0 | -- | 0 | Nandita Pattnaik, Shujun Li, Jason R. C. Nurse. A Survey of User Perspectives on Security and Privacy in a Home Networking Environment |
0 | -- | 0 | Pengfei Liu 0003, Weizhe Yuan, JinLan Fu, Zhengbao Jiang, Hiroaki Hayashi, Graham Neubig. Pre-train, Prompt, and Predict: A Systematic Survey of Prompting Methods in Natural Language Processing |
0 | -- | 0 | Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai. Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems |
0 | -- | 0 | Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Nasrin Sohrabi, Zahir Tari. Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey |
0 | -- | 0 | Eun Hee Park 0001, Veda C. Storey. Emotion Ontology Studies: A Framework for Expressing Feelings Digitally and its Application to Sentiment Analysis |
0 | -- | 0 | Ping Wang, Haichang Gao, Xiaoyan Guo, Chenxuan Xiao, Fuqi Qi, Zheng Yan. An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness |
0 | -- | 0 | Meng Liu 0006, Liqiang Nie, Yunxiao Wang, Meng Wang 0001, Yong Rui. A Survey on Video Moment Localization |
0 | -- | 0 | Haochen Hua, Yutong Li, Tonghe Wang, Nanqing Dong, Wei Li, Junwei Cao. Edge Computing with Artificial Intelligence: A Machine Learning Perspective |
0 | -- | 0 | Lidia Fotia, Flávia Coimbra Delicato, Giancarlo Fortino. Trust in Edge-based Internet of Things Architectures: State of the Art and Research Challenges |
0 | -- | 0 | Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar. A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures |
0 | -- | 0 | Daniel McDuff. Camera Measurement of Physiological Vital Signs |
0 | -- | 0 | Luca Benedetto, Paolo Cremonesi, Andrew Caines, Paula Buttery, Andrea Cappelli, Andrea Giussani, Roberto Turrin. A Survey on Recent Approaches to Question Difficulty Estimation from Text |
0 | -- | 0 | Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski 0001, Luca Piras. Android Source Code Vulnerability Detection: A Systematic Literature Review |
0 | -- | 0 | Athanasios Liatifis, Panagiotis G. Sarigiannidis, Vasileios Argyriou, Thomas Lagkas. Advancing SDN from OpenFlow to P4: A Survey |
0 | -- | 0 | Rudresh Dwivedi, Devam Dave, Het Naik, Smiti Singhal, Omer F. Rana, Pankesh Patel, Bin Qian, Zhenyu Wen, Tejal Shah, Graham Morgan, Rajiv Ranjan 0001. Explainable AI (XAI): Core Ideas, Techniques, and Solutions |
0 | -- | 0 | Takahito Yoshizawa, Dave Singelée, Jan Tobias Mühlberg, Stéphane Delbruel, Amir Taherkordi, Danny Hughes 0001, Bart Preneel. A Survey of Security and Privacy Issues in V2X Communication Systems |
0 | -- | 0 | Denis Kleyko, Dmitri A. Rachkovskij, Evgeny Osipov, Abbas Rahimi. A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges |
0 | -- | 0 | Junsik Sim, Beomjoong Kim, Kiseok Jeon, Moonho Joo, Jihun Lim, JungHee Lee, Kim-Kwang Raymond Choo. Technical Requirements and Approaches in Personal Data Control |
0 | -- | 0 | Jacky Cao, Kit-Yung Lam, Lik Hang Lee, Xiaoli Liu 0005, Pan Hui 0001, Xiang Su. Mobile Augmented Reality: User Interfaces, Frameworks, and Intelligence |
0 | -- | 0 | Junhai Luo, Zhiyan Wang, Ming Xia, Linyong Wu, Yuxin Tian, Yu Chen. Path Planning for UAV Communication Networks: Related Technologies, Solutions, and Opportunities |
0 | -- | 0 | Kai North, Marcos Zampieri, Matthew Shardlow. Lexical Complexity Prediction: An Overview |
0 | -- | 0 | Bo Li, Peng Qi 0003, Bo Liu, Shuai Di, Jingen Liu, JiQuan Pei, Jinfeng Yi, Bowen Zhou. Trustworthy AI: From Principles to Practices |