ACM Computing Surveys

Papers
(The H4-Index of ACM Computing Surveys is 101. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Characterization of Android Malwares and their families2016
Review and Analysis of FPGA and ASIC Implementations of NIST Lightweight Cryptography Finalists1604
Deep Learning Based Image Aesthetic Quality Assessment- A Review1456
Data Readiness for AI: A 360-Degree Survey1064
Testbeds and Evaluation Frameworks for Anomaly Detection within Built Environments: A Systematic Review998
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech738
A Systematic Survey on Android API Usage for Data-driven Analytics with Smartphones553
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey524
Semantic Data Integration and Querying: A Survey and Challenges485
Handling Iterations in Distributed Dataflow Systems479
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security476
Cryptographic Primitives in Script-based and Scriptless Payment Channel Networks: A Survey449
A Survey on the Unmanned Aircraft System Traffic Management396
A Survey of Heuristics for Profile and Wavefront Reductions362
Regulating Information and Network Security: Review and Challenges360
Human Induction in Machine Learning353
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions345
Towards Smart Education through Internet of Things: A Survey339
Counterfactual Explanations and Algorithmic Recourses for Machine Learning: A Review338
A Comprehensive Survey on Biclustering-based Collaborative Filtering329
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols307
A Survey of Binary Code Similarity295
Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review269
A Comprehensive Review on Group Re-identification in Surveillance Videos257
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance251
A Comprehensive Survey of Benchmarks for Improvement of Software's Non-Functional Properties246
A Survey on Speech Deepfake Detection238
ENDEMIC: End-to-End Network Disruptions – Examining Middleboxes, Issues, and Countermeasures – A Survey237
Adaptive Strategies in Enhancing Physical Layer Security: A Comprehensive Survey233
Social Media Identity Deception Detection230
Secure Robotics: Navigating Challenges at the Nexus of Safety, Trust, and Cybersecurity in Cyber-Physical Systems229
A Systematic Mapping Study on Quantum and Quantum-inspired Algorithms in Operations Research228
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective216
A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review214
Deep Learning for Variable Renewable Energy: A Systematic Review214
A Survey on Stability of Learning with Limited Labelled Data and its Sensitivity to the Effects of Randomness210
Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models205
Fuzzy Logic in Surveillance Big Video Data Analysis200
3D Brain and Heart Volume Generative Models: A Survey197
A Survey on Mapping Semi-Structured Data and Graph Data to Relational Data192
The Role of Formalism in System Requirements190
A Survey on Seismic Sensor based Target Detection, Localization, Identification, and Activity Recognition188
Redefining Counterfactual Explanations for Reinforcement Learning: Overview, Challenges and Opportunities180
Intelligent Edge-powered Data Reduction: A Systematic Literature Review177
Defect Categorization in Compilers: A Multi-vocal Literature Review174
Vision-based Autonomous Vehicle Recognition173
A Systematic Review of Data Quality in CPS and IoT for Industry 4.0173
A Survey of Approaches to Unobtrusive Sensing of Humans169
Self-tuning Database Systems: A Systematic Literature Review of Automatic Database Schema Design and Tuning161
3D Scene Geometry Estimation from 360° Imagery: A Survey161
Extensions of Fuzzy Cognitive Maps: A Systematic Review156
A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications155
Approaches to Conflict-free Replicated Data Types155
A Review of Olfactory Display Designs for Virtual Reality Environments152
Sentiment Analysis for the Natural Environment: A Systematic Review152
Left Ventricle Segmentation in Cardiac MR: A Systematic Mapping of the Past Decade148
Machine Learning with Confidential Computing: A Systematization of Knowledge147
Cognition in Software Engineering: A Taxonomy and Survey of a Half-Century of Research145
A Scoping Survey on Cross-reality Systems143
A Meta-Study of Software-Change Intentions141
Image and Video Coding Techniques for Ultra-low Latency141
Digital Food Sensing and Ingredient Analysis Techniques to Facilitate Human-Food Interface Designs140
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice138
Automatic Story Generation138
Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models137
Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey135
Lexical Complexity Prediction: An Overview134
Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems129
Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review129
A Survey of Threats to Research Literature-dependent Medical AI Solutions126
Machine Learning and Physics: A Survey of Integrated Models124
Comprehensive and Comparative Analysis of QCA-based Circuit Designs for Next-generation Computation122
Early Detection of Bark Beetle Attack Using Remote Sensing and Machine Learning: A Review122
Demystify the Fuzzing Methods: A Comprehensive Survey122
Defenses to Membership Inference Attacks: A Survey122
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks122
A Survey of Generative Adversarial Networks for Synthesizing Structured Electronic Health Records121
A Survey of Deep Learning for Low-shot Object Detection121
Assessing the Performance of Interactive Multiobjective Optimization Methods121
From Detection to Application: Recent Advances in Understanding Scientific Tables and Figures120
Toward Trustworthy Artificial Intelligence (TAI) in the Context of Explainability and Robustness117
The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A Survey114
A Comprehensive Review and New Taxonomy on Superpixel Segmentation114
Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines114
DevOps Metrics and KPIs: A Multivocal Literature Review114
A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures113
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation112
Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach112
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features112
Qualitative Approaches to Voice UX111
A Survey of Protocol Fuzzing111
Machine Learning for Detecting Data Exfiltration110
A Survey on String Constraint Solving109
Temporal Relation Extraction in Clinical Texts109
A Survey of Next-generation Computing Technologies in Space-air-ground Integrated Networks107
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges106
Survey on Haptic Feedback through Sensory Illusions in Interactive Systems105
Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review104
A Survey on Embedding Dynamic Graphs103
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning102
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware101
0.17942714691162