IT Professional

Papers
(The TQCC of IT Professional is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
IEEE Computer Society Information64
Makers’ Studio: Enabling Education and Skill Development Through ICT63
5G/SDR-Assisted Cognitive Communication in UAV Swarms: Architecture and Applications55
Deeper Understanding of Software Change45
A Novel Framework for Smart Systems Using Blockchain-Enabled Internet of Things41
IEEE Transactions on Big Data36
Table of Contents35
Applying Explainable Artificial Intelligence Models for Understanding Depression Among IT Workers34
IEEE Computer Society Computing Edge32
IEEE Computer Society D&I Fund26
IT Professional: Call for Articles24
Carnegie Mellon University23
IEEE Multimedia22
IEEE Computer Society Information21
Comprehensively Labeled Weakness and Vulnerability Datasets via Unambiguous Formal Bugs Framework Specifications20
SAME: The Design Space for Seamless Automotive Multimodal Experience20
Cognitive AI for Mitigation of Misinformation in Online Social Networks19
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors19
IEEE Annals18
Intelligent IoT- and UAV-Assisted Architecture for Pipeline Monitoring in OGI17
Smart Helmet: Combining Sensors, AI, Augmented Reality, and Personal Protection to Enhance First Responders’ Situational Awareness16
Evaluating the Effect of Human Factors on Big Data Analytics and Cloud of Things Adoption in the Manufacturing Micro, Small, and Medium Enterprises15
Monetizing Quantum Computing15
ComputingEdge15
Securing the Industrial Internet of Things: A Comprehensive Digital Forensic Readiness Framework and Cybersecurity Approach15
Revisiting IT and 21st Century Employment++15
QUALITY MODELING14
[Masthead]13
Call for Papers: IEEE Transactions on Computers13
IEEE Computer Architecture Letters13
CAPTCHA-Based Secret-Key Sharing Using Quantum Communication12
Masthead12
Drive Diversity & Inclusion in Computing12
Measuring the Exploitation of Weaknesses in the Wild10
Can China Catch Up to the United States in Generative Artificial Intelligence?10
Biometrics for Hardware Security and Trust: Discussion and Analysis10
Digital Health and Artificial Intelligence: Advancing Healthcare Provision in Latin America10
Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review9
IEEE Security & Privacy9
Misinformation Detection on Social Media: Challenges and the Road Ahead9
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING9
Masthead9
Infrastructure-Less Prioritized Communication Platform for First Responders8
IT Professional—Retrospectives and Perspectives8
IEEE Computer Society7
Masterminds of Deep Learning7
IEEE Computer Society Jobs Board7
Nothing Is Harder to Resist Than the Temptation of AI7
IT Professional7
IEEE Computer Graphics and Applications7
Table of Contents6
Call for Articles: IEEE Pervasive Computing6
Will Algorithms Rule Us?6
Front Cover6
IEEE Security & Privacy6
IEEE Dataport6
Revisiting Rural and Remote Connectivity Challenges in B5G and 6G Networks6
IEEE Computer Society6
IT Pro Updates & Looking Forward6
Enriching Transformer-Based Embeddings for Emotion Identification in an Agglutinative Language: Turkish6
Thinking and Feeling Cognitive Security?6
Call for Articles: IEEE Pervasive Computing5
IEEE Computer Society has you covered5
Front Cover5
Call for Papers: IEEE Transactions on Computers5
Hospital and Home Environments Automation for Amyotrophic Lateral Sclerosis Patients: Building Information Modeling and the Internet of Things in Digital Environments5
Exposing and Addressing Fake Base Station Vulnerabilities in 5G Through User Device Exploits5
IEEE Computer Graphics and Applications5
6B Model for Business-Aligned Digital Transformation5
Call for Articles5
IEEE Computer Society Computing Edge5
Right to Explanation in Large Language Models: Lessons from the European Union AI Act and General Data Protection Regulation5
White Hats in Blue? The Ethical Issues of Employing Hackers in Law Enforcement Agencies5
Call for Papers: IEEE Computer Society5
Table of Contents5
Evolutionary Consideration on User Authentication: Security, Privacy, and Safety5
Bridging K–12 Mathematics and Computational Thinking in the Scratch Community: Implications Drawn From a Creative Learning Context5
The Environmental Impact of Artificial Intelligence5
Front Cover5
IT Professional: Call for Articles4
Table of Contents4
A Blockchain-Based e-Government Service for Quantity Surveyors4
Enhanced FIWARE-Based Architecture for Cyberphysical Systems With Tiny Machine Learning and Machine Learning Operations: A Case Study on Urban Mobility Systems4
Computing Edge4
[Masthead]4
Explainable Artificial Intelligence for Smart Grid Intrusion Detection Systems4
IT Empowering Rescuers and First Responders in Saving Lives4
Building Digital Twins of Cyber Physical Systems With Metaverse for Industry 5.0 and Beyond4
IEEE Transactions on Sustainable Computing4
Intelligent Traffic Signal Automation Based on Computer Vision Techniques Using Deep Learning4
Sigmoid and Beyond: Algebraic Activation Functions for Artificial Neural Networks Based on Solutions of a Riccati Equation4
Harnessing AI Augmentation for Effective Digital Transformation Leadership4
IEEE Computer Society Jobs Board4
IEEE Computer Society Computing Edge3
Masthead3
The Metaverse and Higher Education Institutions3
COMPSAC 20223
IEEE Computer Society D&I FUND3
The Future of Education: Generative Artificial Intelligence’s Collaborative Role With Teachers3
Unlock your Potential3
Network Relationship Embeddedness, Ambidexterity Innovation, and Enterprise Performance: Empirical Evidences From Big Private Firms3
Table of Contents3
Table of Contents3
IEEE COMPUTER SOCIETY: Call for Papers3
Computing in Science & Engineering3
Generative Artificial Intelligence for Enterprises: Ecosystem, Typology of Applications, and Challenges3
Blockchain-Based Semantic Exchange Framework for Summarized Video Contents in Wireless Edge Intelligence Network Enabled Web 3.03
IEEE Computer Society Information3
IT Professional: CALL FOR ARTICLES3
IEEE Computer Society has you Covered3
IEEE Computer Society Has You Covered!2
C-Suite Dysfunction2
Masterminds of the NSFnet: Jennings, Wolff, and Van Houweling2
ComputingEdge2
MetaDigiHuman: Haptic Interfaces for Digital Humans in the Metaverse2
The “X-Factor” of 6G Networks: Optical Transport Empowering 6G Innovations2
Unlock your Potential2
Considerations About Algorithmic Literacy2
ComputingEdge2
Landscape and Taxonomy of Prompt Engineering Patterns in Software Engineering2
COMPSAC 2024: A Resounding Success2
Blockchain's Roles in Fighting Corruption and Improving Public Sector Efficiency in Developing Countries2
Understanding Ageism in Tech: A Model and Propositions2
IT Pro Call for Articles2
Compiler-Aided Type Correctness of Hybrid MPI-OpenMP Applications2
IEEE Dataport2
Masterminds of Punched Card Data Processing: Herman Hollerith and John Billings2
Table of Contents2
IEEE Computer Society Career Center2
Revolutionizing Emergency Response: The Transformative Power of Smart Wearables Through Blockchain, Federated Learning, and Beyond 5G/6G Services2
The Edgy Nature of Green IT2
Questions CEOs Should Ask About Digital Technology Meeting #3: “Tell Me About the Business—Technology Strategy”2
IEEE Computer Society Info2
Computing Edge: Your one-stop resource for industry hot topics, technical overviews, and in-depth articles2
Reveal or Conceal: Should Executives Know (Or Care) About Digital Era Proxy Statement Disclosures?2
Network Science in Law: A Framework for Polish Case-Law Citation Network Analysis2
A Decentralized Cooperative Navigation Approach for Visual Homing Networks2
Jubilee Welcome: Celebrating 25 Years!2
IEEE Symposium on Security and Privacy2
IEEE Conference on Artificial Intelligence1
ComputingEdge1
Where Deep Learning and Generative AI Started: Masterminds of Artificial Neural Networks—McCulloch, Pitts, and Rosenblatt1
Bridging the Gap From Concrete Building Construction to Flexible Software Process—Way of Working1
IEEE Computer Society Computing Edge1
ChatGPT in Developing Economies1
Low-Latency Intrusion Detection Using a Deep Neural Network1
Digital Privacy: Trends, Challenges, and the Future1
Integrating Curriculum Learning With k-Means: A Data-Centric Approach to Faster Clustering1
Computing in Science & Engineering1
Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies1
Table of Contents1
Prudence and Generative Artificial Intelligence1
Front Cover1
The x in xG1
COMPSAC Returns In-Person—A Remarkable Post-Covid Success1
Call for Papers: Special Issue on Green Information and Computional Technology (ICT)1
Table of Contents1
Table of Contents1
Masthead1
Toward Trustworthy Urban IT Systems: The Bright and Dark Sides of Smart City Development1
PAPR Analysis of 5G and B5G Waveforms Using Advanced PAPR Algorithms1
Enabling Autonomous Teams and Continuous Deployment at Scale1
IEEE Transactions on Sustainable Computing1
Okta1
The Economics of the Industrial Metaverse1
Front Cover1
Scarcity and Global Insecurity: The Semiconductor Shortage1
A Postdisaster Network Resource Allocation in a Mobile Communication Network1
IEEE Computer Society Has You Covered!1
New Ways of Working Are Already Old1
IEEE Open Journal of the Computer Society1
IEEE Access1
IEEE Computer Society Information1
Masthead1
Over the Rainbow: 21st Century Security & Privacy Podcast1
Questions CEOs Should Ask About Digital Technology Meeting #1: “Tell Me How Technology Works Around Here?”1
Predictive Dynamic Virtual Machine Scaling for Federated Learning Over Edge-Cloud Interworking1
Drift Detection for Black-Box Deep Learning Models1
From Challenges to Opportunities: Agentic Artificial Intelligence for Low-Resource Languages1
Large Language Models in Corporate Investment: An Analysis of ChatGPT’s Transformative Applications, Strategic Impacts, and Future Opportunities1
Digital Scent Technology: Toward the Internet of Senses and the Metaverse1
CALL FOR PAPERS1
Detecting AI-Generated Images Using Facial Similarity and Feature Extraction for Digital Security1
Labeling Software Security Vulnerabilities1
Priority-Based Redeployment Algorithm for Decentralized Nodes in xG Access Networks1
Masthead1
0.24605107307434