


Остановите войну!
for scientists:


default search action
ACM Computing Surveys, Volume 54
Volume 54, Number 1, January 2022
- Miljana Mladenovic
, Vera Osmjanski, Stasa Vujicic Stankovic
:
Cyber-aggression, Cyberbullying, and Cyber-grooming: A Survey and Research Challenges. 1:1-1:42 - Avani Vyas
, Sujata Pal
, Barun Kumar Saha:
Relay-based Communications in WBANs: A Comprehensive Survey. 2:1-2:34 - Ángel Jesús Varela-Vaca
, Antonia M. Reina Quintero
:
Smart Contract Languages: A Multivocal Mapping Study. 3:1-3:38 - Hongbo Jiang
, Jie Li
, Ping Zhao, Fanzi Zeng
, Zhu Xiao
, Arun Iyengar:
Location Privacy-preserving Mechanisms in Location-based Services: A Comprehensive Survey. 4:1-4:36 - Christopher Wright
, William A. Moeglein, Saurabh Bagchi, Milind Kulkarni, Abraham A. Clements:
Challenges in Firmware Re-Hosting, Emulation, and Analysis. 5:1-5:36 - Renjie Gu
, Chaoyue Niu, Fan Wu, Guihai Chen, Chun Hu, Chengfei Lyu, Zhihua Wu:
From Server-Based to Client-Based Machine Learning: A Comprehensive Survey. 6:1-6:36 - Yisroel Mirsky
, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. 7:1-7:41 - Joan Boyar
, Lene M. Favrholdt
, Kim S. Larsen
:
Relative Worst-order Analysis: A Survey. 8:1-8:21 - Prasanna Ravi
, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Lattice-based Key-sharing Schemes: A Survey. 9:1-9:39 - Behroz Mirza, Tahir Q. Syed
, Behraj Khan, Muhammad Yameen Malik:
Potential Deep Learning Solutions to Persistent and Emerging Big Data Challenges - A Practitioners' Cookbook. 10:1-10:39 - Sergio López Bernal
, Alberto Huertas Celdrán
, Gregorio Martínez Pérez, Michael Taynnan Barros, Sasitharan Balasubramaniam:
Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges. 11:1-11:35 - Leah Zhang-Kennedy
, Sonia Chiasson:
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education. 12:1-12:39 - Shengming Jiang
:
Networking in Oceans: A Survey. 13:1-13:33 - Weitao Xu
, Junqing Zhang
, Shunqi Huang, Chengwen Luo, Wei Li:
Key Generation for Internet of Things: A Contemporary Survey. 14:1-14:37 - Paolo Bellavista
, Luca Foschini, Alessio Mora:
Decentralised Learning in Federated Deployment Environments: A System-Level Survey. 15:1-15:38 - Zarin Tasnim Sandhie
, Jill Arvindbhai Patel, Farid Uddin Ahmed, Masud H. Chowdhury:
Investigation of Multiple-valued Logic Technologies for Beyond-binary Era. 16:1-16:30 - Rayan Chikhi, Jan Holub, Paul Medvedev:
Data Structures to Represent a Set of k-long DNA Sequences. 17:1-17:22 - Víctor Adrián Sosa-Hernández, Raúl Monroy
, Miguel Angel Medina-Pérez, Octavio Loyola-González, Francisco Herrera:
A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities. 18:1-18:38 - Stefano Mariani, Giacomo Cabri, Franco Zambonelli:
Coordination of Autonomous Vehicles: Taxonomy and Survey. 19:1-19:33 - Zara Nasar, Syed Waqar Jaffry
, Muhammad Kamran Malik:
Named Entity Recognition and Relation Extraction: State-of-the-Art. 20:1-20:39 - Emad Aliwa, Omer F. Rana
, Charith Perera, Peter Burnap:
Cyberattacks and Countermeasures for In-Vehicle Networks. 21:1-21:37 - Bosheng Song, Kenli Li, David Orellana-Martín, Mario J. Pérez-Jiménez, Ignacio Pérez-Hurtado:
A Survey of Nature-Inspired Computing: Membrane Computing. 22:1-22:31 - Anna Minaeva, Zdenek Hanzálek:
Survey on Periodic Scheduling for Time-triggered Hard Real-time Systems. 23:1-23:32 - Tobias Distler:
Byzantine Fault-tolerant State-machine Replication from a Systems Perspective. 24:1-24:38
Volume 54, Number 2, March 2022
- Abdullah Qasem, Paria Shirani
, Mourad Debbabi, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. 25:1-25:42 - Fan Zhou, Xovee Xu
, Goce Trajcevski, Kunpeng Zhang
:
A Survey of Information Cascade Analysis: Models, Predictions, and Recent Advances. 27:1-27:36 - Pedro Ribeiro
, Pedro Paredes, Miguel E. P. Silva
, David Aparício
, Fernando M. A. Silva
:
A Survey on Subgraph Counting: Concepts, Algorithms, and Applications to Network Motifs and Graphlets. 28:1-28:36 - Azzedine Boukerche, Hou Zhijun:
Object Detection Using Deep Learning Methods in Traffic Scenarios. 30:1-30:35 - Bo Liu
, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi
, Zihuai Lin
:
When Machine Learning Meets Privacy: A Survey and Outlook. 31:1-31:36 - Chenning Li
, Zhichao Cao, Yunhao Liu:
Deep AI Enabled Ubiquitous Wireless Sensing: A Survey. 32:1-32:35 - Kelsey Harley
, Rodney Cooper:
Information Integrity: Are We There Yet? 33:1-33:35 - El-Ghazali Talbi:
Automated Design of Deep Neural Networks: A Survey and Unified Taxonomy. 34:1-34:37 - Yashar Deldjoo
, Tommaso Di Noia, Felice Antonio Merra:
A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks. 35:1-35:38 - Sarra Bouhenni
, Saïd Yahiaoui
, Nadia Nouali-Taboudjemat, Hamamache Kheddouci:
A Survey on Distributed Graph Pattern Matching in Massive Graphs. 36:1-36:35 - Zhengwei Wang
, Qi She, Tomás E. Ward:
Generative Adversarial Networks in Computer Vision: A Survey and Taxonomy. 37:1-37:38 - Guansong Pang, Chunhua Shen, Longbing Cao
, Anton van den Hengel:
Deep Learning for Anomaly Detection: A Review. 38:1-38:38 - Sheng Wang
, Zhifeng Bao
, J. Shane Culpepper, Gao Cong:
A Survey on Trajectory Data Management, Analytics, and Learning. 39:1-39:36 - Christian Meurisch, Max Mühlhäuser:
Data Protection in AI Services: A Survey. 40:1-40:38 - Dhivya Chandrasekaran, Vijay Mago:
Evolution of Semantic Similarity - A Survey. 41:1-41:37 - Xiaoxue Chen, Lianwen Jin, Yuanzhi Zhu, Canjie Luo, Tianwei Wang:
Text Recognition in the Wild: A Survey. 42:1-42:35 - Suha Al-Thanyyan, Aqil M. Azmi:
Automated Text Simplification: A Survey. 43:1-43:36 - Huawei Huang, Wei Kong, Sicong Zhou, Zibin Zheng
, Song Guo:
A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools. 44:1-44:42 - Sameen Maruf, Fahimeh Saleh, Gholamreza Haffari:
A Survey on Document-level Neural Machine Translation: Methods and Evaluation. 45:1-45:36 - Arlino Magalhães, José Maria Monteiro, Angelo Brayner:
Main Memory Database Recovery: A Survey. 46:1-46:36
Volume 54, Number 3, April 2022
- Mohammed Hassanin, Salman H. Khan, Murat Tahtali
:
Visual Affordance and Function Understanding: A Survey. 47:1-47:35 - Matteo Magnani, Obaida Hanteer, Roberto Interdonato, Luca Rossi, Andrea Tagarelli:
Community Detection in Multiplex Networks. 48:1-48:35 - Clayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro:
Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications. 49:1-49:38 - Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration: A Review. 50:1-50:47 - Irfan Ul Haq, Juan Caballero:
A Survey of Binary Code Similarity. 51:1-51:38 - Shyamali Mitra, Nibaran Das, Soumyajyoti Dey
, Sukanta Chakraborty, Mita Nasipuri, Mrinal Kanti Naskar:
Cytology Image Analysis Techniques Toward Automation: Systematically Revisited. 52:1-52:41 - Ilona Bluemke
, Agnieszka Malanowska
:
Software Testing Effort Estimation and Related Problems: A Systematic Literature Review. 53:1-53:38 - Wenjie Xiong, Jakub Szefer:
Survey of Transient Execution Attacks and Their Mitigations. 54:1-54:36 - Liping Zhao, Waad Alhoshan, Alessio Ferrari
, Keletso J. Letsholo, Muideen A. Ajagbe
, Erol-Valeriu Chioasca, Riza Theresa Batista-Navarro
:
Natural Language Processing for Requirements Engineering: A Systematic Mapping Study. 55:1-55:41 - Ane Blázquez-García
, Angel Conde, Usue Mori, José Antonio Lozano:
A Review on Outlier/Anomaly Detection in Time Series Data. 56:1-56:33 - Syed Wasif Abbas Hamdani
, Haider Abbas
, Abdul Rehman Janjua, Waleed Bin Shahid, Muhammad Faisal Amjad, Jahanzaib Malik
, Malik Hamza Murtaza
, Mohammed Atiquzzaman, Abdul Waheed Khan:
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons. 57:1-57:36 - Xi Li, Zehua Wang, Victor C. M. Leung, Hong Ji, Yiming Liu, Heli Zhang:
Blockchain-empowered Data-driven Networks: A Survey and Outlook. 58:1-58:38 - Petr Spelda
, Vit Stritecky
:
Human Induction in Machine Learning: A Survey of the Nexus. 59:1-59:18 - Jun Huang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Min Luo, Kim-Kwang Raymond Choo
:
The Application of the Blockchain Technology in Voting Systems: A Review. 60:1-60:28 - Boubakr Nour, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, Hassine Moungla:
Access Control Mechanisms in Named Data Networks: A Comprehensive Survey. 61:1-61:35 - Shervin Minaee, Nal Kalchbrenner, Erik Cambria
, Narjes Nikzad
, Meysam Chenaghlu, Jianfeng Gao:
Deep Learning-based Text Classification: A Comprehensive Review. 62:1-62:40 - Divya Saxena
, Jiannong Cao:
Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions. 63:1-63:42 - Zhabiz Gharibshah, Xingquan Zhu:
User Response Prediction in Online Advertising. 64:1-64:43 - Gilberto Astolfi
, Fábio Prestes Cesar Rezende
, João Vitor de Andrade Porto
, Edson Takashi Matsubara
, Hemerson Pistori
:
Syntactic Pattern Recognition in Computer Vision: A Systematic Review. 65:1-65:35 - Blesson Varghese
, Nan Wang, David Bermbach, Cheol-Ho Hong
, Eyal de Lara, Weisong Shi, Christopher Stewart
:
A Survey on Edge Performance Benchmarking. 66:1-66:33 - Danilo Avola, Luigi Cinque, Alessio Fagioli
, Gian Luca Foresti, Alessio Mecca
:
Ultrasound Medical Imaging Techniques: A Survey. 67:1-67:38 - Khan Muhammad
, Mohammad S. Obaidat, Tanveer Hussain
, Javier Del Ser, Neeraj Kumar
, Muhammad Tanveer
, Faiyaz Doctor:
Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions. 68:1-68:33 - Ahmed Alharbi, Hai Dong
, Xun Yi, Zahir Tari, Ibrahim Khalil
:
Social Media Identity Deception Detection: A Survey. 69:1-69:35
Volume 54, Number 4, May 2022
- Felipe L. Gewers, Gustavo R. Ferreira
, Henrique Ferraz de Arruda
, Filipi Nascimento Silva, Cesar H. Comin, Diego R. Amancio, Luciano da Fontoura Costa:
Principal Component Analysis: A Natural Approach to Data Exploration. 70:1-70:34 - Aidan Hogan
, Eva Blomqvist, Michael Cochez, Claudia d'Amato, Gerard de Melo, Claudio Gutierrez
, Sabrina Kirrane
, José Emilio Labra Gayo, Roberto Navigli
, Sebastian Neumaier
, Axel-Cyrille Ngonga Ngomo, Axel Polleres, Sabbir M. Rashid, Anisa Rula, Lukas Schmelzeisen, Juan F. Sequeda, Steffen Staab, Antoine Zimmermann:
Knowledge Graphs. 71:1-71:37 - Wen-Huang Cheng, Sijie Song, Chieh-Yun Chen, Shintami Chusnul Hidayati, Jiaying Liu
:
Fashion Meets Computer Vision: A Survey. 72:1-72:41 - Rob Dunne
, Tim Morris
, Simon Harper:
A Survey of Ambient Intelligence. 73:1-73:27 - Hussain Mohammed Dipu Kabir, Abbas Khosravi
, Subrota Kumar Mondal, Mustaneer Rahman, Saeid Nahavandi, Rajkumar Buyya:
Uncertainty-aware Decisions in Cloud Computing: Foundations and Future Directions. 74:1-74:30 - Fei Chen, Duming Luo, Tao Xiang
, Ping Chen, Junfeng Fan, Hong Linh Truong
:
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications. 75:1-75:36 - Pengzhen Ren
, Yun Xiao, Xiaojun Chang, Poyao Huang, Zhihui Li, Xiaojiang Chen, Xin Wang:
A Comprehensive Survey of Neural Architecture Search: Challenges and Solutions. 76:1-76:34 - Kaixuan Chen
, Dalin Zhang
, Lina Yao, Bin Guo, Zhiwen Yu, Yunhao Liu:
Deep Learning for Sensor-based Human Activity Recognition: Overview, Challenges, and Opportunities. 77:1-77:40 - Daniel Russo
, Klaas-Jan Stol
:
PLS-SEM for Software Engineering Research: An Introduction and Survey. 78:1-78:38 - Abdus Salam, Rolf Schwitter
, Mehmet A. Orgun
:
Probabilistic Rule Learning Systems: A Survey. 79:1-79:16 - Elena Almaraz Luengo, Luis Javier García-Villalba:
Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes. 80:1-80:34 - Katie Seaborn
, Norihisa P. Miyake, Peter Pennefather, Mihoko Otake-Matsuura:
Voice in Human-Agent Interaction: A Survey. 81:1-81:43 - Oliver Michel
, Roberto Bifulco, Gábor Rétvári, Stefan Schmid:
The Programmable Data Plane: Abstractions, Architectures, Algorithms, and Applications. 82:1-82:36 - Wei Hu
, Armaiti Ardeshiricham, Ryan Kastner
:
Hardware Information Flow Tracking. 83:1-83:39 - Azzedine Boukerche
, Xiren Ma
:
Vision-based Autonomous Vehicle Recognition: A New Challenge for Deep Learning-based Systems. 84:1-84:37 - Bekir Afsar
, Kaisa Miettinen
, Francisco Ruiz
:
Assessing the Performance of Interactive Multiobjective Optimization Methods: A Survey. 85:1-85:27 - Nikhil Tripathi, Neminath Hubballi:
Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey. 86:1-86:33 - Yunbo Tang, Dan Chen, Xiaoli Li:
Dimensionality Reduction Methods for Brain Imaging Data Analysis. 87:1-87:36 - Matteo Ridolfi
, Abdil Kaya
, Rafael Berkvens
, Maarten Weyn, Wout Joseph, Eli De Poorter:
Self-calibration and Collaborative Localization for UWB Positioning Systems: A Survey and Future Research Directions. 88:1-88:27 - Nuno Laranjeiro
, João Agnelo
, Jorge Bernardino
:
A Systematic Review on Software Robustness Assessment. 89:1-89:65 - Boyuan Chen, Zhen Ming (Jack) Jiang:
A Survey of Software Log Instrumentation. 90:1-90:34 - Varsha S. Lalapura
, J. Amudha, Hariramn Selvamuruga Satheesh:
Recurrent Neural Networks for Edge Intelligence: A Survey. 91:1-91:38
Volume 54, Number 5, June 2022
- Antonia Bertolino, Pietro Braione, Guglielmo De Angelis
, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Mauro Pezzè
, Roberto Pietrantuono
, Stefano Russo
, Paolo Tonella:
A Survey of Field-based Testing Techniques. 92:1-92:39 - Jean-Michel Bruel, Sophie Ebersold
, Florian Galinier, Manuel Mazzara, Alexandr Naumchev
, Bertrand Meyer:
The Role of Formalism in System Requirements. 93:1-93:36 - Liang Zhao
:
Event Prediction in the Big Data Era: A Systematic Survey. 94:1-94:37 - Sin Kit Lo
, Qinghua Lu
, Chen Wang
, Hye-Young Paik
, Liming Zhu:
A Systematic Literature Review on Federated Machine Learning: From a Software Engineering Perspective. 95:1-95:39 - Abdulaziz Alashaikh, Eisa Alanazi
, Ala I. Al-Fuqaha:
A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers. 96:1-96:39 - Xing Huang
, Tsung-Yi Ho
, Wenzhong Guo, Bing Li, Krishnendu Chakrabarty
, Ulf Schlichtmann:
Computer-aided Design Techniques for Flow-based Microfluidic Lab-on-a-chip Systems. 97:1-97:29 - Jana Dunfield
, Neel Krishnaswami
:
Bidirectional Typing. 98:1-98:38 - Mohanad Abukmeil, Stefano Ferrari, Angelo Genovese
, Vincenzo Piuri, Fabio Scotti
:
A Survey of Unsupervised Generative Models for Exploratory Data Analysis and Representation Learning. 99:1-99:40 - Adilla Susungi
, Claude Tadonki:
Intermediate Representations for Explicitly Parallel Programs. 100:1-100:24 - Subodha Charles
, Prabhat Mishra:
A Survey of Network-on-Chip Security Attacks and Countermeasures. 101:1-101:36 - Atheer Aljeraisy, Masoud Barati, Omer F. Rana
, Charith Perera:
Privacy Laws and Privacy by Design Schemes for the Internet of Things: A Developer's Perspective. 102:1-102:38 - Arwa Al-Hussain, Aqil M. Azmi
:
Automatic Story Generation: A Survey of Approaches. 103:1-103:38 - Marie Al-Ghossein
, Talel Abdessalem, Anthony Barré:
A Survey on Stream-Based Recommender Systems. 104:1-104:36 - Dietmar Jannach
, Ahtsham Manzoor, Wanling Cai, Li Chen:
A Survey on Conversational Recommender Systems. 105:1-105:36 - Yuan Luo
, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. 106:1-106:36 - Maya Dotan
, Yvonne-Anne Pignolet, Stefan Schmid
, Saar Tochner
, Aviv Zohar:
Survey on Blockchain Networking: Context, State-of-the-Art, Challenges. 107:1-107:34 - Ishai Rosenberg
, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. 108:1-108:36 - Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan
, Chai Quek
:
Hierarchical Reinforcement Learning: A Comprehensive Survey. 109:1-109:35 - Vimal Kumar Dwivedi
, Vishwajeet Pattanaik
, Vipin Deval
, Abhishek Dixit
, Alex Norta, Dirk Draheim:
Legally Enforceable Smart-Contract Languages: A Systematic Literature Review. 110:1-110:34 - Rob Ashmore, Radu Calinescu, Colin Paterson:
Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges. 111:1-111:39
Volume 54, Number 6, July 2022
- Peter Kietzmann, Thomas C. Schmidt
, Matthias Wählisch
:
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT. 112:1-112:38 - Eman Badr
:
Images in Space and Time: Real Big Data in Healthcare. 113:1-113:38 - Swati Jaiswal, Uday P. Khedker, Alan Mycroft:
A Unified Model for Context-Sensitive Program Analyses: : The Blind Men and the Elephant. 114:1-114:37 - Ninareh Mehrabi, Fred Morstatter
, Nripsuta Saxena, Kristina Lerman, Aram Galstyan:
A Survey on Bias and Fairness in Machine Learning. 115:1-115:35 - Harley Vera Olivera
, Guo RuiZhe, Ruben Cruz Huacarpuma, Ana Paula Bernardi da Silva, Ari Melo Mariano
, Maristela Holanda:
Data Modeling and NoSQL Databases - A Systematic Mapping Review. 116:1-116:26 - Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. 117:1-117:36 - Ratnabali Pal, Arif Ahmed Sekh, Debi Prosad Dogra, Samarjit Kar, Partha Pratim Roy, Dilip K. Prasad:
Topic-based Video Analysis: A Survey. 118:1-118:34 - Andreia P. Guerreiro, Carlos M. Fonseca, Luís Paquete
:
The Hypervolume Indicator: Computational Problems and Algorithms. 119:1-119:42 - Yuta Itoh, Tobias Langlotz, Jonathan Sutton
, Alexander Plopski:
Towards Indistinguishable Augmented Reality: A Survey on Optical See-through Head-mounted Displays. 120:1-120:36 - Bilal Rauf, Haider Abbas
, Muhammad Usman, Tanveer A. Zia
, Waseem Iqbal
, Yawar Abbas Bangash, Hammad Afzal
:
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks. 121:1-121:36 - Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang:
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography. 122:1-122:37 - Eva Papadogiannaki, Sotiris Ioannidis:
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. 123:1-123:35 - Thi Tuyet Hai Nguyen, Adam Jatowt, Mickaël Coustaty, Antoine Doucet:
Survey of Post-OCR Processing Approaches. 124:1-124:37