0 | -- | 0 | Kilian Pfeiffer, Martin Rapp, Ramin Khalili, Jörg Henkel. Federated Learning for Computationally Constrained Heterogeneous Devices: A Survey |
0 | -- | 0 | Baolei Cheng, Dajin Wang, Jianxi Fan. Independent Spanning Trees in Networks: A Survey |
0 | -- | 0 | Federico Reghenzani, Zhishan Guo, William Fornaciari. Software Fault Tolerance in Real-Time Systems: Identifying the Future Research Questions |
0 | -- | 0 | Nikiforos Pittaras, George Giannakopoulos, Panagiotis Stamatopoulos, Vangelis Karkaletsis. Content-based and Knowledge-enriched Representations for Classification Across Modalities: A Survey |
0 | -- | 0 | Daryna Oliynyk, Rudolf Mayer, Andreas Rauber. I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences |
0 | -- | 0 | Bofeng Pan, Natalia Stakhanova, Suprio Ray. Data Provenance in Security and Privacy |
0 | -- | 0 | Matthew Landers, Afsaneh Doryab. Deep Reinforcement Learning Verification: A Survey |
0 | -- | 0 | Xiao Zhang, Griffin Klevering, Xinyu Lei, Yiwen Hu, Li Xiao 0001, Guan-Hua Tu. The Security in Optical Wireless Communication: A Survey |
0 | -- | 0 | Arun Kumar Kalakanti, Shrisha Rao 0001. Computational Challenges and Approaches for Electric Vehicles |
0 | -- | 0 | Samodha Pallewatta, Vassilis Kostakos, Rajkumar Buyya. Placement of Microservices-based IoT Applications in Fog Computing: A Taxonomy and Future Directions |
0 | -- | 0 | Jarod Govers, Philip Feldman, Aaron Dant, Panos Patros. Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech |
0 | -- | 0 | Karl Olson, Jack Wampler, Eric Keller. Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers |
0 | -- | 0 | Tommaso Fulcini, Riccardo Coppola, Luca Ardito, Marco Torchiano. A Review on Tools, Mechanics, Benefits, and Challenges of Gamified Software Testing |
0 | -- | 0 | Shreya Goyal, Sumanth Doddapaneni, Mitesh M. Khapra, Balaraman Ravindran. A Survey of Adversarial Defenses and Robustness in NLP |
0 | -- | 0 | Newton Carlos Will, Carlos Alberto Maziero. Intel Software Guard Extensions Applications: A Survey |
0 | -- | 0 | João Bachiega Jr., Breno G. S. Costa, Leonardo Rebouças de Carvalho, Michel J. F. Rosa, Aletéia P. F. Araújo. Computational Resource Allocation in Fog Computing: A Comprehensive Survey |
0 | -- | 0 | Anna Breit, Laura Waltersdorfer, Fajar J. Ekaputra, Marta Sabou, Andreas Ekelhart, Andreea Iana, Heiko Paulheim, Jan Portisch, Artem Revenko, Annette ten Teije, Frank van Harmelen. Combining Machine Learning and Semantic Web: A Systematic Mapping Study |
0 | -- | 0 | Tânia Carvalho, Nuno Moniz, Pedro Faria, Luís Antunes 0002. Survey on Privacy-Preserving Techniques for Microdata Publication |
0 | -- | 0 | Tongyue He, Junxin Chen, Ben-Guo He, Wei Wang 0077, Zhiliang Zhu 0001, Zhihan Lv. Toward Wearable Sensors: Advances, Trends, and Challenges |
0 | -- | 0 | Cornelius Ihle, Dennis Trautwein, Moritz Schubotz, Norman Meuschke, Bela Gipp. Incentive Mechanisms in Peer-to-Peer Networks - A Systematic Literature Review |
0 | -- | 0 | Zhiwei Zhong, Xianming Liu, Junjun Jiang, Debin Zhao, Xiangyang Ji. Guided Depth Map Super-Resolution: A Survey |
0 | -- | 0 | Mu-Huan Chung, Yuhong Yang 0007, Lu Wang 0004, Greg Cento, Khilan Jerath, Abhay Raman, David Lie, Mark H. Chignell. Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement |
0 | -- | 0 | Davide Zoni, Andrea Galimberti, William Fornaciari. A Survey on Run-time Power Monitors at the Edge |
0 | -- | 0 | Jiepin Ding, Mingsong Chen, Ting Wang 0001, Junlong Zhou, Xin Fu, Keqin Li 0001. A Survey of AI-enabled Dynamic Manufacturing Scheduling: From Directed Heuristics to Autonomous Learning |
0 | -- | 0 | Sahraoui Dhelim, Liming Chen 0001, Sajal K. Das 0001, Huansheng Ning, Chris D. Nugent, Gerard Leavey, Dirk Pesch, Eleanor Bantry-White, Devin Burns. Detecting Mental Distresses Using Social Behavior Analysis in the Context of COVID-19: A Survey |
0 | -- | 0 | Quentin Fournier, Gaétan Marceau-Caron, Daniel Aloise. A Practical Survey on Faster and Lighter Transformers |
0 | -- | 0 | Brian Felipe Keith Norambuena, Tanushree Mitra, Chris North 0001. A Survey on Event-Based News Narrative Extraction |
0 | -- | 0 | Sicong Han, Chenhao Lin, Chao Shen 0001, Qian Wang 0002, Xiaohong Guan. Interpreting Adversarial Examples in Deep Learning: A Review |
0 | -- | 0 | Arda Goknil, Phu Hong Nguyen, Sagar Sen, Dimitra Politaki, Harris Niavis, Karl John Pedersen, Abdillah Suyuthi, Abhilash Anand, Amina Ziegenbein. A Systematic Review of Data Quality in CPS and IoT for Industry 4.0 |
0 | -- | 0 | Veda C. Storey, Roman Lukyanenko, Arturo Castellanos. Conceptual Modeling: Topics, Themes, and Technology Trends |
0 | -- | 0 | Badis Hammi, Sherali Zeadally, Jamel Nebhen. Security Threats, Countermeasures, and Challenges of Digital Supply Chains |
0 | -- | 0 | Shalini Saini, Nitesh Saxena. A Survey of Threats to Research Literature-dependent Medical AI Solutions |
0 | -- | 0 | Leysan Nurgalieva, Alisa Frik, Gavin Doherty. A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development |
0 | -- | 0 | Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao 0001, Xiapu Luo. Security Threat Mitigation for Smart Contracts: A Comprehensive Survey |
0 | -- | 0 | Vijay Kumar, Kolin Paul. Device Fingerprinting for Cyber-Physical Systems: A Survey |
0 | -- | 0 | Abdulaziz Al-Meer, Saif Al-Kuwari. Physical Unclonable Functions (PUF) for IoT Devices |
0 | -- | 0 | Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari. A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids |