ACM Computing Surveys

Papers
(The median citation count of ACM Computing Surveys is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Characterization of Android Malwares and their families2016
Review and Analysis of FPGA and ASIC Implementations of NIST Lightweight Cryptography Finalists1604
Deep Learning Based Image Aesthetic Quality Assessment- A Review1456
Data Readiness for AI: A 360-Degree Survey1064
Testbeds and Evaluation Frameworks for Anomaly Detection within Built Environments: A Systematic Review998
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech738
A Systematic Survey on Android API Usage for Data-driven Analytics with Smartphones553
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey524
Semantic Data Integration and Querying: A Survey and Challenges485
Handling Iterations in Distributed Dataflow Systems479
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security476
Cryptographic Primitives in Script-based and Scriptless Payment Channel Networks: A Survey449
A Survey on the Unmanned Aircraft System Traffic Management396
A Survey of Heuristics for Profile and Wavefront Reductions362
Regulating Information and Network Security: Review and Challenges360
Human Induction in Machine Learning353
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions345
Towards Smart Education through Internet of Things: A Survey339
Counterfactual Explanations and Algorithmic Recourses for Machine Learning: A Review338
A Comprehensive Survey on Biclustering-based Collaborative Filtering329
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols307
A Survey of Binary Code Similarity295
Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review269
A Comprehensive Review on Group Re-identification in Surveillance Videos257
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance251
A Comprehensive Survey of Benchmarks for Improvement of Software's Non-Functional Properties246
A Survey on Speech Deepfake Detection238
ENDEMIC: End-to-End Network Disruptions – Examining Middleboxes, Issues, and Countermeasures – A Survey237
Adaptive Strategies in Enhancing Physical Layer Security: A Comprehensive Survey233
Social Media Identity Deception Detection230
Secure Robotics: Navigating Challenges at the Nexus of Safety, Trust, and Cybersecurity in Cyber-Physical Systems229
A Systematic Mapping Study on Quantum and Quantum-inspired Algorithms in Operations Research228
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective216
Deep Learning for Variable Renewable Energy: A Systematic Review214
A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review214
A Survey on Stability of Learning with Limited Labelled Data and its Sensitivity to the Effects of Randomness210
Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models205
Fuzzy Logic in Surveillance Big Video Data Analysis200
3D Brain and Heart Volume Generative Models: A Survey197
A Survey on Mapping Semi-Structured Data and Graph Data to Relational Data192
The Role of Formalism in System Requirements190
A Survey on Seismic Sensor based Target Detection, Localization, Identification, and Activity Recognition188
Redefining Counterfactual Explanations for Reinforcement Learning: Overview, Challenges and Opportunities180
Intelligent Edge-powered Data Reduction: A Systematic Literature Review177
Defect Categorization in Compilers: A Multi-vocal Literature Review174
A Systematic Review of Data Quality in CPS and IoT for Industry 4.0173
Vision-based Autonomous Vehicle Recognition173
A Survey of Approaches to Unobtrusive Sensing of Humans169
3D Scene Geometry Estimation from 360° Imagery: A Survey161
Self-tuning Database Systems: A Systematic Literature Review of Automatic Database Schema Design and Tuning161
Extensions of Fuzzy Cognitive Maps: A Systematic Review156
A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications155
Approaches to Conflict-free Replicated Data Types155
Sentiment Analysis for the Natural Environment: A Systematic Review152
A Review of Olfactory Display Designs for Virtual Reality Environments152
Left Ventricle Segmentation in Cardiac MR: A Systematic Mapping of the Past Decade148
Machine Learning with Confidential Computing: A Systematization of Knowledge147
Cognition in Software Engineering: A Taxonomy and Survey of a Half-Century of Research145
A Scoping Survey on Cross-reality Systems143
Image and Video Coding Techniques for Ultra-low Latency141
A Meta-Study of Software-Change Intentions141
Digital Food Sensing and Ingredient Analysis Techniques to Facilitate Human-Food Interface Designs140
Automatic Story Generation138
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice138
Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models137
Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey135
Lexical Complexity Prediction: An Overview134
Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems129
Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review129
A Survey of Threats to Research Literature-dependent Medical AI Solutions126
Machine Learning and Physics: A Survey of Integrated Models124
Demystify the Fuzzing Methods: A Comprehensive Survey122
Defenses to Membership Inference Attacks: A Survey122
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks122
Comprehensive and Comparative Analysis of QCA-based Circuit Designs for Next-generation Computation122
Early Detection of Bark Beetle Attack Using Remote Sensing and Machine Learning: A Review122
A Survey of Deep Learning for Low-shot Object Detection121
Assessing the Performance of Interactive Multiobjective Optimization Methods121
A Survey of Generative Adversarial Networks for Synthesizing Structured Electronic Health Records121
From Detection to Application: Recent Advances in Understanding Scientific Tables and Figures120
Toward Trustworthy Artificial Intelligence (TAI) in the Context of Explainability and Robustness117
DevOps Metrics and KPIs: A Multivocal Literature Review114
The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A Survey114
A Comprehensive Review and New Taxonomy on Superpixel Segmentation114
Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines114
A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures113
Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach112
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features112
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation112
A Survey of Protocol Fuzzing111
Qualitative Approaches to Voice UX111
Machine Learning for Detecting Data Exfiltration110
Temporal Relation Extraction in Clinical Texts109
A Survey on String Constraint Solving109
A Survey of Next-generation Computing Technologies in Space-air-ground Integrated Networks107
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges106
Survey on Haptic Feedback through Sensory Illusions in Interactive Systems105
Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review104
A Survey on Embedding Dynamic Graphs103
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning102
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware101
Gotta CAPTCHA ’Em All: A Survey of 20 Years of the Human-or-computer Dilemma99
Dimensionality Reduction Methods for Brain Imaging Data Analysis99
Probabilistic Rule Learning Systems98
Scarcity of Labels in Non-Stationary Data Streams: A Survey97
A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation, and Research Challenges96
Neural Architecture Search Survey: A Hardware Perspective96
A Survey of Computer Vision Technologies in Urban and Controlled-environment Agriculture95
A Comprehensive Review on IoT Marketplace Matchmaking: Approaches, Opportunities and Challenges92
Igniting Language Intelligence: The Hitchhiker’s Guide from Chain-of-Thought Reasoning to Language Agents92
Self-adaptive Federated Learning in Internet of Things Systems: A Review91
A Comprehensive Survey and Taxonomy on Single Image Dehazing Based on Deep Learning90
Explainable Deep Learning Methods in Medical Image Classification: A Survey90
A Systematic Review of API Evolution Literature89
Explainable Reinforcement Learning: A Survey and Comparative Review89
The Eye in Extended Reality: A Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality85
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT85
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries84
A Survey on Semi-supervised Learning for Delayed Partially Labelled Data Streams84
Optimization Techniques for GPU Programming83
Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement82
Code Search: A Survey of Techniques for Finding Code82
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey81
A Comprehensive Analysis of Explainable AI for Malware Hunting80
Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning79
A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations78
A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT78
Automated Analysis of Blood Smear Images for Leukemia Detection: A Comprehensive Review77
Malware Detection with Artificial Intelligence: A Systematic Literature Review76
Utilizing BERT for Information Retrieval: Survey, Applications, Resources, and Challenges76
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges76
A Joint Study of the Challenges, Opportunities, and Roadmap of MLOps and AIOps: A Systematic Survey75
Efficient Transformers: A Survey75
Brave New GES World: A Systematic Literature Review of Gestures and Referents in Gesture Elicitation Studies75
Graph Neural Networks in Recommender Systems: A Survey74
Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems74
Explainable AI (XAI): Core Ideas, Techniques, and Solutions73
Deep Learning for Medical Anomaly Detection – A Survey72
A Survey and an Empirical Evaluation of Multi-View Clustering Approaches70
A Survey on Data-driven Network Intrusion Detection70
Survey on Digital Sovereignty and Identity: From Digitization to Digitalization70
A Survey on Concept Drift in Process Mining69
Trojan Attacks and Countermeasures on Deep Neural Networks from Life-Cycle Perspective: A Review68
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions68
A Comprehensive Survey of Privacy-preserving Federated Learning67
A Comprehensive Review on Autonomous Navigation67
A Survey of Graph Neural Networks for Social Recommender Systems67
Principal Component Analysis67
Deep Multimodal Data Fusion67
A Systematic Literature Review on Hardware Reliability Assessment Methods for Deep Neural Networks66
Assuring the Machine Learning Lifecycle66
A Review on Fairness in Machine Learning65
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences65
Transformers in Vision: A Survey65
A Survey on Aspect-Based Sentiment Classification65
Diffusion Models: A Comprehensive Survey of Methods and Applications65
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better64
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions63
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications63
Trustworthy Artificial Intelligence: A Review63
Efficient Automation of Neural Network Design: A Survey on Differentiable Neural Architecture Search62
Making Sense of Big Data in Intelligent Transportation Systems: Current Trends, Challenges and Future Directions62
Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey62
Vehicle Trajectory Data Processing, Analytics, and Applications: A Survey61
Adversarial Patterns: Building Robust Android Malware Classifiers61
Personalization in Public Transport Passenger Information Systems: A Systematic Review and Framework61
I/O in Machine Learning Applications on HPC Systems: A 360-degree Survey61
A Survey of mmWave Backscatter: Applications, Platforms, and Technologies60
Human Factors in Phishing Attacks: A Systematic Literature Review60
A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective59
A Survey on Resilience in the IoT59
A Survey of Multi-modal Knowledge Graphs: Technologies and Trends58
Intelligent Wearable Systems: Opportunities and Challenges in Health and Sports58
A Survey on the Applications of Semi-supervised Learning to Cyber-security57
Security Threats, Countermeasures, and Challenges of Digital Supply Chains57
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions57
A Survey of Privacy Vulnerabilities of Mobile Device Sensors57
A Survey of Software Log Instrumentation55
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators55
Knowledge Distillation on Graphs: A Survey54
Topic-based Video Analysis54
Natural Language Processing Methods for Symbolic Music Generation and Information Retrieval: A Survey54
LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey54
A Survey on Exploring Real and Virtual Social Network Rumors: State-of-the-Art and Research Challenges54
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges53
Contactless Diseases Diagnoses Using Wireless Communication Sensing: Methods and Challenges Survey53
Security Assessment and Evaluation of VPNs: A Comprehensive Survey53
Private Graph Data Release: A Survey53
Deep Learning for Plant Identification and Disease Classification from Leaf Images: Multi-prediction Approaches53
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks53
An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools52
Machine Learning in Metaverse Security: Current Solutions and Future Challenges52
A Survey of Multimodal Learning: Methods, Applications, and Future52
Towards a Better Understanding of Evaluating Trustworthiness in AI Systems52
Images in Space and Time52
Dynamic Testing Techniques of Non-functional Requirements in Mobile Apps: A Systematic Mapping Study52
Security and Privacy in Unified Communication51
A Survey on End-User Robot Programming51
Advancing SDN from OpenFlow to P4: A Survey51
A Review on Trustworthiness of Digital Assistants for Personal Healthcare51
Deep Learning Models for Serendipity Recommendations: A Survey and New Perspectives51
Uncertainty-aware Decisions in Cloud Computing51
Recent Advances of Differential Privacy in Centralized Deep Learning: A Systematic Survey51
A Systematic Review of Cross-Lingual Sentiment Analysis: Tasks, Strategies, and Prospects51
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey50
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN49
A Survey on Voice Assistant Security: Attacks and Countermeasures49
Constraint Enforcement on Decision Trees: A Survey49
Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding49
A Survey on Hypergraph Mining: Patterns, Tools, and Generators48
Deep Learning for Cross-Domain Few-Shot Visual Recognition: A Survey48
Evolutionary Machine Learning: A Survey48
PLS-SEM for Software Engineering Research48
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey48
Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges48
Rearrangement Distance Problems: An updated survey48
Introduction to Special Issue on Trustworthy Artificial Intelligence (Part II)48
Deep Learning Approaches on Image Captioning: A Review47
Benchmarking Quantum Computers and the Impact of Quantum Noise46
A Survey on Automated Log Analysis for Reliability Engineering46
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions46
SoK: Access Control Policy Generation from High-level Natural Language Requirements45
Software Visualizations to Analyze Memory Consumption: A Literature Review45
A Systematic Literature Review of Enterprise Architecture Evaluation Methods45
Knowledge-based Cyber Physical Security at Smart Home: A Review45
State of the Art and Potentialities of Graph-level Learning45
Socially Enhanced Situation Awareness from Microblogs Using Artificial Intelligence: A Survey45
A Systematic Review on Graph Neural Network-based Methods for Stock Market Forecasting45
Advancements in Federated Learning: Models, Methods, and Privacy44
A Survey on Perfectly Secure Verifiable Secret-sharing44
Synthetic Data for Deep Learning in Computer Vision & Medical Imaging: A Means to Reduce Data Bias44
Toward a Privacy-Preserving Face Recognition System: A Survey of Leakages and Solutions44
Macro Ethics Principles for Responsible AI Systems: Taxonomy and Directions44
Controllable Data Generation by Deep Learning: A Review43
Multi-Class Imbalanced Data Handling with Concept Drift in Fog Computing: A Taxonomy, Review, and Future Directions43
Explainability in Deep Reinforcement Learning: A Review into Current Methods and Applications43
Mobility Trace Analysis for Intelligent Vehicular Networks43
A Survey of Oblivious Transfer Protocol43
A Review of Explainable Fashion Compatibility Modeling Methods43
40 Years of Designing Code Comprehension Experiments: A Systematic Mapping Study43
Survey on the Objectives of Recommender Systems: Measures, Solutions, Evaluation Methodology, and New Perspectives43
IoT Cloud Security Review43
The Gap Between Trustworthy AI Research and Trustworthy Software Research: A Tertiary Study42
A Survey of Text Watermarking in the Era of Large Language Models42
Gender Bias in Natural Language Processing and Computer Vision: A Comparative Survey41
A Systematic Literature Review on the Influence of Enhanced Developer Experience on Developers' Productivity: Factors, Practices, and Recommendations41
A Survey and Taxonomy of Latency Compensation Techniques for Network Computer Games41
Learning-based Artificial Intelligence Artwork: Methodology Taxonomy and Quality Evaluation40
A Survey on IoT Programming Platforms: A Business-Domain Experts Perspective40
A Review on the Use of Physiological Signals for Assessing Postoperative Pain40
0.22509002685547