


default search action
ACM Computing Surveys, Volume 55
Volume 55, Number 1, January 2023
- Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. 1:1-1:35 - Kinza Sarwar, Sira Yongchareon, Jian Yu, Saeed Ur Rehman
:
A Survey on Privacy Preservation in Fog-Enabled Internet of Things. 2:1-2:39 - Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. 3:1-3:36 - Rodolfo Ipolito Meneguette, Robson E. De Grande
, Jo Ueyama
, Geraldo P. Rocha Filho
, Edmundo R. M. Madeira
:
Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges. 4:1-4:46 - Chao Yu, Jiming Liu, Shamim Nemati, Guosheng Yin:
Reinforcement Learning in Healthcare: A Survey. 5:1-5:36 - Fan Xu
, Victor S. Sheng, Mingwen Wang:
A Unified Perspective for Disinformation Detection and Truth Discovery in Social Sensing: A Survey. 6:1-6:33 - Massimiliano Luca
, Gianni Barlacchi, Bruno Lepri, Luca Pappalardo
:
A Survey on Deep Learning for Human Mobility. 7:1-7:44 - Gabriel Resende Machado, Eugênio Silva, Ronaldo Ribeiro Goldschmidt
:
Adversarial Machine Learning in Image Classification: A Survey Toward the Defender's Perspective. 8:1-8:38 - Abhishek Hazra
, Mainak Adhikari, Tarachand Amgoth, Satish Narayana Srirama:
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions. 9:1-9:35 - Claudio Daniel Tenorio de Barros, Matheus R. F. Mendonça, Alex Borges Vieira, Artur Ziviani:
A Survey on Embedding Dynamic Graphs. 10:1-10:37 - Viktor Rosenfeld
, Sebastian Breß, Volker Markl:
Query Processing on Heterogeneous CPU/GPU Systems. 11:1-11:38 - Giannis Bekoulis, Christina Papagiannopoulou, Nikos Deligiannis:
A Review on Fact Extraction and Verification. 12:1-12:35 - Junjun Jiang, Chenyang Wang, Xianming Liu, Jiayi Ma:
Deep Learning-based Face Super-resolution: A Survey. 13:1-13:36 - Wenbo Ge
, Pooia Lalbakhsh
, Leigh Isai, Artem Lenskiy
, Hanna Suominen
:
Neural Network-Based Financial Volatility Forecasting: A Systematic Review. 14:1-14:30 - Deqiang Li, Qianmu Li, Yanfang (Fanny) Ye, Shouhuai Xu:
Arms Race in Adversarial Malware Detection: A Survey. 15:1-15:35 - Roberto Amadini:
A Survey on String Constraint Solving. 16:1-16:38 - Christopher Brant, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall
, Daniela Oliveira:
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking. 17:1-17:33 - Alison Fernandez-Blanco
, Alexandre Bergel
, Juan Pablo Sandoval Alcocer
:
Software Visualizations to Analyze Memory Consumption: A Literature Review. 18:1-18:34 - Saed Alrabaee
, Mourad Debbabi
, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. 19:1-19:41 - Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, Keqin Li:
Artificial Intelligence Security: Threats and Countermeasures. 20:1-20:36 - Alessio Rugo, Claudio A. Ardagna
, Nabil El Ioini:
A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis. 21:1-21:35 - Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. 22:1-22:51 - Thanh Tuan Nguyen, Thanh Phuong Nguyen:
A Comprehensive Taxonomy of Dynamic Texture Representation. 23:1-23:39
Volume 55, Number 2, March 2023
- Federico Ciccozzi
, Lorenzo Addazi, Sara Abbaspour Asadollah, Björn Lisper, Abu Naser Masud
, Saad Mubeen:
A Comprehensive Exploration of Languages for Parallel Computing. 24:1-24:39 - Zhao-Rong Lai
, Haisheng Yang:
A Survey on Gaps between Mean-Variance Approach and Exponential Growth Rate Approach for Portfolio Optimization. 25:1-25:36 - Ananya B. Sai
, Akash Kumar Mohankumar, Mitesh M. Khapra:
A Survey of Evaluation Metrics Used for NLG Systems. 26:1-26:39 - Manzoor Ahmed Khan
, Hesham El-Sayed, Sumbal Malik
, Muhammad Talha Zia, Muhammad Jalal Khan, Najla Alkaabi, Henry Alexander Ignatious:
Level-5 Autonomous Driving - Are We There Yet? A Review of Research Literature. 27:1-27:38 - Oluwamayowa Ade Adeleke, Nicholas Bastin, Deniz Gurkan
:
Network Traffic Generation: A Survey and Methodology. 28:1-28:23 - Breno G. S. Costa, João Bachiega Jr., Leonardo Rebouças de Carvalho
, Aletéia P. F. Araújo
:
Orchestration in Fog Computing: A Comprehensive Survey. 29:1-29:34 - Nuha Aldausari
, Arcot Sowmya, Nadine Marcus, Gelareh Mohammadi:
Video Generative Adversarial Networks: A Review. 30:1-30:25 - Libing Deng
, Guoqi Xie, Hong Liu, Yunbo Han, Renfa Li, Keqin Li:
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN. 31:1-31:36 - Omar Hasan
, Lionel Brunie, Elisa Bertino:
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. 32:1-32:37 - Tabinda Sarwar
, Sattar Seifollahi, Jeffrey Chan
, Xiuzhen Zhang, Vural Aksakalli, Irene Lena Hudson, Karin Verspoor, Lawrence Cavedon
:
The Secondary Use of Electronic Health Records for Data Mining: Data Characteristics and Challenges. 33:1-33:40 - Claudio Filipi Gonçalves dos Santos, Diego de Souza Oliveira, Leandro A. Passos
, Rafael Gonçalves Pires
, Daniel Felipe Silva Santos, Lucas Pascotti Valem
, Thierry Pinheiro Moreira
, Marcos Cleison S. Santana
, Mateus Roder
, João Paulo Papa
, Danilo Colombo:
Gait Recognition Based on Deep Learning: A Survey. 34:1-34:34 - Qiao Jin
, Zheng Yuan
, Guangzhi Xiong
, Qianlan Yu, Huaiyuan Ying, Chuanqi Tan, Mosha Chen, Songfang Huang, Xiaozhong Liu, Sheng Yu:
Biomedical Question Answering: A Survey of Approaches and Challenges. 35:1-35:36 - Yiqun Xie
, Shashi Shekhar, Yan Li:
Statistically-Robust Clustering Techniques for Mapping Spatial Hotspots: A Survey. 36:1-36:38 - José Alemany
, Elena del Val
, Ana García-Fornes
:
A Review of Privacy Decision-making Mechanisms in Online Social Networks. 37:1-37:32 - Jingya Zhou
, Ling Liu
, Wenqi Wei, Jianxi Fan:
Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding. 38:1-38:35 - Davinder Kaur
, Suleyman Uslu, Kaley J. Rittichier, Arjan Durresi
:
Trustworthy Artificial Intelligence: A Review. 39:1-39:38 - Conor Fahy
, Shengxiang Yang
, Mario Gongora:
Scarcity of Labels in Non-Stationary Data Streams: A Survey. 40:1-40:39 - José Marcelo Fernandes
, Jorge Sá Silva
, André Rodrigues
, Fernando Boavida
:
A Survey of Approaches to Unobtrusive Sensing of Humans. 41:1-41:28 - David Rolnick
, Priya L. Donti, Lynn H. Kaack
, Kelly Kochanski
, Alexandre Lacoste, Kris Sankaran, Andrew Slavin Ross, Nikola Milojevic-Dupont, Natasha Jaques, Anna Waldman-Brown, Alexandra Sasha Luccioni, Tegan Maharaj, Evan D. Sherwin
, S. Karthik Mukkavilli
, Konrad P. Kording, Carla P. Gomes
, Andrew Y. Ng, Demis Hassabis, John C. Platt
, Felix Creutzig, Jennifer T. Chayes
, Yoshua Bengio:
Tackling Climate Change with Machine Learning. 42:1-42:96 - Shallu Sharma, Pravat Kumar Mandal
:
A Comprehensive Report on Machine Learning-based Early Detection of Alzheimer's Disease using Multi-modal Neuroimaging Data. 43:1-43:44 - Ankur O. Bang
, Udai Pratap Rao
, Pallavi Kaliyar
, Mauro Conti
:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. 44:1-44:36
Volume 55, Number 3, April 2023
- Sanjay Kumar Anand
, Suresh Kumar
:
Experimental Comparisons of Clustering Approaches for Data Representation. 45:1-45:33 - Tasniem Nasser Al-Yahya, Mohamed El Bachir Menai, Hassan Mathkour:
On the Structure of the Boolean Satisfiability Problem: A Survey. 46:1-46:34 - Marcos Roberto e Souza, Helena de Almeida Maia, Hélio Pedrini:
Survey on Digital Video Stabilization: Concepts, Methods, and Challenges. 47:1-47:37 - Tukaram Muske, Alexander Serebrenik
:
Survey of Approaches for Postprocessing of Static Analysis Alarms. 48:1-48:39 - Danula Hettiachchi
, Vassilis Kostakos, Jorge Gonçalves
:
A Survey on Task Assignment in Crowdsourcing. 49:1-49:35 - Raj Mohan Singh
, Lalit Kumar Awasthi
, Geeta Sikka
:
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review. 50:1-50:43 - Dana Pessach
, Erez Shmueli
:
A Review on Fairness in Machine Learning. 51:1-51:44 - Chenning Li
, Zhichao Cao:
LoRa Networking Techniques for Large-scale and Long-term IoT: A Down-to-top Survey. 52:1-52:36 - Alexander Plopski
, Teresa Hirzle
, Nahal Norouzi
, Long Qian
, Gerd Bruder
, Tobias Langlotz
:
The Eye in Extended Reality: A Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality. 53:1-53:39 - Nan Wu
, Yuan Xie:
A Survey of Machine Learning for Computer Architecture and Systems. 54:1-54:39 - Thomas Reisinger, Isabel Wagner
, Eerke A. Boiten:
Security and Privacy in Unified Communication. 55:1-55:36 - Ruiqi Li, Xiang Zhao, Marie-Francine Moens:
A Brief Overview of Universal Sentence Representation Methods: A Linguistic View. 56:1-56:42 - Huan Li
, Hua Lu
, Christian S. Jensen
, Bo Tang
, Muhammad Aamir Cheema
:
Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects. 57:1-57:41 - Dina G. Mahmoud
, Vincent Lenders
, Mirjana Stojilovic:
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era. 58:1-58:40 - Jacopo Soldani
, Antonio Brogi
:
Anomaly Detection and Failure Root Cause Analysis in (Micro) Service-Based Cloud Applications: A Survey. 59:1-59:39 - Dinh C. Nguyen, Quoc-Viet Pham
, Pubudu N. Pathirana, Ming Ding
, Aruna Seneviratne, Zihuai Lin
, Octavia A. Dobre, Won-Joo Hwang:
Federated Learning for Smart Healthcare: A Survey. 60:1-60:37 - Anna Berenberg, Brad Calder:
Deployment Archetypes for Cloud Applications. 61:1-61:48 - Voica Gavrilut
, Aleksander Pruski
, Michael Stübert Berger
:
Constructive or Optimized: An Overview of Strategies to Design Networks for Time-Critical Applications. 62:1-62:35 - Susanne Barth, Dan Ionita
, Pieter H. Hartel:
Understanding Online Privacy - A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. 63:1-63:37 - Longbing Cao
:
AI in Finance: Challenges, Techniques, and Opportunities. 64:1-64:38
Volume 55, Number 4, May 2023
- Gianni Brauwers
, Flavius Frasincar
:
A Survey on Aspect-Based Sentiment Classification. 65:1-65:37 - Jared Willard
, Xiaowei Jia
, Shaoming Xu
, Michael S. Steinbach
, Vipin Kumar
:
Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems. 66:1-66:37 - Daniel Soares Santos
, Brauner R. N. Oliveira
, Rick Kazman, Elisa Yumi Nakagawa:
Evaluation of Systems-of-Systems Software Architectures: State of the Art and Future Perspectives. 67:1-67:35 - Thiago L. T. da Silveira
, Paulo G. L. Pinto, Jeffri Murrugarra-Llerena
, Cláudio R. Jung:
3D Scene Geometry Estimation from 360° Imagery: A Survey. 68:1-68:39 - Alessio Ferrari
, Maurice H. ter Beek
:
Formal Methods in Railways: A Systematic Mapping Study. 69:1-69:37 - Youyang Qu
, Md. Palash Uddin
, Chenquan Gan, Yong Xiang
, Longxiang Gao, John Yearwood:
Blockchain-enabled Federated Learning: A Survey. 70:1-70:35 - Marios Evangelos Kanakis
, Ramin Khalili, Lin Wang:
Machine Learning for Computer Systems and Networking: A Survey. 71:1-71:36 - Javier Troya, Sergio Segura, Lola Burgueño, Manuel Wimmer
:
Model Transformation Testing and Debugging: A Survey. 72:1-72:39 - Arif Husen
, Muhammad Hasanain Chaudary, Farooq Ahmad:
A Survey on Requirements of Future Intelligent Networks: Solutions and Future Research Directions. 73:1-73:61 - Yingan Cui
, Xue Li
, Junhuai Li
, Huaijun Wang
, Xiaogang Chen
:
A Survey of Sampling Method for Social Media Embeddedness Relationship. 74:1-74:39 - Heitor Murilo Gomes
, Maciej Grzenda, Rodrigo Fernandes de Mello, Jesse Read, Minh-Huong Le Nguyen, Albert Bifet
:
A Survey on Semi-supervised Learning for Delayed Partially Labelled Data Streams. 75:1-75:42 - Shouyong Jiang
, Juan Zou
, Shengxiang Yang
, Xin Yao
:
Evolutionary Dynamic Multi-objective Optimisation: A Survey. 76:1-76:47 - Rabindra Lamsal
, Aaron Harwood, Maria Rodriguez Read
:
Socially Enhanced Situation Awareness from Microblogs Using Artificial Intelligence: A Survey. 77:1-77:38 - Krishna Teja Chitty-Venkata
, Arun K. Somani:
Neural Architecture Search Survey: A Hardware Perspective. 78:1-78:36 - Xiang Li
, Yazhou Zhang, Prayag Tiwari
, Dawei Song, Bin Hu, Meihong Yang, Zhigang Zhao, Neeraj Kumar, Pekka Marttinen
:
EEG Based Emotion Recognition: A Tutorial and Review. 79:1-79:57 - Wu Liu, Qian Bao
, Yu Sun, Tao Mei
:
Recent Advances of Monocular 2D and 3D Human Pose Estimation: A Deep Learning Perspective. 80:1-80:41 - Zhaoxin Fan
, Yazhi Zhu, Yulin He, Qi Sun, Hongyan Liu, Jun He:
Deep Learning on Monocular Object Pose Detection and Tracking: A Comprehensive Overview. 81:1-81:40 - Matthew J. Vowels
, Necati Cihan Camgöz
, Richard Bowden
:
D'ya Like DAGs? A Survey on Structure Learning and Causal Discovery. 82:1-82:36 - Giorgos Armeniakos
, Georgios Zervakis, Dimitrios Soudris
, Jörg Henkel:
Hardware Approximate Techniques for Deep Neural Network Accelerators: A Survey. 83:1-83:36 - Chen Yan
, Xiaoyu Ji
, Kai Wang
, Qinhong Jiang
, Zizhi Jin
, Wenyuan Xu
:
A Survey on Voice Assistant Security: Attacks and Countermeasures. 84:1-84:36 - Elena Almaraz Luengo
:
Gamma Pseudo Random Number Generators. 85:1-85:33 - Anubhab Baksi
, Shivam Bhasin
, Jakub Breier
, Dirmanto Jap
, Dhiman Saha
:
A Survey on Fault Attacks on Symmetric Key Cryptosystems. 86:1-86:34
Volume 55, Number 5, June 2023
- Kalia Orphanou
, Jahna Otterbacher
, Styliani Kleanthous
, Khuyagbaatar Batsuren
, Fausto Giunchiglia
, Veronika Bogina
, Avital Shulner-Tal
, Alan Hartman
, Tsvi Kuflik
:
Mitigating Bias in Algorithmic Systems - A Fish-eye View. 87:1-87:37 - Jiang Xiao, Huichuwu Li
, Minrui Wu
, Hai Jin
, M. Jamal Deen
, Jiannong Cao
:
A Survey on Wireless Device-free Human Sensing: Application Scenarios, Current Solutions, and Open Issues. 88:1-88:35 - Yuan He
, Xiuzhen Guo
, Xiaolong Zheng
, Zihao Yu
, Jia Zhang
, Haotian Jiang
, Xin Na
, Jiacheng Zhang
:
Cross-Technology Communication for the Internet of Things: A Survey. 89:1-89:29 - Yoshitomo Matsubara
, Marco Levorato, Francesco Restuccia:
Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges. 90:1-90:30 - Quim Motger
, Xavier Franch
, Jordi Marco:
Software-Based Dialogue Systems: Survey, Taxonomy, and Challenges. 91:1-91:42 - George A. Vouros
:
Explainable Deep Reinforcement Learning: State of the Art and Challenges. 92:1-92:39 - Bushra Alhijawi
, Arafat Awajan, Salam Fraihat
:
Survey on the Objectives of Recommender Systems: Measures, Solutions, Evaluation Methodology, and New Perspectives. 93:1-93:38 - Amina Kammoun
, Rim Slama
, Hedi Tabia
, Tarek Ouni
, Mohamed Abid
:
Generative Adversarial Networks for Face Generation: A Survey. 94:1-94:37 - Amir-Hossein Karimi, Gilles Barthe
, Bernhard Schölkopf
, Isabel Valera
:
A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations. 95:1-95:29 - Manal AlAmir, Manal Al Ghamdi:
The Role of Generative Adversarial Network in Medical Image Analysis: An In-depth Survey. 96:1-96:36 - Shiwen Wu
, Fei Sun
, Wentao Zhang
, Xu Xie
, Bin Cui
:
Graph Neural Networks in Recommender Systems: A Survey. 97:1-97:37 - Fabio Valerio Massoli
, Lucia Vadicamo
, Giuseppe Amato
, Fabrizio Falchi
:
A Leap among Quantum Computing and Quantum Neural Networks: A Survey. 98:1-98:37 - Pedro Cruz, Nadjib Achir
, Aline Carneiro Viana:
On the Edge of the Deployment: A Survey on Multi-access Edge Computing. 99:1-99:34 - Triet Huynh Minh Le
, Huaming Chen
, Muhammad Ali Babar
:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization. 100:1-100:39 - Darren Yates
, Md Zahidul Islam
:
Data Mining on Smartphones: An Introduction and Survey. 101:1-101:38 - Congbo Ma
, Wei Emma Zhang
, Mingyu Guo
, Hu Wang
, Quan Z. Sheng
:
Multi-document Summarization via Deep Learning Techniques: A Survey. 102:1-102:37 - Julia El Zini
, Mariette Awad
:
On the Explainability of Natural Language Processing Deep Models. 103:1-103:31 - Hansoo Lee, Joonyoung Park
, Uichin Lee
:
A Systematic Survey on Android API Usage for Data-driven Analytics with Smartphones. 104:1-104:38 - Zhiyan Chen
, Jinxin Liu
, Yu Shen
, Murat Simsek
, Burak Kantarci
, Hussein T. Mouftah
, Petar Djukic
:
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. 105:1-105:37 - Emanuele Del Sozzo
, Davide Conficconi
, Alberto Zeni
, Mirko Salaris
, Donatella Sciuto
, Marco D. Santambrogio
:
Pushing the Level of Abstraction of Digital System Design: A Survey on How to Program FPGAs. 106:1-106:48 - Hooman Alavizadeh
, Julian Jang-Jaccard
, Simon Yusuf Enoch
, Harith Al-Sahaf
, Ian Welch
, Seyit Ahmet Çamtepe
, Dan Dongseong Kim
:
A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights. 107:1-107:37 - Trivikram Muralidharan
, Aviad Cohen
, Noa Gerson
, Nir Nissim
:
File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements. 108:1-108:45
Volume 55, Number 6, July 2023
- Yi Tay
, Mostafa Dehghani
, Dara Bahri
, Donald Metzler
:
Efficient Transformers: A Survey. 109:1-109:28 - Mahdi Fahmideh
, John C. Grundy
, Aakash Ahmad
, Jun Shen
, Jun Yan
, Davoud Mougouei
, Peng Wang
, Aditya Ghose
, Anuradha Gunawardana
, Uwe Aickelin
, Babak Abedin
:
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions. 110:1-110:44 - Binglei Guo
, Jiong Yu
, Dexian Yang
, Hongyong Leng
, Bin Liao
:
Energy-Efficient Database Systems: A Systematic Survey. 111:1-111:53 - Shanto Roy
, Nazia Sharmin
, Jaime C. Acosta
, Christopher Kiekintveld
, Aron Laszka
:
Survey and Taxonomy of Adversarial Reconnaissance Techniques. 112:1-112:38 - Dan Xia
, Chun Jiang, Jiafu Wan
, Jiong Jin
, Victor C. M. Leung
, Miguel Martínez-García:
Heterogeneous Network Access and Fusion in Smart Factory: A Survey. 113:1-113:31