


default search action
ACM Computing Surveys, Volume 54
Volume 54, Number 1, January 2022
- Miljana Mladenovic

, Vera Osmjanski, Stasa Vujicic Stankovic
:
Cyber-aggression, Cyberbullying, and Cyber-grooming: A Survey and Research Challenges. 1:1-1:42 - Avani Vyas

, Sujata Pal
, Barun Kumar Saha:
Relay-based Communications in WBANs: A Comprehensive Survey. 2:1-2:34 - Ángel Jesús Varela-Vaca

, Antonia M. Reina Quintero
:
Smart Contract Languages: A Multivocal Mapping Study. 3:1-3:38 - Hongbo Jiang

, Jie Li
, Ping Zhao, Fanzi Zeng
, Zhu Xiao
, Arun Iyengar:
Location Privacy-preserving Mechanisms in Location-based Services: A Comprehensive Survey. 4:1-4:36 - Christopher Wright

, William A. Moeglein, Saurabh Bagchi, Milind Kulkarni, Abraham A. Clements:
Challenges in Firmware Re-Hosting, Emulation, and Analysis. 5:1-5:36 - Renjie Gu

, Chaoyue Niu, Fan Wu, Guihai Chen, Chun Hu, Chengfei Lyu, Zhihua Wu:
From Server-Based to Client-Based Machine Learning: A Comprehensive Survey. 6:1-6:36 - Yisroel Mirsky

, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. 7:1-7:41 - Joan Boyar

, Lene M. Favrholdt
, Kim S. Larsen
:
Relative Worst-order Analysis: A Survey. 8:1-8:21 - Prasanna Ravi

, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Lattice-based Key-sharing Schemes: A Survey. 9:1-9:39 - Behroz Mirza, Tahir Q. Syed

, Behraj Khan
, Muhammad Yameen Malik:
Potential Deep Learning Solutions to Persistent and Emerging Big Data Challenges - A Practitioners' Cookbook. 10:1-10:39 - Sergio López Bernal

, Alberto Huertas Celdrán
, Gregorio Martínez Pérez, Michael Taynnan Barros, Sasitharan Balasubramaniam:
Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges. 11:1-11:35 - Leah Zhang-Kennedy

, Sonia Chiasson:
A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education. 12:1-12:39 - Shengming Jiang

:
Networking in Oceans: A Survey. 13:1-13:33 - Weitao Xu

, Junqing Zhang
, Shunqi Huang, Chengwen Luo, Wei Li:
Key Generation for Internet of Things: A Contemporary Survey. 14:1-14:37 - Paolo Bellavista

, Luca Foschini, Alessio Mora
:
Decentralised Learning in Federated Deployment Environments: A System-Level Survey. 15:1-15:38 - Zarin Tasnim Sandhie

, Jill Arvindbhai Patel, Farid Uddin Ahmed, Masud H. Chowdhury:
Investigation of Multiple-valued Logic Technologies for Beyond-binary Era. 16:1-16:30 - Rayan Chikhi, Jan Holub

, Paul Medvedev:
Data Structures to Represent a Set of k-long DNA Sequences. 17:1-17:22 - Víctor Adrián Sosa-Hernández, Raúl Monroy

, Miguel Angel Medina-Pérez, Octavio Loyola-González, Francisco Herrera:
A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities. 18:1-18:38 - Stefano Mariani, Giacomo Cabri, Franco Zambonelli:

Coordination of Autonomous Vehicles: Taxonomy and Survey. 19:1-19:33 - Zara Nasar, Syed Waqar Jaffry

, Muhammad Kamran Malik:
Named Entity Recognition and Relation Extraction: State-of-the-Art. 20:1-20:39 - Emad Aliwa, Omer F. Rana

, Charith Perera, Peter Burnap:
Cyberattacks and Countermeasures for In-Vehicle Networks. 21:1-21:37 - Bosheng Song, Kenli Li, David Orellana-Martín, Mario J. Pérez-Jiménez, Ignacio Pérez-Hurtado

:
A Survey of Nature-Inspired Computing: Membrane Computing. 22:1-22:31 - Anna Minaeva, Zdenek Hanzálek:

Survey on Periodic Scheduling for Time-triggered Hard Real-time Systems. 23:1-23:32 - Tobias Distler:

Byzantine Fault-tolerant State-machine Replication from a Systems Perspective. 24:1-24:38
Volume 54, Number 2, March 2022
- Abdullah Qasem, Paria Shirani

, Mourad Debbabi
, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. 25:1-25:42 - Fan Zhou, Xovee Xu

, Goce Trajcevski, Kunpeng Zhang
:
A Survey of Information Cascade Analysis: Models, Predictions, and Recent Advances. 27:1-27:36 - Pedro Ribeiro

, Pedro Paredes, Miguel E. P. Silva
, David Aparício
, Fernando M. A. Silva
:
A Survey on Subgraph Counting: Concepts, Algorithms, and Applications to Network Motifs and Graphlets. 28:1-28:36 - Azzedine Boukerche, Hou Zhijun:

Object Detection Using Deep Learning Methods in Traffic Scenarios. 30:1-30:35 - Bo Liu

, Ming Ding, Sina Shaham, Wenny Rahayu, Farhad Farokhi
, Zihuai Lin
:
When Machine Learning Meets Privacy: A Survey and Outlook. 31:1-31:36 - Chenning Li

, Zhichao Cao, Yunhao Liu:
Deep AI Enabled Ubiquitous Wireless Sensing: A Survey. 32:1-32:35 - Kelsey Harley

, Rodney Cooper:
Information Integrity: Are We There Yet? 33:1-33:35 - El-Ghazali Talbi:

Automated Design of Deep Neural Networks: A Survey and Unified Taxonomy. 34:1-34:37 - Yashar Deldjoo

, Tommaso Di Noia, Felice Antonio Merra
:
A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks. 35:1-35:38 - Sarra Bouhenni

, Saïd Yahiaoui
, Nadia Nouali-Taboudjemat, Hamamache Kheddouci:
A Survey on Distributed Graph Pattern Matching in Massive Graphs. 36:1-36:35 - Zhengwei Wang

, Qi She, Tomás E. Ward:
Generative Adversarial Networks in Computer Vision: A Survey and Taxonomy. 37:1-37:38 - Guansong Pang

, Chunhua Shen, Longbing Cao
, Anton van den Hengel:
Deep Learning for Anomaly Detection: A Review. 38:1-38:38 - Sheng Wang

, Zhifeng Bao
, J. Shane Culpepper
, Gao Cong:
A Survey on Trajectory Data Management, Analytics, and Learning. 39:1-39:36 - Christian Meurisch, Max Mühlhäuser:

Data Protection in AI Services: A Survey. 40:1-40:38 - Dhivya Chandrasekaran, Vijay Mago

:
Evolution of Semantic Similarity - A Survey. 41:1-41:37 - Xiaoxue Chen, Lianwen Jin, Yuanzhi Zhu, Canjie Luo, Tianwei Wang:

Text Recognition in the Wild: A Survey. 42:1-42:35 - Suha Al-Thanyyan, Aqil M. Azmi

:
Automated Text Simplification: A Survey. 43:1-43:36 - Huawei Huang, Wei Kong, Sicong Zhou, Zibin Zheng

, Song Guo:
A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools. 44:1-44:42 - Sameen Maruf, Fahimeh Saleh, Gholamreza Haffari:

A Survey on Document-level Neural Machine Translation: Methods and Evaluation. 45:1-45:36 - Arlino Magalhães, José Maria Monteiro, Angelo Brayner:

Main Memory Database Recovery: A Survey. 46:1-46:36
Volume 54, Number 3, April 2022
- Mohammed Hassanin, Salman H. Khan, Murat Tahtali

:
Visual Affordance and Function Understanding: A Survey. 47:1-47:35 - Matteo Magnani, Obaida Hanteer, Roberto Interdonato, Luca Rossi, Andrea Tagarelli:

Community Detection in Multiplex Networks. 48:1-48:35 - Clayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro:

Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications. 49:1-49:38 - Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:

Machine Learning for Detecting Data Exfiltration: A Review. 50:1-50:47 - Irfan Ul Haq, Juan Caballero:

A Survey of Binary Code Similarity. 51:1-51:38 - Shyamali Mitra, Nibaran Das, Soumyajyoti Dey

, Sukanta Chakraborty, Mita Nasipuri, Mrinal Kanti Naskar:
Cytology Image Analysis Techniques Toward Automation: Systematically Revisited. 52:1-52:41 - Ilona Bluemke

, Agnieszka Malanowska
:
Software Testing Effort Estimation and Related Problems: A Systematic Literature Review. 53:1-53:38 - Wenjie Xiong

, Jakub Szefer:
Survey of Transient Execution Attacks and Their Mitigations. 54:1-54:36 - Liping Zhao, Waad Alhoshan, Alessio Ferrari

, Keletso J. Letsholo
, Muideen A. Ajagbe
, Erol-Valeriu Chioasca, Riza Theresa Batista-Navarro
:
Natural Language Processing for Requirements Engineering: A Systematic Mapping Study. 55:1-55:41 - Ane Blázquez-García

, Angel Conde, Usue Mori
, José Antonio Lozano:
A Review on Outlier/Anomaly Detection in Time Series Data. 56:1-56:33 - Syed Wasif Abbas Hamdani

, Haider Abbas
, Abdul Rehman Janjua, Waleed Bin Shahid, Muhammad Faisal Amjad, Jahanzaib Malik
, Malik Hamza Murtaza
, Mohammed Atiquzzaman
, Abdul Waheed Khan
:
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons. 57:1-57:36 - Xi Li, Zehua Wang, Victor C. M. Leung, Hong Ji, Yiming Liu, Heli Zhang:

Blockchain-empowered Data-driven Networks: A Survey and Outlook. 58:1-58:38 - Petr Spelda

, Vit Stritecky
:
Human Induction in Machine Learning: A Survey of the Nexus. 59:1-59:18 - Jun Huang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Min Luo, Kim-Kwang Raymond Choo

:
The Application of the Blockchain Technology in Voting Systems: A Review. 60:1-60:28 - Boubakr Nour, Hakima Khelifi, Rasheed Hussain

, Spyridon Mastorakis, Hassine Moungla:
Access Control Mechanisms in Named Data Networks: A Comprehensive Survey. 61:1-61:35 - Shervin Minaee, Nal Kalchbrenner, Erik Cambria

, Narjes Nikzad
, Meysam Chenaghlu, Jianfeng Gao:
Deep Learning-based Text Classification: A Comprehensive Review. 62:1-62:40 - Divya Saxena

, Jiannong Cao:
Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions. 63:1-63:42 - Zhabiz Gharibshah, Xingquan Zhu:

User Response Prediction in Online Advertising. 64:1-64:43 - Gilberto Astolfi

, Fábio Prestes Cesar Rezende
, João Vitor de Andrade Porto
, Edson Takashi Matsubara
, Hemerson Pistori
:
Syntactic Pattern Recognition in Computer Vision: A Systematic Review. 65:1-65:35 - Blesson Varghese

, Nan Wang, David Bermbach, Cheol-Ho Hong
, Eyal de Lara, Weisong Shi, Christopher Stewart
:
A Survey on Edge Performance Benchmarking. 66:1-66:33 - Danilo Avola, Luigi Cinque, Alessio Fagioli

, Gian Luca Foresti, Alessio Mecca
:
Ultrasound Medical Imaging Techniques: A Survey. 67:1-67:38 - Khan Muhammad

, Mohammad S. Obaidat, Tanveer Hussain
, Javier Del Ser, Neeraj Kumar
, Muhammad Tanveer
, Faiyaz Doctor:
Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions. 68:1-68:33 - Ahmed Alharbi

, Hai Dong
, Xun Yi, Zahir Tari, Ibrahim Khalil
:
Social Media Identity Deception Detection: A Survey. 69:1-69:35
Volume 54, Number 4, May 2022
- Felipe L. Gewers

, Gustavo R. Ferreira
, Henrique Ferraz de Arruda
, Filipi Nascimento Silva, Cesar H. Comin
, Diego R. Amancio, Luciano da Fontoura Costa:
Principal Component Analysis: A Natural Approach to Data Exploration. 70:1-70:34 - Aidan Hogan

, Eva Blomqvist, Michael Cochez, Claudia d'Amato, Gerard de Melo, Claudio Gutierrez
, Sabrina Kirrane
, José Emilio Labra Gayo, Roberto Navigli
, Sebastian Neumaier
, Axel-Cyrille Ngonga Ngomo
, Axel Polleres, Sabbir M. Rashid, Anisa Rula, Lukas Schmelzeisen, Juan F. Sequeda, Steffen Staab
, Antoine Zimmermann:
Knowledge Graphs. 71:1-71:37 - Wen-Huang Cheng, Sijie Song, Chieh-Yun Chen

, Shintami Chusnul Hidayati, Jiaying Liu
:
Fashion Meets Computer Vision: A Survey. 72:1-72:41 - Rob Dunne

, Tim Morris
, Simon Harper
:
A Survey of Ambient Intelligence. 73:1-73:27 - Hussain Mohammed Dipu Kabir

, Abbas Khosravi
, Subrota Kumar Mondal, Mustaneer Rahman
, Saeid Nahavandi, Rajkumar Buyya:
Uncertainty-aware Decisions in Cloud Computing: Foundations and Future Directions. 74:1-74:30 - Fei Chen, Duming Luo, Tao Xiang

, Ping Chen, Junfeng Fan, Hong Linh Truong
:
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications. 75:1-75:36 - Pengzhen Ren

, Yun Xiao, Xiaojun Chang, Poyao Huang, Zhihui Li, Xiaojiang Chen, Xin Wang:
A Comprehensive Survey of Neural Architecture Search: Challenges and Solutions. 76:1-76:34 - Kaixuan Chen

, Dalin Zhang
, Lina Yao, Bin Guo, Zhiwen Yu, Yunhao Liu:
Deep Learning for Sensor-based Human Activity Recognition: Overview, Challenges, and Opportunities. 77:1-77:40 - Daniel Russo

, Klaas-Jan Stol
:
PLS-SEM for Software Engineering Research: An Introduction and Survey. 78:1-78:38 - Abdus Salam

, Rolf Schwitter
, Mehmet A. Orgun
:
Probabilistic Rule Learning Systems: A Survey. 79:1-79:16 - Elena Almaraz Luengo, Luis Javier García-Villalba:

Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes. 80:1-80:34 - Katie Seaborn

, Norihisa P. Miyake, Peter Pennefather, Mihoko Otake-Matsuura
:
Voice in Human-Agent Interaction: A Survey. 81:1-81:43 - Oliver Michel

, Roberto Bifulco, Gábor Rétvári, Stefan Schmid
:
The Programmable Data Plane: Abstractions, Architectures, Algorithms, and Applications. 82:1-82:36 - Wei Hu

, Armaiti Ardeshiricham, Ryan Kastner
:
Hardware Information Flow Tracking. 83:1-83:39 - Azzedine Boukerche

, Xiren Ma
:
Vision-based Autonomous Vehicle Recognition: A New Challenge for Deep Learning-based Systems. 84:1-84:37 - Bekir Afsar

, Kaisa Miettinen
, Francisco Ruiz
:
Assessing the Performance of Interactive Multiobjective Optimization Methods: A Survey. 85:1-85:27 - Nikhil Tripathi, Neminath Hubballi:

Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey. 86:1-86:33 - Yunbo Tang, Dan Chen, Xiaoli Li:

Dimensionality Reduction Methods for Brain Imaging Data Analysis. 87:1-87:36 - Matteo Ridolfi

, Abdil Kaya
, Rafael Berkvens
, Maarten Weyn
, Wout Joseph, Eli De Poorter:
Self-calibration and Collaborative Localization for UWB Positioning Systems: A Survey and Future Research Directions. 88:1-88:27 - Nuno Laranjeiro

, João Agnelo
, Jorge Bernardino
:
A Systematic Review on Software Robustness Assessment. 89:1-89:65 - Boyuan Chen, Zhen Ming (Jack) Jiang:

A Survey of Software Log Instrumentation. 90:1-90:34 - Varsha S. Lalapura

, Joseph Amudha, Hariramn Selvamuruga Satheesh:
Recurrent Neural Networks for Edge Intelligence: A Survey. 91:1-91:38
Volume 54, Number 5, June 2022
- Antonia Bertolino, Pietro Braione

, Guglielmo De Angelis
, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Mauro Pezzè
, Roberto Pietrantuono
, Stefano Russo
, Paolo Tonella:
A Survey of Field-based Testing Techniques. 92:1-92:39 - Jean-Michel Bruel, Sophie Ebersold

, Florian Galinier, Manuel Mazzara, Alexandr Naumchev
, Bertrand Meyer:
The Role of Formalism in System Requirements. 93:1-93:36 - Liang Zhao

:
Event Prediction in the Big Data Era: A Systematic Survey. 94:1-94:37 - Sin Kit Lo

, Qinghua Lu
, Chen Wang
, Hye-Young Paik
, Liming Zhu:
A Systematic Literature Review on Federated Machine Learning: From a Software Engineering Perspective. 95:1-95:39 - Abdulaziz Alashaikh, Eisa Alanazi

, Ala I. Al-Fuqaha
:
A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers. 96:1-96:39 - Xing Huang

, Tsung-Yi Ho
, Wenzhong Guo, Bing Li, Krishnendu Chakrabarty
, Ulf Schlichtmann:
Computer-aided Design Techniques for Flow-based Microfluidic Lab-on-a-chip Systems. 97:1-97:29 - Jana Dunfield

, Neel Krishnaswami
:
Bidirectional Typing. 98:1-98:38 - Mohanad Abukmeil, Stefano Ferrari, Angelo Genovese

, Vincenzo Piuri, Fabio Scotti
:
A Survey of Unsupervised Generative Models for Exploratory Data Analysis and Representation Learning. 99:1-99:40 - Adilla Susungi

, Claude Tadonki:
Intermediate Representations for Explicitly Parallel Programs. 100:1-100:24 - Subodha Charles

, Prabhat Mishra
:
A Survey of Network-on-Chip Security Attacks and Countermeasures. 101:1-101:36 - Atheer Aljeraisy

, Masoud Barati, Omer F. Rana
, Charith Perera:
Privacy Laws and Privacy by Design Schemes for the Internet of Things: A Developer's Perspective. 102:1-102:38 - Arwa Al-Hussain, Aqil M. Azmi

:
Automatic Story Generation: A Survey of Approaches. 103:1-103:38 - Marie Al-Ghossein

, Talel Abdessalem, Anthony Barré:
A Survey on Stream-Based Recommender Systems. 104:1-104:36 - Dietmar Jannach

, Ahtsham Manzoor
, Wanling Cai, Li Chen:
A Survey on Conversational Recommender Systems. 105:1-105:36 - Yuan Luo

, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. 106:1-106:36 - Maya Dotan

, Yvonne-Anne Pignolet, Stefan Schmid
, Saar Tochner
, Aviv Zohar:
Survey on Blockchain Networking: Context, State-of-the-Art, Challenges. 107:1-107:34 - Ishai Rosenberg

, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. 108:1-108:36 - Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan

, Chai Quek
:
Hierarchical Reinforcement Learning: A Comprehensive Survey. 109:1-109:35 - Vimal Kumar Dwivedi

, Vishwajeet Pattanaik
, Vipin Deval
, Abhishek Dixit
, Alex Norta, Dirk Draheim:
Legally Enforceable Smart-Contract Languages: A Systematic Literature Review. 110:1-110:34 - Rob Ashmore, Radu Calinescu, Colin Paterson

:
Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges. 111:1-111:39
Volume 54, Number 6, July 2022
- Peter Kietzmann, Thomas C. Schmidt

, Matthias Wählisch
:
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT. 112:1-112:38 - Eman Badr

:
Images in Space and Time: Real Big Data in Healthcare. 113:1-113:38 - Swati Jaiswal

, Uday P. Khedker, Alan Mycroft:
A Unified Model for Context-Sensitive Program Analyses: : The Blind Men and the Elephant. 114:1-114:37 - Ninareh Mehrabi, Fred Morstatter

, Nripsuta Saxena, Kristina Lerman, Aram Galstyan:
A Survey on Bias and Fairness in Machine Learning. 115:1-115:35 - Harley Vera Olivera

, Guo RuiZhe, Ruben Cruz Huacarpuma, Ana Paula Bernardi da Silva, Ari Melo Mariano
, Maristela Holanda:
Data Modeling and NoSQL Databases - A Systematic Mapping Review. 116:1-116:26 - Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:

A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. 117:1-117:36 - Ratnabali Pal

, Arif Ahmed Sekh
, Debi Prosad Dogra, Samarjit Kar, Partha Pratim Roy, Dilip K. Prasad:
Topic-based Video Analysis: A Survey. 118:1-118:34 - Andreia P. Guerreiro, Carlos M. Fonseca, Luís Paquete

:
The Hypervolume Indicator: Computational Problems and Algorithms. 119:1-119:42 - Yuta Itoh

, Tobias Langlotz
, Jonathan Sutton
, Alexander Plopski:
Towards Indistinguishable Augmented Reality: A Survey on Optical See-through Head-mounted Displays. 120:1-120:36 - Bilal Rauf, Haider Abbas

, Muhammad Usman, Tanveer A. Zia
, Waseem Iqbal
, Yawar Abbas Bangash, Hammad Afzal
:
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks. 121:1-121:36 - Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang:

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography. 122:1-122:37 - Eva Papadogiannaki, Sotiris Ioannidis:

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. 123:1-123:35 - Thi Tuyet Hai Nguyen

, Adam Jatowt
, Mickaël Coustaty, Antoine Doucet:
Survey of Post-OCR Processing Approaches. 124:1-124:37 - Panagiotis Oikonomou, Anna Karanika

, Christos Anagnostopoulos, Kostas Kolomvatsos
:
On the Use of Intelligent Models towards Meeting the Challenges of the Edge Mesh. 125:1-125:42 - Shufan Fei

, Zheng Yan, Wenxiu Ding
, Haomeng Xie:
Security Vulnerabilities of SGX and Countermeasures: A Survey. 126:1-126:36 - Sindhu Padakandla:

A Survey of Reinforcement Learning Algorithms for Dynamically Varying Environments. 127:1-127:25 - Pádraig Cunningham

, Sarah Jane Delany
:
k-Nearest Neighbour Classifiers - A Tutorial. 128:1-128:25 - El-Ghazali Talbi

:
Machine Learning into Metaheuristics: A Survey and Taxonomy. 129:1-129:32 - Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, Michael R. Lyu:

A Survey on Automated Log Analysis for Reliability Engineering. 130:1-130:37 - Xuefei Yin

, Yanming Zhu
, Jiankun Hu
:
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions. 131:1-131:36 - Zhipeng Cai

, Zuobin Xiong
, Honghui Xu, Peng Wang, Wei Li, Yi Pan:
Generative Adversarial Networks: A Survey Toward Private and Secure Applications. 132:1-132:38 - Azzedine Boukerche

, Mingzhi Sha
:
Design Guidelines on Deep Learning-based Pedestrian Detection Methods for Supporting Autonomous Vehicles. 133:1-133:36
- Thomas Plötz:

Applying Machine Learning for Sensor Data Analysis in Interactive Systems: Common Pitfalls of Pragmatic Use and Ways to Avoid Them. 134:1-134:25
Volume 54, Number 7, September 2022
- Ankur Lohachab, Saurabh Garg

, Byeong Kang, Muhammad Bilal Amin
, Junmin Lee, Shiping Chen
, Xiwei Xu
:
Towards Interconnected Blockchains: A Comprehensive Review of the Role of Interoperability among Disparate Blockchains. 135:1-135:39 - Lefeng Zhang

, Tianqing Zhu, Ping Xiong, Wanlei Zhou
, Philip S. Yu:
More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design. 136:1-136:37 - Michael Braun, Florian Weber, Florian Alt

:
Affective Automotive User Interfaces-Reviewing the State of Driver Affect Research and Emotion Regulation in the Car. 137:1-137:26 - Sophie Dramé-Maigné, Maryline Laurent

, Laurent Castillo, Hervé Ganem:
Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT. 138:1-138:34 - Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang

:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. 139:1-139:36 - Luciano Ignaczak

, Guilherme Goldschmidt, Cristiano André da Costa, Rodrigo da Rosa Righi:
Text Mining in Cybersecurity: A Systematic Literature Review. 140:1-140:36 - Tharindu Fernando

, Harshala Gammulle
, Simon Denman, Sridha Sridharan
, Clinton Fookes:
Deep Learning for Medical Anomaly Detection - A Survey. 141:1-141:37 - Salonik Resch, Ulya R. Karpuzcu:

Benchmarking Quantum Computers and the Impact of Quantum Noise. 142:1-142:35 - Hugo Brito Lima, Carlos Gustavo Resque dos Santos, Bianchi Serique Meiguins:

A Survey of Music Visualization Techniques. 143:1-143:29 - Yohan Bonescki Gumiel, Lucas Emanuel Silva e Oliveira

, Vincent Claveau, Natalia Grabar, Emerson Cabrera Paraiso, Claudia Maria Cabral Moro Barra, Deborah Ribeiro Carvalho:
Temporal Relation Extraction in Clinical Texts: A Systematic Review. 144:1-144:36 - Uttam Chauhan

, Apurva Shah
:
Topic Modeling Using Latent Dirichlet allocation: A Survey. 145:1-145:35 - Lynda Tamine, Lorraine Goeuriot:

Semantic Information Retrieval on Medical Texts: Research Challenges, Survey, and Open Issues. 146:1-146:38 - Christian Berger

, Philipp Eichhammer, Hans P. Reiser, Jörg Domaschka, Franz J. Hauck, Gerhard Habiger:
A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms. 147:1-147:39 - Palina Tolmach

, Yi Li, Shangwei Lin, Yang Liu, Zengxiang Li:
A Survey of Smart Contract Formal Specification and Verification. 148:1-148:38 - Jihyeok Park

, Hongki Lee, Sukyoung Ryu
:
A Survey of Parametric Static Analysis. 149:1-149:37 - Douglas Paulo de Mattos

, Débora C. Muchaluat-Saade, Gheorghita Ghinea:
Beyond Multimedia Authoring: On the Need for Mulsemedia Authoring Tools. 150:1-150:31 - Jie Zhang, Zhihao Qu, Chenxi Chen, Haozhao Wang, Yufeng Zhan, Baoliu Ye, Song Guo:

Edge Learning: The Enabling Technology for Distributed Big Data Analytics in the Edge. 151:1-151:36 - Alexandro Baldassin

, João Barreto
, Daniel Castro
, Paolo Romano
:
Persistent Memory: A Survey of Programming Support and Implementations. 152:1-152:37 - Julio Juárez

, Cipriano (Pano) Santos, Carlos A. Brizuela:
A Comprehensive Review and a Taxonomy Proposal of Team Formation Problems. 153:1-153:33 - Shoujin Wang

, Longbing Cao
, Yan Wang
, Quan Z. Sheng
, Mehmet A. Orgun
, Defu Lian
:
A Survey on Session-based Recommender Systems. 154:1-154:38 - Nathan Magrofuoco, Paolo Roselli

, Jean Vanderdonckt:
Two-dimensional Stroke Gesture Recognition: A Survey. 155:1-155:36 - Djalel Chefrour

:
One-Way Delay Measurement From Traditional Networks to SDN: A Survey. 156:1-156:35
Volume 54, Number 8, November 2022
- Abdul Jabbar, Xi Li, Bourahla Omar:

A Survey on Generative Adversarial Networks: Variants, Applications, and Training. 157:1-157:49 - Jianguo Chen, Kenli Li, Zhaolei Zhang, Keqin Li, Philip S. Yu:

A Survey on Applications of Artificial Intelligence in Fighting Against COVID-19. 158:1-158:32 - Xingwei Zhang, Xiaolong Zheng, Wenji Mao

:
Adversarial Perturbation Defense on Deep Neural Networks. 159:1-159:36 - Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar

, Huaqun Wang, Kim-Kwang Raymond Choo
:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. 160:1-160:36 - Akbar Telikani

, Amirhessam Tahmassebi, Wolfgang Banzhaf, Amir H. Gandomi
:
Evolutionary Machine Learning: A Survey. 161:1-161:35 - Weijia Zhang

, Jiuyong Li
, Lin Liu
:
A Unified Survey of Treatment Effect Heterogeneity Modelling and Uplift Modelling. 162:1-162:36 - Vinicius Costa de Souza

, Anderson Maciel
, Luciana Porcher Nedel
, Regis Kopper:
Measuring Presence in Virtual Environments: A Survey. 163:1-163:37 - Gopika Ajaykumar, Maureen Steele, Chien-Ming Huang:

A Survey on End-User Robot Programming. 164:1-164:36 - Lik-Hang Lee

, Tristan Braud, Simo Hosio
, Pan Hui:
Towards Augmented Reality Driven Human-City Interaction: Current Research on Mobile Headsets and Future Challenges. 165:1-165:38 - Satyaki Roy, Preetam Ghosh

, Nirnay Ghosh, Sajal K. Das:
Transcriptional Regulatory Network Topology with Applications to Bio-inspired Networking: A Survey. 166:1-166:36 - Haiman Tian, Maria E. Presa Reyes, Yudong Tao, Tianyi Wang, Samira Pouyanfar, Miguel Alonso, Steven Luis

, Mei-Ling Shyu, Shu-Ching Chen, Sundaraja Sitharama Iyengar
:
Data Analytics for Air Travel Data: A Survey and New Perspectives. 167:1-167:35 - Rafael Belchior, André Vasconcelos

, Sérgio Guerreiro
, Miguel Correia
:
A Survey on Blockchain Interoperability: Past, Present, and Future Trends. 168:1-168:41 - Royson Lee

, Stylianos I. Venieris, Nicholas D. Lane:
Deep Neural Network-based Enhancement for Image and Video Streaming Systems: A Survey and Future Directions. 169:1-169:30 - M. G. Sarwar Murshed

, Christopher Murphy, Daqing Hou, Nazar Khan
, Ganesh Ananthanarayanan, Faraz Hussain
:
Machine Learning at the Network Edge: A Survey. 170:1-170:37 - Maxime Lamothe, Yann-Gaël Guéhéneuc, Weiyi Shang:

A Systematic Review of API Evolution Literature. 171:1-171:36 - Jessica McBroom

, Irena Koprinska
, Kalina Yacef
:
A Survey of Automated Programming Hint Generation: The HINTS Framework. 172:1-172:27 - Giuseppe Desolda, Lauren S. Ferro

, Andrea Marrella
, Tiziana Catarci
, Maria Francesca Costabile:
Human Factors in Phishing Attacks: A Systematic Literature Review. 173:1-173:35 - Ye Tian, Langchun Si, Xingyi Zhang, Ran Cheng

, Cheng He
, Kay Chen Tan
, Yaochu Jin
:
Evolutionary Large-Scale Multi-Objective Optimization: A Survey. 174:1-174:34 - Shubhra Kanti Karmaker Santu

, Md. Mahadi Hassan, Micah J. Smith, Lei Xu, Chengxiang Zhai, Kalyan Veeramachaneni:
AutoML to Date and Beyond: Challenges and Opportunities. 175:1-175:36 - Alexandre H. T. Dias, Luiz Henrique A. Correia, Neumar Malheiros

:
A Systematic Literature Review on Virtual Machine Consolidation. 176:1-176:38 - Fuqiang Gu

, Mu-Huan Chung, Mark H. Chignell, Shahrokh Valaee, Baoding Zhou, Xue Liu:
A Survey on Deep Learning for Human Activity Recognition. 177:1-177:34
Volume 54, Number 9, December 2022
- Konstantinos Arakadakis, Pavlos Charalampidis

, Antonis Makrogiannakis, Alexandros G. Fragkiadakis:
Firmware Over-the-air Programming Techniques for IoT Networks - A Survey. 178:1-178:36 - Lázaro Bustio-Martínez

, René Cumplido, Martín Letras
, Raudel Hernández-León, Claudia Feregrino Uribe, José Hernández Palancar:
FPGA/GPU-based Acceleration for Frequent Itemsets Mining: A Comprehensive Review. 179:1-179:35 - Pengzhen Ren, Yun Xiao, Xiaojun Chang, Po-Yao Huang, Zhihui Li, Brij B. Gupta

, Xiaojiang Chen, Xin Wang:
A Survey of Deep Active Learning. 180:1-180:40 - Efstratios Kakaletsis

, Charalampos Symeonidis, Maria Tzelepi, Ioannis Mademlis
, Anastasios Tefas
, Nikos Nikolaidis
, Ioannis Pitas:
Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example. 181:1-181:37 - Dylan Chou, Meng Jiang:

A Survey on Data-driven Network Intrusion Detection. 182:1-182:36 - Lingxi Xie, Xin Chen, Kaifeng Bi, Longhui Wei, Yuhui Xu, Lanfei Wang, Zhengsu Chen, An Xiao, Jianlong Chang, Xiaopeng Zhang, Qi Tian:

Weight-Sharing Neural Architecture Search: A Battle to Shrink the Optimization Gap. 183:1-183:37 - Carlos Bermejo, Pan Hui:

A Survey on Haptic Technologies for Mobile Augmented Reality. 184:1-184:35 - Ismaeel Al Ridhawi, Ouns Bouachir, Moayad Aloqaily

, Azzedine Boukerche:
Design Guidelines for Cooperative UAV-supported Services and Applications. 185:1-185:35 - Pasika Ranaweera

, Anca Jurcut
, Madhusanka Liyanage
:
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. 186:1-186:37 - Xiongkuo Min

, Ke Gu, Guangtao Zhai
, Xiaokang Yang, Wenjun Zhang, Patrick Le Callet, Chang Wen Chen
:
Screen Content Quality Assessment: Overview, Benchmark, and Beyond. 187:1-187:36 - Frank Siqueira

, Joseph G. Davis
:
Service Computing for Industry 4.0: State of the Art, Challenges, and Research Opportunities. 188:1-188:38 - Denise Maria Vecino Sato

, Sheila Cristiana De Freitas, Jean Paul Barddal, Edson Emílio Scalabrin:
A Survey on Concept Drift in Process Mining. 189:1-189:38 - Bing Zhang

, Jingyue Li
, Jiadong Ren, Guoyan Huang:
Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review. 190:1-190:35 - Sergi Abadal, Akshay Jain

, Robert Guirado
, Jorge López-Alonso, Eduard Alarcón:
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators. 191:1-191:38 - Meriem Guerar

, Luca Verderame, Mauro Migliardi
, Francesco Palmieri, Alessio Merlo:
Gotta CAPTCHA 'Em All: A Survey of 20 Years of the Human-or-computer Dilemma. 192:1-192:33 - José Mena, Oriol Pujol, Jordi Vitrià:

A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective. 193:1-193:35 - Josef Schmid, Alfred Höß, Björn W. Schuller

:
A Survey on Client Throughput Prediction Algorithms in Wired and Wireless Networks. 194:1-194:33 - Asma Aloufi

, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey. 195:1-195:37 - Chao Liu, Xin Xia, David Lo

, Cuiyun Gao, Xiaohu Yang, John C. Grundy:
Opportunities and Challenges in Code Search Tools. 196:1-196:40 - Timothy R. McIntosh

, A. S. M. Kayes
, Yi-Ping Phoebe Chen
, Alex Ng
, Paul A. Watters
:
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions. 197:1-197:36 - René Mayrhofer, Stephan Sigg:

Adversary Models for Mobile Device Authentication. 198:1-198:35 - Gábor E. Gévay, Juan Soto

, Volker Markl:
Handling Iterations in Distributed Dataflow Systems. 199:1-199:38
Volume 54, Number 10s, January 2022
- Salman H. Khan

, Muzammal Naseer
, Munawar Hayat
, Syed Waqas Zamir
, Fahad Shahbaz Khan
, Mubarak Shah
:
Transformers in Vision: A Survey. 200:1-200:41 - Géraldin Nanfack

, Paul Temple
, Benoît Frénay
:
Constraint Enforcement on Decision Trees: A Survey. 201:1-201:36 - Nhu-Ngoc Dao

, Anh-Tien Tran, Ngo Hoang Tu
, Tran Thien Thanh
, Vo Nguyen Quoc Bao
, Sungrae Cho
:
A Contemporary Survey on Live Video Streaming from a Computation-Driven Perspective. 202:1-202:38 - Pablo Messina

, Pablo Pino, Denis Parra, Alvaro Soto, Cecilia Besa, Sergio Uribe, Marcelo E. Andia, Cristian Tejos, Claudia Prieto, Daniel Capurro:
A Survey on Deep Learning and Explainability for Automatic Report Generation from Medical Images. 203:1-203:40 - Ross Gruetzemacher

, David B. Paradice
:
Deep Transfer Learning & Beyond: Transformer Language Models in Information Systems Research. 204:1-204:35 - Isaac Ronald Ward

, Jack Joyner
, Casey Lickfold
, Yulan Guo
, Mohammed Bennamoun
:
A Practical Tutorial on Graph Neural Networks. 205:1-205:35 - Yanming Yang

, Xin Xia
, David Lo
, John C. Grundy
:
A Survey on Deep Learning for Software Engineering. 206:1-206:73 - Ying Zhao

, Jinjun Chen
:
A Survey on Differential Privacy for Unstructured Data Content. 207:1-207:28 - Aayush Bansal

, Rewa Sharma, Mamta Kathuria
:
A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications. 208:1-208:29 - Xin Wang

, Sisi Duan
, James R. Clavin
, Haibin Zhang
:
BFT in Blockchains: From Protocols to Use Cases. 209:1-209:37 - Torsten Schlett

, Christian Rathgeb, Olaf Henniger
, Javier Galbally, Julian Fiérrez, Christoph Busch:
Face Image Quality Assessment: A Literature Survey. 210:1-210:49 - Vijay Kumar Yadav

, Nitish Andola
, Shekhar Verma
, S. Venkatesan
:
A Survey of Oblivious Transfer Protocol. 211:1-211:37 - Hang Du

, Hailin Shi
, Dan Zeng
, Xiao-Ping Zhang
, Tao Mei
:
The Elements of End-to-end Deep Face Recognition: A Survey of Recent Advances. 212:1-212:42 - Claudio Filipi Goncalves dos Santos

, João Paulo Papa
:
Avoiding Overfitting: A Survey on Regularization Methods for Convolutional Neural Networks. 213:1-213:25 - Misael Costa Júnior

, Domenico Amalfitano
, Lina Garcés
, Anna Rita Fasolino
, Stevão Alves de Andrade
, Márcio Eduardo Delamaro
:
Dynamic Testing Techniques of Non-functional Requirements in Mobile Apps: A Systematic Mapping Study. 214:1-214:38 - Rob Churchill

, Lisa Singh:
The Evolution of Topic Modeling. 215:1-215:35 - Daniel Martin

, Sandra Malpica
, Diego Gutierrez
, Belén Masiá, Ana Serrano:
Multimodality in VR: A Survey. 216:1-216:36 - Zhiheng Zhong

, Minxian Xu
, Maria Alejandra Rodriguez
, Cheng-Zhong Xu
, Rajkumar Buyya
:
Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions. 217:1-217:35 - Farkhanda Zafar, Hasan Ali Khattak

, Moayad Aloqaily
, Rasheed Hussain
:
Carpooling in Connected and Autonomous Vehicles: Current Solutions and Future Directions. 218:1-218:36 - Md. Mahbub Alam

, Luís Torgo, Albert Bifet
:
A Survey on Spatio-temporal Data Analytics Systems. 219:1-219:38 - Zijun Li

, Linsong Guo
, Jiagan Cheng
, Quan Chen
, Bingsheng He, Minyi Guo:
The Serverless Computing Survey: A Technical Primer for Design Architecture. 220:1-220:34 - Peng Liu

, Lizhe Wang, Rajiv Ranjan, Guojin He, Lei Zhao:
A Survey on Active Deep Learning: From Model Driven to Data Driven. 221:1-221:34
Volume 54, Number 11s, January 2022
- Anupama Mampage

, Shanika Karunasekera
, Rajkumar Buyya
:
A Holistic View on Resource Management in Serverless Computing Environments: Taxonomy and Future Directions. 222:1-222:36 - Pablo Sánchez

, Alejandro Bellogín
:
Point-of-Interest Recommender Systems Based on Location-Based Social Networks: A Survey from an Experimental Perspective. 223:1-223:37 - Paula Delgado-Santos

, Giuseppe Stragapede, Ruben Tolosana
, Richard M. Guest, Farzin Deravi, Rubén Vera-Rodríguez:
A Survey of Privacy Vulnerabilities of Mobile Device Sensors. 224:1-224:30 - Hasini Witharana

, Yangdi Lyu
, Subodha Charles
, Prabhat Mishra
:
A Survey on Assertion-based Hardware Verification. 225:1-225:33 - Fabian Fagerholm

, Michael Felderer
, Davide Fucci, Michael Unterkalmsteiner, Bogdan Marculescu, Markus Martini, Lars Göran Wallgren Tengberg, Robert Feldt, Bettina Lehtelä, Balázs Nagyváradi
, Jehan Khattak:
Cognition in Software Engineering: A Taxonomy and Survey of a Half-Century of Research. 226:1-226:36 - Wenhao Yu, Chenguang Zhu, Zaitang Li, Zhiting Hu, Qingyun Wang, Heng Ji, Meng Jiang:

A Survey of Knowledge-enhanced Text Generation. 227:1-227:38 - Harindu Korala

, Dimitrios Georgakopoulos
, Prem Prakash Jayaraman
, Ali Yavari
:
A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications. 228:1-228:36 - Hakan Kayan

, Matthew Nunes, Omer F. Rana
, Pete Burnap, Charith Perera:
Cybersecurity of Industrial Cyber-Physical Systems: A Review. 229:1-229:35 - Xiaogang Zhu

, Sheng Wen
, Seyit Camtepe
, Yang Xiang
:
Fuzzing: A Survey for Roadmap. 230:1-230:36 - Jakub Zádník

, Markku J. Mäkitalo
, Jarno Vanne
, Pekka Jääskeläinen
:
Image and Video Coding Techniques for Ultra-low Latency. 231:1-231:35 - Anirudh Chandramouli

, Ashish Choudhury
, Arpita Patra:
A Survey on Perfectly Secure Verifiable Secret-sharing. 232:1-232:36 - Bushra Jamil

, Humaira Ijaz
, Mohammad Shojafar, Kashif Munir
, Rajkumar Buyya:
Resource Allocation and Task Scheduling in Fog Computing and Internet of Everything Environments: A Taxonomy, Review, and Future Directions. 233:1-233:38 - Ajay Mittal, Sabrina Dhalla, Savita Gupta, Aastha Gupta

:
Automated Analysis of Blood Smear Images for Leukemia Detection: A Comprehensive Review. 234:1-234:37 - Hongsheng Hu

, Zoran Salcic, Lichao Sun
, Gillian Dobbie, Philip S. Yu, Xuyun Zhang
:
Membership Inference Attacks on Machine Learning: A Survey. 235:1-235:37 - Rajeev Muralidhar

, Renata Borovica-Gajic
, Rajkumar Buyya:
Energy Efficient Computing Systems: Architectures, Abstractions and Modeling to Techniques and Standards. 236:1-236:37 - Valeria Cardellini

, Francesco Lo Presti
, Matteo Nardelli
, Gabriele Russo Russo
:
Runtime Adaptation of Data Stream Processing Systems: The State of the Art. 237:1-237:36 - Harun Oz

, Ahmet Aris
, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. 238:1-238:37 - Hossein Shafiei, Ahmad Khonsari, Payam Mousavi:

Serverless Computing: A Survey of Opportunities, Challenges, and Applications. 239:1-239:32 - Sabah Suhail

, Rasheed Hussain
, Raja Jurdak
, Alma Oracevic
, Khaled Salah, Choong Seon Hong, Raimundas Matulevicius:
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges. 240:1-240:34 - Matheus Alberto de Oliveira Ribeiro

, Fátima L. S. Nunes
:
Left Ventricle Segmentation in Cardiac MR: A Systematic Mapping of the Past Decade. 241:1-241:38 - Simone Antonelli

, Danilo Avola
, Luigi Cinque
, Donato Crisostomi
, Gian Luca Foresti
, Fabio Galasso
, Marco Raoul Marini
, Alessio Mecca
, Daniele Pannone
:
Few-Shot Object Detection: A Survey. 242:1-242:37 - Shengmei Liu, Xiaokun Xu, Mark Claypool

:
A Survey and Taxonomy of Latency Compensation Techniques for Network Computer Games. 243:1-243:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














