Computer Science Review

Papers
(The TQCC of Computer Science Review is 23. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board245
The ML-based sensor data deception targeting cyber–physical systems: A review243
From task-specific to foundation models: A paradigm shift in medical vision-language analysis215
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture203
Characterising harmful API uses and repair techniques: Insights from a systematic review193
Blockchain verification and validation: Techniques, challenges, and research directions189
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review165
Parameterised counting complexity theory162
Twenty years of Nešetřil’s classification programme of Ramsey classes157
Non-square grids: A new trend in imaging and modeling?156
A systematic review of federated learning incentive mechanisms and associated security challenges136
A search for good pseudo-random number generators: Survey and empirical studies120
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language112
The Lonely Runner Conjecture turns 60102
Editorial Board101
Gender Diversity Interventions in Software Engineering: A Comprehensive Review of Existing Practices100
A comprehensive review of usage control frameworks97
A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges95
Sequential recommender systems: A methodological taxonomy and research frontiers95
State-of-the-art image and video-based steganalysis techniques: A comprehensive review, challenges and future recommendations for digital forensic experts90
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications90
Software as storytelling: A systematic literature review86
A survey of deep learning techniques for detecting and recognizing objects in complex environments84
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review84
Model-based joint analysis of safety and security:Survey and identification of gaps81
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges77
A survey of blockchain, artificial intelligence, and edge computing for Web 3.075
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems74
Exploring transparency in pathological image analysis: A comprehensive review of explainable artificial intelligence (XAI) techniques69
WebAssembly and security: A review68
Recommender systems and sustainability: a dual perspective65
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey64
A survey of AI-supported materials informatics62
A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review62
Auto-scaling mechanisms in serverless computing: A comprehensive review62
Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques61
Enhancing IoT security with resource-efficient cryptography: A comprehensive review of lightweight and hybrid algorithms61
Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions60
A systematic literature review on cross-language source code clone detection58
The paradigm shift: A comprehensive survey on large vision language models for multimodal fake news detection57
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives54
Adding relevance to rigor: Assessing the contributions of SLRs in Software Engineering through Citation Context Analysis53
Negative selection in anomaly detection—A survey53
Homomorphic cryptography: Challenges and perspectives53
Distributed edge artificial intelligence empowered data trading: Theories, algorithms, and applications52
Fusing LLMs and diffusion models: A comprehensive survey of progress, challenges, and future directions in generative AI51
Isogeny-based cryptography: A comprehensive review on advancements, analysis of attacks, and future directions49
Learning-based approaches for wireless PHY layers from the perspective of conventional machine learning to foundation models: A comprehensive survey49
Towards data augmentation in graph neural network: An overview and evaluation48
A comprehensive survey of image steganography: From traditional vision techniques to deep learning paradigms—Trends, challenges, and applications45
Reproducibility, Replicability and Repeatability: A survey of reproducible research with a focus on high performance computing45
A comprehensive review on the white shark optimizer, its variants, statistical analysis and performance evaluation44
Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions43
Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems42
A survey of set accumulators for blockchain systems39
From mathematical to AI-based methods: A review of marine PNT data fusion and uncertainty handling37
A review of background, methods, limitations and opportunities of knowledge graph completion36
Review of Distributed Quantum Computing: From single QPU to High Performance Quantum Computing36
A systematic review of deep learning-based models for elderly and human activity recognition36
A survey of large language models for legal tasks: Progress, prospects and challenges36
A comprehensive survey on deep learning based malware detection techniques35
Future of cyberspace: A critical review of standard security protocols in the post-quantum era35
Ontology learning towards expressiveness: A survey34
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis34
Random spanning trees and forests: a geometric focus32
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey31
Editorial Board31
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions29
A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions29
Advances in online handwritten recognition in the last decades29
AI-driven semantic information retrieval for Arabic language- systematic literature review26
Three-dimensional visualization of X-ray micro-CT with large-scale datasets: Efficiency and accuracy for real-time interaction26
Federated learning in cloud-edge-fog architectures: Enhancing privacy, efficiency, and scalability26
Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages25
Explainable AI for the diagnosis of neurodegenerative diseases: Unveiling methods, opportunities, and challenges25
Editorial Board25
The future of computing paradigms for medical and emergency applications25
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions25
A decade systematic review of fusion techniques in financial market prediction24
NLP-based techniques for Cyber Threat Intelligence24
Addressing the challenges of modern DNS a comprehensive tutorial24
An overview of sign language processing from natural language processing perspective24
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey23
A survey on GANs for computer vision: Recent research, analysis and taxonomy23
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns23
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet23
0.11539101600647