IEEE Transactions on Emerging Topics in Computing

Papers
(The median citation count of IEEE Transactions on Emerging Topics in Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities98
Front Cover97
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING94
Reliability Evaluation and Fault Tolerant Design for KLL Sketches82
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption66
HREN: A Hybrid Reliable and Energy-Efficient Network-on-Chip Architecture66
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning64
Efficient Training and Neuro-Encoding for Bridging Hybrid ANN and SNN Computation62
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware62
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning60
PipeDAP: An Efficient Communication Framework for Scheduling Decoupled All-Reduce Primitives in Distributed DNN Training59
A Technique for Approximate Communication in Network-on-Chips for Image Classification56
Fast Multiple-Precision Integer Division Using Intel AVX-51255
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT50
Graph Reconfigurable Pooling for Graph Representation Learning48
Scheduling Coflows by Online Identification in Data Center Network48
Privacy-Preserving Publicly Verifiable Outsourced Distributed Computation Scheme for Matrix Multiplication47
A Virtual Reality Perceptual Study of Multi-Technique Redirected Walking Method47
(In)security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers47
Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults’ Functional Profile45
DALTON - Deep Local Learning in SNNs via Local Weights and Surrogate-Derivative Transfer45
Table of Contents44
Table of Contents42
IEEE Transactions on Emerging Topics in Computing Publication Information42
A VLSI Digital Circuit Platform for Performing Deterministic Stochastic Computing in the Time Dimension Using Fraction Operations on Rational Numbers37
The Self-Aware Information Processing Factory Paradigm for Mixed-Critical Multiprocessing36
RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks36
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring36
A Survey of MRAM-Centric Computing: From Near Memory to In Memory35
Memristive Crossbar Array-Based Adversarial Defense Using Compression33
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks33
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud31
BIC Codes: Bit Insertion-Based Constrained Codes With Error Correction for DNA Storage29
CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM29
Integrated Edge Computing and Blockchain: A General Medical Data Sharing Framework29
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks29
Energy Efficient Approximate Computing Framework for DNN Acceleration Using a Probabilistic-Oriented Method28
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain28
Architecture Support for Bitslicing27
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest27
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm27
A Multiplier-Free RNS-Based CNN Accelerator Exploiting Bit-Level Sparsity27
Table of Contents26
Tight Bound on NewHope Failure Probability26
TETC's January 2022 Editor-in-Chief’s Report on the State of the Journal26
AutoRelax: HW-SW Co-Optimization for Efficient SpGEMM Operations With Automated Relaxation in Deep Learning24
Guest Editorial: Special Section on Emerging and Impacting Trends on Computer Arithmetic23
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation23
Designing Mobile Technologies to Encourage Civic Engagement: The Role of Situated Motivational Affordances21
Open and Closed-Loop Predictive Control Strategies for Software Rejuvenation21
MFDS-STGCN: Predicting the Behaviors of College Students With Fine-Grained Spatial-Temporal Activities Data21
Traffic Network Socialization: An Adaptive Spatio-Temporal Graph Convolutional Network for Traffic Prediction21
What, When, Where to Compute-in-Memory for Efficient Matrix Multiplication During Machine Learning Inference20
Private Delegated Computations Using Strong Isolation20
Design and Evaluate Recomposited OR-AND-XOR-PUF20
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems19
Unsupervised Domain Adaptation via Contrastive Adversarial Domain Mixup: A Case Study on COVID-1919
Error in Ulps of the Multiplication or Division by a Correctly-Rounded Function or Constant in Binary Floating-Point Arithmetic19
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems19
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis18
Deadline-Aware and Energy-Efficient Dynamic Task Mapping and Scheduling for Multicore Systems Based on Wireless Network-on-Chip18
Deep Graph Networks for Drug Repurposing With Multi-Protein Targets18
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications18
SelfVis: Self-Supervised Learning for Human Activity Recognition Based on Area Charts18
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection18
Child-Computer Interaction With Mobile Devices: Recent Works, New Dataset, and Age Detection18
SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing17
3D Invisible Cloak: A Robust Person Stealth Attack Against Object Detector in Complex 3D Physical Scenarios17
Front Cover16
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory16
Vector Field-Guided Circumnavigation for an Unmanned Surface Vehicle With Boundary and Obstacle Constraints16
Scalable and RISC-V Programmable Near-Memory Computing Architectures for Edge Nodes16
Sepformer-Based Models: More Efficient Models for Long Sequence Time-Series Forecasting16
Table of Contents16
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication16
2021 Index IEEE Transactions on Emerging Topics in Computing Vol. 915
NeuE: Automated Neural Network Ensembles for Edge Intelligence15
Approximate MAC Unit Using Static Segmentation15
Construction of a Spike-Based Memory Using Neural-Like Logic Gates Based on Spiking Neural Networks on SpiNNaker15
Efficient Vertical Federated Learning Method for Ridge Regression of Large-Scale Samples15
Resource-Aware Knowledge Distillation for Federated Learning15
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption15
Hybrid Quantum ResNet for Time Series Classification15
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions14
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment14
PLSM: A Parallelized Liquid State Machine for Unintentional Action Detection14
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks14
Quantum Implementation and Analysis of SHA-2 and SHA-314
A Novel Prediction Technique for Federated Learning14
Path-Based Delay Variation Models for Parallel-Prefix Adders14
Maximizing Social Influence With Minimum Information Alteration14
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting14
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans13
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments12
PLAM: A Posit Logarithm-Approximate Multiplier12
Quantum-Inspired Differential Evolution With Decoding Using Hashing for Efficient User Allocation in Edge Computing Environment12
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization12
ALP: Alleviating CPU-Memory Data Movement Overheads in Memory-Centric Systems12
WASMBOX: A Lightweight Wasm-Based Runtime for Trustworthy Multi-Tenant Embedded Systems12
A Bio-Inspired Implementation of a Sparse-Learning Spike-Based Hippocampus Memory Model12
Guest Editorial Emerging Trends and Advances in Graph-Based Methods and Applications11
2022 Reviewers List*11
Efficient Error-Resilient Bus Coding Method Using Bit-Basis Orthogonal Integrative Multiplexing11
Notice of Violation of IEEE Publication Principles: An Energy-Efficient Heterogeneous Memory Architecture for Future Dark Silicon Embedded Chip-Multiprocessors11
Performability of Service Chains With Rejuvenation: A Multidimensional Universal Generating Function Approach11
Online Resource Provisioning and Batch Scheduling for AIoT Inference Serving in an XPU Edge Cloud10
Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF10
Approximate Recursive Multipliers Using Low Power Building Blocks10
Boosting Extra-Functional Code Reusability in Cyber-Physical Production Systems: The Error Handling Case Study10
Exploiting Entity Information for Robust Prediction Over Event Knowledge Graphs10
A Large Scale Characterization of Device Uptimes10
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing10
X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data10
Toward Designing High-Speed Cost-Efficient Quantum Reversible Carry Select Adders10
H-BILSTM: A Novel Bidirectional Long Short Term Memory Network Based Intelligent Early Warning Scheme in Mobile Edge Computing (MEC)10
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network10
Using Diversities to Model the Reliability of Two-Version Machine Learning Systems10
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers10
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing10
AntiDOTE: Protecting Debug Against Outsourced Test Entities9
On Adaptive Influence Maximization Under General Feedback Models9
Numerical Model for 32-Bit Magnonic Ripple Carry Adder9
Graph Learning for Cognitive Digital Twins in Manufacturing Systems9
Affective Region Recognition and Fusion Network for Target-Level Multimodal Sentiment Classification9
Table of Contents9
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph9
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes9
Fast and Robust UAV to UAV Detection and Tracking From Video9
A Catalog-Based AIG-Rewriting Approach to the Design of Approximate Components9
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities9
Solar Particle Event and Single Event Upset Prediction from SRAM-based Monitor and Supervised Machine Learning8
Artificial Intelligence for Mass Spectrometry and Nuclear Magnetic Resonance Spectroscopy Using a Novel Data Augmentation Method8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
IEEE Transactions on Emerging Topics in Computing Information for Authors8
Bit-Line Computing for CNN Accelerators Co-Design in Edge AI Inference8
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications8
Co-Evolutionary Fuzzy Deep Transfer Learning for Disaster Relief Demand Forecasting8
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator8
Front Cover8
FerroCoin: Ferroelectric Tunnel Junction-Based True Random Number Generator8
A Novel Technique for Fingerprint Based Secure User Authentication8
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability8
Strategic Honeypot Deployment in Ultra-Dense Beyond 5G Networks: A Reinforcement Learning Approach8
Balancing Throughput and Fair Execution of Multi-DNN Workloads on Heterogeneous Embedded Devices8
The Indoor Predictability of Human Mobility: Estimating Mobility With Smart Home Sensors8
Improvement of Battery Lifetime Based on Communication Resource Control in Low-Earth-Orbit Satellite Constellations7
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics7
Front Cover7
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy7
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs7
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications7
Improved Modular Multiplication Algorithms Using Solely IEEE 754 Binary Floating-Point Operations7
Quantum Computing Based Optimization for Intelligent Reflecting Surface (IRS)-Aided Cell-Free Network7
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement7
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs7
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks7
Front Cover7
A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays7
FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning7
IEEE Transactions on Emerging Topics in Computing Information for Authors7
Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems7
Asyn2F: An Asynchronous Federated Learning Framework With Bidirectional Model Aggregation7
ReaLPrune: ReRAM Crossbar-Aware Lottery Ticket Pruning for CNNs7
Deep Learning Based Intelligent Tumor Analytics Framework for Quantitative Grading and Analyzing Cancer Metastasis: Case of Lymph Node Breast Cancer7
Engravings, Secrets, and Interpretability of Neural Networks7
Low-Power Approximate Logarithmic Squaring Circuit Design for DSP Applications7
An Alternative Approach to Polynomial Modular Number System Internal Reduction6
Engaging Primary and Secondary School Students in Computer Science Through Computational Thinking Training6
Multi-Layer Personalized Federated Learning for Mitigating Biases in Student Predictive Analytics6
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning6
Deep Attentive Interest Collaborative Filtering for Recommender Systems6
TCAM-GNN: A TCAM-Based Data Processing Strategy for GNN Over Sparse Graphs6
Edgeless-GNN: Unsupervised Representation Learning for Edgeless Nodes6
Dynamically Activated De-Glaring and Detail- Recovery for Low-Light Image Enhancement Directly on Smart Cameras6
Algebraic attacks on block ciphers using quantum annealing6
Spiker+: A Framework for the Generation of Efficient Spiking Neural Networks FPGA Accelerators for Inference at the Edge6
IEEE Transactions on Emerging Topics in Computing6
Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems6
Deep Recommendation With Adversarial Training6
Acceleration of the Bootstrapping in TFHE by FPGA5
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach5
AI4FIDS: Multimodal Federated Intrusion Detection5
Front Cover5
Edge-Based Live Learning for Robot Survival5
Transfer Learning Realized With Nonlinearly Transformed Input Space5
A Comparative Analysis of Software Aging in Relational Database System Environments5
FHEmem: A Processing In-Memory Accelerator for Fully Homomorphic Encryption5
Mining Implicit Equations From Data Using Gene Expression Programming5
DeepEcho: Echoacoustic Recognition of Materials Using Returning Echoes With Deep Neural Networks5
Algorithm-Hardware Co-Design of Split-Radix Discrete Galois Transformation for KyberKEM5
A BF16 FMA is All You Need for DNN Training5
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure Against Side Channel Attack and Its Complexity Verification5
Dynamic Reconfiguration for Resilient State Estimation Against Cyber Attacks5
IEEE Transactions on Emerging Topics in Computing Information for Authors5
Guest Editorial: Special Section on “To be Safe and Dependable in the Era of Artificial Intelligence: Emerging Techniques for Trusted and Reliable Machine Learning”5
Software-Defined Number Formats for High-Speed Belief Propagation4
Linearizing Binary Optimization Problems Using Variable Posets for Ising Machines4
A Segmented-Edit Error-Correcting Code With Re-Synchronization Function for DNA-Based Storage Systems4
Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning4
Design of Unsigned Approximate Hybrid Dividers Based on Restoring Array and Logarithmic Dividers4
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices4
Near Volatile and Non-Volatile Memory Processing in 3D Systems4
ReMap: Reliability Management of Peak-Power-Aware Real-Time Embedded Systems Through Task Replication4
A Low Latency Approximate Adder Design Based on Dual Sub-Adders With Error Recovery4
HMCKRAutoEncoder: An Interpretable Deep Learning Framework for Time Series Analysis4
LP-Star: Embedding Longest Paths into Star Networks With Large-Scale Missing Edges Under an Emerging Assessment Model4
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment4
A Novel Privacy-Preserving Range Query Scheme With Permissioned Blockchain for Smart Grid4
Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks4
DP-PartFIM: Frequent Itemset Mining Using Differential Privacy and Partition4
Bi-Layer Deep Learning with Neural Networks and Large Language Models for Cognitive Biometrics4
Incentive Mechanism Design for Hierarchical Federated Learning With Selfishness Queue Stability4
IoTRec: The IoT Recommender for Smart Parking System4
Table of Contents4
HiT-CIM: A High-Throughput Compute-In-Memory SRAM Architecture with Simultaneous Weight Loading/Computing and Balance Capabilities4
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework4
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design4
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative Database4
Scatter-Gather DMA Performance Analysis Within an SoC-Based Control System for Trapped-Ion Quantum Computing4
Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography4
CiM-BNN:Computing-in-MRAM Architecture for Stochastic Computing Based Bayesian Neural Network4
Concept Stability Entropy: A Novel Group Cohesion Measure in Social Networks3
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks3
Adaptive ELM-Based Time-Constrained Control of Uncertain Robotic Manipulators With Minimum Learning Computation3
A Novel RFET-Based FPGA Architecture Based on Delay-Aware Packing Algorithm3
IEEE Transactions on Emerging Topics in Computing Information for Authors3
A Pervasive Edge Computing Model for Proactive Intelligent Data Migration3
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities3
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks3
New Construction of Balanced Codes Based on Weights of Data for DNA Storage3
Enhancing Neural Architecture Search With Multiple Hardware Constraints for Deep Learning Model Deployment on Tiny IoT Devices3
DECC: Delay-Aware Edge-Cloud Collaboration for Accelerating DNN Inference3
Enabling Obfuscation Detection in Binary Software through eXplainable AI3
Rei: A Reconfigurable Interconnection Unit for Array-Based CNN Accelerators3
Manifold-Inspired Search-Based Algorithm for Automated Test Case Generation3
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation3
IEEE Transactions on Emerging Topics in Computing Publication Information3
AGSEI: Adaptive Graph Structure Estimation With Long-Tail Distributed Implicit Graphs3
A Cybersecurity Educated Community3
Runtime System Support for CPS Software Rejuvenation3
Key-Components for Digital Twin Modeling With Granularity: Use Case Car-as-a-Service3
Cost-Effective Software Rejuvenation Combining Time-Based and Inspection-Based Policies3
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges3
Darwin: A DRAM-Based Multi-Level Processing-in-Memory Architecture for Column-Oriented Database3
An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling3
LIONHEART: A Layer-Based Mapping Framework for Heterogeneous Systems with Analog in-Memory Computing Tiles3
Quantifying the Effects of Anonymization Techniques Over Micro-Databases3
Multitask Particle Swarm Optimization With Dynamic Transformation3
Area and Power Efficient FFT/IFFT Processor for FALCON Post-Quantum Cryptography3
0.06142520904541