration of Binarized Convolutional Neural Networks Using a Spin Hall Effect Based Logic-in-Memory Architecture13
Multilevel Graph-Based Decision Making in Big Scholarly Data: An Approach to Identify Expert Reviewer, Finding Quality Impact Factor, Ranking Journals and Researchers13
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks13
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices13
Framework for Prioritization of Open Data Publication: An Application to Smart Cities13
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices13
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning13
Cluster-Based Heuristic for High Level Synthesis Design Space Exploration13
Reinforcement Learning-based Mobile Edge Computing and Transmission Scheduling for Video Surveillance13
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT13
VulHunter: A Discovery for Unknown Bugs Based on Analysis for Known Patches in Industry Internet of Things13
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT13
E-Voting System Evaluation Based on The Council of Europe Recommendations: Helios Voting12
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation12
Bitcoin Transaction Forecasting With Deep Network Representation Learning12
Public Service Models: A Systematic Literature Review and Synthesis12
Classification and Mapping of Adaptive Security for Mobile Computing12
Fully Dynamic Inference with Deep Neural Networks12
Robust Robot Tracking for Next-Generation Collaborative Robotics-Based Gaming Environments12
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems12
An Approach to Optimise Resource Provision with Energy-Awareness in Datacentres by Combating Task Heterogeneity11
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design11
Vehicle-Assisted RSU Caching Using Deep Reinforcement Learning11
Probabilistic Interpolation Recoder for Energy-Error-Product Efficient DBNs With p-Bit Devices11
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator11
Design and Evaluate Recomposited OR-AND-XOR-PUF11
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing11
COACH: Consistency Aware Check-Pointing for Nonvolatile Processor in Energy Harvesting Systems11
IoTRec: The IoT Recommender for Smart Parking System11
Efficient Key-Gate Placement and Dynamic Scan Obfuscation Towards Robust Logic Encryption11
UAV-Aided Information Diffusion for Vehicle-to-Vehicle (V2V) in Disaster Scenarios11
High Performance Dynamic Resource Allocation for Guaranteed Service in Network-on-Chips11
A Dynamically Configurable PUF and Dynamic Matching Authentication Protocol10
Sum Propagate Adders10
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems10
A Novel Stealthy Attack to Gather SDN Configuration-Information10
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks10
A New Application for the Motor Rehabilitation at Home: Structure and Usability of Bal-App10
Differential Privacy-Based Genetic Matching in Personalized Medicine10
Detection, Location and Concealment of Defective Pixels in Image Sensors10
Efficient Word Size Modular Arithmetic10
Comparative Analysis of Metadata Models on e-Government Open Data Platforms10
Combining Technocrats’ Expertise with Public Opinion Through an Innovative e-Participation Platform10
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection10
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine learning10
FireNN: Neural Networks Reliability Evaluation on Hybrid Platforms10
A Novel Low Complexity Logic Encryption Technique for Design-for-Trust10
Hardware Constructions for Lightweight Cryptographic Block Cipher QARMA With Error Detection Mechanisms10
An Empirical Investigation of the Relationship between Local Government Budgets, IT Expenditures, and Cyber Losses10
MigSpike: A Migration Based Algorithms and Architecture for Scalable Robust Neuromorphic Systems10
EXSCALATE: An Extreme-Scale Virtual Screening Platform for Drug Discovery Targeting Polypharmacology to Fight SARS-CoV-210
Approximation-based Fault Tolerance in Image Processing Applications9
Applying machine learning and parallel data processing for attack detection in IoT9
Memory Physical Aware Multi-Level Fault Diagnosis Flow9
AxRMs: Approximate Recursive Multipliers using High-Performance Building Blocks9
Quantum Computing Based Optimization for Intelligent Reflecting Surface (IRS)-Aided Cell-Free Network9
Solar Particle Event and Single Event Upset Prediction from SRAM-based Monitor and Supervised Machine Learning9
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams9
Cyber Security Framework for Vehicular Network Based on a Hierarchical Game9
A Cybersecurity Educated Community9
Access Control for Implantable Medical Devices9
Algorithms for Stochastically Rounded Elementary Arithmetic Operations in IEEE 754 Floating-Point Arithmetic9
Co-Evolutionary Fuzzy Deep Transfer Learning for Disaster Relief Demand Forecasting8
Recommending Activities for Mental Health and Well-Being: Insights From Two User Studies8
Adaptive MRAM Write and Read with MTJ Variation Monitor8
IoTility: Architectural Requirements for Enabling Health IoT Ecosystems8
Side-Channel Attack Analysis on In-Memory Computing Architectures8
SARVE-2: Exploiting Social Venue Recommendation in the Context of Smart Conferences8
STPR: A Personalized Next Point-of-Interest Recommendation Model with Spatio-Temporal Effects Based on Purpose Ranking8
Design of Unsigned Approximate Hybrid Dividers Based on Restoring Array and Logarithmic Dividers8
A Holistic Formulation for System Margining and Jitter Tolerance Optimization in Industrial Post-Silicon Validation8
Open Data Categorization Based on Formal Concept Analysis8
Software-Based Self-Test Techniques for Dual-Issue Embedded Processors8
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory8
Distributing Tourists among POIs with an Adaptive Trip Recommendation System8
Content-Centric Group User Authentication for Secure Social Networks8
Efficient Hardware Implementation of Finite Field Arithmetic AB+C for Binary Ring-LWE Based Post-Quantum Cryptography8
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting8
swMR: A Framework for Accelerating MapReduce Applications on Sunway Taihulight7
Documenting Context-Based Quality Assessment of Controlled Vocabularies7
An Energy-Efficient Domain-Specific Architecture for Regular Expressions7
An Efficient Monte Carlo-Based Probabilistic Time-Dependent Routing Calculation Targeting a Server-Side Car Navigation System7
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes7
A Statistical Gate Sizing Method for Timing Yield and Lifetime Reliability Optimization of Integrated Circuits7
A Survey of MRAM-Centric Computing: From Near Memory to In Memory7
SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys7
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility7
Scrubbing-Aware Placement for Reliable FPGA Systems7
Low-Overhead Adaptive Brightness Scaling for Energy Reduction in OLED Displays7
Voting Margin: A Scheme for Error-Tolerant k Nearest Neighbors Classifiers for Machine Learning7
Parallel Computing for Multi-Objective Train Rescheduling7
Convolutional Autoencoder-Based Transfer Learning for Multi-Task Image Inferences7
Quantifying the Effects of Anonymization Techniques Over Micro-Databases7
Virtual Reality Simulation of a Quadrotor to Monitor Dependent People at Home7
Improving the Reliability of Network Intrusion Detection Systems Through Dataset Integration7
Spin Wave Based Approximate Computing7
On Adaptive Influence Maximization Under General Feedback Models7
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives7
Anatomy of On-Chip Memory Hardware Fault Effects Across the Layers7
Deep Learning-Based Hardware Trojan Detection With Block-Based Netlist Information Extraction6
Flexible On-Line Reconfiguration of Multi-Core Neuromorphic Platforms6
Tolerating Permanent Faults with Low-Energy Overhead in Multicore Mixed-Criticality Systems6
A Computing System for Discovering Causal Relationships Among Human Genes to Improve Drug Repositioning6
Deep Recommendation With Adversarial Training6
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities6
An eParticipation Acceptance Model6
Learning Low Resource Consumption CNN through Pruning and Quantization6
AritPIM: High-Throughput In-Memory Arithmetic6
A High Performance, Multi-Bit Output Logic-in-Memory Adder6
Reduced Precision Redundancy for Reliable Processing of Data6
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications6
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities6
On the Design of Minimal-Cost Pipeline Systems Satisfying Hard/Soft Real-Time Constraints6
Defect Analysis and Parallel Testing for 3D Hybrid CMOS-Memristor Memory6
Numerical Model for 32-Bit Magnonic Ripple Carry Adder6
ReMap: Reliability Management of Peak-Power-Aware Real-Time Embedded Systems Through Task Replication6
Holo-BLSD – A Holographic Tool for Self-training and Self-Evaluation of Emergency Response Skills6
Additional Reviewer Assignment by Means of Weighted Association Rules6
A Dynamic Sufficient Condition of Deadlock-Freedom for High-Performance Fault-Tolerant Routing in Networks-on-Chips6
In-Field Recovery of RF Circuits from Wearout Based Performance Degradation6
A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing6
Online Remaining Useful Lifetime Prediction Using Support Vector Regression5
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs5
Intermittent Pulling with Local Compensation for Communication-Efficient Distributed Learning5
Securing Cyber-Physical Systems from Hardware Trojan Collusion5
0.13201189041138