Issue Downloads
A Survey on Event-Based News Narrative Extraction
Narratives are fundamental to our understanding of the world, providing us with a natural structure for knowledge representation over time. Computational narrative extraction is a subfield of artificial intelligence that makes heavy use of information ...
Guided Depth Map Super-Resolution: A Survey
Guided depth map super-resolution (GDSR), which aims to reconstruct a high-resolution depth map from a low-resolution observation with the help of a paired high-resolution color image, is a longstanding and fundamental problem that has attracted ...
Device Fingerprinting for Cyber-Physical Systems: A Survey
The continued growth of the cyber-physical system (CPS) and Internet of Things technologies raises device security and monitoring concerns. For device identification, authentication, conditioning, and security, device fingerprint/fingerprinting (DFP) is ...
Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement
In this article we consider the problem of defending against increasing data exfiltration threats in the domain of cybersecurity. We review existing work on exfiltration threats and corresponding countermeasures. We consider current problems and ...
A Practical Survey on Faster and Lighter Transformers
Recurrent neural networks are effective models to process sequences. However, they are unable to learn long-term dependencies because of their inherent sequential nature. As a solution, Vaswani et al. introduced the Transformer, a model solely based on ...
Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers
With the transition to IPv6, addressing constraints that necessitated a common security architecture under network address translation (NAT) are no longer present. Instead, manufacturers are now able to choose between an open model design, where devices ...
Software Fault Tolerance in Real-Time Systems: Identifying the Future Research Questions
Tolerating hardware faults in modern architectures is becoming a prominent problem due to the miniaturization of the hardware components, their increasing complexity, and the necessity to reduce costs. Software-Implemented Hardware Fault Tolerance ...
A Survey of AI-enabled Dynamic Manufacturing Scheduling: From Directed Heuristics to Autonomous Learning
As one of the most complex parts in manufacturing systems, scheduling plays an important role in the efficient allocation of resources to meet individual customization requirements. However, due to the uncertain disruptions (e.g., task arrival time, ...
Incentive Mechanisms in Peer-to-Peer Networks — A Systematic Literature Review
Centralized networks inevitably exhibit single points of failure that malicious actors regularly target. Decentralized networks are more resilient if numerous participants contribute to the network’s functionality. Most decentralized networks employ ...
Survey on Privacy-Preserving Techniques for Microdata Publication
The exponential growth of collected, processed, and shared microdata has given rise to concerns about individuals’ privacy. As a result, laws and regulations have emerged to control what organisations do with microdata and how they protect it. Statistical ...
A Review on Tools, Mechanics, Benefits, and Challenges of Gamified Software Testing
Gamification is an established practice in Software Engineering to increase effectiveness and engagement in many practices. This manuscript provides a characterization of the application of gamification to the Software Testing area. Such practice in fact ...
Computational Challenges and Approaches for Electric Vehicles
Researchers worldwide have become increasingly interested in developing computational approaches to handle challenges facing electric vehicles (EVs) in recent years. This article examines the challenges and future potential of computational approaches for ...
Content-based and Knowledge-enriched Representations for Classification Across Modalities: A Survey
This survey documents representation approaches for classification across different modalities, from purely content-based methods to techniques utilizing external sources of structured knowledge. We present studies related to three paradigms used for ...
Combining Machine Learning and Semantic Web: A Systematic Mapping Study
- Anna Breit,
- Laura Waltersdorfer,
- Fajar J. Ekaputra,
- Marta Sabou,
- Andreas Ekelhart,
- Andreea Iana,
- Heiko Paulheim,
- Jan Portisch,
- Artem Revenko,
- Annette Ten Teije,
- Frank Van Harmelen
In line with the general trend in artificial intelligence research to create intelligent systems that combine learning and symbolic components, a new sub-area has emerged that focuses on combining Machine Learning components with techniques developed by ...
Physical Unclonable Functions (PUF) for IoT Devices
Physical Unclonable Function (PUF) has recently attracted interest from both industry and academia as a potential alternative approach to secure Internet of Things (IoT) devices from the more traditional computational-based approach using conventional ...
A Survey of Threats to Research Literature-dependent Medical AI Solutions
Medical Artificial Intelligence (MedAI) harnesses the power of medical research through AI algorithms and vast data to address healthcare challenges. The security, integrity, and credibility of MedAI tools are paramount, because human lives are at stake. ...
Security Threats, Countermeasures, and Challenges of Digital Supply Chains
The rapid growth of Information Communication Technologies (ICT) has impacted many fields. In this context, the supply chain has also quickly evolved toward the digital supply chain where digital and electronic technologies have been integrated into every ...
Conceptual Modeling: Topics, Themes, and Technology Trends
Conceptual modeling is an important part of information systems development and use that involves identifying and representing relevant aspects of reality. Although the past decades have experienced continuous digitalization of services and products that ...
Detecting Mental Distresses Using Social Behavior Analysis in the Context of COVID-19: A Survey
- Sahraoui Dhelim,
- Liming Chen,
- Sajal K. Das,
- Huansheng Ning,
- Chris Nugent,
- Gerard Leavey,
- Dirk Pesch,
- Eleanor Bantry-White,
- Devin Burns
Online social media provides a channel for monitoring people’s social behaviors from which to infer and detect their mental distresses. During the COVID-19 pandemic, online social networks were increasingly used to express opinions, views, and moods due ...
Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech
Social media is a modern person’s digital voice to project and engage with new ideas and mobilise communities—a power shared with extremists. Given the societal risks of unvetted content-moderating algorithms for Extremism, Radicalisation, and Hate speech ...
A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development
Privacy and security are complex topics, raising a variety of considerations and requirements that can be challenging to implement in software development. Determining the security and privacy related factors that have an influence on software systems ...
Placement of Microservices-based IoT Applications in Fog Computing: A Taxonomy and Future Directions
The Fog computing paradigm utilises distributed, heterogeneous and resource-constrained devices at the edge of the network for efficient deployment of latency-critical and bandwidth-hungry IoT application services. Moreover, MicroService Architecture (MSA)...
Intel Software Guard Extensions Applications: A Survey
Data confidentiality is a central concern in modern computer systems and services, as sensitive data from users and companies are being increasingly delegated to such systems. Several hardware-based mechanisms have been recently proposed to enforce ...
Data Provenance in Security and Privacy
Provenance information corresponds to essential metadata that describes the entities, users, and processes involved in the history and evolution of a data object. The benefits of tracking provenance information have been widely understood in a variety of ...
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making even the most complex Machine Learning models available for clients via, e.g., a pay-per-query principle. This allows users to avoid time-consuming processes of data collection,...
A Survey on Run-time Power Monitors at the Edge
Effectively managing energy and power consumption is crucial to the success of the design of any computing system, helping mitigate the efficiency obstacles given by the downsizing of the systems while also being a valuable step towards achieving green ...
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey
The blockchain technology, initially created for cryptocurrency, has been re-purposed for recording state transitions of smart contracts—decentralized applications that can be invoked through external transactions. Smart contracts gained popularity and ...
A Systematic Review of Data Quality in CPS and IoT for Industry 4.0
- Arda Goknil,
- Phu Nguyen,
- Sagar Sen,
- Dimitra Politaki,
- Harris Niavis,
- Karl John Pedersen,
- Abdillah Suyuthi,
- Abhilash Anand,
- Amina Ziegenbein
The Internet of Things (IoT) and Cyber-Physical Systems (CPS) are the backbones of Industry 4.0, where data quality is crucial for decision support. Data quality in these systems can deteriorate due to sensor failures or uncertain operating environments. ...
Interpreting Adversarial Examples in Deep Learning: A Review
Deep learning technology is increasingly being applied in safety-critical scenarios but has recently been found to be susceptible to imperceptible adversarial perturbations. This raises a serious concern regarding the adversarial robustness of deep neural ...
The Security in Optical Wireless Communication: A Survey
With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, ...