


default search action
ACM Computing Surveys, Volume 54
Volume 54, Number 1, January 2022
- Miljana Mladenovic
, Vera Osmjanski, Stasa Vujicic Stankovic
:
Cyber-aggression, Cyberbullying, and Cyber-grooming: A Survey and Research Challenges. 1:1-1:42 - Avani Vyas
, Sujata Pal
, Barun Kumar Saha:
Relay-based Communications in WBANs: A Comprehensive Survey. 2:1-2:34 - Ángel Jesús Varela-Vaca
, Antonia M. Reina Quintero
:
Smart Contract Languages: A Multivocal Mapping Study. 3:1-3:38 - Hongbo Jiang
, Jie Li
, Ping Zhao, Fanzi Zeng
, Zhu Xiao
, Arun Iyengar:
Location Privacy-preserving Mechanisms in Location-based Services: A Comprehensive Survey. 4:1-4:36 - Christopher Wright
, William A. Moeglein, Saurabh Bagchi, Milind Kulkarni, Abraham A. Clements:
Challenges in Firmware Re-Hosting, Emulation, and Analysis. 5:1-5:36 - Renjie Gu
, Chaoyue Niu, Fan Wu, Guihai Chen, Chun Hu, Chengfei Lyu, Zhihua Wu:
From Server-Based to Client-Based Machine Learning: A Comprehensive Survey. 6:1-6:36 - Yisroel Mirsky
, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. 7:1-7:41 - Joan Boyar
, Lene M. Favrholdt
, Kim S. Larsen
:
Relative Worst-order Analysis: A Survey. 8:1-8:21 - Prasanna Ravi
, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Lattice-based Key-sharing Schemes: A Survey. 9:1-9:39 - Behroz Mirza, Tahir Q. Syed
, Behraj Khan
, Muhammad Yameen Malik:
Potential Deep Learning Solutions to Persistent and Emerging Big Data Challenges - A Practitioners' Cookbook. 10:1-10:39 - Sergio López Bernal
, Alberto Huertas Celdrán
, Gregorio Martínez Pérez, Michael Taynnan Barros, Sasitharan Balasubramaniam:
Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges. 11:1-11:35 - Leah Zhang-Kennedy
, Sonia Chiasson:
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education. 12:1-12:39 - Shengming Jiang
:
Networking in Oceans: A Survey. 13:1-13:33 - Weitao Xu
, Junqing Zhang
, Shunqi Huang, Chengwen Luo, Wei Li:
Key Generation for Internet of Things: A Contemporary Survey. 14:1-14:37 - Paolo Bellavista
, Luca Foschini, Alessio Mora
:
Decentralised Learning in Federated Deployment Environments: A System-Level Survey. 15:1-15:38 - Zarin Tasnim Sandhie
, Jill Arvindbhai Patel, Farid Uddin Ahmed, Masud H. Chowdhury:
Investigation of Multiple-valued Logic Technologies for Beyond-binary Era. 16:1-16:30 - Rayan Chikhi, Jan Holub
, Paul Medvedev:
Data Structures to Represent a Set of k-long DNA Sequences. 17:1-17:22 - Víctor Adrián Sosa-Hernández, Raúl Monroy
, Miguel Angel Medina-Pérez, Octavio Loyola-González, Francisco Herrera:
A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities. 18:1-18:38 - Stefano Mariani, Giacomo Cabri, Franco Zambonelli:
Coordination of Autonomous Vehicles: Taxonomy and Survey. 19:1-19:33 - Zara Nasar, Syed Waqar Jaffry
, Muhammad Kamran Malik:
Named Entity Recognition and Relation Extraction: State-of-the-Art. 20:1-20:39 - Emad Aliwa, Omer F. Rana
, Charith Perera, Peter Burnap:
Cyberattacks and Countermeasures for In-Vehicle Networks. 21:1-21:37 - Bosheng Song, Kenli Li, David Orellana-Martín, Mario J. Pérez-Jiménez, Ignacio Pérez-Hurtado
:
A Survey of Nature-Inspired Computing: Membrane Computing. 22:1-22:31 - Anna Minaeva, Zdenek Hanzálek:
Survey on Periodic Scheduling for Time-triggered Hard Real-time Systems. 23:1-23:32 - Tobias Distler:
Byzantine Fault-tolerant State-machine Replication from a Systems Perspective. 24:1-24:38
Volume 54, Number 2, March 2022
- Abdullah Qasem, Paria Shirani
, Mourad Debbabi
, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. 25:1-25:42 - Fan Zhou, Xovee Xu
, Goce Trajcevski, Kunpeng Zhang
:
A Survey of Information Cascade Analysis: Models, Predictions, and Recent Advances. 27:1-27:36 - Pedro Ribeiro
, Pedro Paredes, Miguel E. P. Silva
, David Aparício
, Fernando M. A. Silva
:
A Survey on Subgraph Counting: Concepts, Algorithms, and Applications to Network Motifs and Graphlets. 28:1-28:36 - Azzedine Boukerche, Hou Zhijun:
Object Detection Using Deep Learning Methods in Traffic Scenarios. 30:1-30:35 - Bo Liu
, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi
, Zihuai Lin
:
When Machine Learning Meets Privacy: A Survey and Outlook. 31:1-31:36 - Chenning Li
, Zhichao Cao, Yunhao Liu:
Deep AI Enabled Ubiquitous Wireless Sensing: A Survey. 32:1-32:35 - Kelsey Harley
, Rodney Cooper:
Information Integrity: Are We There Yet? 33:1-33:35 - El-Ghazali Talbi:
Automated Design of Deep Neural Networks: A Survey and Unified Taxonomy. 34:1-34:37 - Yashar Deldjoo
, Tommaso Di Noia, Felice Antonio Merra:
A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks. 35:1-35:38 - Sarra Bouhenni
, Saïd Yahiaoui
, Nadia Nouali-Taboudjemat, Hamamache Kheddouci:
A Survey on Distributed Graph Pattern Matching in Massive Graphs. 36:1-36:35 - Zhengwei Wang
, Qi She, Tomás E. Ward:
Generative Adversarial Networks in Computer Vision: A Survey and Taxonomy. 37:1-37:38 - Guansong Pang
, Chunhua Shen, Longbing Cao
, Anton van den Hengel:
Deep Learning for Anomaly Detection: A Review. 38:1-38:38 - Sheng Wang
, Zhifeng Bao
, J. Shane Culpepper
, Gao Cong:
A Survey on Trajectory Data Management, Analytics, and Learning. 39:1-39:36 - Christian Meurisch, Max Mühlhäuser:
Data Protection in AI Services: A Survey. 40:1-40:38 - Dhivya Chandrasekaran, Vijay Mago
:
Evolution of Semantic Similarity - A Survey. 41:1-41:37 - Xiaoxue Chen, Lianwen Jin, Yuanzhi Zhu, Canjie Luo, Tianwei Wang:
Text Recognition in the Wild: A Survey. 42:1-42:35 - Suha Al-Thanyyan, Aqil M. Azmi
:
Automated Text Simplification: A Survey. 43:1-43:36 - Huawei Huang, Wei Kong, Sicong Zhou, Zibin Zheng
, Song Guo:
A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools. 44:1-44:42 - Sameen Maruf, Fahimeh Saleh, Gholamreza Haffari:
A Survey on Document-level Neural Machine Translation: Methods and Evaluation. 45:1-45:36 - Arlino Magalhães, José Maria Monteiro, Angelo Brayner:
Main Memory Database Recovery: A Survey. 46:1-46:36
Volume 54, Number 3, April 2022
- Mohammed Hassanin, Salman H. Khan, Murat Tahtali
:
Visual Affordance and Function Understanding: A Survey. 47:1-47:35 - Matteo Magnani, Obaida Hanteer, Roberto Interdonato, Luca Rossi, Andrea Tagarelli:
Community Detection in Multiplex Networks. 48:1-48:35 - Clayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro:
Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications. 49:1-49:38 - Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration: A Review. 50:1-50:47 - Irfan Ul Haq, Juan Caballero:
A Survey of Binary Code Similarity. 51:1-51:38 - Shyamali Mitra, Nibaran Das, Soumyajyoti Dey
, Sukanta Chakraborty, Mita Nasipuri, Mrinal Kanti Naskar:
Cytology Image Analysis Techniques Toward Automation: Systematically Revisited. 52:1-52:41 - Ilona Bluemke
, Agnieszka Malanowska
:
Software Testing Effort Estimation and Related Problems: A Systematic Literature Review. 53:1-53:38 - Wenjie Xiong
, Jakub Szefer:
Survey of Transient Execution Attacks and Their Mitigations. 54:1-54:36 - Liping Zhao, Waad Alhoshan, Alessio Ferrari
, Keletso J. Letsholo
, Muideen A. Ajagbe
, Erol-Valeriu Chioasca, Riza Theresa Batista-Navarro
:
Natural Language Processing for Requirements Engineering: A Systematic Mapping Study. 55:1-55:41 - Ane Blázquez-García
, Angel Conde, Usue Mori, José Antonio Lozano:
A Review on Outlier/Anomaly Detection in Time Series Data. 56:1-56:33 - Syed Wasif Abbas Hamdani
, Haider Abbas
, Abdul Rehman Janjua, Waleed Bin Shahid, Muhammad Faisal Amjad, Jahanzaib Malik
, Malik Hamza Murtaza
, Mohammed Atiquzzaman
, Abdul Waheed Khan
:
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons. 57:1-57:36 - Xi Li, Zehua Wang, Victor C. M. Leung, Hong Ji, Yiming Liu, Heli Zhang:
Blockchain-empowered Data-driven Networks: A Survey and Outlook. 58:1-58:38 - Petr Spelda
, Vit Stritecky
:
Human Induction in Machine Learning: A Survey of the Nexus. 59:1-59:18 - Jun Huang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Min Luo, Kim-Kwang Raymond Choo
:
The Application of the Blockchain Technology in Voting Systems: A Review. 60:1-60:28 - Boubakr Nour, Hakima Khelifi, Rasheed Hussain
, Spyridon Mastorakis, Hassine Moungla:
Access Control Mechanisms in Named Data Networks: A Comprehensive Survey. 61:1-61:35 - Shervin Minaee, Nal Kalchbrenner, Erik Cambria
, Narjes Nikzad
, Meysam Chenaghlu, Jianfeng Gao:
Deep Learning-based Text Classification: A Comprehensive Review. 62:1-62:40 - Divya Saxena
, Jiannong Cao:
Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions. 63:1-63:42 - Zhabiz Gharibshah, Xingquan Zhu:
User Response Prediction in Online Advertising. 64:1-64:43 - Gilberto Astolfi
, Fábio Prestes Cesar Rezende
, João Vitor de Andrade Porto
, Edson Takashi Matsubara
, Hemerson Pistori
:
Syntactic Pattern Recognition in Computer Vision: A Systematic Review. 65:1-65:35 - Blesson Varghese
, Nan Wang, David Bermbach, Cheol-Ho Hong
, Eyal de Lara, Weisong Shi, Christopher Stewart
:
A Survey on Edge Performance Benchmarking. 66:1-66:33 - Danilo Avola, Luigi Cinque, Alessio Fagioli
, Gian Luca Foresti, Alessio Mecca
:
Ultrasound Medical Imaging Techniques: A Survey. 67:1-67:38 - Khan Muhammad
, Mohammad S. Obaidat, Tanveer Hussain
, Javier Del Ser, Neeraj Kumar
, Muhammad Tanveer
, Faiyaz Doctor:
Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions. 68:1-68:33 - Ahmed Alharbi
, Hai Dong
, Xun Yi, Zahir Tari, Ibrahim Khalil
:
Social Media Identity Deception Detection: A Survey. 69:1-69:35
Volume 54, Number 4, May 2022
- Felipe L. Gewers
, Gustavo R. Ferreira
, Henrique Ferraz de Arruda
, Filipi Nascimento Silva, Cesar H. Comin
, Diego R. Amancio, Luciano da Fontoura Costa:
Principal Component Analysis: A Natural Approach to Data Exploration. 70:1-70:34 - Aidan Hogan
, Eva Blomqvist, Michael Cochez, Claudia d'Amato, Gerard de Melo, Claudio Gutierrez
, Sabrina Kirrane
, José Emilio Labra Gayo, Roberto Navigli
, Sebastian Neumaier
, Axel-Cyrille Ngonga Ngomo
, Axel Polleres, Sabbir M. Rashid, Anisa Rula, Lukas Schmelzeisen, Juan F. Sequeda, Steffen Staab
, Antoine Zimmermann:
Knowledge Graphs. 71:1-71:37 - Wen-Huang Cheng, Sijie Song, Chieh-Yun Chen
, Shintami Chusnul Hidayati, Jiaying Liu
:
Fashion Meets Computer Vision: A Survey. 72:1-72:41 - Rob Dunne
, Tim Morris
, Simon Harper
:
A Survey of Ambient Intelligence. 73:1-73:27 - Hussain Mohammed Dipu Kabir
, Abbas Khosravi
, Subrota Kumar Mondal, Mustaneer Rahman
, Saeid Nahavandi, Rajkumar Buyya:
Uncertainty-aware Decisions in Cloud Computing: Foundations and Future Directions. 74:1-74:30 - Fei Chen, Duming Luo, Tao Xiang
, Ping Chen, Junfeng Fan, Hong Linh Truong
:
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications. 75:1-75:36 - Pengzhen Ren
, Yun Xiao, Xiaojun Chang, Poyao Huang, Zhihui Li, Xiaojiang Chen, Xin Wang:
A Comprehensive Survey of Neural Architecture Search: Challenges and Solutions. 76:1-76:34 - Kaixuan Chen
, Dalin Zhang
, Lina Yao, Bin Guo, Zhiwen Yu, Yunhao Liu:
Deep Learning for Sensor-based Human Activity Recognition: Overview, Challenges, and Opportunities. 77:1-77:40 - Daniel Russo
, Klaas-Jan Stol
:
PLS-SEM for Software Engineering Research: An Introduction and Survey. 78:1-78:38 - Abdus Salam
, Rolf Schwitter
, Mehmet A. Orgun
:
Probabilistic Rule Learning Systems: A Survey. 79:1-79:16 - Elena Almaraz Luengo, Luis Javier García-Villalba:
Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes. 80:1-80:34 - Katie Seaborn
, Norihisa P. Miyake, Peter Pennefather, Mihoko Otake-Matsuura
:
Voice in Human-Agent Interaction: A Survey. 81:1-81:43 - Oliver Michel
, Roberto Bifulco, Gábor Rétvári, Stefan Schmid
:
The Programmable Data Plane: Abstractions, Architectures, Algorithms, and Applications. 82:1-82:36 - Wei Hu
, Armaiti Ardeshiricham, Ryan Kastner
:
Hardware Information Flow Tracking. 83:1-83:39 - Azzedine Boukerche
, Xiren Ma
:
Vision-based Autonomous Vehicle Recognition: A New Challenge for Deep Learning-based Systems. 84:1-84:37 - Bekir Afsar
, Kaisa Miettinen
, Francisco Ruiz
:
Assessing the Performance of Interactive Multiobjective Optimization Methods: A Survey. 85:1-85:27 - Nikhil Tripathi, Neminath Hubballi:
Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey. 86:1-86:33 - Yunbo Tang, Dan Chen, Xiaoli Li:
Dimensionality Reduction Methods for Brain Imaging Data Analysis. 87:1-87:36 - Matteo Ridolfi
, Abdil Kaya
, Rafael Berkvens
, Maarten Weyn
, Wout Joseph, Eli De Poorter:
Self-calibration and Collaborative Localization for UWB Positioning Systems: A Survey and Future Research Directions. 88:1-88:27 - Nuno Laranjeiro
, João Agnelo
, Jorge Bernardino
:
A Systematic Review on Software Robustness Assessment. 89:1-89:65 - Boyuan Chen, Zhen Ming (Jack) Jiang:
A Survey of Software Log Instrumentation. 90:1-90:34 - Varsha S. Lalapura
, Joseph Amudha, Hariramn Selvamuruga Satheesh:
Recurrent Neural Networks for Edge Intelligence: A Survey. 91:1-91:38
Volume 54, Number 5, June 2022
- Antonia Bertolino, Pietro Braione
, Guglielmo De Angelis
, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Mauro Pezzè
, Roberto Pietrantuono
, Stefano Russo
, Paolo Tonella:
A Survey of Field-based Testing Techniques. 92:1-92:39 - Jean-Michel Bruel, Sophie Ebersold
, Florian Galinier, Manuel Mazzara, Alexandr Naumchev
, Bertrand Meyer:
The Role of Formalism in System Requirements. 93:1-93:36 - Liang Zhao
:
Event Prediction in the Big Data Era: A Systematic Survey. 94:1-94:37 - Sin Kit Lo
, Qinghua Lu
, Chen Wang
, Hye-Young Paik
, Liming Zhu:
A Systematic Literature Review on Federated Machine Learning: From a Software Engineering Perspective. 95:1-95:39 - Abdulaziz Alashaikh, Eisa Alanazi
, Ala I. Al-Fuqaha
:
A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers. 96:1-96:39 - Xing Huang
, Tsung-Yi Ho
, Wenzhong Guo, Bing Li, Krishnendu Chakrabarty
, Ulf Schlichtmann:
Computer-aided Design Techniques for Flow-based Microfluidic Lab-on-a-chip Systems. 97:1-97:29 - Jana Dunfield
, Neel Krishnaswami
:
Bidirectional Typing. 98:1-98:38 - Mohanad Abukmeil, Stefano Ferrari, Angelo Genovese
, Vincenzo Piuri, Fabio Scotti
:
A Survey of Unsupervised Generative Models for Exploratory Data Analysis and Representation Learning. 99:1-99:40 - Adilla Susungi
, Claude Tadonki:
Intermediate Representations for Explicitly Parallel Programs. 100:1-100:24 - Subodha Charles
, Prabhat Mishra
:
A Survey of Network-on-Chip Security Attacks and Countermeasures. 101:1-101:36 - Atheer Aljeraisy
, Masoud Barati, Omer F. Rana
, Charith Perera:
Privacy Laws and Privacy by Design Schemes for the Internet of Things: A Developer's Perspective. 102:1-102:38 - Arwa Al-Hussain, Aqil M. Azmi
:
Automatic Story Generation: A Survey of Approaches. 103:1-103:38 - Marie Al-Ghossein
, Talel Abdessalem, Anthony Barré:
A Survey on Stream-Based Recommender Systems. 104:1-104:36 - Dietmar Jannach
, Ahtsham Manzoor
, Wanling Cai, Li Chen:
A Survey on Conversational Recommender Systems. 105:1-105:36 - Yuan Luo
, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. 106:1-106:36 - Maya Dotan
, Yvonne-Anne Pignolet, Stefan Schmid
, Saar Tochner
, Aviv Zohar:
Survey on Blockchain Networking: Context, State-of-the-Art, Challenges. 107:1-107:34 - Ishai Rosenberg
, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. 108:1-108:36 - Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan
, Chai Quek
:
Hierarchical Reinforcement Learning: A Comprehensive Survey. 109:1-109:35 - Vimal Kumar Dwivedi
, Vishwajeet Pattanaik
, Vipin Deval
, Abhishek Dixit
, Alex Norta, Dirk Draheim:
Legally Enforceable Smart-Contract Languages: A Systematic Literature Review. 110:1-110:34 - Rob Ashmore, Radu Calinescu, Colin Paterson
:
Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges. 111:1-111:39
Volume 54, Number 6, July 2022
- Peter Kietzmann, Thomas C. Schmidt
, Matthias Wählisch
:
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT. 112:1-112:38 - Eman Badr
:
Images in Space and Time: Real Big Data in Healthcare. 113:1-113:38 - Swati Jaiswal
, Uday P. Khedker, Alan Mycroft:
A Unified Model for Context-Sensitive Program Analyses: : The Blind Men and the Elephant. 114:1-114:37 - Ninareh Mehrabi, Fred Morstatter
, Nripsuta Saxena, Kristina Lerman, Aram Galstyan:
A Survey on Bias and Fairness in Machine Learning. 115:1-115:35 - Harley Vera Olivera
, Guo RuiZhe, Ruben Cruz Huacarpuma, Ana Paula Bernardi da Silva, Ari Melo Mariano
, Maristela Holanda:
Data Modeling and NoSQL Databases - A Systematic Mapping Review. 116:1-116:26 - Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. 117:1-117:36 - Ratnabali Pal
, Arif Ahmed Sekh
, Debi Prosad Dogra, Samarjit Kar, Partha Pratim Roy, Dilip K. Prasad:
Topic-based Video Analysis: A Survey. 118:1-118:34 - Andreia P. Guerreiro, Carlos M. Fonseca, Luís Paquete
:
The Hypervolume Indicator: Computational Problems and Algorithms. 119:1-119:42 - Yuta Itoh
, Tobias Langlotz, Jonathan Sutton
, Alexander Plopski:
Towards Indistinguishable Augmented Reality: A Survey on Optical See-through Head-mounted Displays. 120:1-120:36 - Bilal Rauf, Haider Abbas
, Muhammad Usman, Tanveer A. Zia
, Waseem Iqbal
, Yawar Abbas Bangash, Hammad Afzal
:
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks. 121:1-121:36 - Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang:
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography. 122:1-122:37 - Eva Papadogiannaki, Sotiris Ioannidis:
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. 123:1-123:35 - Thi Tuyet Hai Nguyen
, Adam Jatowt
, Mickaël Coustaty, Antoine Doucet:
Survey of Post-OCR Processing Approaches. 124:1-124:37 - Panagiotis Oikonomou, Anna Karanika
, Christos Anagnostopoulos, Kostas Kolomvatsos
:
On the Use of Intelligent Models towards Meeting the Challenges of the Edge Mesh. 125:1-125:42 - Shufan Fei
, Zheng Yan, Wenxiu Ding
, Haomeng Xie:
Security Vulnerabilities of SGX and Countermeasures: A Survey. 126:1-126:36 - Sindhu Padakandla:
A Survey of Reinforcement Learning Algorithms for Dynamically Varying Environments. 127:1-127:25 - Pádraig Cunningham
, Sarah Jane Delany:
k-Nearest Neighbour Classifiers - A Tutorial. 128:1-128:25 - El-Ghazali Talbi
:
Machine Learning into Metaheuristics: A Survey and Taxonomy. 129:1-129:32 - Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, Michael R. Lyu:
A Survey on Automated Log Analysis for Reliability Engineering. 130:1-130:37 - Xuefei Yin
, Yanming Zhu
, Jiankun Hu
:
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. 131:1-131:36 - Zhipeng Cai
, Zuobin Xiong
, Honghui Xu, Peng Wang, Wei Li, Yi Pan:
Generative Adversarial Networks: A Survey Toward Private and Secure Applications. 132:1-132:38 - Azzedine Boukerche
, Mingzhi Sha
:
Design Guidelines on Deep Learning-based Pedestrian Detection Methods for Supporting Autonomous Vehicles. 133:1-133:36
- Thomas Plötz:
Applying Machine Learning for Sensor Data Analysis in Interactive Systems: Common Pitfalls of Pragmatic Use and Ways to Avoid Them. 134:1-134:25
Volume 54, Number 7, September 2022
- Ankur Lohachab, Saurabh Garg
, Byeong Kang, Muhammad Bilal Amin
, Junmin Lee, Shiping Chen
, Xiwei Xu
:
Towards Interconnected Blockchains: A Comprehensive Review of the Role of Interoperability among Disparate Blockchains. 135:1-135:39 - Lefeng Zhang
, Tianqing Zhu, Ping Xiong, Wanlei Zhou
, Philip S. Yu:
More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design. 136:1-136:37 - Michael Braun, Florian Weber, Florian Alt
:
Affective Automotive User Interfaces-Reviewing the State of Driver Affect Research and Emotion Regulation in the Car. 137:1-137:26 - Sophie Dramé-Maigné, Maryline Laurent
, Laurent Castillo, Hervé Ganem:
Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT. 138:1-138:34 - Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. 139:1-139:36 - Luciano Ignaczak
, Guilherme Goldschmidt, Cristiano André da Costa, Rodrigo da Rosa Righi:
Text Mining in Cybersecurity: A Systematic Literature Review. 140:1-140:36 - Tharindu Fernando
, Harshala Gammulle
, Simon Denman, Sridha Sridharan
, Clinton Fookes:
Deep Learning for Medical Anomaly Detection - A Survey. 141:1-141:37 - Salonik Resch, Ulya R. Karpuzcu:
Benchmarking Quantum Computers and the Impact of Quantum Noise. 142:1-142:35 - Hugo Brito Lima, Carlos Gustavo Resque dos Santos, Bianchi Serique Meiguins:
A Survey of Music Visualization Techniques. 143:1-143:29 - Yohan Bonescki Gumiel, Lucas Emanuel Silva e Oliveira
, Vincent Claveau, Natalia Grabar, Emerson Cabrera Paraiso, Claudia Maria Cabral Moro Barra, Deborah Ribeiro Carvalho:
Temporal Relation Extraction in Clinical Texts: A Systematic Review. 144:1-144:36 - Uttam Chauhan
, Apurva Shah
:
Topic Modeling Using Latent Dirichlet allocation: A Survey. 145:1-145:35 - Lynda Tamine, Lorraine Goeuriot:
Semantic Information Retrieval on Medical Texts: Research Challenges, Survey, and Open Issues. 146:1-146:38 - Christian Berger
, Philipp Eichhammer, Hans P. Reiser, Jörg Domaschka, Franz J. Hauck, Gerhard Habiger:
A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms. 147:1-147:39 - Palina Tolmach
, Yi Li, Shangwei Lin, Yang Liu, Zengxiang Li:
A Survey of Smart Contract Formal Specification and Verification. 148:1-148:38 - Jihyeok Park
, Hongki Lee, Sukyoung Ryu
:
A Survey of Parametric Static Analysis. 149:1-149:37 - Douglas Paulo de Mattos
, Débora C. Muchaluat-Saade, Gheorghita Ghinea:
Beyond Multimedia Authoring: On the Need for Mulsemedia Authoring Tools. 150:1-150:31 - Jie Zhang, Zhihao Qu, Chenxi Chen, Haozhao Wang, Yufeng Zhan, Baoliu Ye, Song Guo:
Edge Learning: The Enabling Technology for Distributed Big Data Analytics in the Edge. 151:1-151:36 - Alexandro Baldassin
, João Barreto
, Daniel Castro
, Paolo Romano
:
Persistent Memory: A Survey of Programming Support and Implementations. 152:1-152:37 - Julio Juárez
, Cipriano (Pano) Santos, Carlos A. Brizuela:
A Comprehensive Review and a Taxonomy Proposal of Team Formation Problems. 153:1-153:33 - Shoujin Wang
, Longbing Cao
, Yan Wang
, Quan Z. Sheng
, Mehmet A. Orgun
, Defu Lian
:
A Survey on Session-based Recommender Systems. 154:1-154:38 - Nathan Magrofuoco, Paolo Roselli
, Jean Vanderdonckt:
Two-dimensional Stroke Gesture Recognition: A Survey. 155:1-155:36 - Djalel Chefrour
:
One-Way Delay Measurement From Traditional Networks to SDN: A Survey. 156:1-156:35
Volume 54, Number 8, November 2022
- Abdul Jabbar, Xi Li, Bourahla Omar:
A Survey on Generative Adversarial Networks: Variants, Applications, and Training. 157:1-157:49 - Jianguo Chen, Kenli Li, Zhaolei Zhang, Keqin Li, Philip S. Yu:
A Survey on Applications of Artificial Intelligence in Fighting Against COVID-19. 158:1-158:32 - Xingwei Zhang, Xiaolong Zheng, Wenji Mao
:
Adversarial Perturbation Defense on Deep Neural Networks. 159:1-159:36 - Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar
, Huaqun Wang, Kim-Kwang Raymond Choo
:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. 160:1-160:36 - Akbar Telikani, Amirhessam Tahmassebi, Wolfgang Banzhaf, Amir H. Gandomi
:
Evolutionary Machine Learning: A Survey. 161:1-161:35 - Weijia Zhang
, Jiuyong Li
, Lin Liu
:
A Unified Survey of Treatment Effect Heterogeneity Modelling and Uplift Modelling. 162:1-162:36 - Vinicius Costa de Souza
, Anderson Maciel
, Luciana Porcher Nedel
, Regis Kopper:
Measuring Presence in Virtual Environments: A Survey. 163:1-163:37 - Gopika Ajaykumar, Maureen Steele, Chien-Ming Huang:
A Survey on End-User Robot Programming. 164:1-164:36 - Lik-Hang Lee
, Tristan Braud, Simo Hosio
, Pan Hui:
Towards Augmented Reality Driven Human-City Interaction: Current Research on Mobile Headsets and Future Challenges. 165:1-165:38 - Satyaki Roy, Preetam Ghosh
, Nirnay Ghosh, Sajal K. Das:
Transcriptional Regulatory Network Topology with Applications to Bio-inspired Networking: A Survey. 166:1-166:36 - Haiman Tian, Maria E. Presa Reyes, Yudong Tao, Tianyi Wang, Samira Pouyanfar, Miguel Alonso, Steven Luis
, Mei-Ling Shyu, Shu-Ching Chen, Sundaraja Sitharama Iyengar
:
Data Analytics for Air Travel Data: A Survey and New Perspectives. 167:1-167:35 - Rafael Belchior, André Vasconcelos
, Sérgio Guerreiro
, Miguel Correia
:
A Survey on Blockchain Interoperability: Past, Present, and Future Trends. 168:1-168:41 - Royson Lee
, Stylianos I. Venieris, Nicholas D. Lane:
Deep Neural Network-based Enhancement for Image and Video Streaming Systems: A Survey and Future Directions. 169:1-169:30 - M. G. Sarwar Murshed
, Christopher Murphy, Daqing Hou, Nazar Khan
, Ganesh Ananthanarayanan, Faraz Hussain
:
Machine Learning at the Network Edge: A Survey. 170:1-170:37 - Maxime Lamothe, Yann-Gaël Guéhéneuc, Weiyi Shang:
A Systematic Review of API Evolution Literature. 171:1-171:36 - Jessica McBroom
, Irena Koprinska
, Kalina Yacef
:
A Survey of Automated Programming Hint Generation: The HINTS Framework. 172:1-172:27 - Giuseppe Desolda, Lauren S. Ferro
, Andrea Marrella, Tiziana Catarci
, Maria Francesca Costabile:
Human Factors in Phishing Attacks: A Systematic Literature Review. 173:1-173:35 - Ye Tian, Langchun Si, Xingyi Zhang, Ran Cheng
, Cheng He
, Kay Chen Tan
, Yaochu Jin
:
Evolutionary Large-Scale Multi-Objective Optimization: A Survey. 174:1-174:34 - Shubhra Kanti Karmaker Santu
, Md. Mahadi Hassan, Micah J. Smith, Lei Xu, Chengxiang Zhai, Kalyan Veeramachaneni:
AutoML to Date and Beyond: Challenges and Opportunities. 175:1-175:36 - Alexandre H. T. Dias, Luiz Henrique A. Correia, Neumar Malheiros:
A Systematic Literature Review on Virtual Machine Consolidation. 176:1-176:38 - Fuqiang Gu
, Mu-Huan Chung, Mark H. Chignell, Shahrokh Valaee, Baoding Zhou, Xue Liu:
A Survey on Deep Learning for Human Activity Recognition. 177:1-177:34
Volume 54, Number 9, December 2022
- Konstantinos Arakadakis, Pavlos Charalampidis
, Antonis Makrogiannakis, Alexandros G. Fragkiadakis:
Firmware Over-the-air Programming Techniques for IoT Networks - A Survey. 178:1-178:36 - Lázaro Bustio-Martínez
, René Cumplido, Martín Letras
, Raudel Hernández-León, Claudia Feregrino Uribe, José Hernández Palancar:
FPGA/GPU-based Acceleration for Frequent Itemsets Mining: A Comprehensive Review. 179:1-179:35 - Pengzhen Ren, Yun Xiao, Xiaojun Chang, Po-Yao Huang, Zhihui Li, Brij B. Gupta
, Xiaojiang Chen, Xin Wang:
A Survey of Deep Active Learning. 180:1-180:40 - Efstratios Kakaletsis
, Charalampos Symeonidis, Maria Tzelepi, Ioannis Mademlis
, Anastasios Tefas
, Nikos Nikolaidis
, Ioannis Pitas:
Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example. 181:1-181:37 - Dylan Chou, Meng Jiang:
A Survey on Data-driven Network Intrusion Detection. 182:1-182:36 - Lingxi Xie, Xin Chen, Kaifeng Bi, Longhui Wei, Yuhui Xu, Lanfei Wang, Zhengsu Chen, An Xiao, Jianlong Chang, Xiaopeng Zhang, Qi Tian:
Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap. 183:1-183:37 - Carlos Bermejo, Pan Hui:
A Survey on Haptic Technologies for Mobile Augmented Reality. 184:1-184:35 - Ismaeel Al Ridhawi, Ouns Bouachir, Moayad Aloqaily
, Azzedine Boukerche:
Design Guidelines for Cooperative UAV-supported Services and Applications. 185:1-185:35 - Pasika Ranaweera, Anca Jurcut
, Madhusanka Liyanage
:
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. 186:1-186:37 - Xiongkuo Min
, Ke Gu, Guangtao Zhai
, Xiaokang Yang, Wenjun Zhang, Patrick Le Callet, Chang Wen Chen
:
Screen Content Quality Assessment: Overview, Benchmark, and Beyond. 187:1-187:36 - Frank Siqueira
, Joseph G. Davis
:
Service Computing for Industry 4.0: State of the Art, Challenges, and Research Opportunities. 188:1-188:38 - Denise Maria Vecino Sato
, Sheila Cristiana De Freitas, Jean Paul Barddal, Edson Emílio Scalabrin:
A Survey on Concept Drift in Process Mining. 189:1-189:38 - Bing Zhang, Jingyue Li, Jiadong Ren, Guoyan Huang:
Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review. 190:1-190:35 - Sergi Abadal, Akshay Jain
, Robert Guirado
, Jorge López-Alonso, Eduard Alarcón:
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators. 191:1-191:38 - Meriem Guerar
, Luca Verderame, Mauro Migliardi
, Francesco Palmieri, Alessio Merlo:
Gotta CAPTCHA 'Em All: A Survey of 20 Years of the Human-or-computer Dilemma. 192:1-192:33 - José Mena, Oriol Pujol, Jordi Vitrià:
A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective. 193:1-193:35 - Josef Schmid, Alfred Höß, Björn W. Schuller
:
A Survey on Client Throughput Prediction Algorithms in Wired and Wireless Networks. 194:1-194:33 - Asma Aloufi
, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey. 195:1-195:37 - Chao Liu, Xin Xia, David Lo
, Cuiyun Gao, Xiaohu Yang, John C. Grundy:
Opportunities and Challenges in Code Search Tools. 196:1-196:40 - Timothy R. McIntosh
, A. S. M. Kayes
, Yi-Ping Phoebe Chen
, Alex Ng
, Paul A. Watters
:
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions. 197:1-197:36 - René Mayrhofer, Stephan Sigg:
Adversary Models for Mobile Device Authentication. 198:1-198:35 - Gábor E. Gévay, Juan Soto
, Volker Markl:
Handling Iterations in Distributed Dataflow Systems. 199:1-199:38
Volume 54, Number 10s, January 2022
- Salman H. Khan
, Muzammal Naseer
, Munawar Hayat
, Syed Waqas Zamir
, Fahad Shahbaz Khan
, Mubarak Shah
:
Transformers in Vision: A Survey. 200:1-200:41 - Géraldin Nanfack
, Paul Temple
, Benoît Frénay
:
Constraint Enforcement on Decision Trees: A Survey. 201:1-201:36 - Nhu-Ngoc Dao
, Anh-Tien Tran, Ngo Hoang Tu
, Tran Thien Thanh
, Vo Nguyen Quoc Bao, Sungrae Cho
:
A Contemporary Survey on Live Video Streaming from a Computation-Driven Perspective. 202:1-202:38 - Pablo Messina
, Pablo Pino, Denis Parra, Alvaro Soto, Cecilia Besa, Sergio Uribe, Marcelo E. Andia, Cristian Tejos, Claudia Prieto, Daniel Capurro:
A Survey on Deep Learning and Explainability for Automatic Report Generation from Medical Images. 203:1-203:40 - Ross Gruetzemacher
, David B. Paradice
:
Deep Transfer Learning & Beyond: Transformer Language Models in Information Systems Research. 204:1-204:35 - Isaac Ronald Ward
, Jack Joyner
, Casey Lickfold
, Yulan Guo
, Mohammed Bennamoun
:
A Practical Tutorial on Graph Neural Networks. 205:1-205:35 - Yanming Yang
, Xin Xia
, David Lo
, John C. Grundy
:
A Survey on Deep Learning for Software Engineering. 206:1-206:73 - Ying Zhao
, Jinjun Chen
:
A Survey on Differential Privacy for Unstructured Data Content. 207:1-207:28 - Aayush Bansal, Rewa Sharma, Mamta Kathuria
:
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications. 208:1-208:29 - Xin Wang
, Sisi Duan
, James R. Clavin
, Haibin Zhang
:
BFT in Blockchains: From Protocols to Use Cases. 209:1-209:37 - Torsten Schlett
, Christian Rathgeb, Olaf Henniger
, Javier Galbally, Julian Fiérrez, Christoph Busch:
Face Image Quality Assessment: A Literature Survey. 210:1-210:49 - Vijay Kumar Yadav
, Nitish Andola
, Shekhar Verma
, S. Venkatesan
:
A Survey of Oblivious Transfer Protocol. 211:1-211:37 - Hang Du
, Hailin Shi
, Dan Zeng
, Xiao-Ping Zhang
, Tao Mei
:
The Elements of End-to-end Deep Face Recognition: A Survey of Recent Advances. 212:1-212:42 - Claudio Filipi Goncalves dos Santos
, João Paulo Papa
:
Avoiding Overfitting: A Survey on Regularization Methods for Convolutional Neural Networks. 213:1-213:25 - Misael Costa Júnior
, Domenico Amalfitano
, Lina Garcés
, Anna Rita Fasolino
, Stevão Alves de Andrade
, Márcio Eduardo Delamaro
:
Dynamic Testing Techniques of Non-functional Requirements in Mobile Apps: A Systematic Mapping Study. 214:1-214:38 - Rob Churchill
, Lisa Singh:
The Evolution of Topic Modeling. 215:1-215:35 - Daniel Martin
, Sandra Malpica
, Diego Gutierrez
, Belén Masiá, Ana Serrano:
Multimodality in VR: A Survey. 216:1-216:36 - Zhiheng Zhong
, Minxian Xu
, Maria Alejandra Rodriguez
, Cheng-Zhong Xu
, Rajkumar Buyya
:
Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions. 217:1-217:35 - Farkhanda Zafar, Hasan Ali Khattak
, Moayad Aloqaily
, Rasheed Hussain
:
Carpooling in Connected and Autonomous Vehicles: Current Solutions and Future Directions. 218:1-218:36 - Md. Mahbub Alam
, Luís Torgo, Albert Bifet
:
A Survey on Spatio-temporal Data Analytics Systems. 219:1-219:38 - Zijun Li
, Linsong Guo
, Jiagan Cheng
, Quan Chen
, Bingsheng He, Minyi Guo:
The Serverless Computing Survey: A Technical Primer for Design Architecture. 220:1-220:34 - Peng Liu
, Lizhe Wang, Rajiv Ranjan, Guojin He, Lei Zhao:
A Survey on Active Deep Learning: From Model Driven to Data Driven. 221:1-221:34
Volume 54, Number 11s, January 2022
- Anupama Mampage
, Shanika Karunasekera
, Rajkumar Buyya
:
A Holistic View on Resource Management in Serverless Computing Environments: Taxonomy and Future Directions. 222:1-222:36 - Pablo Sánchez
, Alejandro Bellogín
:
Point-of-Interest Recommender Systems Based on Location-Based Social Networks: A Survey from an Experimental Perspective. 223:1-223:37 - Paula Delgado-Santos
, Giuseppe Stragapede, Ruben Tolosana
, Richard M. Guest, Farzin Deravi, Rubén Vera-Rodríguez:
A Survey of Privacy Vulnerabilities of Mobile Device Sensors. 224:1-224:30 - Hasini Witharana
, Yangdi Lyu
, Subodha Charles
, Prabhat Mishra
:
A Survey on Assertion-based Hardware Verification. 225:1-225:33 - Fabian Fagerholm
, Michael Felderer, Davide Fucci, Michael Unterkalmsteiner, Bogdan Marculescu, Markus Martini, Lars Göran Wallgren Tengberg, Robert Feldt, Bettina Lehtelä, Balázs Nagyváradi
, Jehan Khattak:
Cognition in Software Engineering: A Taxonomy and Survey of a Half-Century of Research. 226:1-226:36 - Wenhao Yu, Chenguang Zhu, Zaitang Li, Zhiting Hu, Qingyun Wang, Heng Ji, Meng Jiang:
A Survey of Knowledge-enhanced Text Generation. 227:1-227:38 - Harindu Korala
, Dimitrios Georgakopoulos
, Prem Prakash Jayaraman
, Ali Yavari
:
A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications. 228:1-228:36 - Hakan Kayan
, Matthew Nunes, Omer F. Rana
, Pete Burnap, Charith Perera:
Cybersecurity of Industrial Cyber-Physical Systems: A Review. 229:1-229:35 - Xiaogang Zhu
, Sheng Wen
, Seyit Camtepe
, Yang Xiang
:
Fuzzing: A Survey for Roadmap. 230:1-230:36 - Jakub Zádník
, Markku J. Mäkitalo
, Jarno Vanne
, Pekka Jääskeläinen
:
Image and Video Coding Techniques for Ultra-low Latency. 231:1-231:35 - Anirudh Chandramouli
, Ashish Choudhury
, Arpita Patra:
A Survey on Perfectly Secure Verifiable Secret-sharing. 232:1-232:36 - Bushra Jamil
, Humaira Ijaz
, Mohammad Shojafar, Kashif Munir
, Rajkumar Buyya:
Resource Allocation and Task Scheduling in Fog Computing and Internet of Everything Environments: A Taxonomy, Review, and Future Directions. 233:1-233:38 - Ajay Mittal, Sabrina Dhalla, Savita Gupta, Aastha Gupta
:
Automated Analysis of Blood Smear Images for Leukemia Detection: A Comprehensive Review. 234:1-234:37 - Hongsheng Hu
, Zoran Salcic, Lichao Sun
, Gillian Dobbie, Philip S. Yu, Xuyun Zhang
:
Membership Inference Attacks on Machine Learning: A Survey. 235:1-235:37 - Rajeev Muralidhar
, Renata Borovica-Gajic
, Rajkumar Buyya:
Energy Efficient Computing Systems: Architectures, Abstractions and Modeling to Techniques and Standards. 236:1-236:37 - Valeria Cardellini
, Francesco Lo Presti
, Matteo Nardelli
, Gabriele Russo Russo
:
Runtime Adaptation of Data Stream Processing Systems: The State of the Art. 237:1-237:36 - Harun Oz
, Ahmet Aris
, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. 238:1-238:37 - Hossein Shafiei, Ahmad Khonsari, Payam Mousavi:
Serverless Computing: A Survey of Opportunities, Challenges, and Applications. 239:1-239:32 - Sabah Suhail
, Rasheed Hussain
, Raja Jurdak
, Alma Oracevic, Khaled Salah, Choong Seon Hong, Raimundas Matulevicius:
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges. 240:1-240:34 - Matheus Alberto de Oliveira Ribeiro
, Fátima L. S. Nunes
:
Left Ventricle Segmentation in Cardiac MR: A Systematic Mapping of the Past Decade. 241:1-241:38 - Simone Antonelli
, Danilo Avola
, Luigi Cinque
, Donato Crisostomi
, Gian Luca Foresti
, Fabio Galasso
, Marco Raoul Marini
, Alessio Mecca
, Daniele Pannone
:
Few-Shot Object Detection: A Survey. 242:1-242:37 - Shengmei Liu, Xiaokun Xu, Mark Claypool
:
A Survey and Taxonomy of Latency Compensation Techniques for Network Computer Games. 243:1-243:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.