0 | -- | 0 | Wenjie Xiong 0001, Jakub Szefer. Survey of Transient Execution Attacks and Their Mitigations |
0 | -- | 0 | Clayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro. Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications |
0 | -- | 0 | Mohammed Hassanin, Salman Khan, Murat Tahtali. Visual Affordance and Function Understanding: A Survey |
0 | -- | 0 | Liping Zhao 0001, Waad Alhoshan, Alessio Ferrari 0001, Keletso J. Letsholo, Muideen A. Ajagbe, Erol-Valeriu Chioasca, Riza Theresa Batista-Navarro. Natural Language Processing for Requirements Engineering: A Systematic Mapping Study |
0 | -- | 0 | Xi Li 0004, Zehua Wang, Victor C. M. Leung, Hong Ji 0001, Yiming Liu 0002, Heli Zhang. Blockchain-empowered Data-driven Networks: A Survey and Outlook |
0 | -- | 0 | Shyamali Mitra, Nibaran Das, Soumyajyoti Dey, Sukanta Chakraborty, Mita Nasipuri, Mrinal Kanti Naskar. Cytology Image Analysis Techniques Toward Automation: Systematically Revisited |
0 | -- | 0 | Ilona Bluemke, Agnieszka Malanowska. Software Testing Effort Estimation and Related Problems: A Systematic Literature Review |
0 | -- | 0 | Divya Saxena, Jiannong Cao 0001. Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions |
0 | -- | 0 | Gilberto Astolfi, Fábio Prestes Cesar Rezende, João Vitor de Andrade Porto, Edson Takashi Matsubara, Hemerson Pistori. Syntactic Pattern Recognition in Computer Vision: A Systematic Review |
0 | -- | 0 | Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire 0001. Machine Learning for Detecting Data Exfiltration: A Review |
0 | -- | 0 | Zhabiz Gharibshah, Xingquan Zhu 0001. User Response Prediction in Online Advertising |
0 | -- | 0 | Jun Huang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Min Luo, Kim-Kwang Raymond Choo. The Application of the Blockchain Technology in Voting Systems: A Review |
0 | -- | 0 | Danilo Avola, Luigi Cinque, Alessio Fagioli 0001, Gian Luca Foresti, Alessio Mecca. Ultrasound Medical Imaging Techniques: A Survey |
0 | -- | 0 | Syed Wasif Abbas Hamdani, Haider Abbas, Abdul Rehman Janjua, Waleed Bin Shahid, Muhammad Faisal Amjad, Jahanzaib Malik, Malik Hamza Murtaza, Mohammed Atiquzzaman, Abdul Waheed Khan. Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons |
0 | -- | 0 | Boubakr Nour, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, Hassine Moungla. Access Control Mechanisms in Named Data Networks: A Comprehensive Survey |
0 | -- | 0 | Ane Blázquez-García, Angel Conde, Usue Mori, José Antonio Lozano. A Review on Outlier/Anomaly Detection in Time Series Data |
0 | -- | 0 | Khan Muhammad, Mohammad S. Obaidat, Tanveer Hussain, Javier Del Ser, Neeraj Kumar 0001, Muhammad Tanveer 0001, Faiyaz Doctor. Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions |
0 | -- | 0 | Blesson Varghese, Nan Wang 0009, David Bermbach, Cheol-Ho Hong, Eyal de Lara, Weisong Shi, Christopher Stewart. A Survey on Edge Performance Benchmarking |
0 | -- | 0 | Matteo Magnani, Obaida Hanteer, Roberto Interdonato, Luca Rossi 0003, Andrea Tagarelli. Community Detection in Multiplex Networks |
0 | -- | 0 | Petr Spelda, Vit Stritecky. Human Induction in Machine Learning: A Survey of the Nexus |
0 | -- | 0 | Irfan Ul Haq, Juan Caballero. A Survey of Binary Code Similarity |
0 | -- | 0 | Ahmed AlHarbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil. Social Media Identity Deception Detection: A Survey |
0 | -- | 0 | Shervin Minaee, Nal Kalchbrenner, Erik Cambria, Narjes Nikzad, Meysam Chenaghlu, Jianfeng Gao. Deep Learning-based Text Classification: A Comprehensive Review |