default search action
ACM Computing Surveys, Volume 54
Volume 54, Number 1, January 2022
- Miljana Mladenovic, Vera Osmjanski, Stasa Vujicic Stankovic:
Cyber-aggression, Cyberbullying, and Cyber-grooming: A Survey and Research Challenges. 1:1-1:42 - Avani Vyas, Sujata Pal, Barun Kumar Saha:
Relay-based Communications in WBANs: A Comprehensive Survey. 2:1-2:34 - Ángel Jesús Varela-Vaca, Antonia M. Reina Quintero:
Smart Contract Languages: A Multivocal Mapping Study. 3:1-3:38 - Hongbo Jiang, Jie Li, Ping Zhao, Fanzi Zeng, Zhu Xiao, Arun Iyengar:
Location Privacy-preserving Mechanisms in Location-based Services: A Comprehensive Survey. 4:1-4:36 - Christopher Wright, William A. Moeglein, Saurabh Bagchi, Milind Kulkarni, Abraham A. Clements:
Challenges in Firmware Re-Hosting, Emulation, and Analysis. 5:1-5:36 - Renjie Gu, Chaoyue Niu, Fan Wu, Guihai Chen, Chun Hu, Chengfei Lyu, Zhihua Wu:
From Server-Based to Client-Based Machine Learning: A Comprehensive Survey. 6:1-6:36 - Yisroel Mirsky, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. 7:1-7:41 - Joan Boyar, Lene M. Favrholdt, Kim S. Larsen:
Relative Worst-order Analysis: A Survey. 8:1-8:21 - Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Lattice-based Key-sharing Schemes: A Survey. 9:1-9:39 - Behroz Mirza, Tahir Q. Syed, Behraj Khan, Muhammad Yameen Malik:
Potential Deep Learning Solutions to Persistent and Emerging Big Data Challenges - A Practitioners' Cookbook. 10:1-10:39 - Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez, Michael Taynnan Barros, Sasitharan Balasubramaniam:
Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges. 11:1-11:35 - Leah Zhang-Kennedy, Sonia Chiasson:
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education. 12:1-12:39 - Shengming Jiang:
Networking in Oceans: A Survey. 13:1-13:33 - Weitao Xu, Junqing Zhang, Shunqi Huang, Chengwen Luo, Wei Li:
Key Generation for Internet of Things: A Contemporary Survey. 14:1-14:37 - Paolo Bellavista, Luca Foschini, Alessio Mora:
Decentralised Learning in Federated Deployment Environments: A System-Level Survey. 15:1-15:38 - Zarin Tasnim Sandhie, Jill Arvindbhai Patel, Farid Uddin Ahmed, Masud H. Chowdhury:
Investigation of Multiple-valued Logic Technologies for Beyond-binary Era. 16:1-16:30 - Rayan Chikhi, Jan Holub, Paul Medvedev:
Data Structures to Represent a Set of k-long DNA Sequences. 17:1-17:22 - Víctor Adrián Sosa-Hernández, Raúl Monroy, Miguel Angel Medina-Pérez, Octavio Loyola-González, Francisco Herrera:
A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities. 18:1-18:38 - Stefano Mariani, Giacomo Cabri, Franco Zambonelli:
Coordination of Autonomous Vehicles: Taxonomy and Survey. 19:1-19:33 - Zara Nasar, Syed Waqar Jaffry, Muhammad Kamran Malik:
Named Entity Recognition and Relation Extraction: State-of-the-Art. 20:1-20:39 - Emad Aliwa, Omer F. Rana, Charith Perera, Peter Burnap:
Cyberattacks and Countermeasures for In-Vehicle Networks. 21:1-21:37 - Bosheng Song, Kenli Li, David Orellana-Martín, Mario J. Pérez-Jiménez, Ignacio Pérez-Hurtado:
A Survey of Nature-Inspired Computing: Membrane Computing. 22:1-22:31 - Anna Minaeva, Zdenek Hanzálek:
Survey on Periodic Scheduling for Time-triggered Hard Real-time Systems. 23:1-23:32 - Tobias Distler:
Byzantine Fault-tolerant State-machine Replication from a Systems Perspective. 24:1-24:38
Volume 54, Number 2, March 2022
- Abdullah Qasem, Paria Shirani, Mourad Debbabi, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. 25:1-25:42 - Fan Zhou, Xovee Xu, Goce Trajcevski, Kunpeng Zhang:
A Survey of Information Cascade Analysis: Models, Predictions, and Recent Advances. 27:1-27:36 - Pedro Ribeiro, Pedro Paredes, Miguel E. P. Silva, David Aparício, Fernando M. A. Silva:
A Survey on Subgraph Counting: Concepts, Algorithms, and Applications to Network Motifs and Graphlets. 28:1-28:36 - Azzedine Boukerche, Hou Zhijun:
Object Detection Using Deep Learning Methods in Traffic Scenarios. 30:1-30:35 - Bo Liu, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi, Zihuai Lin:
When Machine Learning Meets Privacy: A Survey and Outlook. 31:1-31:36 - Chenning Li, Zhichao Cao, Yunhao Liu:
Deep AI Enabled Ubiquitous Wireless Sensing: A Survey. 32:1-32:35 - Kelsey Harley, Rodney Cooper:
Information Integrity: Are We There Yet? 33:1-33:35 - El-Ghazali Talbi:
Automated Design of Deep Neural Networks: A Survey and Unified Taxonomy. 34:1-34:37 - Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra:
A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks. 35:1-35:38 - Sarra Bouhenni, Saïd Yahiaoui, Nadia Nouali-Taboudjemat, Hamamache Kheddouci:
A Survey on Distributed Graph Pattern Matching in Massive Graphs. 36:1-36:35 - Zhengwei Wang, Qi She, Tomás E. Ward:
Generative Adversarial Networks in Computer Vision: A Survey and Taxonomy. 37:1-37:38 - Guansong Pang, Chunhua Shen, Longbing Cao, Anton van den Hengel:
Deep Learning for Anomaly Detection: A Review. 38:1-38:38 - Sheng Wang, Zhifeng Bao, J. Shane Culpepper, Gao Cong:
A Survey on Trajectory Data Management, Analytics, and Learning. 39:1-39:36 - Christian Meurisch, Max Mühlhäuser:
Data Protection in AI Services: A Survey. 40:1-40:38 - Dhivya Chandrasekaran, Vijay Mago:
Evolution of Semantic Similarity - A Survey. 41:1-41:37 - Xiaoxue Chen, Lianwen Jin, Yuanzhi Zhu, Canjie Luo, Tianwei Wang:
Text Recognition in the Wild: A Survey. 42:1-42:35 - Suha Al-Thanyyan, Aqil M. Azmi:
Automated Text Simplification: A Survey. 43:1-43:36 - Huawei Huang, Wei Kong, Sicong Zhou, Zibin Zheng, Song Guo:
A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools. 44:1-44:42 - Sameen Maruf, Fahimeh Saleh, Gholamreza Haffari:
A Survey on Document-level Neural Machine Translation: Methods and Evaluation. 45:1-45:36 - Arlino Magalhães, José Maria Monteiro, Angelo Brayner:
Main Memory Database Recovery: A Survey. 46:1-46:36
Volume 54, Number 3, April 2022
- Mohammed Hassanin, Salman H. Khan, Murat Tahtali:
Visual Affordance and Function Understanding: A Survey. 47:1-47:35 - Matteo Magnani, Obaida Hanteer, Roberto Interdonato, Luca Rossi, Andrea Tagarelli:
Community Detection in Multiplex Networks. 48:1-48:35 - Clayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro:
Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications. 49:1-49:38 - Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration: A Review. 50:1-50:47 - Irfan Ul Haq, Juan Caballero:
A Survey of Binary Code Similarity. 51:1-51:38 - Shyamali Mitra, Nibaran Das, Soumyajyoti Dey, Sukanta Chakraborty, Mita Nasipuri, Mrinal Kanti Naskar:
Cytology Image Analysis Techniques Toward Automation: Systematically Revisited. 52:1-52:41 - Ilona Bluemke, Agnieszka Malanowska:
Software Testing Effort Estimation and Related Problems: A Systematic Literature Review. 53:1-53:38 - Wenjie Xiong, Jakub Szefer:
Survey of Transient Execution Attacks and Their Mitigations. 54:1-54:36 - Liping Zhao, Waad Alhoshan, Alessio Ferrari, Keletso J. Letsholo, Muideen A. Ajagbe, Erol-Valeriu Chioasca, Riza Theresa Batista-Navarro:
Natural Language Processing for Requirements Engineering: A Systematic Mapping Study. 55:1-55:41 - Ane Blázquez-García, Angel Conde, Usue Mori, José Antonio Lozano:
A Review on Outlier/Anomaly Detection in Time Series Data. 56:1-56:33 - Syed Wasif Abbas Hamdani, Haider Abbas, Abdul Rehman Janjua, Waleed Bin Shahid, Muhammad Faisal Amjad, Jahanzaib Malik, Malik Hamza Murtaza, Mohammed Atiquzzaman, Abdul Waheed Khan:
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons. 57:1-57:36 - Xi Li, Zehua Wang, Victor C. M. Leung, Hong Ji, Yiming Liu, Heli Zhang:
Blockchain-empowered Data-driven Networks: A Survey and Outlook. 58:1-58:38 - Petr Spelda, Vit Stritecky:
Human Induction in Machine Learning: A Survey of the Nexus. 59:1-59:18 - Jun Huang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Min Luo, Kim-Kwang Raymond Choo:
The Application of the Blockchain Technology in Voting Systems: A Review. 60:1-60:28 - Boubakr Nour, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, Hassine Moungla:
Access Control Mechanisms in Named Data Networks: A Comprehensive Survey. 61:1-61:35 - Shervin Minaee, Nal Kalchbrenner, Erik Cambria, Narjes Nikzad, Meysam Chenaghlu, Jianfeng Gao:
Deep Learning-based Text Classification: A Comprehensive Review. 62:1-62:40 - Divya Saxena, Jiannong Cao:
Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions. 63:1-63:42 - Zhabiz Gharibshah, Xingquan Zhu:
User Response Prediction in Online Advertising. 64:1-64:43 - Gilberto Astolfi, Fábio Prestes Cesar Rezende, João Vitor de Andrade Porto, Edson Takashi Matsubara, Hemerson Pistori:
Syntactic Pattern Recognition in Computer Vision: A Systematic Review. 65:1-65:35 - Blesson Varghese, Nan Wang, David Bermbach, Cheol-Ho Hong, Eyal de Lara, Weisong Shi, Christopher Stewart:
A Survey on Edge Performance Benchmarking. 66:1-66:33 - Danilo Avola, Luigi Cinque, Alessio Fagioli, Gian Luca Foresti, Alessio Mecca:
Ultrasound Medical Imaging Techniques: A Survey. 67:1-67:38 - Khan Muhammad, Mohammad S. Obaidat, Tanveer Hussain, Javier Del Ser, Neeraj Kumar, Muhammad Tanveer, Faiyaz Doctor:
Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions. 68:1-68:33 - Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil:
Social Media Identity Deception Detection: A Survey. 69:1-69:35
Volume 54, Number 4, May 2022
- Felipe L. Gewers, Gustavo R. Ferreira, Henrique Ferraz de Arruda, Filipi Nascimento Silva, Cesar H. Comin, Diego R. Amancio, Luciano da Fontoura Costa:
Principal Component Analysis: A Natural Approach to Data Exploration. 70:1-70:34 - Aidan Hogan, Eva Blomqvist, Michael Cochez, Claudia d'Amato, Gerard de Melo, Claudio Gutierrez, Sabrina Kirrane, José Emilio Labra Gayo, Roberto Navigli, Sebastian Neumaier, Axel-Cyrille Ngonga Ngomo, Axel Polleres, Sabbir M. Rashid, Anisa Rula, Lukas Schmelzeisen, Juan F. Sequeda, Steffen Staab, Antoine Zimmermann:
Knowledge Graphs. 71:1-71:37 - Wen-Huang Cheng, Sijie Song, Chieh-Yun Chen, Shintami Chusnul Hidayati, Jiaying Liu:
Fashion Meets Computer Vision: A Survey. 72:1-72:41 - Rob Dunne, Tim Morris, Simon Harper:
A Survey of Ambient Intelligence. 73:1-73:27 - Hussain Mohammed Dipu Kabir, Abbas Khosravi, Subrota Kumar Mondal, Mustaneer Rahman, Saeid Nahavandi, Rajkumar Buyya:
Uncertainty-aware Decisions in Cloud Computing: Foundations and Future Directions. 74:1-74:30 - Fei Chen, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, Hong Linh Truong:
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications. 75:1-75:36 - Pengzhen Ren, Yun Xiao, Xiaojun Chang, Poyao Huang, Zhihui Li, Xiaojiang Chen, Xin Wang:
A Comprehensive Survey of Neural Architecture Search: Challenges and Solutions. 76:1-76:34 - Kaixuan Chen, Dalin Zhang, Lina Yao, Bin Guo, Zhiwen Yu, Yunhao Liu:
Deep Learning for Sensor-based Human Activity Recognition: Overview, Challenges, and Opportunities. 77:1-77:40 - Daniel Russo, Klaas-Jan Stol:
PLS-SEM for Software Engineering Research: An Introduction and Survey. 78:1-78:38 - Abdus Salam, Rolf Schwitter, Mehmet A. Orgun:
Probabilistic Rule Learning Systems: A Survey. 79:1-79:16 - Elena Almaraz Luengo, Luis Javier García-Villalba:
Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes. 80:1-80:34 - Katie Seaborn, Norihisa P. Miyake, Peter Pennefather, Mihoko Otake-Matsuura:
Voice in Human-Agent Interaction: A Survey. 81:1-81:43 - Oliver Michel, Roberto Bifulco, Gábor Rétvári, Stefan Schmid:
The Programmable Data Plane: Abstractions, Architectures, Algorithms, and Applications. 82:1-82:36 - Wei Hu, Armaiti Ardeshiricham, Ryan Kastner:
Hardware Information Flow Tracking. 83:1-83:39 - Azzedine Boukerche, Xiren Ma:
Vision-based Autonomous Vehicle Recognition: A New Challenge for Deep Learning-based Systems. 84:1-84:37 - Bekir Afsar, Kaisa Miettinen, Francisco Ruiz:
Assessing the Performance of Interactive Multiobjective Optimization Methods: A Survey. 85:1-85:27 - Nikhil Tripathi, Neminath Hubballi:
Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey. 86:1-86:33 - Yunbo Tang, Dan Chen, Xiaoli Li:
Dimensionality Reduction Methods for Brain Imaging Data Analysis. 87:1-87:36 - Matteo Ridolfi, Abdil Kaya, Rafael Berkvens, Maarten Weyn, Wout Joseph, Eli De Poorter:
Self-calibration and Collaborative Localization for UWB Positioning Systems: A Survey and Future Research Directions. 88:1-88:27 - Nuno Laranjeiro, João Agnelo, Jorge Bernardino:
A Systematic Review on Software Robustness Assessment. 89:1-89:65 - Boyuan Chen, Zhen Ming (Jack) Jiang:
A Survey of Software Log Instrumentation. 90:1-90:34 - Varsha S. Lalapura, Joseph Amudha, Hariramn Selvamuruga Satheesh:
Recurrent Neural Networks for Edge Intelligence: A Survey. 91:1-91:38
Volume 54, Number 5, June 2022
- Antonia Bertolino, Pietro Braione, Guglielmo De Angelis, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Mauro Pezzè, Roberto Pietrantuono, Stefano Russo, Paolo Tonella:
A Survey of Field-based Testing Techniques. 92:1-92:39 - Jean-Michel Bruel, Sophie Ebersold, Florian Galinier, Manuel Mazzara, Alexandr Naumchev, Bertrand Meyer:
The Role of Formalism in System Requirements. 93:1-93:36 - Liang Zhao:
Event Prediction in the Big Data Era: A Systematic Survey. 94:1-94:37 - Sin Kit Lo, Qinghua Lu, Chen Wang, Hye-Young Paik, Liming Zhu:
A Systematic Literature Review on Federated Machine Learning: From a Software Engineering Perspective. 95:1-95:39 - Abdulaziz Alashaikh, Eisa Alanazi, Ala I. Al-Fuqaha:
A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers. 96:1-96:39 - Xing Huang, Tsung-Yi Ho, Wenzhong Guo, Bing Li, Krishnendu Chakrabarty, Ulf Schlichtmann:
Computer-aided Design Techniques for Flow-based Microfluidic Lab-on-a-chip Systems. 97:1-97:29 - Jana Dunfield, Neel Krishnaswami:
Bidirectional Typing. 98:1-98:38 - Mohanad Abukmeil, Stefano Ferrari, Angelo Genovese, Vincenzo Piuri, Fabio Scotti:
A Survey of Unsupervised Generative Models for Exploratory Data Analysis and Representation Learning. 99:1-99:40 - Adilla Susungi, Claude Tadonki:
Intermediate Representations for Explicitly Parallel Programs. 100:1-100:24 - Subodha Charles, Prabhat Mishra:
A Survey of Network-on-Chip Security Attacks and Countermeasures. 101:1-101:36 - Atheer Aljeraisy, Masoud Barati, Omer F. Rana, Charith Perera:
Privacy Laws and Privacy by Design Schemes for the Internet of Things: A Developer's Perspective. 102:1-102:38 - Arwa Al-Hussain, Aqil M. Azmi:
Automatic Story Generation: A Survey of Approaches. 103:1-103:38 - Marie Al-Ghossein, Talel Abdessalem, Anthony Barré:
A Survey on Stream-Based Recommender Systems. 104:1-104:36 - Dietmar Jannach, Ahtsham Manzoor, Wanling Cai, Li Chen:
A Survey on Conversational Recommender Systems. 105:1-105:36 - Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. 106:1-106:36 - Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar:
Survey on Blockchain Networking: Context, State-of-the-Art, Challenges. 107:1-107:34 - Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. 108:1-108:36 - Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan, Chai Quek:
Hierarchical Reinforcement Learning: A Comprehensive Survey. 109:1-109:35 - Vimal Kumar Dwivedi, Vishwajeet Pattanaik, Vipin Deval, Abhishek Dixit, Alex Norta, Dirk Draheim:
Legally Enforceable Smart-Contract Languages: A Systematic Literature Review. 110:1-110:34 - Rob Ashmore, Radu Calinescu, Colin Paterson:
Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges. 111:1-111:39
Volume 54, Number 6, July 2022
- Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch:
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT. 112:1-112:38 - Eman Badr:
Images in Space and Time: Real Big Data in Healthcare. 113:1-113:38 - Swati Jaiswal, Uday P. Khedker, Alan Mycroft:
A Unified Model for Context-Sensitive Program Analyses: : The Blind Men and the Elephant. 114:1-114:37 - Ninareh Mehrabi, Fred Morstatter, Nripsuta Saxena, Kristina Lerman, Aram Galstyan:
A Survey on Bias and Fairness in Machine Learning. 115:1-115:35 - Harley Vera Olivera, Guo RuiZhe, Ruben Cruz Huacarpuma, Ana Paula Bernardi da Silva, Ari Melo Mariano, Maristela Holanda:
Data Modeling and NoSQL Databases - A Systematic Mapping Review. 116:1-116:26 - Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. 117:1-117:36 - Ratnabali Pal, Arif Ahmed Sekh, Debi Prosad Dogra, Samarjit Kar, Partha Pratim Roy, Dilip K. Prasad:
Topic-based Video Analysis: A Survey. 118:1-118:34 - Andreia P. Guerreiro, Carlos M. Fonseca, Luís Paquete:
The Hypervolume Indicator: Computational Problems and Algorithms. 119:1-119:42 - Yuta Itoh, Tobias Langlotz, Jonathan Sutton, Alexander Plopski:
Towards Indistinguishable Augmented Reality: A Survey on Optical See-through Head-mounted Displays. 120:1-120:36 - Bilal Rauf, Haider Abbas, Muhammad Usman, Tanveer A. Zia, Waseem Iqbal, Yawar Abbas Bangash, Hammad Afzal:
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks. 121:1-121:36 - Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang:
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography. 122:1-122:37 - Eva Papadogiannaki, Sotiris Ioannidis:
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. 123:1-123:35 - Thi Tuyet Hai Nguyen, Adam Jatowt, Mickaël Coustaty, Antoine Doucet:
Survey of Post-OCR Processing Approaches. 124:1-124:37 - Panagiotis Oikonomou, Anna Karanika, Christos Anagnostopoulos, Kostas Kolomvatsos:
On the Use of Intelligent Models towards Meeting the Challenges of the Edge Mesh. 125:1-125:42 - Shufan Fei, Zheng Yan, Wenxiu Ding, Haomeng Xie:
Security Vulnerabilities of SGX and Countermeasures: A Survey. 126:1-126:36 - Sindhu Padakandla:
A Survey of Reinforcement Learning Algorithms for Dynamically Varying Environments. 127:1-127:25 - Pádraig Cunningham, Sarah Jane Delany:
k-Nearest Neighbour Classifiers - A Tutorial. 128:1-128:25 - El-Ghazali Talbi:
Machine Learning into Metaheuristics: A Survey and Taxonomy. 129:1-129:32 - Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, Michael R. Lyu:
A Survey on Automated Log Analysis for Reliability Engineering. 130:1-130:37 - Xuefei Yin, Yanming Zhu, Jiankun Hu:
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. 131:1-131:36 - Zhipeng Cai, Zuobin Xiong, Honghui Xu, Peng Wang, Wei Li, Yi Pan:
Generative Adversarial Networks: A Survey Toward Private and Secure Applications. 132:1-132:38 - Azzedine Boukerche, Mingzhi Sha:
Design Guidelines on Deep Learning-based Pedestrian Detection Methods for Supporting Autonomous Vehicles. 133:1-133:36
- Thomas Plötz:
Applying Machine Learning for Sensor Data Analysis in Interactive Systems: Common Pitfalls of Pragmatic Use and Ways to Avoid Them. 134:1-134:25
Volume 54, Number 7, September 2022
- Ankur Lohachab, Saurabh Garg, Byeong Kang, Muhammad Bilal Amin, Junmin Lee, Shiping Chen, Xiwei Xu:
Towards Interconnected Blockchains: A Comprehensive Review of the Role of Interoperability among Disparate Blockchains. 135:1-135:39 - Lefeng Zhang, Tianqing Zhu, Ping Xiong, Wanlei Zhou, Philip S. Yu:
More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design. 136:1-136:37 - Michael Braun, Florian Weber, Florian Alt:
Affective Automotive User Interfaces-Reviewing the State of Driver Affect Research and Emotion Regulation in the Car. 137:1-137:26 - Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem:
Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT. 138:1-138:34 - Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. 139:1-139:36 - Luciano Ignaczak, Guilherme Goldschmidt, Cristiano André da Costa, Rodrigo da Rosa Righi:
Text Mining in Cybersecurity: A Systematic Literature Review. 140:1-140:36 - Tharindu Fernando, Harshala Gammulle, Simon Denman, Sridha Sridharan, Clinton Fookes:
Deep Learning for Medical Anomaly Detection - A Survey. 141:1-141:37 - Salonik Resch, Ulya R. Karpuzcu:
Benchmarking Quantum Computers and the Impact of Quantum Noise. 142:1-142:35 - Hugo Brito Lima, Carlos Gustavo Resque dos Santos, Bianchi Serique Meiguins:
A Survey of Music Visualization Techniques. 143:1-143:29 - Yohan Bonescki Gumiel, Lucas Emanuel Silva e Oliveira, Vincent Claveau, Natalia Grabar, Emerson Cabrera Paraiso, Claudia Maria Cabral Moro Barra, Deborah Ribeiro Carvalho:
Temporal Relation Extraction in Clinical Texts: A Systematic Review. 144:1-144:36 - Uttam Chauhan, Apurva Shah:
Topic Modeling Using Latent Dirichlet allocation: A Survey. 145:1-145:35 - Lynda Tamine, Lorraine Goeuriot:
Semantic Information Retrieval on Medical Texts: Research Challenges, Survey, and Open Issues. 146:1-146:38 - Christian Berger, Philipp Eichhammer, Hans P. Reiser, Jörg Domaschka, Franz J. Hauck, Gerhard Habiger:
A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms. 147:1-147:39 - Palina Tolmach, Yi Li, Shangwei Lin, Yang Liu, Zengxiang Li:
A Survey of Smart Contract Formal Specification and Verification. 148:1-148:38 - Jihyeok Park, Hongki Lee, Sukyoung Ryu:
A Survey of Parametric Static Analysis. 149:1-149:37 - Douglas Paulo de Mattos, Débora C. Muchaluat-Saade, Gheorghita Ghinea:
Beyond Multimedia Authoring: On the Need for Mulsemedia Authoring Tools. 150:1-150:31 - Jie Zhang, Zhihao Qu, Chenxi Chen, Haozhao Wang, Yufeng Zhan, Baoliu Ye, Song Guo:
Edge Learning: The Enabling Technology for Distributed Big Data Analytics in the Edge. 151:1-151:36 - Alexandro Baldassin, João Barreto, Daniel Castro, Paolo Romano:
Persistent Memory: A Survey of Programming Support and Implementations. 152:1-152:37 - Julio Juárez, Cipriano (Pano) Santos, Carlos A. Brizuela:
A Comprehensive Review and a Taxonomy Proposal of Team Formation Problems. 153:1-153:33 - Shoujin Wang, Longbing Cao, Yan Wang, Quan Z. Sheng, Mehmet A. Orgun, Defu Lian:
A Survey on Session-based Recommender Systems. 154:1-154:38 - Nathan Magrofuoco, Paolo Roselli, Jean Vanderdonckt:
Two-dimensional Stroke Gesture Recognition: A Survey. 155:1-155:36 - Djalel Chefrour:
One-Way Delay Measurement From Traditional Networks to SDN: A Survey. 156:1-156:35
Volume 54, Number 8, November 2022
- Abdul Jabbar, Xi Li, Bourahla Omar:
A Survey on Generative Adversarial Networks: Variants, Applications, and Training. 157:1-157:49 - Jianguo Chen, Kenli Li, Zhaolei Zhang, Keqin Li, Philip S. Yu:
A Survey on Applications of Artificial Intelligence in Fighting Against COVID-19. 158:1-158:32 - Xingwei Zhang, Xiaolong Zheng, Wenji Mao:
Adversarial Perturbation Defense on Deep Neural Networks. 159:1-159:36 - Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. 160:1-160:36 - Akbar Telikani, Amirhessam Tahmassebi, Wolfgang Banzhaf, Amir H. Gandomi:
Evolutionary Machine Learning: A Survey. 161:1-161:35 - Weijia Zhang, Jiuyong Li, Lin Liu:
A Unified Survey of Treatment Effect Heterogeneity Modelling and Uplift Modelling. 162:1-162:36 - Vinicius Costa de Souza, Anderson Maciel, Luciana Porcher Nedel, Regis Kopper:
Measuring Presence in Virtual Environments: A Survey. 163:1-163:37 - Gopika Ajaykumar, Maureen Steele, Chien-Ming Huang:
A Survey on End-User Robot Programming. 164:1-164:36 - Lik-Hang Lee, Tristan Braud, Simo Hosio, Pan Hui:
Towards Augmented Reality Driven Human-City Interaction: Current Research on Mobile Headsets and Future Challenges. 165:1-165:38 - Satyaki Roy, Preetam Ghosh, Nirnay Ghosh, Sajal K. Das:
Transcriptional Regulatory Network Topology with Applications to Bio-inspired Networking: A Survey. 166:1-166:36 - Haiman Tian, Maria E. Presa Reyes, Yudong Tao, Tianyi Wang, Samira Pouyanfar, Miguel Alonso, Steven Luis, Mei-Ling Shyu, Shu-Ching Chen, Sundaraja Sitharama Iyengar:
Data Analytics for Air Travel Data: A Survey and New Perspectives. 167:1-167:35 - Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia:
A Survey on Blockchain Interoperability: Past, Present, and Future Trends. 168:1-168:41 - Royson Lee, Stylianos I. Venieris, Nicholas D. Lane:
Deep Neural Network-based Enhancement for Image and Video Streaming Systems: A Survey and Future Directions. 169:1-169:30 - M. G. Sarwar Murshed, Christopher Murphy, Daqing Hou, Nazar Khan, Ganesh Ananthanarayanan, Faraz Hussain:
Machine Learning at the Network Edge: A Survey. 170:1-170:37 - Maxime Lamothe, Yann-Gaël Guéhéneuc, Weiyi Shang:
A Systematic Review of API Evolution Literature. 171:1-171:36 - Jessica McBroom, Irena Koprinska, Kalina Yacef:
A Survey of Automated Programming Hint Generation: The HINTS Framework. 172:1-172:27 - Giuseppe Desolda, Lauren S. Ferro, Andrea Marrella, Tiziana Catarci, Maria Francesca Costabile:
Human Factors in Phishing Attacks: A Systematic Literature Review. 173:1-173:35 - Ye Tian, Langchun Si, Xingyi Zhang, Ran Cheng, Cheng He, Kay Chen Tan, Yaochu Jin:
Evolutionary Large-Scale Multi-Objective Optimization: A Survey. 174:1-174:34 - Shubhra Kanti Karmaker Santu, Md. Mahadi Hassan, Micah J. Smith, Lei Xu, Chengxiang Zhai, Kalyan Veeramachaneni:
AutoML to Date and Beyond: Challenges and Opportunities. 175:1-175:36 - Alexandre H. T. Dias, Luiz Henrique A. Correia, Neumar Malheiros:
A Systematic Literature Review on Virtual Machine Consolidation. 176:1-176:38 - Fuqiang Gu, Mu-Huan Chung, Mark H. Chignell, Shahrokh Valaee, Baoding Zhou, Xue Liu:
A Survey on Deep Learning for Human Activity Recognition. 177:1-177:34
Volume 54, Number 9, December 2022
- Konstantinos Arakadakis, Pavlos Charalampidis, Antonis Makrogiannakis, Alexandros G. Fragkiadakis:
Firmware Over-the-air Programming Techniques for IoT Networks - A Survey. 178:1-178:36 - Lázaro Bustio-Martínez, René Cumplido, Martín Letras, Raudel Hernández-León, Claudia Feregrino Uribe, José Hernández Palancar:
FPGA/GPU-based Acceleration for Frequent Itemsets Mining: A Comprehensive Review. 179:1-179:35 - Pengzhen Ren, Yun Xiao, Xiaojun Chang, Po-Yao Huang, Zhihui Li, Brij B. Gupta, Xiaojiang Chen, Xin Wang:
A Survey of Deep Active Learning. 180:1-180:40 - Efstratios Kakaletsis, Charalampos Symeonidis, Maria Tzelepi, Ioannis Mademlis, Anastasios Tefas, Nikos Nikolaidis, Ioannis Pitas:
Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example. 181:1-181:37 - Dylan Chou, Meng Jiang:
A Survey on Data-driven Network Intrusion Detection. 182:1-182:36 - Lingxi Xie, Xin Chen, Kaifeng Bi, Longhui Wei, Yuhui Xu, Lanfei Wang, Zhengsu Chen, An Xiao, Jianlong Chang, Xiaopeng Zhang, Qi Tian:
Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap. 183:1-183:37 - Carlos Bermejo, Pan Hui:
A Survey on Haptic Technologies for Mobile Augmented Reality. 184:1-184:35 - Ismaeel Al Ridhawi, Ouns Bouachir, Moayad Aloqaily, Azzedine Boukerche:
Design Guidelines for Cooperative UAV-supported Services and Applications. 185:1-185:35 - Pasika Ranaweera, Anca Jurcut, Madhusanka Liyanage:
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. 186:1-186:37 - Xiongkuo Min, Ke Gu, Guangtao Zhai, Xiaokang Yang, Wenjun Zhang, Patrick Le Callet, Chang Wen Chen:
Screen Content Quality Assessment: Overview, Benchmark, and Beyond. 187:1-187:36 - Frank Siqueira, Joseph G. Davis:
Service Computing for Industry 4.0: State of the Art, Challenges, and Research Opportunities. 188:1-188:38 - Denise Maria Vecino Sato, Sheila Cristiana De Freitas, Jean Paul Barddal, Edson Emílio Scalabrin:
A Survey on Concept Drift in Process Mining. 189:1-189:38 - Bing Zhang, Jingyue Li, Jiadong Ren, Guoyan Huang:
Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review. 190:1-190:35 - Sergi Abadal, Akshay Jain, Robert Guirado, Jorge López-Alonso, Eduard Alarcón:
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators. 191:1-191:38 - Meriem Guerar, Luca Verderame, Mauro Migliardi, Francesco Palmieri, Alessio Merlo:
Gotta CAPTCHA 'Em All: A Survey of 20 Years of the Human-or-computer Dilemma. 192:1-192:33 - José Mena, Oriol Pujol, Jordi Vitrià:
A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective. 193:1-193:35 - Josef Schmid, Alfred Höß, Björn W. Schuller:
A Survey on Client Throughput Prediction Algorithms in Wired and Wireless Networks. 194:1-194:33 - Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey. 195:1-195:37 - Chao Liu, Xin Xia, David Lo, Cuiyun Gao, Xiaohu Yang, John C. Grundy:
Opportunities and Challenges in Code Search Tools. 196:1-196:40 - Timothy R. McIntosh, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, Paul A. Watters:
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions. 197:1-197:36 - René Mayrhofer, Stephan Sigg:
Adversary Models for Mobile Device Authentication. 198:1-198:35 - Gábor E. Gévay, Juan Soto, Volker Markl:
Handling Iterations in Distributed Dataflow Systems. 199:1-199:38
Volume 54, Number 10s, January 2022
- Salman H. Khan, Muzammal Naseer, Munawar Hayat, Syed Waqas Zamir, Fahad Shahbaz Khan, Mubarak Shah:
Transformers in Vision: A Survey. 200:1-200:41 - Géraldin Nanfack, Paul Temple, Benoît Frénay:
Constraint Enforcement on Decision Trees: A Survey. 201:1-201:36 - Nhu-Ngoc Dao, Anh-Tien Tran, Ngo Hoang Tu, Tran Thien Thanh, Vo Nguyen Quoc Bao, Sungrae Cho:
A Contemporary Survey on Live Video Streaming from a Computation-Driven Perspective. 202:1-202:38 - Pablo Messina, Pablo Pino, Denis Parra, Alvaro Soto, Cecilia Besa, Sergio Uribe, Marcelo E. Andia, Cristian Tejos, Claudia Prieto, Daniel Capurro:
A Survey on Deep Learning and Explainability for Automatic Report Generation from Medical Images. 203:1-203:40 - Ross Gruetzemacher, David B. Paradice:
Deep Transfer Learning & Beyond: Transformer Language Models in Information Systems Research. 204:1-204:35 - Isaac Ronald Ward, Jack Joyner, Casey Lickfold, Yulan Guo, Mohammed Bennamoun:
A Practical Tutorial on Graph Neural Networks. 205:1-205:35 - Yanming Yang, Xin Xia, David Lo, John C. Grundy:
A Survey on Deep Learning for Software Engineering. 206:1-206:73 - Ying Zhao, Jinjun Chen:
A Survey on Differential Privacy for Unstructured Data Content. 207:1-207:28 - Aayush Bansal, Rewa Sharma, Mamta Kathuria:
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications. 208:1-208:29 - Xin Wang, Sisi Duan, James R. Clavin, Haibin Zhang:
BFT in Blockchains: From Protocols to Use Cases. 209:1-209:37 - Torsten Schlett, Christian Rathgeb, Olaf Henniger, Javier Galbally, Julian Fiérrez, Christoph Busch:
Face Image Quality Assessment: A Literature Survey. 210:1-210:49 - Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
A Survey of Oblivious Transfer Protocol. 211:1-211:37 - Hang Du, Hailin Shi, Dan Zeng, Xiao-Ping Zhang, Tao Mei:
The Elements of End-to-end Deep Face Recognition: A Survey of Recent Advances. 212:1-212:42 - Claudio Filipi Goncalves dos Santos, João Paulo Papa:
Avoiding Overfitting: A Survey on Regularization Methods for Convolutional Neural Networks. 213:1-213:25 - Misael Costa Júnior, Domenico Amalfitano, Lina Garcés, Anna Rita Fasolino, Stevão Alves de Andrade, Márcio Eduardo Delamaro:
Dynamic Testing Techniques of Non-functional Requirements in Mobile Apps: A Systematic Mapping Study. 214:1-214:38 - Rob Churchill, Lisa Singh:
The Evolution of Topic Modeling. 215:1-215:35 - Daniel Martin, Sandra Malpica, Diego Gutierrez, Belén Masiá, Ana Serrano:
Multimodality in VR: A Survey. 216:1-216:36 - Zhiheng Zhong, Minxian Xu, Maria Alejandra Rodriguez, Cheng-Zhong Xu, Rajkumar Buyya:
Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions. 217:1-217:35 - Farkhanda Zafar, Hasan Ali Khattak, Moayad Aloqaily, Rasheed Hussain:
Carpooling in Connected and Autonomous Vehicles: Current Solutions and Future Directions. 218:1-218:36 - Md. Mahbub Alam, Luís Torgo, Albert Bifet:
A Survey on Spatio-temporal Data Analytics Systems. 219:1-219:38 - Zijun Li, Linsong Guo, Jiagan Cheng, Quan Chen, Bingsheng He, Minyi Guo:
The Serverless Computing Survey: A Technical Primer for Design Architecture. 220:1-220:34 - Peng Liu, Lizhe Wang, Rajiv Ranjan, Guojin He, Lei Zhao:
A Survey on Active Deep Learning: From Model Driven to Data Driven. 221:1-221:34
Volume 54, Number 11s, January 2022
- Anupama Mampage, Shanika Karunasekera, Rajkumar Buyya:
A Holistic View on Resource Management in Serverless Computing Environments: Taxonomy and Future Directions. 222:1-222:36 - Pablo Sánchez, Alejandro Bellogín:
Point-of-Interest Recommender Systems Based on Location-Based Social Networks: A Survey from an Experimental Perspective. 223:1-223:37 - Paula Delgado-Santos, Giuseppe Stragapede, Ruben Tolosana, Richard M. Guest, Farzin Deravi, Rubén Vera-Rodríguez:
A Survey of Privacy Vulnerabilities of Mobile Device Sensors. 224:1-224:30 - Hasini Witharana, Yangdi Lyu, Subodha Charles, Prabhat Mishra:
A Survey on Assertion-based Hardware Verification. 225:1-225:33 - Fabian Fagerholm, Michael Felderer, Davide Fucci, Michael Unterkalmsteiner, Bogdan Marculescu, Markus Martini, Lars Göran Wallgren Tengberg, Robert Feldt, Bettina Lehtelä, Balázs Nagyváradi, Jehan Khattak:
Cognition in Software Engineering: A Taxonomy and Survey of a Half-Century of Research. 226:1-226:36 - Wenhao Yu, Chenguang Zhu, Zaitang Li, Zhiting Hu, Qingyun Wang, Heng Ji, Meng Jiang:
A Survey of Knowledge-enhanced Text Generation. 227:1-227:38 - Harindu Korala, Dimitrios Georgakopoulos, Prem Prakash Jayaraman, Ali Yavari:
A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications. 228:1-228:36 - Hakan Kayan, Matthew Nunes, Omer F. Rana, Pete Burnap, Charith Perera:
Cybersecurity of Industrial Cyber-Physical Systems: A Review. 229:1-229:35 - Xiaogang Zhu, Sheng Wen, Seyit Camtepe, Yang Xiang:
Fuzzing: A Survey for Roadmap. 230:1-230:36 - Jakub Zádník, Markku J. Mäkitalo, Jarno Vanne, Pekka Jääskeläinen:
Image and Video Coding Techniques for Ultra-low Latency. 231:1-231:35 - Anirudh Chandramouli, Ashish Choudhury, Arpita Patra:
A Survey on Perfectly Secure Verifiable Secret-sharing. 232:1-232:36 - Bushra Jamil, Humaira Ijaz, Mohammad Shojafar, Kashif Munir, Rajkumar Buyya:
Resource Allocation and Task Scheduling in Fog Computing and Internet of Everything Environments: A Taxonomy, Review, and Future Directions. 233:1-233:38 - Ajay Mittal, Sabrina Dhalla, Savita Gupta, Aastha Gupta:
Automated Analysis of Blood Smear Images for Leukemia Detection: A Comprehensive Review. 234:1-234:37 - Hongsheng Hu, Zoran Salcic, Lichao Sun, Gillian Dobbie, Philip S. Yu, Xuyun Zhang:
Membership Inference Attacks on Machine Learning: A Survey. 235:1-235:37 - Rajeev Muralidhar, Renata Borovica-Gajic, Rajkumar Buyya:
Energy Efficient Computing Systems: Architectures, Abstractions and Modeling to Techniques and Standards. 236:1-236:37 - Valeria Cardellini, Francesco Lo Presti, Matteo Nardelli, Gabriele Russo Russo:
Runtime Adaptation of Data Stream Processing Systems: The State of the Art. 237:1-237:36 - Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. 238:1-238:37 - Hossein Shafiei, Ahmad Khonsari, Payam Mousavi:
Serverless Computing: A Survey of Opportunities, Challenges, and Applications. 239:1-239:32 - Sabah Suhail, Rasheed Hussain, Raja Jurdak, Alma Oracevic, Khaled Salah, Choong Seon Hong, Raimundas Matulevicius:
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges. 240:1-240:34 - Matheus Alberto de Oliveira Ribeiro, Fátima L. S. Nunes:
Left Ventricle Segmentation in Cardiac MR: A Systematic Mapping of the Past Decade. 241:1-241:38 - Simone Antonelli, Danilo Avola, Luigi Cinque, Donato Crisostomi, Gian Luca Foresti, Fabio Galasso, Marco Raoul Marini, Alessio Mecca, Daniele Pannone:
Few-Shot Object Detection: A Survey. 242:1-242:37 - Shengmei Liu, Xiaokun Xu, Mark Claypool:
A Survey and Taxonomy of Latency Compensation Techniques for Network Computer Games. 243:1-243:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.