IEEE Transactions on Emerging Topics in Computing

Papers
(The TQCC of IEEE Transactions on Emerging Topics in Computing is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Smart Resource Allocation for Mobile Edge Computing: A Deep Reinforcement Learning Approach298
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City176
Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection136
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services120
Blockchain Mutability: Challenges and Proposed Solutions113
Academic Influence Aware and Multidimensional Network Analysis for Research Collaboration Navigation Based on Scholarly Big Data110
A Mental Health Chatbot for Regulating Emotions (SERMO) - Concept and Usability Test106
A Survey of Incentive Mechanism Design for Federated Learning104
An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems91
Exploring Research in Blockchain for Healthcare and a Roadmap for the Future82
Leveraging Communicating UAVs for Emergency Vehicle Guidance in Urban Areas79
Novel Low Cost, Double-and-Triple-Node-Upset-Tolerant Latch Designs for Nano-scale CMOS78
HCP: Heterogeneous Computing Platform for Federated Learning Based Collaborative Content Caching Towards 6G Networks76
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs69
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs67
Sway: Traffic-Aware QoS Routing in Software-Defined IoT64
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing63
Blockchain-Based Trust Management for Internet of Vehicles60
Edge Cloud Server Deployment With Transmission Power Control Through Machine Learning for 6G Internet of Things60
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme58
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition57
VOPRec: Vector Representation Learning of Papers with Text Information and Structural Identity for Recommendation56
Online Fall Detection Using Recurrent Neural Networks on Smart Wearable Devices55
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments54
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment53
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts53
Design and Analysis of Majority Logic-Based Approximate Adders and Multipliers50
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network45
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks45
Surrogate-Assisted Evolutionary Framework with Adaptive Knowledge Transfer for Multi-Task Optimization44
A Comparative Study of Virtual Reality Methods of Interaction and Locomotion Based on Presence, Cybersickness, and Usability44
The Effects of Approximate Multiplication on Convolutional Neural Networks42
A Novel TDMA-Based Fault Tolerance Technique for the TSVs in 3D-ICs Using Honeycomb Topology41
Graph Learning for Cognitive Digital Twins in Manufacturing Systems41
A Quantum Mechanics-Based Framework for EEG Signal Feature Extraction and Classification39
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons39
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes39
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network39
StreamFlow: Cross-Breeding Cloud With HPC38
RDAM: A Reinforcement Learning Based Dynamic Attribute Matrix Representation for Virtual Network Embedding38
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data37
A Flip-Flop Based Arbiter Physical Unclonable Function (APUF) Design with High Entropy and Uniqueness for FPGA Implementation37
Quantum Circuit Designs of Integer Division Optimizing T-count and T-depth36
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment35
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy35
A Novel Bio-Inspired Approach for High-Performance Management in Service-Oriented Networks34
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning32
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs32
Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter32
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks31
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing31
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers30
A Machine-Learning Model for Automatic Detection of Movement Compensations in Stroke Patients29
ScanSAT: Unlocking Static and Dynamic Scan Obfuscation28
The Role of Explainability in Assuring Safety of Machine Learning in Healthcare27
A 3.3 Gbps CCSDS 123.0-B-1 Multispectral & Hyperspectral Image Compression Hardware Accelerator on a Space-Grade SRAM FPGA27
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability27
Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications27
Fast and Robust UAV to UAV Detection and Tracking From Video27
PLAM: A Posit Logarithm-Approximate Multiplier26
Lightweight Privacy-Preserving Raw Data Publishing Scheme26
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation26
A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips26
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols25
Time-Bounded Activity Recognition for Ambient Assisted Living25
XpulpNN: Enabling Energy Efficient and Flexible Inference of Quantized Neural Networks on RISC-V Based IoT End Nodes25
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework24
Energy- and Quality-Efficient Approximate Multipliers for Neural Network and Image Processing Applications24
Design of Anonymous Endorsement System in Hyperledger Fabric24
Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems24
Secrecy Driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization24
Reformative Noise-Immune Neural Network for Equality-Constrained Optimization Applied to Image Target Detection24
Privacy-Preserving Deep Learning NLP Models for Cancer Registries23
Skeleton-Based Action Segmentation With Multi-Stage Spatial-Temporal Graph Convolutional Neural Networks23
Automatic Signature Verification in the Mobile Cloud Scenario: Survey and Way Ahead23
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis23
SDLSC-TA: Subarea Division Learning Based Task Allocation in Sparse Mobile Crowdsensing23
DiabDeep: Pervasive Diabetes Diagnosis Based on Wearable Medical Sensors and Efficient Neural Networks23
A Novel Quantum-Inspired Fuzzy Based Neural Network for Data Classification23
FarSight: Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes22
High Quality Down-Sampling for Deterministic Approaches to Stochastic Computing22
Hardware Constructions for Lightweight Cryptographic Block Cipher QARMA With Error Detection Mechanisms22
First Tests of a New Facility for Device-Level, Board-Level and System-Level Neutron Irradiation of Microelectronics21
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications21
Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images21
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain20
A Blockchain-Powered Decentralized and Secure Computing Paradigm20
Approximate Recursive Multipliers Using Low Power Building Blocks20
Defect and Fault Modeling Framework for STT-MRAM Testing20
DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems20
Secure Data Sequence Query Framework Based on Multiple Fogs20
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems20
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring19
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT19
Cluster-Based Heuristic for High Level Synthesis Design Space Exploration19
Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography18
Collaborative Trajectory Mining in Smart-Homes to Support Early Diagnosis of Cognitive Decline18
Highly-Parallel FPGA Accelerator for Simulated Quantum Annealing18
Fully Dynamic Inference with Deep Neural Networks18
ARMOR: An Anti-Counterfeit Security Mechanism for Low Cost Radio Frequency Identification Systems18
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects18
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator17
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting17
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT17
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases17
Value of Information Based Sensor Ranking for Efficient Sensor Service Allocation in Service Oriented Wireless Sensor Networks17
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices17
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices17
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems16
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks16
Polynomial Vault: A Secure and Robust Fingerprint based Authentication16
The e-LocGov Model for Introducing e-Governance into Local Governments: An Estonian Case Study16
A Survey of MRAM-Centric Computing: From Near Memory to In Memory16
Design and Evaluate Recomposited OR-AND-XOR-PUF15
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking15
Low-Energy Acceleration of Binarized Convolutional Neural Networks Using a Spin Hall Effect Based Logic-in-Memory Architecture15
Bitcoin Transaction Forecasting With Deep Network Representation Learning15
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems15
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning15
Reinforcement Learning-based Mobile Edge Computing and Transmission Scheduling for Video Surveillance15
A Service-based Joint Model Used for Distributed Learning: Application for Smart Agriculture15
UAV-Aided Information Diffusion for Vehicle-to-Vehicle (V2V) in Disaster Scenarios15
EXSCALATE: An Extreme-Scale Virtual Screening Platform for Drug Discovery Targeting Polypharmacology to Fight SARS-CoV-215
SPRING: A Sparsity-Aware Reduced-Precision Monolithic 3D CNN Accelerator Architecture for Training and Inference15
A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data14
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation14
Incremental Learning Using a Grow-and-Prune Paradigm With Efficient Neural Networks14
Solar Particle Event and Single Event Upset Prediction from SRAM-based Monitor and Supervised Machine Learning14
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing14
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection14
A Cybersecurity Educated Community14
Detection of Limited Magnitude Errors in Emerging Multilevel Cell Memories by One-Bit Parity (OBP) or Two-Bit Parity (TBP)14
Efficient Word Size Modular Arithmetic14
Quantifying the Impact of Monolithic 3D (M3D) Integration on L1 Caches14
Quantum Computing Based Optimization for Intelligent Reflecting Surface (IRS)-Aided Cell-Free Network13
Multilevel Graph-Based Decision Making in Big Scholarly Data: An Approach to Identify Expert Reviewer, Finding Quality Impact Factor, Ranking Journals and Researchers13
Cyber Security Framework for Vehicular Network Based on a Hierarchical Game13
E-Voting System Evaluation Based on The Council of Europe Recommendations: Helios Voting13
FireNN: Neural Networks Reliability Evaluation on Hybrid Platforms13
IoTRec: The IoT Recommender for Smart Parking System13
A New Application for the Motor Rehabilitation at Home: Structure and Usability of Bal-App13
Public Service Models: A Systematic Literature Review and Synthesis13
Distributing Tourists among POIs with an Adaptive Trip Recommendation System13
DICO: A Graph-DB Framework for Community Detection on Big Scholarly Data13
Efficient Key-Gate Placement and Dynamic Scan Obfuscation Towards Robust Logic Encryption12
IoTility: Architectural Requirements for Enabling Health IoT Ecosystems12
COACH: Consistency Aware Check-Pointing for Nonvolatile Processor in Energy Harvesting Systems12
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design12
AxRMs: Approximate Recursive Multipliers using High-Performance Building Blocks12
Side-Channel Attack Analysis on In-Memory Computing Architectures12
High-Speed Memristive Ternary Content Addressable Memory12
An Empirical Investigation of the Relationship between Local Government Budgets, IT Expenditures, and Cyber Losses12
Probabilistic Interpolation Recoder for Energy-Error-Product Efficient DBNs With p-Bit Devices12
Framework for Prioritization of Open Data Publication: An Application to Smart Cities12
0.053951978683472