IEEE Transactions on Emerging Topics in Computing

Papers
(The median citation count of IEEE Transactions on Emerging Topics in Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities102
Front Cover99
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING98
Reliability Evaluation and Fault Tolerant Design for KLL Sketches85
HREN: A Hybrid Reliable and Energy-Efficient Network-on-Chip Architecture71
Fast Multiple-Precision Integer Division Using Intel AVX-51271
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning70
PipeDAP: An Efficient Communication Framework for Scheduling Decoupled All-Reduce Primitives in Distributed DNN Training69
IsBad: Imperceptible Sample-Specific Backdoor to DNN With Denoising Autoencoder66
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption65
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning64
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT61
Efficient Training and Neuro-Encoding for Bridging Hybrid ANN and SNN Computation59
A Technique for Approximate Communication in Network-on-Chips for Image Classification55
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware54
Graph Reconfigurable Pooling for Graph Representation Learning52
Scheduling Coflows by Online Identification in Data Center Network50
A Virtual Reality Perceptual Study of Multi-Technique Redirected Walking Method49
(In)security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers49
Table of Contents48
DALTON - Deep Local Learning in SNNs via Local Weights and Surrogate-Derivative Transfer48
IEEE Transactions on Emerging Topics in Computing Publication Information45
Table of Contents44
The Self-Aware Information Processing Factory Paradigm for Mixed-Critical Multiprocessing42
RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks41
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring39
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud39
Memristive Crossbar Array-Based Adversarial Defense Using Compression39
A VLSI Digital Circuit Platform for Performing Deterministic Stochastic Computing in the Time Dimension Using Fraction Operations on Rational Numbers35
A Representation Learning Approach to Feature Drift Detection in Wireless Networks34
A Survey of MRAM-Centric Computing: From Near Memory to In Memory33
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks33
Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults’ Functional Profile33
Privacy-Preserving Publicly Verifiable Outsourced Distributed Computation Scheme for Matrix Multiplication32
CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM31
Energy Efficient Approximate Computing Framework for DNN Acceleration Using a Probabilistic-Oriented Method30
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks30
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm29
BIC Codes: Bit Insertion-Based Constrained Codes With Error Correction for DNA Storage29
A Multiplier-Free RNS-Based CNN Accelerator Exploiting Bit-Level Sparsity29
Secure Delegated Quantum Approximate Optimization Algorithm with Quantum One-Time Pad for MAX-CUT Problem28
Tight Bound on NewHope Failure Probability28
Architecture Support for Bitslicing28
Integrated Edge Computing and Blockchain: A General Medical Data Sharing Framework27
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain27
Table of Contents25
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest25
AutoRelax: HW-SW Co-Optimization for Efficient SpGEMM Operations With Automated Relaxation in Deep Learning23
Guest Editorial: Special Section on Emerging and Impacting Trends on Computer Arithmetic23
TETC's January 2022 Editor-in-Chief’s Report on the State of the Journal23
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation23
Design and Evaluate Recomposited OR-AND-XOR-PUF22
Designing Mobile Technologies to Encourage Civic Engagement: The Role of Situated Motivational Affordances22
Open and Closed-Loop Predictive Control Strategies for Software Rejuvenation22
What, When, Where to Compute-in-Memory for Efficient Matrix Multiplication During Machine Learning Inference21
GraphMamba: Graph Tokenization Mamba for Hyperspectral Image Classification21
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems21
Traffic Network Socialization: An Adaptive Spatio-Temporal Graph Convolutional Network for Traffic Prediction21
Private Delegated Computations Using Strong Isolation21
Child-Computer Interaction With Mobile Devices: Recent Works, New Dataset, and Age Detection20
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection20
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems20
Error in Ulps of the Multiplication or Division by a Correctly-Rounded Function or Constant in Binary Floating-Point Arithmetic20
MFDS-STGCN: Predicting the Behaviors of College Students With Fine-Grained Spatial-Temporal Activities Data20
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications20
SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing19
3D Invisible Cloak: A Robust Person Stealth Attack Against Object Detector in Complex 3D Physical Scenarios19
Deep Graph Networks for Drug Repurposing With Multi-Protein Targets19
Unsupervised Domain Adaptation via Contrastive Adversarial Domain Mixup: A Case Study on COVID-1919
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis18
Front Cover18
SelfVis: Self-Supervised Learning for Human Activity Recognition Based on Area Charts18
Deadline-Aware and Energy-Efficient Dynamic Task Mapping and Scheduling for Multicore Systems Based on Wireless Network-on-Chip18
Sepformer-Based Models: More Efficient Models for Long Sequence Time-Series Forecasting18
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication17
Approximate MAC Unit Using Static Segmentation17
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory17
Table of Contents17
NeuE: Automated Neural Network Ensembles for Edge Intelligence17
Construction of a Spike-Based Memory Using Neural-Like Logic Gates Based on Spiking Neural Networks on SpiNNaker16
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption16
Vector Field-Guided Circumnavigation for an Unmanned Surface Vehicle With Boundary and Obstacle Constraints16
Efficient Vertical Federated Learning Method for Ridge Regression of Large-Scale Samples16
Scalable and RISC-V Programmable Near-Memory Computing Architectures for Edge Nodes16
Hybrid Quantum ResNet for Time Series Classification16
Resource-Aware Knowledge Distillation for Federated Learning16
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment15
Multi-View Partial Multi-Label Learning via Class Activation Specific Features Collaborative Learning15
Quantum Implementation and Analysis of SHA-2 and SHA-315
2021 Index IEEE Transactions on Emerging Topics in Computing Vol. 915
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks15
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions15
Maximizing Social Influence With Minimum Information Alteration15
Path-Based Delay Variation Models for Parallel-Prefix Adders15
A Novel Prediction Technique for Federated Learning14
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting14
PLSM: A Parallelized Liquid State Machine for Unintentional Action Detection14
Quantum-Inspired Differential Evolution With Decoding Using Hashing for Efficient User Allocation in Edge Computing Environment13
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans13
A Bio-Inspired Implementation of a Sparse-Learning Spike-Based Hippocampus Memory Model12
ALP: Alleviating CPU-Memory Data Movement Overheads in Memory-Centric Systems12
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments12
WASMBOX: A Lightweight Wasm-Based Runtime for Trustworthy Multi-Tenant Embedded Systems12
PLAM: A Posit Logarithm-Approximate Multiplier12
2022 Reviewers List*12
Front Cover12
Notice of Violation of IEEE Publication Principles: An Energy-Efficient Heterogeneous Memory Architecture for Future Dark Silicon Embedded Chip-Multiprocessors12
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization12
Guest Editorial Emerging Trends and Advances in Graph-Based Methods and Applications11
Toward Designing High-Speed Cost-Efficient Quantum Reversible Carry Select Adders11
Performability of Service Chains With Rejuvenation: A Multidimensional Universal Generating Function Approach11
X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data11
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing11
Efficient Error-Resilient Bus Coding Method Using Bit-Basis Orthogonal Integrative Multiplexing11
Approximate Recursive Multipliers Using Low Power Building Blocks11
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers11
AntiDOTE: Protecting Debug Against Outsourced Test Entities10
Exploiting Entity Information for Robust Prediction Over Event Knowledge Graphs10
H-BILSTM: A Novel Bidirectional Long Short Term Memory Network Based Intelligent Early Warning Scheme in Mobile Edge Computing (MEC)10
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes10
Graph Learning for Cognitive Digital Twins in Manufacturing Systems10
Table of Contents10
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing10
Boosting Extra-Functional Code Reusability in Cyber-Physical Production Systems: The Error Handling Case Study10
Fast and Robust UAV to UAV Detection and Tracking From Video10
Affective Region Recognition and Fusion Network for Target-Level Multimodal Sentiment Classification10
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator10
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network10
A Large Scale Characterization of Device Uptimes10
Using Diversities to Model the Reliability of Two-Version Machine Learning Systems10
Online Resource Provisioning and Batch Scheduling for AIoT Inference Serving in an XPU Edge Cloud10
Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF10
On Adaptive Influence Maximization Under General Feedback Models9
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph9
A Novel Technique for Fingerprint Based Secure User Authentication9
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications9
Artificial Intelligence for Mass Spectrometry and Nuclear Magnetic Resonance Spectroscopy Using a Novel Data Augmentation Method9
Solar Particle Event and Single Event Upset Prediction from SRAM-based Monitor and Supervised Machine Learning9
Bit-Line Computing for CNN Accelerators Co-Design in Edge AI Inference9
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities9
Numerical Model for 32-Bit Magnonic Ripple Carry Adder9
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability9
A Catalog-Based AIG-Rewriting Approach to the Design of Approximate Components9
Balancing Throughput and Fair Execution of Multi-DNN Workloads on Heterogeneous Embedded Devices9
Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems8
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs8
Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
The Indoor Predictability of Human Mobility: Estimating Mobility With Smart Home Sensors8
Front Cover8
FerroCoin: Ferroelectric Tunnel Junction-Based True Random Number Generator8
Front Cover8
Quantum Computing Based Optimization for Intelligent Reflecting Surface (IRS)-Aided Cell-Free Network8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs8
Improvement of Battery Lifetime Based on Communication Resource Control in Low-Earth-Orbit Satellite Constellations8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
Co-Evolutionary Fuzzy Deep Transfer Learning for Disaster Relief Demand Forecasting8
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy7
Asyn2F: An Asynchronous Federated Learning Framework With Bidirectional Model Aggregation7
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks7
ReaLPrune: ReRAM Crossbar-Aware Lottery Ticket Pruning for CNNs7
Algebraic attacks on block ciphers using quantum annealing7
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement7
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics7
Engravings, Secrets, and Interpretability of Neural Networks7
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications7
A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays7
Front Cover7
FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning7
Deep Learning Based Intelligent Tumor Analytics Framework for Quantitative Grading and Analyzing Cancer Metastasis: Case of Lymph Node Breast Cancer7
Improved Modular Multiplication Algorithms Using Solely IEEE 754 Binary Floating-Point Operations7
Engaging Primary and Secondary School Students in Computer Science Through Computational Thinking Training7
Deep Attentive Interest Collaborative Filtering for Recommender Systems6
An Alternative Approach to Polynomial Modular Number System Internal Reduction6
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach6
adF: a Novel System for Measuring Web Fingerprinting through Ads6
IEEE Transactions on Emerging Topics in Computing6
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications6
Spiker+: A Framework for the Generation of Efficient Spiking Neural Networks FPGA Accelerators for Inference at the Edge6
TCAM-GNN: A TCAM-Based Data Processing Strategy for GNN Over Sparse Graphs6
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning6
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems6
Dynamically Activated De-Glaring and Detail- Recovery for Low-Light Image Enhancement Directly on Smart Cameras6
Algorithm-Hardware Co-Design of Split-Radix Discrete Galois Transformation for KyberKEM6
Deep Recommendation With Adversarial Training6
Edgeless-GNN: Unsupervised Representation Learning for Edgeless Nodes6
A BF16 FMA is All You Need for DNN Training6
Near Volatile and Non-Volatile Memory Processing in 3D Systems5
IEEE Transactions on Emerging Topics in Computing Information for Authors5
HIFLA: Hilbert-Inspired Federated Learning via Action Principles5
Dynamic Reconfiguration for Resilient State Estimation Against Cyber Attacks5
Edge-Based Live Learning for Robot Survival5
Transfer Learning Realized With Nonlinearly Transformed Input Space5
DP-PartFIM: Frequent Itemset Mining Using Differential Privacy and Partition5
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative Database5
Exploring Time Predictability for High-Bandwidth Memory Technology5
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices5
Guest Editorial: Special Section on “To be Safe and Dependable in the Era of Artificial Intelligence: Emerging Techniques for Trusted and Reliable Machine Learning”5
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure Against Side Channel Attack and Its Complexity Verification5
Multi-Layer Personalized Federated Learning for Mitigating Biases in Student Predictive Analytics5
Mining Implicit Equations From Data Using Gene Expression Programming5
A Comparative Analysis of Software Aging in Relational Database System Environments5
Scatter-Gather DMA Performance Analysis Within an SoC-Based Control System for Trapped-Ion Quantum Computing5
Design of Unsigned Approximate Hybrid Dividers Based on Restoring Array and Logarithmic Dividers5
ReMap: Reliability Management of Peak-Power-Aware Real-Time Embedded Systems Through Task Replication5
DeepEcho: Echoacoustic Recognition of Materials Using Returning Echoes With Deep Neural Networks5
Concurrent Self-testing and Uncertainty Estimation of Neural Networks Using Uncertainty Fingerprint5
Front Cover5
FHEmem: A Processing In-Memory Accelerator for Fully Homomorphic Encryption5
AI4FIDS: Multimodal Federated Intrusion Detection5
Acceleration of the Bootstrapping in TFHE by FPGA5
Bi-Layer Deep Learning with Neural Networks and Large Language Models for Cognitive Biometrics5
Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography5
Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks5
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design5
AGSEI: Adaptive Graph Structure Estimation With Long-Tail Distributed Implicit Graphs4
New Construction of Balanced Codes Based on Weights of Data for DNA Storage4
Area and Power Efficient FFT/IFFT Processor for FALCON Post-Quantum Cryptography4
Linearizing Binary Optimization Problems Using Variable Posets for Ising Machines4
Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning4
A Low Latency Approximate Adder Design Based on Dual Sub-Adders With Error Recovery4
Incentive Mechanism Design for Hierarchical Federated Learning With Selfishness Queue Stability4
Software-Defined Number Formats for High-Speed Belief Propagation4
Pixel2Voxel: 3D Reconstruction and Visualization From Limited Number of X-Rays With 3D-Aware Diffusion Models and Iterative Refinement4
IEEE Transactions on Emerging Topics in Computing Publication Information4
An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling4
LP-Star: Embedding Longest Paths into Star Networks With Large-Scale Missing Edges Under an Emerging Assessment Model4
HMCKRAutoEncoder: An Interpretable Deep Learning Framework for Time Series Analysis4
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment4
CiM-BNN:Computing-in-MRAM Architecture for Stochastic Computing Based Bayesian Neural Network4
Multitask Particle Swarm Optimization With Dynamic Transformation4
A Segmented-Edit Error-Correcting Code With Re-Synchronization Function for DNA-Based Storage Systems4
A Novel Proportional-Integral-Parameter Zeroing Neural Network and Its Application to the Quaternion-Valued Time-Varying Linear Matrix Inequality4
Runtime System Support for CPS Software Rejuvenation4
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks4
A Cybersecurity Educated Community4
Enhancing Neural Architecture Search With Multiple Hardware Constraints for Deep Learning Model Deployment on Tiny IoT Devices4
Table of Contents4
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework4
A Novel Privacy-Preserving Range Query Scheme With Permissioned Blockchain for Smart Grid4
IoTRec: The IoT Recommender for Smart Parking System4
Concept Stability Entropy: A Novel Group Cohesion Measure in Social Networks4
HiT-CIM: A High-Throughput Compute-in-Memory SRAM Architecture With Simultaneous Weight Loading/Computing and Balance Capabilities4
Quantifying the Effects of Anonymization Techniques Over Micro-Databases4
Medical Systems Data Security and Biometric Authentication in Public Cloud Servers3
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges3
A Design Framework for Hardware-Efficient Logarithmic Floating-Point Multipliers3
Enabling Obfuscation Detection in Binary Software through eXplainable AI3
Cost-Effective Software Rejuvenation Combining Time-Based and Inspection-Based Policies3
0.12858104705811