IEEE Transactions on Emerging Topics in Computing

Papers
(The median citation count of IEEE Transactions on Emerging Topics in Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Smart Resource Allocation for Mobile Edge Computing: A Deep Reinforcement Learning Approach298
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City176
Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection136
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services120
Blockchain Mutability: Challenges and Proposed Solutions113
Academic Influence Aware and Multidimensional Network Analysis for Research Collaboration Navigation Based on Scholarly Big Data110
A Mental Health Chatbot for Regulating Emotions (SERMO) - Concept and Usability Test106
A Survey of Incentive Mechanism Design for Federated Learning104
An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems91
Exploring Research in Blockchain for Healthcare and a Roadmap for the Future82
Leveraging Communicating UAVs for Emergency Vehicle Guidance in Urban Areas79
Novel Low Cost, Double-and-Triple-Node-Upset-Tolerant Latch Designs for Nano-scale CMOS78
HCP: Heterogeneous Computing Platform for Federated Learning Based Collaborative Content Caching Towards 6G Networks76
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs69
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs67
Sway: Traffic-Aware QoS Routing in Software-Defined IoT64
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing63
Edge Cloud Server Deployment With Transmission Power Control Through Machine Learning for 6G Internet of Things60
Blockchain-Based Trust Management for Internet of Vehicles60
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme58
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition57
VOPRec: Vector Representation Learning of Papers with Text Information and Structural Identity for Recommendation56
Online Fall Detection Using Recurrent Neural Networks on Smart Wearable Devices55
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments54
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts53
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment53
Design and Analysis of Majority Logic-Based Approximate Adders and Multipliers50
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks45
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network45
Surrogate-Assisted Evolutionary Framework with Adaptive Knowledge Transfer for Multi-Task Optimization44
A Comparative Study of Virtual Reality Methods of Interaction and Locomotion Based on Presence, Cybersickness, and Usability44
The Effects of Approximate Multiplication on Convolutional Neural Networks42
A Novel TDMA-Based Fault Tolerance Technique for the TSVs in 3D-ICs Using Honeycomb Topology41
Graph Learning for Cognitive Digital Twins in Manufacturing Systems41
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes39
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network39
A Quantum Mechanics-Based Framework for EEG Signal Feature Extraction and Classification39
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons39
StreamFlow: Cross-Breeding Cloud With HPC38
RDAM: A Reinforcement Learning Based Dynamic Attribute Matrix Representation for Virtual Network Embedding38
A Flip-Flop Based Arbiter Physical Unclonable Function (APUF) Design with High Entropy and Uniqueness for FPGA Implementation37
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data37
Quantum Circuit Designs of Integer Division Optimizing T-count and T-depth36
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy35
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment35
A Novel Bio-Inspired Approach for High-Performance Management in Service-Oriented Networks34
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs32
Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter32
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning32
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing31
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks31
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers30
A Machine-Learning Model for Automatic Detection of Movement Compensations in Stroke Patients29
ScanSAT: Unlocking Static and Dynamic Scan Obfuscation28
Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications27
Fast and Robust UAV to UAV Detection and Tracking From Video27
The Role of Explainability in Assuring Safety of Machine Learning in Healthcare27
A 3.3 Gbps CCSDS 123.0-B-1 Multispectral & Hyperspectral Image Compression Hardware Accelerator on a Space-Grade SRAM FPGA27
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability27
Lightweight Privacy-Preserving Raw Data Publishing Scheme26
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation26
A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips26
PLAM: A Posit Logarithm-Approximate Multiplier26
Time-Bounded Activity Recognition for Ambient Assisted Living25
XpulpNN: Enabling Energy Efficient and Flexible Inference of Quantized Neural Networks on RISC-V Based IoT End Nodes25
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols25
Design of Anonymous Endorsement System in Hyperledger Fabric24
Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems24
Secrecy Driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization24
Reformative Noise-Immune Neural Network for Equality-Constrained Optimization Applied to Image Target Detection24
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework24
Energy- and Quality-Efficient Approximate Multipliers for Neural Network and Image Processing Applications24
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis23
SDLSC-TA: Subarea Division Learning Based Task Allocation in Sparse Mobile Crowdsensing23
DiabDeep: Pervasive Diabetes Diagnosis Based on Wearable Medical Sensors and Efficient Neural Networks23
A Novel Quantum-Inspired Fuzzy Based Neural Network for Data Classification23
Privacy-Preserving Deep Learning NLP Models for Cancer Registries23
Skeleton-Based Action Segmentation With Multi-Stage Spatial-Temporal Graph Convolutional Neural Networks23
Automatic Signature Verification in the Mobile Cloud Scenario: Survey and Way Ahead23
High Quality Down-Sampling for Deterministic Approaches to Stochastic Computing22
Hardware Constructions for Lightweight Cryptographic Block Cipher QARMA With Error Detection Mechanisms22
FarSight: Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes22
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications21
Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images21
First Tests of a New Facility for Device-Level, Board-Level and System-Level Neutron Irradiation of Microelectronics21
Defect and Fault Modeling Framework for STT-MRAM Testing20
DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems20
Secure Data Sequence Query Framework Based on Multiple Fogs20
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems20
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain20
A Blockchain-Powered Decentralized and Secure Computing Paradigm20
Approximate Recursive Multipliers Using Low Power Building Blocks20
Cluster-Based Heuristic for High Level Synthesis Design Space Exploration19
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring19
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT19
ARMOR: An Anti-Counterfeit Security Mechanism for Low Cost Radio Frequency Identification Systems18
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects18
Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography18
Collaborative Trajectory Mining in Smart-Homes to Support Early Diagnosis of Cognitive Decline18
Highly-Parallel FPGA Accelerator for Simulated Quantum Annealing18
Fully Dynamic Inference with Deep Neural Networks18
Value of Information Based Sensor Ranking for Efficient Sensor Service Allocation in Service Oriented Wireless Sensor Networks17
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices17
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices17
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator17
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting17
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT17
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases17
A Survey of MRAM-Centric Computing: From Near Memory to In Memory16
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems16
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks16
Polynomial Vault: A Secure and Robust Fingerprint based Authentication16
The e-LocGov Model for Introducing e-Governance into Local Governments: An Estonian Case Study16
Reinforcement Learning-based Mobile Edge Computing and Transmission Scheduling for Video Surveillance15
A Service-based Joint Model Used for Distributed Learning: Application for Smart Agriculture15
UAV-Aided Information Diffusion for Vehicle-to-Vehicle (V2V) in Disaster Scenarios15
EXSCALATE: An Extreme-Scale Virtual Screening Platform for Drug Discovery Targeting Polypharmacology to Fight SARS-CoV-215
SPRING: A Sparsity-Aware Reduced-Precision Monolithic 3D CNN Accelerator Architecture for Training and Inference15
Design and Evaluate Recomposited OR-AND-XOR-PUF15
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking15
Low-Energy Acceleration of Binarized Convolutional Neural Networks Using a Spin Hall Effect Based Logic-in-Memory Architecture15
Bitcoin Transaction Forecasting With Deep Network Representation Learning15
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems15
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning15
A Cybersecurity Educated Community14
Detection of Limited Magnitude Errors in Emerging Multilevel Cell Memories by One-Bit Parity (OBP) or Two-Bit Parity (TBP)14
Efficient Word Size Modular Arithmetic14
Quantifying the Impact of Monolithic 3D (M3D) Integration on L1 Caches14
A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data14
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation14
Incremental Learning Using a Grow-and-Prune Paradigm With Efficient Neural Networks14
Solar Particle Event and Single Event Upset Prediction from SRAM-based Monitor and Supervised Machine Learning14
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing14
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection14
Public Service Models: A Systematic Literature Review and Synthesis13
Distributing Tourists among POIs with an Adaptive Trip Recommendation System13
DICO: A Graph-DB Framework for Community Detection on Big Scholarly Data13
Quantum Computing Based Optimization for Intelligent Reflecting Surface (IRS)-Aided Cell-Free Network13
Multilevel Graph-Based Decision Making in Big Scholarly Data: An Approach to Identify Expert Reviewer, Finding Quality Impact Factor, Ranking Journals and Researchers13
Cyber Security Framework for Vehicular Network Based on a Hierarchical Game13
E-Voting System Evaluation Based on The Council of Europe Recommendations: Helios Voting13
FireNN: Neural Networks Reliability Evaluation on Hybrid Platforms13
IoTRec: The IoT Recommender for Smart Parking System13
A New Application for the Motor Rehabilitation at Home: Structure and Usability of Bal-App13
High-Speed Memristive Ternary Content Addressable Memory12
An Empirical Investigation of the Relationship between Local Government Budgets, IT Expenditures, and Cyber Losses12
Probabilistic Interpolation Recoder for Energy-Error-Product Efficient DBNs With p-Bit Devices12
Framework for Prioritization of Open Data Publication: An Application to Smart Cities12
Efficient Key-Gate Placement and Dynamic Scan Obfuscation Towards Robust Logic Encryption12
IoTility: Architectural Requirements for Enabling Health IoT Ecosystems12
COACH: Consistency Aware Check-Pointing for Nonvolatile Processor in Energy Harvesting Systems12
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design12
AxRMs: Approximate Recursive Multipliers using High-Performance Building Blocks12
Side-Channel Attack Analysis on In-Memory Computing Architectures12
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine learning11
A Dynamically Configurable PUF and Dynamic Matching Authentication Protocol11
Vehicle-Assisted RSU Caching Using Deep Reinforcement Learning11
Differential Privacy-Based Genetic Matching in Personalized Medicine11
SACC: A Size Adaptive Content Caching Algorithm in Fog/Edge Computing Using Deep Reinforcement Learning11
Comparative Analysis of Metadata Models on e-Government Open Data Platforms11
Applying machine learning and parallel data processing for attack detection in IoT11
Sum Propagate Adders11
An Energy-Efficient Domain-Specific Architecture for Regular Expressions10
Deep Learning-Based Hardware Trojan Detection With Block-Based Netlist Information Extraction10
Algorithms for Stochastically Rounded Elementary Arithmetic Operations in IEEE 754 Floating-Point Arithmetic10
Combining Technocrats’ Expertise with Public Opinion Through an Innovative e-Participation Platform10
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks10
Co-Evolutionary Fuzzy Deep Transfer Learning for Disaster Relief Demand Forecasting10
Access Control for Implantable Medical Devices10
Anatomy of On-Chip Memory Hardware Fault Effects Across the Layers10
Approximation-based Fault Tolerance in Image Processing Applications10
Improving the Reliability of Network Intrusion Detection Systems Through Dataset Integration10
Recommending Activities for Mental Health and Well-Being: Insights From Two User Studies10
Detection, Location and Concealment of Defective Pixels in Image Sensors10
Efficient Hardware Implementation of Finite Field Arithmetic AB+C for Binary Ring-LWE Based Post-Quantum Cryptography10
MigSpike: A Migration Based Algorithms and Architecture for Scalable Robust Neuromorphic Systems10
Design of Unsigned Approximate Hybrid Dividers Based on Restoring Array and Logarithmic Dividers9
Multi-Person Activity Recognition in Continuously Monitored Smart Homes9
Hardware Constructions for Error Detection in Lightweight Welch-Gong (WG)-Oriented Streamcipher WAGE Benchmarked on FPGA9
SARVE-2: Exploiting Social Venue Recommendation in the Context of Smart Conferences9
Low-Overhead Adaptive Brightness Scaling for Energy Reduction in OLED Displays9
A Statistical Gate Sizing Method for Timing Yield and Lifetime Reliability Optimization of Integrated Circuits9
Manifold-Inspired Search-Based Algorithm for Automated Test Case Generation9
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility9
Numerical Model for 32-Bit Magnonic Ripple Carry Adder9
ReMap: Reliability Management of Peak-Power-Aware Real-Time Embedded Systems Through Task Replication9
Open Data Categorization Based on Formal Concept Analysis9
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities9
Real-Time Personalized Atrial Fibrillation Prediction on Multi-Core Wearable Sensors8
STPR: A Personalized Next Point-of-Interest Recommendation Model with Spatio-Temporal Effects Based on Purpose Ranking8
Learning Low Resource Consumption CNN through Pruning and Quantization8
An Energy-Efficient Computing-in-Memory (CiM) Scheme Using Field-Free Spin-Orbit Torque (SOT) Magnetic RAMs8
Deep Recommendation With Adversarial Training8
Spin Wave Based Approximate Computing8
On Adaptive Influence Maximization Under General Feedback Models8
Enhancing Reliability of Emerging Memory Technology for Machine Learning Accelerators8
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives8
Intermittent Pulling with Local Compensation for Communication-Efficient Distributed Learning8
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory8
Adaptive MRAM Write and Read with MTJ Variation Monitor8
Voting Margin: A Scheme for Error-Tolerant k Nearest Neighbors Classifiers for Machine Learning8
Software Aging Prediction for Cloud Services Using a Gate Recurrent Unit Neural Network Model Based on Time Series Decomposition8
A Privacy Enforcing Framework for Data Streams on the Edge7
A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing7
An Efficient Monte Carlo-Based Probabilistic Time-Dependent Routing Calculation Targeting a Server-Side Car Navigation System7
Iterated Watersheds, A Connected Variation of K-Means for Clustering GIS Data7
Parallel Computing for Multi-Objective Train Rescheduling7
Algebraic attacks on block ciphers using quantum annealing7
swMR: A Framework for Accelerating MapReduce Applications on Sunway Taihulight7
Online Remaining Useful Lifetime Prediction Using Support Vector Regression7
Virtual Reality Simulation of a Quadrotor to Monitor Dependent People at Home7
Child-Computer Interaction With Mobile Devices: Recent Works, New Dataset, and Age Detection7
MTFC: A Multi-GPU Training Framework for Cube-CNN-Based Hyperspectral Image Classification7
Holo-BLSD – A Holographic Tool for Self-training and Self-Evaluation of Emergency Response Skills7
A Computing System for Discovering Causal Relationships Among Human Genes to Improve Drug Repositioning7
Additional Reviewer Assignment by Means of Weighted Association Rules7
Convolutional Autoencoder-Based Transfer Learning for Multi-Task Image Inferences7
Quantifying the Effects of Anonymization Techniques Over Micro-Databases7
On the Design of Minimal-Cost Pipeline Systems Satisfying Hard/Soft Real-Time Constraints7
AritPIM: High-Throughput In-Memory Arithmetic7
A Segmented-Edit Error-Correcting Code With Re-Synchronization Function for DNA-Based Storage Systems7
Reduced Precision Redundancy for Reliable Processing of Data7
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications7
SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys7
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud7
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes6
A BF16 FMA is All You Need for DNN Training6
Live Wire – A Low-Complexity Body Channel Communication System for Landmark Identification6
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs6
Defect Analysis and Parallel Testing for 3D Hybrid CMOS-Memristor Memory6
GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security6
SIRDAM4.0: A Support Infrastructure for Reliable Data Acquisition and Management in Industry 4.06
Targeting DNN Inference Via Efficient Utilization of Heterogeneous Precision DNN Accelerators6
A Graph-Incorporated Latent Factor Analysis Model for High-Dimensional and Sparse Data6
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities6
An eParticipation Acceptance Model6
An Efficient Single Image Enhancement Approach Using Luminance Perception Transformation6
A High Performance, Multi-Bit Output Logic-in-Memory Adder6
Protecting Memories against Soft Errors: The Case for Customizable Error Correction Codes6
Tolerating Permanent Faults with Low-Energy Overhead in Multicore Mixed-Criticality Systems6
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization6
Documenting Context-Based Quality Assessment of Controlled Vocabularies6
A Novel Technique for Fingerprint Based Secure User Authentication6
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph6
Proposal and Performance Evaluation of Information Diffusion Technique with Novel Virtual-Cell-Based Wi-Fi Direct5
Resource Allocation Optimization by Quantum Computing for Shared Use of Standalone IRS5
A Near-Sensor Processing Accelerator for Approximate Local Binary Pattern Networks5
A Flexible and Reliable RRAM-Based In-Memory Computing Architecture for Data-Intensive Applications5
PVMC: Task Mapping and Scheduling under Process Variation Heterogeneity in Mixed-Criticality Systems5
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware5
0.06677508354187