default search action
ACM Computing Surveys, Volume 57
Volume 57, Number 1, January 2025
- Hakimeh Mazaheri, Salman Goli, Ali Nourollah:
A survey of 3D Space Path-Planning Methods and Algorithms. 1:1-1:32 - Ziyao Liu, Yu Jiang, Jiyuan Shen, Minyi Peng, Kwok-Yan Lam, Xingliang Yuan, Xiaoning Liu:
A Survey on Federated Unlearning: Challenges, Methods, and Future Directions. 2:1-2:38 - Thanh Toan Nguyen, Nguyen Quoc Viet Hung, Thanh Tam Nguyen, Thanh Trung Huynh, Thanh Thi Nguyen, Matthias Weidlich, Hongzhi Yin:
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures. 3:1-3:39 - Can Rong, Jingtao Ding, Yong Li:
An Interdisciplinary Survey on Origin-destination Flows Modeling: Theory and Techniques. 4:1-4:49 - Imran Ashraf, Yousaf Bin Zikria, Sahil Garg, Soojung Hur, Yongwan Park, Mohsen Guizani:
Enabling Technologies and Techniques for Floor Identification. 5:1-5:48 - Chamath Amarasinghe, Nimesha Ranasinghe:
Digital Food Sensing and Ingredient Analysis Techniques to Facilitate Human-Food Interface Designs. 6:1-6:39 - Ansam Khraisat, Ammar Alazab, Sarabjot Singh, Tony Jan, Alfredo Gomez Jr.:
Survey on Federated Learning for Intrusion Detection System: Concept, Architectures, Aggregation Strategies, Challenges, and Future Directions. 7:1-7:38 - Yao Zhao, Youyang Qu, Yong Xiang, Md. Palash Uddin, Dezhong Peng, Longxiang Gao:
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends. 8:1-8:34 - Gayathri T, Mamatha H. R:
How to Improve Video Analytics with Action Recognition: A Survey. 9:1-9:36 - Longbing Cao, Qing Liu:
COVID-19 Modeling: A Review. 10:1-10:42 - Abel Goedegebuure, Indika Kumara, Stefan Driessen, Willem-Jan van den Heuvel, Geert Monsieur, Damian Andrew Tamburri, Dario Di Nucci:
Data Mesh: A Systematic Gray Literature Review. 11:1-11:36 - Bader Al-Sada, Alireza Sadighian, Gabriele Oligeri:
MITRE ATT&CK: State of the Art and Way Forward. 12:1-12:37 - Abdul Razzaq, Jim Buckley, Qin Lai, Tingting Yu, Goetz Botterweck:
A Systematic Literature Review on the Influence of Enhanced Developer Experience on Developers' Productivity: Factors, Practices, and Recommendations. 13:1-13:46 - Kathryn Kasmarik, Mahtab Mohtasham Khani, Shadi Abpeikar, Michael Barlow, Olivia L. Carter, Muireann Irish:
Competence Awareness for Humans and Machines: A Survey and Future Research Directions from Psychology. 14:1-14:26 - Zahra Zamanzadeh Darban, Geoffrey I. Webb, Shirui Pan, Charu Aggarwal, Mahsa Salehi:
Deep Learning for Time Series Anomaly Detection: A Survey. 15:1-15:42 - Farhana Sharief, Humaira Ijaz, Mohammad Shojafar, Muhammad Asif Naeem:
Multi-Class Imbalanced Data Handling with Concept Drift in Fog Computing: A Taxonomy, Review, and Future Directions. 16:1-16:48 - Chayan Banerjee, Kien Nguyen, Clinton Fookes, George E. Karniadakis:
Physics-Informed Computer Vision: A Review and Perspectives. 17:1-17:38 - Timothy R. McIntosh, Teo Susnjak, Tong Liu, Dan Xu, Paul A. Watters, Dongwei Liu, Yaqi Hao, Alex Ng, Malka Halgamuge:
Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data Exfiltration. 18:1-18:40 - Branislav Pecher, Ivan Srba, Mária Bieliková:
A Survey on Stability of Learning with Limited Labelled Data and its Sensitivity to the Effects of Randomness. 19:1-19:40 - Bakary Badjie, José Cecílio, António Casimiro:
Adversarial Attacks and Countermeasures on Image Classification-based Deep Learning Models in Autonomous Driving Systems: A Systematic Review. 20:1-20:52 - Ahmed Fahmin, Muhammad Aamir Cheema, Mohammed Eunus Ali, Adel Nadjaran Toosi, Hua Lu, Huan Li, David Taniar, Hesham A. Rakha, Bojie Shen:
Eco-Friendly Route Planning Algorithms: Taxonomies, Literature Review and Future Directions. 21:1-21:42 - Daniela Pais, Susana Brás, Raquel Sebastião:
A Review on the Use of Physiological Signals for Assessing Postoperative Pain. 22:1-22:39 - Ruyan Lin, Yulong Fu, Wei Yi, Jincheng Yang, Jin Cao, Zhiqiang Dong, Fei Xie, Hui Li:
Vulnerabilities and Security Patches Detection in OSS: A Survey. 23:1-23:37 - Leandro Lanzieri, Gianluca Martino, Görschwin Fey, Holger Schlarb, Thomas C. Schmidt, Matthias Wählisch:
A Review of Techniques for Ageing Detection and Monitoring on Embedded Systems. 24:1-24:34 - Matineh Pooshideh, Amin Beheshti, Yuankai Qi, Helia Farhood, Mike Simpson, Nick Gatland, Mehdi Soltany:
Presentation Attack Detection: A Systematic Literature Review. 25:1-25:32
Volume 57, Number 2, February 2025
- Qidong Liu, Jiaxi Hu, Yutian Xiao, Xiangyu Zhao, Jingtong Gao, Wanyu Wang, Qing Li, Jiliang Tang:
Multimodal Recommender Systems: A Survey. 26:1-26:17 - Lingkai Meng, Yu Shao, Long Yuan, Longbin Lai, Peng Cheng, Xue Li, Wenyuan Yu, Wenjie Zhang, Xuemin Lin, Jingren Zhou:
A Survey of Distributed Graph Algorithms on Massive Graphs. 27:1-27:39 - Zhenyu Yang, Ge Zhang, Jia Wu, Jian Yang, Quan Z. Sheng, Shan Xue, Chuan Zhou, Charu Aggarwal, Hao Peng, Wenbin Hu, Edwin R. Hancock, Pietro Liò:
State of the Art and Potentialities of Graph-level Learning. 28:1-28:40 - Anqi Wang, Jiahua Dong, Lik-Hang Lee, Jiachuan Shen, Pan Hui:
A Survey on Deep Learning for Design and Generation of Virtual Architecture. 29:1-29:41 - Tianyu Zhang, Gang Wang, Chuanyu Xue, Jiachen Wang, Mark Nixon, Song Han:
Time-Sensitive Networking (TSN) for Industrial Automation: Current Advances and Future Directions. 30:1-30:38 - S. S. Sravan, Susmita Mandal, P. J. A. Alphonse, P. L. Ramesh:
A Partial Offline Payment System for Connecting the Unconnected Using Internet of Things: A Survey. 31:1-31:35 - Zhiyuan Wei, Jing Sun, Zijian Zhang, Xianhao Zhang, Xiaoxuan Yang, Liehuang Zhu:
Survey on Quality Assurance of Smart Contracts. 32:1-32:36 - Meike Kombrink, Zeno Jean Marius Hubert Geradts, Marcel Worring:
Image Steganography Approaches and Their Detection Strategies: A Survey. 33:1-33:40 - Manali Patel, Krupa Jariwala, Chiranjoy Chattopadhyay:
A Systematic Review on Graph Neural Network-based Methods for Stock Market Forecasting. 34:1-34:38 - Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Bing Mao, Yuekang Li, Yaowen Zheng, Yeting Li, Li Pan, Yang Liu, Robert H. Deng:
A Survey of Protocol Fuzzing. 35:1-35:36 - Kai Huang, Zhengzi Xu, Su Yang, Hongyu Sun, Xuejun Li, Zheng Yan, Yuqing Zhang:
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities. 36:1-36:43 - Chengtai Cao, Fan Zhou, Yurou Dai, Jianping Wang, Kunpeng Zhang:
A Survey of Mix-based Data Augmentation: Taxonomy, Methods, Applications, and Explainability. 37:1-37:38 - Rahul Kumar, Manish Bhanu, João Mendes-Moreira, Joydeep Chandra:
Spatio-Temporal Predictive Modeling Techniques for Different Domains: a Survey. 38:1-38:42 - Xiuting Ge, Chunrong Fang, Xuanye Li, Weisong Sun, Daoyuan Wu, Juan Zhai, Shang-Wei Lin, Zhihong Zhao, Yang Liu, Zhenyu Chen:
Machine Learning for Actionable Warning Identification: A Comprehensive Survey. 39:1-39:35 - Zihao Li, Chao Yang, Yakun Chen, Xianzhi Wang, Hongxu Chen, Guandong Xu, Lina Yao, Michael Sheng:
Graph and Sequential Neural Networks in Session-based Recommendation: A Survey. 40:1-40:37 - Zhen Xing, Qijun Feng, Haoran Chen, Qi Dai, Han Hu, Hang Xu, Zuxuan Wu, Yu-Gang Jiang:
A Survey on Video Diffusion Models. 41:1-41:42 - Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris:
Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods. 42:1-42:36 - Francisco Silva, Hélder P. Oliveira, Tânia Pereira:
Causal representation learning through higher-level information extraction. 43:1-43:37 - Alvaro Sobrinho, Matheus Vilarim, Amanda Barbosa, Edmar Candeia Gurjão, Danilo F. S. Santos, Dalton C. G. Valadares, Leandro Dias da Silva:
Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey. 44:1-44:36 - Yousra Javed, Ayesha Sajid:
A Systematic Review of Privacy Policy Literature. 45:1-45:43 - Huiming Chen, Huandong Wang, Qingyue Long, Depeng Jin, Yong Li:
Advancements in Federated Learning: Models, Methods, and Privacy. 46:1-46:39 - Aiwei Liu, Leyi Pan, Yijian Lu, Jingjing Li, Xuming Hu, Xi Zhang, Lijie Wen, Irwin King, Hui Xiong, Philip S. Yu:
A Survey of Text Watermarking in the Era of Large Language Models. 47:1-47:36 - Elena Battaglia, Federico Peiretti, Ruggero Gaetano Pensa:
Co-clustering: A Survey of the Main Methods, Recent Trends, and Open Problems. 48:1-48:33 - Tao Chen, Liang Lv, Di Wang, Jing Zhang, Yue Yang, Zeyang Zhao, Chen Wang, Xiaowei Guo, Hao Chen, Qingye Wang, Yufei Xu, Qiming Zhang, Bo Du, Liangpei Zhang, Dacheng Tao:
Empowering Agrifood System with Artificial Intelligence: A Survey of the Progress, Challenges and Opportunities. 49:1-49:37
- Adrien Bennetot, Ivan Donadello, Ayoub El Qadi, Mauro Dragoni, Thomas Frossard, Benedikt Wagner, Anna Saranti, Silvia Tulli, Maria Trocan, Raja Chatila, Andreas Holzinger, Artur d'Avila Garcez, Natalia Díaz Rodríguez:
A Practical Tutorial on Explainable AI Techniques. 50:1-50:44 - Paulo Sérgio Almeida:
Approaches to Conflict-free Replicated Data Types. 51:1-51:36
Volume 57, Number 3, March 2025
- Bohan Liu, Gongyuan Li, He Zhang, Yuzhe Jin, Zikuan Wang, Dong Shao:
The Gap Between Trustworthy AI Research and Trustworthy Software Research: A Tertiary Study. 52:1-52:40 - Azhar Alsufyani, Omer F. Rana, Charith Perera:
Knowledge-based Cyber Physical Security at Smart Home: A Review. 53:1-53:36 - Pranab Das, Dilwar Hussain Mazumder:
A Comprehensive Survey of Studies on Predicting Anatomical Therapeutic Chemical Classes of Drugs. 54:1-54:31 - Nima Shiri Harzevili, Alvine Boaye Belle, Junjie Wang, Song Wang, Zhen Ming (Jack) Jiang, Nachiappan Nagappan:
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning. 55:1-55:36 - Mariano Albaladejo-González, José A. Ruipérez-Valiente, Félix Gómez Mármol:
Artificial Intelligence to Support the Training and Assessment of Professionals: A Systematic Literature Review. 56:1-56:29 - Li Shen, Yan Sun, Zhiyuan Yu, Liang Ding, Xinmei Tian, Dacheng Tao:
On Efficient Training of Large-Scale Deep Learning Models. 57:1-57:36 - Tianyi Wang, Xin Liao, Kam-Pui Chow, Xiaodong Lin, Yinglong Wang:
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective. 58:1-58:35 - Song Wang, Yaochen Zhu, Haochen Liu, Zaiyi Zheng, Chen Chen, Jundong Li:
Knowledge Editing for Large Language Models: A Survey. 59:1-59:37 - Abishek B. Rao, Shivani G. Aithal, Sanjay Singh:
Single-Document Abstractive Text Summarization: A Systematic Literature Review. 60:1-60:37 - Pankaj Dadure, Partha Pakray, Sivaji Bandyopadhyay:
Mathematical Information Retrieval: A Review. 61:1-61:34 - Bo Zhang, Yansong Gao, Boyu Kuang, Changlong Yu, Anmin Fu, Willy Susilo:
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures. 62:1-62:36 - Muhammad Tariq, Sohail Ahmad, Mian Ahmad Jan, Houbing Song:
Deep Learning Aided Intelligent Reflective Surfaces for 6G: A Survey. 63:1-63:37 - María Gutiérrez, María Ángeles Moraga, Félix García, Coral Calero:
Green IN Artificial Intelligence from a Software Perspective: State-of-the-Art and Green Decalogue. 64:1-64:30 - Muhammed Golec, Guneet Kaur Walia, Mohit Kumar, Félix Cuadrado, Sukhpal Singh Gill, Steve Uhlig:
Cold Start Latency in Serverless Computing: A Systematic Review, Taxonomy, and Future Directions. 65:1-65:36 - Cláudio Gomes, João Paulo Fernandes, Gabriel Falcão, Soummya Kar, Sridhar Tayur:
A Systematic Mapping Study on Quantum and Quantum-inspired Algorithms in Operations Research. 66:1-66:35 - Bin Jiang, Jiacheng Feng, Xuerong Cui, Jian Wang, Yongxin Liu, Houbing Song:
Security and Reliability of Internet of Underwater Things: Architecture, Challenges, and Opportunities. 67:1-67:37 - Athira K. A, J. Divya Udayan, Umashankar Subramaniam:
A Systematic Literature Review on Multi-Robot Task Allocation. 68:1-68:28 - Sheng Zhou, Hongjia Xu, Zhuonan Zheng, Jiawei Chen, Zhao Li, Jiajun Bu, Jia Wu, Xin Wang, Wenwu Zhu, Martin Ester:
A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future Directions. 69:1-69:38 - Chathurangi Shyalika, Ruwan Wickramarachchi, Amit P. Sheth:
A Comprehensive Survey on Rare Event Prediction. 70:1-70:39 - Qian Wang, Hong-Ning Dai, Jinghua Yang, Cai Guo, Peter R. N. Childs, Maaike Kleinsmann, Yike Guo, Pan Wang:
Learning-based Artificial Intelligence Artwork: Methodology Taxonomy and Quality Evaluation. 71:1-71:37 - Yogeswaranathan Kalyani, Rem W. Collier:
The Role of Multi-Agents in Digital Twin Implementation: Short Survey. 72:1-72:15 - Mohamed Moetez Abdelhamid, Layth Sliman, Raoudha Ben Djemaa, Guido Perboli:
A Review on Blockchain Technology, Current Challenges, and AI-Driven Solutions. 73:1-73:39 - Xiaojie Wang, Zhonghui Zhao, Ling Yi, Zhaolong Ning, Lei Guo, F. Richard Yu, Song Guo:
A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures. 74:1-74:37 - Haseena Rahmath P, Vishal Srivastava, Kuldeep Chaurasia, Roberto Gonçalves Pacheco, Rodrigo S. Couto:
Early-Exit Deep Neural Network - A Comprehensive Survey. 75:1-75:37 - Sara Abdali, Sina Shaham, Bhaskar Krishnamachari:
Multi-modal Misinformation Detection: Approaches, Challenges and Opportunities. 76:1-76:29 - Mohamed A. Mostafa, Ahmad S. Almogren, Muhammad Al-Qurishi, Majed A. AlRubaian:
Modality Deep-learning Frameworks for Fake News Detection on Social Networks: A Systematic Literature Review. 77:1-77:50 - Baochen Yan, Jiahe Lan, Zheng Yan:
Backdoor Attacks against Voice Recognition Systems: A Survey. 78:1-78:35 - Junhao Dong, Junxi Chen, Xiaohua Xie, Jianhuang Lai, Hao Chen:
Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges. 79:1-79:38
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.