


default search action
ACM Computing Surveys, Volume 55
Volume 55, Number 1, January 2023
- Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. 1:1-1:35 - Kinza Sarwar, Sira Yongchareon, Jian Yu, Saeed Ur Rehman
:
A Survey on Privacy Preservation in Fog-Enabled Internet of Things. 2:1-2:39 - Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. 3:1-3:36 - Rodolfo Ipolito Meneguette, Robson E. De Grande
, Jo Ueyama
, Geraldo P. Rocha Filho
, Edmundo R. M. Madeira
:
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges. 4:1-4:46 - Chao Yu, Jiming Liu, Shamim Nemati, Guosheng Yin:
Reinforcement Learning in Healthcare: A Survey. 5:1-5:36 - Fan Xu
, Victor S. Sheng, Mingwen Wang:
A Unified Perspective for Disinformation Detection and Truth Discovery in Social Sensing: A Survey. 6:1-6:33 - Massimiliano Luca
, Gianni Barlacchi, Bruno Lepri, Luca Pappalardo
:
A Survey on Deep Learning for Human Mobility. 7:1-7:44 - Gabriel Resende Machado, Eugênio Silva, Ronaldo Ribeiro Goldschmidt
:
Adversarial Machine Learning in Image Classification: A Survey Toward the Defender's Perspective. 8:1-8:38 - Abhishek Hazra
, Mainak Adhikari, Tarachand Amgoth, Satish Narayana Srirama:
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions. 9:1-9:35 - Claudio Daniel Tenorio de Barros, Matheus R. F. Mendonça, Alex Borges Vieira, Artur Ziviani:
A Survey on Embedding Dynamic Graphs. 10:1-10:37 - Viktor Rosenfeld
, Sebastian Breß, Volker Markl:
Query Processing on Heterogeneous CPU/GPU Systems. 11:1-11:38 - Giannis Bekoulis, Christina Papagiannopoulou, Nikos Deligiannis:
A Review on Fact Extraction and Verification. 12:1-12:35 - Junjun Jiang, Chenyang Wang, Xianming Liu, Jiayi Ma:
Deep Learning-based Face Super-resolution: A Survey. 13:1-13:36 - Wenbo Ge
, Pooia Lalbakhsh
, Leigh Isai, Artem Lenskiy
, Hanna Suominen
:
Neural Network-Based Financial Volatility Forecasting: A Systematic Review. 14:1-14:30 - Deqiang Li, Qianmu Li, Yanfang (Fanny) Ye, Shouhuai Xu:
Arms Race in Adversarial Malware Detection: A Survey. 15:1-15:35 - Roberto Amadini:
A Survey on String Constraint Solving. 16:1-16:38 - Christopher Brant, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall
, Daniela Oliveira:
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking. 17:1-17:33 - Alison Fernandez-Blanco
, Alexandre Bergel
, Juan Pablo Sandoval Alcocer
:
Software Visualizations to Analyze Memory Consumption: A Literature Review. 18:1-18:34 - Saed Alrabaee
, Mourad Debbabi
, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. 19:1-19:41 - Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, Keqin Li:
Artificial Intelligence Security: Threats and Countermeasures. 20:1-20:36 - Alessio Rugo, Claudio A. Ardagna
, Nabil El Ioini:
A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis. 21:1-21:35 - Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. 22:1-22:51 - Thanh Tuan Nguyen, Thanh Phuong Nguyen:
A Comprehensive Taxonomy of Dynamic Texture Representation. 23:1-23:39
Volume 55, Number 2, March 2023
- Federico Ciccozzi
, Lorenzo Addazi, Sara Abbaspour Asadollah, Björn Lisper, Abu Naser Masud
, Saad Mubeen:
A Comprehensive Exploration of Languages for Parallel Computing. 24:1-24:39 - Zhao-Rong Lai
, Haisheng Yang:
A Survey on Gaps between Mean-Variance Approach and Exponential Growth Rate Approach for Portfolio Optimization. 25:1-25:36 - Ananya B. Sai
, Akash Kumar Mohankumar, Mitesh M. Khapra:
A Survey of Evaluation Metrics Used for NLG Systems. 26:1-26:39 - Manzoor Ahmed Khan
, Hesham El-Sayed, Sumbal Malik
, Muhammad Talha Zia, Muhammad Jalal Khan, Najla Alkaabi, Henry Alexander Ignatious:
Level-5 Autonomous Driving - Are We There Yet? A Review of Research Literature. 27:1-27:38 - Oluwamayowa Ade Adeleke, Nicholas Bastin, Deniz Gurkan
:
Network Traffic Generation: A Survey and Methodology. 28:1-28:23 - Breno G. S. Costa, João Bachiega Jr., Leonardo Rebouças de Carvalho
, Aletéia P. F. Araújo
:
Orchestration in Fog Computing: A Comprehensive Survey. 29:1-29:34 - Nuha Aldausari
, Arcot Sowmya, Nadine Marcus, Gelareh Mohammadi:
Video Generative Adversarial Networks: A Review. 30:1-30:25 - Libing Deng
, Guoqi Xie, Hong Liu, Yunbo Han, Renfa Li, Keqin Li:
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN. 31:1-31:36 - Omar Hasan
, Lionel Brunie, Elisa Bertino:
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. 32:1-32:37 - Tabinda Sarwar
, Sattar Seifollahi, Jeffrey Chan
, Xiuzhen Zhang, Vural Aksakalli, Irene Lena Hudson, Karin Verspoor, Lawrence Cavedon
:
The Secondary Use of Electronic Health Records for Data Mining: Data Characteristics and Challenges. 33:1-33:40 - Claudio Filipi Gonçalves dos Santos, Diego de Souza Oliveira, Leandro A. Passos
, Rafael Gonçalves Pires
, Daniel Felipe Silva Santos, Lucas Pascotti Valem
, Thierry Pinheiro Moreira
, Marcos Cleison S. Santana
, Mateus Roder
, João Paulo Papa
, Danilo Colombo:
Gait Recognition Based on Deep Learning: A Survey. 34:1-34:34 - Qiao Jin
, Zheng Yuan
, Guangzhi Xiong
, Qianlan Yu, Huaiyuan Ying, Chuanqi Tan, Mosha Chen, Songfang Huang, Xiaozhong Liu, Sheng Yu:
Biomedical Question Answering: A Survey of Approaches and Challenges. 35:1-35:36 - Yiqun Xie
, Shashi Shekhar, Yan Li:
Statistically-Robust Clustering Techniques for Mapping Spatial Hotspots: A Survey. 36:1-36:38 - José Alemany
, Elena del Val
, Ana García-Fornes
:
A Review of Privacy Decision-making Mechanisms in Online Social Networks. 37:1-37:32 - Jingya Zhou
, Ling Liu
, Wenqi Wei, Jianxi Fan:
Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding. 38:1-38:35 - Davinder Kaur
, Suleyman Uslu, Kaley J. Rittichier, Arjan Durresi
:
Trustworthy Artificial Intelligence: A Review. 39:1-39:38 - Conor Fahy
, Shengxiang Yang
, Mario Gongora:
Scarcity of Labels in Non-Stationary Data Streams: A Survey. 40:1-40:39 - José Marcelo Fernandes
, Jorge Sá Silva
, André Rodrigues
, Fernando Boavida
:
A Survey of Approaches to Unobtrusive Sensing of Humans. 41:1-41:28 - David Rolnick
, Priya L. Donti, Lynn H. Kaack
, Kelly Kochanski
, Alexandre Lacoste, Kris Sankaran, Andrew Slavin Ross, Nikola Milojevic-Dupont, Natasha Jaques, Anna Waldman-Brown, Alexandra Sasha Luccioni, Tegan Maharaj, Evan D. Sherwin
, S. Karthik Mukkavilli
, Konrad P. Kording, Carla P. Gomes
, Andrew Y. Ng, Demis Hassabis, John C. Platt
, Felix Creutzig, Jennifer T. Chayes
, Yoshua Bengio:
Tackling Climate Change with Machine Learning. 42:1-42:96 - Shallu Sharma, Pravat Kumar Mandal
:
A Comprehensive Report on Machine Learning-based Early Detection of Alzheimer's Disease using Multi-modal Neuroimaging Data. 43:1-43:44 - Ankur O. Bang
, Udai Pratap Rao
, Pallavi Kaliyar
, Mauro Conti
:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. 44:1-44:36
Volume 55, Number 3, April 2023
- Sanjay Kumar Anand
, Suresh Kumar
:
Experimental Comparisons of Clustering Approaches for Data Representation. 45:1-45:33 - Tasniem Nasser Al-Yahya, Mohamed El Bachir Menai, Hassan Mathkour:
On the Structure of the Boolean Satisfiability Problem: A Survey. 46:1-46:34 - Marcos Roberto e Souza, Helena de Almeida Maia, Hélio Pedrini:
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges. 47:1-47:37 - Tukaram Muske, Alexander Serebrenik
:
Survey of Approaches for Postprocessing of Static Analysis Alarms. 48:1-48:39 - Danula Hettiachchi
, Vassilis Kostakos, Jorge Gonçalves
:
A Survey on Task Assignment in Crowdsourcing. 49:1-49:35 - Raj Mohan Singh
, Lalit Kumar Awasthi
, Geeta Sikka
:
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review. 50:1-50:43 - Dana Pessach
, Erez Shmueli
:
A Review on Fairness in Machine Learning. 51:1-51:44 - Chenning Li
, Zhichao Cao:
LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey. 52:1-52:36 - Alexander Plopski
, Teresa Hirzle
, Nahal Norouzi
, Long Qian
, Gerd Bruder
, Tobias Langlotz
:
The Eye in Extended Reality: A Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality. 53:1-53:39 - Nan Wu
, Yuan Xie:
A Survey of Machine Learning for Computer Architecture and Systems. 54:1-54:39 - Thomas Reisinger, Isabel Wagner
, Eerke A. Boiten:
Security and Privacy in Unified Communication. 55:1-55:36 - Ruiqi Li, Xiang Zhao, Marie-Francine Moens:
A Brief Overview of Universal Sentence Representation Methods: A Linguistic View. 56:1-56:42 - Huan Li
, Hua Lu
, Christian S. Jensen
, Bo Tang
, Muhammad Aamir Cheema
:
Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects. 57:1-57:41 - Dina G. Mahmoud
, Vincent Lenders
, Mirjana Stojilovic:
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era. 58:1-58:40 - Jacopo Soldani
, Antonio Brogi
:
Anomaly Detection and Failure Root Cause Analysis in (Micro) Service-Based Cloud Applications: A Survey. 59:1-59:39 - Dinh C. Nguyen, Quoc-Viet Pham
, Pubudu N. Pathirana, Ming Ding
, Aruna Seneviratne, Zihuai Lin
, Octavia A. Dobre, Won-Joo Hwang:
Federated Learning for Smart Healthcare: A Survey. 60:1-60:37 - Anna Berenberg, Brad Calder:
Deployment Archetypes for Cloud Applications. 61:1-61:48 - Voica Gavrilut
, Aleksander Pruski
, Michael Stübert Berger
:
Constructive or Optimized: An Overview of Strategies to Design Networks for Time-Critical Applications. 62:1-62:35 - Susanne Barth, Dan Ionita
, Pieter H. Hartel:
Understanding Online Privacy - A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. 63:1-63:37 - Longbing Cao
:
AI in Finance: Challenges, Techniques, and Opportunities. 64:1-64:38
Volume 55, Number 4, May 2023
- Gianni Brauwers
, Flavius Frasincar
:
A Survey on Aspect-Based Sentiment Classification. 65:1-65:37 - Jared Willard
, Xiaowei Jia
, Shaoming Xu
, Michael S. Steinbach
, Vipin Kumar
:
Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems. 66:1-66:37 - Daniel Soares Santos
, Brauner R. N. Oliveira
, Rick Kazman, Elisa Yumi Nakagawa:
Evaluation of Systems-of-Systems Software Architectures: State of the Art and Future Perspectives. 67:1-67:35 - Thiago L. T. da Silveira
, Paulo G. L. Pinto, Jeffri Murrugarra-Llerena
, Cláudio R. Jung:
3D Scene Geometry Estimation from 360° Imagery: A Survey. 68:1-68:39 - Alessio Ferrari
, Maurice H. ter Beek
:
Formal Methods in Railways: A Systematic Mapping Study. 69:1-69:37 - Youyang Qu
, Md. Palash Uddin
, Chenquan Gan, Yong Xiang
, Longxiang Gao, John Yearwood:
Blockchain-enabled Federated Learning: A Survey. 70:1-70:35 - Marios Evangelos Kanakis
, Ramin Khalili, Lin Wang:
Machine Learning for Computer Systems and Networking: A Survey. 71:1-71:36 - Javier Troya, Sergio Segura, Lola Burgueño, Manuel Wimmer
:
Model Transformation Testing and Debugging: A Survey. 72:1-72:39 - Arif Husen
, Muhammad Hasanain Chaudary, Farooq Ahmad:
A Survey on Requirements of Future Intelligent Networks: Solutions and Future Research Directions. 73:1-73:61 - Yingan Cui
, Xue Li
, Junhuai Li
, Huaijun Wang
, Xiaogang Chen
:
A Survey of Sampling Method for Social Media Embeddedness Relationship. 74:1-74:39 - Heitor Murilo Gomes
, Maciej Grzenda, Rodrigo Fernandes de Mello, Jesse Read, Minh-Huong Le Nguyen, Albert Bifet
:
A Survey on Semi-supervised Learning for Delayed Partially Labelled Data Streams. 75:1-75:42 - Shouyong Jiang
, Juan Zou
, Shengxiang Yang
, Xin Yao
:
Evolutionary Dynamic Multi-objective Optimisation: A Survey. 76:1-76:47 - Rabindra Lamsal
, Aaron Harwood, Maria Rodriguez Read
:
Socially Enhanced Situation Awareness from Microblogs Using Artificial Intelligence: A Survey. 77:1-77:38 - Krishna Teja Chitty-Venkata
, Arun K. Somani:
Neural Architecture Search Survey: A Hardware Perspective. 78:1-78:36 - Xiang Li
, Yazhou Zhang, Prayag Tiwari
, Dawei Song, Bin Hu, Meihong Yang, Zhigang Zhao, Neeraj Kumar, Pekka Marttinen
:
EEG Based Emotion Recognition: A Tutorial and Review. 79:1-79:57 - Wu Liu, Qian Bao
, Yu Sun, Tao Mei
:
Recent Advances of Monocular 2D and 3D Human Pose Estimation: A Deep Learning Perspective. 80:1-80:41 - Zhaoxin Fan
, Yazhi Zhu, Yulin He, Qi Sun, Hongyan Liu, Jun He:
Deep Learning on Monocular Object Pose Detection and Tracking: A Comprehensive Overview. 81:1-81:40 - Matthew J. Vowels
, Necati Cihan Camgöz
, Richard Bowden
:
D'ya Like DAGs? A Survey on Structure Learning and Causal Discovery. 82:1-82:36 - Giorgos Armeniakos
, Georgios Zervakis, Dimitrios Soudris
, Jörg Henkel:
Hardware Approximate Techniques for Deep Neural Network Accelerators: A Survey. 83:1-83:36 - Chen Yan
, Xiaoyu Ji
, Kai Wang
, Qinhong Jiang
, Zizhi Jin
, Wenyuan Xu
:
A Survey on Voice Assistant Security: Attacks and Countermeasures. 84:1-84:36 - Elena Almaraz Luengo
:
Gamma Pseudo Random Number Generators. 85:1-85:33 - Anubhab Baksi
, Shivam Bhasin
, Jakub Breier
, Dirmanto Jap
, Dhiman Saha
:
A Survey on Fault Attacks on Symmetric Key Cryptosystems. 86:1-86:34
Volume 55, Number 5, June 2023
- Kalia Orphanou
, Jahna Otterbacher
, Styliani Kleanthous
, Khuyagbaatar Batsuren
, Fausto Giunchiglia
, Veronika Bogina
, Avital Shulner-Tal
, Alan Hartman
, Tsvi Kuflik
:
Mitigating Bias in Algorithmic Systems - A Fish-eye View. 87:1-87:37 - Jiang Xiao, Huichuwu Li
, Minrui Wu
, Hai Jin
, M. Jamal Deen
, Jiannong Cao
:
A Survey on Wireless Device-free Human Sensing: Application Scenarios, Current Solutions, and Open Issues. 88:1-88:35 - Yuan He
, Xiuzhen Guo
, Xiaolong Zheng
, Zihao Yu
, Jia Zhang
, Haotian Jiang
, Xin Na
, Jiacheng Zhang
:
Cross-Technology Communication for the Internet of Things: A Survey. 89:1-89:29 - Yoshitomo Matsubara
, Marco Levorato, Francesco Restuccia:
Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges. 90:1-90:30 - Quim Motger
, Xavier Franch
, Jordi Marco:
Software-Based Dialogue Systems: Survey, Taxonomy, and Challenges. 91:1-91:42 - George A. Vouros
:
Explainable Deep Reinforcement Learning: State of the Art and Challenges. 92:1-92:39 - Bushra Alhijawi
, Arafat Awajan, Salam Fraihat
:
Survey on the Objectives of Recommender Systems: Measures, Solutions, Evaluation Methodology, and New Perspectives. 93:1-93:38 - Amina Kammoun
, Rim Slama
, Hedi Tabia
, Tarek Ouni
, Mohamed Abid
:
Generative Adversarial Networks for Face Generation: A Survey. 94:1-94:37 - Amir-Hossein Karimi, Gilles Barthe
, Bernhard Schölkopf
, Isabel Valera
:
A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations. 95:1-95:29 - Manal AlAmir, Manal Al Ghamdi:
The Role of Generative Adversarial Network in Medical Image Analysis: An In-depth Survey. 96:1-96:36 - Shiwen Wu
, Fei Sun
, Wentao Zhang
, Xu Xie
, Bin Cui
:
Graph Neural Networks in Recommender Systems: A Survey. 97:1-97:37 - Fabio Valerio Massoli
, Lucia Vadicamo
, Giuseppe Amato
, Fabrizio Falchi
:
A Leap among Quantum Computing and Quantum Neural Networks: A Survey. 98:1-98:37 - Pedro Cruz, Nadjib Achir
, Aline Carneiro Viana:
On the Edge of the Deployment: A Survey on Multi-access Edge Computing. 99:1-99:34 - Triet Huynh Minh Le
, Huaming Chen
, Muhammad Ali Babar
:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization. 100:1-100:39 - Darren Yates
, Md Zahidul Islam
:
Data Mining on Smartphones: An Introduction and Survey. 101:1-101:38 - Congbo Ma
, Wei Emma Zhang
, Mingyu Guo
, Hu Wang
, Quan Z. Sheng
:
Multi-document Summarization via Deep Learning Techniques: A Survey. 102:1-102:37 - Julia El Zini
, Mariette Awad
:
On the Explainability of Natural Language Processing Deep Models. 103:1-103:31 - Hansoo Lee, Joonyoung Park
, Uichin Lee
:
A Systematic Survey on Android API Usage for Data-driven Analytics with Smartphones. 104:1-104:38 - Zhiyan Chen
, Jinxin Liu
, Yu Shen
, Murat Simsek
, Burak Kantarci
, Hussein T. Mouftah
, Petar Djukic
:
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. 105:1-105:37 - Emanuele Del Sozzo
, Davide Conficconi
, Alberto Zeni
, Mirko Salaris
, Donatella Sciuto
, Marco D. Santambrogio
:
Pushing the Level of Abstraction of Digital System Design: A Survey on How to Program FPGAs. 106:1-106:48 - Hooman Alavizadeh
, Julian Jang-Jaccard
, Simon Yusuf Enoch
, Harith Al-Sahaf
, Ian Welch
, Seyit Ahmet Çamtepe
, Dan Dongseong Kim
:
A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights. 107:1-107:37 - Trivikram Muralidharan
, Aviad Cohen
, Noa Gerson
, Nir Nissim
:
File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements. 108:1-108:45
Volume 55, Number 6, July 2023
- Yi Tay
, Mostafa Dehghani
, Dara Bahri
, Donald Metzler
:
Efficient Transformers: A Survey. 109:1-109:28 - Mahdi Fahmideh
, John C. Grundy
, Aakash Ahmad
, Jun Shen
, Jun Yan
, Davoud Mougouei
, Peng Wang
, Aditya Ghose
, Anuradha Gunawardana
, Uwe Aickelin
, Babak Abedin
:
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions. 110:1-110:44 - Binglei Guo
, Jiong Yu
, Dexian Yang
, Hongyong Leng
, Bin Liao
:
Energy-Efficient Database Systems: A Systematic Survey. 111:1-111:53 - Shanto Roy
, Nazia Sharmin
, Jaime C. Acosta
, Christopher Kiekintveld
, Aron Laszka
:
Survey and Taxonomy of Adversarial Reconnaissance Techniques. 112:1-112:38 - Dan Xia
, Chun Jiang, Jiafu Wan
, Jiong Jin
, Victor C. M. Leung
, Miguel Martínez-García:
Heterogeneous Network Access and Fusion in Smart Factory: A Survey. 113:1-113:31 - Andrei Paleyes
, Raoul-Gabriel Urma
, Neil D. Lawrence
:
Challenges in Deploying Machine Learning: A Survey of Case Studies. 114:1-114:29 - Guilherme Gonçalves
, Hugo Coelho
, Pedro Monteiro
, Miguel Melo
, Maximino Bessa
:
Systematic Review of Comparative Studies of the Impact of Realism in Immersive Virtual Experiences. 115:1-115:36 - Alexander Schäfer
, Gerd Reis
, Didier Stricker
:
A Survey on Synchronous Augmented, Virtual, andMixed Reality Remote Collaboration Systems. 116:1-116:27 - Meike Zehlike
, Ke Yang
, Julia Stoyanovich
:
Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems. 117:1-117:41 - Meike Zehlike
, Ke Yang
, Julia Stoyanovich
:
Fairness in Ranking, Part I: Score-Based Ranking. 118:1-118:36 - Hakan Erdogmus
:
Bayesian Hypothesis Testing Illustrated: An Introduction for Software Engineering Researchers. 119:1-119:28 - Luke K. Topham
, Wasiq Khan
, Dhiya Al-Jumeily
, Abir Hussain
:
Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models. 120:1-120:42 - Konstantinos Benidis
, Syama Sundar Rangapuram
, Valentin Flunkert
, Yuyang Wang
, Danielle C. Maddix
, Ali Caner Türkmen, Jan Gasthaus
, Michael Bohlke-Schneider
, David Salinas
, Lorenzo Stella
, François-Xavier Aubet
, Laurent Callot
, Tim Januschowski
:
Deep Learning for Time Series Forecasting: Tutorial and Literature Survey. 121:1-121:36 - Jongkil Jay Jeong
, Yevhen Zolotavkin
, Robin Doss
:
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis. 122:1-122:31 - Simon Parkinson
, Saad Khan
:
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective. 123:1-123:28 - Samuel Jero
, Nathan Burow
, Bryan C. Ward, Richard Skowyra
, Roger Khazan
, Howard E. Shrobe
, Hamed Okhravi
:
TAG: Tagged Architecture Guide. 124:1-124:34 - Rodrigo Branco
, Ben Lee
:
Cache-related Hardware Capabilities and Their Impact on Information Security. 125:1-125:35 - Temitayo A. Olugbade
, Marta Bienkiewicz
, Giulia Barbareschi
, Vincenzo Stefano D'Amato
, Luca Oneto
, Antonio Camurri
, Catherine Holloway
, Mårten Björkman
, Peter E. Keller
, Martin Clayton
, Amanda C. de C. Williams
, Nicolas Gold
, Cristina Becchio
, Benoît G. Bardy
, Nadia Bianchi-Berthouze
:
Human Movement Datasets: An Interdisciplinary Scoping Review. 126:1-126:29 - Johan Arcile
, Étienne André
:
Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice. 127:1-127:36 - Lu Chen
, Yunjun Gao
, Xuan Song
, Zheng Li
, Yifan Zhu
, Xiaoye Miao
, Christian S. Jensen
:
Indexing Metric Spaces for Exact Similarity Search. 128:1-128:39 - Kimiya Keyvan
, Jimmy Xiangji Huang
:
How to Approach Ambiguous Queries in Conversational Search: A Survey of Techniques, Approaches, Tools, and Challenges. 129:1-129:40 - Denis Kleyko
, Dmitri A. Rachkovskij
, Evgeny Osipov
, Abbas Rahimi
:
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part I: Models and Data Transformations. 130:1-130:40
Volume 55, Number 7, July 2023
- Lucas Henna Sallaberry
, Romero Tori
, Fátima L. S. Nunes
:
Automatic Performance Assessment in Three-dimensional Interactive Haptic Medical Simulators: A Systematic Review. 131:1-131:35 - Siva Uday Sampreeth Chebolu
, Paolo Rosso
, Sudipta Kar
, Thamar Solorio
:
Survey on Aspect Category Detection. 132:1-132:37 - Deepak Adhikari
, Wei Jiang
, Jinyu Zhan, Zhiyuan He, Danda B. Rawat, Uwe Aickelin
, Hadi Akbarzade Khorshidi:
A Comprehensive Survey on Imputation of Missing Data in Internet of Things. 133:1-133:38 - Zhibo Wang
, Jingjing Ma
, Xue Wang
, Jiahui Hu
, Zhan Qin
, Kui Ren
:
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. 134:1-134:36 - Michael Zipperle
, Florian Gottwalt
, Elizabeth Chang
, Tharam S. Dillon
:
Provenance-based Intrusion Detection Systems: A Survey. 135:1-135:36 - Rong Han
, Zheng Yan
, Xueqin Liang
, Laurence T. Yang
:
How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey. 136:1-136:38 - Joobeom Yun
, Rustamov Fayozbek
, Juhwan Kim
, Youngjoo Shin
:
Fuzzing of Embedded Systems: A Survey. 137:1-137:33 - Carmen Carrión
:
Kubernetes Scheduling: Taxonomy, Ongoing Issues and Challenges. 138:1-138:37 - Ahmed Benmoussa
, Chaker Abdelaziz Kerrache
, Nasreddine Lagraa
, Spyridon Mastorakis
, Abderrahmane Lakas
, Abdou El Karim Tahari
:
Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions. 139:1-139:37 - Andreas L. Opdahl
, Tareq Al-Moslmi
, Duc-Tien Dang-Nguyen
, Marc Gallofré Ocaña
, Bjørnar Tessem
, Csaba Veres
:
Semantic Knowledge Graphs for the News: A Review. 140:1-140:38 - Yudong Tao
, Chuang Yang
, Tianyi Wang
, Erik Coltey
, Yanxiu Jin
, Yinghao Liu
, Renhe Jiang
, Zipei Fan
, Xuan Song
, Ryosuke Shibasaki
, Shu-Ching Chen
, Mei-Ling Shyu
, Steven Luis
:
A Survey on Data-driven COVID-19 and Future Pandemic Management. 141:1-141:36 - Hoda Naghibijouybari
, Esmaeil Mohammadian Koruyeh
, Nael B. Abu-Ghazaleh
:
Microarchitectural Attacks in Heterogeneous Systems: A Survey. 142:1-142:40 - Zhanna Sarsenbayeva
, Niels van Berkel
, Eduardo Velloso
, Jorge Gonçalves
, Vassilis Kostakos
:
Methodological Standards in Accessibility Research-PLXBCCR- on Motor Impairments: A Survey. 143:1-143:35 - Samuel Idowu
, Daniel Strüber
, Thorsten Berger
:
Asset Management in Machine Learning: State-of-research and State-of-practice. 144:1-144:35 - Mohammad Mehdi Afsar
, Trafford Crump
, Behrouz H. Far
:
Reinforcement Learning based Recommender Systems: A Survey. 145:1-145:38 - Markus Bayer
, Marc-André Kaufhold
, Christian Reuter
:
A Survey on Data Augmentation for Text Classification. 146:1-146:39 - Jon Pérez-Cerrolaza
, Jaume Abella
, Leonidas Kosmidis
, Alejandro J. Calderón
, Francisco J. Cazorla
, Jose Luis Flores
:
GPU Devices for Safety-Critical Systems: A Survey. 147:1-147:37 - Tung Minh Tran
, Tu N. Vu
, Nguyen D. Vo
, Tam V. Nguyen
, Khang Nguyen
:
Anomaly Analysis in Images and Videos: A Comprehensive Review. 148:1-148:37 - Li Liu
, Fanzhang Li
:
A Survey on Dynamic Fuzzy Machine Learning. 149:1-149:42 - William C. Sleeman
, Rishabh Kapoor
, Preetam Ghosh
:
Multimodal Classification: Current Landscape, Taxonomy and Future Directions. 150:1-150:31 - Zeineb Rejiba
, Javad Chamanara
:
Custom Scheduling in Kubernetes: A Survey on Common Problems and Solution Approaches. 151:1-151:37 - Mohammad Goudarzi
, Marimuthu Palaniswami
, Rajkumar Buyya
:
Scheduling IoT Applications in Edge and Fog Computing Environments: A Taxonomy and Future Directions. 152:1-152:41
Volume 55, Number 8, August 2023
- Yue Liu
, Chakkrit Tantithamthavorn
, Li Li, Yepang Liu
:
Deep Learning for Android Malware Defenses: A Systematic Literature Review. 153:1-153:36 - Huan Yee Koh
, Jiaxin Ju
, Ming Liu
, Shirui Pan
:
An Empirical Survey on Long Document Summarization: Datasets, Models, and Metrics. 154:1-154:35 - Andreas Madsen
, Siva Reddy
, Sarath Chandar
:
Post-hoc Interpretability for Neural NLP: A Survey. 155:1-155:42 - Henry Weld
, Xiaoqi Huang
, Siqu Long
, Josiah Poon
, Soyeon Caren Han
:
A Survey of Joint Intent Detection and Slot Filling Models in Natural Language Understanding. 156:1-156:38 - Sina Mohseni
, Haotao Wang
, Chaowei Xiao
, Zhiding Yu
, Zhangyang Wang
, Jay Yadawa
:
Taxonomy of Machine Learning Safety: A Survey and Primer. 157:1-157:38 - Nishan Gunawardena
, Jeewani Anupama Ginige
, Bahman Javadi
:
Eye-tracking Technologies in Mobile Devices Using Edge Computing: A Systematic Review. 158:1-158:33 - Tariq Abdullah
, Ahmed Ahmet
:
Deep Learning in Sentiment Analysis: Recent Architectures. 159:1-159:37 - Alberto Blanco-Justicia
, David Sánchez
, Josep Domingo-Ferrer
, Krishnamurty Muralidhar
:
A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning. 160:1-160:16 - Chi Liu
, Tianqing Zhu
, Jun Zhang
, Wanlei Zhou
:
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks. 161:1-161:35 - Minzhao Lyu
, Hassan Habibi Gharakheili
, Vijay Sivaraman
:
A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques. 162:1-162:28 - Shuai Zhou
, Chi Liu
, Dayong Ye
, Tianqing Zhu
, Wanlei Zhou
, Philip S. Yu
:
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity. 163:1-163:39 - Manuel A. Serrano
, José A. Cruz-Lemus
, Ricardo Pérez-Castillo
, Mario Piattini
:
Quantum Software Components and Platforms: Overview and Quality Assessment. 164:1-164:31 - Divya Velayudhan
, Taimur Hassan
, Ernesto Damiani
, Naoufel Werghi
:
Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey. 165:1-165:38 - Zhiyi Tian
, Lei Cui
, Jie Liang
, Shui Yu
:
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning. 166:1-166:35 - Michael P. Heinl
, Simon Gölz
, Christoph Bösch
:
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey. 167:1-167:44 - Sarah Roscoe
, Minal Khatri
, Adam Voshall
, Surinder Batra
, Sukhwinder Kaur, Jitender S. Deogun
:
Formal Concept Analysis Applications in Bioinformatics. 168:1-168:40 - Nilesh Chakraborty
, Jianqiang Li
, Victor C. M. Leung
, Samrat Mondal
, Yi Pan
, Chengwen Luo
, Mithun Mukherjee
:
Honeyword-based Authentication Techniques for Protecting Passwords: A Survey. 169:1-169:37 - Eva Zangerle
, Christine Bauer
:
Evaluating Recommender Systems: Survey and Framework. 170:1-170:38 - André Luís Barroso Almeida
, Joubert de Castro Lima
, Marco Antonio Moreira de Carvalho
:
Systematic Literature Review on Parallel Trajectory-based Metaheuristics. 171:1-171:34 - Tianbao Yang
, Yiming Ying
:
AUC Maximization in the Era of Big Data and AI: A Survey. 172:1-172:37 - Chenhe Dong
, Yinghui Li
, Haifan Gong
, Miaoxin Chen
, Junxin Li
, Ying Shen
, Min Yang
:
A Survey of Natural Language Generation. 173:1-173:38 - Linghe Kong
, Jinlin Tan
, Junqin Huang
, Guihai Chen
, Shuaitian Wang
, Xi Jin
, Peng Zeng
, Muhammad Khurram Khan
, Sajal K. Das
:
Edge-computing-driven Internet of Things: A Survey. 174:1-174:41
Volume 55, Number 9, September 2023
- Denis Kleyko
, Dmitri A. Rachkovskij
, Evgeny Osipov
, Abbas Rahimi
:
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges. 175:1-175:52 - Daniel McDuff
:
Camera Measurement of Physiological Vital Signs. 176:1-176:40 - Bo Li, Peng Qi, Bo Liu, Shuai Di, Jingen Liu, Jiquan Pei, Jinfeng Yi, Bowen Zhou:
Trustworthy AI: From Principles to Practices. 177:1-177:46 - Luca Benedetto
, Paolo Cremonesi
, Andrew Caines
, Paula Buttery
, Andrea Cappelli
, Andrea Giussani
, Roberto Turrin
:
A Survey on Recent Approaches to Question Difficulty Estimation from Text. 178:1-178:37 - Kai North
, Marcos Zampieri
, Matthew Shardlow
:
Lexical Complexity Prediction: An Overview. 179:1-179:42 - Nandita Pattnaik
, Shujun Li
, Jason R. C. Nurse
:
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. 180:1-180:38 - Eun Hee Park
, Veda C. Storey
:
Emotion Ontology Studies: A Framework for Expressing Feelings Digitally and its Application to Sentiment Analysis. 181:1-181:38 - Lidia Fotia
, Flávia Coimbra Delicato, Giancarlo Fortino
:
Trust in Edge-based Internet of Things Architectures: State of the Art and Research Challenges. 182:1-182:34 - Ron Bitton
, Nadav Maman
, Inderjeet Singh
, Satoru Momiyama
, Yuval Elovici
, Asaf Shabtai
:
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. 183:1-183:36 - Haochen Hua
, Yutong Li
, Tonghe Wang
, Nanqing Dong
, Wei Li
, Junwei Cao
:
Edge Computing with Artificial Intelligence: A Machine Learning Perspective. 184:1-184:35 - Takahito Yoshizawa, Dave Singelée, Jan Tobias Mühlberg
, Stéphane Delbruel
, Amir Taherkordi, Danny Hughes, Bart Preneel:
A Survey of Security and Privacy Issues in V2X Communication Systems. 185:1-185:36 - Athanasios Liatifis
, Panagiotis G. Sarigiannidis
, Vasileios Argyriou
, Thomas Lagkas
:
Advancing SDN from OpenFlow to P4: A Survey. 186:1-186:37 - Janaka Senanayake
, Harsha K. Kalutarage
, M. Omar Al-Kadri
, Andrei Petrovski
, Luca Piras
:
Android Source Code Vulnerability Detection: A Systematic Literature Review. 187:1-187:37 - Meng Liu
, Liqiang Nie
, Yunxiao Wang
, Meng Wang
, Yong Rui
:
A Survey on Video Moment Localization. 188:1-188:37 - Jacky Cao
, Kit-Yung Lam
, Lik-Hang Lee
, Xiaoli Liu
, Pan Hui
, Xiang Su
:
Mobile Augmented Reality: User Interfaces, Frameworks, and Intelligence. 189:1-189:36 - Junsik Sim
, Beomjoong Kim
, Kiseok Jeon
, Moonho Joo
, Jihun Lim
, Junghee Lee
, Kim-Kwang Raymond Choo
:
Technical Requirements and Approaches in Personal Data Control. 190:1-190:30 - Wael Issa
, Nour Moustafa
, Benjamin P. Turnbull
, Nasrin Sohrabi
, Zahir Tari
:
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. 191:1-191:43 - Hussain Ahmad
, Isuru Dharmadasa
, Faheem Ullah
, Muhammad Ali Babar
:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. 192:1-192:38 - Junhai Luo
, Zhiyan Wang
, Ming Xia
, Linyong Wu
, Yuxin Tian
, Yu Chen
:
Path Planning for UAV Communication Networks: Related Technologies, Solutions, and Opportunities. 193:1-193:37 - Rudresh Dwivedi
, Devam Dave
, Het Naik
, Smiti Singhal
, Omer F. Rana
, Pankesh Patel
, Bin Qian
, Zhenyu Wen
, Tejal Shah
, Graham Morgan
, Rajiv Ranjan
:
Explainable AI (XAI): Core Ideas, Techniques, and Solutions. 194:1-194:33 - Pengfei Liu
, Weizhe Yuan
, Jinlan Fu
, Zhengbao Jiang
, Hiroaki Hayashi
, Graham Neubig
:
Pre-train, Prompt, and Predict: A Systematic Survey of Prompting Methods in Natural Language Processing. 195:1-195:35 - Ping Wang
, Haichang Gao
, Xiaoyan Guo
, Chenxuan Xiao
, Fuqi Qi
, Zheng Yan
:
An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness. 196:1-196:38
Volume 55, Number 10, October 2023
- Anna Rogers
, Matt Gardner
, Isabelle Augenstein
:
QA Dataset Explosion: A Taxonomy of NLP Resources for Question Answering and Reading Comprehension. 197:1-197:45 - Giacomo Chiarot
, Claudio Silvestri
:
Time Series Compression Survey. 198:1-198:32 - Eoin Brophy
, Zhengwei Wang
, Qi She
, Tomás Ward
:
Generative Adversarial Networks in Time Series: A Systematic Literature Review. 199:1-199:31 - Fath U Min Ullah, Mohammad S. Obaidat
, Amin Ullah, Khan Muhammad
, Mohammad Hijji
, Sung Wook Baik:
A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos. 200:1-200:44 - Yunhua Zhao
, Kostadin Damevski
, Hui Chen
:
A Systematic Survey of Just-in-Time Software Defect Prediction. 201:1-201:35 - Antonio Quiña-Mera
, Pablo Fernandez
, José María García
, Antonio Ruiz-Cortés
:
GraphQL: A Systematic Mapping Study. 202:1-202:35 - Nils Rethmeier
, Isabelle Augenstein
:
A Primer on Contrastive Pretraining in Language Processing: Methods, Lessons Learned, and Perspectives. 203:1-203:17 - Iyyakutti Iyappan Ganapathi
, Syed Sadaf Ali
, Surya Prakash
, Ngoc-Son Vu
, Naoufel Werghi
:
A Survey of 3D Ear Recognition Techniques. 204:1-204:36 - Jitendra Parmar
, Satyendra Singh Chouhan
, Vaskar Raychoudhury
, Santosh Singh Rathore
:
Open-world Machine Learning: Applications, Challenges, and Opportunities. 205:1-205:37 - Rami Ibrahim
, M. Omair Shafiq
:
Explainable Convolutional Neural Networks: A Taxonomy, Review, and Future Directions. 206:1-206:37 - Ling Sun
, Yuan Rao
, Lianwei Wu
, Xiangbo Zhang
, Yuqian Lan
, Ambreen Nazir
:
Fighting False Information from Propagation Process: A Survey. 207:1-207:38 - Amirmohammad Pasdar
, Young Choon Lee
, Zhongli Dong
:
Connect API with Blockchain: A Survey on Blockchain Oracle Implementation. 208:1-208:39 - Fabio Catania
, Micol Spitale
, Franca Garzotto
:
Conversational Agents in Therapeutic Interventions for Neurodevelopmental Disorders: A Survey. 209:1-209:34 - Laure Gonnord
, Ludovic Henrio
, Lionel Morel
, Gabriel Radanne
:
A Survey on Parallelism and Determinism. 210:1-210:28 - Fatai Sado
, Chu Kiong Loo
, Wei Shiung Liew
, Matthias Kerzel
, Stefan Wermter
:
Explainable Goal-driven Agents and Robots - A Comprehensive Review. 211:1-211:41 - Jou-An Chen, Wei Niu
, Bin Ren, Yanzhi Wang, Xipeng Shen
:
Survey: Exploiting Data Redundancy for Optimization of Deep Learning. 212:1-212:38 - Luke Antonyshyn
, Jefferson Silveira
, Sidney Givigi
, Joshua A. Marshall
:
Multiple Mobile Robot Task and Motion Planning: A Survey. 213:1-213:35 - Tainã Ribeiro de Oliveira
, Brenda Biancardi Rodrigues
, Matheus Moura da Silva
, Rafael Antonio N. Spinassé
, Gabriel Giesen Ludke
, Mateus Ruy Soares Gaudio
, Guilherme Iglesias Rocha Gomes
, Luan Guio Cotini
, Daniel Vargens, Marcelo Queiroz Schimidt
, Rodrigo Varejão Andreão
, Mário Mestria
:
Virtual Reality Solutions Employing Artificial Intelligence Methods: A Systematic Literature Review. 214:1-214:29 - Muhammad Nouman Nafees
, Neetesh Saxena
, Alvaro A. Cárdenas
, Santiago Grijalva
, Pete Burnap
:
Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review. 215:1-215:36 - Kostas Papagiannopoulos
, Ognjen Glamocanin
, Melissa Azouaoui
, Dorian Ros
, Francesco Regazzoni
, Mirjana Stojilovic
:
The Side-channel Metrics Cheat Sheet. 216:1-216:38 - Elyssa Boulila
, Marc Dacier
:
WPAD: Waiting Patiently for an Announced Disaster. 217:1-217:29 - Gongsheng Yuan
, Jiaheng Lu
, Zhengtong Yan
, Sai Wu
:
A Survey on Mapping Semi-Structured Data and Graph Data to Relational Data. 218:1-218:38
Volume 55, Number 11, November 2023
- Dimitrios Georgoulias
, Jens Myrup Pedersen
, Morten Falch
, Emmanouil Vasilomanolakis
:
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey. 219:1-219:39 - Luca Di Grazia
, Michael Pradel
:
Code Search: A Survey of Techniques for Finding Code. 220:1-220:31 - Roberto Viola
, Ángel Martín
, Mikel Zorrilla
, Jon Montalbán
, Pablo Angueira
, Gabriel-Miro Muntean
:
A Survey on Virtual Network Functions for Media Streaming: Solutions and Future Challenges. 221:1-221:37 - José María Jorquera Valero
, Pedro Miguel Sánchez Sánchez
, Manuel Gil Pérez
, Alberto Huertas Celdrán
, Gregorio Martínez Pérez
:
Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges. 222:1-222:36 - Priyankar Choudhary
, Neeraj Goel
, Mukesh Saini
:
A Survey on Seismic Sensor based Target Detection, Localization, Identification, and Activity Recognition. 223:1-223:36 - Ghodai Abdelrahman
, Qing Wang
, Bernardo Pereira Nunes
:
Knowledge Tracing: A Survey. 224:1-224:37 - Jonas Dann
, Daniel Ritter
, Holger Fröning
:
Non-relational Databases on FPGAs: Survey, Design Decisions, Challenges. 225:1-225:37 - Yang Li
, Michael Purcell
, Thierry Rakotoarivelo
, David Smith
, Thilina Ranbaduge
, Kee Siong Ng
:
Private Graph Data Release: A Survey. 226:1-226:39 - Stjepan Picek
, Guilherme Perin
, Luca Mariot
, Lichao Wu
, Lejla Batina
:
SoK: Deep Learning-based Physical Side-channel Analysis. 227:1-227:35 - Michael Seifert
, Stephan Kuehnel
, Stefan Sackmann
:
Hybrid Clouds Arising from Software as a Service Adoption: Challenges, Solutions, and Future Research Directions. 228:1-228:35 - Surangika Ranathunga
, En-Shiun Annie Lee
, Marjana Prifti Skenduli
, Ravi Shekhar
, Mehreen Alam
, Rishemjit Kaur
:
Neural Machine Translation for Low-resource Languages: A Survey. 229:1-229:37 - Bo Huang
, Mengchu Zhou
, Xiaoyu Sean Lu
, Abdullah Abusorrah
:
Scheduling of Resource Allocation Systems with Timed Petri Nets: A Survey. 230:1-230:27 - Chen Chen
, Gang Zhou
, Youfang Lin
:
Cross-Domain WiFi Sensing with Channel State Information: A Survey. 231:1-231:37 - Ziqiang Li
, Muhammad Usman
, Rentuo Tao
, Pengfei Xia
, Chaoyue Wang
, Huanhuan Chen
, Bin Li
:
A Systematic Survey of Regularization and Normalization in GANs. 232:1-232:37 - Rahul Mishra
, Hari Prabhat Gupta
:
Transforming Large-Size to Lightweight Deep Neural Networks for IoT Applications. 233:1-233:35 - Michael R. Jones
, Soufiene Djahel
, Kristopher Welsh
:
Path-Planning for Unmanned Aerial Vehicles with Environment Complexity Considerations: A Survey. 234:1-234:39 - Li-Hsiang Shen
, Kai-Ten Feng
, Lajos Hanzo
:
Five Facets of 6G: Research Challenges and Opportunities. 235:1-235:39 - Christian Møldrup Legaard
, Thomas Schranz
, Gerald Schweiger
, Ján Drgona
, Basak Falay
, Cláudio Gomes
, Alexandros Iosifidis
, Mahdi Abkar
, Peter Gorm Larsen
:
Constructing Neural Network Based Models for Simulating Dynamical Systems. 236:1-236:34 - Sampath Rajapaksha
, Harsha K. Kalutarage
, M. Omar Al-Kadri
, Andrei Petrovski
, Garikayi Madzudzo
, Madeline Cheah
:
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey. 237:1-237:40 - Jiahua Xu
, Krzysztof Paruch
, Simon Cousaert
, Yebo Feng
:
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols. 238:1-238:50 - Pieter Hijma
, Stijn Heldens
, Alessio Sclocco
, Ben van Werkhoven
, Henri E. Bal
:
Optimization Techniques for GPU Programming. 239:1-239:81 - Juncen Zhu
, Jiannong Cao
, Divya Saxena
, Shan Jiang
, Houda Ferradi
:
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions. 240:1-240:31
Volume 55, Number 12, December 2023
- Md. Rayhanur Rahman
, Rezvan Mahdavi-Hezaveh
, Laurie A. Williams
:
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. 241:1-241:36 - Rathinaraja Jeyaraj
, Anandkumar Balasubramaniam
, Ajay Kumara M. A.
, Nadra Guizani
, Anand Paul
:
Resource Management in Cloud and Cloud-influenced Technologies for Internet of Things Applications. 242:1-242:37 - Nitin Rathi
, Indranil Chakraborty
, Adarsh Kosta
, Abhronil Sengupta
, Aayush Ankit
, Priyadarshini Panda
, Kaushik Roy
:
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware. 243:1-243:49 - Jianhua Gao, Weixing Ji, Fangli Chang, Shiyu Han, Bingxin Wei, Zeming Liu, Yizhuo Wang:
A Systematic Survey of General Sparse Matrix-matrix Multiplication. 244:1-244:36 - Yun Zhang
, Linwei Zhu
, Gangyi Jiang
, Sam Kwong
, C.-C. Jay Kuo
:
A Survey on Perceptually Optimized Video Coding. 245:1-245:37 - Jayashree Dey
, Ratna Dutta
:
Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions. 246:1-246:34 - Arash Heidari
, Nima Jafari Navimipour
, Mehmet Unal
, Guodao Zhang
:
Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues. 247:1-247:45 - Ziwei Ji
, Nayeon Lee
, Rita Frieske
, Tiezheng Yu
, Dan Su
, Yan Xu
, Etsuko Ishii
, Yejin Bang
, Andrea Madotto
, Pascale Fung
:
Survey of Hallucination in Natural Language Generation. 248:1-248:38 - Antonio López Martínez
, Manuel Gil Pérez
, Antonio Ruiz-Martínez
:
A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare. 249:1-249:38 - Caesar Wu
, Rui Zhang
, Ramamohanarao Kotagiri
, Pascal Bouvry
:
Strategic Decisions: Survey, Taxonomy, and Future Directions from Artificial Intelligence Perspective. 250:1-250:30 - Maxime Buser
, Rafael Dowsley
, Muhammed F. Esgin
, Clémentine Gritti
, Shabnam Kasra Kermanshahi
, Veronika Kuchta
, Jason T. LeGrow
, Joseph K. Liu
, Raphaël C.-W. Phan
, Amin Sakzad
, Ron Steinfeld
, Jiangshan Yu
:
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions. 251:1-251:32 - Hans Jakob Damsgaard
, Aleksandr Ometov
, Jari Nurmi
:
Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review. 252:1-252:49 - Ümit V. Çatalyürek
, Karen D. Devine
, Marcelo Fonseca Faraj
, Lars Gottesbüren
, Tobias Heuer
, Henning Meyerhenke
, Peter Sanders
, Sebastian Schlag
, Christian Schulz
, Daniel Seemaier
, Dorothea Wagner
:
More Recent Advances in (Hyper)Graph Partitioning. 253:1-253:38 - Weiwei Lin
, Chennian Xiong
, Wentai Wu
, Fang Shi
, Keqin Li
, Minxian Xu
:
Performance Interference of Virtual Machines: A Survey. 254:1-254:37 - Kate Smith-Miles
, Mario Andrés Muñoz
:
Instance Space Analysis for Algorithm Testing: Methodology and Software Tools. 255:1-255:31 - Zoe Kotti
, Rafaila Galanopoulou
, Diomidis Spinellis
:
Machine Learning for Software Engineering: A Tertiary Study. 256:1-256:39 - Tong Sha, Wei Zhang, Tong Shen, Zhoujun Li, Tao Mei:
Deep Person Generation: A Survey from the Perspective of Face, Pose, and Cloth Synthesis. 257:1-257:37 - Wei Xiang
, Bang Wang
:
A Survey of Implicit Discourse Relation Recognition. 258:1-258:34 - Gaurav Menghani
:
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better. 259:1-259:37 - Robert Hertel
, Rachid Benlamri
:
Deep Learning Techniques for COVID-19 Diagnosis and Prognosis Based on Radiological Imaging. 260:1-260:39 - Qin Wang
, Jiangshan Yu
, Shiping Chen
, Yang Xiang
:
SoK: DAG-based Blockchain Systems. 261:1-261:38 - Behrouz Zolfaghari
, Leila Mirsadeghi
, Khodakhast Bibak
, Kaveh Kavousi
:
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning. 262:1-262:34
Volume 55, Number 13s, December 2023
- Xiaojie Wang
, Jiameng Li
, Zhaolong Ning, Qingyang Song, Lei Guo, Song Guo
, Mohammad S. Obaidat
:
Wireless Powered Mobile Edge Computing Networks: A Survey. 263:1-263:37 - Tanmay Garg, Sarah Masud, Tharun Suresh
, Tanmoy Chakraborty
:
Handling Bias in Toxic Speech Detection: A Survey. 264:1-264:32 - Washington Cunha
, Felipe Viegas
, Celso França
, Thierson Rosa
, Leonardo Rocha
, Marcos André Gonçalves:
A Comparative Survey of Instance Selection Methods applied to Non-Neural and Transformer-Based Text Classification. 265:1-265:52 - Mingyu Liu
, Li Pan, Shijun Liu:
Cost Optimization for Cloud Storage from User Perspectives: Recent Advances, Taxonomy, and Survey. 266:1-266:37 - Jovani Dalzochio
, Rafael Kunst
, Jorge Luis Victória Barbosa
, Pedro Clarindo da Silva Neto
, Edison Pignaton
, Carla Schwengber ten Caten
, Alex de Lima Teodoro da Penha
:
Predictive Maintenance in the Military Domain: A Systematic Review of the Literature. 267:1-267:30 - Salma P. González-Sabbagh, Antonio Robles-Kelly:
A Survey on Underwater Computer Vision. 268:1-268:39 - Ringki Das
, Thoudam Doren Singh
:
Multimodal Sentiment Analysis: A Survey of Methods, Trends, and Challenges. 270:1-270:38 - Yisheng Song, Ting Wang
, Puyu Cai, Subrota K. Mondal
, Jyoti Prakash Sahoo:
A Comprehensive Survey of Few-shot Learning: Evolution, Applications, Challenges, and Opportunities. 271:1-271:40 - Harshala Gammulle
, David Ahmedt-Aristizabal, Simon Denman, Lachlan Tychsen-Smith, Lars Petersson
, Clinton Fookes
:
Continuous Human Action Recognition for Human-machine Interaction: A Review. 272:1-272:38 - Haider Abbas
, Naina Emmanuel
, Muhammad Faisal Amjad
, Tahreem Yaqoob, Mohammed Atiquzzaman
, Zafar Iqbal
, Narmeen Shafqat
, Waleed Bin Shahid, Ali Tanveer, Umer Ashfaq
:
Security Assessment and Evaluation of VPNs: A Comprehensive Survey. 273:1-273:47 - Renan Greca
, Breno Miranda, Antonia Bertolino
:
State of Practical Applicability of Regression Testing Research: A Live Systematic Literature Review. 274:1-274:36 - Roberto Casadei
:
Macroprogramming: Concepts, State of the Art, and Opportunities of Macroscopic Behaviour Modelling. 275:1-275:37 - JunKyu Lee
, Lev Mukhanov, Amir Sabbagh Molahosseini
, Umar Ibrahim Minhas
, Yang Hua
, Jesús Martínez del Rincón
, Kiril Dichev
, Cheol-Ho Hong, Hans Vandierendonck:
Resource-Efficient Convolutional Networks: A Survey on Model-, Arithmetic-, and Implementation-Level Techniques. 276:1-276:36 - Étienne André
, Shuang Liu
, Yang Liu, Christine Choppy, Jun Sun
, Jin Song Dong
:
Formalizing UML State Machines for Automated Verification - A Survey. 277:1-277:47 - Jie Xu
, Cong Wang
, Xiaohua Jia:
A Survey of Blockchain Consensus Protocols. 278:1-278:35 - Jie Gui, Xiaofeng Cong
, Yuan Cao, Wenqi Ren, Jun Zhang, Jing Zhang
, Jiuxin Cao, Dacheng Tao:
A Comprehensive Survey and Taxonomy on Single Image Dehazing Based on Deep Learning. 279:1-279:37 - Tiago Veiga
, Jennifer Renoux
:
From Reactive to Active Sensing: A Survey on Information Gathering in Decision-theoretic Planning. 280:1-280:22 - Tian Wang
, Yuzhu Liang
, Xuewei Shen
, Xi Zheng
, Adnan Mahmood
, Quan Z. Sheng
:
Edge Computing and Sensor-Cloud: Overview, Solutions, and Directions. 281:1-281:37 - Visal Rajapakse
, Ishan Karunanayake
, Nadeem Ahmed
:
Intelligence at the Extreme Edge: A Survey on Reformable TinyML. 282:1-282:30 - Thomas Kosch
, Jakob Karolus
, Johannes Zagermann
, Harald Reiterer, Albrecht Schmidt, Pawel W. Wozniak
:
A Survey on Measuring Cognitive Workload in Human-Computer Interaction. 283:1-283:39 - Malgorzata B. Starzynska-Grzes
, Robin Roussel
, Sam Jacoby
, Ali Asadipour
:
Computer Vision-based Analysis of Buildings and Built Environments: A Systematic Review of Current Approaches. 284:1-284:25 - Chang Liu
, Han Yu
:
AI-Empowered Persuasive Video Generation: A Survey. 285:1-285:31 - Md. Rezwan Hasan
, Richard M. Guest
, Farzin Deravi
:
Presentation-level Privacy Protection Techniques for Automated Face Recognition - A Survey. 286:1-286:27 - Xilu Wang
, Yaochu Jin
, Sebastian Schmitt
, Markus Olhofer
:
Recent Advances in Bayesian Optimization. 287:1-287:36 - Madeline C. Schiappa
, Yogesh S. Rawat
, Mubarak Shah
:
Self-Supervised Learning for Videos: A Survey. 288:1-288:37 - Huihui Guo
, Fan Wu
, Yunchuan Qin
, Ruihui Li
, Keqin Li
, Kenli Li
:
Recent Trends in Task and Motion Planning for Robotics: A Survey. 289:1-289:36 - Gang Wang
, Qin Wang
, Shiping Chen
:
Exploring Blockchains Interoperability: A Systematic Survey. 290:1-290:38 - Xiaojie Zhang
, Saptarshi Debroy:
Resource Management in Mobile Edge Computing: A Comprehensive Survey. 291:1-291:37 - Yogesh Sharma, Deval Bhamare
, Nishanth Sastry
, Bahman Javadi
, Rajkumar Buyya
:
SLA Management in Intent-Driven Service Management Systems: A Taxonomy and Future Directions. 292:1-292:38 - Nima Shahbazi, Yin Lin
, Abolfazl Asudeh
, H. V. Jagadish
:
Representation Bias in Data: A Survey on Identification and Resolution Techniques. 293:1-293:39 - Antonio Emanuele Cinà
, Kathrin Grosse
, Ambra Demontis
, Sebastiano Vascon
, Werner Zellinger
, Bernhard Alois Moser
, Alina Oprea
, Battista Biggio
, Marcello Pelillo
, Fabio Roli
:
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning. 294:1-294:39 - Meike Nauta
, Jan Trienes
, Shreyasi Pathak
, Elisa Nguyen
, Michelle Peters
, Yasmin Schmitt
, Jörg Schlötterer
, Maurice van Keulen
, Christin Seifert
:
From Anecdotal Evidence to Quantitative Evaluation Methods: A Systematic Review on Evaluating Explainable AI. 295:1-295:42 - Anubhav Jangra
, Sourajit Mukherjee
, Adam Jatowt
, Sriparna Saha
, Mohammad Hasanuzzaman
:
A Survey on Multi-modal Summarization. 296:1-296:36 - Wael Alsafery
, Omer F. Rana
, Charith Perera
:
Sensing within Smart Buildings: A Survey. 297:1-297:35 - Morteza Zakeri Nasrabadi
, Saeed Parsa
, Ehsan Esmaili, Fabio Palomba
:
A Systematic Literature Review on the Code Smells Datasets and Validation Mechanisms. 298:1-298:48 - Zeyu Tang
, Jiji Zhang
, Kun Zhang
:
What-is and How-to for Fairness in Machine Learning: A Survey, Reflection, and Perspective. 299:1-299:37
Volume 55, Number 14s, December 2023
- Brian Felipe Keith Norambuena
, Tanushree Mitra
, Chris North
:
A Survey on Event-Based News Narrative Extraction. 300:1-300:39 - Zhiwei Zhong
, Xianming Liu
, Junjun Jiang
, Debin Zhao
, Xiangyang Ji
:
Guided Depth Map Super-Resolution: A Survey. 301:1-301:36 - Vijay Kumar
, Kolin Paul
:
Device Fingerprinting for Cyber-Physical Systems: A Survey. 302:1-302:41 - Mu-Huan Chung, Yuhong Yang, Lu Wang, Greg Cento, Khilan Jerath, Abhay Raman
, David Lie
, Mark H. Chignell
:
Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement. 303:1-303:37 - Quentin Fournier
, Gaétan Marceau Caron, Daniel Aloise
:
A Practical Survey on Faster and Lighter Transformers. 304:1-304:40 - Karl Olson
, Jack Wampler
, Eric Keller
:
Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers. 305:1-305:37 - Federico Reghenzani
, Zhishan Guo
, William Fornaciari
:
Software Fault Tolerance in Real-Time Systems: Identifying the Future Research Questions. 306:1-306:30 - Jiepin Ding, Mingsong Chen, Ting Wang
, Junlong Zhou
, Xin Fu
, Keqin Li:
A Survey of AI-enabled Dynamic Manufacturing Scheduling: From Directed Heuristics to Autonomous Learning. 307:1-307:36 - Cornelius Ihle
, Dennis Trautwein
, Moritz Schubotz, Norman Meuschke, Bela Gipp
:
Incentive Mechanisms in Peer-to-Peer Networks - A Systematic Literature Review. 308:1-308:69 - Tânia Carvalho
, Nuno Moniz
, Pedro Faria
, Luís Antunes
:
Survey on Privacy-Preserving Techniques for Microdata Publication. 309:1-309:42 - Tommaso Fulcini
, Riccardo Coppola
, Luca Ardito
, Marco Torchiano
:
A Review on Tools, Mechanics, Benefits, and Challenges of Gamified Software Testing. 310:1-310:37 - Arun Kumar Kalakanti
, Shrisha Rao
:
Computational Challenges and Approaches for Electric Vehicles. 311:1-311:35 - Nikiforos Pittaras
, George Giannakopoulos
, Panagiotis Stamatopoulos
, Vangelis Karkaletsis
:
Content-based and Knowledge-enriched Representations for Classification Across Modalities: A Survey. 312:1-312:40 - Anna Breit
, Laura Waltersdorfer
, Fajar J. Ekaputra
, Marta Sabou
, Andreas Ekelhart
, Andreea Iana
, Heiko Paulheim
, Jan Portisch
, Artem Revenko
, Annette ten Teije
, Frank van Harmelen
:
Combining Machine Learning and Semantic Web: A Systematic Mapping Study. 313:1-313:41 - Abdulaziz Al-Meer
, Saif Al-Kuwari
:
Physical Unclonable Functions (PUF) for IoT Devices. 314:1-314:31 - Shalini Saini, Nitesh Saxena
:
A Survey of Threats to Research Literature-dependent Medical AI Solutions. 315:1-315:26 - Badis Hammi
, Sherali Zeadally
, Jamel Nebhen
:
Security Threats, Countermeasures, and Challenges of Digital Supply Chains. 316:1-316:40 - Veda C. Storey
, Roman Lukyanenko
, Arturo Castellanos
:
Conceptual Modeling: Topics, Themes, and Technology Trends. 317:1-317:38 - Sahraoui Dhelim
, Liming Chen
, Sajal K. Das
, Huansheng Ning
, Chris D. Nugent
, Gerard Leavey
, Dirk Pesch
, Eleanor Bantry-White
, Devin Burns
:
Detecting Mental Distresses Using Social Behavior Analysis in the Context of COVID-19: A Survey. 318:1-318:30 - Jarod Govers
, Philip Feldman
, Aaron Dant
, Panos Patros
:
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech. 319:1-319:35 - Leysan Nurgalieva, Alisa Frik
, Gavin Doherty
:
A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development. 320:1-320:27 - Samodha Pallewatta
, Vassilis Kostakos
, Rajkumar Buyya
:
Placement of Microservices-based IoT Applications in Fog Computing: A Taxonomy and Future Directions. 321:1-321:43 - Newton Carlos Will, Carlos Alberto Maziero
:
Intel Software Guard Extensions Applications: A Survey. 322:1-322:38 - Bofeng Pan
, Natalia Stakhanova
, Suprio Ray
:
Data Provenance in Security and Privacy. 323:1-323:35 - Daryna Oliynyk
, Rudolf Mayer
, Andreas Rauber:
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences. 324:1-324:41 - Davide Zoni, Andrea Galimberti
, William Fornaciari
:
A Survey on Run-time Power Monitors at the Edge. 325:1-325:33 - Nikolay Ivanov
, Chenning Li
, Qiben Yan
, Zhiyuan Sun
, Zhichao Cao
, Xiapu Luo:
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey. 326:1-326:37 - Arda Goknil
, Phu Hong Nguyen
, Sagar Sen
, Dimitra Politaki, Harris Niavis
, Karl John Pedersen
, Abdillah Suyuthi
, Abhilash Anand
, Amina Ziegenbein:
A Systematic Review of Data Quality in CPS and IoT for Industry 4.0. 327:1-327:38 - Sicong Han
, Chenhao Lin, Chao Shen, Qian Wang, Xiaohong Guan:
Interpreting Adversarial Examples in Deep Learning: A Review. 328:1-328:38 - Xiao Zhang
, Griffin Klevering
, Xinyu Lei
, Yiwen Hu
, Li Xiao
, Guan-Hua Tu
:
The Security in Optical Wireless Communication: A Survey. 329:1-329:36 - Matthew Landers
, Afsaneh Doryab
:
Deep Reinforcement Learning Verification: A Survey. 330:1-330:31 - Haftu Tasew Reda
, Adnan Anwar
, Abdun Naser Mahmood
, Zahir Tari
:
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids. 331:1-331:37 - Shreya Goyal
, Sumanth Doddapaneni
, Mitesh M. Khapra
, Balaraman Ravindran
:
A Survey of Adversarial Defenses and Robustness in NLP. 332:1-332:39 - Tongyue He
, Junxin Chen
, Ben-Guo He
, Wei Wang
, Zhiliang Zhu, Zhihan Lv
:
Toward Wearable Sensors: Advances, Trends, and Challenges. 333:1-333:35 - Kilian Pfeiffer
, Martin Rapp, Ramin Khalili
, Jörg Henkel:
Federated Learning for Computationally Constrained Heterogeneous Devices: A Survey. 334:1-334:27 - Baolei Cheng
, Dajin Wang
, Jianxi Fan:
Independent Spanning Trees in Networks: A Survey. 335:1-335:29 - João Bachiega Jr.
, Breno G. S. Costa, Leonardo Rebouças de Carvalho
, Michel J. F. Rosa
, Aletéia P. F. Araújo
:
Computational Resource Allocation in Fog Computing: A Comprehensive Survey. 336:1-336:31

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.