Computer

Computer

计算机

  • 4区 中科院分区
  • Q3 JCR分区

高引用文章

文章名称 引用次数
User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection 42
AI and Blockchain: A Disruptive Integration 19
KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research 15
Toward Human-Understandable, Explainable AI 14
Deep Learning for the Internet of Things 13
The Age of Social Sensing 13
Deep Learning for Human Activity Recognition in Mobile Computing 11
IoT as a Land of Opportunity for DDoS Hackers 11
Programming Spiking Neural Networks on Intel's Loihi 10
Intrusion Detection in the Era of loT: Building Trust via Traffic Filtering and Sampling 10
Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks 9
Malice Domestic: The Cambridge Analytica Dystopia 7
TrueNorth: Accelerating From Zero to 64 Million Neurons in 10 Years 7
The Age of Artificial Emotional Intelligence 6
Using Blockchain for Provenance and Traceability in Internet of Things-Integrated Food Logistics 6
Penetration Testing in the IoT Age 6
On the Use of Stray Wireless Signals for Sensing: A Look Beyond 5G for the Next Generation of Industry 5
Predicting Personality Traits From Physical Activity Intensity 5
Securing Gadget-Free Digital Service 5
Accountability in the IoT: Systems, Law, and Ways Forward 5
End-to-End Trust and Security for Internet of Things Applications 5
From Brexit to Trump: Social Media's Role in Democracy 5
Using eMMA to Manage Medication 5
Accurate Indoor Location for the IoT 5
Standards: Roadmapping Computer Technology Trends Enlightens Industry 4
Future Millimeter-Wave Indoor Systems: A Blueprint for Joint Communication and Sensing 4
Architecting E-Coaching Systems: A First Step for Dealing with Their Intrinsic Design Complexity 4
Cybertrust in the IoT Age 4
Toward Ubiquitous Operating Systems: A Software-Defined Perspective 4
Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning 4
Cloud Futurology 3
The Deep (Learning) Transformation of Mobile and Embedded Computing 3
Cyberthreats under the Bed 3
Really Small Shoe Boxes: On Realistic Quantum Resource Estimation 3
A Hybrid Approach for Solving Optimization Problems on Small Quantum Computers 3
Security Issues in Named Data Networks 3
I/O cloud: Adding an IoT Dimension to Cloud Infrastructures 3
Online Advertising Fraud 3
Interactive Visual Event Analytics: Opportunities and Challenges 3
Redefining Data Transparency: A Multidimensional Approach 3
Smart City Development With Urban Transfer Learning 3
Hybrid Vehicular Crowdsourcing With Driverless Cars: Challenges and a Solution 3
Practical Drone Delivery 3
Network-Level Security for the Internet of Things: Opportunities and Challenges 3
Toward Anthropomorphic Machine Learning 3
Osmosis: The Osmotic Computing Platform for Microelements in the Cloud, Edge, and Internet of Things 3
The Harmonization of Accessibility Standards for Public Policies 3
Language Service Infrastructure on the Web: The Language Grid 3
Practical Annealing-Based Quantum Computing 2
Social Media-based Conversational Agents for Health Management and Interventions 2