IEEE Transactions on Emerging Topics in Computing

Papers
(The median citation count of IEEE Transactions on Emerging Topics in Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Front Cover325
PABLO: A Variation-Robust PIM Architecture for Bulk Bitwise Logical Operations in DRAM185
Table of Contents149
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING142
Low-Power Real-Time Seizure Monitoring Using AI-Assisted Sonification of Neonatal EEG140
Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems130
2024 Reviewers List*103
Quantum Implementation and Analysis of SHA-2 and SHA-393
A Novel Prediction Technique for Federated Learning84
IEEE Transactions on Emerging Topics in Computing Publication Information82
LIONHEART: A Layer-Based Mapping Framework for Heterogeneous Systems with Analog in-Memory Computing Tiles81
FLCL: Feature-Level Contrastive Learning for Few-Shot Image Classification81
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols79
Front Cover76
DECC: Delay-Aware Edge-Cloud Collaboration for Accelerating DNN Inference71
Personalized Privacy-Preserving Framework for Cross-Silo Federated Learning70
Fast Multiple-Precision Integer Division Using Intel AVX-51267
A Flexible and Reliable RRAM-Based In-Memory Computing Architecture for Data-Intensive Applications64
Towards Optimization of Privacy-Utility Trade-Off Using Similarity and Diversity Based Clustering64
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement63
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption61
Side-Channel Attack Analysis on In-Memory Computing Architectures61
PISA: A Non-Volatile Processing-in-Sensor Accelerator for Imaging Systems60
Maximizing Social Influence With Minimum Information Alteration56
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics54
A Privacy Enforcing Framework for Data Streams on the Edge53
Efficient Ternary Logic Circuits Optimized by Ternary Arithmetic Algorithms51
Distributed Indexing Schemes for K-Dominant Skyline Analytics on Uncertain Edge-IoT Data47
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware46
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning46
Quantifying the Impact of Monolithic 3D (M3D) Integration on L1 Caches45
The e-LocGov Model for Introducing e-Governance into Local Governments: An Estonian Case Study45
Virtual Reality Simulation of a Quadrotor to Monitor Dependent People at Home45
Sparse Logistic Maximum Likelihood Estimation for Optimal Well-Being Determinants44
Exploiting Asymmetry in eDRAM Errors for Redundancy-Free Error-Tolerant Design42
Proposal and Performance Evaluation of Information Diffusion Technique with Novel Virtual-Cell-Based Wi-Fi Direct42
Guest Editorial Assistive Computing Technologies for Human Well-Being41
Guest Editorial: Special Section on Emerging Trends and Computing Paradigms for Testing, Reliability and Security in Future VLSI Systems41
Key-Components for Digital Twin Modeling With Granularity: Use Case Car-as-a-Service41
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility40
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities40
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs40
Probabilistic Interpolation Recoder for Energy-Error-Product Efficient DBNs With p-Bit Devices39
Quantifying the Effects of Anonymization Techniques Over Micro-Databases39
A Technique for Approximate Communication in Network-on-Chips for Image Classification39
Combined Symbol Error Correction and Spare Through-Silicon Vias for 3D Memories38
EXSCALATE: An Extreme-Scale Virtual Screening Platform for Drug Discovery Targeting Polypharmacology to Fight SARS-CoV-237
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons37
FTxAC: Leveraging the Approximate Computing Paradigm in the Design of Fault-Tolerant Embedded Systems to Reduce Overheads36
Path-Based Delay Variation Models for Parallel-Prefix Adders35
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks35
Secure Data Sequence Query Framework Based on Multiple Fogs34
On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems34
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs32
SenseHash: Computing on Sensor Values Mystified at the Origin32
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT31
Gate-Level Side-Channel Leakage Ranking With Architecture Correlation Analysis30
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices30
A New Application for the Motor Rehabilitation at Home: Structure and Usability of Bal-App30
An Interrelated Imitation Learning Method for Heterogeneous Drone Swarm Coordination29
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment29
An Optimized Hardware Implementation of Modular Multiplication of Binary Ring LWE29
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions28
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy28
Online Remaining Useful Lifetime Prediction Using Support Vector Regression28
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs28
A Near-Sensor Processing Accelerator for Approximate Local Binary Pattern Networks27
ARIS: Efficient Admitted Influence Maximizing in Large-Scale Networks Based on Valid Path Reverse Influence Sampling26
Reliability Evaluation and Fault Tolerant Design for KLL Sketches26
Bounding the Round-Off Error of the Upwind Scheme for Advection25
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks25
Special Section on “Emerging and Impacting Trends on Computer Arithmetic”25
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation24
An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling24
Area-Time Efficient Hardware Implementation for Binary Ring-LWE Based Post-Quantum Cryptography24
Table of Contents24
Table of Contents23
Pip-SW: Pipeline Architectures for Accelerating Smith-Waterman Algorithm on FPGA Platforms23
IEEE Transactions on Emerging Topics in Computing Information for Authors23
2021 Index IEEE Transactions on Emerging Topics in Computing Vol. 923
Resource Allocation Optimization by Quantum Computing for Shared Use of Standalone IRS22
HREN: A Hybrid Reliable and Energy-Efficient Network-on-Chip Architecture21
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment21
IEEE Transactions on Emerging Topics in Computing Information for Authors21
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks20
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities20
An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems20
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting20
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects20
AGSEI: Adaptive Graph Structure Estimation with Long-Tail Distributed Implicit Graphs20
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning19
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks19
Two Low-cost and Security-enhanced Implementations Against Side-channel Attacks of NTT for Lattice-based Cryptography19
Runtime System Support for CPS Software Rejuvenation19
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks19
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs18
COACH: Consistency Aware Check-Pointing for Nonvolatile Processor in Energy Harvesting Systems18
Coupled Attention Networks for Multivariate Time Series Anomaly Detection18
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition18
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs18
FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning18
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City18
A virtual reality perceptual study of multi-Technique redirected walking method17
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud17
Adaptive ELM-Based Time-Constrained Control of Uncertain Robotic Manipulators With Minimum Learning Computation16
A Bio-Inspired Implementation of a Sparse-Learning Spike-Based Hippocampus Memory Model16
Analyzing Wet-Neuromorphic Computing Using Bacterial Gene Regulatory Neural Networks16
Table of Contents16
Enabling Obfuscation Detection in Binary Software through eXplainable AI16
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems15
A Low-Cost Wireless Body Area Network for Human Activity Recognition in Healthy Life and Medical Applications15
A Survey of MRAM-Centric Computing: From Near Memory to In Memory15
DALTON - Deep Local Learning in SNNs via local Weights and Surrogate-Derivative Transfer15
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications15
2021 Reviewers List15
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING15
Table of Contents15
Dynamically Activated De-Glaring and Detail- Recovery for Low-Light Image Enhancement Directly on Smart Cameras14
A Pervasive Edge Computing Model for Proactive Intelligent Data Migration14
Area Efficient Skyrmion Logic based Approximate Adder Architecture Design Methodology14
IEEE Transactions on Emerging Topics in Computing Information for Authors14
Deep Learning Based Intelligent Tumor Analytics Framework for Quantitative Grading and Analyzing Cancer Metastasis: Case of Lymph Node Breast Cancer14
Front Cover14
Hardware-Aware DNN Compression via Diverse Pruning and Mixed-Precision Quantization14
IEEE Transactions on Emerging Topics in Computing Information for Authors14
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks14
(In)Security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers14
Graph Reconfigurable Pooling for Graph Representation Learning13
Sparsity-Oriented MRAM-Centric Computing for Efficient Neural Network Inference13
Transformer-Based Graph Neural Networks for Outfit Generation13
An Experience Replay Method Based on Tree Structure for Reinforcement Learning13
Darwin: A DRAM-Based Multi-Level Processing-in-Memory Architecture for Column-Oriented Database13
Cost-Effective Software Rejuvenation Combining Time-Based and Inspection-Based Policies13
BNN An Ideal Architecture for Acceleration With Resistive in Memory Computation13
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing12
A Lightweight Robust Logic Locking Technique to Thwart Sensitization and Cone-Based Attacks12
Autonomous Scan Patterns for Laser Voltage Imaging12
Advancement of Textual Answer Triggering: Cognitive Boosting12
swMR: A Framework for Accelerating MapReduce Applications on Sunway Taihulight12
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans12
Design Space Exploration of Stochastic Computing Architectures Implemented Using Integrated Optics12
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme12
ACBAM-Accuracy-Configurable Sign Inclusive Broken Array Booth Multiplier Design11
Collaborative Trajectory Mining in Smart-Homes to Support Early Diagnosis of Cognitive Decline11
A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays11
PLAM: A Posit Logarithm-Approximate Multiplier11
RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks11
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring11
The Self-Aware Information Processing Factory Paradigm for Mixed-Critical Multiprocessing10
XpulpNN: Enabling Energy Efficient and Flexible Inference of Quantized Neural Networks on RISC-V Based IoT End Nodes10
Manifold-Inspired Search-Based Algorithm for Automated Test Case Generation10
Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults’ Functional Profile10
An Alternative Approach to Polynomial Modular Number System Internal Reduction10
PLSM: A Parallelized Liquid State Machine for Unintentional Action Detection10
Medical Systems Data Security and Biometric Authentication in Public Cloud Servers10
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges10
Deep Attentive Interest Collaborative Filtering for Recommender Systems10
A Computing System for Discovering Causal Relationships Among Human Genes to Improve Drug Repositioning10
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications10
Scheduling Coflows by Online Identification in Data Center Network10
ALP: Alleviating CPU-Memory Data Movement Overheads in Memory-Centric Systems10
Rei: A Reconfigurable Interconnection Unit for Array-Based CNN Accelerators10
Anatomy of On-Chip Memory Hardware Fault Effects Across the Layers9
Reliability Risks Due to Faults Affecting Selectors of ReRAMs and Possible Solutions9
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks9
Deep Reinforcement Learning With Curriculum Design for Quantum State Classification9
Algebraic attacks on block ciphers using quantum annealing9
Extremely Energy-Efficient Non-Linear Function Approximation Framework Using Stochastic Superconductor Devices9
Quantum-Inspired Differential Evolution with Decoding using Hashing for Efficient User Allocation in Edge Computing Environment9
A Design Framework for Hardware-Efficient Logarithmic Floating-Point Multipliers9
A Binary-Activation, Multi-Level Weight RNN and Training Algorithm for ADC-/DAC-Free and Noise-Resilient Processing-in-Memory Inference With eNVM9
Memristive Crossbar Array-Based Adversarial Defense Using Compression9
Engravings, Secrets, and Interpretability of Neural Networks9
Engaging Primary and Secondary School Students in Computer Science Through Computational Thinking Training9
Spiker+: a framework for the generation of efficient Spiking Neural Networks FPGA accelerators for inference at the edge8
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction8
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments8
Age of Information Optimization for Privacy-Preserving Mobile Crowdsensing8
Front Cover8
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization8
ReaLPrune: ReRAM Crossbar-Aware Lottery Ticket Pruning for CNNs8
Fair Influence Maximization in Social Networks: A Community-Based Evolutionary Algorithm8
Blockchain-Based Trust Management for Internet of Vehicles8
Deep Recommendation With Adversarial Training8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection8
Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications7
IEEE Transactions on Emerging Topics in Computing Information for Authors7
IEEE Transactions on Emerging Topics in Computing7
A Crowdsourcing-driven AI Model Design Framework to Public Health Policy-Adherence Assessment7
PESKEA: Anomaly Detection Framework for Profiling Kernel Event Attributes in Embedded Systems7
A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips7
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning7
A VLSI Digital Circuit Platform for Performing Deterministic Stochastic Computing in the Time Dimension Using Fraction Operations on Rational Numbers7
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING7
2022 Reviewers List*7
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems7
Defect and Fault Modeling Framework for STT-MRAM Testing7
Live Wire – A Low-Complexity Body Channel Communication System for Landmark Identification7
3DL-PIM: A Look-Up Table Oriented Programmable Processing in Memory Architecture Based on the 3-D Stacked Memory for Data-Intensive Applications7
Front Cover7
Table of Contents7
TampML: Tampering Attack Detection and Malicious Nodes Localization in NoC-based MPSoC7
RDAM: A Reinforcement Learning Based Dynamic Attribute Matrix Representation for Virtual Network Embedding7
Reconfigurable and Dense Analog Circuit Design Using Two Terminal Resistive Memory7
Incremental Learning Using a Grow-and-Prune Paradigm With Efficient Neural Networks6
Reduced Precision Redundancy for Reliable Processing of Data6
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking6
A Novel Quantum-Inspired Fuzzy Based Neural Network for Data Classification6
Transfer Learning Realized With Nonlinearly Transformed Input Space6
A Statistical Gate Sizing Method for Timing Yield and Lifetime Reliability Optimization of Integrated Circuits6
Parallel Computing for Multi-Objective Train Rescheduling6
Efficient Crowdsourced Pareto-Optimal Queries Over Partial Orders With Quality Guarantee6
Goal and Elite-Data-Driven Anthropomorphic Learning for Streaming-Image Analytics6
Leveraging Communicating UAVs for Emergency Vehicle Guidance in Urban Areas6
Design and Analysis of Secure Emerging Crypto-Hardware Using HyperFET Devices6
ARMOR: An Anti-Counterfeit Security Mechanism for Low Cost Radio Frequency Identification Systems6
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm6
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems6
DICO: A Graph-DB Framework for Community Detection on Big Scholarly Data6
Computing the Similarity Estimate Using Approximate Memory6
Guest Editorial: Thematic Section on Applications of Emerging Computing Technologies in Smart Manufacturing and Industry 4.05
Graph Embedding Techniques for Predicting Missing Links in Biological Networks: An Empirical Evaluation5
A Comparative Analysis of Software Aging in Relational Database System Environments5
A BF16 FMA is All You Need for DNN Training5
A Multiplier-Free RNS-Based CNN Accelerator Exploiting Bit-Level Sparsity5
CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM5
Boosting Extra-Functional Code Reusability in Cyber-Physical Production Systems: The Error Handling Case Study5
Indoor Geo-Indistinguishability: Adopting Differential Privacy for Indoor Location Data Protection5
Efficient Error-Resilient Bus Coding Method Using Bit-Basis Orthogonal Integrative Multiplexing5
Joint Partial Offloading and Resource Allocation for Parked Vehicle-Assisted Multi-Access Edge Computing5
Learning With Sharing: An Edge-Optimized Incremental Learning Method for Deep Neural Networks5
Adaptive Task Migration in Multiplex Networked Industrial Chains5
Architecture Support for Bitslicing5
Guest Editorial Emerging Trends and Advances in Graph-Based Methods and Applications5
Tight Bound on NewHope Failure Probability5
Guest Editorial: Special Section on New Frontiers in Computing for Next-Generation Healthcare Systems5
SATAM: A SAT Attack Resistant Active Metering Against IC Overbuilding5
TCAM-GNN: A TCAM-Based Data Processing Strategy for GNN Over Sparse Graphs5
QuripfeNet: Quantum-Resistant IPFE-Based Neural Network5
Edgeless-GNN: Unsupervised Representation Learning for Edgeless Nodes5
PresQ: Discovery of Multidimensional Equally-Distributed Dependencies via Quasi-Cliques on Hypergraphs5
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks5
Frequency Estimation Mechanisms Under ϵδ-Utility-Optimized Local Differential Privacy5
A Graph-Incorporated Latent Factor Analysis Model for High-Dimensional and Sparse Data4
Polynomial Vault: A Secure and Robust Fingerprint based Authentication4
A Novel Porcelain Fingerprinting Technique4
X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data4
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach4
Enhancing Knowledge Reusability: A Distributed Multitask Machine Learning Approach4
0.079244136810303