| The evolution of sentiment analysis-A review of research topics, venues, and top cited papers |
45 |
| A Survey on quantum computing technology |
33 |
| New trends on moving object detection in video images captured by a moving camera: A survey |
29 |
| Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges |
26 |
| The Critical Node Detection Problem in networks: A survey |
20 |
| Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review |
17 |
| On the role and the importance of features for background modeling and foreground detection |
14 |
| A survey on essential components of a self-sovereign identity |
14 |
| Cluster ensembles: A survey of approaches with recent extensions and applications |
13 |
| Publication trends in gamification: A systematic mapping study |
12 |
| A taxonomy and survey of attacks against machine learning |
12 |
| On cloud security requirements, threats, vulnerabilities and countermeasures: A survey |
12 |
| Indoor location identification technologies for real-time IoT-based applications: An inclusive survey |
11 |
| Recent Named Entity Recognition and Classification techniques: A systematic review |
10 |
| Progress in context-aware recommender systems - An overview |
10 |
| The journey of graph kernels through two decades |
8 |
| A recent review of conventional vs. automated cybersecurity anti-phishing techniques |
6 |
| Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses |
6 |
| Machine learning and multi-agent systems in oil and gas industry applications: A survey |
5 |
| Distributed virtual machine consolidation: A systematic mapping study |
5 |
| Attention to news and its dissemination on Twitter: A survey |
5 |
| A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties |
4 |
| Systematic analysis and review of stock market prediction techniques |
4 |
| Scheduling in distributed systems: A cloud computing perspective |
4 |
| A Survey on malware analysis and mitigation techniques |
4 |
| Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data |
3 |
| A survey on privacy in decentralized online social networks |
3 |
| Generalizing input-driven languages: Theoretical and practical benefits |
3 |
| Parametric survey on cross-layer designs for wireless sensor networks |
3 |
| Evaluation of information retrieval systems using structural equation modeling |
3 |
| Intelligent retrieval and classification in three-dimensional biomedical images - A systematic mapping |
2 |
| Science of Scientific Team Science: A survey |
2 |
| Caching methodologies in Content centric networking (CCN): A survey |
2 |
| Scenario analysis, from BigData to black swan |
2 |
| A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs |
1 |
| Graph grammars according to the type of input and manipulated data: A survey |
1 |
| Semantic Web Services testing: A Systematic Mapping study |
1 |
| Model-based testing using UML activity diagrams: A systematic mapping study |
1 |
| Data Mining and Information Retrieval in the 21st century: A bibliographic review |
1 |
| Prediction methods and applications in the science of science: A survey |
1 |
| Change point detection in social networks-Critical review with experiments |
1 |
| A survey of memory management techniques in virtualized systems |
1 |
| Getting into the mind of an in-auction'' fraud perpetrator |
0 |
| Usability, security and trust in password managers: A quest for user-centric properties and features |
0 |
| A systematic mapping study of API usability evaluation methods |
0 |
| A brief survey on probability distribution approximation |
0 |
| A comparative review of Urdu stemmers: Approaches and challenges |
0 |