IEEE Transactions on Emerging Topics in Computing

Papers
(The TQCC of IEEE Transactions on Emerging Topics in Computing is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Front Cover107
Reliability Evaluation and Fault Tolerant Design for KLL Sketches90
PipeDAP: An Efficient Communication Framework for Scheduling Decoupled All-Reduce Primitives in Distributed DNN Training87
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning83
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware70
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption67
Fast Multiple-Precision Integer Division Using Intel AVX-51267
Efficient Training and Neuro-Encoding for Bridging Hybrid ANN and SNN Computation66
A Technique for Approximate Communication in Network-on-Chips for Image Classification60
IsBad: Imperceptible Sample-Specific Backdoor to DNN With Denoising Autoencoder57
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning55
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT53
Graph Reconfigurable Pooling for Graph Representation Learning52
Scheduling Coflows by Online Identification in Data Center Network50
(In)security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers45
DALTON - Deep Local Learning in SNNs via Local Weights and Surrogate-Derivative Transfer44
A Virtual Reality Perceptual Study of Multi-Technique Redirected Walking Method44
Table of Contents43
IEEE Transactions on Emerging Topics in Computing Publication Information38
Table of Contents37
A VLSI Digital Circuit Platform for Performing Deterministic Stochastic Computing in the Time Dimension Using Fraction Operations on Rational Numbers36
Practical and Robust Privacy-Preserving K-Means Clustering Protocols With GPU Acceleration35
Memristive Crossbar Array-Based Adversarial Defense Using Compression34
Unleashing the Potential of Skyrmion Racetrack Memory as Energy-Efficient On-Chip Memory34
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks34
A Survey of MRAM-Centric Computing: From Near Memory to In Memory34
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud31
Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults’ Functional Profile30
Privacy-Preserving Publicly Verifiable Outsourced Distributed Computation Scheme for Matrix Multiplication30
A Representation Learning Approach to Feature Drift Detection in Wireless Networks30
CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM29
Notice of Removal: RC-RNN: R econfigurable C ache Architecture for Storage Systems Using 29
Towards Execution-Efficient LSTMs via Hardware-Guided Grow-and-Prune Paradigm28
Secure Delegated Quantum Approximate Optimization Algorithm with Quantum One-Time Pad for MAX-CUT Problem28
Energy Efficient Approximate Computing Framework for DNN Acceleration Using a Probabilistic-Oriented Method28
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest27
Architecture Support for Bitslicing27
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks27
BIC Codes: Bit Insertion-Based Constrained Codes With Error Correction for DNA Storage26
A Multiplier-Free RNS-Based CNN Accelerator Exploiting Bit-Level Sparsity26
Tight Bound on NewHope Failure Probability26
Table of Contents25
Integrated Edge Computing and Blockchain: A General Medical Data Sharing Framework25
AutoRelax: HW-SW Co-Optimization for Efficient SpGEMM Operations With Automated Relaxation in Deep Learning25
Designing Mobile Technologies to Encourage Civic Engagement: The Role of Situated Motivational Affordances24
Guest Editorial: Special Section on Emerging and Impacting Trends on Computer Arithmetic24
Private Delegated Computations Using Strong Isolation24
Traffic Network Socialization: An Adaptive Spatio-Temporal Graph Convolutional Network for Traffic Prediction23
Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems23
What, When, Where to Compute-in-Memory for Efficient Matrix Multiplication During Machine Learning Inference23
GraphMamba: Graph Tokenization Mamba for Hyperspectral Image Classification23
Graph-Based Anomaly APT Attack Detection via Threat Intelligence22
MFDS-STGCN: Predicting the Behaviors of College Students With Fine-Grained Spatial-Temporal Activities Data21
Thermal-Aware Standby-Sparing Technique on Heterogeneous Real-Time Embedded Systems21
Open and Closed-Loop Predictive Control Strategies for Software Rejuvenation21
Unsupervised Domain Adaptation via Contrastive Adversarial Domain Mixup: A Case Study on COVID-1920
Child-Computer Interaction With Mobile Devices: Recent Works, New Dataset, and Age Detection20
Error in Ulps of the Multiplication or Division by a Correctly-Rounded Function or Constant in Binary Floating-Point Arithmetic20
3D Invisible Cloak: A Robust Person Stealth Attack Against Object Detector in Complex 3D Physical Scenarios19
SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing19
Deadline-Aware and Energy-Efficient Dynamic Task Mapping and Scheduling for Multicore Systems Based on Wireless Network-on-Chip18
Deep Graph Networks for Drug Repurposing With Multi-Protein Targets18
A Lightweight Posit Processing Unit for RISC-V Processors in Deep Neural Network Applications18
SelfVis: Self-Supervised Learning for Human Activity Recognition Based on Area Charts18
Sepformer-Based Models: More Efficient Models for Long Sequence Time-Series Forecasting17
Construction of a Spike-Based Memory Using Neural-Like Logic Gates Based on Spiking Neural Networks on SpiNNaker16
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis16
MemAscend: System Memory Optimization for SSD-Offloaded LLM Fine-Tuning16
PM-AIO: An Effective Asynchronous I/O System for Persistent Memory16
Front Cover16
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication16
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection16
Table of Contents16
Approximate MAC Unit Using Static Segmentation15
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption15
Efficient Vertical Federated Learning Method for Ridge Regression of Large-Scale Samples15
Scalable and RISC-V Programmable Near-Memory Computing Architectures for Edge Nodes14
NeuE: Automated Neural Network Ensembles for Edge Intelligence14
Deep Belief Network-Based Activity of Daily Living Monitoring for Fall Risk Prediction in Elderly13
Vector Field-Guided Circumnavigation for an Unmanned Surface Vehicle With Boundary and Obstacle Constraints13
Resource-Aware Knowledge Distillation for Federated Learning13
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks13
Hybrid Quantum ResNet for Time Series Classification13
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment13
Maximizing Social Influence With Minimum Information Alteration12
ALP: Alleviating CPU-Memory Data Movement Overheads in Memory-Centric Systems12
Path-Based Delay Variation Models for Parallel-Prefix Adders12
Quantum-Inspired Differential Evolution With Decoding Using Hashing for Efficient User Allocation in Edge Computing Environment12
A Novel Prediction Technique for Federated Learning12
Front Cover12
Multi-View Partial Multi-Label Learning via Class Activation Specific Features Collaborative Learning12
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting12
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans12
PPSplitFed: Privacy-Preserving Splitfed Learning via Functional Encryption12
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions12
Quantum Implementation and Analysis of SHA-2 and SHA-312
Traceable and Revocable Attribute-Based Conjunctive Keyword Search12
2022 Reviewers List*11
A Bio-Inspired Implementation of a Sparse-Learning Spike-Based Hippocampus Memory Model11
Spatial-Temporal Neighborhood Transformer for Point Cloud Completion11
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization11
PLAM: A Posit Logarithm-Approximate Multiplier11
FairRFL: Fair and Robust Federated Learning in the Presence of Selfish Clients11
WASMBOX: A Lightweight Wasm-Based Runtime for Trustworthy Multi-Tenant Embedded Systems11
PLSM: A Parallelized Liquid State Machine for Unintentional Action Detection11
Performability of Service Chains With Rejuvenation: A Multidimensional Universal Generating Function Approach10
Exploiting Entity Information for Robust Prediction Over Event Knowledge Graphs10
Toward Scalable Multi-Chip Wireless Networks With Near-Field Time Reversal10
Toward Designing High-Speed Cost-Efficient Quantum Reversible Carry Select Adders10
Notice of Violation of IEEE Publication Principles: An Energy-Efficient Heterogeneous Memory Architecture for Future Dark Silicon Embedded Chip-Multiprocessors10
Approximate Recursive Multipliers Using Low Power Building Blocks10
Intelligent Reflecting Surface (IRS) Allocation Scheduling Method Using Combinatorial Optimization by Quantum Computing10
Guest Editorial Emerging Trends and Advances in Graph-Based Methods and Applications10
X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data10
Using Diversities to Model the Reliability of Two-Version Machine Learning Systems10
AntiDOTE: Protecting Debug Against Outsourced Test Entities9
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing9
SPACE: Finding Key-Speaker in Complex Multi-Person Scenes9
A Catalog-Based AIG-Rewriting Approach to the Design of Approximate Components9
Adaptive Object Exploration and Mapping through Meta-Reinforcement Learning9
Fast and Robust UAV to UAV Detection and Tracking From Video9
Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF9
Affective Region Recognition and Fusion Network for Target-Level Multimodal Sentiment Classification9
H-BILSTM: A Novel Bidirectional Long Short Term Memory Network Based Intelligent Early Warning Scheme in Mobile Edge Computing (MEC)9
Numerical Model for 32-Bit Magnonic Ripple Carry Adder9
An Efficient Ternary In-Memory Computing Architecture with Application in Phonocardiogram-Based Driver Stress Detection9
Online Resource Provisioning and Batch Scheduling for AIoT Inference Serving in an XPU Edge Cloud9
Offloading Decision for Mobile Multi-Access Edge Computing in a Multi-Tiered 6G Network9
A Large Scale Characterization of Device Uptimes9
Table of Contents9
PERCIVAL: Open-Source Posit RISC-V Core With Quire Capability9
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities9
0.086852788925171