IET Software

Papers
(The TQCC of IET Software is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
The impact of feature selection techniques on effort‐aware defect prediction: An empirical study37
Effect of requirements specification using native language on external software quality33
Constructing meaningful code changes via graph transformer32
Retracted: Smart optimal path with blockchain modelling in internet of things using enhanced K‐means clustering and advance encryption standard26
SmartProvenance: User‐friendly provenance system for internet of things applications based on event flow graphs21
Structuring meaningful bug‐fixing patches to fix software defect21
Selecting reliable blockchain peers via hybrid blockchain reliability prediction17
A Structured Lifecycle Model for Quantum Software Engineering: Bridging Technical Challenges and Future Directions17
Retracted: Software solution for text summarisation using machine learning based Bidirectional Encoder Representations from Transformers algorithm17
A systematic mapping study on machine learning methodologies for requirements management14
Retracted: Blockchain‐based covert software information transmission for bitcoin10
AI‐Driven Dynamic Resource Allocation for IoT Networks Using Graph‐Convolutional Transformer and Hybrid Optimization10
Malware recognition approach based on self‐similarity and an improved clustering algorithm9
IAPCP: An Effective Cross‐Project Defect Prediction Model via Intra‐Domain Alignment and Programming‐Based Distribution Adaptation9
Enhancing Requirements via Structured Formalization and Process‐State Consistency Validation: An LLM‐Assisted Test‐Driven Framework9
A Data‐Driven Artificial Neural Network Approach to Software Project Risk Assessment9
Elevating Cloud Security With Advanced Trust Evaluation and Optimization of Hybrid Fireberg Technique9
A deep learning‐based approach for software vulnerability detection using code metrics8
A Private Blockchain and IPFS‐Based Secure and Decentralized Framework for People Surveillance via Deep Learning Techniques7
Retracted: Intelligent design of rural residential environment guided by blockchain under the concept of green low carbon7
7
Retracted: Optimization of E‐commerce platform marketing method and comment recognition model based on deep learning and intelligent blockchain7
Refactoring Object‐Oriented Software With ChatGPT: An Empirical Study7
AMRerank: A Framework for Library Migration Recommendations Using Multi‐Agent Analysis and Data‐Driven Reranking7
Design of Minimal Spanning Tree and Analytic Hierarchical Process (SAHP) Based Hybrid Technique for Software Requirements Prioritization6
6
MAD‐HAR: Privacy‐Preserving On‐Device Human Action Recognition via Multiagent LLM Debate6
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization6
Application of NNE‐CNN based non‐numerical individual feature extraction in rice breeding optimization6
A Meta‐Model Architecture and Elimination Method for Uncertainty Modeling5
Design and Efficacy of a Data Lake Architecture for Multimodal Emotion Feature Extraction in Social Media5
An Expository Examination of Temporally Evolving Graph‐Based Approaches for the Visual Investigation of Autonomous Driving5
An Empirical Study on Downstream Dependency Package Groups in Software Packaging Ecosystems4
Proposed ethical framework for software requirements engineering4
4
Two‐Stream Modeling for Document‐Level Event Argument Extraction Using Contextual Clue and AMR Structures4
Implementation of Neural Style Transformation Technique for Artistic Image Processing Using VGG194
HDR‐SA: A Hybrid Deep Learning and RoBERTa‐Based Framework for Sentiment and Aspect Analysis4
VdaBSC: A Novel Vulnerability Detection Approach for Blockchain Smart Contract by Dynamic Analysis4
DAA‐UNet: A Dense Connectivity and Atrous Spatial Pyramid Pooling Attention UNet Model for Retinal Optical Coherence Tomography Fluid Segmentation4
Blockchain‐Audited Federated Learning: Securing Data and Model Updates With On‐Chain Provenance4
Evaluating the Impact of Data Transformation Techniques on the Performance and Interpretability of Software Defect Prediction Models4
Research on the Application of Artificial Intelligence Technology in Color Matching in Product Appearance and Function Design4
0.25439476966858