Computer Science Review

Papers
(The median citation count of Computer Science Review is 13. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Editorial Board909
Web service adaptation: A decade’s overview510
More than a framework: Sketching out technical enablers for natural language-based source code generation209
Editorial Board196
Editorial Board189
Deep learning with the generative models for recommender systems: A survey184
PCG signals for biometric authentication systems: An in-depth review177
Cloud services selection: A systematic review and future research directions144
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis143
A survey on system level energy optimisation for MPSoCs in IoT and consumer electronics133
A survey: When moving target defense meets game theory133
Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges127
A survey of set accumulators for blockchain systems124
Blockchain verification and validation: Techniques, challenges, and research directions121
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises113
A survey on legal question–answering systems102
A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions91
A comprehensive review on transformer network for natural and medical image analysis88
Content-driven music recommendation: Evolution, state of the art, and challenges87
A comprehensive survey on deep learning based malware detection techniques76
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture75
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations74
Synthetic data generation: State of the art in health care domain72
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges69
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey69
Vision-based approaches towards person identification using gait66
Editorial Board65
Editorial Board63
Editorial Board63
Editorial Board58
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey56
A survey of lattice based expressive attribute based encryption52
A survey of multidisciplinary domains contributing to affective computing51
A survey on computation offloading in edge systems: From the perspective of deep reinforcement learning approaches51
Editorial Board51
The interaction design of 3D virtual humans: A survey51
A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services50
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing46
Survey on 3D face reconstruction from uncalibrated images46
Securing microservices and microservice architectures: A systematic mapping study46
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions46
Advances in online handwritten recognition in the last decades45
Abelian combinatorics on words: A survey45
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain44
Uncertainty in runtime verification: A survey44
State of the art on quality control for data streams: A systematic literature review43
Research communities in cyber security: A comprehensive literature review43
The future of computing paradigms for medical and emergency applications41
Summarization of legal documents: Where are we now and the way forward40
A search for good pseudo-random number generators: Survey and empirical studies40
A survey of low-latency transmission strategies in software defined networking40
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review39
Optimized traffic engineering in Software Defined Wireless Network based IoT (SDWN-IoT): State-of-the-art, research opportunities and challenges37
A systematic review of federated learning incentive mechanisms and associated security challenges36
A comprehensive survey on authentication and privacy-preserving schemes in VANETs34
Private set intersection: A systematic literature review33
System security assurance: A systematic literature review33
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions33
Landscape of IoT security33
Backbones-review: Feature extractor networks for deep learning and deep reinforcement learning approaches in computer vision32
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language31
Addressing the challenges of modern DNS a comprehensive tutorial30
Model-based joint analysis of safety and security:Survey and identification of gaps29
A systematic survey on fault-tolerant solutions for distributed data analytics: Taxonomy, comparison, and future directions27
A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks26
Software as storytelling: A systematic literature review26
Comparative analysis of Android and iOS from security viewpoint25
Hybridizations of evolutionary algorithms with Large Neighborhood Search25
IoT systems modeling and performance evaluation25
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review24
Energy aware optimized clustering for hierarchical routing in wireless sensor network24
A systematic review on Deep Learning approaches for IoT security23
Aiming at methods’ wider adoption: Applicability determinants and metrics22
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications22
Digital image watermarking using deep learning: A survey22
Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review21
AI-driven cluster-based routing protocols in WSNs: A survey of fuzzy heuristics, metaheuristics, and machine learning models21
Editorial Board21
Editorial Board21
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns20
Systematic review on weapon detection in surveillance footage through deep learning19
Blockchain-based recommender systems: Applications, challenges and future opportunities19
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions18
Digital to quantum watermarking: A journey from past to present and into the future18
ISO/IEC quality standards for AI engineering17
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges17
Anonymity on blockchain based e-cash protocols—A survey16
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)16
Systematic literature review: Quantum machine learning and its applications16
Malicious application detection in android — A systematic literature review16
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet15
A survey of deep learning techniques for detecting and recognizing objects in complex environments15
A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges15
Mobile robot localization: Current challenges and future prospective15
A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions14
Role of machine learning in medical research: A survey14
A survey on GANs for computer vision: Recent research, analysis and taxonomy14
From accuracy to approximation: A survey on approximate homomorphic encryption and its applications14
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey14
A survey of blockchain, artificial intelligence, and edge computing for Web 3.014
Secret sharing: A comprehensive survey, taxonomy and applications13
Comprehensive survey on resource allocation for edge-computing-enabled metaverse13
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems13
Cyber security training for critical infrastructure protection: A literature review13
0.044896841049194