IEEE Transactions on Emerging Topics in Computing

Papers
(The TQCC of IEEE Transactions on Emerging Topics in Computing is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Front Cover325
PABLO: A Variation-Robust PIM Architecture for Bulk Bitwise Logical Operations in DRAM185
Table of Contents149
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING142
Low-Power Real-Time Seizure Monitoring Using AI-Assisted Sonification of Neonatal EEG140
Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems130
2024 Reviewers List*103
Quantum Implementation and Analysis of SHA-2 and SHA-393
A Novel Prediction Technique for Federated Learning84
IEEE Transactions on Emerging Topics in Computing Publication Information82
LIONHEART: A Layer-Based Mapping Framework for Heterogeneous Systems with Analog in-Memory Computing Tiles81
FLCL: Feature-Level Contrastive Learning for Few-Shot Image Classification81
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols79
Front Cover76
DECC: Delay-Aware Edge-Cloud Collaboration for Accelerating DNN Inference71
Personalized Privacy-Preserving Framework for Cross-Silo Federated Learning70
Fast Multiple-Precision Integer Division Using Intel AVX-51267
A Flexible and Reliable RRAM-Based In-Memory Computing Architecture for Data-Intensive Applications64
Towards Optimization of Privacy-Utility Trade-Off Using Similarity and Diversity Based Clustering64
Memristive Crossbar Array-Based Computing Framework via DWT for Biomedical Image Enhancement63
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption61
Side-Channel Attack Analysis on In-Memory Computing Architectures61
PISA: A Non-Volatile Processing-in-Sensor Accelerator for Imaging Systems60
Maximizing Social Influence With Minimum Information Alteration56
Understanding Bulk-Bitwise Processing In-Memory Through Database Analytics54
A Privacy Enforcing Framework for Data Streams on the Edge53
Efficient Ternary Logic Circuits Optimized by Ternary Arithmetic Algorithms51
Distributed Indexing Schemes for K-Dominant Skyline Analytics on Uncertain Edge-IoT Data47
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware46
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning46
The e-LocGov Model for Introducing e-Governance into Local Governments: An Estonian Case Study45
Virtual Reality Simulation of a Quadrotor to Monitor Dependent People at Home45
Quantifying the Impact of Monolithic 3D (M3D) Integration on L1 Caches45
Sparse Logistic Maximum Likelihood Estimation for Optimal Well-Being Determinants44
Proposal and Performance Evaluation of Information Diffusion Technique with Novel Virtual-Cell-Based Wi-Fi Direct42
Exploiting Asymmetry in eDRAM Errors for Redundancy-Free Error-Tolerant Design42
Guest Editorial Assistive Computing Technologies for Human Well-Being41
Guest Editorial: Special Section on Emerging Trends and Computing Paradigms for Testing, Reliability and Security in Future VLSI Systems41
Key-Components for Digital Twin Modeling With Granularity: Use Case Car-as-a-Service41
Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility40
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities40
AppDNA: Profiling App Behavior via Deep-Learning Function Call Graphs40
Probabilistic Interpolation Recoder for Energy-Error-Product Efficient DBNs With p-Bit Devices39
Quantifying the Effects of Anonymization Techniques Over Micro-Databases39
A Technique for Approximate Communication in Network-on-Chips for Image Classification39
Combined Symbol Error Correction and Spare Through-Silicon Vias for 3D Memories38
EXSCALATE: An Extreme-Scale Virtual Screening Platform for Drug Discovery Targeting Polypharmacology to Fight SARS-CoV-237
Nonvolatile Associative Memory Design Based on Spintronic Synapses and CNTFET Neurons37
FTxAC: Leveraging the Approximate Computing Paradigm in the Design of Fault-Tolerant Embedded Systems to Reduce Overheads36
Path-Based Delay Variation Models for Parallel-Prefix Adders35
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks35
Secure Data Sequence Query Framework Based on Multiple Fogs34
On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems34
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs32
SenseHash: Computing on Sensor Values Mystified at the Origin32
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT31
Gate-Level Side-Channel Leakage Ranking With Architecture Correlation Analysis30
Optimal Energy-Aware Task Scheduling for Batteryless IoT Devices30
A New Application for the Motor Rehabilitation at Home: Structure and Usability of Bal-App30
An Interrelated Imitation Learning Method for Heterogeneous Drone Swarm Coordination29
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment29
An Optimized Hardware Implementation of Modular Multiplication of Binary Ring LWE29
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy28
Online Remaining Useful Lifetime Prediction Using Support Vector Regression28
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs28
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions28
A Near-Sensor Processing Accelerator for Approximate Local Binary Pattern Networks27
ARIS: Efficient Admitted Influence Maximizing in Large-Scale Networks Based on Valid Path Reverse Influence Sampling26
Reliability Evaluation and Fault Tolerant Design for KLL Sketches26
Bounding the Round-Off Error of the Upwind Scheme for Advection25
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks25
Special Section on “Emerging and Impacting Trends on Computer Arithmetic”25
Detecting Activities of Daily Living and Routine Behaviours in Dementia Patients Living Alone Using Smart Meter Load Disaggregation24
An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling24
Area-Time Efficient Hardware Implementation for Binary Ring-LWE Based Post-Quantum Cryptography24
Table of Contents24
Table of Contents23
Pip-SW: Pipeline Architectures for Accelerating Smith-Waterman Algorithm on FPGA Platforms23
IEEE Transactions on Emerging Topics in Computing Information for Authors23
2021 Index IEEE Transactions on Emerging Topics in Computing Vol. 923
Resource Allocation Optimization by Quantum Computing for Shared Use of Standalone IRS22
HREN: A Hybrid Reliable and Energy-Efficient Network-on-Chip Architecture21
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment21
IEEE Transactions on Emerging Topics in Computing Information for Authors21
Design and Analysis of a Novel Integral Design Scheme for Finding Finite-Time Solution of Time-Varying Matrix Inequalities20
An Intelligent Route Computation Approach Based on Real-Time Deep Learning Strategy for Software Defined Communication Systems20
Fuzzy Clustered Federated Learning Algorithm for Solar Power Generation Forecasting20
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects20
AGSEI: Adaptive Graph Structure Estimation with Long-Tail Distributed Implicit Graphs20
Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks20
Two Low-cost and Security-enhanced Implementations Against Side-channel Attacks of NTT for Lattice-based Cryptography19
Runtime System Support for CPS Software Rejuvenation19
Energy-Minimized Partial Computation Offloading for Delay-Sensitive Applications in Heterogeneous Edge Networks19
HDGCN: Dual-Channel Graph Convolutional Network With Higher-Order Information for Robust Feature Learning19
A Dynamic Task Scheduling Strategy for Multi-Access Edge Computing in IRS-Aided Vehicular Networks19
Coupled Attention Networks for Multivariate Time Series Anomaly Detection18
Graph-Embedded Convolutional Neural Network for Image-Based EEG Emotion Recognition18
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs18
FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning18
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City18
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs18
COACH: Consistency Aware Check-Pointing for Nonvolatile Processor in Energy Harvesting Systems18
A virtual reality perceptual study of multi-Technique redirected walking method17
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud17
Adaptive ELM-Based Time-Constrained Control of Uncertain Robotic Manipulators With Minimum Learning Computation16
A Bio-Inspired Implementation of a Sparse-Learning Spike-Based Hippocampus Memory Model16
Analyzing Wet-Neuromorphic Computing Using Bacterial Gene Regulatory Neural Networks16
Table of Contents16
Enabling Obfuscation Detection in Binary Software through eXplainable AI16
WASMBOX: A Lightweight Wasm-based Runtime for Trustworthy Multi-Tenant Embedded Systems15
A Low-Cost Wireless Body Area Network for Human Activity Recognition in Healthy Life and Medical Applications15
A Survey of MRAM-Centric Computing: From Near Memory to In Memory15
DALTON - Deep Local Learning in SNNs via local Weights and Surrogate-Derivative Transfer15
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications15
2021 Reviewers List15
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING15
Table of Contents15
Deep Learning Based Intelligent Tumor Analytics Framework for Quantitative Grading and Analyzing Cancer Metastasis: Case of Lymph Node Breast Cancer14
Front Cover14
Hardware-Aware DNN Compression via Diverse Pruning and Mixed-Precision Quantization14
IEEE Transactions on Emerging Topics in Computing Information for Authors14
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks14
(In)Security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers14
Dynamically Activated De-Glaring and Detail- Recovery for Low-Light Image Enhancement Directly on Smart Cameras14
A Pervasive Edge Computing Model for Proactive Intelligent Data Migration14
Area Efficient Skyrmion Logic based Approximate Adder Architecture Design Methodology14
IEEE Transactions on Emerging Topics in Computing Information for Authors14
Transformer-Based Graph Neural Networks for Outfit Generation13
An Experience Replay Method Based on Tree Structure for Reinforcement Learning13
Darwin: A DRAM-Based Multi-Level Processing-in-Memory Architecture for Column-Oriented Database13
Cost-Effective Software Rejuvenation Combining Time-Based and Inspection-Based Policies13
BNN An Ideal Architecture for Acceleration With Resistive in Memory Computation13
Graph Reconfigurable Pooling for Graph Representation Learning13
Sparsity-Oriented MRAM-Centric Computing for Efficient Neural Network Inference13
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing12
A Lightweight Robust Logic Locking Technique to Thwart Sensitization and Cone-Based Attacks12
Autonomous Scan Patterns for Laser Voltage Imaging12
Advancement of Textual Answer Triggering: Cognitive Boosting12
swMR: A Framework for Accelerating MapReduce Applications on Sunway Taihulight12
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans12
Design Space Exploration of Stochastic Computing Architectures Implemented Using Integrated Optics12
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme12
ACBAM-Accuracy-Configurable Sign Inclusive Broken Array Booth Multiplier Design11
Collaborative Trajectory Mining in Smart-Homes to Support Early Diagnosis of Cognitive Decline11
A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays11
PLAM: A Posit Logarithm-Approximate Multiplier11
RC-RNN: Reconfigurable Cache Architecture for Storage Systems Using Recurrent Neural Networks11
Digital Transformation of a Production Line: Network Design, Online Data Collection and Energy Monitoring11
0.10043001174927