首页 > 最新文献

Computer Science Review最新文献

英文 中文
A comprehensive review on applications of Raspberry Pi 树莓派应用综述
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-05-01 DOI: 10.1016/j.cosrev.2024.100636
Sudha Ellison Mathe , Hari Kishan Kondaveeti , Suseela Vappangi , Sunny Dayal Vanambathina , Nandeesh Kumar Kumaravelu

Raspberry Pi is an invaluable and popular prototyping tool in scientific research for experimenting with a wide variety of ideas, ranging from simple to complex projects. This review article explores how Raspberry Pi is used in various studies, discussing its pros and cons along with its applications in various domains such as home automation, agriculture, healthcare, industrial control, and advanced research. Our aim is to provide a useful resource for researchers, educators, students, product developers, and enthusiasts, helping them to grasp the current status and discover new research possibilities using Raspberry Pi.

在科学研究中,Raspberry Pi 是一种宝贵而流行的原型工具,可用于实验从简单到复杂的各种项目。这篇综述文章探讨了 Raspberry Pi 在各种研究中的应用,讨论了它的优缺点以及在家庭自动化、农业、医疗保健、工业控制和高级研究等各个领域的应用。我们的目的是为研究人员、教育工作者、学生、产品开发人员和爱好者提供有用的资源,帮助他们掌握 Raspberry Pi 的现状并发现新的研究可能性。
{"title":"A comprehensive review on applications of Raspberry Pi","authors":"Sudha Ellison Mathe ,&nbsp;Hari Kishan Kondaveeti ,&nbsp;Suseela Vappangi ,&nbsp;Sunny Dayal Vanambathina ,&nbsp;Nandeesh Kumar Kumaravelu","doi":"10.1016/j.cosrev.2024.100636","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100636","url":null,"abstract":"<div><p>Raspberry Pi is an invaluable and popular prototyping tool in scientific research for experimenting with a wide variety of ideas, ranging from simple to complex projects. This review article explores how Raspberry Pi is used in various studies, discussing its pros and cons along with its applications in various domains such as home automation, agriculture, healthcare, industrial control, and advanced research. Our aim is to provide a useful resource for researchers, educators, students, product developers, and enthusiasts, helping them to grasp the current status and discover new research possibilities using Raspberry Pi.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140917835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks 基于生成式对抗网络的复杂智能系统行为建模概览
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-04-27 DOI: 10.1016/j.cosrev.2024.100635
Yali Lv , Jingpu Duan , Xiong Li

This paper provides an extensive and in-depth survey of behavior modeling for complex intelligent systems, focusing specifically on the innovative applications of Generative Adversarial Networks (GANs). The survey not only delves into the fundamental principles of GANs, but also elucidates their pivotal role in accurately modeling the behaviors exhibited by complex intelligent systems. By categorizing behavior modeling into prediction and learning, this survey meticulously examines the current landscape of research in each domain, shedding light on the latest advancements and methodologies driven by GANs. Furthermore, the paper offers insights into both the theoretical underpinnings and practical implications of GANs in behavior modeling for complex intelligent systems, and proposes potential future research directions to advance the field. Overall, this comprehensive survey serves as a valuable resource for researchers, practitioners, and scholars seeking to deepen their understanding of behavior modeling using GANs and to chart a course for future exploration and innovation in this dynamic field.

本文对复杂智能系统的行为建模进行了广泛而深入的研究,尤其侧重于生成对抗网络(GANs)的创新应用。该研究不仅深入探讨了生成对抗网络的基本原理,还阐明了生成对抗网络在准确模拟复杂智能系统行为方面的关键作用。本调查报告将行为建模分为预测和学习两类,仔细研究了每个领域的研究现状,揭示了由 GANs 推动的最新进展和方法。此外,本文还深入探讨了 GANs 在复杂智能系统行为建模中的理论基础和实际意义,并提出了未来推动该领域发展的潜在研究方向。总之,对于希望加深对使用 GANs 进行行为建模的理解,并为这一动态领域的未来探索和创新指明方向的研究人员、从业人员和学者来说,这份全面的调查报告是一份宝贵的资源。
{"title":"A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks","authors":"Yali Lv ,&nbsp;Jingpu Duan ,&nbsp;Xiong Li","doi":"10.1016/j.cosrev.2024.100635","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100635","url":null,"abstract":"<div><p>This paper provides an extensive and in-depth survey of behavior modeling for complex intelligent systems, focusing specifically on the innovative applications of Generative Adversarial Networks (GANs). The survey not only delves into the fundamental principles of GANs, but also elucidates their pivotal role in accurately modeling the behaviors exhibited by complex intelligent systems. By categorizing behavior modeling into prediction and learning, this survey meticulously examines the current landscape of research in each domain, shedding light on the latest advancements and methodologies driven by GANs. Furthermore, the paper offers insights into both the theoretical underpinnings and practical implications of GANs in behavior modeling for complex intelligent systems, and proposes potential future research directions to advance the field. Overall, this comprehensive survey serves as a valuable resource for researchers, practitioners, and scholars seeking to deepen their understanding of behavior modeling using GANs and to chart a course for future exploration and innovation in this dynamic field.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140650636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harnessing Heterogeneous Information Networks: A systematic literature review 利用异构信息网络:系统文献综述
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-04-27 DOI: 10.1016/j.cosrev.2024.100633
Leila Outemzabet , Nicolas Gaud , Aurélie Bertaux , Christophe Nicolle , Stéphane Gerart , Sébastien Vachenc

The integration of multiple heterogeneous data into graph models has been the subject of extensive research in recent years. Harnessing these resulting Heterogeneous Information Networks (HINs) is a complex task that requires reasoning to perform various prediction tasks.

In the last decade, multiple Artificial Intelligence (AI) approaches have been developed to bridge the gap between the abundance of diverse data within various fields, their heterogeneity and complexity within HINs. A focus has been directed on developing graph-oriented algorithms that can effectively analyze and leverage the rich information in HINs.

Given the sheer volume of approaches being developed, selecting the most suitable one for a specific objective has become a daunting challenge. This article reviews the recent advances in AI methods for modeling and analyzing HINs. It proposes a cartography of these approaches, structured as a pipeline, offering diverse options at each stage. This structured framework aims to guide practitioners in choosing the most fitting methods based on the nature of their data and specific objectives.

近年来,将多种异构数据整合到图模型中一直是广泛研究的主题。在过去的十年中,人们开发了多种人工智能(AI)方法,以弥补各领域丰富多样的数据与 HIN 中的异构性和复杂性之间的差距。鉴于开发的方法数量庞大,为特定目标选择最合适的方法已成为一项艰巨的挑战。本文回顾了用于 HINs 建模和分析的人工智能方法的最新进展。文章提出了这些方法的结构图,作为一个流水线,在每个阶段提供不同的选择。这一结构化框架旨在指导从业人员根据数据性质和具体目标选择最合适的方法。
{"title":"Harnessing Heterogeneous Information Networks: A systematic literature review","authors":"Leila Outemzabet ,&nbsp;Nicolas Gaud ,&nbsp;Aurélie Bertaux ,&nbsp;Christophe Nicolle ,&nbsp;Stéphane Gerart ,&nbsp;Sébastien Vachenc","doi":"10.1016/j.cosrev.2024.100633","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100633","url":null,"abstract":"<div><p>The integration of multiple heterogeneous data into graph models has been the subject of extensive research in recent years. Harnessing these resulting Heterogeneous Information Networks (HINs) is a complex task that requires reasoning to perform various prediction tasks.</p><p>In the last decade, multiple Artificial Intelligence (AI) approaches have been developed to bridge the gap between the abundance of diverse data within various fields, their heterogeneity and complexity within HINs. A focus has been directed on developing graph-oriented algorithms that can effectively analyze and leverage the rich information in HINs.</p><p>Given the sheer volume of approaches being developed, selecting the most suitable one for a specific objective has become a daunting challenge. This article reviews the recent advances in AI methods for modeling and analyzing HINs. It proposes a cartography of these approaches, structured as a pipeline, offering diverse options at each stage. This structured framework aims to guide practitioners in choosing the most fitting methods based on the nature of their data and specific objectives.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140807234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey 跨站脚本攻击被揭露已有 22 年:系统映射和全面调查
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-04-23 DOI: 10.1016/j.cosrev.2024.100634
Abdelhakim Hannousse , Salima Yahiouche , Mohamed Cherif Nait-Hamoud

Cross-site scripting (XSS) is one of the major threats menacing the privacy of data and the navigation of trusted web applications. Since its disclosure in late 1999 by Microsoft security engineers, several techniques have been developed with the aim of securing web navigation and protecting web applications against XSS attacks. XSS has been and is still in the top 10 list of web vulnerabilities reported by the Open Web Applications Security Project (OWASP). Consequently, handling XSS attacks has become one of the major concerns of several web security communities. Despite the numerous studies that have been conducted to combat XSS attacks, the attacks continue to rise. This motivates the study of how the interest in XSS attacks has evolved over the years, what has already been achieved to prevent these attacks, and what is missing to restrain their prevalence. In this paper, we conduct a systematic mapping and a comprehensive survey with the aim of answering all these questions. We summarize and categorize existing endeavors that aim to handle XSS attacks and develop XSS-free web applications. The systematic mapping yielded 157 high-quality published studies. By thoroughly analyzing those studies, a comprehensive taxonomy is drawn out outlining various techniques used to prevent, detect, protect, and defend against XSS attacks and vulnerabilities. The study of the literature revealed a remarkable interest bias toward basic (84.71%) and JavaScript (81.63%) XSS attacks as well as a dearth of vulnerability repair mechanisms and tools (only 1.48%). Notably, existing vulnerability detection techniques focus solely on single-page detection, overlooking flaws that may span across multiple pages. Furthermore, the study brought to the forefront the limitations and challenges of existing attack detection and defense techniques concerning machine learning and content-security policies. Consequently, we strongly advocate the development of more suitable detection and defense techniques, along with an increased focus on addressing XSS vulnerabilities through effective detection (hybrid solutions) and repair strategies. Additionally, there is a pressing need for more high-quality studies to overcome the limitations of promising approaches such as machine learning and content-security policies while also addressing diverse XSS attacks in different languages. Hopefully, this study can serve as guidance for both the academic and practitioner communities in the development of XSS-free web applications.

跨站脚本(XSS)是威胁数据隐私和可信网络应用程序导航的主要威胁之一。自从微软公司的安全工程师于 1999 年底披露了这一漏洞以来,已经开发出了多种技术,旨在确保网络导航安全和保护网络应用程序免受 XSS 攻击。XSS 一直是开放式网络应用安全项目(OWASP)报告的十大网络漏洞之一。因此,处理 XSS 攻击已成为多个网络安全社区关注的主要问题之一。尽管针对 XSS 攻击开展了大量研究,但攻击仍在继续增加。这就促使我们研究 XSS 攻击的兴趣在过去几年中是如何演变的,在防止这些攻击方面已经取得了哪些成果,在抑制其流行方面还缺少哪些东西。在本文中,我们进行了一次系统的摸底和全面的调查,旨在回答所有这些问题。我们对旨在处理 XSS 攻击和开发无 XSS 网络应用程序的现有工作进行了总结和分类。通过系统性映射,我们获得了 157 项高质量的已发表研究。通过对这些研究的深入分析,我们总结出了一个全面的分类法,概述了用于预防、检测、保护和防御 XSS 攻击和漏洞的各种技术。文献研究表明,人们对基本 XSS 攻击(84.71%)和 JavaScript XSS 攻击(81.63%)的兴趣明显偏向于基本 XSS 攻击,而对漏洞修复机制和工具的兴趣却很低(仅为 1.48%)。值得注意的是,现有的漏洞检测技术只关注单页面检测,忽略了可能跨越多个页面的漏洞。此外,这项研究还凸显了现有攻击检测和防御技术在机器学习和内容安全策略方面的局限性和挑战。因此,我们强烈主张开发更合适的检测和防御技术,同时更加关注通过有效的检测(混合解决方案)和修复策略来解决 XSS 漏洞。此外,我们迫切需要进行更多高质量的研究,以克服机器学习和内容安全策略等有前途的方法的局限性,同时解决不同语言的各种 XSS 攻击问题。希望本研究能为学术界和实践界开发无 XSS 网络应用程序提供指导。
{"title":"Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey","authors":"Abdelhakim Hannousse ,&nbsp;Salima Yahiouche ,&nbsp;Mohamed Cherif Nait-Hamoud","doi":"10.1016/j.cosrev.2024.100634","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100634","url":null,"abstract":"<div><p>Cross-site scripting (XSS) is one of the major threats menacing the privacy of data and the navigation of trusted web applications. Since its disclosure in late 1999 by Microsoft security engineers, several techniques have been developed with the aim of securing web navigation and protecting web applications against XSS attacks. XSS has been and is still in the top 10 list of web vulnerabilities reported by the Open Web Applications Security Project (OWASP). Consequently, handling XSS attacks has become one of the major concerns of several web security communities. Despite the numerous studies that have been conducted to combat XSS attacks, the attacks continue to rise. This motivates the study of how the interest in XSS attacks has evolved over the years, what has already been achieved to prevent these attacks, and what is missing to restrain their prevalence. In this paper, we conduct a systematic mapping and a comprehensive survey with the aim of answering all these questions. We summarize and categorize existing endeavors that aim to handle XSS attacks and develop XSS-free web applications. The systematic mapping yielded 157 high-quality published studies. By thoroughly analyzing those studies, a comprehensive taxonomy is drawn out outlining various techniques used to prevent, detect, protect, and defend against XSS attacks and vulnerabilities. The study of the literature revealed a remarkable interest bias toward basic (84.71%) and JavaScript (81.63%) XSS attacks as well as a dearth of vulnerability repair mechanisms and tools (only 1.48%). Notably, existing vulnerability detection techniques focus solely on single-page detection, overlooking flaws that may span across multiple pages. Furthermore, the study brought to the forefront the limitations and challenges of existing attack detection and defense techniques concerning machine learning and content-security policies. Consequently, we strongly advocate the development of more suitable detection and defense techniques, along with an increased focus on addressing XSS vulnerabilities through effective detection (hybrid solutions) and repair strategies. Additionally, there is a pressing need for more high-quality studies to overcome the limitations of promising approaches such as machine learning and content-security policies while also addressing diverse XSS attacks in different languages. Hopefully, this study can serve as guidance for both the academic and practitioner communities in the development of XSS-free web applications.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140638499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions 关于聊天机器人、人工智能驱动的虚拟对话代理、ChatGPT 的当代综述:应用、公开挑战和未来研究方向
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-04-09 DOI: 10.1016/j.cosrev.2024.100632
Avyay Casheekar, Archit Lahiri, Kanishk Rath, Kaushik Sanjay Prabhakar, Kathiravan Srinivasan

This review paper offers an in-depth analysis of AI-powered virtual conversational agents, specifically focusing on OpenAI’s ChatGPT. The main contributions of this paper are threefold: (i) an exhaustive review of prior literature on chatbots, (ii) a background of chatbots including existing chatbots/conversational agents like ChatGPT, and (iii) a UI/UX design analysis of prominent chatbots. Another contribution of this review is the comprehensive exploration of ChatGPT’s applications across a multitude of sectors, including education, business, public health, and more. This review highlights the transformative potential of ChatGPT, despite the challenges it faces such as hallucination, biases in training data, jailbreaks, and anonymous data collection. The review paper then presents a comprehensive survey of prior literature reviews on chatbots, identifying gaps in the prior work and highlighting the need for further research in areas such as chatbot evaluation, user experience, and ethical considerations. The paper also provides a detailed analysis of the UI/UX design of prominent chatbots, including their conversational flow, visual design, and user engagement. The paper also identifies key future research directions, including mitigating language bias, enhancing ethical decision-making capabilities, improving user interaction and personalization, and developing robust governance frameworks. By solving these issues, we can ensure that AI chatbots like ChatGPT are used responsibly and effectively across a broad variety of applications. This review will be a valuable resource for researchers and practitioners in understanding the current state and future potential of AI chatbots like ChatGPT.

本综述论文深入分析了人工智能驱动的虚拟会话代理,特别关注 OpenAI 的 ChatGPT。本文的主要贡献有三个方面:(i) 对以前有关聊天机器人的文献进行了详尽回顾;(ii) 介绍了聊天机器人的背景,包括 ChatGPT 等现有聊天机器人/对话代理;(iii) 对著名聊天机器人的 UI/UX 设计进行了分析。本综述的另一个贡献是全面探讨了 ChatGPT 在教育、商业、公共卫生等多个领域的应用。尽管 ChatGPT 面临着幻觉、训练数据偏差、越狱和匿名数据收集等挑战,但这篇综述强调了 ChatGPT 的变革潜力。然后,综述论文对之前有关聊天机器人的文献综述进行了全面调查,找出了之前工作中的不足,并强调了在聊天机器人评估、用户体验和伦理考虑等领域进一步研究的必要性。论文还详细分析了著名聊天机器人的用户界面/用户体验设计,包括对话流程、视觉设计和用户参与。论文还确定了未来的主要研究方向,包括减轻语言偏见、增强伦理决策能力、改善用户互动和个性化,以及开发强大的管理框架。通过解决这些问题,我们可以确保像 ChatGPT 这样的人工智能聊天机器人在各种应用中得到负责任和有效的使用。本综述将成为研究人员和从业人员了解 ChatGPT 等人工智能聊天机器人的现状和未来潜力的宝贵资源。
{"title":"A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions","authors":"Avyay Casheekar,&nbsp;Archit Lahiri,&nbsp;Kanishk Rath,&nbsp;Kaushik Sanjay Prabhakar,&nbsp;Kathiravan Srinivasan","doi":"10.1016/j.cosrev.2024.100632","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100632","url":null,"abstract":"<div><p>This review paper offers an in-depth analysis of AI-powered virtual conversational agents, specifically focusing on OpenAI’s ChatGPT. The main contributions of this paper are threefold: (i) an exhaustive review of prior literature on chatbots, (ii) a background of chatbots including existing chatbots/conversational agents like ChatGPT, and (iii) a UI/UX design analysis of prominent chatbots. Another contribution of this review is the comprehensive exploration of ChatGPT’s applications across a multitude of sectors, including education, business, public health, and more. This review highlights the transformative potential of ChatGPT, despite the challenges it faces such as hallucination, biases in training data, jailbreaks, and anonymous data collection. The review paper then presents a comprehensive survey of prior literature reviews on chatbots, identifying gaps in the prior work and highlighting the need for further research in areas such as chatbot evaluation, user experience, and ethical considerations. The paper also provides a detailed analysis of the UI/UX design of prominent chatbots, including their conversational flow, visual design, and user engagement. The paper also identifies key future research directions, including mitigating language bias, enhancing ethical decision-making capabilities, improving user interaction and personalization, and developing robust governance frameworks. By solving these issues, we can ensure that AI chatbots like ChatGPT are used responsibly and effectively across a broad variety of applications. This review will be a valuable resource for researchers and practitioners in understanding the current state and future potential of AI chatbots like ChatGPT.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges 基于物联网的 DDoS 攻击检测的人工智能技术:分类法、综合评述和研究挑战
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-03-30 DOI: 10.1016/j.cosrev.2024.100631
Bindu Bala , Sunny Behal

Distributed Denial of Service (DDoS) attacks in IoT networks are one of the most devastating and challenging cyber-attacks. The number of IoT users is growing exponentially due to the increase in IoT devices over the past years. Consequently, DDoS attack has become the most prominent attack as vulnerable IoT devices are becoming victims of it. In the literature, numerous techniques have been proposed to detect IoT-based DDoS attacks. However, techniques based on Artificial Intelligence (AI) have proven to be effective in the detection of cyber-attacks in comparison to other alternative techniques. This paper presents a systematic literature review of AI-based tools and techniques used for analysis, classification, and detection of the most threatening, prominent, and dreadful IoT-based DDoS attacks between the years 2019 to 2023. A comparative study of real datasets having IoT traffic features has also been illustrated. The findings of this systematic review provide useful insights into the existing research landscape for designing AI-based models to detect IoT-based DDoS attacks specifically. Additionally, the study sheds light on IoT botnet lifecycle, various botnet families, the taxonomy of IoT-based DDoS attacks, prominent tools used to launch DDoS attack, publicly available IoT datasets, the taxonomy of AI techniques, popular software available for ML/DL modeling, a list of numerous research challenges and future directions that may aid in the development of novel and reliable methods for identifying and categorizing IoT-based DDoS attacks.

物联网网络中的分布式拒绝服务(DDoS)攻击是最具破坏性和挑战性的网络攻击之一。由于过去几年物联网设备的增加,物联网用户数量呈指数级增长。因此,DDoS 攻击已成为最突出的攻击,因为易受攻击的物联网设备正成为其受害者。文献中提出了许多检测基于物联网的 DDoS 攻击的技术。然而,与其他替代技术相比,基于人工智能(AI)的技术已被证明能有效检测网络攻击。本文对基于人工智能的工具和技术进行了系统的文献综述,这些工具和技术用于分析、分类和检测 2019 年至 2023 年间最具威胁性、最突出和最可怕的基于物联网的 DDoS 攻击。此外,还对具有物联网流量特征的真实数据集进行了比较研究。本系统综述的研究结果为设计基于人工智能的模型来专门检测基于物联网的 DDoS 攻击提供了有益的见解。此外,本研究还揭示了物联网僵尸网络的生命周期、各种僵尸网络家族、基于物联网的 DDoS 攻击分类、用于发起 DDoS 攻击的主要工具、公开可用的物联网数据集、人工智能技术分类、可用于 ML/DL 建模的流行软件、众多研究挑战和未来方向,这些都有助于开发新型可靠的方法来识别和分类基于物联网的 DDoS 攻击。
{"title":"AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges","authors":"Bindu Bala ,&nbsp;Sunny Behal","doi":"10.1016/j.cosrev.2024.100631","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100631","url":null,"abstract":"<div><p>Distributed Denial of Service (DDoS) attacks in IoT networks are one of the most devastating and challenging cyber-attacks. The number of IoT users is growing exponentially due to the increase in IoT devices over the past years. Consequently, DDoS attack has become the most prominent attack as vulnerable IoT devices are becoming victims of it. In the literature, numerous techniques have been proposed to detect IoT-based DDoS attacks. However, techniques based on Artificial Intelligence (AI) have proven to be effective in the detection of cyber-attacks in comparison to other alternative techniques. This paper presents a systematic literature review of AI-based tools and techniques used for analysis, classification, and detection of the most threatening, prominent, and dreadful IoT-based DDoS attacks between the years 2019 to 2023. A comparative study of real datasets having IoT traffic features has also been illustrated. The findings of this systematic review provide useful insights into the existing research landscape for designing AI-based models to detect IoT-based DDoS attacks specifically. Additionally, the study sheds light on IoT botnet lifecycle, various botnet families, the taxonomy of IoT-based DDoS attacks, prominent tools used to launch DDoS attack, publicly available IoT datasets, the taxonomy of AI techniques, popular software available for ML/DL modeling, a list of numerous research challenges and future directions that may aid in the development of novel and reliable methods for identifying and categorizing IoT-based DDoS attacks.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140330585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple clusterings: Recent advances and perspectives 多重聚类:最新进展与展望
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-02-26 DOI: 10.1016/j.cosrev.2024.100621
Guoxian Yu , Liangrui Ren , Jun Wang , Carlotta Domeniconi , Xiangliang Zhang

Clustering is a fundamental data exploration technique to discover hidden grouping structure of data. With the proliferation of big data, and the increase of volume and variety, the complexity of data multiplicity is increasing as well. Traditional clustering methods can provide only a single clustering result, which restricts data exploration to one single possible partition. In contrast, multiple clustering can simultaneously or sequentially uncover multiple non-redundant and distinct clustering solutions, which can reveal multiple interesting hidden structures of the data from different perspectives. For these reasons, multiple clustering has become a popular and promising field of study. In this survey, we have conducted a systematic review of the existing multiple clustering methods. Specifically, we categorize existing approaches according to four different perspectives (i.e., multiple clustering in the original space, in subspaces and on multi-view data, and multiple co-clustering). We summarize the key ideas underlying the techniques and their objective functions, and discuss the advantages and disadvantages of each. In addition, we built a repository of multiple clustering resources (i.e., benchmark datasets and codes). Finally, we discuss the key open issues for future investigation.

聚类是一种基本的数据探索技术,用于发现数据中隐藏的分组结构。随着大数据的激增、数量和种类的增加,数据多元性的复杂性也在增加。传统的聚类方法只能提供单一的聚类结果,这就把数据探索限制在单一可能的分区上。相比之下,多重聚类可以同时或依次发现多个非冗余且截然不同的聚类方案,从而从不同角度揭示数据中多个有趣的隐藏结构。因此,多重聚类已成为一个热门且前景广阔的研究领域。在本调查中,我们对现有的多重聚类方法进行了系统回顾。具体来说,我们按照四个不同的视角(即原始空间中的多重聚类、子空间中的多重聚类、多视角数据中的多重聚类以及多重协同聚类)对现有方法进行了分类。我们总结了这些技术及其目标函数的主要思想,并讨论了每种技术的优缺点。此外,我们还建立了多个聚类资源库(即基准数据集和代码)。最后,我们讨论了未来研究的关键问题。
{"title":"Multiple clusterings: Recent advances and perspectives","authors":"Guoxian Yu ,&nbsp;Liangrui Ren ,&nbsp;Jun Wang ,&nbsp;Carlotta Domeniconi ,&nbsp;Xiangliang Zhang","doi":"10.1016/j.cosrev.2024.100621","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100621","url":null,"abstract":"<div><p>Clustering is a fundamental data exploration technique to discover hidden grouping structure of data. With the proliferation of big data, and the increase of volume and variety, the complexity of data multiplicity is increasing as well. Traditional clustering methods can provide only a single clustering result, which restricts data exploration to one single possible partition. In contrast, multiple clustering can simultaneously or sequentially uncover multiple non-redundant and distinct clustering solutions, which can reveal multiple interesting hidden structures of the data from different perspectives. For these reasons, multiple clustering has become a popular and promising field of study. In this survey, we have conducted a systematic review of the existing multiple clustering methods. Specifically, we categorize existing approaches according to four different perspectives (i.e., multiple clustering in the original space, in subspaces and on multi-view data, and multiple co-clustering). We summarize the key ideas underlying the techniques and their objective functions, and discuss the advantages and disadvantages of each. In addition, we built a repository of multiple clustering resources (i.e., benchmark datasets and codes). Finally, we discuss the key open issues for future investigation.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139975673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable computing across datacenters: A review of enabling models and techniques 跨数据中心的可持续计算:有利模式和技术综述
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-02-13 DOI: 10.1016/j.cosrev.2024.100620
Muhammad Zakarya , Ayaz Ali Khan , Mohammed Reza Chalak Qazani , Hashim Ali , Mahmood Al-Bahri , Atta Ur Rehman Khan , Ahmad Ali , Rahim Khan

The growth rate in big data and internet of things (IoT) is far exceeding the computer performance rate at which modern processors can compute on the massive amount of data. The cluster and cloud technologies enriched by machine learning applications had significantly helped in performance growths subject to the underlying network performance. Computer systems have been studied for improvement in performance, driven by user’s applications demand, in the past few decades, particularly from 1990 to 2010. By the mid of 2010 to 2023, albeit parallel and distributed computing was omnipresent, but the total performance improvement rate of a single computing core had significantly reduced. Similarly, from 2010 to 2023, our digital world of big data and IoT has considerably increased from 1.2 Zettabytes (i.e., sextillion bytes) to approximately 120 zettabytes. Moreover, in 2022 cloud datacenters consumed 200TWh of energy worldwide. However, due to their ever-increasing energy demand which causes CO2 emissions, over the past years the focus has shifted to the design of architectures, software, and in particular, intelligent algorithms to compute on the data more efficiently and intelligently. The energy consumption problem is even greater for large-scale systems that involve several thousand servers. Combining these fears, cloud service providers are presently facing more challenges than earlier because they fight to keep up with the extraordinary network traffic being produced by the world’s fast-tracked move to online due to global pandemics. In this paper, we deliberate the energy consumption and performance problems of large-scale systems and present several taxonomies of energy and performance aware methodologies. We debate over the energy and performance efficiencies, both, which make this study different from those previously published in the literature. Important research papers have been surveyed to characterise and recognise crucial and outstanding topics for further research. We deliberate numerous state-of-the-art methods and algorithms, stated in the literature, that claim to advance the energy efficiency and performance of large-scale computing systems, and recognise numerous open challenges.

大数据和物联网(IoT)的增长速度远远超过了现代处理器计算海量数据的计算机性能。机器学习应用所丰富的集群和云技术极大地促进了性能的增长,但这取决于底层网络的性能。过去几十年,特别是 1990 年至 2010 年,计算机系统在用户应用需求的驱动下,一直在研究如何提高性能。到 2010 年至 2023 年中期,尽管并行和分布式计算已无处不在,但单个计算核心的总性能改进率已大幅下降。同样,从 2010 年到 2023 年,我们的大数据和物联网数字世界已从 1.2 ZB(即六千万字节)大幅增至约 120 ZB。此外,2022 年全球云数据中心的能耗将达到 200 太瓦时。然而,由于云数据中心对能源的需求不断增加,导致二氧化碳排放,过去几年来,人们已将重点转移到架构、软件,特别是智能算法的设计上,以便更高效、更智能地计算数据。对于涉及数千台服务器的大型系统来说,能耗问题更为严重。综合这些担忧,云服务提供商目前正面临着比以往更多的挑战,因为他们要努力跟上全球大流行病导致的全球快速上网所产生的巨大网络流量。在本文中,我们探讨了大规模系统的能耗和性能问题,并介绍了几种能耗和性能感知方法。我们对能效和性能效率进行了讨论,这两点使本研究有别于之前发表在文献中的研究。我们对重要的研究论文进行了调查,以确定和识别有待进一步研究的关键和突出主题。我们讨论了文献中提到的众多先进方法和算法,这些方法和算法都声称可以提高大规模计算系统的能效和性能,同时我们也认识到了众多有待解决的挑战。
{"title":"Sustainable computing across datacenters: A review of enabling models and techniques","authors":"Muhammad Zakarya ,&nbsp;Ayaz Ali Khan ,&nbsp;Mohammed Reza Chalak Qazani ,&nbsp;Hashim Ali ,&nbsp;Mahmood Al-Bahri ,&nbsp;Atta Ur Rehman Khan ,&nbsp;Ahmad Ali ,&nbsp;Rahim Khan","doi":"10.1016/j.cosrev.2024.100620","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100620","url":null,"abstract":"<div><p>The growth rate in big data and internet of things (IoT) is far exceeding the computer performance rate at which modern processors can compute on the massive amount of data. The cluster and cloud technologies enriched by machine learning applications had significantly helped in performance growths subject to the underlying network performance. Computer systems have been studied for improvement in performance, driven by user’s applications demand, in the past few decades, particularly from 1990 to 2010. By the mid of 2010 to 2023, albeit parallel and distributed computing was omnipresent, but the total performance improvement rate of a single computing core had significantly reduced. Similarly, from 2010 to 2023, our digital world of big data and IoT has considerably increased from 1.2 Zettabytes (i.e., sextillion bytes) to approximately 120 zettabytes. Moreover, in 2022 cloud datacenters consumed <span><math><mo>∼</mo></math></span> 200TWh of energy worldwide. However, due to their ever-increasing energy demand which causes <span><math><msub><mrow><mi>CO</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> emissions, over the past years the focus has shifted to the design of architectures, software, and in particular, intelligent algorithms to compute on the data more efficiently and intelligently. The energy consumption problem is even greater for large-scale systems that involve several thousand servers. Combining these fears, cloud service providers are presently facing more challenges than earlier because they fight to keep up with the extraordinary network traffic being produced by the world’s fast-tracked move to online due to global pandemics. In this paper, we deliberate the energy consumption and performance problems of large-scale systems and present several taxonomies of energy and performance aware methodologies. We debate over the energy and performance efficiencies, both, which make this study different from those previously published in the literature. Important research papers have been surveyed to characterise and recognise crucial and outstanding topics for further research. We deliberate numerous state-of-the-art methods and algorithms, stated in the literature, that claim to advance the energy efficiency and performance of large-scale computing systems, and recognise numerous open challenges.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139726310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities 无人机 MEC 系统的基本设计方面:模型、挑战和未来机遇综述
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.1016/j.cosrev.2023.100615
Mohd Hirzi Adnan , Zuriati Ahmad Zukarnain , Oluwatosin Ahmed Amodu

The huge prospects of the internet of things (IoT) have led to an ever-growing demand for computing power by IoT users to enable various applications. Multi-access edge computing (MEC) research and development has rapidly gained attention during the last decade. The ability to deploy edge servers at different points across a content delivery network that can offer communication and computing services close to mobile user devices is one of the main factors driving the evolution of MEC. Furthermore, MEC has been considered a potentially transformational approach for fifth-generation (5 G) and beyond 5 G (B5G) networks, as well as a potential improvement to conventional cloud computing. Unmanned aerial vehicles (UAVs) can be used as effective aerial platforms to offer reliable and ubiquitous connections in wireless communication networks due to their distinctive qualities, such as high cruising altitude, on-demand deployment, and three-dimensional (3D) maneuverability. The number of research studies published in this area has dramatically increased due to the growing interest in UAV-enabled MEC. Although UAV-enabled MEC systems have been well studied, the existing models are becoming increasingly heterogeneous and scattered without harmony. This paper provides a comprehensive analysis of the literature on UAV-enabled MEC systems with a special focus on the system modeling, and optimization techniques for five identified domains, such as energy efficiency, resource allocation, trajectory control, latency, and security. For each domain, we have highlighted the recent advances, critical findings, and the advantages and disadvantages. Additionally, the identified proposed techniques were analyzed and discussed, with emphasize on the constraints and performance metrics. We also discuss a general system model for each highlighted domain. Moreover, the lessons are also derived from the study on system optimization and system modeling techniques identified in this paper. Then we discuss open issues related to UAV-enabled MEC systems in each highlighted domain, including problem formulation and optimization techniques. Finally, this paper lay out directions for future research to solve the aforementioned problems associated with UAV-enabled MEC systems.

物联网(IoT)的巨大前景使得物联网用户对计算能力的需求与日俱增,以支持各种应用。在过去十年中,多接入边缘计算(MEC)的研究和开发迅速获得了关注。在内容交付网络的不同点部署边缘服务器,在移动用户设备附近提供通信和计算服务,是推动 MEC 发展的主要因素之一。此外,MEC 被认为是第五代(5 G)和超越 5 G(B5G)网络的一种潜在变革方法,也是对传统云计算的一种潜在改进。无人飞行器(UAV)具有高巡航高度、按需部署和三维(3D)机动性等独特性能,可作为有效的空中平台,为无线通信网络提供可靠和无处不在的连接。由于人们对无人机支持 MEC 的兴趣与日俱增,该领域发表的研究报告数量也急剧增加。尽管对无人机支持的 MEC 系统进行了深入研究,但现有模型正变得越来越不统一和分散。本文全面分析了有关无人机支持的 MEC 系统的文献,特别关注系统建模和五个确定领域的优化技术,如能源效率、资源分配、轨迹控制、延迟和安全。对于每个领域,我们都重点介绍了最新进展、重要发现以及优缺点。此外,我们还分析和讨论了已确定的建议技术,并强调了制约因素和性能指标。我们还讨论了每个重点领域的通用系统模型。此外,我们还从本文所确定的系统优化和系统建模技术研究中汲取了经验教训。然后,我们讨论了每个重点领域中与无人机支持的 MEC 系统相关的开放性问题,包括问题表述和优化技术。最后,本文提出了未来研究的方向,以解决与无人机 MEC 系统相关的上述问题。
{"title":"Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities","authors":"Mohd Hirzi Adnan ,&nbsp;Zuriati Ahmad Zukarnain ,&nbsp;Oluwatosin Ahmed Amodu","doi":"10.1016/j.cosrev.2023.100615","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100615","url":null,"abstract":"<div><p>The huge prospects of the internet of things (IoT) have led to an ever-growing demand for computing power by IoT users to enable various applications. Multi-access edge computing (MEC) research and development has rapidly gained attention during the last decade. The ability to deploy edge servers at different points across a content delivery network that can offer communication and computing services close to mobile user devices is one of the main factors driving the evolution of MEC. Furthermore, MEC has been considered a potentially transformational approach for fifth-generation (5 G) and beyond 5 G (B5G) networks, as well as a potential improvement to conventional cloud computing. Unmanned aerial vehicles (UAVs) can be used as effective aerial platforms to offer reliable and ubiquitous connections in wireless communication networks due to their distinctive qualities, such as high cruising altitude, on-demand deployment, and three-dimensional (3D) maneuverability. The number of research studies published in this area has dramatically increased due to the growing interest in UAV-enabled MEC. Although UAV-enabled MEC systems have been well studied, the existing models are becoming increasingly heterogeneous and scattered without harmony. This paper provides a comprehensive analysis of the literature on UAV-enabled MEC systems with a special focus on the system modeling, and optimization techniques for five identified domains, such as energy efficiency, resource allocation, trajectory control, latency, and security. For each domain, we have highlighted the recent advances, critical findings, and the advantages and disadvantages. Additionally, the identified proposed techniques were analyzed and discussed, with emphasize on the constraints and performance metrics. We also discuss a general system model for each highlighted domain. Moreover, the lessons are also derived from the study on system optimization and system modeling techniques identified in this paper. Then we discuss open issues related to UAV-enabled MEC systems in each highlighted domain, including problem formulation and optimization techniques. Finally, this paper lay out directions for future research to solve the aforementioned problems associated with UAV-enabled MEC systems.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013723000825/pdfft?md5=82077d59b65835005a3894d0bb65ba35&pid=1-s2.0-S1574013723000825-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139699623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning for intelligent demand response and smart grids: A comprehensive survey 用于智能需求响应和智能电网的深度学习:全面调查
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.1016/j.cosrev.2024.100617
Prabadevi Boopathy , Madhusanka Liyanage , Natarajan Deepa , Mounik Velavali , Shivani Reddy , Praveen Kumar Reddy Maddikunta , Neelu Khare , Thippa Reddy Gadekallu , Won-Joo Hwang , Quoc-Viet Pham

Electricity is one of the mandatory commodities for mankind today. To address challenges and issues in the transmission of electricity through the traditional grid, the concepts of smart grids and demand response have been developed. In such systems, a large amount of data is generated daily from various sources such as power generation (e.g., wind turbines), transmission and distribution (microgrids and fault detectors), load management (smart meters and smart electric appliances). Thanks to recent advancements in big data and computing technologies, Deep Learning (DL) can be leveraged to learn the patterns from the generated data and predict the demand for electricity and peak hours. Motivated by the advantages of deep learning in smart grids, this paper sets to provide a comprehensive survey on the application of DL for intelligent smart grids and demand response. Firstly, we present the fundamental of DL, smart grids, demand response, and the motivation behind the use of DL. Secondly, we review the state-of-the-art applications of DL in smart grids and demand response, including electric load forecasting, state estimation, energy theft detection, energy sharing and trading. Furthermore, we illustrate the practicality of DL via various use cases and projects. Finally, we highlight the challenges presented in existing research works and highlight important issues and potential directions in the use of DL for smart grids and demand response.

电力是当今人类的必需品之一。为了应对传统电网在电力传输方面的挑战和问题,人们提出了智能电网和需求响应的概念。在这些系统中,每天都会从发电(如风力涡轮机)、输配电(微电网和故障探测器)、负荷管理(智能电表和智能电器)等不同来源产生大量数据。得益于大数据和计算技术的最新进展,深度学习(DL)可用于从生成的数据中学习模式,并预测电力需求和高峰时段。基于深度学习在智能电网中的优势,本文将对深度学习在智能智能电网和需求响应中的应用进行全面研究。首先,我们介绍了深度学习、智能电网、需求响应的基本原理,以及使用深度学习的动机。其次,我们回顾了 DL 在智能电网和需求响应中的最新应用,包括电力负荷预测、状态估计、能源盗窃检测、能源共享和交易。此外,我们还通过各种用例和项目说明了数字线路的实用性。最后,我们强调了现有研究工作所面临的挑战,并着重指出了在智能电网和需求响应中使用 DL 的重要问题和潜在方向。
{"title":"Deep learning for intelligent demand response and smart grids: A comprehensive survey","authors":"Prabadevi Boopathy ,&nbsp;Madhusanka Liyanage ,&nbsp;Natarajan Deepa ,&nbsp;Mounik Velavali ,&nbsp;Shivani Reddy ,&nbsp;Praveen Kumar Reddy Maddikunta ,&nbsp;Neelu Khare ,&nbsp;Thippa Reddy Gadekallu ,&nbsp;Won-Joo Hwang ,&nbsp;Quoc-Viet Pham","doi":"10.1016/j.cosrev.2024.100617","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100617","url":null,"abstract":"<div><p>Electricity is one of the mandatory commodities for mankind today. To address challenges and issues in the transmission of electricity through the traditional grid, the concepts of smart grids and demand response have been developed. In such systems, a large amount of data is generated daily from various sources such as power generation (e.g., wind turbines), transmission and distribution (microgrids and fault detectors), load management (smart meters and smart electric appliances). Thanks to recent advancements in big data and computing technologies, Deep Learning (DL) can be leveraged to learn the patterns from the generated data and predict the demand for electricity and peak hours. Motivated by the advantages of deep learning in smart grids, this paper sets to provide a comprehensive survey on the application of DL for intelligent smart grids and demand response. Firstly, we present the fundamental of DL, smart grids, demand response, and the motivation behind the use of DL. Secondly, we review the state-of-the-art applications of DL in smart grids and demand response, including electric load forecasting, state estimation, energy theft detection, energy sharing and trading. Furthermore, we illustrate the practicality of DL via various use cases and projects. Finally, we highlight the challenges presented in existing research works and highlight important issues and potential directions in the use of DL for smart grids and demand response.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013724000017/pdfft?md5=37a2ff44234d359888c071095b8d9b65&pid=1-s2.0-S1574013724000017-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139738725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Science Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1