IEEE Transactions on Emerging Topics in Computing

Papers
(The median citation count of IEEE Transactions on Emerging Topics in Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Front Cover162
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING108
A Technique for Approximate Communication in Network-on-Chips for Image Classification92
Fast Multiple-Precision Integer Division Using Intel AVX-51287
Probabilistic Interpolation Recoder for Energy-Error-Product Efficient DBNs With p-Bit Devices83
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities79
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption69
HREN: A Hybrid Reliable and Energy-Efficient Network-on-Chip Architecture63
Reliability Evaluation and Fault Tolerant Design for KLL Sketches63
PipeDAP: An Efficient Communication Framework for Scheduling Decoupled All-Reduce Primitives in Distributed DNN Training59
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning57
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware54
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT54
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning54
DALTON - Deep Local Learning in SNNs via local Weights and Surrogate-Derivative Transfer52
A VLSI Digital Circuit Platform for Performing Deterministic Stochastic Computing in the Time Dimension Using Fraction Operations on Rational Numbers52
A virtual reality perceptual study of multi-Technique redirected walking method51
Privacy-Preserving Publicly Verifiable Outsourced Distributed Computation Scheme for Matrix Multiplication51
The Self-Aware Information Processing Factory Paradigm for Mixed-Critical Multiprocessing48
Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults’ Functional Profile48
Graph Reconfigurable Pooling for Graph Representation Learning47
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks46
Scheduling Coflows by Online Identification in Data Center Network46
Memristive Crossbar Array-Based Adversarial Defense Using Compression44
RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks44
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud43
Table of Contents42
A Survey of MRAM-Centric Computing: From Near Memory to In Memory42
(In)Security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers41
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring41
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks40
Energy Efficient Approximate Computing Framework for DNN Acceleration Using a Probabilistic-Oriented Method38
Tight Bound on NewHope Failure Probability37
CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM36
Architecture Support for Bitslicing34
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm34
Integrated Edge Computing and Blockchain: A General Medical Data Sharing Framework34
BIC Codes: Bit Insertion-Based Constrained Codes With Error Correction for DNA Storage32
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest32
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain32
TETC's January 2022 Editor-in-Chief’s Report on the State of the Journal31
A Multiplier-Free RNS-Based CNN Accelerator Exploiting Bit-Level Sparsity31
Table of Contents30
Guest Editorial: Special Section on Emerging and Impacting Trends on Computer Arithmetic29
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation29
AutoRelax: HW-SW Co-Optimization for Efficient SpGEMM Operations With Automated Relaxation in Deep Learning28
Traffic Network Socialization: An Adaptive Spatio-Temporal Graph Convolutional Network for Traffic Prediction28
Designing Mobile Technologies to Encourage Civic Engagement: The Role of Situated Motivational Affordances27
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems27
Design and Evaluate Recomposited OR-AND-XOR-PUF27
What, When, Where to Compute-in-Memory for Efficient Matrix Multiplication during Machine Learning Inference26
MFDS-STGCN: Predicting the Behaviors of College Students With Fine-Grained Spatial-Temporal Activities Data25
StreamFlow: Cross-Breeding Cloud With HPC25
Open and Closed-Loop Predictive Control Strategies for Software Rejuvenation25
Private Delegated Computations Using Strong Isolation25
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems24
Child-Computer Interaction With Mobile Devices: Recent Works, New Dataset, and Age Detection24
Unsupervised Domain Adaptation via Contrastive Adversarial Domain Mixup: A Case Study on COVID-1924
3D Invisible Cloak: A Robust Person Stealth Attack Against Object Detector in Complex 3D Physical Scenarios23
Sepformer-Based Models: More Efficient Models for Long Sequence Time-Series Forecasting23
Error in Ulps of the Multiplication or Division by a Correctly-Rounded Function or Constant in Binary Floating-Point Arithmetic23
SelfVis: Self-Supervised Learning for Human Activity Recognition Based on Area Charts23
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis23
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications21
Deep Graph Networks for Drug Repurposing With Multi-Protein Targets21
Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems20
Vector Field-Guided Circumnavigation for an Unmanned Surface Vehicle With Boundary and Obstacle Constraints20
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection20
Deadline-Aware and Energy-Efficient Dynamic Task Mapping and Scheduling for Multicore Systems Based on Wireless Network-on-Chip20
SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing20
Front Cover19
Table of Contents18
Guest Editorial: Special Section on New Trends in Parallel and Distributed Computing for Human Sensible Applications18
Hybrid Quantum ResNet for Time Series Classification18
Efficient Vertical Federated Learning Method for Ridge Regression of Large-Scale Samples17
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication17
Approximate MAC Unit Using Static Segmentation17
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory17
Scalable and RISC-V Programmable Near-Memory Computing Architectures for Edge Nodes17
Construction of a Spike-Based Memory Using Neural-Like Logic Gates Based on Spiking Neural Networks on SpiNNaker17
NeuE: Automated Neural Network Ensembles for Edge Intelligence17
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment16
Combined Symbol Error Correction and Spare Through-Silicon Vias for 3D Memories16
Maximizing Social Influence With Minimum Information Alteration16
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption16
Resource-Aware Knowledge Distillation for Federated Learning16
2021 Index IEEE Transactions on Emerging Topics in Computing Vol. 916
Quantum Implementation and Analysis of SHA-2 and SHA-315
A Novel Prediction Technique for Federated Learning15
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks15
Exploiting Asymmetry in eDRAM Errors for Redundancy-Free Error-Tolerant Design15
Path-Based Delay Variation Models for Parallel-Prefix Adders15
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting15
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions15
ALP: Alleviating CPU-Memory Data Movement Overheads in Memory-Centric Systems14
PLSM: A Parallelized Liquid State Machine for Unintentional Action Detection14
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization14
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments14
WASMBOX: A Lightweight Wasm-Based Runtime for Trustworthy Multi-Tenant Embedded Systems14
PLAM: A Posit Logarithm-Approximate Multiplier14
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans14
Quantum-Inspired Differential Evolution With Decoding Using Hashing for Efficient User Allocation in Edge Computing Environment14
A Bio-Inspired Implementation of a Sparse-Learning Spike-Based Hippocampus Memory Model14
Notice of Violation of IEEE Publication Principles: An Energy-Efficient Heterogeneous Memory Architecture for Future Dark Silicon Embedded Chip-Multiprocessors13
2022 Reviewers List*13
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems13
Guest Editorial Emerging Trends and Advances in Graph-Based Methods and Applications13
X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data13
Efficient Error-Resilient Bus Coding Method Using Bit-Basis Orthogonal Integrative Multiplexing13
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing12
Approximate Recursive Multipliers Using Low Power Building Blocks12
Toward Designing High-Speed Cost-Efficient Quantum Reversible Carry Select Adders12
Performability of Service Chains With Rejuvenation: A Multidimensional Universal Generating Function Approach12
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers12
H-BILSTM: A Novel Bidirectional Long Short Term Memory Network Based Intelligent Early Warning Scheme in Mobile Edge Computing (MEC)11
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes11
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing11
Exploiting Entity Information for Robust Prediction Over Event Knowledge Graphs11
A Large Scale Characterization of Device Uptimes11
Boosting Extra-Functional Code Reusability in Cyber-Physical Production Systems: The Error Handling Case Study11
Graph Learning for Cognitive Digital Twins in Manufacturing Systems11
Online Resource Provisioning and Batch Scheduling for AIoT Inference Serving in an XPU Edge Cloud11
Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF10
Fast and Robust UAV to UAV Detection and Tracking From Video10
Table of Contents10
Affective Region Recognition and Fusion Network for Target-Level Multimodal Sentiment Classification10
AntiDOTE: Protecting Debug Against Outsourced Test Entities10
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability10
Using Diversities to Model the Reliability of Two-Version Machine Learning Systems10
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network10
On Adaptive Influence Maximization Under General Feedback Models10
Detection of Limited Magnitude Errors in Emerging Multilevel Cell Memories by One-Bit Parity (OBP) or Two-Bit Parity (TBP)10
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications9
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities9
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator9
Artificial Intelligence for Mass Spectrometry and Nuclear Magnetic Resonance Spectroscopy Using a Novel Data Augmentation Method9
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph9
Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach9
Front Cover9
Subjective Evaluation of High Dynamic Range Imaging for Face Matching9
A Novel Technique for Fingerprint Based Secure User Authentication9
Numerical Model for 32-Bit Magnonic Ripple Carry Adder9
Distributing Tourists among POIs with an Adaptive Trip Recommendation System9
Evaluating Reliability of SSD-Based I/O Caches in Enterprise Storage Systems9
Quantum Computing Based Optimization for Intelligent Reflecting Surface (IRS)-Aided Cell-Free Network9
Bit-Line Computing for CNN Accelerators Co-Design in Edge AI Inference9
Solar Particle Event and Single Event Upset Prediction from SRAM-based Monitor and Supervised Machine Learning9
A Catalog-Based AIG-Rewriting Approach to the Design of Approximate Components9
A Novel Bio-Inspired Approach for High-Performance Management in Service-Oriented Networks9
FerroCoin: Ferroelectric Tunnel Junction-Based True Random Number Generator9
Improvement of Battery Lifetime Based on Communication Resource Control in Low-Earth-Orbit Satellite Constellations8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
Surrogate-Assisted Evolutionary Framework with Adaptive Knowledge Transfer for Multi-Task Optimization8
Front Cover8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
The Indoor Predictability of Human Mobility: Estimating Mobility With Smart Home Sensors8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics8
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs8
Co-Evolutionary Fuzzy Deep Transfer Learning for Disaster Relief Demand Forecasting8
Balancing Throughput and Fair Execution of Multi-DNN Workloads on Heterogeneous Embedded Devices8
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement8
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs8
A Computing System for Discovering Causal Relationships Among Human Genes to Improve Drug Repositioning7
ReaLPrune: ReRAM Crossbar-Aware Lottery Ticket Pruning for CNNs7
Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems7
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks7
2021 Reviewers List7
A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays7
Deep Attentive Interest Collaborative Filtering for Recommender Systems7
Secure Data Sequence Query Framework Based on Multiple Fogs7
FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning7
Deep Learning Based Intelligent Tumor Analytics Framework for Quantitative Grading and Analyzing Cancer Metastasis: Case of Lymph Node Breast Cancer7
Engravings, Secrets, and Interpretability of Neural Networks7
Improved Modular Multiplication Algorithms Using Solely IEEE 754 Binary Floating-Point Operations7
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy7
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility7
Front Cover7
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning6
TCAM-GNN: A TCAM-Based Data Processing Strategy for GNN Over Sparse Graphs6
Transfer Learning Realized With Nonlinearly Transformed Input Space6
Highly-Parallel FPGA Accelerator for Simulated Quantum Annealing6
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications6
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications6
Spiker+: a framework for the generation of efficient Spiking Neural Networks FPGA accelerators for inference at the edge6
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure against Side Channel Attack and its Complexity Verification6
AI4FIDS: Multimodal Federated Intrusion Detection6
Multi-Layer Personalized Federated Learning for Mitigating Biases in Student Predictive Analytics6
Algebraic attacks on block ciphers using quantum annealing6
Deep Recommendation With Adversarial Training6
Engaging Primary and Secondary School Students in Computer Science Through Computational Thinking Training6
IEEE Transactions on Emerging Topics in Computing6
Parallel Computing for Multi-Objective Train Rescheduling6
Algorithm-Hardware Co-Design of Split-Radix Discrete Galois Transformation for KyberKEM6
Dynamically Activated De-Glaring and Detail- Recovery for Low-Light Image Enhancement Directly on Smart Cameras6
An Alternative Approach to Polynomial Modular Number System Internal Reduction6
FHEmem: A Processing In-Memory Accelerator for Fully Homomorphic Encryption5
A BF16 FMA is All You Need for DNN Training5
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems5
Guest Editorial: Special Section on “To be Safe and Dependable in the Era of Artificial Intelligence: Emerging Techniques for Trusted and Reliable Machine Learning”5
Edge-Based Live Learning for Robot Survival5
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy5
Dynamic Reconfiguration for Resilient State Estimation Against Cyber Attacks5
A Comparative Analysis of Software Aging in Relational Database System Environments5
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach5
Front Cover5
Voting Margin: A Scheme for Error-Tolerant k Nearest Neighbors Classifiers for Machine Learning5
Scatter-Gather DMA Performance Analysis within an SoC-based Control System for Trapped-Ion Quantum Computing5
Edgeless-GNN: Unsupervised Representation Learning for Edgeless Nodes5
Acceleration of the Bootstrapping in TFHE by FPGA5
Mining Implicit Equations From Data Using Gene Expression Programming5
IEEE Transactions on Emerging Topics in Computing Information for Authors5
DeepEcho: Echoacoustic Recognition of Materials Using Returning Echoes With Deep Neural Networks5
Bi-Layer Deep Learning with Neural Networks and Large Language Models for Cognitive Biometrics5
Linearizing Binary Optimization Problems Using Variable Posets for Ising Machines4
Incentive Mechanism Design for Hierarchical Federated Learning with Selfishness Queue Stability4
LP-Star: Embedding Longest Paths into Star Networks With Large-Scale Missing Edges Under an Emerging Assessment Model4
A Segmented-Edit Error-Correcting Code With Re-Synchronization Function for DNA-Based Storage Systems4
Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks4
Design of Unsigned Approximate Hybrid Dividers Based on Restoring Array and Logarithmic Dividers4
DP-PartFIM: Frequent Itemset Mining using Differential Privacy and Partition4
CiM-BNN:Computing-in-MRAM Architecture for Stochastic Computing Based Bayesian Neural Network4
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative Database4
Software-Defined Number Formats for High-Speed Belief Propagation4
A Blockchain-Powered Decentralized and Secure Computing Paradigm4
IoTRec: The IoT Recommender for Smart Parking System4
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework4
MTFC: A Multi-GPU Training Framework for Cube-CNN-Based Hyperspectral Image Classification4
ReMap: Reliability Management of Peak-Power-Aware Real-Time Embedded Systems Through Task Replication4
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices4
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING4
Multitask Particle Swarm Optimization With Dynamic Transformation4
Table of Contents4
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment4
A Low Latency Approximate Adder Design Based on Dual Sub-Adders With Error Recovery4
Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning4
A Novel Privacy-Preserving Range Query Scheme With Permissioned Blockchain for Smart Grid4
Near Volatile and Non-Volatile Memory Processing in 3D Systems4
Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography4
Comparing Data Staging Techniques for Large Scale Brain Images4
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design4
HiT-CIM: A High-Throughput Compute-In-Memory SRAM Architecture with Simultaneous Weight Loading/Computing and Balance Capabilities4
An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling3
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities3
DECC: Delay-Aware Edge-Cloud Collaboration for Accelerating DNN Inference3
IEEE Transactions on Emerging Topics in Computing Publication Information3
Key-Components for Digital Twin Modeling With Granularity: Use Case Car-as-a-Service3
LIONHEART: A Layer-Based Mapping Framework for Heterogeneous Systems with Analog in-Memory Computing Tiles3
Quantifying the Effects of Anonymization Techniques Over Micro-Databases3
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation3
0.031545877456665