IEEE Transactions on Emerging Topics in Computing

Papers
(The TQCC of IEEE Transactions on Emerging Topics in Computing is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Smart Resource Allocation for Mobile Edge Computing: A Deep Reinforcement Learning Approach256
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City164
Green Resource Allocation Based on Deep Reinforcement Learning in Content-Centric IoT158
Removal Attacks on Logic Locking and Camouflaging Techniques148
Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection120
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services102
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence88
Academic Influence Aware and Multidimensional Network Analysis for Research Collaboration Navigation Based on Scholarly Big Data88
A Mental Health Chatbot for Regulating Emotions (SERMO) - Concept and Usability Test88
Minimizing Convergecast Time and Energy Consumption in Green Internet of Things85
Blockchain Mutability: Challenges and Proposed Solutions83
A Survey of Incentive Mechanism Design for Federated Learning81
An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems75
Leveraging Communicating UAVs for Emergency Vehicle Guidance in Urban Areas74
Exploring Research in Blockchain for Healthcare and a Roadmap for the Future70
Radiation Hardened Latch Designs for Double and Triple Node Upsets69
Novel Low Cost, Double-and-Triple-Node-Upset-Tolerant Latch Designs for Nano-scale CMOS68
HCP: Heterogeneous Computing Platform for Federated Learning Based Collaborative Content Caching Towards 6G Networks66
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage61
Sway: Traffic-Aware QoS Routing in Software-Defined IoT60
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs60
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing57
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs55
Edge Cloud Server Deployment With Transmission Power Control Through Machine Learning for 6G Internet of Things54
Blockchain-Based Trust Management for Internet of Vehicles51
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme51
VOPRec: Vector Representation Learning of Papers with Text Information and Structural Identity for Recommendation49
Novel Quadruple-Node-Upset-Tolerant Latch Designs With Optimized Overhead for Reliable Computing in Harsh Radiation Environments49
Design and Analysis of Majority Logic-Based Approximate Adders and Multipliers46
Online Fall Detection Using Recurrent Neural Networks on Smart Wearable Devices45
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition43
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts40
Machine-Learning-Driven Digital Twin for Lifecycle Management of Complex Equipment39
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network39
A Novel TDMA-Based Fault Tolerance Technique for the TSVs in 3D-ICs Using Honeycomb Topology39
A Quantum Mechanics-Based Framework for EEG Signal Feature Extraction and Classification38
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network38
Surrogate-Assisted Evolutionary Framework with Adaptive Knowledge Transfer for Multi-Task Optimization37
A Comparative Study of Virtual Reality Methods of Interaction and Locomotion Based on Presence, Cybersickness, and Usability37
RDAM: A Reinforcement Learning Based Dynamic Attribute Matrix Representation for Virtual Network Embedding36
The Effects of Approximate Multiplication on Convolutional Neural Networks35
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy34
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks34
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes34
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data33
A Flip-Flop Based Arbiter Physical Unclonable Function (APUF) Design with High Entropy and Uniqueness for FPGA Implementation33
SEARE: A System for Exercise Activity Recognition and Quality Evaluation Based on Green Sensing32
Quantum Circuit Designs of Integer Division Optimizing T-count and T-depth32
Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter31
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons31
A Novel Bio-Inspired Approach for High-Performance Management in Service-Oriented Networks30
A 3.3 Gbps CCSDS 123.0-B-1 Multispectral & Hyperspectral Image Compression Hardware Accelerator on a Space-Grade SRAM FPGA29
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment29
Graph Learning for Cognitive Digital Twins in Manufacturing Systems29
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation29
Time-Bounded Activity Recognition for Ambient Assisted Living28
Cyber-Enabled Well-Being Oriented Daily Living Support Based on Personal Data Analysis28
StreamFlow: Cross-Breeding Cloud With HPC28
Community Detection by Fuzzy Relations28
DICO: A Graph-DB Framework for Community Detection on Big Scholarly Data26
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs26
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing26
Scalable Design Methodology and Online Algorithm for TSV-Cluster Defects Recovery in Highly Reliable 3D-NoC Systems25
Weird Machines, Exploitability, and Provable Unexploitability25
A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips24
Automatic Signature Verification in the Mobile Cloud Scenario: Survey and Way Ahead24
Lightweight Privacy-Preserving Raw Data Publishing Scheme24
ScanSAT: Unlocking Static and Dynamic Scan Obfuscation23
Privacy-Preserving Deep Learning NLP Models for Cancer Registries23
Fusing Higher and Lower-Order Biological Information for Drug Repositioning via Graph Representation Learning23
A Machine-Learning Model for Automatic Detection of Movement Compensations in Stroke Patients23
Hybrid Partial Product-Based High-Performance Approximate Recursive Multipliers22
Secrecy Driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization22
A Novel Quantum-Inspired Fuzzy Based Neural Network for Data Classification21
Reformative Noise-Immune Neural Network for Equality-Constrained Optimization Applied to Image Target Detection21
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks21
High Quality Down-Sampling for Deterministic Approaches to Stochastic Computing21
Design of Anonymous Endorsement System in Hyperledger Fabric21
In-Situ Defect Detection of Metal Additive Manufacturing: An Integrated Framework20
Defect and Fault Modeling Framework for STT-MRAM Testing20
Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems20
SDLSC-TA: Subarea Division Learning Based Task Allocation in Sparse Mobile Crowdsensing19
PLAM: A Posit Logarithm-Approximate Multiplier19
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability19
A Blockchain-Powered Decentralized and Secure Computing Paradigm19
Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images19
Secure Data Sequence Query Framework Based on Multiple Fogs19
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks19
XpulpNN: Enabling Energy Efficient and Flexible Inference of Quantized Neural Networks on RISC-V Based IoT End Nodes19
Skeleton-Based Action Segmentation With Multi-Stage Spatial-Temporal Graph Convolutional Neural Networks18
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring18
FarSight: Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes18
Highly-Parallel FPGA Accelerator for Simulated Quantum Annealing18
DiabDeep: Pervasive Diabetes Diagnosis Based on Wearable Medical Sensors and Efficient Neural Networks18
Energy- and Quality-Efficient Approximate Multipliers for Neural Network and Image Processing Applications18
First Tests of a New Facility for Device-Level, Board-Level and System-Level Neutron Irradiation of Microelectronics17
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols17
Fast and Robust UAV to UAV Detection and Tracking From Video17
The Role of Explainability in Assuring Safety of Machine Learning in Healthcare17
Collaborative Trajectory Mining in Smart-Homes to Support Early Diagnosis of Cognitive Decline17
Value of Information Based Sensor Ranking for Efficient Sensor Service Allocation in Service Oriented Wireless Sensor Networks16
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing16
A Service-based Joint Model Used for Distributed Learning: Application for Smart Agriculture16
Detection and Threat Prioritization of Pivoting Attacks in Large Networks16
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications16
Authenticated Data Redaction with Fine-Grained Control16
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems15
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects15
A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data15
DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems15
LEXACT: Low Energy N-Modular Redundancy Using Approximate Computing for Real-Time Multicore Processors15
I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis15
A Graph Learning Based Approach for Identity Inference in DApp Platform Blockchain15
Fast Networking for Disaster Recovery14
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking14
Polynomial Vault: A Secure and Robust Fingerprint based Authentication14
Quantifying the Impact of Monolithic 3D (M3D) Integration on L1 Caches14
SPRING: A Sparsity-Aware Reduced-Precision Monolithic 3D CNN Accelerator Architecture for Training and Inference14
Approximate Recursive Multipliers Using Low Power Building Blocks14
ARMOR: An Anti-Counterfeit Security Mechanism for Low Cost Radio Frequency Identification Systems14
The e-LocGov Model for Introducing e-Governance into Local Governments: An Estonian Case Study14
Detection of Limited Magnitude Errors in Emerging Multilevel Cell Memories by One-Bit Parity (OBP) or Two-Bit Parity (TBP)14
Incremental Learning Using a Grow-and-Prune Paradigm With Efficient Neural Networks14
Mitigating Process Variability for Non-Volatile Cache Resilience and Yield14
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases14
Reinforcement Learning-based Mobile Edge Computing and Transmission Scheduling for Video Surveillance13
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT13
VulHunter: A Discovery for Unknown Bugs Based on Analysis for Known Patches in Industry Internet of Things13
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT13
Low-Energy Acceleration of Binarized Convolutional Neural Networks Using a Spin Hall Effect Based Logic-in-Memory Architecture13
Multilevel Graph-Based Decision Making in Big Scholarly Data: An Approach to Identify Expert Reviewer, Finding Quality Impact Factor, Ranking Journals and Researchers13
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks13
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices13
Framework for Prioritization of Open Data Publication: An Application to Smart Cities13
Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices13
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning13
Cluster-Based Heuristic for High Level Synthesis Design Space Exploration13
Robust Robot Tracking for Next-Generation Collaborative Robotics-Based Gaming Environments12
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems12
E-Voting System Evaluation Based on The Council of Europe Recommendations: Helios Voting12
Design Space Exploration Based Methodology for Residue Number System Digital Filters Implementation12
Bitcoin Transaction Forecasting With Deep Network Representation Learning12
Public Service Models: A Systematic Literature Review and Synthesis12
Classification and Mapping of Adaptive Security for Mobile Computing12
Fully Dynamic Inference with Deep Neural Networks12
An Approach to Optimise Resource Provision with Energy-Awareness in Datacentres by Combating Task Heterogeneity11
Agile: A Learning-Enabled Power and Performance-Efficient Network-on-Chip Design11
Vehicle-Assisted RSU Caching Using Deep Reinforcement Learning11
Probabilistic Interpolation Recoder for Energy-Error-Product Efficient DBNs With p-Bit Devices11
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator11
Design and Evaluate Recomposited OR-AND-XOR-PUF11
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing11
COACH: Consistency Aware Check-Pointing for Nonvolatile Processor in Energy Harvesting Systems11
IoTRec: The IoT Recommender for Smart Parking System11
Efficient Key-Gate Placement and Dynamic Scan Obfuscation Towards Robust Logic Encryption11
UAV-Aided Information Diffusion for Vehicle-to-Vehicle (V2V) in Disaster Scenarios11
High Performance Dynamic Resource Allocation for Guaranteed Service in Network-on-Chips11
0.040124893188477