ACM Computing Surveys

Papers
(The median citation count of ACM Computing Surveys is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Generalizing from a Few Examples1266
A Survey on Bias and Fairness in Machine Learning1179
Deep Learning for Anomaly Detection963
Transformers in Vision: A Survey876
Deep Learning--based Text Classification684
Pre-train, Prompt, and Predict: A Systematic Survey of Prompting Methods in Natural Language Processing554
A Survey of Fake News456
Knowledge Graphs421
A Survey of Deep Active Learning346
Survey of Hallucination in Natural Language Generation344
A Review on Outlier/Anomaly Detection in Time Series Data304
k-Nearest Neighbour Classifiers - A Tutorial279
The Creation and Detection of Deepfakes248
Graph Neural Networks in Recommender Systems: A Survey229
A Survey on Ethereum Systems Security222
A Comprehensive Survey of Neural Architecture Search218
A Survey on Blockchain Interoperability: Past, Present, and Future Trends216
Tackling Climate Change with Machine Learning216
A Survey on Session-based Recommender Systems215
A Comprehensive Survey of Privacy-preserving Federated Learning207
Efficient Transformers: A Survey206
A Deep Journey into Super-resolution197
Generative Adversarial Networks186
Deep Learning for Sensor-based Human Activity Recognition184
When Machine Learning Meets Privacy168
A Survey of Android Malware Detection with Deep Neural Models168
Federated Learning for Smart Healthcare: A Survey167
Generative Adversarial Networks (GANs)159
An Overview of Service Placement Problem in Fog and Edge Computing159
Reinforcement Learning in Healthcare: A Survey142
Machine Learning at the Network Edge: A Survey141
Trustworthy Artificial Intelligence: A Review136
A Survey on Conversational Recommender Systems133
A Review on Fairness in Machine Learning122
Outlier Detection121
Hierarchical Reinforcement Learning120
Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems119
Deep Learning-based Anomaly Detection in Cyber-physical Systems114
Driver Emotion Recognition for Intelligent Vehicles114
Application Management in Fog Computing Environments113
A Survey on Differential Privacy for Unstructured Data Content111
Evolution of Semantic Similarity—A Survey110
A Survey on Generative Adversarial Networks: Variants, Applications, and Training109
Deep Learning for Medical Anomaly Detection – A Survey107
Quantum Key Distribution106
Generative Adversarial Networks in Computer Vision104
Challenges in Deploying Machine Learning: A Survey of Case Studies104
A Survey on Data Augmentation for Text Classification103
Recommender Systems Leveraging Multimedia Content102
Reinforcement Learning based Recommender Systems: A Survey99
Text Recognition in the Wild98
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators97
Diffusion Models: A Comprehensive Survey of Methods and Applications95
Explainable AI (XAI): Core Ideas, Techniques, and Solutions94
Assuring the Machine Learning Lifecycle94
Natural Language Processing for Requirements Engineering93
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain92
A Survey of Information Cascade Analysis92
Causality-based Feature Selection90
A Survey on Trajectory Data Management, Analytics, and Learning90
Principal Component Analysis88
A Survey on Adversarial Recommender Systems88
A Survey of Multilingual Neural Machine Translation86
Screen Content Quality Assessment: Overview, Benchmark, and Beyond85
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey85
Membership Inference Attacks on Machine Learning: A Survey85
Location Privacy-preserving Mechanisms in Location-based Services84
Generative Adversarial Networks for face generation: A survey83
Trade-offs between Distributed Ledger Technology Characteristics83
Evolutionary Large-Scale Multi-Objective Optimization: A Survey83
EEG Based Emotion Recognition: A Tutorial and Review82
A Survey of Smart Contract Formal Specification and Verification82
Survey of Post-OCR Processing Approaches81
Blockchain Technology for Cloud Storage81
A Survey on Deep Learning for Human Mobility81
An Overview of End-to-End Entity Resolution for Big Data80
Evolutionary Machine Learning: A Survey80
Voice in Human–Agent Interaction79
Named Entity Recognition and Relation Extraction79
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better79
A Survey on Deep Learning for Human Activity Recognition79
Fashion Meets Computer Vision78
Security and Privacy in IoT Using Machine Learning and Blockchain77
A Survey of Learning Causality with Data76
A Survey on Automated Log Analysis for Reliability Engineering75
Avoiding Overfitting: A Survey on Regularization Methods for Convolutional Neural Networks74
Edge Computing with Artificial Intelligence: A Machine Learning Perspective74
Adversarial Examples on Object Recognition73
Anomaly Detection in Road Traffic Using Visual Surveillance73
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions73
Machine Learning into Metaheuristics72
A Survey of State-of-the-Art on Blockchains72
Topic Modeling Using Latent Dirichlet allocation71
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions70
Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics70
Cyberattacks and Countermeasures for In-Vehicle Networks70
Smart Home Personal Assistants69
Recent Advances of Monocular 2D and 3D Human Pose Estimation: A Deep Learning Perspective69
Recent Advances in Natural Language Processing via Large Pre-trained Language Models: A Survey68
Using Social Media for Mental Health Surveillance68
A Systematic Literature Review on Federated Machine Learning68
Fuzzing: A Survey for Roadmap68
Parallel Genetic Algorithms67
The Hypervolume Indicator66
Towards Indistinguishable Augmented Reality65
Orchestration in Fog Computing: A Comprehensive Survey65
A Survey on Bayesian Deep Learning64
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures63
D’ya Like DAGs? A Survey on Structure Learning and Causal Discovery62
Implementations in Machine Ethics62
Cybersecurity of Industrial Cyber-Physical Systems: A Review62
AutoML to Date and Beyond: Challenges and Opportunities62
PLS-SEM for Software Engineering Research62
Machine Learning–based Cyber Attacks Targeting on Controlled Information61
AI in Finance: Challenges, Techniques, and Opportunities61
Serverless Computing: A Survey of Opportunities, Challenges, and Applications60
Trustworthy AI: From Principles to Practices60
Blockchain-enabled Federated Learning: A Survey60
A Survey of Knowledge-enhanced Text Generation59
Generative Adversarial Networks in Time Series: A Systematic Literature Review59
A Survey on Applications of Artificial Intelligence in Fighting Against COVID-1958
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications57
A Survey of Binary Code Similarity57
Deep Learning for Source Code Modeling and Generation57
Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s Perspective56
Attribute-based Encryption for Cloud Computing Access Control56
From Anecdotal Evidence to Quantitative Evaluation Methods: A Systematic Review on Evaluating Explainable AI55
Deep Learning-based Face Super-resolution: A Survey55
A Survey of Reinforcement Learning Algorithms for Dynamically Varying Environments54
The Evolution of Topic Modeling54
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions53
SDN Controllers53
A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses53
Deep Learning-based Human Pose Estimation: A Survey53
Decentralised Learning in Federated Deployment Environments52
A Comprehensive Survey of Few-shot Learning: Evolution, Applications, Challenges, and Opportunities52
A Survey of Machine Learning for Computer Architecture and Systems51
Knowledge Tracing: A Survey51
Blockchains51
Resource Allocation and Task Scheduling in Fog Computing and Internet of Everything Environments: A Taxonomy, Review, and Future Directions51
A Survey on Data-driven Network Intrusion Detection50
A Survey on Subgraph Counting50
A Survey of Nature-Inspired Computing49
The Serverless Computing Survey: A Technical Primer for Design Architecture49
Edge-computing-driven Internet of Things: A Survey49
Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example48
Kubernetes Scheduling: Taxonomy, Ongoing Issues and Challenges48
Understanding Optical Music Recognition47
The Elements of End-to-end Deep Face Recognition: A Survey of Recent Advances47
The Future of False Information Detection on Social Media47
A Survey on IoT Big Data47
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges46
The Programmable Data Plane46
A Survey on Aspect-Based Sentiment Classification46
A Survey on Fuzzy Deep Neural Networks46
Deep Learning on Mobile and Embedded Devices46
Self-calibration and Collaborative Localization for UWB Positioning Systems46
Deep Learning for Time Series Forecasting: Tutorial and Literature Survey45
Security Vulnerabilities of SGX and Countermeasures45
Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications45
Face Image Quality Assessment: A Literature Survey44
Evaluating Recommender Systems: Survey and Framework44
Anomaly Detection and Failure Root Cause Analysis in (Micro) Service-Based Cloud Applications: A Survey43
Security in Brain-Computer Interfaces43
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges43
Survey on Blockchain Networking43
Object Detection Using Deep Learning Methods in Traffic Scenarios42
Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges42
Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues42
Post-hoc Interpretability for Neural NLP: A Survey42
Biometric Systems Utilising Health Data from Wearable Devices42
Neural Machine Translation for Low-resource Languages: A Survey41
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning41
Community Detection in Multiplex Networks41
Application Domain-Based Overview of IoT Network Traffic Characteristics40
Biomedical Question Answering: A Survey of Approaches and Challenges40
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education40
A Survey on Active Deep Learning: From Model Driven to Data Driven40
A Survey on Trust Evaluation Based on Machine Learning40
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures40
The Eye in Extended Reality: A Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality40
Video Generative Adversarial Networks: A Review39
Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap39
The Application of the Blockchain Technology in Voting Systems39
A Survey on Embedding Dynamic Graphs39
A Holistic View on Resource Management in Serverless Computing Environments: Taxonomy and Future Directions39
Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions39
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN39
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols39
Vehicle Trajectory Similarity39
A Survey of Blockchain Consensus Protocols39
Five Facets of 6G: Research Challenges and Opportunities39
A Survey on Deep Learning for Software Engineering38
A Survey on Concept Drift in Process Mining38
Coordination of Autonomous Vehicles38
Scheduling IoT Applications in Edge and Fog Computing Environments: A Taxonomy and Future Directions37
Multimodality in VR: A Survey36
Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding36
Deep AI Enabled Ubiquitous Wireless Sensing36
Wireless Powered Mobile Edge Computing Networks: A Survey36
Big Data Systems36
A Survey of Cybersecurity Certification for the Internet of Things35
A Survey of Natural Language Generation35
A Survey on End-User Robot Programming35
Event Prediction in the Big Data Era35
Camera Measurement of Physiological Vital Signs35
A Survey on Haptic Technologies for Mobile Augmented Reality34
A Survey on Resilience in the IoT34
Computation Offloading and Retrieval for Vehicular Edge Computing34
Deep Learning on Monocular Object Pose Detection and Tracking: A Comprehensive Overview34
A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations34
A Survey of Network-on-Chip Security Attacks and Countermeasures34
Synchronous Transmissions in Low-Power Wireless34
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions33
A Survey of Joint Intent Detection and Slot Filling Models in Natural Language Understanding33
Human Factors in Phishing Attacks: A Systematic Literature Review33
Artificial Intelligence Security: Threats and Countermeasures33
Visual Affordance and Function Understanding33
Fairness in Machine Learning: A Survey33
Level-5 Autonomous Driving—Are We There Yet? A Review of Research Literature33
Exploiting Errors for Efficiency32
Cyber-aggression, Cyberbullying, and Cyber-grooming32
Self-Supervised Learning for Videos: A Survey32
Resource Management and Scheduling in Distributed Stream Processing Systems32
A Survey on Document-level Neural Machine Translation32
Gait Recognition Based on Deep Learning: A Survey32
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey32
Uncertainty-aware Decisions in Cloud Computing32
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography32
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms32
Automated Text Simplification32
A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective32
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT32
Generative Adversarial Networks for Face Generation: A Survey31
Application Layer Denial-of-Service Attacks and Defense Mechanisms31
Hardware Approximate Techniques for Deep Neural Network Accelerators: A Survey31
A Taxonomy and Survey of Power Models and Power Modeling for Cloud Servers31
Mobility Management in 5G-enabled Vehicular Networks31
Multi-core Devices for Safety-critical Systems30
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges30
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats30
A Review of Cognitive Assistants for Healthcare30
Multi-document Summarization via Deep Learning Techniques: A Survey30
Open-world Machine Learning: Applications, Challenges, and Opportunities30
Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review29
A Survey of Evaluation Metrics Used for NLG Systems29
A Survey on Edge Performance Benchmarking29
Path-Planning for Unmanned Aerial Vehicles with Environment Complexity Considerations: A Survey29
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey29
On the Edge of the Deployment: A Survey on Multi-access Edge Computing29
0.045125961303711