


default search action
ACM Computing Surveys, Volume 56
Volume 56, Number 1, January 2024
- Janice Klaiber
, Clemens van Dinther
:
Deep Learning for Variable Renewable Energy: A Systematic Review. 1:1-1:37 - Hélène Coullon
, Ludovic Henrio
, Frédéric Loulergue
, Simon Robillard
:
Component-based Distributed Software Reconfiguration:A Verification-oriented Survey. 2:1-2:37 - Mohamed Ahzam Amanullah
, Seng W. Loke
, Mohan Baruwal Chhetri
, Robin Doss
:
A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review. 3:1-3:38 - Sabine Houy
, Philipp Schmid
, Alexandre Bartel
:
Security Aspects of Cryptocurrency Wallets - A Systematic Literature Review. 4:1-4:31 - Prasenjeet Roy
, Suman Kundu
:
Review on Query-focused Multi-document Summarization (QMDS) with Comparative Analysis. 5:1-5:38 - Jana Vatter
, Ruben Mayer
, Hans-Arno Jacobsen
:
The Evolution of Distributed Systems for Graph Neural Networks and Their Origin in Graph Processing and Deep Learning: A Survey. 6:1-6:37 - Shulei Ji
, Xinyu Yang
, Jing Luo
:
A Survey on Deep Learning for Symbolic Music Generation: Representations, Algorithms, Evaluations, and Challenges. 7:1-7:39 - Mario Brcic
, Roman V. Yampolskiy
:
Impossibility Results in AI: A Survey. 8:1-8:24 - Heng Xu
, Tianqing Zhu
, Lefeng Zhang
, Wanlei Zhou
, Philip S. Yu
:
Machine Unlearning: A Survey. 9:1-9:36 - Samaneh Zolfaghari
, Sumaiya Suravee
, Daniele Riboni
, Kristina Yordanova
:
Sensor-Based Locomotion Data Mining for Supporting the Diagnosis of Neurodegenerative Disorders: A Survey. 10:1-10:36 - Ce Zheng
, Wenhan Wu
, Chen Chen
, Taojiannan Yang
, Sijie Zhu
, Ju Shen
, Nasser Kehtarnavaz
, Mubarak Shah
:
Deep Learning-based Human Pose Estimation: A Survey. 11:1-11:37 - Bayzid Ashik Hossain
, Md. Saddam Hossain Mukta
, Md. Adnanul Islam
, Akib Zaman
, Rolf Schwitter
:
Natural Language-Based Conceptual Modelling Frameworks: State of the Art and Future Opportunities. 12:1-12:26 - Zhaolong Ning
, Hao Hu
, Xiaojie Wang
, Lei Guo
, Song Guo
, Guoyin Wang
, Xinbo Gao
:
Mobile Edge Computing and Machine Learning in the Internet of Unmanned Aerial Vehicles: A Survey. 13:1-13:31 - Chi-Wei Lien
, Sudip Vhaduri
:
Challenges and Opportunities of Biometric User Authentication in the Age of IoT: A Survey. 14:1-14:37 - Yaochen Liu
, Qiuchi Li
, Benyou Wang
, Yazhou Zhang
, Dawei Song
:
A Survey of Quantum-cognitively Inspired Sentiment Analysis Models. 15:1-15:37 - Alessandro Margara
, Gianpaolo Cugola
, Nicolò Felicioni
, Stefano Cilloni
:
A Model and Survey of Distributed Data-Intensive Systems. 16:1-16:69 - Zeinab Zabihi
, Amir-Masoud Eftekhari-Moghadam
, Mohammad Hossein Rezvani
:
Reinforcement Learning Methods for Computation Offloading: A Systematic Review. 17:1-17:41 - Ricardo Parizotto
, Bruno Loureiro Coelho
, Diego Cardoso Nunes
, Israat Haque
, Alberto Schaeffer-Filho
:
Offloading Machine Learning to Programmable Data Planes: A Systematic Survey. 18:1-18:34 - Zhe Fu
, Xi Niu
, Mary Lou Maher
:
Deep Learning Models for Serendipity Recommendations: A Survey and New Perspectives. 19:1-19:26 - Rui Xu
, Sheng Ma
, Yang Guo
, Dongsheng Li
:
A Survey of Design and Optimization for Systolic Array-based DNN Accelerators. 20:1-20:37 - Guoqing Xiao
, Chuanghui Yin
, Tao Zhou
, Xueqi Li
, Yuedan Chen
, Kenli Li
:
A Survey of Accelerating Parallel Sparse Linear Algebra. 21:1-21:38 - Diego Donoso
, José M. Saavedra
:
Survey on Sketch-to-photo Translation. 22:1-22:25 - Zhishu Shen
, Jiong Jin
, Cheng Tan
, Atsushi Tagami
, Shangguang Wang
, Qing Li
, Qiushi Zheng
, Jingling Yuan
:
A Survey of Next-generation Computing Technologies in Space-air-ground Integrated Networks. 23:1-23:40 - Alessia Antelmi
, Gennaro Cordasco
, Mirko Polato
, Vittorio Scarano
, Carmine Spagnuolo
, Dingqi Yang
:
A Survey on Hypergraph Representation Learning. 24:1-24:38 - Kisub Kim
, Sankalp Ghatpande
, Dongsun Kim
, Xin Zhou
, Kui Liu
, Tegawendé F. Bissyandé
, Jacques Klein
, Yves Le Traon
:
Big Code Search: A Bibliography. 25:1-25:49
Volume 56, Number 2, February 2024
- Afzal Badshah
, Anwar Ghani
, Ali Daud
, Ateeqa Jalal
, Muhammad Bilal
, Jon Crowcroft
:
Towards Smart Education through Internet of Things: A Survey. 26:1-26:33 - Maud Ehrmann
, Ahmed Hamdi
, Elvys Linhares Pontes
, Matteo Romanello
, Antoine Doucet
:
Named Entity Recognition and Classification in Historical Documents: A Survey. 27:1-27:47 - Marco Brohet
, Francesco Regazzoni
:
A Survey on Thwarting Memory Corruption in RISC-V. 28:1-28:29 - Alireza Alaei
, Vinh Bui
, David S. Doermann
, Umapada Pal
:
Document Image Quality Assessment: A Survey. 29:1-29:36 - Bonan Min
, Hayley Ross
, Elior Sulem
, Amir Pouran Ben Veyseh
, Thien Huu Nguyen
, Oscar Sainz
, Eneko Agirre
, Ilana Heintz
, Dan Roth
:
Recent Advances in Natural Language Processing via Large Pre-trained Language Models: A Survey. 30:1-30:40 - Maciej Besta
, Robert Gerstenberger
, Emanuel Peter
, Marc Fischer
, Michal Podstawski
, Claude Barthels
, Gustavo Alonso
, Torsten Hoefler
:
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries. 31:1-31:40 - Jan Pennekamp
, Roman Matzutt
, Christopher Klinkmüller
, Lennart Bader
, Martin Serror
, Eric Wagner
, Sidra Malik
, Maria Spiß
, Jessica Rahn
, Tan Gürpinar
, Eduard Vlad
, Sander J. J. Leemans
, Salil S. Kanhere
, Volker Stich
, Klaus Wehrle
:
An Interdisciplinary Survey on Information Flows in Supply Chains. 32:1-32:38 - Takuya Fujihashi
, Toshiaki Koike-Akino
, Takashi Watanabe
:
Soft Delivery: Survey on a New Paradigm for Wireless and Mobile Multimedia Streaming. 33:1-33:37 - Yaxiong Lei
, Shijing He
, Mohamed Khamis
, Juan Ye
:
An End-to-End Review of Gaze Estimation and its Interactive Applications on Handheld Mobile Devices. 34:1-34:38 - Oceane Destras
, Sébastien Le Beux
, Felipe Gohring de Magalhaes
, Gabriela Nicolescu
:
Survey on Activation Functions for Optical Neural Networks. 35:1-35:30 - Fatemeh Deldar
, Mahdi Abadi
:
Deep Learning for Zero-day Malware Detection and Classification: A Survey. 36:1-36:37 - Sahar Mehrpour
, Thomas D. LaToza
:
A Survey of Tool Support for Working with Design Decisions in Code. 37:1-37:37 - Satyaki Roy
, Nirnay Ghosh
, Nitish M. Uplavikar
, Preetam Ghosh
:
Towards a Unified Pandemic Management Architecture: Survey, Challenges, and Future Directions. 38:1-38:32 - Huiqiang Chen
, Tianqing Zhu
, Tao Zhang
, Wanlei Zhou
, Philip S. Yu
:
Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff. 39:1-39:37 - Abdelouahab Amira
, Abdelouahid Derhab
, Elmouatez Billah Karbab
, Omar Nouali
:
A Survey of Malware Analysis Using Community Detection Algorithms. 40:1-40:29 - Nan Li
, Lianbo Ma
, Guo Yu
, Bing Xue
, Mengjie Zhang
, Yaochu Jin
:
Survey on Evolutionary Deep Learning: Principles, Algorithms, Applications, and Open Issues. 41:1-41:34 - Tara Ghasempouri
, Jaan Raik
, Cezar Reinbrecht
, Said Hamdioui
, Mottaqiallah Taouil
:
Survey on Architectural Attacks: A Unified Classification and Attack Model. 42:1-42:32 - Carlos Barrios
, Mohan Kumar
:
Service Caching and Computation Reuse Strategies at the Edge: A Survey. 43:1-43:38 - Rongxin Xu
, Qiujun Lan
, Shiva Raj Pokhrel
, Gang Li
:
A Knowledge Graph-Based Survey on Distributed Ledger Technology for IoT Verticals. 44:1-44:36 - Youssef Yamout
, Tashaffi Samin Yeasar
, Shahrear Iqbal
, Mohammad Zulkernine
:
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security. 45:1-45:35 - Jean Luca Bez
, Suren Byna
, Shadi Ibrahim
:
I/O Access Patterns in HPC Applications: A 360-Degree Survey. 46:1-46:41 - Stefan Buchner
, Dirk Riehle
:
The Business Impact of Inner Source and How to Quantify It. 47:1-47:27 - Maryam Amini
, Razvan Stanica
, Catherine Rosenberg
:
Where Are the (Cellular) Data? 48:1-48:25 - Essam Soliman Debie, Kathryn Kasmarik
, Matt Garratt
:
Swarm Robotics: A Survey from a Multi-Tasking Perspective. 49:1-49:38 - Danfeng Sun
, Junjie Hu
, Huifeng Wu
, Jia Wu
, Jian Yang
, Quan Z. Sheng
, Schahram Dustdar
:
A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT. 50:1-50:37 - Asma Ameur
, Sana Hamdi
, Sadok Ben Yahia
:
Sentiment Analysis for Hotel Reviews: A Systematic Literature Review. 51:1-51:38 - Benjamin Smith
, Anahita Khojandi
, Rama K. Vasudevan
:
Bias in Reinforcement Learning: A Review in Healthcare Applications. 52:1-52:17 - Ryan Schuerkamp
, Philippe J. Giabbanelli
:
Extensions of Fuzzy Cognitive Maps: A Systematic Review. 53:1-53:36
Volume 56, Number 3, March 2024
- Yulan Guo
, Hanyun Wang
, Longguang Wang
, Yinjie Lei
, Li Liu
, Mohammed Bennamoun
:
3D Face Recognition: Two Decades of Progress and Prospects. 54:1-54:39 - Benyou Wang
, Qianqian Xie
, Jiahuan Pei
, Zhihong Chen
, Prayag Tiwari
, Zhao Li
, Jie Fu
:
Pre-trained Language Models in Biomedical Domain: A Systematic Survey. 55:1-55:52 - Tianzhang He
, Rajkumar Buyya
:
A Taxonomy of Live Migration Management in Cloud Computing. 56:1-56:33 - Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza
:
Automation for Network Security Configuration: State of the Art and Research Trends. 57:1-57:37 - Domenico Amalfitano
, Stefano Faralli
, Jean Carlo Rossa Hauck
, Santiago Matalonga
, Damiano Distante
:
Artificial Intelligence Applied to Software Testing: A Tertiary Study. 58:1-58:38 - Rui Queiroz
, Tiago Cruz
, Jérôme Mendes
, Pedro Sousa
, Paulo Simões
:
Container-based Virtualization for Real-time Industrial Systems - A Systematic Review. 59:1-59:38 - Guoying Qiu
, Guoming Tang
, Chuandong Li
, Lailong Luo
, Deke Guo
, Yulong Shen
:
Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective. 60:1-60:36 - Kheng Leong Tan
, Chi-Hung Chi
, Kwok-Yan Lam
:
Survey on Digital Sovereignty and Identity: From Digitization to Digitalization. 61:1-61:36 - Taraneh Ghandi
, Hamidreza Pourreza
, Hamidreza Mahyar
:
Deep Learning Approaches on Image Captioning: A Review. 62:1-62:39 - Haiqin Wu
, Boris Düdder
, Liangmin Wang
, Zhenfu Cao
, Jun Zhou
, Xia Feng
:
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture. 63:1-63:40 - Hanqing Zhang
, Haolin Song
, Shaoyu Li
, Ming Zhou
, Dawei Song
:
A Survey of Controllable Text Generation Using Transformer-based Pre-trained Language Models. 64:1-64:37 - Oscar Castro
, Pierrick Bruneau
, Jean-Sébastien Sottet
, Dario Torregrossa
:
Landscape of High-Performance Python to Develop Data Science and Machine Learning Applications. 65:1-65:30 - Dulani Meedeniya
, Isuru Ariyarathne
, Meelan Bandara
, Roshinie Jayasundara
, Charith Perera
:
A Survey on Deep Learning Based Forest Environment Sound Classification at the Edge. 66:1-66:36 - Qi Jia
, Yizhu Liu
, Siyu Ren
, Kenny Q. Zhu
:
Taxonomy of Abstractive Dialogue Summarization: Scenarios, Approaches, and Future Directions. 67:1-67:38 - Asma Hamissi
, Amine Dhraief
:
A Survey on the Unmanned Aircraft System Traffic Management. 68:1-68:37 - Adán José García
, Julie Jacques
, Vincent Sobanski
, Clarisse Dhaenens
:
Metaheuristic Biclustering Algorithms: From State-of-the-art to Future Opportunities. 69:1-69:38 - Felix Gemeinhardt
, Antonio Garmendia
, Manuel Wimmer
, Benjamin Weder
, Frank Leymann
:
Quantum Combinatorial Optimization in the NISQ Era: A Systematic Mapping Study. 70:1-70:36 - Sanoop Mallissery
, Yu-Sung Wu
:
Demystify the Fuzzing Methods: A Comprehensive Survey. 71:1-71:38 - Arnav Arora
, Preslav Nakov
, Momchil Hardalov
, Sheikh Muhammad Sarwar
, Vibha Nayak
, Yoan Dinkov
, Dimitrina Zlatkova
, Kyle Dent
, Ameya Bhatawdekar
, Guillaume Bouchard
, Isabelle Augenstein
:
Detecting Harmful Content on Online Platforms: What Platforms Need vs. Where Research Efforts Go. 72:1-72:17 - Peter Christen
, David J. Hand
, Nishadi Kirielle
:
A Review of the F-Measure: Its History, Properties, Criticism, and Alternatives. 73:1-73:24 - Luís Fiolhais
, Leonel Sousa
:
Transient-Execution Attacks: A Computer Architect Perspective. 74:1-74:38 - Vincenzo Scotti
, Licia Sbattella
, Roberto Tedesco
:
A Primer on Seq2Seq Models for Generative Chatbots. 75:1-75:58 - Ayse Ünsal, Melek Önen
:
Information-Theoretic Approaches to Differential Privacy. 76:1-76:18 - Simone Maurizio La Cava
, Giulia Orrù
, Martin Drahanský
, Gian Luca Marcialis
, Fabio Roli
:
3D Face Reconstruction: The Road to Forensics. 77:1-77:38 - Xiaoyu Xia
, Sheik Mohammad Mostakim Fattah
, Muhammad Ali Babar
:
A Survey on UAV-Enabled Edge Computing: Resource Management Perspective. 78:1-78:36 - Mang Ye
, Xiuwen Fang
, Bo Du
, Pong C. Yuen
, Dacheng Tao
:
Heterogeneous Federated Learning: State-of-the-art and Research Challenges. 79:1-79:44 - Guoyang Xie, Yawen Huang, Jin-Bao Wang, Jiayi Lyu, Feng Zheng, Yefeng Zheng, Yaochu Jin:
Cross-modality Neuroimage Synthesis: A Survey. 80:1-80:28
Volume 56, Number 4, April 2024
- Ernest Davis
:
Benchmarks for Automated Commonsense Reasoning: A Survey. 81:1-81:41 - Marcel André Hoffmann
, Rainer Lasch
:
Tackling Industrial Downtimes with Artificial Intelligence in Data-Driven Maintenance. 82:1-82:33 - Jonas Auda
, Uwe Gruenefeld
, Sarah Faltaous
, Sven Mayer
, Stefan Schneegass
:
A Scoping Survey on Cross-reality Systems. 83:1-83:38 - Josu Díaz-de-Arcaya
, Ana I. Torre-Bastida
, Gorka Zárate
, Raúl Miñón
, Aitor Almeida
:
A Joint Study of the Challenges, Opportunities, and Roadmap of MLOps and AIOps: A Systematic Survey. 84:1-84:30 - Cristiano Patrício
, João C. Neves
, Luís F. Teixeira
:
Explainable Deep Learning Methods in Medical Image Classification: A Survey. 85:1-85:41 - Damien Wohwe Sambo
, Anna Förster
:
Wireless Underground Sensor Networks: A Comprehensive Survey and Tutorial. 86:1-86:44 - Yashar Deldjoo
, Fatemeh Nazary
, Arnau Ramisa
, Julian J. McAuley
, Giovanni Pellegrini
, Alejandro Bellogín
, Tommaso Di Noia
:
A Review of Modern Fashion Recommender Systems. 87:1-87:37 - Muhammad Okky Ibrohim
, Cristina Bosco
, Valerio Basile
:
Sentiment Analysis for the Natural Environment: A Systematic Review. 88:1-88:37 - Meng Qin
, Dit-Yan Yeung
:
Temporal Link Prediction: A Unified Framework, Taxonomy, and Review. 89:1-89:40 - Weihao Xia
, Jing-Hao Xue
:
A Survey on Deep Generative 3D-aware Image Synthesis. 90:1-90:34 - Chenhan Zhang
, Shui Yu
, Zhiyi Tian
, James J. Q. Yu
:
Generative Adversarial Networks: A Survey on Attack and Defense Perspective. 91:1-91:35 - Li Hu
, Anli Yan
, Hongyang Yan
, Jin Li
, Teng Huang
, Yingying Zhang
, Changyu Dong
, Chunsheng Yang
:
Defenses to Membership Inference Attacks: A Survey. 92:1-92:34 - Alexandra Kapp
, Julia Hansmeyer
, Helena Mihaljevic
:
Generative Models for Synthetic Urban Mobility Data: A Systematic Literature Review. 93:1-93:37 - Lingfeng Zhong
, Jia Wu
, Qian Li
, Hao Peng
, Xindong Wu
:
A Comprehensive Survey on Automatic Knowledge Graph Construction. 94:1-94:62 - Pedro Miguel Moás
, Carla Teixeira Lopes
:
Automatic Quality Assessment of Wikipedia Articles - A Systematic Literature Review. 95:1-95:37 - Edan Habler
, Ron Bitton
, Asaf Shabtai
:
Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation. 96:1-96:40 - Seyed Mojtaba Marvasti-Zadeh
, Devin Goodsman
, Nilanjan Ray
, Nadir Erbilgin
:
Early Detection of Bark Beetle Attack Using Remote Sensing and Machine Learning: A Review. 97:1-97:40 - Julio C. S. dos Anjos
, Kassiano J. Matteussi
, Fernanda C. Orlandi
, Jorge L. V. Barbosa
, Jorge Sá Silva
, Luiz F. Bittencourt
, Cláudio F. R. Geyer
:
A Survey on Collaborative Learning for Intelligent Autonomous Systems. 98:1-98:37 - Huawei Huang
, Qinnan Zhang
, Taotao Li
, Qinglin Yang
, Zhaokang Yin
, Junhao Wu
, Zehui Xiong
, Jianming Zhu
, Jiajing Wu
, Zibin Zheng
:
Economic Systems in the Metaverse: Basics, State of the Art, and Challenges. 99:1-99:33 - Ronnie Edson de Souza Santos
, Paul Ralph
, Arham Arshad
, Klaas-Jan Stol
:
Distributed Scrum: A Case Meta-analysis. 100:1-100:37 - Maria Rigaki
, Sebastián García
:
A Survey of Privacy Attacks in Machine Learning. 101:1-101:34 - Norman W. Paton
, Jiaoyan Chen
, Zhenyu Wu
:
Dataset Discovery and Exploration: A Survey. 102:1-102:37 - Zhipeng Su
, Yixiong Zhang
, Jianghong Shi
, Xiao-Ping Zhang
:
A Survey of Single Image Rain Removal Based on Deep Learning. 103:1-103:35 - Akond Rahman
, Dibyendu Brinto Bose
, Farhat Lamia Barsha
, Rahul Pandita
:
Defect Categorization in Compilers: A Multi-vocal Literature Review. 104:1-104:42 - Ling Yang
, Zhilong Zhang
, Yang Song
, Shenda Hong
, Runsheng Xu
, Yue Zhao
, Wentao Zhang
, Bin Cui
, Ming-Hsuan Yang
:
Diffusion Models: A Comprehensive Survey of Methods and Applications. 105:1-105:39 - Marvin Wyrich
, Justus Bogner
, Stefan Wagner
:
40 Years of Designing Code Comprehension Experiments: A Systematic Mapping Study. 106:1-106:42 - Thomas Heinis
, Roman Sokolovskii
, Jamie J. Alnasir
:
Survey of Information Encoding Techniques for DNA. 107:1-107:30
Volume 56, Number 5, May 2024
- Amin Hosseiny Marani
, Eric P. S. Baumer
:
A Review of Stability in Topic Modeling: Metrics for Assessing and Techniques for Improving Stability. 108:1-108:32 - Cigdem Beyan
, Alessandro Vinciarelli
, Alessio Del Bue
:
Co-Located Human-Human Interaction Analysis Using Nonverbal Cues: A Survey. 109:1-109:41 - Artur Becker
, Carla Maria Dal Sasso Freitas
:
Evaluation of XR Applications: A Tertiary Review. 110:1-110:35 - Wen Fei
, Hiroyuki Ohno
, Srinivas Sampalli
:
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions. 111:1-111:40 - Xuke Hu
, Zhiyong Zhou
, Hao Li
, Yingjie Hu
, Fuqiang Gu
, Jens Kersten
, Hongchao Fan
, Friederike Klan
:
Location Reference Recognition from Texts: A Survey and Comparison. 112:1-112:37 - Qihan Huang
, Haofei Zhang
, Mengqi Xue
, Jie Song
, Mingli Song
:
A Survey of Deep Learning for Low-shot Object Detection. 113:1-113:37 - Ville Paananen
, Mohammad Sina Kiarostami
, Lik-Hang Lee
, Tristan Braud
, Simo Hosio
:
From Digital Media to Empathic Spaces: A Systematic Review of Empathy Research in Extended Reality Environments. 114:1-114:40 - Azra Seyyedi
, Mahdi Bohlouli, Seyed Ehsan Nedaaee Oskoee:
Machine Learning and Physics: A Survey of Integrated Models. 115:1-115:33 - Johann Li
, Guangming Zhu
, Cong Hua
, Mingtao Feng
, Basheer Bennamoun
, Ping Li
, Xiaoyuan Lu
, Juan Song
, Peiyi Shen
, Xu Xu
, Lin Mei
, Liang Zhang
, Syed Afaq Ali Shah
, Mohammed Bennamoun
:
A Systematic Collection of Medical Image Datasets for Deep Learning. 116:1-116:51 - Zoltán Ádám Mann
, Christian Weinert
, Daphnee Chabal
, Joppe W. Bos
:
Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead. 117:1-117:37 - Jiayun Luo
, Boyang Li
, Cyril Leung
:
A Survey of Computer Vision Technologies in Urban and Controlled-environment Agriculture. 118:1-118:39 - Feng Li
, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Jianting Ning
, Robert H. Deng
:
A Survey on Searchable Symmetric Encryption. 119:1-119:42 - Vaibhav Jain
, Devendra Kumar Sharma
, Hari Mohan Gaur
, Ashutosh Kumar Singh
, Xiaoqing Wen
:
Comprehensive and Comparative Analysis of QCA-based Circuit Designs for Next-generation Computation. 120:1-120:36 - Yujuan Ding
, Zhihui Lai
, P. Y. Mok
, Tat-Seng Chua
:
Computational Technologies for Fashion Recommendation: A Survey. 121:1-121:45 - Bing Huang
, Dipankar Chaki
, Athman Bouguettaya
, Kwok-Yan Lam
:
A Survey on Conflict Detection in IoT-based Smart Homes. 122:1-122:40 - Dawei Zhou, Jingrui He
:
Rare Category Analysis for Complex Data: A Review. 123:1-123:35 - Adnan Khalid
, Zohaib Mushtaq
, Saad Arif
, Kamran Zeb
, Muhammad Attique Khan
, Sambit Bakshi
:
Control Schemes for Quadrotor UAV: Taxonomy and Survey. 124:1-124:32 - Thomas Hickling
, Abdelhafid Zenati
, Nabil Aouf
, Phillippa Spencer
:
Explainability in Deep Reinforcement Learning: A Review into Current Methods and Applications. 125:1-125:35 - Zhiqian Chen
, Fanglan Chen
, Lei Zhang
, Taoran Ji
, Kaiqun Fu
, Liang Zhao
, Feng Chen
, Lingfei Wu
, Charu Aggarwal
, Chang-Tien Lu
:
Bridging the Gap between Spatial and Spectral Domains: A Unified Framework for Graph Neural Networks. 126:1-126:42 - Debo Cheng
, Jiuyong Li
, Lin Liu
, Jixue Liu
, Thuc Duy Le
:
Data-Driven Causal Effect Estimation Based on Graphical Causal Modelling: A Survey. 127:1-127:37 - Santiago Villarreal-Narvaez
, Arthur Sluÿters
, Jean Vanderdonckt
, Radu-Daniel Vatavu
:
Brave New GES World: A Systematic Literature Review of Gestures and Referents in Gesture Elicitation Studies. 128:1-128:55 - Fangjian Liao
, Xingxing Zou
, Waikeung Wong
:
Appearance and Pose-guided Human Generation: A Survey. 129:1-129:35 - Shiwei Li
, Huifeng Guo
, Xing Tang
, Ruiming Tang
, Lu Hou
, Ruixuan Li
, Rui Zhang
:
Embedding Compression in Recommender Systems: A Survey. 130:1-130:21 - Victor R. Kebande
, Ali Ismail Awad
:
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions. 131:1-131:37 - Aruna Jayasena
, Prabhat Mishra
:
Directed Test Generation for Hardware Validation: A Survey. 132:1-132:36 - Melike Geçer
, Benoît Garbinato
:
Federated Learning for Mobility Applications. 133:1-133:28 - Gengrui Zhang
, Fei Pan
, Yunhao Mao
, Sofia Tijanic
, Michael Dang'ana
, Shashank Motepalli
, Shiquan Zhang
, Hans-Arno Jacobsen
:
Reaching Consensus in the Byzantine Empire: A Comprehensive Review of BFT Consensus Algorithms. 134:1-134:41
Volume 56, Number 6, June 2024
- Marco De Vincenzi
, Gianpiero Costantino
, Ilaria Matteucci
, Florian Fenzl
, Christian Plappert
, Roland Rieke
, Daniel Zelle
:
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet. 135:1-135:38 - Andrew Wei-Loong Wong
, Say Leng Goh
, Mohammad Kamrul Hasan
, Salmah Fattah
:
Multi-Hop and Mesh for LoRa Networks: Recent Advancements, Issues, and Recommended Applications. 136:1-136:43 - Yanbin Liu
, Girish Dwivedi
, Farid Boussaïd
, Mohammed Bennamoun
:
3D Brain and Heart Volume Generative Models: A Survey. 137:1-137:37 - Yanjie Li
, Bin Xie
, Songtao Guo, Yuanyuan Yang, Bin Xiao:
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks. 138:1-138:37 - Changlin Yang
, Kwan-Wu Chin
, Jiguang Wang
, Xiaodong Wang
, Ying Liu
, Zibin Zheng
:
Scaling Blockchains with Error Correction Codes: A Survey on Coded Blockchains. 139:1-139:33 - Sk Maidul Islam
, Subhankar Joardar
, Arif Ahmed Sekh
:
A Survey on Fashion Image Retrieval. 140:1-140:25 - Mohammad Hasan Ahmadilivani
, Mahdi Taheri
, Jaan Raik
, Masoud Daneshtalab
, Maksim Jenihhin
:
A Systematic Literature Review on Hardware Reliability Assessment Methods for Deep Neural Networks. 141:1-141:39 - Ghareeb Falazi
, Uwe Breitenbücher
, Frank Leymann
, Stefan Schulte
:
Cross-Chain Smart Contract Invocations: A Systematic Multi-Vocal Literature Review. 142:1-142:38 - João Eduardo Costa Gomes
, Ricardo Rodrigues Ehlert
, Rodrigo Murillo Boesche
, Vinicius Santosde Lima
, Jorgito Matiuzzi Stocchero
, Dante A. C. Barone
, Juliano Araujo Wickboldt
, Edison Pignaton de Freitas
, Julio C. S. dos Anjos
, Ricardo Queiroz de Araujo Fernandes
:
Surveying Emerging Network Approaches for Military Command and Control Systems. 143:1-143:38 - Sabina Szymoniak
:
Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey. 144:1-144:31 - Pascal Maniriho
, Abdun Naser Mahmood
, Mohammad Jabed Morshed Chowdhury
:
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms. 145:1-145:41 - Zhisheng Ye
, Wei Gao
, Qinghao Hu
, Peng Sun
, Xiaolin Wang
, Yingwei Luo
, Tianwei Zhang
, Yonggang Wen
:
Deep Learning Workload Scheduling in GPU Datacenters: A Survey. 146:1-146:38 - Ghadeer O. Ghosheh
, Jin Li
, Tingting Zhu
:
A Survey of Generative Adversarial Networks for Synthesizing Structured Electronic Health Records. 147:1-147:34 - Matthew G. Gaber
, Mohiuddin Ahmed
, Helge Janicke
:
Malware Detection with Artificial Intelligence: A Systematic Literature Review. 148:1-148:33 - Matilde Pato
, Márcia Barros
, Francisco M. Couto
:
Survey on Recommender Systems for Biomedical Items in Life and Health Sciences. 149:1-149:32 - Simon Razniewski
, Hiba Arnaout
, Shrestha Ghosh
, Fabian M. Suchanek
:
Completeness, Recall, and Negation in Open-world Knowledge Bases: A Survey. 150:1-150:42 - Huaming Chen
, Muhammad Ali Babar
:
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges. 151:1-151:38 - Kanghua Mo
, Peigen Ye
, Xiaojun Ren, Shaowei Wang, Wenjun Li
, Jin Li:
Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures. 152:1-152:39 - Jianping Yao
, Son N. Tran
, Saurabh Kumar Garg
, Samantha Sawyer
:
Deep Learning for Plant Identification and Disease Classification from Leaf Images: Multi-prediction Approaches. 153:1-153:37 - Simon Khan
, Charles Devlen
, Michael Manno
, Daqing Hou
:
Mouse Dynamics Behavioral Biometrics: A Survey. 154:1-154:33 - Jack Hughes
, Sergio Pastrana
, Alice Hutchings
, Sadia Afroz
, Sagar Samtani
, Weifeng Li
, Ericsson Santana Marin
:
The Art of Cybercrime Community Research. 155:1-155:26 - Budhitama Subagdja
, D. Shanthoshigaa
, Zhaoxia Wang
, Ah-Hwee Tan
:
Machine Learning for Refining Knowledge Graphs: A Survey. 156:1-156:38 - Maryam Zahid
, Alessio Bucaioni
, Francesco Flammini
:
Model-based Trustworthiness Evaluation of Autonomous Cyber-Physical Production Systems: A Systematic Mapping Study. 157:1-157:28 - Mingliang Dou
, Jijun Tang
, Prayag Tiwari
, Yijie Ding
, Fei Guo
:
Drug-Drug Interaction Relation Extraction Based on Deep Learning: A Review. 158:1-158:33 - Jiahang Cao
, Jinyuan Fang
, Zaiqiao Meng
, Shangsong Liang
:
Knowledge Graph Embedding: A Survey from the Perspective of Representation Spaces. 159:1-159:42 - Marius Becherer
, Omar Khadeer Hussain
, Yu Zhang
, Frank T. H. den Hartog, Elizabeth Chang
:
On Trust Recommendations in the Social Internet of Things - A Survey. 160:1-160:35 - Giovanni Ciatto
, Federico Sabbatini
, Andrea Agiollo
, Matteo Magnini
, Andrea Omicini
:
Symbolic Knowledge Extraction and Injection with Sub-symbolic Predictors: A Systematic Literature Review. 161:1-161:35
Volume 56, Number 7, July 2024
- Roberta Calegari
, Fosca Giannotti
, Francesca Pratesi
, Michela Milano
:
Introduction to Special Issue on Trustworthy Artificial Intelligence. 162:1-162:3 - Peiyun Zhang, Song Ding
, Qinglin Zhao
:
Exploiting Blockchain to Make AI Trustworthy: A Software Development Lifecycle View. 163:1-163:31 - Nicholas Conlon
, Nisar R. Ahmed
, Daniel Szafir
:
A Survey of Algorithmic Methods for Competency Self-Assessments in Human-Autonomy Teaming. 164:1-164:31 - Xiaodan Xing
, Huanjun Wu
, Lichao Wang
, Iain Stenson
, May Yong
, Javier Del Ser
, Simon Walsh
, Guang Yang
:
Non-imaging Medical Data Synthesis for Trustworthy AI: A Comprehensive Survey. 165:1-165:35 - Simon Caton
, Christian Haas
:
Fairness in Machine Learning: A Survey. 166:1-166:38 - Ana Carolina Lorena
, Pedro Yuri Arbs Paiva
, Ricardo B. C. Prudêncio
:
Trusting My Predictions: On the Value of Instance-Level Analysis. 167:1-167:28 - Stephanie Milani
, Nicholay Topin
, Manuela Veloso
, Fei Fang
:
Explainable Reinforcement Learning: A Survey and Comparative Review. 168:1-168:36 - Rachid Guerraoui
, Nirupam Gupta
, Rafael Pinot
:
Byzantine Machine Learning: A Primer. 169:1-169:39 - Adnan Qayyum
, Muhammad Atif Butt
, Hassan Ali
, Muhammad Usman
, Osama Halabi
, Ala I. Al-Fuqaha
, Qammer H. Abbasi
, Muhammad Ali Imran
, Junaid Qadir
:
Secure and Trustworthy Artificial Intelligence-extended Reality (AI-XR) for Metaverses. 170:1-170:38 - Mario Alfonso Prado-Romero
, Bardh Prenkaj
, Giovanni Stilo
, Fosca Giannotti
:
A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation, and Research Challenges. 171:1-171:37 - Zhijing Wan
, Zhixiang Wang
, CheukTing Chung
, Zheng Wang
:
A Survey of Dataset Refinement for Problems in Computer Vision Datasets. 172:1-172:34 - Qinghua Lu
, Liming Zhu
, Xiwei Xu
, Jon Whittle
, Didar Zowghi
, Aurelie Jacquet
:
Responsible AI Pattern Catalogue: A Collection of Best Practices for AI Governance and Engineering. 173:1-173:35 - Peiyu Xiong
, Michael Tegegn
, Jaskeerat Singh Sarin
, Shubhraneel Pal
, Julia Rubin
:
It Is All about Data: A Survey on the Effects of Data on Adversarial Robustness. 174:1-174:41 - Tarek Chaalan
, Shaoning Pang
, Joarder Kamruzzaman
, Iqbal Gondal
, Xuyun Zhang
:
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models. 175:1-175:39 - Jon Pérez-Cerrolaza, Jaume Abella, Markus Borg, Carlo Donzella, Jesús Cerquides, Francisco J. Cazorla, Cristofer Englund, Markus Tauber, George Nikolakopoulos, Jose Luis Flores:
Artificial Intelligence for Safety-Critical Systems in Industrial and Transportation Domains: A Survey. 176:1-176:40
- Chuanjun Zhao
, Meiling Wu
, Xinyi Yang
, Wenyue Zhang
, Shaoxia Zhang
, Suge Wang
, Deyu Li
:
A Systematic Review of Cross-Lingual Sentiment Analysis: Tasks, Strategies, and Prospects. 177:1-177:37 - Jiliang Zhang
, Congcong Chen
, Jinhua Cui
, Keqin Li
:
Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures. 178:1-178:40 - Jun Wook Heo
, Gowri Sankar Ramachandran
, Ali Dorri
, Raja Jurdak
:
Blockchain Data Storage Optimisations: A Comprehensive Survey. 179:1-179:27 - Cheng Zhang
, Bo Ou
, Fei Peng
, Yao Zhao
, Keqin Li
:
A Survey on Reversible Data Hiding for Uncompressed Images. 180:1-180:33 - Arian Bakhtiarnia
, Qi Zhang
, Alexandros Iosifidis
:
Efficient High-Resolution Deep Learning: A Survey. 181:1-181:35 - Andrey Antonio de O. Rodrigues
, Maria Lúcia Bento Villela
, Eduardo Feitosa
:
A Systematic Mapping Study on Social Network Privacy: Threats and Solutions. 182:1-182:29 - Kavous Salehzadeh Niksirat
, Lev Velykoivanenko
, Noé Zufferey
, Mauro Cherubini
, Kévin Huguenin
, Mathias Humbert
:
Wearable Activity Trackers: A Survey on Utility, Privacy, and Security. 183:1-183:40 - Leila Methnani
, Manolis Chiou
, Virginia Dignum
, Andreas Theodorou
:
Who's in Charge Here? A Survey on Trustworthy AI in Variable Autonomy Robotic Systems. 184:1-184:32 - Jiajia Wang
, Jimmy Xiangji Huang
, Xinhui Tu
, Junmei Wang
, Angela Jennifer Huang
, Md. Tahmid Rahman Laskar
, Amran Bhuiyan
:
Utilizing BERT for Information Retrieval: Survey, Applications, Resources, and Challenges. 185:1-185:33 - Ali Shahidinejad
, Jemal H. Abawajy
:
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT. 186:1-186:38 - Lihua Zhou
, Guowang Du
, Kevin Lü
, Lizhen Wang
, Jingwei Du
:
A Survey and an Empirical Evaluation of Multi-View Clustering Approaches. 187:1-187:38 - Yuyang Gao
, Siyi Gu
, Junji Jiang
, Sungsoo Ray Hong
, Dazhou Yu
, Liang Zhao
:
Going Beyond XAI: A Systematic Survey for Explanation-Guided Learning. 188:1-188:39 - Yang Liu
, Dingkang Yang
, Yan Wang
, Jing Liu
, Jun Liu
, Azzedine Boukerche
, Peng Sun
, Liang Song
:
Generalized Video Anomaly Event Detection: Systematic Taxonomy and Comparison of Deep Models. 189:1-189:38 - Luyao Yang
, Osama Amin
, Basem Shihada
:
Intelligent Wearable Systems: Opportunities and Challenges in Health and Sports. 190:1-190:42
Volume 56, Number 8, August 2024
- Yingxia Shao
, Hongzheng Li
, Xizhi Gu
, Hongbo Yin
, Yawen Li
, Xupeng Miao
, Wentao Zhang
, Bin Cui
, Lei Chen
:
Distributed Graph Neural Network Training: A Survey. 191:1-191:39 - Shashank Sheshar Singh
, Samya Muhuri
, Shivansh Mishra
, Divya Srivastava
, Harish Kumar Shakya
, Neeraj Kumar
:
Social Network Analysis: A Survey on Process, Tools, and Application. 192:1-192:39 - Ruchika Malhotra
, Anjali Bansal
, Marouane Kessentini
:
A Systematic Literature Review on Maintenance of Software Containers. 193:1-193:38 - Marco Kurzweg
, Yannick Weiss
, Marc O. Ernst
, Albrecht Schmidt
, Katrin Wolf
:
Survey on Haptic Feedback through Sensory Illusions in Interactive Systems. 194:1-194:39 - Jyothish Kumar J
, Subhankar Mishra
:
A Survey on Robotic Prosthetics: Neuroprosthetics, Soft Actuators, and Control Strategies. 195:1-195:44 - Saleh Mohamed Alhidaifi
, Muhammad Rizwan Asghar
, Imran Shafique Ansari
:
A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions. 196:1-196:48 - Karen Carrasco
, Lenin Tomalá
, Eileen Ramírez Meza
, Doris Meza Bolaños
, Washington Ramírez Montalvan
:
Computational Techniques in PET/CT Image Processing for Breast Cancer: A Systematic Mapping Review. 197:1-197:38 - Navin V. Keizer
, Onur Ascigil
, Michal Król
, Dirk Kutscher
, George Pavlou
:
A Survey on Content Retrieval on the Decentralised Web. 198:1-198:39 - Ying Zhao
, Jia Tina Du
, Jinjun Chen
:
Scenario-based Adaptations of Differential Privacy: A Technical Survey. 199:1-199:39 - Isabela Borlido Barcelos
, Felipe de Castro Belém
, Leonardo de Melo Joao
, Zenilton Kleber G. do Patrocínio Jr.
, Alexandre Xavier Falcão
, Silvio Jamil Ferzoli Guimarães
:
A Comprehensive Review and New Taxonomy on Superpixel Segmentation. 200:1-200:39 - Weiwei Jiang
, Jorge Gonçalves
, Vassilis Kostakos
:
Mobile Near-infrared Sensing - A Systematic Review on Devices, Data, Modeling, and Applications. 201:1-201:36 - Mariana Segovia-Ferreira
, Jose Rubio-Hernan
, Ana R. Cavalli
, Joaquín García-Alfaro
:
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. 202:1-202:37 - Bing Zhang
, Xuyang Zhao
, Jiangtian Nie
, Jianhang Tang
, Yuling Chen
, Yang Zhang
, Dusit Niyato
:
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective. 203:1-203:39 - Raza Nowrozy
, Khandakar Ahmed
, A. S. M. Kayes
, Hua Wang
, Timothy R. McIntosh
:
Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey. 204:1-204:37 - Sarah Elder
, Md. Rayhanur Rahman
, Gage Fringer, Kunal Kapoor
, Laurie A. Williams
:
A Survey on Software Vulnerability Exploitability Assessment. 205:1-205:41 - Andre Rodrigues Oliveira
, Klairton Lima Brito
, Alexsandro Oliveira Alexandrino
, Gabriel Siqueira
, Ulisses Dias
, Zanoni Dias
:
Rearrangement Distance Problems: An updated survey. 206:1-206:27 - Shubhra Jain
, Rahul Kumar Verma
:
A Taxonomy and Survey on Grid-Based Routing Protocols Designed for Wireless Sensor Networks. 207:1-207:41 - Tommaso Lanciano
, Atsushi Miyauchi
, Adriano Fazzone
, Francesco Bonchi
:
A Survey on the Densest Subgraph Problem and its Variants. 208:1-208:40 - Maroua Masmoudi
, Sana Ben Abdallah Ben Lamine
, Mohamed-Hedi Karray
, Bernard Archimède
, Hajer Baazaoui Zghal
:
Semantic Data Integration and Querying: A Survey and Challenges. 209:1-209:35 - Ahmed Amine Chafik
, Jaafar Gaber
, Souad Tayane
, Mohamed Ennaji
, Julien Bourgeois
, Tarek A. El-Ghazawi
:
From Conventional to Programmable Matter Systems: A Review of Design, Materials, and Technologies. 210:1-210:26 - Pengyuan Lu
, Lin Zhang
, Mengyu Liu
, Kaustubh Sridhar
, Oleg Sokolsky
, Fanxin Kong
, Insup Lee
:
Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory Works. 211:1-211:31 - Jason Gray
, Daniele Sgandurra
, Lorenzo Cavallaro
, Jorge Blasco Alís
:
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets. 212:1-212:36 - Akrati Saxena
, George Fletcher
, Mykola Pechenizkiy
:
FairSNA: Algorithmic Fairness in Social Network Analysis. 213:1-213:45 - Anna Angelogianni
, Ilias Politis
, Christos Xenakis
:
How many FIDO protocols are needed? Analysing the technology, security and compliance. 214:1-214:51 - Yazan Otoum
, Navya Gottimukkala
, Neeraj Kumar
, Amiya Nayak
:
Machine Learning in Metaverse Security: Current Solutions and Future Challenges. 215:1-215:36
Volume 56, Number 9, September 2024
- Fei Zhao
, Chengcui Zhang
, Baocheng Geng
:
Deep Multimodal Data Fusion. 216:1-216:36 - Navid Mohammadi Foumani
, Lynn Miller
, Chang Wei Tan
, Geoffrey I. Webb
, Germain Forestier
, Mahsa Salehi
:
Deep Learning for Time Series Classification and Extrinsic Regression: A Current Survey. 217:1-217:45 - Monowar Hasan
, Ashish Kashinath
, Chien-Ying Chen
, Sibin Mohan
:
SoK: Security in Real-Time Systems. 218:1-218:31 - Jasmina Gajcin
, Ivana Dusparic
:
Redefining Counterfactual Explanations for Reinforcement Learning: Overview, Challenges and Opportunities. 219:1-219:33 - Kelvin Du
, Frank Xing
, Rui Mao
, Erik Cambria
:
Financial Sentiment Analysis: Techniques and Applications. 220:1-220:42 - Na Li
, Rui Zhou
, Bharath Krishna
, Ashirbad Pradhan
, Hyowon Lee
, Jiayuan He
, Ning Jiang
:
Non-invasive Techniques for Muscle Fatigue Monitoring: A Comprehensive Survey. 221:1-221:40 - Cristian Daniele
, Seyed Behnam Andarzian
, Erik Poll
:
Fuzzers for Stateful Systems: Survey and Research Directions. 222:1-222:23 - Kien Nguyen Thanh
, Hugo Proença
, Fernando Alonso-Fernandez
:
Deep Learning for Iris Recognition: A Survey. 223:1-223:35 - Anita Khadka
, Saurav Sthapit
, Gregory Epiphaniou
, Carsten Maple
:
Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry. 224:1-224:29 - Shuai Huo
, Dong Liu
, Haotian Zhang
, Li Li
, Siwei Ma
, Feng Wu
, Wen Gao
:
Towards Hybrid-Optimization Video Coding. 225:1-225:36 - Najah Abed AbuAli
, Mubashir Rehman
, Shahid Mumtaz
, Muhammad Bilal Khan
, Mohammad Hayajneh
, Farman Ullah
, Raza Ali Shah
:
Contactless Diseases Diagnoses Using Wireless Communication Sensing: Methods and Challenges Survey. 226:1-226:29 - Upendra Singh
, Kumar Abhishek
, Hiteshwar Kumar Azad
:
A Survey of Cutting-edge Multimodal Sentiment Analysis. 227:1-227:38 - Shiyu Wang
, Yuanqi Du
, Xiaojie Guo
, Bo Pan
, Zhaohui S. Qin
, Liang Zhao
:
Controllable Data Generation by Deep Learning: A Review. 228:1-228:38 - Felix Truger
, Johanna Barzen
, Marvin Bechtold
, Martin Beisel
, Frank Leymann
, Alexander Mandl
, Vladimir Yussupov
:
Warm-Starting and Quantum Computing: A Systematic Mapping Study. 229:1-229:31 - Junyi Li
, Tianyi Tang
, Wayne Xin Zhao
, Jian-Yun Nie
, Ji-Rong Wen
:
Pre-Trained Language Models for Text Generation: A Survey. 230:1-230:39 - Ricardo Amaro
, Rúben Pereira
, Miguel Mira da Silva
:
DevOps Metrics and KPIs: A Multivocal Literature Review. 231:1-231:41 - Siwen Luo
, Hamish Ivison
, Soyeon Caren Han
, Josiah Poon
:
Local Interpretations for Explainable Natural Language Processing: A Survey. 232:1-232:36 - Saïma Sultana
, Muhammad Mansoor Alam
, Mazliham Mohd Su'ud
, Jawahir Che Mustapha Yusuf
, Mukesh Prasad
:
A Deep Dive into Robot Vision - An Integrative Systematic Literature Review Methodologies and Research Endeavor Practices. 233:1-233:33 - Laércio Pioli
, Douglas D. J. de Macedo
, Daniel G. Costa
, Mario A. R. Dantas
:
Intelligent Edge-powered Data Reduction: A Systematic Literature Review. 234:1-234:39 - Weiqi Li
:
Optimizing with Attractor: A Tutorial. 235:1-235:41 - Gyuwon Jung
, Sangjun Park
, Eun-Yeol Ma
, Heeyoung Kim
, Uichin Lee
:
Tutorial on Matching-based Causal Analysis of Human Behaviors Using Smartphone Sensor Data. 236:1-236:33 - A'aeshah Alhakamy
:
Extended Reality (XR) Toward Building Immersive Solutions: The Key to Unlocking Industry 4.0. 237:1-237:38 - Pau-Chen Cheng
, Wojciech Ozga
, Enriquillo Valdez
, Salman Ahmed
, Zhongshu Gu
, Hani Jamjoom
, Hubertus Franke
, James Bottomley
:
Intel TDX Demystified: A Top-Down Approach. 238:1-238:33 - Giovanni Maria Biancofiore
, Yashar Deldjoo
, Tommaso Di Noia
, Eugenio Di Sciascio
, Fedelucio Narducci
:
Interactive Question Answering Systems: Literature Review. 239:1-239:38 - Lingyun Wang
, Hanlin Zhou
, Yinwei Bao
, Xiaoran Yan
, Guojiang Shen
, Xiangjie Kong
:
Horizontal Federated Recommender System: A Survey. 240:1-240:42 - Priyanshu Priya
, Mauajama Firdaus
, Asif Ekbal
:
Computational Politeness in Natural Language Processing: A Survey. 241:1-241:42 - Minghui Xu
, Yihao Guo
, Chunchi Liu
, Qin Hu
, Dongxiao Yu
, Zehui Xiong
, Dusit Tao Niyato
, Xiuzhen Cheng
:
Exploring Blockchain Technology through a Modular Lens: A Survey. 242:1-242:39
Volume 56, Number 10, October 2024
- Jean-Gabriel Gaudreault
, Paula Branco
:
A Systematic Literature Review of Novelty Detection in Data Streams: Challenges and Opportunities. 243 - Huiyuan Lai
, Malvina Nissim
:
A Survey on Automatic Generation of Figurative Language: From Rule-based Systems to Large Language Models. 244 - Xiaojie Wang
, Qi Guo
, Zhaolong Ning
, Lei Guo
, Guoyin Wang
, Xinbo Gao
, Yan Zhang
:
Integration of Sensing, Communication, and Computing for Metaverse: A Survey. 245 - Alvaro Novo, Francisco Lobon, Héctor García de Marina, Samuel F. Romero, Francisco Barranco:
Neuromorphic Perception and Navigation for Mobile Robots: A Review. 246 - Meng Shen
, Zhehui Tan
, Dusit Niyato
, Yuzhi Liu
, Jiawen Kang
, Zehui Xiong
, Liehuang Zhu
, Wei Wang
, Xuemin (Sherman) Shen
:
Artificial Intelligence for Web 3.0: A Comprehensive Survey. 247 - Max Sponner
, Bernd Waschneck
, Akash Kumar
:
Adapting Neural Networks at Runtime: Current Trends in At-Runtime Optimizations for Deep Learning. 248 - Juncheng Li
, Zehua Pei
, Wenjie Li
, Guangwei Gao
, Longguang Wang
, Yingqian Wang
, Tieyong Zeng
:
A Systematic Survey of Deep Learning-Based Single-Image Super-Resolution. 249 - Hilda Hadan
, Lydia Choong
, Leah Zhang-Kennedy
, Lennart E. Nacke
:
Deceived by Immersion: A Systematic Analysis of Deceptive Design in Extended Reality. 250 - Muhammad Adil
, Houbing Song
, Mian Ahmad Jan
, Muhammad Khurram Khan
, Xiangjian He
, Ahmed Farouk
, Zhanpeng Jin
:
UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions. 251 - Yoosof Mashayekhi
, Nan Li
, Bo Kang
, Jefrey Lijffijt
, Tijl De Bie
:
A Challenge-based Survey of E-recruitment Recommendation Systems. 252 - Paul Kiyambu Mvula
, Paula Branco
, Guy-Vincent Jourdan
, Herna Lydia Viktor
:
A Survey on the Applications of Semi-supervised Learning to Cyber-security. 253 - Rita Suzana Pitangueira Maciel
, Pedro Henrique Dias Valle
, Kécia Souza Santana Santos
, Elisa Yumi Nakagawa
:
Systems Interoperability Types: A Tertiary Study. 254 - Gita Sarafraz
, Armin Behnamnia
, Mehran Hosseinzadeh
, Ali Balapour
, Amin Meghrazi
, Hamid R. Rabiee
:
Domain Adaptation and Generalization of Functional Medical Data: A Systematic Survey of Brain Data. 255 - Paulo Souza
, Tiago Ferreto
, Rodrigo N. Calheiros
:
Maintenance Operations on Cloud, Edge, and IoT Environments: Taxonomy, Survey, and Research Challenges. 256 - James Halvorsen
, Clemente Izurieta
, Haipeng Cai
, Assefaw Hadish Gebremedhin
:
Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review. 257 - Yanna Jiang
, Baihe Ma
, Xu Wang
, Guangsheng Yu
, Ping Yu
, Zhe Wang
, Wei Ni
, Ren Ping Liu
:
Blockchained Federated Learning for Internet of Things: A Comprehensive Survey. 258 - Vasileios Tsoukas
, Anargyros Gkogkidis
, Eleni Boumpa
, Athanasios Kakarountas
:
A Review on the emerging technology of TinyML. 259 - Mishri Saleh AlMarshoud
, Mehmet Sabir Kiraz
, Ali H. Al-Bayatti
:
Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions. 260 - Jiani Huang
, Haihua Chen
, Fengchang Yu
, Wei Lu
:
From Detection to Application: Recent Advances in Understanding Scientific Tables and Figures. 261 - Jiajun Wu
, Fan Dong
, Henry Leung
, Zhuangdi Zhu
, Jiayu Zhou
, Steve Drew
:
Topology-aware Federated Learning in Edge Computing: A Comprehensive Survey. 262 - Mostafa Haghir Chehreghani
:
A Review on the Impact of Data Representation on Model Explainability. 263 - Paul Pu Liang
, Amir Zadeh
, Louis-Philippe Morency
:
Foundations & Trends in Multimodal Machine Learning: Principles, Challenges, and Open Questions. 264 - Kartik Sharma
, Yeon-Chang Lee
, Sivagami Nambi
, Aditya Salian
, Shlok Shah
, Sang-Wook Kim
, Srijan Kumar
:
A Survey of Graph Neural Networks for Social Recommender Systems. 265 - Chamara Sandeepa
, Bartlomiej Siniarski
, Nicolas Kourtellis
, Shen Wang
, Madhusanka Liyanage
:
A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks. 266 - Hou-I Liu
, Marco Galindo
, Hongxia Xie
, Lai-Kuan Wong
, Hong-Han Shuai
, Yung-Hui Li
, Wen-Huang Cheng
:
Lightweight Deep Learning for Resource-Constrained Environments: A Survey. 267 - Shangsong Liang
, Zhou Pan
, Wei Liu
, Jian Yin
, Maarten de Rijke
:
A Survey on Variational Autoencoders in Recommender Systems. 268
Volume 56, Number 11, November 2024
- Jirat Pasuksmit
, Patanamon Thongtanunam
, Shanika Karunasekera
:
A Systematic Literature Review on Reasons and Approaches for Accurate Effort Estimations in Agile. 269:1-269:37 - Alexandre Heuillet
, Ahmad Nasser
, Hichem Arioui
, Hedi Tabia
:
Efficient Automation of Neural Network Design: A Survey on Differentiable Neural Architecture Search. 270:1-270:36 - Anthony Paproki
, Olivier Salvado
, Clinton Fookes
:
Synthetic Data for Deep Learning in Computer Vision & Medical Imaging: A Means to Reduce Data Bias. 271:1-271:37 - Carlos Núñez-Molina
, Pablo Mesejo
, Juan Fernández-Olivares
:
A Review of Symbolic, Subsymbolic and Hybrid Methods for Sequential Decision Making. 272:1-272:36 - Wanying Liang
, Pasquale De Meo
, Yong Tang
, Jia Zhu
:
A Survey of Multi-modal Knowledge Graphs: Technologies and Trends. 273:1-273:41 - Karolina Selwon
, Julian Szymanski
:
A Review of Explainable Fashion Compatibility Modeling Methods. 274:1-274:29 - Shashikiran Venkatesha
, Ranjani Parthasarathi
:
Survey on Redundancy Based-Fault tolerance methods for Processors and Hardware accelerators - Trends in Quantum Computing, Heterogeneous Systems and Reliability. 275:1-275:76 - Jordan Tewell
, Nimesha Ranasinghe
:
A Review of Olfactory Display Designs for Virtual Reality Environments. 276:1-276:35 - Maryam Mozaffari
, Anton Dignös
, Johann Gamper
, Uta Störl
:
Self-tuning Database Systems: A Systematic Literature Review of Automatic Database Schema Design and Tuning. 277:1-277:37 - Tristan Bilot
, Nour El Madhoun
, Khaldoun Al Agha
, Anis Zouaoui
:
A Survey on Malware Detection with Graph Representation Learning. 278:1-278:36 - Zhen Jia
, Zhang Zhang
, Liang Wang
, Tieniu Tan
:
Human Image Generation: A Comprehensive Survey. 279:1-279:39 - Ankur Gupta
, Sahil Sawhney
, Kashyap Kompella
:
The First Principles: Setting the Context for a Safe and Secure Metaverse. 280:1-280:29 - Fan Mo
, Zahra Tarkhani
, Hamed Haddadi
:
Machine Learning with Confidential Computing: A Systematization of Knowledge. 281:1-281:40 - Francesco Periti
, Stefano Montanelli
:
Lexical Semantic Change through Large Language Models: a Survey. 282:1-282:38 - Giorgio Franceschelli
, Mirco Musolesi
:
Creativity and Machine Learning: A Survey. 283:1-283:41 - Nilotpal Biswas
, Anamitra Mukherjee
, Samit Bhattacharya
:
"Are you feeling sick?" - A systematic literature review of cybersickness in virtual reality. 284:1-284:38 - Luís Meruje Ferreira, Fábio Coelho
, José Pereira
:
Databases in Edge and Fog Environments: A Survey. 285:1-285:40 - Behrouz Zolfaghari
, Mostafa Abbas Mollaei
, Fahimeh Hajizadeh
, Naoto Yanai
, Khodakhast Bibak
:
Secure UAV (Drone) and the Great Promise of AI. 286:1-286:37 - Adyasha Dash
, Kathleen Agres
:
AI-Based Affective Music Generation Systems: A Review of Methods and Challenges. 287:1-287:34 - Yiming Wang
, Bin Zhang
, Lamei Di
:
Research Progress of EEG-Based Emotion Recognition: A Survey. 288:1-288:49 - Jessica Woodgate
, Nirav Ajmeri
:
Macro Ethics Principles for Responsible AI Systems: Taxonomy and Directions. 289:1-289:37 - Debendra Das Sharma
, Robert Blankenship
, Daniel S. Berger
:
An Introduction to the Compute Express Link (CXL) Interconnect. 290:1-290:37 - Fabio De Sousa Ribeiro
, Kevin Duarte
, Miles Everett
, Georgios Leontidis
, Mubarak Shah
:
Object-centric Learning with Capsule Networks: A Survey. 291:1-291:291 - Katrin Hartwig
, Frédéric Doell, Christian Reuter
:
The Landscape of User-centered Misinformation Interventions - A Systematic Literature Review. 292:1-292:36 - Xiaoyan Zhao
, Yang Deng
, Min Yang
, Lingzhi Wang
, Rui Zhang
, Hong Cheng
, Wai Lam
, Ying Shen
, Ruifeng Xu
:
A Comprehensive Survey on Relation Extraction: Recent Advances and New Frontiers. 293:1-293:39
Volume 56, Number 12, December 2024
- Hassan Gharoun
, Fereshteh Momenifar
, Fang Chen
, Amir H. Gandomi
:
Meta-learning Approaches for Few-Shot Learning: A Survey of Recent Advances. 294:1-294:41 - Shijie Chen
, Yu Zhang
, Qiang Yang:
Multi-Task Learning in Natural Language Processing: An Overview. 295:1-295:32 - Jiaxu Leng
, Yongming Ye
, Mengjingcheng Mo
, Chenqiang Gao
, Ji Gan
, Bin Xiao
, Xinbo Gao
:
Recent Advances for Aerial Object Detection: A Survey. 296:1-296:36 - Bruce X. B. Yu
, Jianlong Chang
, Haixin Wang
, Lingbo Liu
, Shijie Wang
, Zhiyu Wang
, Junfan Lin
, Lingxi Xie
, Haojie Li
, Zhouchen Lin
, Qi Tian
, Chang Wen Chen
:
Visual Tuning. 297:1-297:38 - Wei Liang
, Yaqin Liu
, Ce Yang
, Songyou Xie
, Kuanching Li
, Willy Susilo
:
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey. 298:1-298:35 - Zain Ul Abideen
, Sumathi Gokulanathan
, Muayad J. Aljafar
, Samuel Pagliarini
:
An Overview of FPGA-inspired Obfuscation Techniques. 299:1-299:35 - Jacob Krüger
, Yi Li
, Kirill Lossev
, Chenguang Zhu
, Marsha Chechik
, Thorsten Berger
, Julia Rubin
:
A Meta-Study of Software-Change Intentions. 300:1-300:41 - Katie Seaborn
, Jacqueline Urakami
, Peter Pennefather
, Norihisa Miyake
:
Qualitative Approaches to Voice UX. 301:1-301:34 - Agnaldo de Souza Batista
, Aldri Luiz dos Santos
:
A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques. 302:1-302:36 - Raphael Elikplim Nkrow
, Bruno Silva
, Dutliff Boshoff
, Gerhard P. Hancke
, Mikael Gidlund
, Adnan M. Abu-Mahfouz
:
NLOS Identification and Mitigation for Time-based Indoor Localization Systems: Survey and Future Research Directions. 303:1-303:41 - Fei Yu
, Hongbo Zhang
, Prayag Tiwari
, Benyou Wang
:
Natural Language Reasoning, A Survey. 304:1-304:39 - Mahmoud SalahEldin Kasem, Abdelrahman Abdallah, Alexander Berendeyev
, Ebrahem Elkady, Mohamed Mahmoud, Mahmoud Abdalla, Mohamed Hamada, Sebastiano Vascon, Daniyar B. Nurseitov, Islam Taj-Eddin
:
Deep Learning for Table Detection and Structure Recognition: A Survey. 305:1-305:41 - Shaoxiong Ji
, Xiaobo Li
, Wei Sun
, Hang Dong
, Ara Taalas
, Yijia Zhang
, Honghan Wu
, Esa Pitkänen
, Pekka Marttinen
:
A Unified Review of Deep Learning for Automated Medical Coding. 306:1-306:41 - Huandong Wang
, Huan Yan
, Can Rong
, Yuan Yuan
, Fenyu Jiang
, Zhenyu Han
, Hongjie Sui
, Depeng Jin
, Yong Li
:
Multi-scale Simulation of Complex Systems: A Perspective of Integrating Knowledge and Data. 307:1-307:38 - Nirupama Ravi
, C. Mani Krishna
, Israel Koren
:
Mix-Zones as an Effective Privacy Enhancing Technique in Mobile and Vehicular Ad-hoc Networks. 308:1-308:33 - Yao Wan
, Zhangqian Bi
, Yang He
, Jianguo Zhang
, Hongyu Zhang
, Yulei Sui
, Guandong Xu
, Hai Jin
, Philip S. Yu
:
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit. 309:1-309:41 - Pietro Melzi
, Christian Rathgeb
, Ruben Tolosana
, Rubén Vera-Rodríguez
, Christoph Busch
:
An Overview of Privacy-Enhancing Technologies in Biometric Recognition. 310:1-310:28 - Lianying Zhao
, He Shuang
, Shengjie Xu
, Wei Huang
, Rongzhen Cui
, Pushkar Bettadpur
, David Lie
:
A Survey of Hardware Improvements to Secure Program Execution. 311:1-311:37 - Sahil Verma
, Varich Boonsanong
, Minh Hoang
, Keegan Hines
, John Dickerson
, Chirag Shah
:
Counterfactual Explanations and Algorithmic Recourses for Machine Learning: A Review. 312:1-312:42 - Miguel G. Silva
, Sara C. Madeira
, Rui Henriques
:
A Comprehensive Survey on Biclustering-based Collaborative Filtering. 313:1-313:32 - Mohd Saqib
, Samaneh Mahdavifar
, Benjamin C. M. Fung
, Philippe Charland
:
A Comprehensive Analysis of Explainable AI for Malware Hunting. 314:1-314:40 - Uchitha Rajapaksha
, Ferdous Sohel
, Hamid Laga
, Dean Diepeveen
, Mohammed Bennamoun
:
Deep Learning-based Depth Estimation Methods from Monocular Image and Videos: A Comprehensive Survey. 315:1-315:51 - Junxue Zhang
, Xiaodian Cheng
, Liu Yang
, Jinbin Hu
, Ximeng Liu
, Kai Chen
:
SoK: Fully Homomorphic Encryption Accelerators. 316:1-316:32 - Yuecong Xu
, Haozhi Cao
, Lihua Xie
, Xiao-Li Li
, Zhenghua Chen
, Jianfei Yang
:
Video Unsupervised Domain Adaptation with Deep Learning: A Comprehensive Survey. 317:1-317:36 - Hannes Mandler
, Bernhard Weigand
:
A review and benchmark of feature importance methods for neural networks. 318:1-318:30 - Jingxue Chen
, Hang Yan
, Zhiyuan Liu
, Min Zhang
, Hu Xiong
, Shui Yu
:
When Federated Learning Meets Privacy-Preserving Computation. 319:1-319:36

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.