Issue Downloads
Distributed Graph Neural Network Training: A Survey
Graph neural networks (GNNs) are a type of deep learning models that are trained on graphs and have been successfully applied in various domains. Despite the effectiveness of GNNs, it is still challenging for GNNs to efficiently scale to large graphs. As ...
Social Network Analysis: A Survey on Process, Tools, and Application
- Shashank Sheshar Singh,
- Samya Muhuri,
- Shivansh Mishra,
- Divya Srivastava,
- Harish Kumar Shakya,
- Neeraj Kumar
Due to the explosive rise of online social networks, social network analysis (SNA) has emerged as a significant academic field in recent years. Understanding and examining social relationships in networks through network analysis opens up numerous ...
A Systematic Literature Review on Maintenance of Software Containers
Nowadays, cloud computing is gaining tremendous attention to deliver information via the internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual machines on the same physical machine and thus results in improving ...
Survey on Haptic Feedback through Sensory Illusions in Interactive Systems
A growing body of work in human-computer interaction (HCI), particularly work on haptic feedback and haptic displays, relies on sensory illusions, which is a phenomenon investigated in perception research. However, an overview of which illusions are ...
A Survey on Robotic Prosthetics: Neuroprosthetics, Soft Actuators, and Control Strategies
The field of robotics is a quickly evolving feat of technology that accepts contributions from various genres of science. Neuroscience, Physiology, Chemistry, Material science, Computer science, and the wide umbrella of mechatronics have all ...
A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions
Cyber resilience has become a major concern for both academia and industry due to the increasing number of data breaches caused by the expanding attack surface of existing IT infrastructure. Cyber resilience refers to an organisation’s ability to prepare ...
Computational Techniques in PET/CT Image Processing for Breast Cancer: A Systematic Mapping Review
The problem arises from the lack of sufficient and comprehensive information about the necessary computer techniques. These techniques are crucial for developing information systems that assist doctors in diagnosing breast cancer, especially those related ...
A Survey on Content Retrieval on the Decentralised Web
The control, governance, and management of the web have become increasingly centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives have emerged to address these issues, beginning with decentralised file systems. ...
Scenario-based Adaptations of Differential Privacy: A Technical Survey
Differential privacy has been a de facto privacy standard in defining privacy and handling privacy preservation. It has had great success in scenarios of local data privacy and statistical dataset privacy. As a primitive definition, standard differential ...
A Comprehensive Review and New Taxonomy on Superpixel Segmentation
- Isabela Borlido Barcelos,
- Felipe De Castro Belém,
- Leonardo De Melo João,
- Zenilton K. G. Do Patrocínio,
- Alexandre Xavier Falcão,
- Silvio Jamil Ferzoli Guimarães
Superpixel segmentation consists of partitioning images into regions composed of similar and connected pixels. Its methods have been widely used in many computer vision applications, since it allows for reducing the workload, removing redundant ...
Mobile Near-infrared Sensing—A Systematic Review on Devices, Data, Modeling, and Applications
Mobile near-infrared sensing is becoming an increasingly important method in many research and industrial areas. To help consolidate progress in this area, we use the PRISMA guidelines to conduct a systematic review of mobile near-infrared sensing, ...
A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems
Concerns for the resilience of Cyber-Physical Systems (CPS)s in critical infrastructure are growing. CPS integrate sensing, computation, control, and networking into physical objects and mission-critical services, connecting traditional infrastructure to ...
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective
Existing surveys and reviews on Influential Node Ranking Methods (INRMs) have primarily focused on technical details, neglecting thorough research on verifying the actual influence of these nodes in a network. This oversight may result in erroneous ...
Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey
Building a secure and privacy-preserving health data sharing framework is a topic of great interest in the healthcare sector, but its success is subject to ensuring the privacy of user data. We clarified the definitions of privacy, confidentiality and ...
A Survey on Software Vulnerability Exploitability Assessment
Knowing the exploitability and severity of software vulnerabilities helps practitioners prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many different exploitability assessment methods. The goal of this research is to ...
Rearrangement Distance Problems: An updated survey
- Andre Rodrigues Oliveira,
- Klairton Lima Brito,
- Alexsandro Oliveira Alexandrino,
- Gabriel Siqueira,
- Ulisses Dias,
- Zanoni Dias
One of the challenges in the Comparative Genomics field is to infer how close two organisms are based on the similarities and differences between their genetic materials. Recent advances in DNA sequencing have made complete genomes increasingly available. ...
A Taxonomy and Survey on Grid-Based Routing Protocols Designed for Wireless Sensor Networks
Minimization of energy consumption is the main attention of researchers while developing a routing protocol for wireless sensor networks, as sensor nodes are equipped with limited power supply. Virtual topology is an integral part of routing, and grid-...
A Survey on the Densest Subgraph Problem and its Variants
The Densest Subgraph Problem requires us to find, in a given graph, a subset of vertices whose induced subgraph maximizes a measure of density. The problem has received a great deal of attention in the algorithmic literature since the early 1970s, with ...
Semantic Data Integration and Querying: A Survey and Challenges
- Maroua Masmoudi,
- Sana Ben Abdallah Ben Lamine,
- Mohamed Hedi Karray,
- Bernard Archimede,
- Hajer Baazaoui Zghal
Digital revolution produces massive, heterogeneous and isolated data. These latter remain underutilized, unsuitable for integrated querying and knowledge discovering. Hence the importance of this survey on data integration which identifies challenging ...
From Conventional to Programmable Matter Systems: A Review of Design, Materials, and Technologies
Programmable matter represents a system of elements whose interactions can be programmed for a certain behavior to emerge (e.g., color, shape) upon suitable commands (e.g., instruction, stimuli) by altering its physical characteristics. Even though its ...
Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory Works
Cyber-physical systems (CPS) have experienced rapid growth in recent decades. However, like any other computer-based systems, malicious attacks evolve mutually, driving CPS to undesirable physical states, and potentially causing catastrophes. Although the ...
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets
Attributing a piece of malware to its creator typically requires threat intelligence. Binary attribution increases the level of difficulty as it mostly relies upon the ability to disassemble binaries to obtain authorship-related features. We perform a ...
FairSNA: Algorithmic Fairness in Social Network Analysis
In recent years, designing fairness-aware methods has received much attention in various domains, including machine learning, natural language processing, and information retrieval. However, in social network analysis (SNA), designing fairness-aware ...
How many FIDO protocols are needed? Analysing the technology, security and compliance
To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap between user friendly interfaces and advanced security features, the Fast IDentity Online (FIDO) alliance defined a number of authentication protocols. The existing ...
Machine Learning in Metaverse Security: Current Solutions and Future Challenges
The Metaverse, positioned as the next frontier of the Internet, has the ambition to forge a virtual shared realm characterized by immersion, hyper-spatiotemporal dynamics, and self-sustainability. Recent technological strides in AI, Extended Reality, 6G, ...