Issue Downloads
Visual Affordance and Function Understanding: A Survey
Nowadays, robots are dominating the manufacturing, entertainment, and healthcare industries. Robot vision aims to equip robots with the capabilities to discover information, understand it, and interact with the environment, which require an agent to ...
Community Detection in Multiplex Networks
A multiplex network models different modes of interaction among same-type entities. In this article, we provide a taxonomy of community detection algorithms in multiplex networks. We characterize the different algorithms based on various properties and ...
Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications
Intelligent vehicular networks emerge as a promising technology to provide efficient data communication in transportation systems and smart cities. At the same time, the popularization of devices with attached sensors has allowed the obtaining of a ...
Machine Learning for Detecting Data Exfiltration: A Review
Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software Engineering (SE) has recently taken significant steps in proposing countermeasures for detecting sophisticated data exfiltration attacks. It is important to ...
A Survey of Binary Code Similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their similarities and differences. The ability to compare binary code enables many real-world applications on scenarios where source code may not be available such ...
Cytology Image Analysis Techniques Toward Automation: Systematically Revisited
Cytology is a branch of pathology that deals with the microscopic examination of cells for diagnosis of carcinoma or inflammatory conditions. In the present work, the term cytology is used to indicate solid organ cytology. Automation in cytology started ...
Software Testing Effort Estimation and Related Problems: A Systematic Literature Review
Although testing effort estimation is a very important task in software project management, it is rarely described in the literature. There are many difficulties in finding any useful methods or tools for this purpose. Solutions to many other problems ...
Survey of Transient Execution Attacks and Their Mitigations
Transient execution attacks, also known as speculative execution attacks, have drawn much interest in the last few years as they can cause critical data leakage. Since the first disclosure of Spectre and Meltdown attacks in January 2018, a number of new ...
Natural Language Processing for Requirements Engineering: A Systematic Mapping Study
- Liping Zhao,
- Waad Alhoshan,
- Alessio Ferrari,
- Keletso J. Letsholo,
- Muideen A. Ajagbe,
- Erol-Valeriu Chioasca,
- Riza T. Batista-Navarro
Natural Language Processing for Requirements Engineering (NLP4RE) is an area of research and development that seeks to apply natural language processing (NLP) techniques, tools, and resources to the requirements engineering (RE) process, to support ...
A Review on Outlier/Anomaly Detection in Time Series Data
Recent advances in technology have brought major breakthroughs in data collection, enabling a large amount of data to be gathered over time and thus generating time series. Mining this data has become an important task for researchers and practitioners ...
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons
- Syed Wasif Abbas Hamdani,
- Haider Abbas,
- Abdul Rehman Janjua,
- Waleed Bin Shahid,
- Muhammad Faisal Amjad,
- Jahanzaib Malik,
- Malik Hamza Murtaza,
- Mohammed Atiquzzaman,
- Abdul Waheed Khan
Cyber threats have been growing tremendously in recent years. There are significant advancements in the threat space that have led towards an essential need for the strengthening of digital infrastructure security. Better security can be achieved by ...
Blockchain-empowered Data-driven Networks: A Survey and Outlook
The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many of which generate and consume large volumes and ...
Human Induction in Machine Learning: A Survey of the Nexus
As our epistemic ambitions grow, the common and scientific endeavours are becoming increasingly dependent on Machine Learning (ML). The field rests on a single experimental paradigm, which consists of splitting the available data into a training and ...
The Application of the Blockchain Technology in Voting Systems: A Review
Voting is a formal expression of opinion or choice, either positive or negative, made by an individual or a group of individuals. However, conventional voting systems tend to be centralized, which are known to suffer from security and efficiency ...
Access Control Mechanisms in Named Data Networks: A Comprehensive Survey
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data ...
Deep Learning--based Text Classification: A Comprehensive Review
Deep learning--based models have surpassed classical machine learning--based approaches in various text classification tasks, including sentiment analysis, news categorization, question answering, and natural language inference. In this article, we ...
Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions
Generative Adversarial Networks (GANs) is a novel class of deep generative models that has recently gained significant attention. GANs learn complex and high-dimensional distributions implicitly over images, audio, and data. However, there exist major ...
User Response Prediction in Online Advertising
Online advertising, as a vast market, has gained significant attention in various platforms ranging from search engines, third-party websites, social media, and mobile apps. The prosperity of online campaigns is a challenge in online marketing and is ...
Syntactic Pattern Recognition in Computer Vision: A Systematic Review
- Gilberto Astolfi,
- Fábio Prestes Cesar Rezende,
- João Vitor De Andrade Porto,
- Edson Takashi Matsubara,
- Hemerson Pistori
Using techniques derived from the syntactic methods for visual pattern recognition is not new and was much explored in the area called syntactical or structural pattern recognition. Syntactic methods have been useful because they are intuitively simple ...
A Survey on Edge Performance Benchmarking
Edge computing is the next Internet frontier that will leverage computing resources located near users, sensors, and data stores to provide more responsive services. Therefore, it is envisioned that a large-scale, geographically dispersed, and resource-...
Ultrasound Medical Imaging Techniques: A Survey
Ultrasound (US) imaging for medical purposes has been increasing in popularity over the years. The US technology has some valuable strengths, such as it is harmless, very cheap, and can provide real-time feedback. At the same time, it has also some ...
Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions
- Khan Muhammad,
- Mohammad S. Obaidat,
- Tanveer Hussain,
- Javier Del Ser,
- Neeraj Kumar,
- Mohammad Tanveer,
- Faiyaz Doctor
CCTV cameras installed for continuous surveillance generate enormous amounts of data daily, forging the term Big Video Data (BVD). The active practice of BVD includes intelligent surveillance and activity recognition, among other challenging tasks. To ...
Social Media Identity Deception Detection: A Survey
Social media have been growing rapidly and become essential elements of many people’s lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few ...