-
Private and Secure Distributed Deep Learning: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-16 Corinne Allaart, Saba Amiri, Henri Bal, Adam Belloum, Leon Gommans, Aart van Halteren, Sander Klous
Traditionally, deep learning practitioners would bring data into a central repository for model training and inference. Recent developments in distributed learning, such as federated learning and deep learning as a service (DLaaS) do not require centralized data and instead push computing to where the distributed datasets reside. These decentralized training schemes, however, introduce additional security
-
Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: A Comprehensive Review ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-15 Shaobo Zhang, Yimeng Pan, Qin Liu, Zheng Yan, Kim-Kwang Raymond Choo, Guojun Wang
Since the emergence of security concerns in artificial intelligence (AI), there has been significant attention devoted to the examination of backdoor attacks. Attackers can utilize backdoor attacks to manipulate model predictions, leading to significant potential harm. However, current research on backdoor attacks and defenses in both theoretical and practical fields still has many shortcomings. To
-
Systematic Review of Generative Modelling Tools and Utility Metrics for Fully Synthetic Tabular Data ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-14 Anton Danholt Lautrup, Tobias Hyrup, Arthur Zimek, Peter Schneider-Kamp
Sharing data with third parties is essential for advancing science, but it is becoming more and more difficult with the rise of data protection regulations, ethical restrictions, and growing fear of misuse. Fully synthetic data, which transcends anonymisation, may be the key to unlocking valuable untapped insights stored away in secured data vaults. This review examines current synthetic data generation
-
Acceleration for Deep Reinforcement Learning using Parallel and Distributed Computing: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-14 Zhihong Liu, Xin Xu, Peng Qiao, DongSheng Li
Deep reinforcement learning has led to dramatic breakthroughs in the field of artificial intelligence for the past few years. As the amount of rollout experience data and the size of neural networks for deep reinforcement learning have grown continuously, handling the training process and reducing the time consumption using parallel and distributed computing is becoming an urgent and essential desire
-
Democratizing Container Live Migration for Enhanced Future Networks - A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-14 Wissem Soussi, Gürkan Gür, Burkhard Stiller
Emerging cloud-centric networks span from edge clouds to large-scale datacenters with shared infrastructure among multiple tenants and applications with high availability, isolation, fault tolerance, security, and energy efficiency demands. Live migration (LiMi) plays an increasingly critical role in these environments by enabling seamless application mobility covering the edge-to-cloud continuum and
-
Membership Inference Attacks and Defenses in Federated Learning: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-14 Li Bai, Haibo Hu, Qingqing Ye, Haoyang Li, Leixia Wang, Jianliang Xu
Federated learning is a decentralized machine learning approach where clients train models locally and share model updates to develop a global model. This enables low-resource devices to collaboratively build a high-quality model without requiring direct access to the raw training data. However, despite only sharing model updates, federated learning still faces several privacy vulnerabilities. One
-
A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-08 Xiaojie Wang, Zhonghui Zhao, Ling Yi, Zhaolong Ning, Lei Guo, F. Richard Yu, Song Guo
The increasing popularity of Unmanned Aerial Vehicle (UAV) swarms is attributed to their ability to generate substantial returns for various industries at a low cost. Additionally, in the future landscape of wireless networks, UAV swarms can serve as airborne base stations, alleviating the scarcity of communication resources. However, UAV swarm networks are vulnerable to various security threats that
-
Security and Privacy on Generative Data in AIGC: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-07 Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Xia Zhihua, Jian Weng
The advent of artificial intelligence-generated content (AIGC) represents a pivotal moment in the evolution of information technology. With AIGC, it can be effortless to generate high-quality data that is challenging for the public to distinguish. Nevertheless, the proliferation of generative data across cyberspace brings security and privacy issues, including privacy leakages of individuals and media
-
Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-06 Sabrina Sicari, Jesus F. Cevallos M., Alessandra Rizzardi, Alberto Coen-Porisini
This survey summarizes the most recent methods for building and assessing helpful, honest, and harmless neural language models, considering small, medium, and large-size models. Pointers to open-source resources that help to align pre-trained models are given, including methods that use parameter-efficient techniques, specialized prompting frameworks, adapter modules, case-specific knowledge injection
-
A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-02 Shamsher Ullah, Jianqiang Li, Jie Chen, IKRAM ALI, Salabat Khan, Abdul Ahad, Farhan Ullah, Victor Leung
A delay, interruption, or failure in the wireless connection has a significant impact on the performance of wirelessly connected medical equipment. Researchers presented the fastest technological innovations and industrial changes to address these problems and improve the applications of information and communication technology. The development of the 6G communication infrastructure was greatly aided
-
Fog Computing Technology Research: A Retrospective Overview and Bibliometric Analysis ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-02 Paola Vinueza-Naranjo, Janneth Chicaiza, Ruben Rumipamba-Zambrano
Researchers’ interest in Fog Computing and its application in different sectors has been increasing since the last decade. To discover the emerging trends inherent to this architecture, we analyzed the scientific literature indexed in Scopus through a bibliometric study. Exposing trends in areas of development will allow researchers to understand the changes and evolution over time. For analysis purposes
-
Evaluation Methodologies in Software Protection Research ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-02 Bjorn De Sutter, Sebastian Schrittwieser, Bart Coppens, Patrick Kochberger
Man-at-the-end (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware authors want to prevent such attacks. This has driven an arms race between attackers and defenders, resulting in a plethora of different protection and analysis methods. However, it remains
-
Gender Bias in Natural Language Processing and Computer Vision: A Comparative Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-11-02 Marion Bartl, Abhishek Mandal, Susan Leavy, Suzanne Little
Taking an interdisciplinary approach to surveying issues around gender bias in textual and visual AI, we present literature on gender bias detection and mitigation in NLP, CV, as well as combined visual-linguistic models. We identify conceptual parallels between these strands of research as well as how methodologies were adapted cross-disciplinary from NLP to CV. We also find that there is a growing
-
Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-30 Junhao Dong, Junxi Chen, Xiaohua Xie, Jianhuang Lai, Hao Chen
Deep learning techniques have achieved superior performance in computer-aided medical image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in potential misdiagnosis in clinical practice. Oppositely, recent years have also witnessed remarkable progress in defense against these tailored adversarial examples in deep medical diagnosis systems. In this exposition
-
Backdoor Attacks against Voice Recognition Systems: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-26 Baochen Yan, Jiahe Lan, Zheng Yan
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and speaker recognition. They have been widely deployed in various real-world applications, from intelligent voice assistance to telephony surveillance and biometric authentication. However, prior research has revealed the vulnerability of VRSs to backdoor attacks, which pose a significant threat to the security and privacy
-
Taxonomy and Survey of Collaborative Intrusion Detection System using Federated Learning ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-25 Aulia Arif Wardana, Parman Sukarno
This review paper looks at recent research on Federated Learning (FL) for Collaborative Intrusion Detection Systems (CIDS) to establish a taxonomy and survey. The motivation behind this review comes from the difficulty of detecting coordinated cyberattacks in large-scale distributed networks. Collaborative anomalies are one of the network anomalies that need to be detected through robust collaborative
-
A Review on Blockchain Technology, Current Challenges, and AI-Driven Solutions ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-24 Moetez Abdelhamid, Layth Sliman, Raoudha Ben Djemaa, Guido Perboli
Blockchain provides several advantages, including decentralization, data integrity, traceability, and immutability. However, despite its advantages, blockchain suffers from significant limitations, including scalability, resource greediness, governance complexity, and some security related issues. These limitations prevent its adoption in mainstream applications. Artificial Intelligence (AI) can help
-
Modality deep-learning frameworks for fake news detection on social networks: a systematic literature review ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-23 Mohamed Mostafa, Ahmad S Almogren, Muhammad Al-Qurishi, Majed Alrubaian
Fake news on social networks is a challenging problem due to the rapid dissemination and volume of information, as well as the ease of creating and sharing content anonymously. Fake news stories are problematic not only for the credibility of online journalism, but also due to their detrimental real-world consequences. The primary research objective of this study is: What are the recent state-of-the-art
-
Single-Document Abstractive Text Summarization: A Systematic Literature Review ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-18 Abishek Rao, Shivani Aithal, Sanjay Singh
ive text summarization is a task in natural language processing that automatically generates the summary from the source document in a human-written form with minimal loss of information. Research in text summarization has shifted towards abstractive text summarization due to its challenging aspects. This study provides a broad systematic literature review of abstractive text summarization on single-document
-
A Systematic Mapping Study on Quantum and Quantum-inspired Algorithms in Operations Research ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-18 Cláudio Gomes, João Paulo Fernandes, Gabriel Falcao, Soummya Kar, Sridhar Tayur
Quantum and quantum-inspired algorithms have not yet been systematically classified in the context of potential Operations Research (OR) applications. Our systematic mapping is designed for quick consultation and shows which algorithms have been significantly explored in the context of OR, as well as which algorithms have been vaguely addressed in the same context. The study provides rapid access to
-
Security and Reliability of Internet of Underwater Things: Architecture, Challenges, and Opportunities ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-17 Bin Jiang, Jiacheng Feng, Xuerong Cui, Jian Wang, Yongxin Liu, Houbing Song
The Internet of Underwater Things (IoUT) pertains to a system that utilizes technology of Internet of Things (IoT) for data collection, communication, and control in the underwater environment. The monitoring and management of various parameters in the underwater domain are gathered through the deployment of underwater sensors, communication devices, and controllers. It is crucial in emerging ocean
-
Cold Start Latency in Serverless Computing: A Systematic Review, Taxonomy, and Future Directions ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-17 Muhammed GOLEC, GUNEET KAUR WALIA, MOHIT KUMAR, FELIX CUADRADO, Sukhpal Singh Gill, STEVE UHLIG
Recently, academics and the corporate sector have paid attention to serverless computing, which enables dynamic scalability and an economic model. In serverless computing, users only pay for the time they actually use resources, enabling zero scaling to optimise cost and resource utilisation. However, this approach also introduces the serverless cold start problem. Researchers have developed various
-
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-16 Bo Zhang, Yansong Gao, Boyu Kuang, Changlong Yu, Anmin Fu, Willy Susilo
In recent years, frequent Advanced Persistent Threat (APT) attacks have caused disastrous damage to critical facilities, leading to severe information leakages, economic losses, and even social disruptions. Via sophisticated, long-term, and stealthy network intrusions, APT attacks are often beyond the capabilities of traditional intrusion detection methods. Existing methods employ various techniques
-
A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future Directions ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-16 Sheng Zhou, Hongjia Xu, Zhuonan Zheng, Jiawei Chen, Zhao Li, Jiajun Bu, Jia Wu, Xin Wang, Wenwu Zhu, Martin Ester
Clustering is a fundamental machine learning task which aims at assigning instances into groups so that similar samples belong to the same cluster while dissimilar samples belong to different clusters. Shallow clustering methods usually assume that data are collected and expressed as feature vectors within which clustering is performed. However, clustering high-dimensional data, such as images, texts
-
Multi-modal Misinformation Detection: Approaches, Challenges and Opportunities ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-15 Sara Abdali, Sina Shaham, Bhaskar Krishnamachari
As social media platforms evolve from text-based forums into multi-modal environments, the nature of misinformation in social media is also transforming accordingly. Taking advantage of the fact that visual modalities such as images and videos are more favorable and attractive to users, and textual content is sometimes skimmed carelessly, misinformation spreaders have recently targeted contextual connections
-
Green IN Artificial Intelligence from a Software perspective: State-of-the-Art and Green Decalogue ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-15 María Gutiérrez, Mª Angeles Moraga, Félix Garcia, Coral Calero
This work presents a structured view of the state-of-the-art research on Artificial Intelligence (AI), from the point of view of efficiency and reduction of the energy consumption of AI Software. We analysed the current research on energy consumption of AI algorithms and its improvements, which gave us a starting literature corpus of 2688 papers that we identified as Green AI with a software perspective
-
Learning-based Artificial Intelligence Artwork: Methodology Taxonomy and Quality Evaluation ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-15 Qian Wang, Hong-NingH Dai, Jinghua Yang, Cai Guo, Peter Childs, Maaike Kleinsmann, Yike Guo, Pan Wang
With the development of the theory and technology of computer science, machine or computer painting is increasingly being explored in the creation of art. Machine-made works are referred to as artificial intelligence (AI) artworks. Early methods of AI artwork generation have been classified as non-photorealistic rendering (NPR) and, latterly, neural-style transfer methods have also been investigated
-
A Systematic Literature Review on Multi-Robot Task Allocation ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-14 Athira K A, Divya Udayan J, Umashankar Subramaniam
Muti-Robot system is gaining attention and is one of the critical areas of research when it comes to robotics. Coordination among multiple robots and how different tasks are allocated to different system agents are being studied. The objective of this Systematic Literature Review (SLR) is to provide insights on the recent advancement in Multi Robot Task Allocation(MRTA) problems emphasizing promising
-
A Comprehensive Survey on Rare Event Prediction ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-14 Chathurangi Shyalika, Ruwan Wickramarachchi, Amit P. Sheth
Rare event prediction involves identifying and forecasting events with a low probability using machine learning (ML) and data analysis. Due to the imbalanced data distributions, where the frequency of common events vastly outweighs that of rare events, it requires using specialized methods within each step of the ML pipeline, i.e., from data processing to algorithms to evaluation protocols. Predicting
-
A Survey on IoT Programming Platforms: A Business-Domain Experts Perspective ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-14 Fatma-Zohra Hannou, Maxime Lefrançois, Pierre Jouvelot, Victor Charpenay, Antoine Zimmermann
The vast growth and digitalization potential offered by the Internet of Things (IoT) is hindered by substantial barriers in accessibility, interoperability, and complexity, mainly affecting small organizations and non-technical entities. This survey paper provides a detailed overview of the landscape of IoT programming platforms, focusing specifically on the development support they offer for varying
-
On Efficient Training of Large-Scale Deep Learning Models ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-11 Li Shen, Yan Sun, Zhiyuan Yu, Liang Ding, Xinmei Tian, Dacheng Tao
The field of deep learning has witnessed significant progress in recent times, particularly in areas such as computer vision (CV), natural language processing (NLP), and speech. The use of large-scale models trained on vast amounts of data holds immense promise for practical applications, enhancing industrial productivity and facilitating social development. However, it extremely suffers from the unstable
-
A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-11 Nima Shiri Harzevili, Alvine Boaye Belle, Junjie Wang, Song Wang, Zhen Ming (Jack) Jiang, Nachiappan Nagappan
In recent years, numerous Machine Learning (ML) models, including Deep Learning (DL) and classic ML models, have been developed to detect software vulnerabilities. However, there is a notable lack of comprehensive and systematic surveys that summarize, classify, and analyze the applications of these ML models in software vulnerability detection. This absence may lead to critical research areas being
-
Artificial Intelligence to Support the Training and Assessment of Professionals: A Systematic Literature Review ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-10 Mariano Albaladejo-González, José A. Ruipérez-Valiente, Félix Gómez Mármol
Advances in Artificial Intelligence (AI) and sensors are significantly impacting multiple areas, including education and workplaces. Following the PRISMA methodology, this review explores the current status of using AI to support the training and assessment of professionals. We examined 83 research papers, analyzing: (1) the targeted professionals, (2) the skills assessed, (3) the AI algorithms utilized
-
Mathematical Information Retrieval: A Review ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-09 Pankaj Dadure, Partha Pakray, Sivaji Bandyopadhyay
Mathematical formulas are commonly used to demonstrate theories and basic fundamentals in the Science, Technology, Engineering, and Mathematics (STEM) domain. The burgeoning research in the STEM domain results in the mass production of scientific documents that contain both textual and mathematical terms. In scientific information, the definition of mathematical formulas is expressed through context
-
A Comprehensive Survey of Studies on Predicting Anatomical Therapeutic Chemical Classes of Drugs ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-08 Pranab Das, Dilwar Hussain Mazumder
Drug classification plays a crucial role in contemporary drug discovery, design, and development. Determining the Anatomical Therapeutic Chemical (ATC) classes for new drugs is a laborious, costly, and intricate process, often requiring multiple clinical trial phases. Computational models offer significant benefits by accelerating drug evaluation, reducing complexity, and lowering costs; however, challenges
-
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-08 Tianyi Wang, Xin Liao, Kam Pui Chow, Xiaodong Lin, Yinglong Wang
The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the existing Deepfake detection studies from the reliability perspective. We identify three reliability-oriented research challenges in the current Deepfake detection domain: transferability
-
Empowering Agrifood System with Artificial Intelligence: A Survey of the Progress, Challenges and Opportunities ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-07 Tao Chen, Liang Lv, Di Wang, Jing Zhang, Yue Yang, Zeyang Zhao, Chen Wang, Xiaowei Guo, Hao Chen, Qingye Wang, Yufei Xu, Qiming Zhang, Bo Du, Liangpei Zhang, Dacheng Tao
With the world population rapidly increasing, transforming our agrifood systems to be more productive, efficient, safe, and sustainable is crucial to mitigate potential food shortages. Recently, artificial intelligence (AI) techniques such as deep learning (DL) have demonstrated their strong abilities in various areas, including language, vision, remote sensing (RS), and agrifood systems applications
-
Knowledge Editing for Large Language Models: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-07 Song Wang, Yaochen Zhu, Haochen Liu, Zaiyi Zheng, Chen Chen, Jundong Li
Large Language Models (LLMs) have recently transformed both the academic and industrial landscapes due to their remarkable capacity to understand, analyze, and generate texts based on their vast knowledge and reasoning ability. Nevertheless, one major drawback of LLMs is their substantial computational cost for pre-training due to their unprecedented amounts of parameters. The disadvantage is exacerbated
-
Early-Exit Deep Neural Network - A Comprehensive Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-07 Haseena Rahmath P, Vishal Srivastava, Kuldeep Chaurasia, Roberto G. Pacheco, Rodrigo S. Couto
Deep neural networks (DNNs) typically have a single exit point that makes predictions by running the entire stack of neural layers. Since not all inputs require the same amount of computation to reach a confident prediction, recent research has focused on incorporating multiple ”exits” into the conventional DNN architecture. Early-exit DNNs are multi-exit neural networks that attach many side branches
-
Co-clustering: a Survey of the Main Methods, Recent Trends and Open Problems ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-04 Elena Battaglia, Federico Peiretti, Ruggero Gaetano Pensa
Since its early formulations, co-clustering has gained popularity and interest both within and outside the machine learning community as a powerful learning paradigm for clustering high-dimensional data with good explainability properties. The simultaneous partitioning of all the modes of the input data tensors (rows and columns in a data matrix) is both a method for improving clustering on one mode
-
Knowledge-based Cyber Physical Security at Smart Home: A Review ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-03 Azhar Alsufyani, Omar Rana, Charith Perera
Smart-home systems represent the future of modern building infrastructure as they integrate numerous devices and applications to improve the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies and algorithmic controls to monitor and manage physical environments. However, ensuring robust security in smart homes, along with securing smart
-
A Systematic Review of Privacy Policy Literature ACM Comput. Surv. (IF 23.8) Pub Date : 2024-10-01 Yousra Javed, Ayesha Sajid
An organization’s privacy policy states how it collects, stores, processes, and shares its users’ personal information. The growing number of data protection laws and regulations as well as the numerous sectors where the organizations are collecting user information, has led to the investigation of privacy policies with regards to their accessibility, readability, completeness, comparison with organization’s
-
Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-30 Hamed Alqahtani, Gulshan Kumar
Electric and Flying Vehicles (EnFVs) represent a transformative shift in transportation, promising enhanced efficiency and reduced environmental impact. However, their integration into interconnected digital ecosystems poses significant cybersecurity challenges, including cyber-physical threats, privacy vulnerabilities, and supply chain risks. This paper comprehensively explores these challenges and
-
Explaining the Explainers in Graph Neural Networks: a Comparative Study ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-24 Antonio Longa, Steve Azzolin, Gabriele Santin, Giulia Cencetti, Pietro Lio, Bruno Lepri, Andrea Passerini
Following a fast initial breakthrough in graph based learning, Graph Neural Networks (GNNs) have reached a widespread application in many science and engineering fields, prompting the need for methods to understand their decision process. GNN explainers have started to emerge in recent years, with a multitude of methods both novel or adapted from other domains. To sort out this plethora of alternative
-
The Role of Multi-Agents in Digital Twin Implementation: Short Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-24 Kalyani Yogeswaranathan, Rem Collier
In recent years, Digital Twin (DT) technology has emerged as a significant technological advancement. A digital twin is a digital representation of a physical asset that mirrors its data model, behaviour, and interactions with other physical assets. Digital Twin aims to achieve adaptability, seamless data integration, modelling, simulation, automation, and real-time data management. The primary goal
-
Deep Learning Aided Intelligent Reflective Surfaces for 6G: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-23 Muhammad Tariq, Sohail Ahmad, Ahmad Jan Mian, Houbing Song
The envisioned sixth-generation (6G) networks anticipate robust support for diverse applications, including massive machine-type communications, ultra-reliable low-latency communications, and enhanced mobile broadband. Intelligent Reflecting Surfaces (IRS) have emerged as a key technology capable of intelligently reconfiguring wireless propagation environments, thereby enhancing overall network performance
-
Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-21 Álvaro Sobrinho, Matheus Vilarim, Amanda Barbosa, Edmar Candeia Gurjão, Danilo F. S. Santos, Dalton Valadares, Leandro Dias da Silva
Ensuring the security of vertical applications in fifth-generation (5G) mobile communication systems and previous generations is crucial. These systems must prioritize maintaining the confidentiality, integrity, and availability of services and data. Examples of vertical applications include smart cities, smart transportation, public services, Industry 4.0, smart grids, smart health, and smart agriculture
-
A Survey of Protocol Fuzzing ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-21 Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Bing Mao, Yuekang Li, Yaowen Zheng, Yeting Li, Li Pan, Yang Liu, Robert Deng
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities within their implementations pose significant security threats. Recent developments have seen a surge in fuzzing-based research dedicated to uncovering these vulnerabilities within protocol implementations. However, there still lacks a systematic overview of protocol fuzzing for answering the essential questions
-
Spatio-Temporal Predictive Modeling Techniques for Different Domains: a Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-20 Rahul Kumar, Manish Bhanu, João Mendes-Moreira, Joydeep Chandra
Spatio-temporal prediction tasks play a crucial role in facilitating informed decision-making through anticipatory insights. By accurately predicting future outcomes, the ability to strategize, preemptively address risks, and minimize their potential impact is enhanced. The precision in forecasting spatial and temporal patterns holds significant potential for optimizing resource allocation, land utilization
-
Machine Learning for Actionable Warning Identification: A Comprehensive Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-19 Xiuting Ge, Chunrong Fang, Xuanye Li, Weisong Sun, Daoyuan Wu, Juan Zhai, Shang-Wei Lin, Zhihong Zhao, Yang Liu, Zhenyu Chen
Actionable Warning Identification (AWI) plays a crucial role in improving the usability of static code analyzers. With recent advances in Machine Learning (ML), various approaches have been proposed to incorporate ML techniques into AWI. These ML-based AWI approaches, benefiting from ML’s strong ability to learn subtle and previously unseen patterns from historical data, have demonstrated superior
-
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-19 Kai Huang, Zhengzi Xu, Su Yang, Hongyu Sun, Xuejun Li, Zheng Yan, Yuqing Zhang
With the rapid development and large-scale popularity of program software, modern society increasingly relies on software systems. However, the problems exposed by software have also come to the fore. The software bug has become an important factor troubling developers. In this context, Automated Program Repair (APR) techniques have emerged, aiming to automatically fix software bug problems and reduce
-
Causal representation learning through higher-level information extraction ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-19 Francisco Silva, Hélder P. Oliveira, Tania Pereira
The large gap between the generalization level of state-of-the-art machine learning and human learning systems calls for the development of artificial intelligence (AI) models that are truly inspired by human cognition. In tasks related to image analysis, searching for pixel-level regularities has reached a power of information extraction still far from what humans capture with image-based observations
-
A Systematic Review on Graph Neural Network-based Methods for Stock Market Forecasting ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-19 Manali Patel, Krupa Jariwala, CHIRANJOY CHATTOPADHYAY
Financial technology (FinTech) is a field that uses artificial intelligence to automate financial services. One area of FinTech is stock analysis, which aims to predict future stock prices in order to develop investment strategies that maximize profits. Traditional methods of stock market prediction, such as time series analysis and machine learning, struggle to handle the non-linear, chaotic, and
-
A Survey on Video Diffusion Models ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-18 Zhen Xing, Qijun Feng, Haoran Chen, Qi Dai, Han Hu, Hang Xu, Zuxuan Wu, Yu-Gang Jiang
The recent wave of AI-generated content (AIGC) has witnessed substantial success in computer vision, with the diffusion model playing a crucial role in this achievement. Due to their impressive generative capabilities, diffusion models are gradually superseding methods based on GANs and auto-regressive Transformers, demonstrating exceptional performance not only in image generation and editing, but
-
Graph and Sequential Neural Networks in Session-based Recommendation: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-18 Zihao Li, Chao Yang, Yakun Chen, Xianzhi Wang, Hongxu Chen, Guandong Xu, Lina Yao, Michael Sheng
Recent years have witnessed the remarkable success of recommendation systems (RSs) in alleviating the information overload problem. As a new paradigm of RSs, session-based recommendation (SR) specializes in users’ short-term preferences and aims to provide a more dynamic and timely recommendation based on ongoing interactions. This survey presents a comprehensive overview of the recent works on SR
-
A Survey of Mix-based Data Augmentation: Taxonomy, Methods, Applications, and Explainability ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-17 Chengtai Cao, Fan Zhou, Yurou Dai, Jianping Wang, Kunpeng Zhang
Data augmentation (DA) is indispensable in modern machine learning and deep neural networks. The basic idea of DA is to construct new training data to improve the model’s generalization by adding slightly disturbed versions of existing data or synthesizing new data. This survey comprehensively reviews a crucial subset of DA techniques, namely Mix-based Data Augmentation (MixDA), which generates novel
-
Survey on Quality Assurance of Smart Contracts ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-14 Zhiyuan Wei, Jing Sun, Zijian Zhang, Xianhao Zhang, Xiaoxuan Yang, Liehuang Zhu
As blockchain technology continues to advance, the secure deployment of smart contracts has become increasingly prevalent, underscoring the critical need for robust security measures. This surge in usage has led to a rise in security breaches, often resulting in substantial financial losses for users. This paper presents a comprehensive survey of smart contract quality assurance, from understanding
-
Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-14 Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris
Security Operations Centres (SOCs) are specialised facilities where security analysts leverage advanced technologies to monitor, detect, and respond to cyber incidents. However, the increasing volume of security incidents has overwhelmed security analysts, leading to alert fatigue. Effective alert prioritisation (AP) becomes crucial to address this problem through the utilisation of proper criteria
-
State of the Art and Potentialities of Graph-level Learning ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-13 Zhenyu Yang, Ge Zhang, Jia Wu, Jian Yang, Quan Z. Sheng, Shan Xue, Chuan Zhou, Charu Aggarwal, Hao Peng, Wenbin Hu, Edwin Hancock, Pietro Liò
Graphs have a superior ability to represent relational data, like chemical compounds, proteins, and social networks. Hence, graph-level learning, which takes a set of graphs as input, has been applied to many tasks including comparison, regression, classification, and more. Traditional approaches to learning a set of graphs heavily rely on hand-crafted features, such as substructures. While these methods
-
Multimodal Recommender Systems: A Survey ACM Comput. Surv. (IF 23.8) Pub Date : 2024-09-10 Qidong Liu, Jiaxi Hu, Yutian Xiao, Xiangyu Zhao, Jingtong Gao, Wanyu Wang, Qing Li, Jiliang Tang
The recommender system (RS) has been an integral toolkit of online services. They are equipped with various deep learning techniques to model user preference based on identifier and attribute information. With the emergence of multimedia services, such as short videos, news and etc. , understanding these contents while recommending becomes critical. Besides, multimodal features are also helpful in