default search action
ACM Computing Surveys, Volume 56
Volume 56, Number 1, January 2024
- Janice Klaiber, Clemens van Dinther:
Deep Learning for Variable Renewable Energy: A Systematic Review. 1:1-1:37 - Hélène Coullon, Ludovic Henrio, Frédéric Loulergue, Simon Robillard:
Component-based Distributed Software Reconfiguration:A Verification-oriented Survey. 2:1-2:37 - Mohamed Ahzam Amanullah, Seng W. Loke, Mohan Baruwal Chhetri, Robin Doss:
A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review. 3:1-3:38 - Sabine Houy, Philipp Schmid, Alexandre Bartel:
Security Aspects of Cryptocurrency Wallets - A Systematic Literature Review. 4:1-4:31 - Prasenjeet Roy, Suman Kundu:
Review on Query-focused Multi-document Summarization (QMDS) with Comparative Analysis. 5:1-5:38 - Jana Vatter, Ruben Mayer, Hans-Arno Jacobsen:
The Evolution of Distributed Systems for Graph Neural Networks and Their Origin in Graph Processing and Deep Learning: A Survey. 6:1-6:37 - Shulei Ji, Xinyu Yang, Jing Luo:
A Survey on Deep Learning for Symbolic Music Generation: Representations, Algorithms, Evaluations, and Challenges. 7:1-7:39 - Mario Brcic, Roman V. Yampolskiy:
Impossibility Results in AI: A Survey. 8:1-8:24 - Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu:
Machine Unlearning: A Survey. 9:1-9:36 - Samaneh Zolfaghari, Sumaiya Suravee, Daniele Riboni, Kristina Yordanova:
Sensor-Based Locomotion Data Mining for Supporting the Diagnosis of Neurodegenerative Disorders: A Survey. 10:1-10:36 - Ce Zheng, Wenhan Wu, Chen Chen, Taojiannan Yang, Sijie Zhu, Ju Shen, Nasser Kehtarnavaz, Mubarak Shah:
Deep Learning-based Human Pose Estimation: A Survey. 11:1-11:37 - Bayzid Ashik Hossain, Md. Saddam Hossain Mukta, Md. Adnanul Islam, Akib Zaman, Rolf Schwitter:
Natural Language-Based Conceptual Modelling Frameworks: State of the Art and Future Opportunities. 12:1-12:26 - Zhaolong Ning, Hao Hu, Xiaojie Wang, Lei Guo, Song Guo, Guoyin Wang, Xinbo Gao:
Mobile Edge Computing and Machine Learning in the Internet of Unmanned Aerial Vehicles: A Survey. 13:1-13:31 - Chi-Wei Lien, Sudip Vhaduri:
Challenges and Opportunities of Biometric User Authentication in the Age of IoT: A Survey. 14:1-14:37 - Yaochen Liu, Qiuchi Li, Benyou Wang, Yazhou Zhang, Dawei Song:
A Survey of Quantum-cognitively Inspired Sentiment Analysis Models. 15:1-15:37 - Alessandro Margara, Gianpaolo Cugola, Nicolò Felicioni, Stefano Cilloni:
A Model and Survey of Distributed Data-Intensive Systems. 16:1-16:69 - Zeinab Zabihi, Amir-Masoud Eftekhari-Moghadam, Mohammad Hossein Rezvani:
Reinforcement Learning Methods for Computation Offloading: A Systematic Review. 17:1-17:41 - Ricardo Parizotto, Bruno Loureiro Coelho, Diego Cardoso Nunes, Israat Haque, Alberto Schaeffer-Filho:
Offloading Machine Learning to Programmable Data Planes: A Systematic Survey. 18:1-18:34 - Zhe Fu, Xi Niu, Mary Lou Maher:
Deep Learning Models for Serendipity Recommendations: A Survey and New Perspectives. 19:1-19:26 - Rui Xu, Sheng Ma, Yang Guo, Dongsheng Li:
A Survey of Design and Optimization for Systolic Array-based DNN Accelerators. 20:1-20:37 - Guoqing Xiao, Chuanghui Yin, Tao Zhou, Xueqi Li, Yuedan Chen, Kenli Li:
A Survey of Accelerating Parallel Sparse Linear Algebra. 21:1-21:38 - Diego Donoso, Jose M. Saavedra:
Survey on Sketch-to-photo Translation. 22:1-22:25 - Zhishu Shen, Jiong Jin, Cheng Tan, Atsushi Tagami, Shangguang Wang, Qing Li, Qiushi Zheng, Jingling Yuan:
A Survey of Next-generation Computing Technologies in Space-air-ground Integrated Networks. 23:1-23:40 - Alessia Antelmi, Gennaro Cordasco, Mirko Polato, Vittorio Scarano, Carmine Spagnuolo, Dingqi Yang:
A Survey on Hypergraph Representation Learning. 24:1-24:38 - Kisub Kim, Sankalp Ghatpande, Dongsun Kim, Xin Zhou, Kui Liu, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Big Code Search: A Bibliography. 25:1-25:49
Volume 56, Number 2, February 2024
- Afzal Badshah, Anwar Ghani, Ali Daud, Ateeqa Jalal, Muhammad Bilal, Jon Crowcroft:
Towards Smart Education through Internet of Things: A Survey. 26:1-26:33 - Maud Ehrmann, Ahmed Hamdi, Elvys Linhares Pontes, Matteo Romanello, Antoine Doucet:
Named Entity Recognition and Classification in Historical Documents: A Survey. 27:1-27:47 - Marco Brohet, Francesco Regazzoni:
A Survey on Thwarting Memory Corruption in RISC-V. 28:1-28:29 - Alireza Alaei, Vinh Bui, David S. Doermann, Umapada Pal:
Document Image Quality Assessment: A Survey. 29:1-29:36 - Bonan Min, Hayley Ross, Elior Sulem, Amir Pouran Ben Veyseh, Thien Huu Nguyen, Oscar Sainz, Eneko Agirre, Ilana Heintz, Dan Roth:
Recent Advances in Natural Language Processing via Large Pre-trained Language Models: A Survey. 30:1-30:40 - Maciej Besta, Robert Gerstenberger, Emanuel Peter, Marc Fischer, Michal Podstawski, Claude Barthels, Gustavo Alonso, Torsten Hoefler:
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries. 31:1-31:40 - Jan Pennekamp, Roman Matzutt, Christopher Klinkmüller, Lennart Bader, Martin Serror, Eric Wagner, Sidra Malik, Maria Spiß, Jessica Rahn, Tan Gürpinar, Eduard Vlad, Sander J. J. Leemans, Salil S. Kanhere, Volker Stich, Klaus Wehrle:
An Interdisciplinary Survey on Information Flows in Supply Chains. 32:1-32:38 - Takuya Fujihashi, Toshiaki Koike-Akino, Takashi Watanabe:
Soft Delivery: Survey on a New Paradigm for Wireless and Mobile Multimedia Streaming. 33:1-33:37 - Yaxiong Lei, Shijing He, Mohamed Khamis, Juan Ye:
An End-to-End Review of Gaze Estimation and its Interactive Applications on Handheld Mobile Devices. 34:1-34:38 - Oceane Destras, Sébastien Le Beux, Felipe Gohring de Magalhaes, Gabriela Nicolescu:
Survey on Activation Functions for Optical Neural Networks. 35:1-35:30 - Fatemeh Deldar, Mahdi Abadi:
Deep Learning for Zero-day Malware Detection and Classification: A Survey. 36:1-36:37 - Sahar Mehrpour, Thomas D. LaToza:
A Survey of Tool Support for Working with Design Decisions in Code. 37:1-37:37 - Satyaki Roy, Nirnay Ghosh, Nitish M. Uplavikar, Preetam Ghosh:
Towards a Unified Pandemic Management Architecture: Survey, Challenges, and Future Directions. 38:1-38:32 - Huiqiang Chen, Tianqing Zhu, Tao Zhang, Wanlei Zhou, Philip S. Yu:
Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff. 39:1-39:37 - Abdelouahab Amira, Abdelouahid Derhab, Elmouatez Billah Karbab, Omar Nouali:
A Survey of Malware Analysis Using Community Detection Algorithms. 40:1-40:29 - Nan Li, Lianbo Ma, Guo Yu, Bing Xue, Mengjie Zhang, Yaochu Jin:
Survey on Evolutionary Deep Learning: Principles, Algorithms, Applications, and Open Issues. 41:1-41:34 - Tara Ghasempouri, Jaan Raik, Cezar Reinbrecht, Said Hamdioui, Mottaqiallah Taouil:
Survey on Architectural Attacks: A Unified Classification and Attack Model. 42:1-42:32 - Carlos Barrios, Mohan Kumar:
Service Caching and Computation Reuse Strategies at the Edge: A Survey. 43:1-43:38 - Rongxin Xu, Qiujun Lan, Shiva Raj Pokhrel, Gang Li:
A Knowledge Graph-Based Survey on Distributed Ledger Technology for IoT Verticals. 44:1-44:36 - Youssef Yamout, Tashaffi Samin Yeasar, Shahrear Iqbal, Mohammad Zulkernine:
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security. 45:1-45:35 - Jean Luca Bez, Suren Byna, Shadi Ibrahim:
I/O Access Patterns in HPC Applications: A 360-Degree Survey. 46:1-46:41 - Stefan Buchner, Dirk Riehle:
The Business Impact of Inner Source and How to Quantify It. 47:1-47:27 - Maryam Amini, Razvan Stanica, Catherine Rosenberg:
Where Are the (Cellular) Data? 48:1-48:25 - Essam Soliman Debie, Kathryn Kasmarik, Matt Garratt:
Swarm Robotics: A Survey from a Multi-Tasking Perspective. 49:1-49:38 - Danfeng Sun, Junjie Hu, Huifeng Wu, Jia Wu, Jian Yang, Quan Z. Sheng, Schahram Dustdar:
A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT. 50:1-50:37 - Asma Ameur, Sana Hamdi, Sadok Ben Yahia:
Sentiment Analysis for Hotel Reviews: A Systematic Literature Review. 51:1-51:38 - Benjamin Smith, Anahita Khojandi, Rama K. Vasudevan:
Bias in Reinforcement Learning: A Review in Healthcare Applications. 52:1-52:17 - Ryan Schuerkamp, Philippe J. Giabbanelli:
Extensions of Fuzzy Cognitive Maps: A Systematic Review. 53:1-53:36
Volume 56, Number 3, March 2024
- Yulan Guo, Hanyun Wang, Longguang Wang, Yinjie Lei, Li Liu, Mohammed Bennamoun:
3D Face Recognition: Two Decades of Progress and Prospects. 54:1-54:39 - Benyou Wang, Qianqian Xie, Jiahuan Pei, Zhihong Chen, Prayag Tiwari, Zhao Li, Jie Fu:
Pre-trained Language Models in Biomedical Domain: A Systematic Survey. 55:1-55:52 - Tianzhang He, Rajkumar Buyya:
A Taxonomy of Live Migration Management in Cloud Computing. 56:1-56:33 - Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza:
Automation for Network Security Configuration: State of the Art and Research Trends. 57:1-57:37 - Domenico Amalfitano, Stefano Faralli, Jean Carlo Rossa Hauck, Santiago Matalonga, Damiano Distante:
Artificial Intelligence Applied to Software Testing: A Tertiary Study. 58:1-58:38 - Rui Queiroz, Tiago Cruz, Jérôme Mendes, Pedro Sousa, Paulo Simões:
Container-based Virtualization for Real-time Industrial Systems - A Systematic Review. 59:1-59:38 - Guoying Qiu, Guoming Tang, Chuandong Li, Lailong Luo, Deke Guo, Yulong Shen:
Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective. 60:1-60:36 - Kheng Leong Tan, Chi-Hung Chi, Kwok-Yan Lam:
Survey on Digital Sovereignty and Identity: From Digitization to Digitalization. 61:1-61:36 - Taraneh Ghandi, Hamidreza Pourreza, Hamidreza Mahyar:
Deep Learning Approaches on Image Captioning: A Review. 62:1-62:39 - Haiqin Wu, Boris Düdder, Liangmin Wang, Zhenfu Cao, Jun Zhou, Xia Feng:
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture. 63:1-63:40 - Hanqing Zhang, Haolin Song, Shaoyu Li, Ming Zhou, Dawei Song:
A Survey of Controllable Text Generation Using Transformer-based Pre-trained Language Models. 64:1-64:37 - Oscar Castro, Pierrick Bruneau, Jean-Sébastien Sottet, Dario Torregrossa:
Landscape of High-Performance Python to Develop Data Science and Machine Learning Applications. 65:1-65:30 - Dulani Meedeniya, Isuru Ariyarathne, Meelan Bandara, Roshinie Jayasundara, Charith Perera:
A Survey on Deep Learning Based Forest Environment Sound Classification at the Edge. 66:1-66:36 - Qi Jia, Yizhu Liu, Siyu Ren, Kenny Q. Zhu:
Taxonomy of Abstractive Dialogue Summarization: Scenarios, Approaches, and Future Directions. 67:1-67:38 - Asma Hamissi, Amine Dhraief:
A Survey on the Unmanned Aircraft System Traffic Management. 68:1-68:37 - Adán José García, Julie Jacques, Vincent Sobanski, Clarisse Dhaenens:
Metaheuristic Biclustering Algorithms: From State-of-the-art to Future Opportunities. 69:1-69:38 - Felix Gemeinhardt, Antonio Garmendia, Manuel Wimmer, Benjamin Weder, Frank Leymann:
Quantum Combinatorial Optimization in the NISQ Era: A Systematic Mapping Study. 70:1-70:36 - Sanoop Mallissery, Yu-Sung Wu:
Demystify the Fuzzing Methods: A Comprehensive Survey. 71:1-71:38 - Arnav Arora, Preslav Nakov, Momchil Hardalov, Sheikh Muhammad Sarwar, Vibha Nayak, Yoan Dinkov, Dimitrina Zlatkova, Kyle Dent, Ameya Bhatawdekar, Guillaume Bouchard, Isabelle Augenstein:
Detecting Harmful Content on Online Platforms: What Platforms Need vs. Where Research Efforts Go. 72:1-72:17 - Peter Christen, David J. Hand, Nishadi Kirielle:
A Review of the F-Measure: Its History, Properties, Criticism, and Alternatives. 73:1-73:24 - Luís Fiolhais, Leonel Sousa:
Transient-Execution Attacks: A Computer Architect Perspective. 74:1-74:38 - Vincenzo Scotti, Licia Sbattella, Roberto Tedesco:
A Primer on Seq2Seq Models for Generative Chatbots. 75:1-75:58 - Ayse Ünsal, Melek Önen:
Information-Theoretic Approaches to Differential Privacy. 76:1-76:18 - Simone Maurizio La Cava, Giulia Orrù, Martin Drahanský, Gian Luca Marcialis, Fabio Roli:
3D Face Reconstruction: The Road to Forensics. 77:1-77:38 - Xiaoyu Xia, Sheik Mohammad Mostakim Fattah, Muhammad Ali Babar:
A Survey on UAV-Enabled Edge Computing: Resource Management Perspective. 78:1-78:36 - Mang Ye, Xiuwen Fang, Bo Du, Pong C. Yuen, Dacheng Tao:
Heterogeneous Federated Learning: State-of-the-art and Research Challenges. 79:1-79:44 - Guoyang Xie, Yawen Huang, Jin-Bao Wang, Jiayi Lyu, Feng Zheng, Yefeng Zheng, Yaochu Jin:
Cross-modality Neuroimage Synthesis: A Survey. 80:1-80:28
Volume 56, Number 4, April 2024
- Ernest Davis:
Benchmarks for Automated Commonsense Reasoning: A Survey. 81:1-81:41 - Marcel André Hoffmann, Rainer Lasch:
Tackling Industrial Downtimes with Artificial Intelligence in Data-Driven Maintenance. 82:1-82:33 - Jonas Auda, Uwe Gruenefeld, Sarah Faltaous, Sven Mayer, Stefan Schneegass:
A Scoping Survey on Cross-reality Systems. 83:1-83:38 - Josu Díaz-de-Arcaya, Ana I. Torre-Bastida, Gorka Zárate, Raúl Miñón, Aitor Almeida:
A Joint Study of the Challenges, Opportunities, and Roadmap of MLOps and AIOps: A Systematic Survey. 84:1-84:30 - Cristiano Patrício, João C. Neves, Luís F. Teixeira:
Explainable Deep Learning Methods in Medical Image Classification: A Survey. 85:1-85:41 - Damien Wohwe Sambo, Anna Förster:
Wireless Underground Sensor Networks: A Comprehensive Survey and Tutorial. 86:1-86:44 - Yashar Deldjoo, Fatemeh Nazary, Arnau Ramisa, Julian J. McAuley, Giovanni Pellegrini, Alejandro Bellogín, Tommaso Di Noia:
A Review of Modern Fashion Recommender Systems. 87:1-87:37 - Muhammad Okky Ibrohim, Cristina Bosco, Valerio Basile:
Sentiment Analysis for the Natural Environment: A Systematic Review. 88:1-88:37 - Meng Qin, Dit-Yan Yeung:
Temporal Link Prediction: A Unified Framework, Taxonomy, and Review. 89:1-89:40 - Weihao Xia, Jing-Hao Xue:
A Survey on Deep Generative 3D-aware Image Synthesis. 90:1-90:34 - Chenhan Zhang, Shui Yu, Zhiyi Tian, James J. Q. Yu:
Generative Adversarial Networks: A Survey on Attack and Defense Perspective. 91:1-91:35 - Li Hu, Anli Yan, Hongyang Yan, Jin Li, Teng Huang, Yingying Zhang, Changyu Dong, Chunsheng Yang:
Defenses to Membership Inference Attacks: A Survey. 92:1-92:34 - Alexandra Kapp, Julia Hansmeyer, Helena Mihaljevic:
Generative Models for Synthetic Urban Mobility Data: A Systematic Literature Review. 93:1-93:37 - Lingfeng Zhong, Jia Wu, Qian Li, Hao Peng, Xindong Wu:
A Comprehensive Survey on Automatic Knowledge Graph Construction. 94:1-94:62 - Pedro Miguel Moás, Carla Teixeira Lopes:
Automatic Quality Assessment of Wikipedia Articles - A Systematic Literature Review. 95:1-95:37 - Edan Habler, Ron Bitton, Asaf Shabtai:
Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation. 96:1-96:40 - Seyed Mojtaba Marvasti-Zadeh, Devin Goodsman, Nilanjan Ray, Nadir Erbilgin:
Early Detection of Bark Beetle Attack Using Remote Sensing and Machine Learning: A Review. 97:1-97:40 - Julio C. S. dos Anjos, Kassiano J. Matteussi, Fernanda C. Orlandi, Jorge L. V. Barbosa, Jorge Sá Silva, Luiz F. Bittencourt, Cláudio F. R. Geyer:
A Survey on Collaborative Learning for Intelligent Autonomous Systems. 98:1-98:37 - Huawei Huang, Qinnan Zhang, Taotao Li, Qinglin Yang, Zhaokang Yin, Junhao Wu, Zehui Xiong, Jianming Zhu, Jiajing Wu, Zibin Zheng:
Economic Systems in the Metaverse: Basics, State of the Art, and Challenges. 99:1-99:33 - Ronnie Edson de Souza Santos, Paul Ralph, Arham Arshad, Klaas-Jan Stol:
Distributed Scrum: A Case Meta-analysis. 100:1-100:37 - Maria Rigaki, Sebastián García:
A Survey of Privacy Attacks in Machine Learning. 101:1-101:34 - Norman W. Paton, Jiaoyan Chen, Zhenyu Wu:
Dataset Discovery and Exploration: A Survey. 102:1-102:37 - Zhipeng Su, Yixiong Zhang, Jianghong Shi, Xiao-Ping Zhang:
A Survey of Single Image Rain Removal Based on Deep Learning. 103:1-103:35 - Akond Rahman, Dibyendu Brinto Bose, Farhat Lamia Barsha, Rahul Pandita:
Defect Categorization in Compilers: A Multi-vocal Literature Review. 104:1-104:42 - Ling Yang, Zhilong Zhang, Yang Song, Shenda Hong, Runsheng Xu, Yue Zhao, Wentao Zhang, Bin Cui, Ming-Hsuan Yang:
Diffusion Models: A Comprehensive Survey of Methods and Applications. 105:1-105:39 - Marvin Wyrich, Justus Bogner, Stefan Wagner:
40 Years of Designing Code Comprehension Experiments: A Systematic Mapping Study. 106:1-106:42 - Thomas Heinis, Roman Sokolovskii, Jamie J. Alnasir:
Survey of Information Encoding Techniques for DNA. 107:1-107:30
Volume 56, Number 5, May 2024
- Amin Hosseiny Marani, Eric P. S. Baumer:
A Review of Stability in Topic Modeling: Metrics for Assessing and Techniques for Improving Stability. 108:1-108:32 - Cigdem Beyan, Alessandro Vinciarelli, Alessio Del Bue:
Co-Located Human-Human Interaction Analysis Using Nonverbal Cues: A Survey. 109:1-109:41 - Artur Becker, Carla Maria Dal Sasso Freitas:
Evaluation of XR Applications: A Tertiary Review. 110:1-110:35 - Wen Fei, Hiroyuki Ohno, Srinivas Sampalli:
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions. 111:1-111:40 - Xuke Hu, Zhiyong Zhou, Hao Li, Yingjie Hu, Fuqiang Gu, Jens Kersten, Hongchao Fan, Friederike Klan:
Location Reference Recognition from Texts: A Survey and Comparison. 112:1-112:37 - Qihan Huang, Haofei Zhang, Mengqi Xue, Jie Song, Mingli Song:
A Survey of Deep Learning for Low-shot Object Detection. 113:1-113:37 - Ville Paananen, Mohammad Sina Kiarostami, Lik-Hang Lee, Tristan Braud, Simo Hosio:
From Digital Media to Empathic Spaces: A Systematic Review of Empathy Research in Extended Reality Environments. 114:1-114:40 - Azra Seyyedi, Mahdi Bohlouli, Seyed Ehsan Nedaaee Oskoee:
Machine Learning and Physics: A Survey of Integrated Models. 115:1-115:33 - Johann Li, Guangming Zhu, Cong Hua, Mingtao Feng, Basheer Bennamoun, Ping Li, Xiaoyuan Lu, Juan Song, Peiyi Shen, Xu Xu, Lin Mei, Liang Zhang, Syed Afaq Ali Shah, Mohammed Bennamoun:
A Systematic Collection of Medical Image Datasets for Deep Learning. 116:1-116:51 - Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, Joppe W. Bos:
Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead. 117:1-117:37 - Jiayun Luo, Boyang Li, Cyril Leung:
A Survey of Computer Vision Technologies in Urban and Controlled-environment Agriculture. 118:1-118:39 - Feng Li, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Jianting Ning, Robert H. Deng:
A Survey on Searchable Symmetric Encryption. 119:1-119:42 - Vaibhav Jain, Devendra Kumar Sharma, Hari Mohan Gaur, Ashutosh Kumar Singh, Xiaoqing Wen:
Comprehensive and Comparative Analysis of QCA-based Circuit Designs for Next-generation Computation. 120:1-120:36 - Yujuan Ding, Zhihui Lai, P. Y. Mok, Tat-Seng Chua:
Computational Technologies for Fashion Recommendation: A Survey. 121:1-121:45 - Bing Huang, Dipankar Chaki, Athman Bouguettaya, Kwok-Yan Lam:
A Survey on Conflict Detection in IoT-based Smart Homes. 122:1-122:40 - Dawei Zhou, Jingrui He:
Rare Category Analysis for Complex Data: A Review. 123:1-123:35 - Adnan Khalid, Zohaib Mushtaq, Saad Arif, Kamran Zeb, Muhammad Attique Khan, Sambit Bakshi:
Control Schemes for Quadrotor UAV: Taxonomy and Survey. 124:1-124:32 - Thomas Hickling, Abdelhafid Zenati, Nabil Aouf, Phillippa Spencer:
Explainability in Deep Reinforcement Learning: A Review into Current Methods and Applications. 125:1-125:35 - Zhiqian Chen, Fanglan Chen, Lei Zhang, Taoran Ji, Kaiqun Fu, Liang Zhao, Feng Chen, Lingfei Wu, Charu Aggarwal, Chang-Tien Lu:
Bridging the Gap between Spatial and Spectral Domains: A Unified Framework for Graph Neural Networks. 126:1-126:42 - Debo Cheng, Jiuyong Li, Lin Liu, Jixue Liu, Thuc Duy Le:
Data-Driven Causal Effect Estimation Based on Graphical Causal Modelling: A Survey. 127:1-127:37 - Santiago Villarreal-Narvaez, Arthur Sluÿters, Jean Vanderdonckt, Radu-Daniel Vatavu:
Brave New GES World: A Systematic Literature Review of Gestures and Referents in Gesture Elicitation Studies. 128:1-128:55 - Fangjian Liao, Xingxing Zou, Waikeung Wong:
Appearance and Pose-guided Human Generation: A Survey. 129:1-129:35 - Shiwei Li, Huifeng Guo, Xing Tang, Ruiming Tang, Lu Hou, Ruixuan Li, Rui Zhang:
Embedding Compression in Recommender Systems: A Survey. 130:1-130:21 - Victor R. Kebande, Ali Ismail Awad:
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions. 131:1-131:37 - Aruna Jayasena, Prabhat Mishra:
Directed Test Generation for Hardware Validation: A Survey. 132:1-132:36 - Melike Geçer, Benoît Garbinato:
Federated Learning for Mobility Applications. 133:1-133:28 - Gengrui Zhang, Fei Pan, Yunhao Mao, Sofia Tijanic, Michael Dang'ana, Shashank Motepalli, Shiquan Zhang, Hans-Arno Jacobsen:
Reaching Consensus in the Byzantine Empire: A Comprehensive Review of BFT Consensus Algorithms. 134:1-134:41
Volume 56, Number 6, June 2024
- Marco De Vincenzi, Gianpiero Costantino, Ilaria Matteucci, Florian Fenzl, Christian Plappert, Roland Rieke, Daniel Zelle:
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet. 135:1-135:38 - Andrew Wei-Loong Wong, Say Leng Goh, Mohammad Kamrul Hasan, Salmah Fattah:
Multi-Hop and Mesh for LoRa Networks: Recent Advancements, Issues, and Recommended Applications. 136:1-136:43 - Yanbin Liu, Girish Dwivedi, Farid Boussaïd, Mohammed Bennamoun:
3D Brain and Heart Volume Generative Models: A Survey. 137:1-137:37 - Yanjie Li, Bin Xie, Songtao Guo, Yuanyuan Yang, Bin Xiao:
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks. 138:1-138:37 - Changlin Yang, Kwan-Wu Chin, Jiguang Wang, Xiaodong Wang, Ying Liu, Zibin Zheng:
Scaling Blockchains with Error Correction Codes: A Survey on Coded Blockchains. 139:1-139:33 - Sk Maidul Islam, Subhankar Joardar, Arif Ahmed Sekh:
A Survey on Fashion Image Retrieval. 140:1-140:25 - Mohammad Hasan Ahmadilivani, Mahdi Taheri, Jaan Raik, Masoud Daneshtalab, Maksim Jenihhin:
A Systematic Literature Review on Hardware Reliability Assessment Methods for Deep Neural Networks. 141:1-141:39 - Ghareeb Falazi, Uwe Breitenbücher, Frank Leymann, Stefan Schulte:
Cross-Chain Smart Contract Invocations: A Systematic Multi-Vocal Literature Review. 142:1-142:38 - João Eduardo Costa Gomes, Ricardo Rodrigues Ehlert, Rodrigo Murillo Boesche, Vinicius Santosde Lima, Jorgito Matiuzzi Stocchero, Dante A. C. Barone, Juliano Araujo Wickboldt, Edison Pignaton de Freitas, Julio C. S. dos Anjos, Ricardo Queiroz de Araujo Fernandes:
Surveying Emerging Network Approaches for Military Command and Control Systems. 143:1-143:38 - Sabina Szymoniak:
Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey. 144:1-144:31 - Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms. 145:1-145:41 - Zhisheng Ye, Wei Gao, Qinghao Hu, Peng Sun, Xiaolin Wang, Yingwei Luo, Tianwei Zhang, Yonggang Wen:
Deep Learning Workload Scheduling in GPU Datacenters: A Survey. 146:1-146:38 - Ghadeer O. Ghosheh, Jin Li, Tingting Zhu:
A Survey of Generative Adversarial Networks for Synthesizing Structured Electronic Health Records. 147:1-147:34 - Matthew G. Gaber, Mohiuddin Ahmed, Helge Janicke:
Malware Detection with Artificial Intelligence: A Systematic Literature Review. 148:1-148:33 - Matilde Pato, Márcia Barros, Francisco M. Couto:
Survey on Recommender Systems for Biomedical Items in Life and Health Sciences. 149:1-149:32 - Simon Razniewski, Hiba Arnaout, Shrestha Ghosh, Fabian M. Suchanek:
Completeness, Recall, and Negation in Open-world Knowledge Bases: A Survey. 150:1-150:42 - Huaming Chen, Muhammad Ali Babar:
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges. 151:1-151:38 - Kanghua Mo, Peigen Ye, Xiaojun Ren, Shaowei Wang, Wenjun Li, Jin Li:
Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures. 152:1-152:39 - Jianping Yao, Son N. Tran, Saurabh Kumar Garg, Samantha Sawyer:
Deep Learning for Plant Identification and Disease Classification from Leaf Images: Multi-prediction Approaches. 153:1-153:37 - Simon Khan, Charles Devlen, Michael Manno, Daqing Hou:
Mouse Dynamics Behavioral Biometrics: A Survey. 154:1-154:33 - Jack Hughes, Sergio Pastrana, Alice Hutchings, Sadia Afroz, Sagar Samtani, Weifeng Li, Ericsson Santana Marin:
The Art of Cybercrime Community Research. 155:1-155:26 - Budhitama Subagdja, D. Shanthoshigaa, Zhaoxia Wang, Ah-Hwee Tan:
Machine Learning for Refining Knowledge Graphs: A Survey. 156:1-156:38 - Maryam Zahid, Alessio Bucaioni, Francesco Flammini:
Model-based Trustworthiness Evaluation of Autonomous Cyber-Physical Production Systems: A Systematic Mapping Study. 157:1-157:28 - Mingliang Dou, Jijun Tang, Prayag Tiwari, Yijie Ding, Fei Guo:
Drug-Drug Interaction Relation Extraction Based on Deep Learning: A Review. 158:1-158:33 - Jiahang Cao, Jinyuan Fang, Zaiqiao Meng, Shangsong Liang:
Knowledge Graph Embedding: A Survey from the Perspective of Representation Spaces. 159:1-159:42 - Marius Becherer, Omar Khadeer Hussain, Yu Zhang, Frank T. H. den Hartog, Elizabeth Chang:
On Trust Recommendations in the Social Internet of Things - A Survey. 160:1-160:35 - Giovanni Ciatto, Federico Sabbatini, Andrea Agiollo, Matteo Magnini, Andrea Omicini:
Symbolic Knowledge Extraction and Injection with Sub-symbolic Predictors: A Systematic Literature Review. 161:1-161:35
Volume 56, Number 7, July 2024
- Roberta Calegari, Fosca Giannotti, Francesca Pratesi, Michela Milano:
Introduction to Special Issue on Trustworthy Artificial Intelligence. 162:1-162:3 - Peiyun Zhang, Song Ding, Qinglin Zhao:
Exploiting Blockchain to Make AI Trustworthy: A Software Development Lifecycle View. 163:1-163:31 - Nicholas Conlon, Nisar R. Ahmed, Daniel Szafir:
A Survey of Algorithmic Methods for Competency Self-Assessments in Human-Autonomy Teaming. 164:1-164:31 - Xiaodan Xing, Huanjun Wu, Lichao Wang, Iain Stenson, May Yong, Javier Del Ser, Simon Walsh, Guang Yang:
Non-imaging Medical Data Synthesis for Trustworthy AI: A Comprehensive Survey. 165:1-165:35 - Simon Caton, Christian Haas:
Fairness in Machine Learning: A Survey. 166:1-166:38 - Ana Carolina Lorena, Pedro Yuri Arbs Paiva, Ricardo B. C. Prudêncio:
Trusting My Predictions: On the Value of Instance-Level Analysis. 167:1-167:28 - Stephanie Milani, Nicholay Topin, Manuela Veloso, Fei Fang:
Explainable Reinforcement Learning: A Survey and Comparative Review. 168:1-168:36 - Rachid Guerraoui, Nirupam Gupta, Rafael Pinot:
Byzantine Machine Learning: A Primer. 169:1-169:39 - Adnan Qayyum, Muhammad Atif Butt, Hassan Ali, Muhammad Usman, Osama Halabi, Ala I. Al-Fuqaha, Qammer H. Abbasi, Muhammad Ali Imran, Junaid Qadir:
Secure and Trustworthy Artificial Intelligence-extended Reality (AI-XR) for Metaverses. 170:1-170:38 - Mario Alfonso Prado-Romero, Bardh Prenkaj, Giovanni Stilo, Fosca Giannotti:
A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation, and Research Challenges. 171:1-171:37 - Zhijing Wan, Zhixiang Wang, CheukTing Chung, Zheng Wang:
A Survey of Dataset Refinement for Problems in Computer Vision Datasets. 172:1-172:34 - Qinghua Lu, Liming Zhu, Xiwei Xu, Jon Whittle, Didar Zowghi, Aurelie Jacquet:
Responsible AI Pattern Catalogue: A Collection of Best Practices for AI Governance and Engineering. 173:1-173:35 - Peiyu Xiong, Michael Tegegn, Jaskeerat Singh Sarin, Shubhraneel Pal, Julia Rubin:
It Is All about Data: A Survey on the Effects of Data on Adversarial Robustness. 174:1-174:41 - Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, Iqbal Gondal, Xuyun Zhang:
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models. 175:1-175:39 - Jon Pérez-Cerrolaza, Jaume Abella, Markus Borg, Carlo Donzella, Jesús Cerquides, Francisco J. Cazorla, Cristofer Englund, Markus Tauber, George Nikolakopoulos, Jose Luis Flores:
Artificial Intelligence for Safety-Critical Systems in Industrial and Transportation Domains: A Survey. 176:1-176:40
- Chuanjun Zhao, Meiling Wu, Xinyi Yang, Wenyue Zhang, Shaoxia Zhang, Suge Wang, Deyu Li:
A Systematic Review of Cross-Lingual Sentiment Analysis: Tasks, Strategies, and Prospects. 177:1-177:37 - Jiliang Zhang, Congcong Chen, Jinhua Cui, Keqin Li:
Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures. 178:1-178:40 - Jun Wook Heo, Gowri Sankar Ramachandran, Ali Dorri, Raja Jurdak:
Blockchain Data Storage Optimisations: A Comprehensive Survey. 179:1-179:27 - Cheng Zhang, Bo Ou, Fei Peng, Yao Zhao, Keqin Li:
A Survey on Reversible Data Hiding for Uncompressed Images. 180:1-180:33 - Arian Bakhtiarnia, Qi Zhang, Alexandros Iosifidis:
Efficient High-Resolution Deep Learning: A Survey. 181:1-181:35 - Andrey Antonio de O. Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa:
A Systematic Mapping Study on Social Network Privacy: Threats and Solutions. 182:1-182:29 - Kavous Salehzadeh Niksirat, Lev Velykoivanenko, Noé Zufferey, Mauro Cherubini, Kévin Huguenin, Mathias Humbert:
Wearable Activity Trackers: A Survey on Utility, Privacy, and Security. 183:1-183:40 - Leila Methnani, Manolis Chiou, Virginia Dignum, Andreas Theodorou:
Who's in Charge Here? A Survey on Trustworthy AI in Variable Autonomy Robotic Systems. 184:1-184:32 - Jiajia Wang, Jimmy Xiangji Huang, Xinhui Tu, Junmei Wang, Angela Jennifer Huang, Md. Tahmid Rahman Laskar, Amran Bhuiyan:
Utilizing BERT for Information Retrieval: Survey, Applications, Resources, and Challenges. 185:1-185:33 - Ali Shahidinejad, Jemal H. Abawajy:
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT. 186:1-186:38 - Lihua Zhou, Guowang Du, Kevin Lü, Lizhen Wang, Jingwei Du:
A Survey and an Empirical Evaluation of Multi-View Clustering Approaches. 187:1-187:38 - Yuyang Gao, Siyi Gu, Junji Jiang, Sungsoo Ray Hong, Dazhou Yu, Liang Zhao:
Going Beyond XAI: A Systematic Survey for Explanation-Guided Learning. 188:1-188:39 - Yang Liu, Dingkang Yang, Yan Wang, Jing Liu, Jun Liu, Azzedine Boukerche, Peng Sun, Liang Song:
Generalized Video Anomaly Event Detection: Systematic Taxonomy and Comparison of Deep Models. 189:1-189:38 - Luyao Yang, Osama Amin, Basem Shihada:
Intelligent Wearable Systems: Opportunities and Challenges in Health and Sports. 190:1-190:42
Volume 56, Number 8, August 2024
- Yingxia Shao, Hongzheng Li, Xizhi Gu, Hongbo Yin, Yawen Li, Xupeng Miao, Wentao Zhang, Bin Cui, Lei Chen:
Distributed Graph Neural Network Training: A Survey. 191:1-191:39 - Shashank Sheshar Singh, Samya Muhuri, Shivansh Mishra, Divya Srivastava, Harish Kumar Shakya, Neeraj Kumar:
Social Network Analysis: A Survey on Process, Tools, and Application. 192:1-192:39 - Ruchika Malhotra, Anjali Bansal, Marouane Kessentini:
A Systematic Literature Review on Maintenance of Software Containers. 193:1-193:38 - Marco Kurzweg, Yannick Weiss, Marc O. Ernst, Albrecht Schmidt, Katrin Wolf:
Survey on Haptic Feedback through Sensory Illusions in Interactive Systems. 194:1-194:39 - Jyothish Kumar J, Subhankar Mishra:
A Survey on Robotic Prosthetics: Neuroprosthetics, Soft Actuators, and Control Strategies. 195:1-195:44 - Saleh Mohamed Alhidaifi, Muhammad Rizwan Asghar, Imran Shafique Ansari:
A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions. 196:1-196:48 - Karen Carrasco, Lenin Tomalá, Eileen Ramírez Meza, Doris Meza Bolaños, Washington Ramírez Montalvan:
Computational Techniques in PET/CT Image Processing for Breast Cancer: A Systematic Mapping Review. 197:1-197:38 - Navin V. Keizer, Onur Ascigil, Michal Król, Dirk Kutscher, George Pavlou:
A Survey on Content Retrieval on the Decentralised Web. 198:1-198:39 - Ying Zhao, Jia Tina Du, Jinjun Chen:
Scenario-based Adaptations of Differential Privacy: A Technical Survey. 199:1-199:39 - Isabela Borlido Barcelos, Felipe de Castro Belém, Leonardo de Melo Joao, Zenilton Kleber G. do Patrocínio Jr., Alexandre Xavier Falcão, Silvio Jamil Ferzoli Guimarães:
A Comprehensive Review and New Taxonomy on Superpixel Segmentation. 200:1-200:39 - Weiwei Jiang, Jorge Gonçalves, Vassilis Kostakos:
Mobile Near-infrared Sensing - A Systematic Review on Devices, Data, Modeling, and Applications. 201:1-201:36 - Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. 202:1-202:37 - Bing Zhang, Xuyang Zhao, Jiangtian Nie, Jianhang Tang, Yuling Chen, Yang Zhang, Dusit Niyato:
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective. 203:1-203:39 - Raza Nowrozy, Khandakar Ahmed, A. S. M. Kayes, Hua Wang, Timothy R. McIntosh:
Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey. 204:1-204:37 - Sarah Elder, Md. Rayhanur Rahman, Gage Fringer, Kunal Kapoor, Laurie A. Williams:
A Survey on Software Vulnerability Exploitability Assessment. 205:1-205:41 - Andre Rodrigues Oliveira, Klairton Lima Brito, Alexsandro Oliveira Alexandrino, Gabriel Siqueira, Ulisses Dias, Zanoni Dias:
Rearrangement Distance Problems: An updated survey. 206:1-206:27 - Shubhra Jain, Rahul Kumar Verma:
A Taxonomy and Survey on Grid-Based Routing Protocols Designed for Wireless Sensor Networks. 207:1-207:41 - Tommaso Lanciano, Atsushi Miyauchi, Adriano Fazzone, Francesco Bonchi:
A Survey on the Densest Subgraph Problem and its Variants. 208:1-208:40 - Maroua Masmoudi, Sana Ben Abdallah Ben Lamine, Mohamed-Hedi Karray, Bernard Archimède, Hajer Baazaoui Zghal:
Semantic Data Integration and Querying: A Survey and Challenges. 209:1-209:35 - Ahmed Amine Chafik, Jaafar Gaber, Souad Tayane, Mohamed Ennaji, Julien Bourgeois, Tarek A. El-Ghazawi:
From Conventional to Programmable Matter Systems: A Review of Design, Materials, and Technologies. 210:1-210:26 - Pengyuan Lu, Lin Zhang, Mengyu Liu, Kaustubh Sridhar, Oleg Sokolsky, Fanxin Kong, Insup Lee:
Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory Works. 211:1-211:31 - Jason Gray, Daniele Sgandurra, Lorenzo Cavallaro, Jorge Blasco Alís:
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets. 212:1-212:36 - Akrati Saxena, George Fletcher, Mykola Pechenizkiy:
FairSNA: Algorithmic Fairness in Social Network Analysis. 213:1-213:45 - Anna Angelogianni, Ilias Politis, Christos Xenakis:
How many FIDO protocols are needed? Analysing the technology, security and compliance. 214:1-214:51 - Yazan Otoum, Navya Gottimukkala, Neeraj Kumar, Amiya Nayak:
Machine Learning in Metaverse Security: Current Solutions and Future Challenges. 215:1-215:36
Volume 56, Number 9, September 2024
- Fei Zhao, Chengcui Zhang, Baocheng Geng:
Deep Multimodal Data Fusion. 216:1-216:36 - Navid Mohammadi Foumani, Lynn Miller, Chang Wei Tan, Geoffrey I. Webb, Germain Forestier, Mahsa Salehi:
Deep Learning for Time Series Classification and Extrinsic Regression: A Current Survey. 217:1-217:45 - Monowar Hasan, Ashish Kashinath, Chien-Ying Chen, Sibin Mohan:
SoK: Security in Real-Time Systems. 218:1-218:31 - Jasmina Gajcin, Ivana Dusparic:
Redefining Counterfactual Explanations for Reinforcement Learning: Overview, Challenges and Opportunities. 219:1-219:33 - Kelvin Du, Frank Xing, Rui Mao, Erik Cambria:
Financial Sentiment Analysis: Techniques and Applications. 220:1-220:42 - Na Li, Rui Zhou, Bharath Krishna, Ashirbad Pradhan, Hyowon Lee, Jiayuan He, Ning Jiang:
Non-invasive Techniques for Muscle Fatigue Monitoring: A Comprehensive Survey. 221:1-221:40 - Cristian Daniele, Seyed Behnam Andarzian, Erik Poll:
Fuzzers for Stateful Systems: Survey and Research Directions. 222:1-222:23 - Kien Nguyen Thanh, Hugo Proença, Fernando Alonso-Fernandez:
Deep Learning for Iris Recognition: A Survey. 223:1-223:35 - Anita Khadka, Saurav Sthapit, Gregory Epiphaniou, Carsten Maple:
Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry. 224:1-224:29 - Shuai Huo, Dong Liu, Haotian Zhang, Li Li, Siwei Ma, Feng Wu, Wen Gao:
Towards Hybrid-Optimization Video Coding. 225:1-225:36 - Najah Abed AbuAli, Mubashir Rehman, Shahid Mumtaz, Muhammad Bilal Khan, Mohammad Hayajneh, Farman Ullah, Raza Ali Shah:
Contactless Diseases Diagnoses Using Wireless Communication Sensing: Methods and Challenges Survey. 226:1-226:29 - Upendra Singh, Kumar Abhishek, Hiteshwar Kumar Azad:
A Survey of Cutting-edge Multimodal Sentiment Analysis. 227:1-227:38 - Shiyu Wang, Yuanqi Du, Xiaojie Guo, Bo Pan, Zhaohui S. Qin, Liang Zhao:
Controllable Data Generation by Deep Learning: A Review. 228:1-228:38 - Felix Truger, Johanna Barzen, Marvin Bechtold, Martin Beisel, Frank Leymann, Alexander Mandl, Vladimir Yussupov:
Warm-Starting and Quantum Computing: A Systematic Mapping Study. 229:1-229:31 - Junyi Li, Tianyi Tang, Wayne Xin Zhao, Jian-Yun Nie, Ji-Rong Wen:
Pre-Trained Language Models for Text Generation: A Survey. 230:1-230:39 - Ricardo Amaro, Rúben Pereira, Miguel Mira da Silva:
DevOps Metrics and KPIs: A Multivocal Literature Review. 231:1-231:41 - Siwen Luo, Hamish Ivison, Soyeon Caren Han, Josiah Poon:
Local Interpretations for Explainable Natural Language Processing: A Survey. 232:1-232:36 - Saïma Sultana, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Jawahir Che Mustapha Yusuf, Mukesh Prasad:
A Deep Dive into Robot Vision - An Integrative Systematic Literature Review Methodologies and Research Endeavor Practices. 233:1-233:33 - Laércio Pioli, Douglas D. J. de Macedo, Daniel G. Costa, Mario A. R. Dantas:
Intelligent Edge-powered Data Reduction: A Systematic Literature Review. 234:1-234:39 - Weiqi Li:
Optimizing with Attractor: A Tutorial. 235:1-235:41 - Gyuwon Jung, Sangjun Park, Eun-Yeol Ma, Heeyoung Kim, Uichin Lee:
Tutorial on Matching-based Causal Analysis of Human Behaviors Using Smartphone Sensor Data. 236:1-236:33 - A'aeshah Alhakamy:
Extended Reality (XR) Toward Building Immersive Solutions: The Key to Unlocking Industry 4.0. 237:1-237:38 - Pau-Chen Cheng, Wojciech Ozga, Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Hani Jamjoom, Hubertus Franke, James Bottomley:
Intel TDX Demystified: A Top-Down Approach. 238:1-238:33 - Giovanni Maria Biancofiore, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fedelucio Narducci:
Interactive Question Answering Systems: Literature Review. 239:1-239:38 - Lingyun Wang, Hanlin Zhou, Yinwei Bao, Xiaoran Yan, Guojiang Shen, Xiangjie Kong:
Horizontal Federated Recommender System: A Survey. 240:1-240:42 - Priyanshu Priya, Mauajama Firdaus, Asif Ekbal:
Computational Politeness in Natural Language Processing: A Survey. 241:1-241:42 - Minghui Xu, Yihao Guo, Chunchi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Tao Niyato, Xiuzhen Cheng:
Exploring Blockchain Technology through a Modular Lens: A Survey. 242:1-242:39
Volume 56, Number 10, October 2024
- Jean-Gabriel Gaudreault, Paula Branco:
A Systematic Literature Review of Novelty Detection in Data Streams: Challenges and Opportunities. 243 - Huiyuan Lai, Malvina Nissim:
A Survey on Automatic Generation of Figurative Language: From Rule-based Systems to Large Language Models. 244 - Xiaojie Wang, Qi Guo, Zhaolong Ning, Lei Guo, Guoyin Wang, Xinbo Gao, Yan Zhang:
Integration of Sensing, Communication, and Computing for Metaverse: A Survey. 245 - Alvaro Novo, Francisco Lobon, Héctor García de Marina, Samuel F. Romero, Francisco Barranco:
Neuromorphic Perception and Navigation for Mobile Robots: A Review. 246 - Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin (Sherman) Shen:
Artificial Intelligence for Web 3.0: A Comprehensive Survey. 247 - Max Sponner, Bernd Waschneck, Akash Kumar:
Adapting Neural Networks at Runtime: Current Trends in At-Runtime Optimizations for Deep Learning. 248 - Juncheng Li, Zehua Pei, Wenjie Li, Guangwei Gao, Longguang Wang, Yingqian Wang, Tieyong Zeng:
A Systematic Survey of Deep Learning-Based Single-Image Super-Resolution. 249 - Hilda Hadan, Lydia Choong, Leah Zhang-Kennedy, Lennart E. Nacke:
Deceived by Immersion: A Systematic Analysis of Deceptive Design in Extended Reality. 250 - Muhammad Adil, Houbing Song, Mian Ahmad Jan, Muhammad Khurram Khan, Xiangjian He, Ahmed Farouk, Zhanpeng Jin:
UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions. 251 - Yoosof Mashayekhi, Nan Li, Bo Kang, Jefrey Lijffijt, Tijl De Bie:
A Challenge-based Survey of E-recruitment Recommendation Systems. 252 - Paul Kiyambu Mvula, Paula Branco, Guy-Vincent Jourdan, Herna Lydia Viktor:
A Survey on the Applications of Semi-supervised Learning to Cyber-security. 253 - Rita Suzana Pitangueira Maciel, Pedro Henrique Dias Valle, Kécia Souza Santana Santos, Elisa Yumi Nakagawa:
Systems Interoperability Types: A Tertiary Study. 254 - Gita Sarafraz, Armin Behnamnia, Mehran Hosseinzadeh, Ali Balapour, Amin Meghrazi, Hamid R. Rabiee:
Domain Adaptation and Generalization of Functional Medical Data: A Systematic Survey of Brain Data. 255 - Paulo Souza, Tiago Ferreto, Rodrigo N. Calheiros:
Maintenance Operations on Cloud, Edge, and IoT Environments: Taxonomy, Survey, and Research Challenges. 256 - James Halvorsen, Clemente Izurieta, Haipeng Cai, Assefaw Hadish Gebremedhin:
Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review. 257 - Yanna Jiang, Baihe Ma, Xu Wang, Guangsheng Yu, Ping Yu, Zhe Wang, Wei Ni, Ren Ping Liu:
Blockchained Federated Learning for Internet of Things: A Comprehensive Survey. 258 - Vasileios Tsoukas, Anargyros Gkogkidis, Eleni Boumpa, Athanasios Kakarountas:
A Review on the emerging technology of TinyML. 259 - Mishri Saleh AlMarshoud, Mehmet Sabir Kiraz, Ali H. Al-Bayatti:
Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions. 260 - Jiani Huang, Haihua Chen, Fengchang Yu, Wei Lu:
From Detection to Application: Recent Advances in Understanding Scientific Tables and Figures. 261 - Jiajun Wu, Fan Dong, Henry Leung, Zhuangdi Zhu, Jiayu Zhou, Steve Drew:
Topology-aware Federated Learning in Edge Computing: A Comprehensive Survey. 262 - Mostafa Haghir Chehreghani:
A Review on the Impact of Data Representation on Model Explainability. 263 - Paul Pu Liang, Amir Zadeh, Louis-Philippe Morency:
Foundations & Trends in Multimodal Machine Learning: Principles, Challenges, and Open Questions. 264 - Kartik Sharma, Yeon-Chang Lee, Sivagami Nambi, Aditya Salian, Shlok Shah, Sang-Wook Kim, Srijan Kumar:
A Survey of Graph Neural Networks for Social Recommender Systems. 265 - Chamara Sandeepa, Bartlomiej Siniarski, Nicolas Kourtellis, Shen Wang, Madhusanka Liyanage:
A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks. 266 - Hou-I Liu, Marco Galindo, Hongxia Xie, Lai-Kuan Wong, Hong-Han Shuai, Yung-Hui Li, Wen-Huang Cheng:
Lightweight Deep Learning for Resource-Constrained Environments: A Survey. 267 - Shangsong Liang, Zhou Pan, Wei Liu, Jian Yin, Maarten de Rijke:
A Survey on Variational Autoencoders in Recommender Systems. 268
Volume 56, Number 11, November 2024
- Jirat Pasuksmit, Patanamon Thongtanunam, Shanika Karunasekera:
A Systematic Literature Review on Reasons and Approaches for Accurate Effort Estimations in Agile. 269:1-269:37 - Alexandre Heuillet, Ahmad Nasser, Hichem Arioui, Hedi Tabia:
Efficient Automation of Neural Network Design: A Survey on Differentiable Neural Architecture Search. 270:1-270:36 - Anthony Paproki, Olivier Salvado, Clinton Fookes:
Synthetic Data for Deep Learning in Computer Vision & Medical Imaging: A Means to Reduce Data Bias. 271:1-271:37 - Carlos Núñez-Molina, Pablo Mesejo, Juan Fernández-Olivares:
A Review of Symbolic, Subsymbolic and Hybrid Methods for Sequential Decision Making. 272:1-272:36 - Wanying Liang, Pasquale De Meo, Yong Tang, Jia Zhu:
A Survey of Multi-modal Knowledge Graphs: Technologies and Trends. 273:1-273:41 - Karolina Selwon, Julian Szymanski:
A Review of Explainable Fashion Compatibility Modeling Methods. 274:1-274:29 - Shashikiran Venkatesha, Ranjani Parthasarathi:
Survey on Redundancy Based-Fault tolerance methods for Processors and Hardware accelerators - Trends in Quantum Computing, Heterogeneous Systems and Reliability. 275:1-275:76 - Jordan Tewell, Nimesha Ranasinghe:
A Review of Olfactory Display Designs for Virtual Reality Environments. 276:1-276:35 - Maryam Mozaffari, Anton Dignös, Johann Gamper, Uta Störl:
Self-tuning Database Systems: A Systematic Literature Review of Automatic Database Schema Design and Tuning. 277:1-277:37 - Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui:
A Survey on Malware Detection with Graph Representation Learning. 278:1-278:36 - Zhen Jia, Zhang Zhang, Liang Wang, Tieniu Tan:
Human Image Generation: A Comprehensive Survey. 279:1-279:39 - Ankur Gupta, Sahil Sawhney, Kashyap Kompella:
The First Principles: Setting the Context for a Safe and Secure Metaverse. 280:1-280:29 - Fan Mo, Zahra Tarkhani, Hamed Haddadi:
Machine Learning with Confidential Computing: A Systematization of Knowledge. 281:1-281:40 - Francesco Periti, Stefano Montanelli:
Lexical Semantic Change through Large Language Models: a Survey. 282:1-282:38 - Giorgio Franceschelli, Mirco Musolesi:
Creativity and Machine Learning: A Survey. 283:1-283:41 - Nilotpal Biswas, Anamitra Mukherjee, Samit Bhattacharya:
"Are you feeling sick?" - A systematic literature review of cybersickness in virtual reality. 284:1-284:38 - Luís Meruje Ferreira, Fábio Coelho, José Pereira:
Databases in Edge and Fog Environments: A Survey. 285:1-285:40 - Behrouz Zolfaghari, Mostafa Abbas Mollaei, Fahimeh Hajizadeh, Naoto Yanai, Khodakhast Bibak:
Secure UAV (Drone) and the Great Promise of AI. 286:1-286:37 - Adyasha Dash, Kathleen Agres:
AI-Based Affective Music Generation Systems: A Review of Methods and Challenges. 287:1-287:34 - Yiming Wang, Bin Zhang, Lamei Di:
Research Progress of EEG-Based Emotion Recognition: A Survey. 288:1-288:49 - Jessica Woodgate, Nirav Ajmeri:
Macro Ethics Principles for Responsible AI Systems: Taxonomy and Directions. 289:1-289:37 - Debendra Das Sharma, Robert Blankenship, Daniel S. Berger:
An Introduction to the Compute Express Link (CXL) Interconnect. 290:1-290:37 - Fabio De Sousa Ribeiro, Kevin Duarte, Miles Everett, Georgios Leontidis, Mubarak Shah:
Object-centric Learning with Capsule Networks: A Survey. 291:1-291:291 - Katrin Hartwig, Frédéric Doell, Christian Reuter:
The Landscape of User-centered Misinformation Interventions - A Systematic Literature Review. 292:1-292:36 - Xiaoyan Zhao, Yang Deng, Min Yang, Lingzhi Wang, Rui Zhang, Hong Cheng, Wai Lam, Ying Shen, Ruifeng Xu:
A Comprehensive Survey on Relation Extraction: Recent Advances and New Frontiers. 293:1-293:39
Volume 56, Number 12, December 2024
- Hassan Gharoun, Fereshteh Momenifar, Fang Chen, Amir H. Gandomi:
Meta-learning Approaches for Few-Shot Learning: A Survey of Recent Advances. 294:1-294:41 - Shijie Chen, Yu Zhang, Qiang Yang:
Multi-Task Learning in Natural Language Processing: An Overview. 295:1-295:32 - Jiaxu Leng, Yongming Ye, Mengjingcheng Mo, Chenqiang Gao, Ji Gan, Bin Xiao, Xinbo Gao:
Recent Advances for Aerial Object Detection: A Survey. 296:1-296:36 - Bruce X. B. Yu, Jianlong Chang, Haixin Wang, Lingbo Liu, Shijie Wang, Zhiyu Wang, Junfan Lin, Lingxi Xie, Haojie Li, Zhouchen Lin, Qi Tian, Chang Wen Chen:
Visual Tuning. 297:1-297:38 - Wei Liang, Yaqin Liu, Ce Yang, Songyou Xie, Kuanching Li, Willy Susilo:
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey. 298:1-298:35 - Zain Ul Abideen, Sumathi Gokulanathan, Muayad J. Aljafar, Samuel Pagliarini:
An Overview of FPGA-inspired Obfuscation Techniques. 299:1-299:35 - Jacob Krüger, Yi Li, Kirill Lossev, Chenguang Zhu, Marsha Chechik, Thorsten Berger, Julia Rubin:
A Meta-Study of Software-Change Intentions. 300:1-300:41 - Katie Seaborn, Jacqueline Urakami, Peter Pennefather, Norihisa Miyake:
Qualitative Approaches to Voice UX. 301:1-301:34 - Agnaldo de Souza Batista, Aldri Luiz dos Santos:
A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques. 302:1-302:36 - Raphael Elikplim Nkrow, Bruno Silva, Dutliff Boshoff, Gerhard P. Hancke, Mikael Gidlund, Adnan M. Abu-Mahfouz:
NLOS Identification and Mitigation for Time-based Indoor Localization Systems: Survey and Future Research Directions. 303:1-303:41 - Fei Yu, Hongbo Zhang, Prayag Tiwari, Benyou Wang:
Natural Language Reasoning, A Survey. 304:1-304:39 - Mahmoud SalahEldin Kasem, Abdelrahman Abdallah, Alexander Berendeyev, Ebrahem Elkady, Mohamed Mahmoud, Mahmoud Abdalla, Mohamed Hamada, Sebastiano Vascon, Daniyar B. Nurseitov, Islam Taj-Eddin:
Deep Learning for Table Detection and Structure Recognition: A Survey. 305:1-305:41 - Shaoxiong Ji, Xiaobo Li, Wei Sun, Hang Dong, Ara Taalas, Yijia Zhang, Honghan Wu, Esa Pitkänen, Pekka Marttinen:
A Unified Review of Deep Learning for Automated Medical Coding. 306:1-306:41 - Huandong Wang, Huan Yan, Can Rong, Yuan Yuan, Fenyu Jiang, Zhenyu Han, Hongjie Sui, Depeng Jin, Yong Li:
Multi-scale Simulation of Complex Systems: A Perspective of Integrating Knowledge and Data. 307:1-307:38 - Nirupama Ravi, C. Mani Krishna, Israel Koren:
Mix-Zones as an Effective Privacy Enhancing Technique in Mobile and Vehicular Ad-hoc Networks. 308:1-308:33 - Yao Wan, Zhangqian Bi, Yang He, Jianguo Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin, Philip S. Yu:
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit. 309:1-309:41 - Pietro Melzi, Christian Rathgeb, Ruben Tolosana, Rubén Vera-Rodríguez, Christoph Busch:
An Overview of Privacy-Enhancing Technologies in Biometric Recognition. 310:1-310:28 - Lianying Zhao, He Shuang, Shengjie Xu, Wei Huang, Rongzhen Cui, Pushkar Bettadpur, David Lie:
A Survey of Hardware Improvements to Secure Program Execution. 311:1-311:37 - Sahil Verma, Varich Boonsanong, Minh Hoang, Keegan Hines, John Dickerson, Chirag Shah:
Counterfactual Explanations and Algorithmic Recourses for Machine Learning: A Review. 312:1-312:42 - Miguel G. Silva, Sara C. Madeira, Rui Henriques:
A Comprehensive Survey on Biclustering-based Collaborative Filtering. 313:1-313:32 - Mohd Saqib, Samaneh Mahdavifar, Benjamin C. M. Fung, Philippe Charland:
A Comprehensive Analysis of Explainable AI for Malware Hunting. 314:1-314:40 - Uchitha Rajapaksha, Ferdous Sohel, Hamid Laga, Dean Diepeveen, Mohammed Bennamoun:
Deep Learning-based Depth Estimation Methods from Monocular Image and Videos: A Comprehensive Survey. 315:1-315:51 - Junxue Zhang, Xiaodian Cheng, Liu Yang, Jinbin Hu, Ximeng Liu, Kai Chen:
SoK: Fully Homomorphic Encryption Accelerators. 316:1-316:32 - Yuecong Xu, Haozhi Cao, Lihua Xie, Xiao-Li Li, Zhenghua Chen, Jianfei Yang:
Video Unsupervised Domain Adaptation with Deep Learning: A Comprehensive Survey. 317:1-317:36 - Hannes Mandler, Bernhard Weigand:
A review and benchmark of feature importance methods for neural networks. 318:1-318:30 - Jingxue Chen, Hang Yan, Zhiyuan Liu, Min Zhang, Hu Xiong, Shui Yu:
When Federated Learning Meets Privacy-Preserving Computation. 319:1-319:36
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.