-
Secured Network Architectures Based on Blockchain Technologies: A Systematic Review ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-25 Song-Kyoo Kim, Hou Cheng Vong
Blockchain applications have emerged in recent decades, among which blockchain secured-networks serve as a prevalent application. This paper provides the potential of networks secured by blockchain technology to enhance various domains and provides a structured view of the current landscape of blockchain applications, capturing the practical applications and potential of blockchain technology. Followed
-
A Container Security Survey: Exploits, Attacks, and Defenses ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-25 Omar Jarkas, Ryan Ko, Naipeng Dong, Redowan Mahmud
Containerization significantly boosts cloud computing efficiency by reducing resource consumption, enhancing scalability, and simplifying orchestration. Yet, these same features introduce notable security vulnerabilities due to the shared Linux kernel and reduced isolation compared to traditional virtual machines (VMs). This architecture, while resource-efficient, increases susceptibility to software
-
Performance Modeling of Public Permissionless Blockchains: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-24 Molud Esmaili, Ken Christensen
Public permissionless blockchains facilitate peer-to-peer digital transactions, yet face performance challenges, specifically minimizing transaction confirmation time to decrease energy and time consumption per transaction. Performance evaluation and prediction is crucial in achieving this objective, with performance modeling as a key solution despite the complexities involved in assessing these blockchains
-
Deep Learning Methods for Abstract Visual Reasoning: A Survey on Raven's Progressive Matrices ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-24 Mikołaj Małkiński, Jacek Mańdziuk
visual reasoning (AVR) domain encompasses problems solving which requires the ability to reason about relations among entities present in a given scene. While humans, generally, solve AVR tasks in a “natural” way, even without prior experience, this type of problems has proven difficult for current machine learning systems. The paper summarises recent progress in applying deep learning methods to solving
-
A Survey on Speech Deepfake Detection ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-24 Menglu Li, Yasaman Ahmadiadli, Xiao-Ping Zhang
The availability of smart devices leads to an exponential increase in multimedia content. However, advancements in deep learning have also enabled the creation of highly sophisticated deepfake content, including speech Deepfakes, which pose a serious threat by generating realistic voices and spreading misinformation. To combat this, numerous challenges have been organized to advance speech Deepfake
-
A Review on Trustworthiness of Digital Assistants for Personal Healthcare ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-22 Tania Bailoni, Mauro Dragoni
Artificial Intelligence (AI) is widely used within the healthcare domain. One of the branches of digital health concerns the design and development of digital assistant solutions. AI-enabled digital assistants highlighted the need to be trustworthy given their intrusiveness within people’s lives. Such solutions aim to provide intelligent tools to ease the management of care pathways or to enhance the
-
Recent Advances of Differential Privacy in Centralized Deep Learning: A Systematic Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-21 Lea Demelius, Roman Kern, Andreas Trügler
Differential Privacy has become a widely popular method for data protection in machine learning, especially since it allows formulating strict mathematical privacy guarantees. This survey provides an overview of the state-of-the-art of differentially private centralized deep learning, thorough analyses of recent advances and open problems, as well as a discussion of potential future developments in
-
Clustering on Attributed Graphs: From Single-view to Multi-view ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-21 Mengyao Li, Zhibang Yang, Xu Zhou, Yixiang Fang, Kenli Li, Keqin Li
Attributed graphs with both topological information and node information have prevalent applications in the real world, including recommendation systems, biological networks, community analysis, and so on. Recently, with rapid development of information gathering and extraction technology, the sources of data become more extensive and multi-view data attracts growing attention. Consequently, attributed
-
Deep Generative Models for Therapeutic Peptide Discovery: A Comprehensive Review ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-21 Leshan Lai, Yuansheng Liu, Bosheng Song, Keqin Li, Xiangxiang Zeng
Deep learning tools, especially deep generative models (DGMs), provide opportunities to accelerate and simplify the design of drugs. As drug candidates, peptides are superior to other biomolecules because they combine potency, selectivity, and low toxicity. This review examines the fundamental aspects of current DGMs for designing therapeutic peptide sequences. First, relevant databases in this field
-
Text Classification Using Graph Convolutional Networks: A Comprehensive Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-21 Syed Mustafa Haider Rizvi, Ramsha Imran, Arif Mahmood
Text classification is a quintessential and practical problem in natural language processing with applications in diverse domains such as sentiment analysis, fake news detection, medical diagnosis, and document classification. A sizable body of recent works exists where researchers have studied and tackled text classification from different angles with varying degrees of success. Graph convolution
-
Toward the Construction of Affective Brain-Computer Interface: A Systematic Review ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-20 Huayu Chen, Junxiang Li, Huanhuan He, Jing Zhu, Shuting Sun, Xiaowei Li, Bin Hu
Electroencephalogram(EEG)-based affective computing aims to recognize the emotional state, which is the core technology of affective brain-computer interface(aBCI). This concept encompasses aspects of physiological computing, human-computer interaction(HCI), mental health care, and brain-computer interfaces(BCI), presenting significant theoretical and practical value. However, the field reached a bottleneck
-
Getting the Data in Shape for Your Process Mining Analysis: An In-Depth Analysis of the Pre-Analysis Stage ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-18 Shameer K. Pradhan, Mieke Jans, Niels Martin
Process mining enables organizations to analyze the data stored in their information systems and derive insights regarding their business processes. However, raw data needs to be converted into a format that can be fed into process mining algorithms. Various pre-analysis activities can be performed on the raw data, such as imperfection removal or granularity level change. Although pre-analysis activities
-
A Survey of Multimodal Learning: Methods, Applications, and Future ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-18 Yuan Yuan, Zhaojian Li, Bin Zhao
The multimodal interplay of the five fundamental senses—Sight, Hearing, Smell, Taste, and Touch—provides humans with superior environmental perception and learning skills. Adapted from the human perceptual system, multimodal machine learning tries to incorporate different forms of input, such as image, audio, and text, and determine their fundamental connections through joint modeling. As one of the
-
Decoding Fake News and Hate Speech: A Survey of Explainable AI Techniques ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-17 Mikel Ngueajio, Saurav Aryal, Marcellin Atemkeng, Gloria Washington, Danda Rawat
This survey emphasizes the significance of Explainable AI (XAI) techniques in detecting hateful speech and misinformation/Fake news. It explores recent trends in detecting these phenomena, highlighting current research that reveals a synergistic relationship between them. Additionally, it presents recent trends in the use of XAI methods to mitigate the occurrences of hateful land Fake contents in conversations
-
Dense Video Captioning: A Survey of Techniques, Datasets and Evaluation Protocols ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-14 Iqra Qasim, Alexander Horsch, Dilip Prasad
Untrimmed videos have interrelated events, dependencies, context, overlapping events, object-object interactions, domain specificity, and other semantics that are worth highlighting while describing a video in natural language. Owing to such a vast diversity, a single sentence can only correctly describe a portion of the video. Dense Video Captioning (DVC) aims to detect and describe different events
-
Security and Privacy Challenges of Large Language Models: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-13 Badhan Chandra Das, M. Hadi Amini, Yanzhao Wu
Large language models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering. Nowadays, LLMs have become very popular tools in natural language processing (NLP) tasks, with the capability to analyze complicated linguistic patterns and provide relevant responses depending on the context
-
Natural Language Processing for Dialects of a Language: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-13 Aditya Joshi, Raj Dabre, Diptesh Kanojia, Zhuang Li, Haolan Zhan, Gholamreza Haffari, Doris Dippold
State-of-the-art natural language processing (NLP) models are trained on massive training corpora, and report a superlative performance on evaluation datasets. This survey delves into an important attribute of these datasets: the dialect of a language. Motivated by the performance degradation of NLP models for dialectal datasets and its implications for the equity of language technologies, we survey
-
Generative AI Empowered Network Digital Twins: Architecture, Technologies, and Applications ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-10 Tong Li, Qingyue Long, Haoye Chai, Shiyuan Zhang, Fenyu Jiang, Haoqiang Liu, Wenzhen Huang, Depeng Jin, Yong Li
The rapid advancement of mobile networks highlights the limitations of traditional network planning and optimization methods, particularly in modeling, evaluation, and application. Network Digital Twins, which simulate networks in the digital domain for evaluation, offer a solution to these challenges. This concept is further enhanced by generative AI technology, which promises more efficient and accurate
-
Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-10 Ikram Ullah, Munam Ali Shah, Abid Khan, Mohsen Guizani
Vehicular ad-hoc networks (VANETs) have revolutionized the world with smart traffic management, better utilizing the road environment, and providing safety and convenience to the vehicles’ drivers. Despite the useful features of VANETs, there are some privacy issues, which hinder their way toward achieving smarter and safer traffic in the world. Location privacy is one of the critical research challenges
-
Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-10 Xiaoli Tang, Han Yu
Artificial intelligence-empowred Real-Time Bidding (AIRTB) is regarded as one of the most enabling technologies for online advertising. It has attracted significant research attention from diverse fields such as pattern recognition, game theory and mechanism design. Despite of its remarkable development and deployment, the AIRTB system can sometimes harm the interest of its participants (e.g., depleting
-
A Comprehensive Review on Group Re-identification in Surveillance Videos ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-10 KAMAKSHYA NAYAK, Debi Prosad Dogra
Computer vision plays an important role in the automated analysis of human groups. The appearance of human groups has been studied for various reasons, including detection, identification, tracking, and re-identification. Person re-identification has been studied extensively over the last decade. Despite significant efforts by the computer vision research community, person re-identification often suffers
-
Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-09 Ruyue Xin, Jingye Wang, Peng Chen, Zhiming Zhao
Performance diagnosis systems are defined as detecting abnormal performance phenomena and play a crucial role in cloud applications. An effective performance diagnosis system is often developed based on artificial intelligence (AI) approaches, which can be summarized into a general framework from data to models. However, the AI-based framework has potential hazards that could degrade the user experience
-
Deep Learning on Network Traffic Prediction: Recent Advances, Analysis, and Future Directions ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-06 Ons Aouedi, Van An Le, Kandaraj Piamrat, Yusheng Ji
From the perspective of telecommunications, next-generation networks or beyond 5G will inevitably face the challenge of a growing number of users and devices. Such growth results in high-traffic generation with limited network resources. Thus, the analysis of the traffic and the precise forecast of user demands is essential for developing an intelligent network. In this line, Machine Learning (ML)
-
Data-centric Artificial Intelligence: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-06 Daochen Zha, Zaid Pervaiz Bhat, Kwei-Herng Lai, Fan Yang, Zhimeng Jiang, Shaochen Zhong, Xia Hu
Artificial Intelligence (AI) is making a profound impact in almost every domain. A vital enabler of its great success is the availability of abundant and high-quality data for building machine learning models. Recently, the role of data in AI has been significantly magnified, giving rise to the emerging concept of data-centric AI . The attention of researchers and practitioners has gradually shifted
-
Can Graph Neural Networks be Adequately Explained? A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-06 Xuyan Li, Jie Wang, Zheng Yan
To address the barrier caused by the black-box nature of Deep Learning (DL) for practical deployment, eXplainable Artificial Intelligence (XAI) has emerged and is developing rapidly. While significant progress has been made in explanation techniques for DL models targeted to images and texts, research on explaining DL models for graph data is still in its infancy. As Graph Neural Networks (GNNs) have
-
An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-06 Mohammed Jubur, PrakashPrakash Shrestha, Nitesh Saxena
Passwords remain the primary authentication method in online services, a domain increasingly crucial in our digital age. However, passwords suffer from several well-documented security and usability issues. Addressing these concerns, password managers and two-factor authentication (2FA) have emerged as key solutions. This paper examines these methods with a focus on enhancing password security without
-
Regulating Information and Network Security: Review and Challenges ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-06 Tayssir Bouraffa, Kai-Lung Hui
The rapid expansion of internet activities in daily life has elevated cyberattacks to a significant global threat. As a result, protecting the networks and systems of industries, organizations, and individuals against cybercrimes has become an increasingly critical challenge. This monograph provides a comprehensive review and analysis of national, international, and industry regulations on cybercrimes
-
Characterization of Android Malwares and their families ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-06 Tejpal Sharma, Dhavleesh Rattan
Nowadays, smartphones have made our lives easier and have become essential gadgets for us. Apart from calling, mobiles are used for various purposes, such as banking, chatting, data storage, connecting to the internet and running apps which make life easier. Therefore, attackers are developing new methods or malware to steal smartphone data. Primarily, the study outlines various types of Android malware
-
A Survey on Online Aggression: Content Detection and Behavioural Analysis on Social Media Platforms ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-04 Swapnil Mane, Suman Kundu, Rajesh Sharma
The proliferation of social media has increased cyber-aggressive behavior behind the freedom of speech, posing societal risks from online anonymity to real-world consequences. This article systematically reviews Aggression Content Detection and Behavioral Analysis to address these risks. Content detection is vital for handling explicit aggression, and behavior analysis offers insights into underlying
-
A survey of heuristics for profile and wavefront reductions ACM Comput. Surv. (IF 23.8) Pub Date : 2025-01-03 Sanderson Gonzaga de Oliveira
This paper surveys heuristic methods for profile and wavefront reductions. These graph layout problems represent a challenge for optimization methods and heuristics especially. This paper presents the graph layout problems with their formal definition. The study provides an ample perspective of techniques for designing heuristic methods for these graph layout problems but concentrates on the approaches
-
A Survey of Geometric Optimization for Deep Learning: From Euclidean Space to Riemannian Manifold ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-26 Yanhong Fei, Yingjie Liu, Chentao Jia, Zhengyu Li, Xian Wei, Mingsong Chen
Deep Learning (DL) has achieved remarkable success in tackling complex Artificial Intelligence tasks. The standard training of neural networks employs backpropagation to compute gradients and utilizes various optimization algorithms in the Euclidean space \(\mathbb {R}^n \) . However, this optimization process faces challenges, such as the local optimal issues and the problem of gradient vanishing
-
Privacy-preserved and Responsible Recommenders: From Conventional Defense to Federated Learning and Blockchain ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-19 Waqar Ali, Xiangmin Zhou, Jie Shao
Recommender systems (RS) play an integral role in many online platforms. Exponential growth and potential commercial interests are raising significant concerns around privacy, security, fairness, and overall responsibility. The existing literature around responsible recommendation services is diverse and multi-disciplinary. Most literature reviews cover a specific aspect or a single technology for
-
ISP Meets Deep Learning: A Survey on Deep Learning Methods for Image Signal Processing ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-19 Claudio Filipi Goncalves dos Santos, Rodrigo Reis Arrais, Jhessica Victoria Santos da Silva, Matheus Henrique Marques da Silva, Wladimir Barroso Guedes de Araujo Neto, Leonardo Tadeu Lopes, Guilherme Augusto Bileki, Iago Oliveira Lima, Lucas Borges Rondon, Bruno Melo de Souza, Mayara Costa Regazio, Rodolfo Coelho Dalapicola, Arthur Alves Tasca
The entire Image Signal Processor (ISP) of a camera relies on several processes to transform the data from the Color Filter Array (CFA) sensor, such as demosaicing, denoising, and enhancement. These processes can be executed either by some hardware or via software. In recent years, Deep Learning(DL) has emerged as one solution for some of them or even to replace the entire ISP using a single neural
-
Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-18 Maxwell Standen, Junae Kim, Claudia Szabo
Multi-Agent Reinforcement Learning (MARL) is susceptible to Adversarial Machine Learning (AML) attacks. Execution-time AML attacks against MARL are complex due to effects that propagate across time and between agents. To understand the interaction between AML and MARL, this survey covers attacks and defences for MARL, Multi-Agent Learning (MAL), and Deep Reinforcement Learning (DRL). This survey proposes
-
Intelligent Generation of Graphical Game Assets: A Conceptual Framework and Systematic Review of the State of the Art ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-18 Kaisei Fukaya, Damon Daylamani-Zad, Harry Agius
Procedural content generation (PCG) can be applied to a wide variety of tasks in games, from narratives, levels and sounds, to trees and weapons. A large amount of game content is comprised of graphical assets , such as clouds, buildings or vegetation, that do not require gameplay function considerations. There is also a breadth of literature examining the procedural generation of such elements for
-
Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-18 Firas Bayram, Bestoun S. Ahmed
Artificial intelligence (AI), and especially its sub-field of Machine Learning (ML), are impacting the daily lives of everyone with their ubiquitous applications. In recent years, AI researchers and practitioners have introduced principles and guidelines to build systems that make reliable and trustworthy decisions. From a practical perspective, conventional ML systems process historical data to extract
-
A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-16 Zhifan Lai, Zikai Chang, Mingrui Sha, Qihong Zhang, Ning Xie, Changsheng Chen, Dusit (Tao) Niyato
The open and broadcast nature of wireless mediums introduces significant security vulnerabilities, making authentication a critical concern in wireless networks. In recent years, Physical-Layer Authentication (PLA) techniques have garnered considerable research interest due to their advantages over Upper-Layer Authentication (ULA) methods, such as lower complexity, enhanced security, and greater compatibility
-
Visual Content Privacy Protection: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-16 Ruoyu Zhao, Yushu Zhang, Tao Wang, Wenying Wen, Yong Xiang, Xiaochun Cao
Vision is the most important sense for people, and it is also one of the main ways of cognition. As a result, people tend to utilize visual content to capture and share their life experiences, which greatly facilitates the transfer of information. Meanwhile, it also increases the risk of privacy violations, e.g., an image or video can reveal different kinds of privacy-sensitive information. Scholars
-
Distributed Machine Learning in Edge Computing: Challenges, Solutions and Future Directions ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-13 Jingke Tu, Lei Yang, Jiannong Cao
Distributed machine learning on edges is widely used in intelligent transportation, smart home, industrial manufacturing, and underground pipe network monitoring to achieve low latency and real time data processing and prediction. However, the presence of a large number of sensing and edge devices with limited computing, storage, and communication capabilities prevents the deployment of huge machine
-
A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-10 Xianzhi Zhang, Yipeng Zhou, Di Wu, Quan Z. Sheng, Shazia Riaz, Miao Hu, Linchang Xiao
Caching content at the edge network is a popular and effective technique widely deployed to alleviate the burden of network backhaul, shorten service delay and improve service quality. However, there has been some controversy over privacy violations in caching content at the edge network. On the one hand, the multi-access open edge network provides an ideal entrance or interface for external attackers
-
Recent Advances of Foundation Language Models-based Continual Learning: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-09 Yutao Yang, Jie Zhou, Xuanwen Ding, Tianyu Huai, Shunyu Liu, Qin Chen, Yuan Xie, Liang He
Recently, foundation language models (LMs) have marked significant achievements in the domains of natural language processing (NLP) and computer vision (CV). Unlike traditional neural network models, foundation LMs obtain a great ability for transfer learning by acquiring rich commonsense knowledge through pre-training on extensive unsupervised datasets with a vast number of parameters. Despite these
-
A Survey of AI-Generated Content (AIGC) ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-06 Yihan Cao, Siyu Li, Yixin Liu, Zhiling Yan, Yutong Dai, Philip Yu, Lichao Sun
Recently, Artificial Intelligence Generated Content (AIGC) has gained significant attention from society, especially with the rise of Generative AI (GAI) techniques such as ChatGPT, GPT-4 [165], DALL-E-3 [184], and Sora [137]. AIGC involves using AI models to create digital content, such as images, music, and natural language, with the goal of making the content creation process more efficient and
-
Weakly-supervised Semantic Segmentation with Image-level Labels: From Traditional Models to Foundation Models ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-06 Zhaozheng Chen, Qianru Sun
The rapid development of deep learning has driven significant progress in image semantic segmentation—a fundamental task in computer vision. Semantic segmentation algorithms often depend on the availability of pixel-level labels (i.e., masks of objects), which are expensive, time-consuming, and labor-intensive. Weakly-supervised semantic segmentation (WSSS) is an effective solution to avoid such labeling
-
Adversarial Binaries: AI-guided Instrumentation Methods for Malware Detection Evasion ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-06 Luke Koch, Edmon Begoli
Adversarial binaries are executable files that have been altered without loss of function by an AI agent in order to deceive malware detection systems. Progress in this emergent vein of research has been constrained by the complex and rigid structure of executable files. Although prior work has demonstrated that these binaries deceive a variety of malware classification models which rely on disparate
-
LiDAR-Based Place Recognition For Autonomous Driving: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-05 Yongjun Zhang, Pengcheng Shi, Jiayuan Li
LiDAR has gained popularity in autonomous driving due to advantages like long measurement distance, rich 3D information, and stability in harsh environments. Place Recognition (PR) enables vehicles to identify previously visited locations despite variations in appearance, weather, and viewpoints, even determining their global location within prior maps. This capability is crucial for accurate localization
-
The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-05 PHANI KRISHNA BULASARA, Somya Sahoo, Nitin Gupta, Zhu Han, Neeraj Kumar
The Internet of Bio-Nano Things (IoBNT) is collaborative cell biology and nanodevice technology interacting through Molecular Communication (MC). The IoBNT can be accomplished by using the Information and Communication Theory (ICT) study of biological networks. Various technologies such as the Internet of Nano Things (IoNT), the Internet of Bio-degradable Things (IoBDT) and the Internet of Ingestible
-
Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review ACM Comput. Surv. (IF 23.8) Pub Date : 2024-12-02 Ahmet Oztoprak, Reza Hassanpour, Aysegul Ozkan, Kasim Oztoprak
Wireless Sensor Networks (WSNs) represent an innovative technology that integrates compact, energy-efficient sensors with wireless communication functionalities, facilitating instantaneous surveillance and data gathering from the surrounding environment. WSNs are utilized across diverse domains, such as environmental monitoring, industrial automation, healthcare, smart agriculture, home automation
-
IoT Authentication Protocols: Challenges, and Comparative Analysis ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-30 Amar Alsheavi, Ammar Hawbani, Wajdy Othman, XINGFU WANG, Gamil Qaid, Liang Zhao, Ahmed Al-Dubai, Liu Zhi, A.S. Ismail, Rutvij Jhaveri, Saeed Alsamhi, Mohammed A. A. Al-qaness
In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a subject of intricate security challenges spawned by its multifaceted manifestations. Central to securing IoT infrastructures is the crucial aspect of authentication
-
When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-30 Dan Tang, Rui Dai, Yudong Yan, Keqin Li, Wei Liang, Zheng Qin
Low-rate threats are a class of attack vectors that are disruptive and stealthy, typically crafted for security vulnerabilities. They have been the significant concern for cyber security, impacting both conventional IP-based networks and emerging Software-Defined Networking (SDN). SDN is a revolutionary architecture that separates the control and data planes, offering advantages such as enhanced manageability
-
A Systematic Literature Review of Enterprise Architecture Evaluation Methods ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-30 Norbert Rudolf Busch, Andrzej Zalewski
Enterprise Architecture (EA) is a systematic and holistic approach to designing and managing an organization's information systems components, aiding in optimizing resources, managing risk, and facilitating change. It weighs different architectural quality attributes against each other to achieve the most advantageous architecture. However, the evaluation of EA lacks a systematic approach. This study
-
Object Selection and Manipulation in VR Headsets: Research Challenges, Solutions, and Success Measurements ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-30 Difeng Yu, Tilman Dingler, Eduardo Velloso, Jorge Goncalves
Object selection and manipulation are the foundation of VR interactions. With the rapid development of VR technology and the field of virtual object selection and manipulation, the literature demands a structured understanding of the core research challenges and a critical reflection of the current practices. To provide such understanding and reflections, we systematically reviewed 106 papers. We identified
-
Resource-efficient Algorithms and Systems of Foundation Models: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-29 Mengwei Xu, Dongqi Cai, Wangsong Yin, Shangguang Wang, Xin Jin, Xuanzhe Liu
Large foundation models, including large language models, vision transformers, diffusion, and LLM-based multimodal models, are revolutionizing the entire machine learning lifecycle, from training to deployment. However, the substantial advancements in versatility and performance these models offer come at a significant cost in terms of hardware resources. To support the growth of these large models
-
SoK: Access Control Policy Generation from High-level Natural Language Requirements ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-28 Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello
Administrator-centered access control failures can cause data breaches, putting organizations at risk of financial loss and reputation damage. Existing graphical policy configuration tools and automated policy generation frameworks attempt to help administrators configure and generate access control policies by avoiding such failures. However, graphical policy configuration tools are prone to human
-
Wi-Fi Sensing Techniques for Human Activity Recognition: Brief Survey, Potential Challenges, and Research Directions ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-25 Fucheng Miao, Youxiang Huang, Zhiyi Lu, Tomoaki Ohtsuki, Guan Gui, Hikmet Sari
Recent advancements in wireless communication technologies have made Wi-Fi signals indispensable in both personal and professional settings. The utilization of these signals for Human Activity Recognition (HAR) has emerged as a cutting-edge technology. By leveraging the fluctuations in Wi-Fi signals for HAR, this approach offers enhanced privacy compared to traditional visual surveillance methods.
-
AI-powered Fraud Detection in Decentralized Finance: A Project Life Cycle Perspective ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-25 Bingqiao Luo, Zhen Zhang, Qian Wang, Anli Ke, Shengliang Lu, Bingsheng He
Decentralized finance (DeFi) represents a novel financial system but faces significant fraud challenges, leading to substantial losses. Recent advancements in artificial intelligence (AI) show potential for complex fraud detection. Despite growing interest, a systematic review of these methods is lacking. This survey correlates fraud types with DeFi project stages, presenting a taxonomy based on the
-
Explainable Artificial Intelligence: Importance, Use Domains, Stages, Output Shapes, and Challenges ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-23 Naeem Ullah, Javed Ali Khan, Ivanoe De Falco, Giovanna Sannino
There is an urgent need in many application areas for eXplainable ArtificiaI Intelligence (XAI) approaches to boost people’s confidence and trust in Artificial Intelligence methods. Current works concentrate on specific aspects of XAI and avoid a comprehensive perspective. This study undertakes a systematic survey of importance, approaches, methods, and application domains to address this gap and provide
-
Causal Discovery from Temporal Data: An Overview and New Perspectives ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-23 Chang Gong, Chuzhe Zhang, Di Yao, Jingping Bi, Wenbin Li, YongJun Xu
Temporal data, representing chronological observations of complex systems, has always been a typical data structure that can be widely generated by many domains, such as industry, finance, healthcare and climatology. Analyzing the underlying structures, i.e. , the causal relations, could be extremely valuable for various applications. Recently, causal discovery from temporal data has been considered
-
Racial Bias within Face Recognition: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-22 Seyma Yucer, Furkan Tektas, Noura Al Moubayed, Toby Breckon
Facial recognition is one of the most academically studied and industrially developed areas within computer vision where we readily find associated applications deployed globally. This widespread adoption has uncovered significant performance variation across subjects of different racial profiles leading to focused research attention on racial bias within face recognition spanning both current causation
-
A Survey of Machine Learning for Urban Decision Making: Applications in Planning, Transportation, and Healthcare ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-22 Yu Zheng, Qianyue Hao, Jingwei Wang, Changzheng Gao, Jinwei Chen, Depeng Jin, Yong Li
Developing smart cities is vital for ensuring sustainable development and improving human well-being. One critical aspect of building smart cities is designing intelligent methods to address various decision-making problems that arise in urban areas. As machine learning techniques continue to advance rapidly, a growing body of research has been focused on utilizing these methods to achieve intelligent
-
Tool Learning with Foundation Models ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-21 Yujia Qin, Shengding Hu, Yankai Lin, Weize Chen, Ning Ding, Ganqu Cui, Zheni Zeng, Xuanhe Zhou, Yufei Huang, Chaojun Xiao, Chi Han, Yi Ren Fung, Yusheng Su, Huadong Wang, Cheng Qian, Runchu Tian, Kunlun Zhu, Shihao Liang, Xingyu Shen, Bokai Xu, Zhen Zhang, Yining Ye, Bowen Li, Ziwei Tang, Jing Yi, Yuzhang Zhu, Zhenning Dai, Lan Yan, Xin Cong, Yaxi Lu, Weilin Zhao, Yuxiang Huang, Junxi Yan, Xu Han,
Humans possess an extraordinary ability to create and utilize tools. With the advent of foundation models, artificial intelligence systems have the potential to be equally adept in tool use as humans. This paradigm, which is dubbed as tool learning with foundation models , combines the strengths of tools and foundation models to achieve enhanced accuracy, efficiency, and automation in problem-solving