Computer Science Review

Papers
(The median citation count of Computer Science Review is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Editorial Board197
Characterising harmful API uses and repair techniques: Insights from a systematic review192
Blockchain verification and validation: Techniques, challenges, and research directions191
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture174
The ML-based sensor data deception targeting cyber–physical systems: A review158
A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges157
The Lonely Runner Conjecture turns 60126
A comprehensive review of usage control frameworks126
A search for good pseudo-random number generators: Survey and empirical studies123
Research communities in cyber security: A comprehensive literature review119
Editorial Board110
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language100
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review91
A systematic review of federated learning incentive mechanisms and associated security challenges86
Non-square grids: A new trend in imaging and modeling?83
A survey of blockchain, artificial intelligence, and edge computing for Web 3.071
Software as storytelling: A systematic literature review69
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems69
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges68
A survey of deep learning techniques for detecting and recognizing objects in complex environments68
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications68
A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review67
Model-based joint analysis of safety and security:Survey and identification of gaps67
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review67
WebAssembly and security: A review65
Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques63
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey62
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions61
A decade: Review of scene text detection methods56
Auto-scaling mechanisms in serverless computing: A comprehensive review53
Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions51
A systematic literature review on cross-language source code clone detection49
A survey on deep matrix factorizations49
Adding relevance to rigor: Assessing the contributions of SLRs in Software Engineering through Citation Context Analysis48
Negative selection in anomaly detection—A survey46
Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions43
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives43
Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems40
Reproducibility, Replicability and Repeatability: A survey of reproducible research with a focus on high performance computing40
Towards data augmentation in graph neural network: An overview and evaluation40
Future of cyberspace: A critical review of standard security protocols in the post-quantum era39
A review of background, methods, limitations and opportunities of knowledge graph completion38
Ontology learning towards expressiveness: A survey37
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis37
Review of Distributed Quantum Computing: From single QPU to High Performance Quantum Computing36
A comprehensive survey on deep learning based malware detection techniques35
Editorial Board35
A survey of set accumulators for blockchain systems35
The future of computing paradigms for medical and emergency applications34
Editorial Board34
A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions33
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey33
Advances in online handwritten recognition in the last decades32
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions31
A survey of lattice based expressive attribute based encryption31
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions30
Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages29
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey26
NLP-based techniques for Cyber Threat Intelligence26
Editorial Board24
A decade systematic review of fusion techniques in financial market prediction24
A survey on GANs for computer vision: Recent research, analysis and taxonomy24
Addressing the challenges of modern DNS a comprehensive tutorial23
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns23
Routing optimization strategies in data center networks: A survey23
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet23
Deep anomaly detection for time series: A survey22
Secure storage—Confidentiality and authentication22
Facial expression and body gesture emotion recognition: A systematic review on the use of visual data in affective computing21
A survey on algorithms for Nash equilibria in finite normal-form games21
Comprehensive survey of the solving puzzle problems21
A systematic review of quantum image processing: Representation, applications and future perspectives21
Knowledge graph representation learning: A comprehensive and experimental overview20
Design practices in visualization driven data exploration for non-expert audiences20
Intelligent visual analytics for food safety: A comprehensive review20
Multimodal missing data in healthcare: A comprehensive review and future directions18
Defense strategies for Adversarial Machine Learning: A survey18
DDoS attacks & defense mechanisms in SDN-enabled cloud: Taxonomy, review and research challenges18
Maximal cliques summarization: Principles, problem classification, and algorithmic approaches17
Offloading decision and resource allocation in aerial computing: A comprehensive survey17
Parameterized algorithms on geometric intersection graphs17
Image processing and artificial intelligence for apple detection and localization: A comprehensive review17
Advancing IoT-driven WSNs with context-aware routing: A comprehensive review17
Deep learning for unmanned aerial vehicles detection: A review16
A comprehensive review on applications of Raspberry Pi15
A comprehensive survey of golden jacal optimization and its applications15
Editorial Board14
A systematic literature review on chaotic maps-based image security techniques14
Editorial Board14
Editorial Board14
Virtual Customer Assistants in finance: From state of the art and practices to design guidelines14
Parameterized analysis and crossing minimization problems13
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey13
Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges13
Task scheduling in fog environment — Challenges, tools & methodologies: A review13
A systematic review on cover selection methods for steganography: Trend analysis, novel classification and analysis of the elements13
A systematic literature review on the use of machine learning in code clone research13
A survey on detecting mental disorders with natural language processing: Literature review, trends and challenges13
Advances in attention mechanisms for medical image segmentation13
State of the art on quality control for data streams: A systematic literature review12
Advancing smart transportation: A review of computer vision and photogrammetry in learning-based dimensional road pavement defect detection12
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges12
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing12
Harnessing Heterogeneous Information Networks: A systematic literature review11
Editorial Board11
Digital to quantum watermarking: A journey from past to present and into the future11
From past to present: A survey of malicious URL detection techniques, datasets and code repositories11
Secret sharing: A comprehensive survey, taxonomy and applications11
Multiple clusterings: Recent advances and perspectives10
Unsupervised affinity learning based on manifold analysis for image retrieval: A survey10
Research communities in cyber security vulnerability assessments: A comprehensive literature review10
Towards accessible chart visualizations for the non-visuals: Research, applications and gaps10
Integrating Explainable AI with Federated Learning for Next-Generation IoT: A comprehensive review and prospective insights10
An empirical investigation of task scheduling and VM consolidation schemes in cloud environment10
Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities10
Graph-based deep learning techniques for remote sensing applications: Techniques, taxonomy, and applications — A comprehensive review9
Edge-AI empowered Cyber-Physical Systems: A comprehensive review on performance analysis9
A survey on the Distributed Computing stack9
A systematic review of explainability in computational intelligence for optimization9
Low-light multimodal object detection: A survey9
Maritime search and rescue missions with aerial images: A survey8
Revolutionizing textual data insights: A comprehensive review of the dual relationship between transformers and clustering in textual data analysis8
A comprehensive survey on sentiment analysis: Framework, techniques, and applications8
Neural Natural Language Processing for unstructured data in electronic health records: A review7
Artificial intelligence based classification for waste management: A survey based on taxonomy, classification & future direction7
A review of IoT security and privacy using decentralized blockchain techniques7
A comprehensive survey on data aggregation techniques in UAV-enabled Internet of things7
Sand cat swarm optimization: A comprehensive review of algorithmic advances, structural enhancements, and engineering applications7
Deep learning for intelligent demand response and smart grids: A comprehensive survey7
0.056398868560791