default search action
ACM Computing Surveys, Volume 55
Volume 55, Number 1, January 2023
- Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. 1:1-1:35 - Kinza Sarwar, Sira Yongchareon, Jian Yu, Saeed Ur Rehman:
A Survey on Privacy Preservation in Fog-Enabled Internet of Things. 2:1-2:39 - Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. 3:1-3:36 - Rodolfo Ipolito Meneguette, Robson E. De Grande, Jo Ueyama, Geraldo P. Rocha Filho, Edmundo R. M. Madeira:
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges. 4:1-4:46 - Chao Yu, Jiming Liu, Shamim Nemati, Guosheng Yin:
Reinforcement Learning in Healthcare: A Survey. 5:1-5:36 - Fan Xu, Victor S. Sheng, Mingwen Wang:
A Unified Perspective for Disinformation Detection and Truth Discovery in Social Sensing: A Survey. 6:1-6:33 - Massimiliano Luca, Gianni Barlacchi, Bruno Lepri, Luca Pappalardo:
A Survey on Deep Learning for Human Mobility. 7:1-7:44 - Gabriel Resende Machado, Eugênio Silva, Ronaldo Ribeiro Goldschmidt:
Adversarial Machine Learning in Image Classification: A Survey Toward the Defender's Perspective. 8:1-8:38 - Abhishek Hazra, Mainak Adhikari, Tarachand Amgoth, Satish Narayana Srirama:
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions. 9:1-9:35 - Claudio Daniel Tenorio de Barros, Matheus R. F. Mendonça, Alex Borges Vieira, Artur Ziviani:
A Survey on Embedding Dynamic Graphs. 10:1-10:37 - Viktor Rosenfeld, Sebastian Breß, Volker Markl:
Query Processing on Heterogeneous CPU/GPU Systems. 11:1-11:38 - Giannis Bekoulis, Christina Papagiannopoulou, Nikos Deligiannis:
A Review on Fact Extraction and Verification. 12:1-12:35 - Junjun Jiang, Chenyang Wang, Xianming Liu, Jiayi Ma:
Deep Learning-based Face Super-resolution: A Survey. 13:1-13:36 - Wenbo Ge, Pooia Lalbakhsh, Leigh Isai, Artem Lenskiy, Hanna Suominen:
Neural Network-Based Financial Volatility Forecasting: A Systematic Review. 14:1-14:30 - Deqiang Li, Qianmu Li, Yanfang (Fanny) Ye, Shouhuai Xu:
Arms Race in Adversarial Malware Detection: A Survey. 15:1-15:35 - Roberto Amadini:
A Survey on String Constraint Solving. 16:1-16:38 - Christopher Brant, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira:
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking. 17:1-17:33 - Alison Fernandez-Blanco, Alexandre Bergel, Juan Pablo Sandoval Alcocer:
Software Visualizations to Analyze Memory Consumption: A Literature Review. 18:1-18:34 - Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. 19:1-19:41 - Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, Keqin Li:
Artificial Intelligence Security: Threats and Countermeasures. 20:1-20:36 - Alessio Rugo, Claudio A. Ardagna, Nabil El Ioini:
A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis. 21:1-21:35 - Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. 22:1-22:51 - Thanh Tuan Nguyen, Thanh Phuong Nguyen:
A Comprehensive Taxonomy of Dynamic Texture Representation. 23:1-23:39
Volume 55, Number 2, March 2023
- Federico Ciccozzi, Lorenzo Addazi, Sara Abbaspour Asadollah, Björn Lisper, Abu Naser Masud, Saad Mubeen:
A Comprehensive Exploration of Languages for Parallel Computing. 24:1-24:39 - Zhao-Rong Lai, Haisheng Yang:
A Survey on Gaps between Mean-Variance Approach and Exponential Growth Rate Approach for Portfolio Optimization. 25:1-25:36 - Ananya B. Sai, Akash Kumar Mohankumar, Mitesh M. Khapra:
A Survey of Evaluation Metrics Used for NLG Systems. 26:1-26:39 - Manzoor Ahmed Khan, Hesham El-Sayed, Sumbal Malik, Muhammad Talha Zia, Muhammad Jalal Khan, Najla Alkaabi, Henry Alexander Ignatious:
Level-5 Autonomous Driving - Are We There Yet? A Review of Research Literature. 27:1-27:38 - Oluwamayowa Ade Adeleke, Nicholas Bastin, Deniz Gurkan:
Network Traffic Generation: A Survey and Methodology. 28:1-28:23 - Breno G. S. Costa, João Bachiega Jr., Leonardo Rebouças de Carvalho, Aletéia P. F. Araújo:
Orchestration in Fog Computing: A Comprehensive Survey. 29:1-29:34 - Nuha Aldausari, Arcot Sowmya, Nadine Marcus, Gelareh Mohammadi:
Video Generative Adversarial Networks: A Review. 30:1-30:25 - Libing Deng, Guoqi Xie, Hong Liu, Yunbo Han, Renfa Li, Keqin Li:
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN. 31:1-31:36 - Omar Hasan, Lionel Brunie, Elisa Bertino:
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. 32:1-32:37 - Tabinda Sarwar, Sattar Seifollahi, Jeffrey Chan, Xiuzhen Zhang, Vural Aksakalli, Irene Lena Hudson, Karin Verspoor, Lawrence Cavedon:
The Secondary Use of Electronic Health Records for Data Mining: Data Characteristics and Challenges. 33:1-33:40 - Claudio Filipi Gonçalves dos Santos, Diego de Souza Oliveira, Leandro A. Passos, Rafael Gonçalves Pires, Daniel Felipe Silva Santos, Lucas Pascotti Valem, Thierry Pinheiro Moreira, Marcos Cleison S. Santana, Mateus Roder, João Paulo Papa, Danilo Colombo:
Gait Recognition Based on Deep Learning: A Survey. 34:1-34:34 - Qiao Jin, Zheng Yuan, Guangzhi Xiong, Qianlan Yu, Huaiyuan Ying, Chuanqi Tan, Mosha Chen, Songfang Huang, Xiaozhong Liu, Sheng Yu:
Biomedical Question Answering: A Survey of Approaches and Challenges. 35:1-35:36 - Yiqun Xie, Shashi Shekhar, Yan Li:
Statistically-Robust Clustering Techniques for Mapping Spatial Hotspots: A Survey. 36:1-36:38 - José Alemany, Elena del Val, Ana García-Fornes:
A Review of Privacy Decision-making Mechanisms in Online Social Networks. 37:1-37:32 - Jingya Zhou, Ling Liu, Wenqi Wei, Jianxi Fan:
Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding. 38:1-38:35 - Davinder Kaur, Suleyman Uslu, Kaley J. Rittichier, Arjan Durresi:
Trustworthy Artificial Intelligence: A Review. 39:1-39:38 - Conor Fahy, Shengxiang Yang, Mario Gongora:
Scarcity of Labels in Non-Stationary Data Streams: A Survey. 40:1-40:39 - José Marcelo Fernandes, Jorge Sá Silva, André Rodrigues, Fernando Boavida:
A Survey of Approaches to Unobtrusive Sensing of Humans. 41:1-41:28 - David Rolnick, Priya L. Donti, Lynn H. Kaack, Kelly Kochanski, Alexandre Lacoste, Kris Sankaran, Andrew Slavin Ross, Nikola Milojevic-Dupont, Natasha Jaques, Anna Waldman-Brown, Alexandra Sasha Luccioni, Tegan Maharaj, Evan D. Sherwin, S. Karthik Mukkavilli, Konrad P. Kording, Carla P. Gomes, Andrew Y. Ng, Demis Hassabis, John C. Platt, Felix Creutzig, Jennifer T. Chayes, Yoshua Bengio:
Tackling Climate Change with Machine Learning. 42:1-42:96 - Shallu Sharma, Pravat Kumar Mandal:
A Comprehensive Report on Machine Learning-based Early Detection of Alzheimer's Disease using Multi-modal Neuroimaging Data. 43:1-43:44 - Ankur O. Bang, Udai Pratap Rao, Pallavi Kaliyar, Mauro Conti:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. 44:1-44:36
Volume 55, Number 3, April 2023
- Sanjay Kumar Anand, Suresh Kumar:
Experimental Comparisons of Clustering Approaches for Data Representation. 45:1-45:33 - Tasniem Nasser Al-Yahya, Mohamed El Bachir Menai, Hassan Mathkour:
On the Structure of the Boolean Satisfiability Problem: A Survey. 46:1-46:34 - Marcos Roberto e Souza, Helena de Almeida Maia, Hélio Pedrini:
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges. 47:1-47:37 - Tukaram Muske, Alexander Serebrenik:
Survey of Approaches for Postprocessing of Static Analysis Alarms. 48:1-48:39 - Danula Hettiachchi, Vassilis Kostakos, Jorge Gonçalves:
A Survey on Task Assignment in Crowdsourcing. 49:1-49:35 - Raj Mohan Singh, Lalit Kumar Awasthi, Geeta Sikka:
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review. 50:1-50:43 - Dana Pessach, Erez Shmueli:
A Review on Fairness in Machine Learning. 51:1-51:44 - Chenning Li, Zhichao Cao:
LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey. 52:1-52:36 - Alexander Plopski, Teresa Hirzle, Nahal Norouzi, Long Qian, Gerd Bruder, Tobias Langlotz:
The Eye in Extended Reality: A Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality. 53:1-53:39 - Nan Wu, Yuan Xie:
A Survey of Machine Learning for Computer Architecture and Systems. 54:1-54:39 - Thomas Reisinger, Isabel Wagner, Eerke A. Boiten:
Security and Privacy in Unified Communication. 55:1-55:36 - Ruiqi Li, Xiang Zhao, Marie-Francine Moens:
A Brief Overview of Universal Sentence Representation Methods: A Linguistic View. 56:1-56:42 - Huan Li, Hua Lu, Christian S. Jensen, Bo Tang, Muhammad Aamir Cheema:
Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects. 57:1-57:41 - Dina G. Mahmoud, Vincent Lenders, Mirjana Stojilovic:
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era. 58:1-58:40 - Jacopo Soldani, Antonio Brogi:
Anomaly Detection and Failure Root Cause Analysis in (Micro) Service-Based Cloud Applications: A Survey. 59:1-59:39 - Dinh C. Nguyen, Quoc-Viet Pham, Pubudu N. Pathirana, Ming Ding, Aruna Seneviratne, Zihuai Lin, Octavia A. Dobre, Won-Joo Hwang:
Federated Learning for Smart Healthcare: A Survey. 60:1-60:37 - Anna Berenberg, Brad Calder:
Deployment Archetypes for Cloud Applications. 61:1-61:48 - Voica Gavrilut, Aleksander Pruski, Michael Stübert Berger:
Constructive or Optimized: An Overview of Strategies to Design Networks for Time-Critical Applications. 62:1-62:35 - Susanne Barth, Dan Ionita, Pieter H. Hartel:
Understanding Online Privacy - A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. 63:1-63:37 - Longbing Cao:
AI in Finance: Challenges, Techniques, and Opportunities. 64:1-64:38
Volume 55, Number 4, May 2023
- Gianni Brauwers, Flavius Frasincar:
A Survey on Aspect-Based Sentiment Classification. 65:1-65:37 - Jared Willard, Xiaowei Jia, Shaoming Xu, Michael S. Steinbach, Vipin Kumar:
Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems. 66:1-66:37 - Daniel Soares Santos, Brauner R. N. Oliveira, Rick Kazman, Elisa Yumi Nakagawa:
Evaluation of Systems-of-Systems Software Architectures: State of the Art and Future Perspectives. 67:1-67:35 - Thiago L. T. da Silveira, Paulo G. L. Pinto, Jeffri Murrugarra-Llerena, Cláudio R. Jung:
3D Scene Geometry Estimation from 360° Imagery: A Survey. 68:1-68:39 - Alessio Ferrari, Maurice H. ter Beek:
Formal Methods in Railways: A Systematic Mapping Study. 69:1-69:37 - Youyang Qu, Md. Palash Uddin, Chenquan Gan, Yong Xiang, Longxiang Gao, John Yearwood:
Blockchain-enabled Federated Learning: A Survey. 70:1-70:35 - Marios Evangelos Kanakis, Ramin Khalili, Lin Wang:
Machine Learning for Computer Systems and Networking: A Survey. 71:1-71:36 - Javier Troya, Sergio Segura, Lola Burgueño, Manuel Wimmer:
Model Transformation Testing and Debugging: A Survey. 72:1-72:39 - Arif Husen, Muhammad Hasanain Chaudary, Farooq Ahmad:
A Survey on Requirements of Future Intelligent Networks: Solutions and Future Research Directions. 73:1-73:61 - Yingan Cui, Xue Li, Junhuai Li, Huaijun Wang, Xiaogang Chen:
A Survey of Sampling Method for Social Media Embeddedness Relationship. 74:1-74:39 - Heitor Murilo Gomes, Maciej Grzenda, Rodrigo Fernandes de Mello, Jesse Read, Minh-Huong Le Nguyen, Albert Bifet:
A Survey on Semi-supervised Learning for Delayed Partially Labelled Data Streams. 75:1-75:42 - Shouyong Jiang, Juan Zou, Shengxiang Yang, Xin Yao:
Evolutionary Dynamic Multi-objective Optimisation: A Survey. 76:1-76:47 - Rabindra Lamsal, Aaron Harwood, Maria Rodriguez Read:
Socially Enhanced Situation Awareness from Microblogs Using Artificial Intelligence: A Survey. 77:1-77:38 - Krishna Teja Chitty-Venkata, Arun K. Somani:
Neural Architecture Search Survey: A Hardware Perspective. 78:1-78:36 - Xiang Li, Yazhou Zhang, Prayag Tiwari, Dawei Song, Bin Hu, Meihong Yang, Zhigang Zhao, Neeraj Kumar, Pekka Marttinen:
EEG Based Emotion Recognition: A Tutorial and Review. 79:1-79:57 - Wu Liu, Qian Bao, Yu Sun, Tao Mei:
Recent Advances of Monocular 2D and 3D Human Pose Estimation: A Deep Learning Perspective. 80:1-80:41 - Zhaoxin Fan, Yazhi Zhu, Yulin He, Qi Sun, Hongyan Liu, Jun He:
Deep Learning on Monocular Object Pose Detection and Tracking: A Comprehensive Overview. 81:1-81:40 - Matthew J. Vowels, Necati Cihan Camgöz, Richard Bowden:
D'ya Like DAGs? A Survey on Structure Learning and Causal Discovery. 82:1-82:36 - Giorgos Armeniakos, Georgios Zervakis, Dimitrios Soudris, Jörg Henkel:
Hardware Approximate Techniques for Deep Neural Network Accelerators: A Survey. 83:1-83:36 - Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu:
A Survey on Voice Assistant Security: Attacks and Countermeasures. 84:1-84:36 - Elena Almaraz Luengo:
Gamma Pseudo Random Number Generators. 85:1-85:33 - Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
A Survey on Fault Attacks on Symmetric Key Cryptosystems. 86:1-86:34
Volume 55, Number 5, June 2023
- Kalia Orphanou, Jahna Otterbacher, Styliani Kleanthous, Khuyagbaatar Batsuren, Fausto Giunchiglia, Veronika Bogina, Avital Shulner-Tal, Alan Hartman, Tsvi Kuflik:
Mitigating Bias in Algorithmic Systems - A Fish-eye View. 87:1-87:37 - Jiang Xiao, Huichuwu Li, Minrui Wu, Hai Jin, M. Jamal Deen, Jiannong Cao:
A Survey on Wireless Device-free Human Sensing: Application Scenarios, Current Solutions, and Open Issues. 88:1-88:35 - Yuan He, Xiuzhen Guo, Xiaolong Zheng, Zihao Yu, Jia Zhang, Haotian Jiang, Xin Na, Jiacheng Zhang:
Cross-Technology Communication for the Internet of Things: A Survey. 89:1-89:29 - Yoshitomo Matsubara, Marco Levorato, Francesco Restuccia:
Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges. 90:1-90:30 - Quim Motger, Xavier Franch, Jordi Marco:
Software-Based Dialogue Systems: Survey, Taxonomy, and Challenges. 91:1-91:42 - George A. Vouros:
Explainable Deep Reinforcement Learning: State of the Art and Challenges. 92:1-92:39 - Bushra Alhijawi, Arafat Awajan, Salam Fraihat:
Survey on the Objectives of Recommender Systems: Measures, Solutions, Evaluation Methodology, and New Perspectives. 93:1-93:38 - Amina Kammoun, Rim Slama, Hedi Tabia, Tarek Ouni, Mohamed Abid:
Generative Adversarial Networks for Face Generation: A Survey. 94:1-94:37 - Amir-Hossein Karimi, Gilles Barthe, Bernhard Schölkopf, Isabel Valera:
A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations. 95:1-95:29 - Manal AlAmir, Manal Al Ghamdi:
The Role of Generative Adversarial Network in Medical Image Analysis: An In-depth Survey. 96:1-96:36 - Shiwen Wu, Fei Sun, Wentao Zhang, Xu Xie, Bin Cui:
Graph Neural Networks in Recommender Systems: A Survey. 97:1-97:37 - Fabio Valerio Massoli, Lucia Vadicamo, Giuseppe Amato, Fabrizio Falchi:
A Leap among Quantum Computing and Quantum Neural Networks: A Survey. 98:1-98:37 - Pedro Cruz, Nadjib Achir, Aline Carneiro Viana:
On the Edge of the Deployment: A Survey on Multi-access Edge Computing. 99:1-99:34 - Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization. 100:1-100:39 - Darren Yates, Md Zahidul Islam:
Data Mining on Smartphones: An Introduction and Survey. 101:1-101:38 - Congbo Ma, Wei Emma Zhang, Mingyu Guo, Hu Wang, Quan Z. Sheng:
Multi-document Summarization via Deep Learning Techniques: A Survey. 102:1-102:37 - Julia El Zini, Mariette Awad:
On the Explainability of Natural Language Processing Deep Models. 103:1-103:31 - Hansoo Lee, Joonyoung Park, Uichin Lee:
A Systematic Survey on Android API Usage for Data-driven Analytics with Smartphones. 104:1-104:38 - Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic:
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. 105:1-105:37 - Emanuele Del Sozzo, Davide Conficconi, Alberto Zeni, Mirko Salaris, Donatella Sciuto, Marco D. Santambrogio:
Pushing the Level of Abstraction of Digital System Design: A Survey on How to Program FPGAs. 106:1-106:48 - Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dan Dongseong Kim:
A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights. 107:1-107:37 - Trivikram Muralidharan, Aviad Cohen, Noa Gerson, Nir Nissim:
File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements. 108:1-108:45
Volume 55, Number 6, July 2023
- Yi Tay, Mostafa Dehghani, Dara Bahri, Donald Metzler:
Efficient Transformers: A Survey. 109:1-109:28 - Mahdi Fahmideh, John C. Grundy, Aakash Ahmad, Jun Shen, Jun Yan, Davoud Mougouei, Peng Wang, Aditya Ghose, Anuradha Gunawardana, Uwe Aickelin, Babak Abedin:
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions. 110:1-110:44 - Binglei Guo, Jiong Yu, Dexian Yang, Hongyong Leng, Bin Liao:
Energy-Efficient Database Systems: A Systematic Survey. 111:1-111:53 - Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka:
Survey and Taxonomy of Adversarial Reconnaissance Techniques. 112:1-112:38 - Dan Xia, Chun Jiang, Jiafu Wan, Jiong Jin, Victor C. M. Leung, Miguel Martínez-García:
Heterogeneous Network Access and Fusion in Smart Factory: A Survey. 113:1-113:31 - Andrei Paleyes, Raoul-Gabriel Urma, Neil D. Lawrence:
Challenges in Deploying Machine Learning: A Survey of Case Studies. 114:1-114:29 - Guilherme Gonçalves, Hugo Coelho, Pedro Monteiro, Miguel Melo, Maximino Bessa:
Systematic Review of Comparative Studies of the Impact of Realism in Immersive Virtual Experiences. 115:1-115:36 - Alexander Schäfer, Gerd Reis, Didier Stricker:
A Survey on Synchronous Augmented, Virtual, andMixed Reality Remote Collaboration Systems. 116:1-116:27 - Meike Zehlike, Ke Yang, Julia Stoyanovich:
Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems. 117:1-117:41 - Meike Zehlike, Ke Yang, Julia Stoyanovich:
Fairness in Ranking, Part I: Score-Based Ranking. 118:1-118:36 - Hakan Erdogmus:
Bayesian Hypothesis Testing Illustrated: An Introduction for Software Engineering Researchers. 119:1-119:28 - Luke K. Topham, Wasiq Khan, Dhiya Al-Jumeily, Abir Hussain:
Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models. 120:1-120:42 - Konstantinos Benidis, Syama Sundar Rangapuram, Valentin Flunkert, Yuyang Wang, Danielle C. Maddix, Ali Caner Türkmen, Jan Gasthaus, Michael Bohlke-Schneider, David Salinas, Lorenzo Stella, François-Xavier Aubet, Laurent Callot, Tim Januschowski:
Deep Learning for Time Series Forecasting: Tutorial and Literature Survey. 121:1-121:36 - Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss:
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis. 122:1-122:31 - Simon Parkinson, Saad Khan:
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective. 123:1-123:28 - Samuel Jero, Nathan Burow, Bryan C. Ward, Richard Skowyra, Roger Khazan, Howard E. Shrobe, Hamed Okhravi:
TAG: Tagged Architecture Guide. 124:1-124:34 - Rodrigo Branco, Ben Lee:
Cache-related Hardware Capabilities and Their Impact on Information Security. 125:1-125:35 - Temitayo A. Olugbade, Marta Bienkiewicz, Giulia Barbareschi, Vincenzo Stefano D'Amato, Luca Oneto, Antonio Camurri, Catherine Holloway, Mårten Björkman, Peter E. Keller, Martin Clayton, Amanda C. de C. Williams, Nicolas Gold, Cristina Becchio, Benoît G. Bardy, Nadia Bianchi-Berthouze:
Human Movement Datasets: An Interdisciplinary Scoping Review. 126:1-126:29 - Johan Arcile, Étienne André:
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice. 127:1-127:36 - Lu Chen, Yunjun Gao, Xuan Song, Zheng Li, Yifan Zhu, Xiaoye Miao, Christian S. Jensen:
Indexing Metric Spaces for Exact Similarity Search. 128:1-128:39 - Kimiya Keyvan, Jimmy Xiangji Huang:
How to Approach Ambiguous Queries in Conversational Search: A Survey of Techniques, Approaches, Tools, and Challenges. 129:1-129:40 - Denis Kleyko, Dmitri A. Rachkovskij, Evgeny Osipov, Abbas Rahimi:
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part I: Models and Data Transformations. 130:1-130:40
Volume 55, Number 7, July 2023
- Lucas Henna Sallaberry, Romero Tori, Fátima L. S. Nunes:
Automatic Performance Assessment in Three-dimensional Interactive Haptic Medical Simulators: A Systematic Review. 131:1-131:35 - Siva Uday Sampreeth Chebolu, Paolo Rosso, Sudipta Kar, Thamar Solorio:
Survey on Aspect Category Detection. 132:1-132:37 - Deepak Adhikari, Wei Jiang, Jinyu Zhan, Zhiyuan He, Danda B. Rawat, Uwe Aickelin, Hadi Akbarzade Khorshidi:
A Comprehensive Survey on Imputation of Missing Data in Internet of Things. 133:1-133:38 - Zhibo Wang, Jingjing Ma, Xue Wang, Jiahui Hu, Zhan Qin, Kui Ren:
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. 134:1-134:36 - Michael Zipperle, Florian Gottwalt, Elizabeth Chang, Tharam S. Dillon:
Provenance-based Intrusion Detection Systems: A Survey. 135:1-135:36 - Rong Han, Zheng Yan, Xueqin Liang, Laurence T. Yang:
How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey. 136:1-136:38 - Joobeom Yun, Rustamov Fayozbek, Juhwan Kim, Youngjoo Shin:
Fuzzing of Embedded Systems: A Survey. 137:1-137:33 - Carmen Carrión:
Kubernetes Scheduling: Taxonomy, Ongoing Issues and Challenges. 138:1-138:37 - Ahmed Benmoussa, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Spyridon Mastorakis, Abderrahmane Lakas, Abdou El Karim Tahari:
Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions. 139:1-139:37 - Andreas L. Opdahl, Tareq Al-Moslmi, Duc-Tien Dang-Nguyen, Marc Gallofré Ocaña, Bjørnar Tessem, Csaba Veres:
Semantic Knowledge Graphs for the News: A Review. 140:1-140:38 - Yudong Tao, Chuang Yang, Tianyi Wang, Erik Coltey, Yanxiu Jin, Yinghao Liu, Renhe Jiang, Zipei Fan, Xuan Song, Ryosuke Shibasaki, Shu-Ching Chen, Mei-Ling Shyu, Steven Luis:
A Survey on Data-driven COVID-19 and Future Pandemic Management. 141:1-141:36 - Hoda Naghibijouybari, Esmaeil Mohammadian Koruyeh, Nael B. Abu-Ghazaleh:
Microarchitectural Attacks in Heterogeneous Systems: A Survey. 142:1-142:40 - Zhanna Sarsenbayeva, Niels van Berkel, Eduardo Velloso, Jorge Gonçalves, Vassilis Kostakos:
Methodological Standards in Accessibility Research-PLXBCCR- on Motor Impairments: A Survey. 143:1-143:35 - Samuel Idowu, Daniel Strüber, Thorsten Berger:
Asset Management in Machine Learning: State-of-research and State-of-practice. 144:1-144:35 - Mohammad Mehdi Afsar, Trafford Crump, Behrouz H. Far:
Reinforcement Learning based Recommender Systems: A Survey. 145:1-145:38 - Markus Bayer, Marc-André Kaufhold, Christian Reuter:
A Survey on Data Augmentation for Text Classification. 146:1-146:39 - Jon Pérez-Cerrolaza, Jaume Abella, Leonidas Kosmidis, Alejandro J. Calderón, Francisco J. Cazorla, Jose Luis Flores:
GPU Devices for Safety-Critical Systems: A Survey. 147:1-147:37 - Tung Minh Tran, Tu N. Vu, Nguyen D. Vo, Tam V. Nguyen, Khang Nguyen:
Anomaly Analysis in Images and Videos: A Comprehensive Review. 148:1-148:37 - Li Liu, Fanzhang Li:
A Survey on Dynamic Fuzzy Machine Learning. 149:1-149:42 - William C. Sleeman, Rishabh Kapoor, Preetam Ghosh:
Multimodal Classification: Current Landscape, Taxonomy and Future Directions. 150:1-150:31 - Zeineb Rejiba, Javad Chamanara:
Custom Scheduling in Kubernetes: A Survey on Common Problems and Solution Approaches. 151:1-151:37 - Mohammad Goudarzi, Marimuthu Palaniswami, Rajkumar Buyya:
Scheduling IoT Applications in Edge and Fog Computing Environments: A Taxonomy and Future Directions. 152:1-152:41
Volume 55, Number 8, August 2023
- Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu:
Deep Learning for Android Malware Defenses: A Systematic Literature Review. 153:1-153:36 - Huan Yee Koh, Jiaxin Ju, Ming Liu, Shirui Pan:
An Empirical Survey on Long Document Summarization: Datasets, Models, and Metrics. 154:1-154:35 - Andreas Madsen, Siva Reddy, Sarath Chandar:
Post-hoc Interpretability for Neural NLP: A Survey. 155:1-155:42 - Henry Weld, Xiaoqi Huang, Siqu Long, Josiah Poon, Soyeon Caren Han:
A Survey of Joint Intent Detection and Slot Filling Models in Natural Language Understanding. 156:1-156:38 - Sina Mohseni, Haotao Wang, Chaowei Xiao, Zhiding Yu, Zhangyang Wang, Jay Yadawa:
Taxonomy of Machine Learning Safety: A Survey and Primer. 157:1-157:38 - Nishan Gunawardena, Jeewani Anupama Ginige, Bahman Javadi:
Eye-tracking Technologies in Mobile Devices Using Edge Computing: A Systematic Review. 158:1-158:33 - Tariq Abdullah, Ahmed Ahmet:
Deep Learning in Sentiment Analysis: Recent Architectures. 159:1-159:37 - Alberto Blanco-Justicia, David Sánchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar:
A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning. 160:1-160:16 - Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou:
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks. 161:1-161:35 - Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman:
A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques. 162:1-162:28 - Shuai Zhou, Chi Liu, Dayong Ye, Tianqing Zhu, Wanlei Zhou, Philip S. Yu:
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity. 163:1-163:39 - Manuel A. Serrano, José A. Cruz-Lemus, Ricardo Pérez-Castillo, Mario Piattini:
Quantum Software Components and Platforms: Overview and Quality Assessment. 164:1-164:31 - Divya Velayudhan, Taimur Hassan, Ernesto Damiani, Naoufel Werghi:
Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey. 165:1-165:38 - Zhiyi Tian, Lei Cui, Jie Liang, Shui Yu:
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning. 166:1-166:35 - Michael P. Heinl, Simon Gölz, Christoph Bösch:
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey. 167:1-167:44 - Sarah Roscoe, Minal Khatri, Adam Voshall, Surinder Batra, Sukhwinder Kaur, Jitender S. Deogun:
Formal Concept Analysis Applications in Bioinformatics. 168:1-168:40 - Nilesh Chakraborty, Jianqiang Li, Victor C. M. Leung, Samrat Mondal, Yi Pan, Chengwen Luo, Mithun Mukherjee:
Honeyword-based Authentication Techniques for Protecting Passwords: A Survey. 169:1-169:37 - Eva Zangerle, Christine Bauer:
Evaluating Recommender Systems: Survey and Framework. 170:1-170:38 - André Luís Barroso Almeida, Joubert de Castro Lima, Marco Antonio Moreira de Carvalho:
Systematic Literature Review on Parallel Trajectory-based Metaheuristics. 171:1-171:34 - Tianbao Yang, Yiming Ying:
AUC Maximization in the Era of Big Data and AI: A Survey. 172:1-172:37 - Chenhe Dong, Yinghui Li, Haifan Gong, Miaoxin Chen, Junxin Li, Ying Shen, Min Yang:
A Survey of Natural Language Generation. 173:1-173:38 - Linghe Kong, Jinlin Tan, Junqin Huang, Guihai Chen, Shuaitian Wang, Xi Jin, Peng Zeng, Muhammad Khurram Khan, Sajal K. Das:
Edge-computing-driven Internet of Things: A Survey. 174:1-174:41
Volume 55, Number 9, September 2023
- Denis Kleyko, Dmitri A. Rachkovskij, Evgeny Osipov, Abbas Rahimi:
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges. 175:1-175:52 - Daniel McDuff:
Camera Measurement of Physiological Vital Signs. 176:1-176:40 - Bo Li, Peng Qi, Bo Liu, Shuai Di, Jingen Liu, Jiquan Pei, Jinfeng Yi, Bowen Zhou:
Trustworthy AI: From Principles to Practices. 177:1-177:46 - Luca Benedetto, Paolo Cremonesi, Andrew Caines, Paula Buttery, Andrea Cappelli, Andrea Giussani, Roberto Turrin:
A Survey on Recent Approaches to Question Difficulty Estimation from Text. 178:1-178:37 - Kai North, Marcos Zampieri, Matthew Shardlow:
Lexical Complexity Prediction: An Overview. 179:1-179:42 - Nandita Pattnaik, Shujun Li, Jason R. C. Nurse:
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. 180:1-180:38 - Eun Hee Park, Veda C. Storey:
Emotion Ontology Studies: A Framework for Expressing Feelings Digitally and its Application to Sentiment Analysis. 181:1-181:38 - Lidia Fotia, Flávia Coimbra Delicato, Giancarlo Fortino:
Trust in Edge-based Internet of Things Architectures: State of the Art and Research Challenges. 182:1-182:34 - Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. 183:1-183:36 - Haochen Hua, Yutong Li, Tonghe Wang, Nanqing Dong, Wei Li, Junwei Cao:
Edge Computing with Artificial Intelligence: A Machine Learning Perspective. 184:1-184:35 - Takahito Yoshizawa, Dave Singelée, Jan Tobias Mühlberg, Stéphane Delbruel, Amir Taherkordi, Danny Hughes, Bart Preneel:
A Survey of Security and Privacy Issues in V2X Communication Systems. 185:1-185:36 - Athanasios Liatifis, Panagiotis G. Sarigiannidis, Vasileios Argyriou, Thomas Lagkas:
Advancing SDN from OpenFlow to P4: A Survey. 186:1-186:37 - Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Luca Piras:
Android Source Code Vulnerability Detection: A Systematic Literature Review. 187:1-187:37 - Meng Liu, Liqiang Nie, Yunxiao Wang, Meng Wang, Yong Rui:
A Survey on Video Moment Localization. 188:1-188:37 - Jacky Cao, Kit-Yung Lam, Lik-Hang Lee, Xiaoli Liu, Pan Hui, Xiang Su:
Mobile Augmented Reality: User Interfaces, Frameworks, and Intelligence. 189:1-189:36 - Junsik Sim, Beomjoong Kim, Kiseok Jeon, Moonho Joo, Jihun Lim, Junghee Lee, Kim-Kwang Raymond Choo:
Technical Requirements and Approaches in Personal Data Control. 190:1-190:30 - Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Nasrin Sohrabi, Zahir Tari:
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. 191:1-191:43 - Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. 192:1-192:38 - Junhai Luo, Zhiyan Wang, Ming Xia, Linyong Wu, Yuxin Tian, Yu Chen:
Path Planning for UAV Communication Networks: Related Technologies, Solutions, and Opportunities. 193:1-193:37 - Rudresh Dwivedi, Devam Dave, Het Naik, Smiti Singhal, Omer F. Rana, Pankesh Patel, Bin Qian, Zhenyu Wen, Tejal Shah, Graham Morgan, Rajiv Ranjan:
Explainable AI (XAI): Core Ideas, Techniques, and Solutions. 194:1-194:33 - Pengfei Liu, Weizhe Yuan, Jinlan Fu, Zhengbao Jiang, Hiroaki Hayashi, Graham Neubig:
Pre-train, Prompt, and Predict: A Systematic Survey of Prompting Methods in Natural Language Processing. 195:1-195:35 - Ping Wang, Haichang Gao, Xiaoyan Guo, Chenxuan Xiao, Fuqi Qi, Zheng Yan:
An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. 196:1-196:38
Volume 55, Number 10, October 2023
- Anna Rogers, Matt Gardner, Isabelle Augenstein:
QA Dataset Explosion: A Taxonomy of NLP Resources for Question Answering and Reading Comprehension. 197:1-197:45 - Giacomo Chiarot, Claudio Silvestri:
Time Series Compression Survey. 198:1-198:32 - Eoin Brophy, Zhengwei Wang, Qi She, Tomás Ward:
Generative Adversarial Networks in Time Series: A Systematic Literature Review. 199:1-199:31 - Fath U Min Ullah, Mohammad S. Obaidat, Amin Ullah, Khan Muhammad, Mohammad Hijji, Sung Wook Baik:
A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos. 200:1-200:44 - Yunhua Zhao, Kostadin Damevski, Hui Chen:
A Systematic Survey of Just-in-Time Software Defect Prediction. 201:1-201:35 - Antonio Quiña-Mera, Pablo Fernandez, José María García, Antonio Ruiz-Cortés:
GraphQL: A Systematic Mapping Study. 202:1-202:35 - Nils Rethmeier, Isabelle Augenstein:
A Primer on Contrastive Pretraining in Language Processing: Methods, Lessons Learned, and Perspectives. 203:1-203:17 - Iyyakutti Iyappan Ganapathi, Syed Sadaf Ali, Surya Prakash, Ngoc-Son Vu, Naoufel Werghi:
A Survey of 3D Ear Recognition Techniques. 204:1-204:36 - Jitendra Parmar, Satyendra Singh Chouhan, Vaskar Raychoudhury, Santosh Singh Rathore:
Open-world Machine Learning: Applications, Challenges, and Opportunities. 205:1-205:37 - Rami Ibrahim, M. Omair Shafiq:
Explainable Convolutional Neural Networks: A Taxonomy, Review, and Future Directions. 206:1-206:37 - Ling Sun, Yuan Rao, Lianwei Wu, Xiangbo Zhang, Yuqian Lan, Ambreen Nazir:
Fighting False Information from Propagation Process: A Survey. 207:1-207:38 - Amirmohammad Pasdar, Young Choon Lee, Zhongli Dong:
Connect API with Blockchain: A Survey on Blockchain Oracle Implementation. 208:1-208:39 - Fabio Catania, Micol Spitale, Franca Garzotto:
Conversational Agents in Therapeutic Interventions for Neurodevelopmental Disorders: A Survey. 209:1-209:34 - Laure Gonnord, Ludovic Henrio, Lionel Morel, Gabriel Radanne:
A Survey on Parallelism and Determinism. 210:1-210:28 - Fatai Sado, Chu Kiong Loo, Wei Shiung Liew, Matthias Kerzel, Stefan Wermter:
Explainable Goal-driven Agents and Robots - A Comprehensive Review. 211:1-211:41 - Jou-An Chen, Wei Niu, Bin Ren, Yanzhi Wang, Xipeng Shen:
Survey: Exploiting Data Redundancy for Optimization of Deep Learning. 212:1-212:38 - Luke Antonyshyn, Jefferson Silveira, Sidney Givigi, Joshua A. Marshall:
Multiple Mobile Robot Task and Motion Planning: A Survey. 213:1-213:35 - Tainã Ribeiro de Oliveira, Brenda Biancardi Rodrigues, Matheus Moura da Silva, Rafael Antonio N. Spinassé, Gabriel Giesen Ludke, Mateus Ruy Soares Gaudio, Guilherme Iglesias Rocha Gomes, Luan Guio Cotini, Daniel Vargens, Marcelo Queiroz Schimidt, Rodrigo Varejão Andreão, Mário Mestria:
Virtual Reality Solutions Employing Artificial Intelligence Methods: A Systematic Literature Review. 214:1-214:29 - Muhammad Nouman Nafees, Neetesh Saxena, Alvaro A. Cárdenas, Santiago Grijalva, Pete Burnap:
Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review. 215:1-215:36 - Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic:
The Side-channel Metrics Cheat Sheet. 216:1-216:38 - Elyssa Boulila, Marc Dacier:
WPAD: Waiting Patiently for an Announced Disaster. 217:1-217:29 - Gongsheng Yuan, Jiaheng Lu, Zhengtong Yan, Sai Wu:
A Survey on Mapping Semi-Structured Data and Graph Data to Relational Data. 218:1-218:38
Volume 55, Number 11, November 2023
- Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis:
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey. 219:1-219:39 - Luca Di Grazia, Michael Pradel:
Code Search: A Survey of Techniques for Finding Code. 220:1-220:31 - Roberto Viola, Ángel Martín, Mikel Zorrilla, Jon Montalbán, Pablo Angueira, Gabriel-Miro Muntean:
A Survey on Virtual Network Functions for Media Streaming: Solutions and Future Challenges. 221:1-221:37 - José María Jorquera Valero, Pedro Miguel Sánchez Sánchez, Manuel Gil Pérez, Alberto Huertas Celdrán, Gregorio Martínez Pérez:
Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges. 222:1-222:36 - Priyankar Choudhary, Neeraj Goel, Mukesh Saini:
A Survey on Seismic Sensor based Target Detection, Localization, Identification, and Activity Recognition. 223:1-223:36 - Ghodai Abdelrahman, Qing Wang, Bernardo Pereira Nunes:
Knowledge Tracing: A Survey. 224:1-224:37 - Jonas Dann, Daniel Ritter, Holger Fröning:
Non-relational Databases on FPGAs: Survey, Design Decisions, Challenges. 225:1-225:37 - Yang Li, Michael Purcell, Thierry Rakotoarivelo, David Smith, Thilina Ranbaduge, Kee Siong Ng:
Private Graph Data Release: A Survey. 226:1-226:39 - Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. 227:1-227:35 - Michael Seifert, Stephan Kuehnel, Stefan Sackmann:
Hybrid Clouds Arising from Software as a Service Adoption: Challenges, Solutions, and Future Research Directions. 228:1-228:35 - Surangika Ranathunga, En-Shiun Annie Lee, Marjana Prifti Skenduli, Ravi Shekhar, Mehreen Alam, Rishemjit Kaur:
Neural Machine Translation for Low-resource Languages: A Survey. 229:1-229:37 - Bo Huang, Mengchu Zhou, Xiaoyu Sean Lu, Abdullah Abusorrah:
Scheduling of Resource Allocation Systems with Timed Petri Nets: A Survey. 230:1-230:27 - Chen Chen, Gang Zhou, Youfang Lin:
Cross-Domain WiFi Sensing with Channel State Information: A Survey. 231:1-231:37 - Ziqiang Li, Muhammad Usman, Rentuo Tao, Pengfei Xia, Chaoyue Wang, Huanhuan Chen, Bin Li:
A Systematic Survey of Regularization and Normalization in GANs. 232:1-232:37 - Rahul Mishra, Hari Prabhat Gupta:
Transforming Large-Size to Lightweight Deep Neural Networks for IoT Applications. 233:1-233:35 - Michael R. Jones, Soufiene Djahel, Kristopher Welsh:
Path-Planning for Unmanned Aerial Vehicles with Environment Complexity Considerations: A Survey. 234:1-234:39 - Li-Hsiang Shen, Kai-Ten Feng, Lajos Hanzo:
Five Facets of 6G: Research Challenges and Opportunities. 235:1-235:39 - Christian Møldrup Legaard, Thomas Schranz, Gerald Schweiger, Ján Drgona, Basak Falay, Cláudio Gomes, Alexandros Iosifidis, Mahdi Abkar, Peter Gorm Larsen:
Constructing Neural Network Based Models for Simulating Dynamical Systems. 236:1-236:34 - Sampath Rajapaksha, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Garikayi Madzudzo, Madeline Cheah:
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey. 237:1-237:40 - Jiahua Xu, Krzysztof Paruch, Simon Cousaert, Yebo Feng:
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols. 238:1-238:50 - Pieter Hijma, Stijn Heldens, Alessio Sclocco, Ben van Werkhoven, Henri E. Bal:
Optimization Techniques for GPU Programming. 239:1-239:81 - Juncen Zhu, Jiannong Cao, Divya Saxena, Shan Jiang, Houda Ferradi:
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions. 240:1-240:31
Volume 55, Number 12, December 2023
- Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. 241:1-241:36 - Rathinaraja Jeyaraj, Anandkumar Balasubramaniam, Ajay Kumara M. A., Nadra Guizani, Anand Paul:
Resource Management in Cloud and Cloud-influenced Technologies for Internet of Things Applications. 242:1-242:37 - Nitin Rathi, Indranil Chakraborty, Adarsh Kosta, Abhronil Sengupta, Aayush Ankit, Priyadarshini Panda, Kaushik Roy:
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware. 243:1-243:49 - Jianhua Gao, Weixing Ji, Fangli Chang, Shiyu Han, Bingxin Wei, Zeming Liu, Yizhuo Wang:
A Systematic Survey of General Sparse Matrix-matrix Multiplication. 244:1-244:36 - Yun Zhang, Linwei Zhu, Gangyi Jiang, Sam Kwong, C.-C. Jay Kuo:
A Survey on Perceptually Optimized Video Coding. 245:1-245:37 - Jayashree Dey, Ratna Dutta:
Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions. 246:1-246:34 - Arash Heidari, Nima Jafari Navimipour, Mehmet Unal, Guodao Zhang:
Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues. 247:1-247:45 - Ziwei Ji, Nayeon Lee, Rita Frieske, Tiezheng Yu, Dan Su, Yan Xu, Etsuko Ishii, Yejin Bang, Andrea Madotto, Pascale Fung:
Survey of Hallucination in Natural Language Generation. 248:1-248:38 - Antonio López Martínez, Manuel Gil Pérez, Antonio Ruiz-Martínez:
A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare. 249:1-249:38 - Caesar Wu, Rui Zhang, Ramamohanarao Kotagiri, Pascal Bouvry:
Strategic Decisions: Survey, Taxonomy, and Future Directions from Artificial Intelligence Perspective. 250:1-250:30 - Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphaël C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions. 251:1-251:32 - Hans Jakob Damsgaard, Aleksandr Ometov, Jari Nurmi:
Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review. 252:1-252:49 - Ümit V. Çatalyürek, Karen D. Devine, Marcelo Fonseca Faraj, Lars Gottesbüren, Tobias Heuer, Henning Meyerhenke, Peter Sanders, Sebastian Schlag, Christian Schulz, Daniel Seemaier, Dorothea Wagner:
More Recent Advances in (Hyper)Graph Partitioning. 253:1-253:38 - Weiwei Lin, Chennian Xiong, Wentai Wu, Fang Shi, Keqin Li, Minxian Xu:
Performance Interference of Virtual Machines: A Survey. 254:1-254:37 - Kate Smith-Miles, Mario Andrés Muñoz:
Instance Space Analysis for Algorithm Testing: Methodology and Software Tools. 255:1-255:31 - Zoe Kotti, Rafaila Galanopoulou, Diomidis Spinellis:
Machine Learning for Software Engineering: A Tertiary Study. 256:1-256:39 - Tong Sha, Wei Zhang, Tong Shen, Zhoujun Li, Tao Mei:
Deep Person Generation: A Survey from the Perspective of Face, Pose, and Cloth Synthesis. 257:1-257:37 - Wei Xiang, Bang Wang:
A Survey of Implicit Discourse Relation Recognition. 258:1-258:34 - Gaurav Menghani:
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better. 259:1-259:37 - Robert Hertel, Rachid Benlamri:
Deep Learning Techniques for COVID-19 Diagnosis and Prognosis Based on Radiological Imaging. 260:1-260:39 - Qin Wang, Jiangshan Yu, Shiping Chen, Yang Xiang:
SoK: DAG-based Blockchain Systems. 261:1-261:38 - Behrouz Zolfaghari, Leila Mirsadeghi, Khodakhast Bibak, Kaveh Kavousi:
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning. 262:1-262:34
Volume 55, Number 13s, December 2023
- Xiaojie Wang, Jiameng Li, Zhaolong Ning, Qingyang Song, Lei Guo, Song Guo, Mohammad S. Obaidat:
Wireless Powered Mobile Edge Computing Networks: A Survey. 263:1-263:37 - Tanmay Garg, Sarah Masud, Tharun Suresh, Tanmoy Chakraborty:
Handling Bias in Toxic Speech Detection: A Survey. 264:1-264:32 - Washington Cunha, Felipe Viegas, Celso França, Thierson Rosa, Leonardo Rocha, Marcos André Gonçalves:
A Comparative Survey of Instance Selection Methods applied to Non-Neural and Transformer-Based Text Classification. 265:1-265:52 - Mingyu Liu, Li Pan, Shijun Liu:
Cost Optimization for Cloud Storage from User Perspectives: Recent Advances, Taxonomy, and Survey. 266:1-266:37 - Jovani Dalzochio, Rafael Kunst, Jorge Luis Victória Barbosa, Pedro Clarindo da Silva Neto, Edison Pignaton, Carla Schwengber ten Caten, Alex de Lima Teodoro da Penha:
Predictive Maintenance in the Military Domain: A Systematic Review of the Literature. 267:1-267:30 - Salma P. González-Sabbagh, Antonio Robles-Kelly:
A Survey on Underwater Computer Vision. 268:1-268:39 - Ringki Das, Thoudam Doren Singh:
Multimodal Sentiment Analysis: A Survey of Methods, Trends, and Challenges. 270:1-270:38 - Yisheng Song, Ting Wang, Puyu Cai, Subrota K. Mondal, Jyoti Prakash Sahoo:
A Comprehensive Survey of Few-shot Learning: Evolution, Applications, Challenges, and Opportunities. 271:1-271:40 - Harshala Gammulle, David Ahmedt-Aristizabal, Simon Denman, Lachlan Tychsen-Smith, Lars Petersson, Clinton Fookes:
Continuous Human Action Recognition for Human-machine Interaction: A Review. 272:1-272:38 - Haider Abbas, Naina Emmanuel, Muhammad Faisal Amjad, Tahreem Yaqoob, Mohammed Atiquzzaman, Zafar Iqbal, Narmeen Shafqat, Waleed Bin Shahid, Ali Tanveer, Umer Ashfaq:
Security Assessment and Evaluation of VPNs: A Comprehensive Survey. 273:1-273:47 - Renan Greca, Breno Miranda, Antonia Bertolino:
State of Practical Applicability of Regression Testing Research: A Live Systematic Literature Review. 274:1-274:36 - Roberto Casadei:
Macroprogramming: Concepts, State of the Art, and Opportunities of Macroscopic Behaviour Modelling. 275:1-275:37 - JunKyu Lee, Lev Mukhanov, Amir Sabbagh Molahosseini, Umar Ibrahim Minhas, Yang Hua, Jesús Martínez del Rincón, Kiril Dichev, Cheol-Ho Hong, Hans Vandierendonck:
Resource-Efficient Convolutional Networks: A Survey on Model-, Arithmetic-, and Implementation-Level Techniques. 276:1-276:36 - Étienne André, Shuang Liu, Yang Liu, Christine Choppy, Jun Sun, Jin Song Dong:
Formalizing UML State Machines for Automated Verification - A Survey. 277:1-277:47 - Jie Xu, Cong Wang, Xiaohua Jia:
A Survey of Blockchain Consensus Protocols. 278:1-278:35 - Jie Gui, Xiaofeng Cong, Yuan Cao, Wenqi Ren, Jun Zhang, Jing Zhang, Jiuxin Cao, Dacheng Tao:
A Comprehensive Survey and Taxonomy on Single Image Dehazing Based on Deep Learning. 279:1-279:37 - Tiago Veiga, Jennifer Renoux:
From Reactive to Active Sensing: A Survey on Information Gathering in Decision-theoretic Planning. 280:1-280:22 - Tian Wang, Yuzhu Liang, Xuewei Shen, Xi Zheng, Adnan Mahmood, Quan Z. Sheng:
Edge Computing and Sensor-Cloud: Overview, Solutions, and Directions. 281:1-281:37 - Visal Rajapakse, Ishan Karunanayake, Nadeem Ahmed:
Intelligence at the Extreme Edge: A Survey on Reformable TinyML. 282:1-282:30 - Thomas Kosch, Jakob Karolus, Johannes Zagermann, Harald Reiterer, Albrecht Schmidt, Pawel W. Wozniak:
A Survey on Measuring Cognitive Workload in Human-Computer Interaction. 283:1-283:39 - Malgorzata B. Starzynska-Grzes, Robin Roussel, Sam Jacoby, Ali Asadipour:
Computer Vision-based Analysis of Buildings and Built Environments: A Systematic Review of Current Approaches. 284:1-284:25 - Chang Liu, Han Yu:
AI-Empowered Persuasive Video Generation: A Survey. 285:1-285:31 - Md. Rezwan Hasan, Richard M. Guest, Farzin Deravi:
Presentation-level Privacy Protection Techniques for Automated Face Recognition - A Survey. 286:1-286:27 - Xilu Wang, Yaochu Jin, Sebastian Schmitt, Markus Olhofer:
Recent Advances in Bayesian Optimization. 287:1-287:36 - Madeline C. Schiappa, Yogesh S. Rawat, Mubarak Shah:
Self-Supervised Learning for Videos: A Survey. 288:1-288:37 - Huihui Guo, Fan Wu, Yunchuan Qin, Ruihui Li, Keqin Li, Kenli Li:
Recent Trends in Task and Motion Planning for Robotics: A Survey. 289:1-289:36 - Gang Wang, Qin Wang, Shiping Chen:
Exploring Blockchains Interoperability: A Systematic Survey. 290:1-290:38 - Xiaojie Zhang, Saptarshi Debroy:
Resource Management in Mobile Edge Computing: A Comprehensive Survey. 291:1-291:37 - Yogesh Sharma, Deval Bhamare, Nishanth Sastry, Bahman Javadi, Rajkumar Buyya:
SLA Management in Intent-Driven Service Management Systems: A Taxonomy and Future Directions. 292:1-292:38 - Nima Shahbazi, Yin Lin, Abolfazl Asudeh, H. V. Jagadish:
Representation Bias in Data: A Survey on Identification and Resolution Techniques. 293:1-293:39 - Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Sebastiano Vascon, Werner Zellinger, Bernhard Alois Moser, Alina Oprea, Battista Biggio, Marcello Pelillo, Fabio Roli:
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning. 294:1-294:39 - Meike Nauta, Jan Trienes, Shreyasi Pathak, Elisa Nguyen, Michelle Peters, Yasmin Schmitt, Jörg Schlötterer, Maurice van Keulen, Christin Seifert:
From Anecdotal Evidence to Quantitative Evaluation Methods: A Systematic Review on Evaluating Explainable AI. 295:1-295:42 - Anubhav Jangra, Sourajit Mukherjee, Adam Jatowt, Sriparna Saha, Mohammad Hasanuzzaman:
A Survey on Multi-modal Summarization. 296:1-296:36 - Wael Alsafery, Omer F. Rana, Charith Perera:
Sensing within Smart Buildings: A Survey. 297:1-297:35 - Morteza Zakeri Nasrabadi, Saeed Parsa, Ehsan Esmaili, Fabio Palomba:
A Systematic Literature Review on the Code Smells Datasets and Validation Mechanisms. 298:1-298:48 - Zeyu Tang, Jiji Zhang, Kun Zhang:
What-is and How-to for Fairness in Machine Learning: A Survey, Reflection, and Perspective. 299:1-299:37
Volume 55, Number 14s, December 2023
- Brian Felipe Keith Norambuena, Tanushree Mitra, Chris North:
A Survey on Event-Based News Narrative Extraction. 300:1-300:39 - Zhiwei Zhong, Xianming Liu, Junjun Jiang, Debin Zhao, Xiangyang Ji:
Guided Depth Map Super-Resolution: A Survey. 301:1-301:36 - Vijay Kumar, Kolin Paul:
Device Fingerprinting for Cyber-Physical Systems: A Survey. 302:1-302:41 - Mu-Huan Chung, Yuhong Yang, Lu Wang, Greg Cento, Khilan Jerath, Abhay Raman, David Lie, Mark H. Chignell:
Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement. 303:1-303:37 - Quentin Fournier, Gaétan Marceau Caron, Daniel Aloise:
A Practical Survey on Faster and Lighter Transformers. 304:1-304:40 - Karl Olson, Jack Wampler, Eric Keller:
Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers. 305:1-305:37 - Federico Reghenzani, Zhishan Guo, William Fornaciari:
Software Fault Tolerance in Real-Time Systems: Identifying the Future Research Questions. 306:1-306:30 - Jiepin Ding, Mingsong Chen, Ting Wang, Junlong Zhou, Xin Fu, Keqin Li:
A Survey of AI-enabled Dynamic Manufacturing Scheduling: From Directed Heuristics to Autonomous Learning. 307:1-307:36 - Cornelius Ihle, Dennis Trautwein, Moritz Schubotz, Norman Meuschke, Bela Gipp:
Incentive Mechanisms in Peer-to-Peer Networks - A Systematic Literature Review. 308:1-308:69 - Tânia Carvalho, Nuno Moniz, Pedro Faria, Luís Antunes:
Survey on Privacy-Preserving Techniques for Microdata Publication. 309:1-309:42 - Tommaso Fulcini, Riccardo Coppola, Luca Ardito, Marco Torchiano:
A Review on Tools, Mechanics, Benefits, and Challenges of Gamified Software Testing. 310:1-310:37 - Arun Kumar Kalakanti, Shrisha Rao:
Computational Challenges and Approaches for Electric Vehicles. 311:1-311:35 - Nikiforos Pittaras, George Giannakopoulos, Panagiotis Stamatopoulos, Vangelis Karkaletsis:
Content-based and Knowledge-enriched Representations for Classification Across Modalities: A Survey. 312:1-312:40 - Anna Breit, Laura Waltersdorfer, Fajar J. Ekaputra, Marta Sabou, Andreas Ekelhart, Andreea Iana, Heiko Paulheim, Jan Portisch, Artem Revenko, Annette ten Teije, Frank van Harmelen:
Combining Machine Learning and Semantic Web: A Systematic Mapping Study. 313:1-313:41 - Abdulaziz Al-Meer, Saif Al-Kuwari:
Physical Unclonable Functions (PUF) for IoT Devices. 314:1-314:31 - Shalini Saini, Nitesh Saxena:
A Survey of Threats to Research Literature-dependent Medical AI Solutions. 315:1-315:26 - Badis Hammi, Sherali Zeadally, Jamel Nebhen:
Security Threats, Countermeasures, and Challenges of Digital Supply Chains. 316:1-316:40 - Veda C. Storey, Roman Lukyanenko, Arturo Castellanos:
Conceptual Modeling: Topics, Themes, and Technology Trends. 317:1-317:38 - Sahraoui Dhelim, Liming Chen, Sajal K. Das, Huansheng Ning, Chris D. Nugent, Gerard Leavey, Dirk Pesch, Eleanor Bantry-White, Devin Burns:
Detecting Mental Distresses Using Social Behavior Analysis in the Context of COVID-19: A Survey. 318:1-318:30 - Jarod Govers, Philip Feldman, Aaron Dant, Panos Patros:
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech. 319:1-319:35 - Leysan Nurgalieva, Alisa Frik, Gavin Doherty:
A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development. 320:1-320:27 - Samodha Pallewatta, Vassilis Kostakos, Rajkumar Buyya:
Placement of Microservices-based IoT Applications in Fog Computing: A Taxonomy and Future Directions. 321:1-321:43 - Newton Carlos Will, Carlos Alberto Maziero:
Intel Software Guard Extensions Applications: A Survey. 322:1-322:38 - Bofeng Pan, Natalia Stakhanova, Suprio Ray:
Data Provenance in Security and Privacy. 323:1-323:35 - Daryna Oliynyk, Rudolf Mayer, Andreas Rauber:
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences. 324:1-324:41 - Davide Zoni, Andrea Galimberti, William Fornaciari:
A Survey on Run-time Power Monitors at the Edge. 325:1-325:33 - Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey. 326:1-326:37 - Arda Goknil, Phu Hong Nguyen, Sagar Sen, Dimitra Politaki, Harris Niavis, Karl John Pedersen, Abdillah Suyuthi, Abhilash Anand, Amina Ziegenbein:
A Systematic Review of Data Quality in CPS and IoT for Industry 4.0. 327:1-327:38 - Sicong Han, Chenhao Lin, Chao Shen, Qian Wang, Xiaohong Guan:
Interpreting Adversarial Examples in Deep Learning: A Review. 328:1-328:38 - Xiao Zhang, Griffin Klevering, Xinyu Lei, Yiwen Hu, Li Xiao, Guan-Hua Tu:
The Security in Optical Wireless Communication: A Survey. 329:1-329:36 - Matthew Landers, Afsaneh Doryab:
Deep Reinforcement Learning Verification: A Survey. 330:1-330:31 - Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari:
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids. 331:1-331:37 - Shreya Goyal, Sumanth Doddapaneni, Mitesh M. Khapra, Balaraman Ravindran:
A Survey of Adversarial Defenses and Robustness in NLP. 332:1-332:39 - Tongyue He, Junxin Chen, Ben-Guo He, Wei Wang, Zhiliang Zhu, Zhihan Lv:
Toward Wearable Sensors: Advances, Trends, and Challenges. 333:1-333:35 - Kilian Pfeiffer, Martin Rapp, Ramin Khalili, Jörg Henkel:
Federated Learning for Computationally Constrained Heterogeneous Devices: A Survey. 334:1-334:27 - Baolei Cheng, Dajin Wang, Jianxi Fan:
Independent Spanning Trees in Networks: A Survey. 335:1-335:29 - João Bachiega Jr., Breno G. S. Costa, Leonardo Rebouças de Carvalho, Michel J. F. Rosa, Aletéia P. F. Araújo:
Computational Resource Allocation in Fog Computing: A Comprehensive Survey. 336:1-336:31
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.