IET Computers and Digital Techniques

Papers
(The median citation count of IET Computers and Digital Techniques is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
A FPGA Accelerator of Distributed A3C Algorithm with Optimal Resource Deployment8
7
Guest Editorial: Special issue on battery‐free computing6
E‐Commerce Logistics Software Package Tracking and Route Planning and Optimization System of Embedded Technology Based on the Intelligent Era6
The Application of Augmented Reality Technology in Visual Communication Design5
5
Q‐scheduler: A temperature and energy‐aware deep Q‐learning technique to schedule tasks in real‐time multiprocessor embedded systems4
Design and analysis of a novel fast adder using logical effort method4
A Configurable Accelerator for CNN‐Based Remote Sensing Object Detection on FPGAs4
An Efficient RTL Design for a Wearable Brain–Computer Interface4
A four‐stage yield optimization technique for analog integrated circuits using optimal computing budget allocation and evolutionary algorithms4
A Systematic Literature Review on the Applications, Models, Limitations, and Future Directions of Generative Adversarial Networks3
A Reconfigurable Coarse‐to‐Fine Approach for the Execution of CNN Inference Models in Low‐Power Edge Devices3
Efficient implementation of low cost and secure framework with firmware updates3
Machine learning guided thermal management of Open Computing Language applications on CPU‐GPU based embedded platforms3
Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits3
Event‐based high throughput computing: A series of case studies on a massively parallel softcore machine3
TLP: Towards three‐level loop parallelisation3
Energy‐Efficient Branch Predictor via Instruction Block Type Prediction in Decoupled Frontend2
Research on mapping recognition of arc welding molten pool characterisation and penetration state based on embedded system2
Fast approximation of the top‐k items in data streams using FPGAs2
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints2
Multi‐objective digital circuit block optimisation based on cell mapping in an industrial electronic design automation flow2
Voltage over‐scaling CNT‐based 8‐bit multiplier by high‐efficient GDI‐based counters2
Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists2
0.10692381858826