IEEE Transactions on Emerging Topics in Computing

Papers
(The median citation count of IEEE Transactions on Emerging Topics in Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Front Cover107
Reliability Evaluation and Fault Tolerant Design for KLL Sketches90
PipeDAP: An Efficient Communication Framework for Scheduling Decoupled All-Reduce Primitives in Distributed DNN Training87
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning83
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware70
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption67
Fast Multiple-Precision Integer Division Using Intel AVX-51267
Efficient Training and Neuro-Encoding for Bridging Hybrid ANN and SNN Computation66
A Technique for Approximate Communication in Network-on-Chips for Image Classification60
IsBad: Imperceptible Sample-Specific Backdoor to DNN With Denoising Autoencoder57
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning55
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT53
Graph Reconfigurable Pooling for Graph Representation Learning52
Scheduling Coflows by Online Identification in Data Center Network50
(In)security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers45
A Virtual Reality Perceptual Study of Multi-Technique Redirected Walking Method44
DALTON - Deep Local Learning in SNNs via Local Weights and Surrogate-Derivative Transfer44
Table of Contents43
IEEE Transactions on Emerging Topics in Computing Publication Information38
Table of Contents37
A VLSI Digital Circuit Platform for Performing Deterministic Stochastic Computing in the Time Dimension Using Fraction Operations on Rational Numbers36
Practical and Robust Privacy-Preserving K-Means Clustering Protocols With GPU Acceleration35
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks34
A Survey of MRAM-Centric Computing: From Near Memory to In Memory34
Memristive Crossbar Array-Based Adversarial Defense Using Compression34
Unleashing the Potential of Skyrmion Racetrack Memory as Energy-Efficient On-Chip Memory34
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud31
Privacy-Preserving Publicly Verifiable Outsourced Distributed Computation Scheme for Matrix Multiplication30
A Representation Learning Approach to Feature Drift Detection in Wireless Networks30
Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults’ Functional Profile30
Notice of Removal: RC-RNN: R econfigurable C ache Architecture for Storage Systems Using 29
CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM29
Secure Delegated Quantum Approximate Optimization Algorithm with Quantum One-Time Pad for MAX-CUT Problem28
Energy Efficient Approximate Computing Framework for DNN Acceleration Using a Probabilistic-Oriented Method28
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm28
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest27
Architecture Support for Bitslicing27
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks27
BIC Codes: Bit Insertion-Based Constrained Codes With Error Correction for DNA Storage26
A Multiplier-Free RNS-Based CNN Accelerator Exploiting Bit-Level Sparsity26
Tight Bound on NewHope Failure Probability26
Table of Contents25
Integrated Edge Computing and Blockchain: A General Medical Data Sharing Framework25
AutoRelax: HW-SW Co-Optimization for Efficient SpGEMM Operations With Automated Relaxation in Deep Learning25
Guest Editorial: Special Section on Emerging and Impacting Trends on Computer Arithmetic24
Private Delegated Computations Using Strong Isolation24
Designing Mobile Technologies to Encourage Civic Engagement: The Role of Situated Motivational Affordances24
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems23
What, When, Where to Compute-in-Memory for Efficient Matrix Multiplication During Machine Learning Inference23
GraphMamba: Graph Tokenization Mamba for Hyperspectral Image Classification23
Traffic Network Socialization: An Adaptive Spatio-Temporal Graph Convolutional Network for Traffic Prediction23
Graph-Based Anomaly APT Attack Detection via Threat Intelligence22
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems21
Open and Closed-Loop Predictive Control Strategies for Software Rejuvenation21
MFDS-STGCN: Predicting the Behaviors of College Students With Fine-Grained Spatial-Temporal Activities Data21
Child-Computer Interaction With Mobile Devices: Recent Works, New Dataset, and Age Detection20
Error in Ulps of the Multiplication or Division by a Correctly-Rounded Function or Constant in Binary Floating-Point Arithmetic20
Unsupervised Domain Adaptation via Contrastive Adversarial Domain Mixup: A Case Study on COVID-1920
3D Invisible Cloak: A Robust Person Stealth Attack Against Object Detector in Complex 3D Physical Scenarios19
SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing19
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications18
SelfVis: Self-Supervised Learning for Human Activity Recognition Based on Area Charts18
Deadline-Aware and Energy-Efficient Dynamic Task Mapping and Scheduling for Multicore Systems Based on Wireless Network-on-Chip18
Deep Graph Networks for Drug Repurposing With Multi-Protein Targets18
Sepformer-Based Models: More Efficient Models for Long Sequence Time-Series Forecasting17
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis16
MemAscend: System Memory Optimization for SSD-Offloaded LLM Fine-Tuning16
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory16
Front Cover16
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication16
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection16
Table of Contents16
Construction of a Spike-Based Memory Using Neural-Like Logic Gates Based on Spiking Neural Networks on SpiNNaker16
Approximate MAC Unit Using Static Segmentation15
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption15
Efficient Vertical Federated Learning Method for Ridge Regression of Large-Scale Samples15
NeuE: Automated Neural Network Ensembles for Edge Intelligence14
Scalable and RISC-V Programmable Near-Memory Computing Architectures for Edge Nodes14
Resource-Aware Knowledge Distillation for Federated Learning13
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks13
Hybrid Quantum ResNet for Time Series Classification13
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment13
Deep Belief Network-Based Activity of Daily Living Monitoring for Fall Risk Prediction in Elderly13
Vector Field-Guided Circumnavigation for an Unmanned Surface Vehicle With Boundary and Obstacle Constraints13
A Novel Prediction Technique for Federated Learning12
Multi-View Partial Multi-Label Learning via Class Activation Specific Features Collaborative Learning12
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting12
Front Cover12
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans12
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions12
Traceable and Revocable Attribute-Based Conjunctive Keyword Search12
PPSplitFed: Privacy-Preserving Splitfed Learning via Functional Encryption12
Quantum Implementation and Analysis of SHA-2 and SHA-312
Maximizing Social Influence With Minimum Information Alteration12
Path-Based Delay Variation Models for Parallel-Prefix Adders12
Quantum-Inspired Differential Evolution With Decoding Using Hashing for Efficient User Allocation in Edge Computing Environment12
ALP: Alleviating CPU-Memory Data Movement Overheads in Memory-Centric Systems12
WASMBOX: A Lightweight Wasm-Based Runtime for Trustworthy Multi-Tenant Embedded Systems11
PLSM: A Parallelized Liquid State Machine for Unintentional Action Detection11
2022 Reviewers List*11
A Bio-Inspired Implementation of a Sparse-Learning Spike-Based Hippocampus Memory Model11
Spatial-Temporal Neighborhood Transformer for Point Cloud Completion11
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization11
PLAM: A Posit Logarithm-Approximate Multiplier11
FairRFL: Fair and Robust Federated Learning in the Presence of Selfish Clients11
Toward Designing High-Speed Cost-Efficient Quantum Reversible Carry Select Adders10
Notice of Violation of IEEE Publication Principles: An Energy-Efficient Heterogeneous Memory Architecture for Future Dark Silicon Embedded Chip-Multiprocessors10
Approximate Recursive Multipliers Using Low Power Building Blocks10
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing10
Guest Editorial Emerging Trends and Advances in Graph-Based Methods and Applications10
X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data10
Using Diversities to Model the Reliability of Two-Version Machine Learning Systems10
Performability of Service Chains With Rejuvenation: A Multidimensional Universal Generating Function Approach10
Exploiting Entity Information for Robust Prediction Over Event Knowledge Graphs10
Toward Scalable Multi-Chip Wireless Networks With Near-Field Time Reversal10
Affective Region Recognition and Fusion Network for Target-Level Multimodal Sentiment Classification9
H-BILSTM: A Novel Bidirectional Long Short Term Memory Network Based Intelligent Early Warning Scheme in Mobile Edge Computing (MEC)9
Numerical Model for 32-Bit Magnonic Ripple Carry Adder9
An Efficient Ternary In-Memory Computing Architecture with Application in Phonocardiogram-Based Driver Stress Detection9
Online Resource Provisioning and Batch Scheduling for AIoT Inference Serving in an XPU Edge Cloud9
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network9
A Large Scale Characterization of Device Uptimes9
Table of Contents9
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability9
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities9
AntiDOTE: Protecting Debug Against Outsourced Test Entities9
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing9
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes9
A Catalog-Based AIG-Rewriting Approach to the Design of Approximate Components9
Adaptive Object Exploration and Mapping through Meta-Reinforcement Learning9
Fast and Robust UAV to UAV Detection and Tracking From Video9
Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF9
The Indoor Predictability of Human Mobility: Estimating Mobility With Smart Home Sensors8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications8
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator8
Front Cover8
FerroCoin: Ferroelectric Tunnel Junction-Based True Random Number Generator8
Edge-Optimized Vision Transformers: A Co-Designed Hardware-Software Framework for Efficient Attention Mechanism8
Quantum Computing Based Optimization for Intelligent Reflecting Surface (IRS)-Aided Cell-Free Network8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
A Novel Technique for Fingerprint Based Secure User Authentication8
Balancing Throughput and Fair Execution of Multi-DNN Workloads on Heterogeneous Embedded Devices8
Bit-Line Computing for CNN Accelerators Co-Design in Edge AI Inference7
IEEE Transactions on Emerging Topics in Computing Information for Authors7
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy7
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics7
FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning7
Improvement of Battery Lifetime Based on Communication Resource Control in Low-Earth-Orbit Satellite Constellations7
Front Cover7
MatcHEd: Privacy-Preserving Set Similarity Based on MinHash7
Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems7
Co-Evolutionary Fuzzy Deep Transfer Learning for Disaster Relief Demand Forecasting7
Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach7
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs7
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks7
Asyn2F: An Asynchronous Federated Learning Framework With Bidirectional Model Aggregation7
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning6
Front Cover6
adF: a Novel System for Measuring Web Fingerprinting through Ads6
ReaLPrune: ReRAM Crossbar-Aware Lottery Ticket Pruning for CNNs6
Localization Graph Generation Based Matrix Factorization for Incomplete Multi-View Clustering6
An Alternative Approach to Polynomial Modular Number System Internal Reduction6
Engaging Primary and Secondary School Students in Computer Science Through Computational Thinking Training6
Deep Learning Based Intelligent Tumor Analytics Framework for Quantitative Grading and Analyzing Cancer Metastasis: Case of Lymph Node Breast Cancer6
Dynamically Activated De-Glaring and Detail- Recovery for Low-Light Image Enhancement Directly on Smart Cameras6
Deep Attentive Interest Collaborative Filtering for Recommender Systems6
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications6
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement6
Improved Modular Multiplication Algorithms Using Solely IEEE 754 Binary Floating-Point Operations6
Deep Recommendation With Adversarial Training6
Engravings, Secrets, and Interpretability of Neural Networks6
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems5
Variation Resilient Schemes and Approximation-Free Offset Compensation for Reliable ReRAM-Based DNN Accelerators5
Guest Editorial: Special Section on “To be Safe and Dependable in the Era of Artificial Intelligence: Emerging Techniques for Trusted and Reliable Machine Learning”5
Multi-Layer Personalized Federated Learning for Mitigating Biases in Student Predictive Analytics5
IEEE Transactions on Emerging Topics in Computing Information for Authors5
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach5
HIFLA: Hilbert-Inspired Federated Learning via Action Principles5
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure Against Side Channel Attack and Its Complexity Verification5
FHEmem: A Processing In-Memory Accelerator for Fully Homomorphic Encryption5
Bi-Layer Deep Learning with Neural Networks and Large Language Models for Cognitive Biometrics5
Front Cover5
Edgeless-GNN: Unsupervised Representation Learning for Edgeless Nodes5
Spiker+: A Framework for the Generation of Efficient Spiking Neural Networks FPGA Accelerators for Inference at the Edge5
Algorithm-Hardware Co-Design of Split-Radix Discrete Galois Transformation for KyberKEM5
AI4FIDS: Multimodal Federated Intrusion Detection5
A Comparative Analysis of Software Aging in Relational Database System Environments5
A BF16 FMA is All You Need for DNN Training5
Edge-Based Live Learning for Robot Survival5
Near Volatile and Non-Volatile Memory Processing in 3D Systems5
Dynamic Reconfiguration for Resilient State Estimation Against Cyber Attacks5
TCAM-GNN: A TCAM-Based Data Processing Strategy for GNN Over Sparse Graphs5
Acceleration of the Bootstrapping in TFHE by FPGA5
Transfer Learning Realized With Nonlinearly Transformed Input Space5
DP-PartFIM: Frequent Itemset Mining Using Differential Privacy and Partition4
Exploring Time Predictability for High-Bandwidth Memory Technology4
A Segmented-Edit Error-Correcting Code With Re-Synchronization Function for DNA-Based Storage Systems4
New Construction of Balanced Codes Based on Weights of Data for DNA Storage4
Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography4
Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning4
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative Database4
Concurrent Self-Testing and Uncertainty Estimation of Neural Networks Using Uncertainty Fingerprint4
Anonymous Task Assignment and Worker Payment in Mobile Crowdsensing4
Scatter-Gather DMA Performance Analysis Within an SoC-Based Control System for Trapped-Ion Quantum Computing4
Table of Contents4
A Low Latency Approximate Adder Design Based on Dual Sub-Adders With Error Recovery4
SIMMS: Securing the IoT Through a Multi-Protocol Multi-Gateway System4
IEEE Transactions on Emerging Topics in Computing Publication Information4
Incentive Mechanism Design for Hierarchical Federated Learning With Selfishness Queue Stability4
A Novel Privacy-Preserving Range Query Scheme With Permissioned Blockchain for Smart Grid4
Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks4
CiM-BNN:Computing-in-MRAM Architecture for Stochastic Computing Based Bayesian Neural Network4
Online Scheduling with Incremental Reconfiguration in IEEE 802.1Qch-Based TSN for IIoT3
DECC: Delay-Aware Edge-Cloud Collaboration for Accelerating DNN Inference3
Linearizing Binary Optimization Problems Using Variable Posets for Ising Machines3
Software-Defined Number Formats for High-Speed Belief Propagation3
A Cybersecurity Educated Community3
Concept-cognitive Neural Network for Fairness-aware Maximal Cliques Identification3
Quantifying the Effects of Anonymization Techniques Over Micro-Databases3
Reliability Risks Due to Faults Affecting Selectors of ReRAMs and Possible Solutions3
A Pervasive Edge Computing Model for Proactive Intelligent Data Migration3
Enabling Obfuscation Detection in Binary Software through eXplainable AI3
LionHeart: A Layer-Based Mapping Framework for Heterogeneous Systems With Analog In-Memory Computing Tiles3
IEEE Transactions on Emerging Topics in Computing Publication Information3
Enhancing Neural Architecture Search With Multiple Hardware Constraints for Deep Learning Model Deployment on Tiny IoT Devices3
Concept Stability Entropy: A Novel Group Cohesion Measure in Social Networks3
Area and Power Efficient FFT/IFFT Processor for FALCON Post-Quantum Cryptography3
An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling3
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks3
Nomoformer: A Transformer-Based Approach for Pedestrian Trajectory Prediction With Non-Linear Motion Representation3
Darwin: A DRAM-Based Multi-Level Processing-in-Memory Architecture for Column-Oriented Database3
Pixel2Voxel: 3D Reconstruction and Visualization From Limited Number of X-Rays With 3D-Aware Diffusion Models and Iterative Refinement3
Runtime System Support for CPS Software Rejuvenation3
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks3
Multitask Particle Swarm Optimization With Dynamic Transformation3
A Novel Proportional-Integral-Parameter Zeroing Neural Network and Its Application to the Quaternion-Valued Time-Varying Linear Matrix Inequality3
LP-Star: Embedding Longest Paths into Star Networks With Large-Scale Missing Edges Under an Emerging Assessment Model3
HiT-CIM: A High-Throughput Compute-in-Memory SRAM Architecture With Simultaneous Weight Loading/Computing and Balance Capabilities3
AGSEI: Adaptive Graph Structure Estimation With Long-Tail Distributed Implicit Graphs3
Distributed Time Synchronization in NOMA-Assisted Ultra-Dense Networks3
IEEE Transactions on Emerging Topics in Computing Information for Authors3
0.13204407691956