Computer

Papers
(The TQCC of Computer is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
A Research Agenda for Hybrid Intelligence: Augmenting Human Intellect With Collaborative, Adaptive, Responsible, and Explainable Artificial Intelligence115
The Carbon Footprint of Machine Learning Training Will Plateau, Then Shrink82
Blockchain and Fog Computing for Cyberphysical Systems: The Case of Smart Industry65
The Ten Commandments of Ethical Medical AI63
Generative Artificial Intelligence: Trends and Prospects56
Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading55
Toward Human–AI Interfaces to Support Explainability and Causability in Medical AI53
PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs39
The Rise of the Quantum Internet37
Virtual Worlds (Metaverse): From Skepticism, to Fear, to Immersive Opportunities36
Beyond Zero Trust: Trust Is a Vulnerability36
Deep Learning36
Scams, Frauds, and Crimes in the Nonfungible Token Market33
Blockchain for E-Health-Care Systems: Easier Said Than Done32
The Edge-to-Cloud Continuum31
Let’s Rename Everything “the Metaverse!”30
Cybertrust: From Explainable to Actionable and Interpretable Artificial Intelligence27
Zero Trust: The What, How, Why, and When26
Digital Twins: Universal Interoperability for the Digital Age25
To Improve Cyber Resilience, Measure It25
The Rise of Generative Artificial Intelligence and Its Impact on Education: The Promises and Perils25
Algorithm Auditing: Managing the Legal, Ethical, and Technological Risks of Artificial Intelligence, Machine Learning, and Associated Algorithms22
Blockchain Architecture for Auditing Automation and Trust Building in Public Markets22
Dynamic Assurance Cases: A Pathway to Trusted Autonomy21
National Varieties of Artificial Intelligence Discourses: Myth, Utopianism, and Solutionism in West European Policy Expectations20
Free and Open Source Software License Compliance: Tools for Software Composition Analysis19
Transparency for Whom? Assessing Discriminatory Artificial Intelligence19
The Cyberphysical Power System Resilience Testbed: Architecture and Applications19
Explainable AI for Chiller Fault-Detection Systems: Gaining Human Trust19
Explainable Machine Learning for Fraud Detection19
Isomorphic Internet of Things Architectures With Web Technologies18
Generative Artificial Intelligence and the Education Sector18
AI Ethics: A Long History and a Recent Burst of Attention18
Software-Engineering Design Patterns for Machine Learning Applications18
Explainable Recommendations and Calibrated Trust: Two Systematic User Errors18
Open Questions in Formal Methods18
Autonomous Last-Mile Delivery Vehicles in Complex Traffic Environments18
A Comparison of Native and Cross-Platform Frameworks for Mobile Applications18
The International Roadmap for Devices and Systems: A Beacon for the Electronics Industry16
The Top 10 Risks of Machine Learning Security16
Computer Education in the Age of COVID-1915
Managing Your Open Source Supply Chain-Why and How?15
Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches14
Managing Artificial Intelligence Deployment in the Public Sector14
The Economics of Digital Twins14
State of Data Privacy During COVID-1913
Token Economics in Real Life: Cryptocurrency and Incentives Design for Insolar's Blockchain Network13
Toward Improving Confidence in Autonomous Vehicle Software: A Study on Traffic Sign Recognition Systems13
Blockchain and Cyberphysical Systems13
Multidrone Systems: More Than the Sum of the Parts13
Interactive Artificial Intelligence: Designing for the "Two Black Boxes" Problem13
Blockchain for Video Streaming: Opportunities, Challenges, and Open Issues13
Autonomous Vehicles Digital Twin: A Practical Paradigm for Autonomous Driving System Development12
The Economics of Central Bank Digital Currency [Computing's Economics]12
Artificial Intelligence and Critical Systems: From Hype to Reality12
Transparency as Threat at the Intersection of Artificial Intelligence and Cyberbiosecurity12
21 Years of Distributed Denial-of Service: Current State of Affairs12
Federated Learning: The Pioneering Distributed Machine Learning and Privacy-Preserving Data Technology12
The Cyberwarfare in Ukraine12
Cyber Resilience: by Design or by Intervention?12
Big Data: Present and Future12
2021 State of the Practice in Data Privacy and Security12
Open Source Research Software12
Pushing the Limits of Autonomy for Enabling the Next Generation of Space Robotics Exploration Missions11
The Economics Behind Food Supply Blockchains11
A Survey on Deep Learning Resilience Assessment Methodologies11
Sensitive Detection of GPS Spoofing Attack in Phasor Measurement Units via Quasi-Dynamic State Estimation11
Large-Scale Artificial Intelligence Models11
A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation11
21 Years of Distributed Denial-of-Service: A Call to Action11
Data-Centric Edge Computing to Defend Power Grids Against IoT-Based Attacks11
Trustworthy Artificial Intelligence Requirements in the Autonomous Driving Domain11
Making Open Source Project Health Transparent11
Contactless U: Higher Education in the Postcoronavirus World11
Attacking Electricity Markets Through IoT Devices11
National Metaverse Strategies10
Computational Intelligence for Safety Assurance of Cooperative Systems of Systems10
Adversarial Machine Learning: Attacks From Laboratories to the Real World10
Real-Time Systems Implications in the Blockchain-Based Vertical Integration of Industry 4.010
An Approach for Detection of Advanced Persistent Threat Attacks10
A Typology of Metaverses10
Hybrid Human-Artificial Intelligence10
Deep Learning and the Oceans10
Edge Artificial Intelligence Chips for the Cyberphysical Systems Era10
A Secure and Flexible FPGA-Based Blockchain System for the IIoT10
Three Levels of AI Transparency10
Denial-of-Service Resilient Frameworks for Synchrophasor-Based Wide Area Monitoring Systems9
Big Data Pipelines on the Computing Continuum: Tapping the Dark Data9
ChatGPT and Chat History: Challenges for the New Wave9
Bungie: Improving Fault Tolerance via Extensible Application-Level Protocols9
Architectural Design Decisions for the Machine Learning Workflow9
Blockchain’s Carbon and Environmental Footprints9
Explainability as a User Requirement for Artificial Intelligence Systems9
Digital Humanism: The Time Is Now9
The Role of Data and Artificial Intelligence in Driving Diversity, Equity, and Inclusion9
Public Strategies for Artificial Intelligence: Which Value Drivers?8
El Salvador’s Bitcoin Gamble8
Digital Storage and Memory8
Security Awareness Training for the Workforce: Moving Beyond "Check-the-Box" Compliance8
Open Banking: Definition and Description8
Protocols Over Things: A Decentralized Programming Model for the Internet of Things8
Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk?8
Documenting High-Risk AI: A European Regulatory Perspective8
Artificial Intelligence and Software Engineering: Are We Ready?8
Toward Formal Methods for Smart Cities8
Wasabi: A Conceptual Model for Trustworthy Artificial Intelligence8
eCloud: A Vision for the Evolution of the Edge-Cloud Continuum8
Defending IEEE Software Standards in Federal Criminal Court8
Indian Sign Language Generation System7
Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks7
Compositional Thinking in Cyberphysical Systems Theory7
Cybersecurity for the Smart Grid7
Delivering Software- and Systems-Engineering Standards for Small Teams7
A Novel Reputation System for Mobile App Stores Using Blockchain7
Cyberphysical Security Through Resiliency: A Systems-Centric Approach7
Worlds Apart: Technology, Remote Work, and Equity7
Transformers for GUI Testing: A Plausible Solution to Automated Test Case Generation and Flaky Tests7
Privacy-Preserved Optimal Energy Trading, Statistics, and Forecasting for a Neighborhood Area Network7
Green Configuration: Can Artificial Intelligence Help Reduce Energy Consumption of Configurable Software Systems?6
Efficient Computer Vision for Embedded Systems6
Virtualization Over Multiprocessor Systems-on-Chip: An Enabling Paradigm for the Industrial Internet of Things6
Sustainability: Fundamentals-Based Approach to Paying It Forward6
The Cities Challenge: Driving a Green and Digital Recovery and Social Resilience6
Digital Self: The Next Evolution of the Digital Human6
Digital Twins: From Conceptual Views to Industrial Applications in the Electrical Domain6
Data Privacy Considerations for Central Bank Digital Currencies in Asia–Pacific Countries6
Artificial Intelligence in Government6
Algorithms for Artificial Intelligence6
Smart City Intersections: Intelligence Nodes for Future Metropolises6
Reshaping the Landscape of the Future: Software-Defined Manufacturing6
The Metaverse University6
Crowd-Machine Hybrid Urban Sensing and Computing6
COVID-19 Meets Big Tech6
Artificial Intelligence in Critical Infrastructure Systems6
Data and Disinformation6
Π-RT: A Runtime Framework to Enable Energy-Efficient Real-Time Robotic Vision Applications on Heterogeneous Architectures6
Interpretable Fault Diagnosis for Cyberphysical Systems: A Learning Perspective6
WiF0: All Your Passphrase Are Belong to Us6
A Brief History of Free, Open Source Software and Its Communities6
Zero-Trust Artificial Intelligence?6
Challenges and Issues in Data Science Education5
Formal Methods in Cyberphysical Systems5
A Trusted Federated System to Share Granular Data Among Disparate Database Resources5
From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively5
Challenging the Digital Divide: Factors Affecting the Availability, Adoption, and Acceptance of Future Technology in Elderly User Communities5
AI Maintenance: A Robustness Perspective5
Democratizing Science Through Advanced Cyberinfrastructure5
Continuous Open Source License Compliance5
Making Digital Twins Work5
The Equifax Hack Revisited and Repurposed5
When Scientific Software Meets Software Engineering5
Trusting Digital Twins5
Supervisor Synthesis: Bridging Theory and Practice5
Economics of Artificial Intelligence in the Gulf Cooperation Council Countries5
Reliability, Security, and Privacy in Power Grids5
Standardizing Open Source License Compliance With OpenChain5
Do Data Almost Always Eventually Leak?5
Can We Prevent a Technological Arms Race in University Student Cheating?5
Edge Computing: The Computing Infrastructure for the Smart Megacities of the Future5
Strategy and Tactics Against Ransomware5
Building a Human-Intelligent Metaverse5
Stateful Function as a Service at the Edge5
Environment Modeling During Model Checking of Cyberphysical Systems5
Centering the Law in the Digital State5
Attacking Machine Learning Systems5
Lightweight Authenticated Key Exchange With EDHOC5
Engineering Education in the Age of Autonomous Machines4
ChatGPT and AIChat Epistemology4
Explaining the Walking Through of a Team of Algorithms4
Ethics, Safety, and Autonomous Vehicles4
Embedded Artificial Intelligence: The ARTEMIS Vision4
The Path to a Consensus on Artificial Intelligence Assurance4
Changing Landscape of Technical Education Pedagogy From Traditional to Practical e-Learning4
Technology Predictions4
Artificial Intelligence-Based Referral System for Patients With Diabetic Retinopathy4
The Quantum Cybersecurity Threat May Arrive Sooner Than You Think4
Decentralized Machine Learning for Intelligent Health-Care Systems on the Computing Continuum4
Formal Verification of Cyberphysical Systems4
Rise of the Autonomous Machines4
Controller Resynthesis for Multirobot System When Changes Happen4
Computing Nearer to Data4
Multilayered Diagnostics for Smart Cities4
On the High-Energy Consumption of Bitcoin Mining4
Embracing Physical Keyboards for Virtual Reality4
Digital Transformation: Lights and Shadows4
Aging, Fast and Slow4
Conversational Artificial Intelligence: Changing Tomorrow’s Health Care Today4
Deep Conversational Recommender Systems: Challenges and Opportunities4
Unconventional Concerns for Human-Centered Artificial Intelligence4
Algorithmic Nudge: An Approach to Designing Human-Centered Generative Artificial Intelligence4
Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity4
Blockchain: From Technology to Marketplaces4
The Promises and Challenges of Open Source Hardware4
The Open Source Distributor Business Model4
Commercial Participation in OpenStack: Two Sides of a Coin4
Understanding Smart Medical Devices4
Internet of Telemedicine4
The Convergence of Hyperscale Data Center and High-Performance Computing Networks4
Open Source Hardware4
Research Challenges for Heterogeneous Cyberphysical System Design4
Multiple-Deep Neural Network Accelerators for Next-Generation Artificial Intelligence Systems4
Is Privacy Regulation Slowing Down Research on Pervasive Computing?4
Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems4
BeeMe: Real-Time Internet Control of Situated Human Agents4
Experiencing Hyperloops: The Transit of the Future4
Can You Trust Zero Trust?4
Agile–CMMI Alignment: Contributions and To-Dos for Organizations3
Discovering Opioid Use Patterns From Social Media for Relapse Prevention3
Software Supply-Chain Security: Issues and Countermeasures3
Security or Privacy: Can You Have Both?3
Explainable artificial intelligence and machine learning [Guest Editors’ introduction]3
Taming Memory With Disaggregation3
Software Development Metrics With a Purpose3
New Horizons for High-Performance Computing3
A Taxonomy for Distributed Ledger Analytics3
20 Years of Software Security3
Defensive AI: The Future Is Yesterday3
Open Source Community Governance the Apache Way3
Economics of Nonfungible Tokens3
The Importance of Interoperability in Functional Safety Standards3
IEEE Standard 1838 Is on the Move3
Predicting Technologies That Advance Humanity3
The Economics of Blockchain-Based Supply Chain Traceability in Developing Countries3
An Enterprise Transformation Guide for the Inevitable Blockchain Disruption3
Data-Centric Artificial Intelligence, Preprocessing, and the Quest for Transformative Artificial Intelligence Systems Development3
Building an Internet of Secure Things3
Trustworthy AI—Part 13
Hubris—From the Metaverse to ChatGPT to TikTok’s Time of Tribulation3
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices3
A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems3
Control System Cyber Incidents Are Real—and Current Prevention and Mitigation Strategies Are Not Working3
Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?3
12 Flavors of IoT3
The QAnon Phenomenon: The Storm Has Always Been Among Us3
Information-Operation Technology Integration in Industrial Cyberphysical Systems3
From Big Data Technologies to Big Data Benefits3
Human-Centered AI: A Framework for Green and Sustainable AI3
In-Network Computing With Function as a Service at the Edge3
Collaborative Artificial Intelligence Needs Stronger Assurances Driven by Risks3
Open Banking: What It Is, Where It’s at, and Where It’s Going3
Technomoral Affordances of Artificial Intelligence in Data-Driven Systems3
A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation3
Where’s the Silicon?3
Scarcity3
Project moveSMART: When Physical Education Meets Computational Thinking in Elementary Classrooms3
Invisible Supply Chain Attacks Based on Trojan Source3
TikTok in 2022: Revisiting Data and Privacy3
The Monkey, the Ant, and the Elephant: Addressing Safety in Smart Spaces3
Collaboration Stability: Quantifying the Success and Failure of Opportunistic Collaboration3
A Comprehensive Inspection of the Straggler Problem3
0.038304805755615