首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
How to Improve Video Analytics with Action Recognition: A Survey 如何通过动作识别改进视频分析?一项调查
IF 23.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-08 DOI: 10.1145/3679011
Gayathri T, Mamatha Hr
Action recognition refers to the process of categorizing a video by identifying and classifying the specific actions it encompasses. Videos originate from several domains, and within each domain of video analysis, comprehending actions holds paramount significance. The primary aim of this research is to assist scholars in understanding, comparing, and using action recognition models within the several fields of video analysis. This paper provides a comprehensive analysis of action recognition models, comparing their performance and computational requirements. Additionally, it presents a detailed overview of benchmark datasets, which can aid in selecting the most suitable action recognition model. This review additionally examines the diverse applications of action recognition, the datasets available, the research that has been undertaken, potential future prospects, and the challenges encountered.
动作识别是指通过识别视频中的特定动作并对其进行分类的过程。视频源于多个领域,而在视频分析的每个领域中,理解动作具有至关重要的意义。本研究的主要目的是帮助学者理解、比较和使用多个视频分析领域中的动作识别模型。本文对动作识别模型进行了全面分析,比较了这些模型的性能和计算要求。此外,它还对基准数据集进行了详细概述,这有助于选择最合适的动作识别模型。本综述还探讨了动作识别的各种应用、可用数据集、已开展的研究、潜在的未来前景以及遇到的挑战。
{"title":"How to Improve Video Analytics with Action Recognition: A Survey","authors":"Gayathri T, Mamatha Hr","doi":"10.1145/3679011","DOIUrl":"https://doi.org/10.1145/3679011","url":null,"abstract":"Action recognition refers to the process of categorizing a video by identifying and classifying the specific actions it encompasses. Videos originate from several domains, and within each domain of video analysis, comprehending actions holds paramount significance. The primary aim of this research is to assist scholars in understanding, comparing, and using action recognition models within the several fields of video analysis. This paper provides a comprehensive analysis of action recognition models, comparing their performance and computational requirements. Additionally, it presents a detailed overview of benchmark datasets, which can aid in selecting the most suitable action recognition model. This review additionally examines the diverse applications of action recognition, the datasets available, the research that has been undertaken, potential future prospects, and the challenges encountered.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":23.8,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Federated Learning Meets Privacy-Preserving Computation 当联合学习遇上隐私保护计算
IF 23.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-22 DOI: 10.1145/3679013
Jingxue Chen, Hang Yan, Zhiyuan Liu, Min Zhang, Hu Xiong, Shui Yu
Nowadays, with the development of artificial intelligence (AI), privacy issues attract wide attention from society and individuals. It is desirable to make the data available but invisible, i.e., to realize data analysis and calculation without disclosing the data to unauthorized entities. Federated learning (FL) has emerged as a promising privacy-preserving computation method for AI. However, new privacy issues have arisen in FL-based application because various inference attacks can still infer relevant information about the raw data from local models or gradients. This will directly lead to the privacy disclosure. Therefore, it is critical to resist these attacks to achieve complete privacy-preserving computation. In light of the overwhelming variety and a multitude of privacy-preserving computation protocols, we survey these protocols from a series of perspectives to supply better comprehension for researchers and scholars. Concretely, the classification of attacks is discussed including four kinds of inference attacks as well as malicious server and poisoning attack. Besides, this paper systematically captures the state of the art of privacy-preserving computation protocols by analyzing the design rationale, reproducing the experiment of classic schemes, and evaluating all discussed protocols in terms of efficiency and security properties. Finally, this survey identifies a number of interesting future directions.
如今,随着人工智能(AI)的发展,隐私问题引起了社会和个人的广泛关注。让数据可用但不可见,即在不向未经授权的实体泄露数据的情况下实现数据分析和计算,是人们所希望的。联合学习(FL)已成为人工智能领域一种有前景的隐私保护计算方法。然而,由于各种推理攻击仍能从局部模型或梯度中推断出原始数据的相关信息,因此在基于联合学习的应用中出现了新的隐私问题。这将直接导致隐私泄露。因此,抵御这些攻击对于实现完全的隐私保护计算至关重要。鉴于隐私保护计算协议种类繁多、数量巨大,我们从一系列角度对这些协议进行了研究,以便研究人员和学者更好地理解。具体来说,本文讨论了攻击的分类,包括四种推理攻击以及恶意服务器和中毒攻击。此外,本文还通过分析隐私保护计算协议的设计原理、重现经典方案的实验,以及从效率和安全性能方面评估所有讨论过的协议,系统地把握了隐私保护计算协议的最新发展状况。最后,本调查报告指出了一些令人感兴趣的未来发展方向。
{"title":"When Federated Learning Meets Privacy-Preserving Computation","authors":"Jingxue Chen, Hang Yan, Zhiyuan Liu, Min Zhang, Hu Xiong, Shui Yu","doi":"10.1145/3679013","DOIUrl":"https://doi.org/10.1145/3679013","url":null,"abstract":"Nowadays, with the development of artificial intelligence (AI), privacy issues attract wide attention from society and individuals. It is desirable to make the data available but invisible, i.e., to realize data analysis and calculation without disclosing the data to unauthorized entities. Federated learning (FL) has emerged as a promising privacy-preserving computation method for AI. However, new privacy issues have arisen in FL-based application because various inference attacks can still infer relevant information about the raw data from local models or gradients. This will directly lead to the privacy disclosure. Therefore, it is critical to resist these attacks to achieve complete privacy-preserving computation. In light of the overwhelming variety and a multitude of privacy-preserving computation protocols, we survey these protocols from a series of perspectives to supply better comprehension for researchers and scholars. Concretely, the classification of attacks is discussed including four kinds of inference attacks as well as malicious server and poisoning attack. Besides, this paper systematically captures the state of the art of privacy-preserving computation protocols by analyzing the design rationale, reproducing the experiment of classic schemes, and evaluating all discussed protocols in terms of efficiency and security properties. Finally, this survey identifies a number of interesting future directions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":23.8,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141817556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review and benchmark of feature importance methods for neural networks 神经网络特征重要性方法回顾与基准
IF 23.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-19 DOI: 10.1145/3679012
Hannes Mandler, Bernhard Weigand
Feature attribution methods (AMs) are a simple means to provide explanations for the predictions of black-box models like neural networks. Due to their conceptual differences, the numerous different methods, however, yield ambiguous explanations. While this allows for obtaining different insights into the model, it also complicates the decision which method to adopt. This paper, therefore, summarizes the current state of the art regarding AMs, which includes the requirements and desiderata of the methods themselves as well as the properties of their explanations. Based on a survey of existing methods, a representative subset consisting of the δ -sensitivity index, permutation feature importance, variance-based feature importance in artificial neural networks and DeepSHAP, is described in greater detail and, for the first time, benchmarked in a regression context. Specifically for this purpose, a new verification strategy for model-specific AMs is proposed. As expected, the explanations’ agreement with the intuition and among each other clearly depends on the AMs’ properties. This has two implications: First, careful reasoning about the selection of an AM is required. Secondly, it is recommended to apply multiple AMs and combine their insights in order to reduce the model’s opacity even further.
特征归因法(AMs)是为神经网络等黑箱模型的预测提供解释的一种简单方法。然而,由于概念上的差异,众多不同的方法会产生模棱两可的解释。虽然这样可以获得对模型的不同见解,但也使决定采用哪种方法变得复杂。因此,本文总结了有关 AM 的当前技术水平,其中包括方法本身的要求和需要,以及其解释的特性。在对现有方法进行调查的基础上,本文更详细地介绍了由δ灵敏度指数、排列特征重要性、人工神经网络中基于方差的特征重要性和 DeepSHAP 组成的代表性子集,并首次在回归背景下对其进行了基准测试。为此,特别提出了针对特定模型 AM 的新验证策略。不出所料,解释与直觉以及解释之间的一致性显然取决于 AMs 的属性。这有两层含义:首先,在选择 AM 时需要仔细推敲。其次,建议采用多种 AM 并结合其见解,以进一步降低模型的不透明性。
{"title":"A review and benchmark of feature importance methods for neural networks","authors":"Hannes Mandler, Bernhard Weigand","doi":"10.1145/3679012","DOIUrl":"https://doi.org/10.1145/3679012","url":null,"abstract":"\u0000 Feature attribution methods (AMs) are a simple means to provide explanations for the predictions of black-box models like neural networks. Due to their conceptual differences, the numerous different methods, however, yield ambiguous explanations. While this allows for obtaining different insights into the model, it also complicates the decision which method to adopt. This paper, therefore, summarizes the current state of the art regarding AMs, which includes the requirements and desiderata of the methods themselves as well as the properties of their explanations. Based on a survey of existing methods, a representative subset consisting of the\u0000 δ\u0000 -sensitivity index, permutation feature importance, variance-based feature importance in artificial neural networks and DeepSHAP, is described in greater detail and, for the first time, benchmarked in a regression context. Specifically for this purpose, a new verification strategy for model-specific AMs is proposed. As expected, the explanations’ agreement with the intuition and among each other clearly depends on the AMs’ properties. This has two implications: First, careful reasoning about the selection of an AM is required. Secondly, it is recommended to apply multiple AMs and combine their insights in order to reduce the model’s opacity even further.\u0000","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":23.8,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141823933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Technologies and Techniques for Floor Identification 楼层识别的使能技术和工艺
IF 23.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-17 DOI: 10.1145/3678878
Imran Ashraf, Y. B. Zikria, Sahil Garg, Soojung Hur, Yongwan Park, Mohsen Guizani
Location information has initiated a multitude of applications such as location-based services, health care, emergency response and rescue operations, and assets tracking. A plethora of techniques and technologies have been presented to ensure enhanced location accuracy, both horizontal and vertical. Despite many surveys covering horizontal localization technologies, the literature lacks a comprehensive survey incorporating up-to-data vertical localization approaches. This paper provides a detailed survey of different vertical localization techniques such as path loss models, time of arrival, received signal strength, reference signal received power, and fingerprinting utilized by WiFi, radio frequency identification (RFID), global system for mobile communications (GSM), long term evolution (LTE), barometer, inertial measurement unit (IMU) sensors, and geomagnetic field. The paper primarily aims at human localization in indoor environments using smartphones in essence. Besides the localization accuracy, the presented approaches are evaluated in terms of cost, infrastructure dependence, deployment complexity, and sensitivity. We highlight the pros and cons of these approaches and outline future research directions to enhance the accuracy to meet the future needs of floor identification standards set by the Federal Communications Commission.
定位信息引发了众多应用,如基于位置的服务、医疗保健、应急响应和救援行动以及资产追踪。为确保提高水平和垂直方向的定位精度,人们提出了大量的技术和工艺。尽管有许多调查涉及水平定位技术,但文献中缺乏包含最新垂直定位方法的全面调查。本文详细介绍了不同的垂直定位技术,如路径损耗模型、到达时间、接收信号强度、参考信号接收功率,以及 WiFi、射频识别 (RFID)、全球移动通信系统 (GSM)、长期演进 (LTE)、气压计、惯性测量单元 (IMU) 传感器和地磁场所使用的指纹识别技术。本文的主要目的是利用智能手机在室内环境中进行人类定位。除了定位精度,本文还从成本、基础设施依赖性、部署复杂性和灵敏度等方面对所介绍的方法进行了评估。我们强调了这些方法的优缺点,并概述了未来的研究方向,以提高精确度,满足联邦通信委员会制定的楼层识别标准的未来需求。
{"title":"Enabling Technologies and Techniques for Floor Identification","authors":"Imran Ashraf, Y. B. Zikria, Sahil Garg, Soojung Hur, Yongwan Park, Mohsen Guizani","doi":"10.1145/3678878","DOIUrl":"https://doi.org/10.1145/3678878","url":null,"abstract":"Location information has initiated a multitude of applications such as location-based services, health care, emergency response and rescue operations, and assets tracking. A plethora of techniques and technologies have been presented to ensure enhanced location accuracy, both horizontal and vertical. Despite many surveys covering horizontal localization technologies, the literature lacks a comprehensive survey incorporating up-to-data vertical localization approaches. This paper provides a detailed survey of different vertical localization techniques such as path loss models, time of arrival, received signal strength, reference signal received power, and fingerprinting utilized by WiFi, radio frequency identification (RFID), global system for mobile communications (GSM), long term evolution (LTE), barometer, inertial measurement unit (IMU) sensors, and geomagnetic field. The paper primarily aims at human localization in indoor environments using smartphones in essence. Besides the localization accuracy, the presented approaches are evaluated in terms of cost, infrastructure dependence, deployment complexity, and sensitivity. We highlight the pros and cons of these approaches and outline future research directions to enhance the accuracy to meet the future needs of floor identification standards set by the Federal Communications Commission.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":23.8,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141831472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Analysis of Explainable AI for Malware Hunting 全面分析用于恶意软件猎杀的可解释人工智能
IF 23.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-11 DOI: 10.1145/3677374
Mohd Saqib, Samaneh Mahdavifar, Benjamin C. M. Fung, P. Charland
In the past decade, the number of malware variants has increased rapidly. Many researchers have proposed to detect malware using intelligent techniques, such as Machine Learning (ML) and Deep Learning (DL), which have high accuracy and precision. These methods, however, suffer from being opaque in the decision-making process. Therefore, we need Artificial Intelligence (AI)-based models to be explainable, interpretable, and transparent to be reliable and trustworthy. In this survey, we reviewed articles related to Explainable AI (XAI) and their application to the significant scope of malware detection. The article encompasses a comprehensive examination of various XAI algorithms employed in malware analysis. Moreover, we have addressed the characteristics, challenges, and requirements in malware analysis that cannot be accommodated by standard XAI methods. We discussed that even though Explainable Malware Detection (EMD) models provide explainability, they make an AI-based model more vulnerable to adversarial attacks. We also propose a framework that assigns a level of explainability to each XAI malware analysis model, based on the security features involved in each method. In summary, the proposed project focuses on combining XAI and malware analysis to apply XAI models for scrutinizing the opaque nature of AI systems and their applications to malware analysis.
在过去十年中,恶意软件变种的数量迅速增加。许多研究人员提出使用机器学习(ML)和深度学习(DL)等智能技术来检测恶意软件,这些技术具有很高的准确性和精确度。然而,这些方法都存在决策过程不透明的问题。因此,我们需要基于人工智能(AI)的模型具有可解释性、可解读性和透明性,这样才可靠可信。在本调查中,我们回顾了与可解释人工智能(XAI)相关的文章,以及它们在恶意软件检测这一重要领域的应用。文章全面考察了恶意软件分析中采用的各种 XAI 算法。此外,我们还探讨了标准 XAI 方法无法满足的恶意软件分析的特点、挑战和要求。我们讨论了即使可解释恶意软件检测(EMD)模型提供了可解释性,它们也会使基于人工智能的模型更容易受到对抗性攻击。我们还提出了一个框架,根据每种方法所涉及的安全功能,为每种 XAI 恶意软件分析模型分配一个可解释性级别。总之,拟议项目的重点是将 XAI 与恶意软件分析相结合,将 XAI 模型用于审查人工智能系统的不透明性及其在恶意软件分析中的应用。
{"title":"A Comprehensive Analysis of Explainable AI for Malware Hunting","authors":"Mohd Saqib, Samaneh Mahdavifar, Benjamin C. M. Fung, P. Charland","doi":"10.1145/3677374","DOIUrl":"https://doi.org/10.1145/3677374","url":null,"abstract":"In the past decade, the number of malware variants has increased rapidly. Many researchers have proposed to detect malware using intelligent techniques, such as Machine Learning (ML) and Deep Learning (DL), which have high accuracy and precision. These methods, however, suffer from being opaque in the decision-making process. Therefore, we need Artificial Intelligence (AI)-based models to be explainable, interpretable, and transparent to be reliable and trustworthy. In this survey, we reviewed articles related to Explainable AI (XAI) and their application to the significant scope of malware detection. The article encompasses a comprehensive examination of various XAI algorithms employed in malware analysis. Moreover, we have addressed the characteristics, challenges, and requirements in malware analysis that cannot be accommodated by standard XAI methods. We discussed that even though Explainable Malware Detection (EMD) models provide explainability, they make an AI-based model more vulnerable to adversarial attacks. We also propose a framework that assigns a level of explainability to each XAI malware analysis model, based on the security features involved in each method. In summary, the proposed project focuses on combining XAI and malware analysis to apply XAI models for scrutinizing the opaque nature of AI systems and their applications to malware analysis.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":23.8,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141656095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey on Biclustering-based Collaborative Filtering 基于双聚类的协同过滤综合调查
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-06-22 DOI: 10.1145/3674723
Miguel G. Silva, Sara C. Madeira, Rui Henriques

Collaborative Filtering (CF) is achieving a plateau of high popularity. Still, recommendation success is challenged by the diversity of user preferences, structural sparsity of user-item ratings, and inherent subjectivity of rating scales. The increasing user base and item dimensionality of e-commerce and e-entertainment platforms creates opportunities, while further raising generalization and scalability needs. Moved by the need to answer these challenges, user-based and item-based clustering approaches for CF became pervasive. However, classic clustering approaches assess user (item) rating similarity across all items (users), neglecting the rich diversity of item and user profiles. Instead, as preferences are generally simultaneously correlated on subsets of users and items, biclustering approaches provide a natural alternative, being successfully applied to CF for nearly two decades and synergistically integrated with emerging deep learning CF stances. Notwithstanding, biclustering-based CF principles are dispersed, causing state-of-the-art approaches to show accentuated behavioral differences. This work offers a structured view on how biclustering aspects impact recommendation success, coverage, and efficiency. To this end, we introduce a taxonomy to categorize contributions in this field and comprehensively survey state-of-the-art biclustering approaches to CF, highlighting their limitations and potentialities.

协同过滤技术(CF)正处于一个高流行度的阶段。然而,用户偏好的多样性、用户-物品评分的结构稀疏性以及评分尺度固有的主观性都给推荐的成功带来了挑战。电子商务和电子娱乐平台不断增加的用户群和项目维度创造了机会,同时也进一步提高了对通用性和可扩展性的需求。为了应对这些挑战,基于用户和项目的 CF 聚类方法变得非常普遍。然而,传统的聚类方法评估的是所有项目(用户)的用户(项目)评级相似性,忽略了项目和用户配置文件的丰富多样性。相反,由于用户和物品子集的偏好通常同时相关,双聚类方法提供了一个自然的替代方案,近二十年来已成功应用于 CF 领域,并与新兴的深度学习 CF 立场协同整合。尽管如此,基于双聚类的 CF 原理并不统一,导致最先进的方法表现出明显的行为差异。这项工作提供了一个结构化的视角,说明双聚类方面如何影响推荐的成功率、覆盖率和效率。为此,我们引入了一种分类法来对这一领域的贡献进行分类,并全面考察了最先进的双聚类方法,突出了它们的局限性和潜力。
{"title":"A Comprehensive Survey on Biclustering-based Collaborative Filtering","authors":"Miguel G. Silva, Sara C. Madeira, Rui Henriques","doi":"10.1145/3674723","DOIUrl":"https://doi.org/10.1145/3674723","url":null,"abstract":"<p>Collaborative Filtering (CF) is achieving a plateau of high popularity. Still, recommendation success is challenged by the diversity of user preferences, structural sparsity of user-item ratings, and inherent subjectivity of rating scales. The increasing user base and item dimensionality of e-commerce and e-entertainment platforms creates opportunities, while further raising generalization and scalability needs. Moved by the need to answer these challenges, user-based and item-based clustering approaches for CF became pervasive. However, classic clustering approaches assess user (item) rating similarity across all items (users), neglecting the rich diversity of item and user profiles. Instead, as preferences are generally simultaneously correlated on subsets of users and items, biclustering approaches provide a natural alternative, being successfully applied to CF for nearly two decades and synergistically integrated with emerging deep learning CF stances. Notwithstanding, biclustering-based CF principles are dispersed, causing state-of-the-art approaches to show accentuated behavioral differences. This work offers a structured view on how biclustering aspects impact recommendation success, coverage, and efficiency. To this end, we introduce a taxonomy to categorize contributions in this field and comprehensively survey state-of-the-art biclustering approaches to CF, highlighting their limitations and potentialities.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141439849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object-Centric Learning with Capsule Networks: A Survey 利用胶囊网络进行以对象为中心的学习:调查
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-06-21 DOI: 10.1145/3674500
Fabio De Sousa Ribeiro, Kevin Duarte, Miles Everett, Georgios Leontidis, Mubarak Shah

Capsule networks emerged as a promising alternative to convolutional neural networks for learning object-centric representations. The idea is to explicitly model part-whole hierarchies by using groups of neurons called capsules to encode visual entities, then learn the relationships between these entities dynamically from data. However, a major hurdle for capsule network research has been the lack of a reliable point of reference for understanding their foundational ideas and motivations. This survey provides a comprehensive and critical overview of capsule networks which aims to serve as a main point of reference going forward. To that end, we introduce the fundamental concepts and motivations behind capsule networks, such as equivariant inference. We then cover various technical advances in capsule routing algorithms as well as alternative geometric and generative formulations. We provide a detailed explanation of how capsule networks relate to the attention mechanism in Transformers and uncover non-trivial conceptual similarities between them in the context of object-centric representation learning. We also review the extensive applications of capsule networks in computer vision, video and motion, graph representation learning, natural language processing, medical imaging, and many others. To conclude, we provide an in-depth discussion highlighting promising directions for future work.

在学习以对象为中心的表征方面,"胶囊 "网络是卷积神经网络的一种有前途的替代方案。其理念是通过使用被称为 "胶囊 "的神经元组来编码视觉实体,然后从数据中动态学习这些实体之间的关系,从而明确建立部分-整体层次结构模型。然而,胶囊网络研究的一个主要障碍是缺乏一个可靠的参照点来了解其基本思想和动机。本调查报告对胶囊网络进行了全面和批判性的概述,旨在作为今后研究的主要参考点。为此,我们将介绍胶囊网络背后的基本概念和动机,例如等变量推理。然后,我们将介绍胶囊路由算法的各种技术进展,以及其他几何和生成公式。我们详细解释了胶囊网络与《变形金刚》中的注意力机制之间的关系,并揭示了在以对象为中心的表征学习方面,胶囊网络与注意力机制在概念上的相似之处。我们还回顾了胶囊网络在计算机视觉、视频与运动、图表示学习、自然语言处理、医学成像等领域的广泛应用。最后,我们还深入讨论了未来工作的发展方向。
{"title":"Object-Centric Learning with Capsule Networks: A Survey","authors":"Fabio De Sousa Ribeiro, Kevin Duarte, Miles Everett, Georgios Leontidis, Mubarak Shah","doi":"10.1145/3674500","DOIUrl":"https://doi.org/10.1145/3674500","url":null,"abstract":"<p>Capsule networks emerged as a promising alternative to convolutional neural networks for learning object-centric representations. The idea is to explicitly model part-whole hierarchies by using groups of neurons called <i>capsules</i> to encode visual entities, then learn the relationships between these entities dynamically from data. However, a major hurdle for capsule network research has been the lack of a reliable point of reference for understanding their foundational ideas and motivations. This survey provides a comprehensive and critical overview of capsule networks which aims to serve as a main point of reference going forward. To that end, we introduce the fundamental concepts and motivations behind capsule networks, such as <i>equivariant inference</i>. We then cover various technical advances in capsule routing algorithms as well as alternative geometric and generative formulations. We provide a detailed explanation of how capsule networks relate to the attention mechanism in Transformers and uncover non-trivial conceptual similarities between them in the context of object-centric representation learning. We also review the extensive applications of capsule networks in computer vision, video and motion, graph representation learning, natural language processing, medical imaging, and many others. To conclude, we provide an in-depth discussion highlighting promising directions for future work.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of 3D Space Path-Planning Methods and Algorithms 三维空间路径规划方法和算法概览
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-06-20 DOI: 10.1145/3673896
Hakimeh mazaheri, salman goli, ali nourollah

Due to their agility, cost-effectiveness, and high maneuverability, Unmanned Aerial Vehicles (UAVs) have attracted considerable attention from researchers and investors alike. Path planning is one of the practical subsets of motion planning for UAVs. It prevents collisions and ensures complete coverage of an area. This study provides a structured review of applicable algorithms and coverage path planning solutions in Three-Dimensional (3D) space, presenting state-of-the-art technologies related to heuristic decomposition approaches for UAVs and the forefront challenges. Additionally, it introduces a comprehensive and novel classification of practical methods and representational techniques for path-planning algorithms. This depends on environmental characteristics and optimal parameters in the real world. The first category presents a classification of semi-accurate decomposition approaches as the most practical decomposition method, along with the data structure of these practices, categorized by phases. The second category illustrates path-planning processes based on symbolic techniques in 3D space. Additionally, it provides a critical analysis of crucial influential approaches based on their importance in path quality and researchers' attention, highlighting their limitations and research gaps. Furthermore, it will provide the most pertinent recommendations for future work for researchers. The studies demonstrate an apparent inclination among experimenters towards using the semi-accurate cellular decomposition approach to improve 3D path planning.

无人驾驶飞行器(UAV)因其灵活性、成本效益和高机动性,吸引了研究人员和投资者的极大关注。路径规划是无人飞行器运动规划的实用子集之一。它可以防止碰撞并确保完全覆盖一个区域。本研究对三维(3D)空间中的适用算法和覆盖路径规划解决方案进行了结构化回顾,介绍了与无人飞行器启发式分解方法相关的最新技术和前沿挑战。此外,它还对路径规划算法的实用方法和表示技术进行了全面而新颖的分类。这取决于现实世界中的环境特征和最佳参数。第一类介绍了半精确分解方法的分类,这是最实用的分解方法,同时还介绍了这些做法的数据结构,并按阶段进行了分类。第二类介绍基于三维空间符号技术的路径规划过程。此外,它还根据路径质量的重要性和研究人员的关注度,对具有重要影响的方法进行了批判性分析,强调了这些方法的局限性和研究空白。此外,它还将为研究人员今后的工作提供最中肯的建议。研究表明,实验人员明显倾向于使用半精确蜂窝分解方法来改进三维路径规划。
{"title":"A survey of 3D Space Path-Planning Methods and Algorithms","authors":"Hakimeh mazaheri, salman goli, ali nourollah","doi":"10.1145/3673896","DOIUrl":"https://doi.org/10.1145/3673896","url":null,"abstract":"<p>Due to their agility, cost-effectiveness, and high maneuverability, Unmanned Aerial Vehicles (UAVs) have attracted considerable attention from researchers and investors alike. Path planning is one of the practical subsets of motion planning for UAVs. It prevents collisions and ensures complete coverage of an area. This study provides a structured review of applicable algorithms and coverage path planning solutions in Three-Dimensional (3D) space, presenting state-of-the-art technologies related to heuristic decomposition approaches for UAVs and the forefront challenges. Additionally, it introduces a comprehensive and novel classification of practical methods and representational techniques for path-planning algorithms. This depends on environmental characteristics and optimal parameters in the real world. The first category presents a classification of semi-accurate decomposition approaches as the most practical decomposition method, along with the data structure of these practices, categorized by phases. The second category illustrates path-planning processes based on symbolic techniques in 3D space. Additionally, it provides a critical analysis of crucial influential approaches based on their importance in path quality and researchers' attention, highlighting their limitations and research gaps. Furthermore, it will provide the most pertinent recommendations for future work for researchers. The studies demonstrate an apparent inclination among experimenters towards using the semi-accurate cellular decomposition approach to improve 3D path planning.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141430377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Based Affective Music Generation Systems: A Review of Methods and Challenges 基于人工智能的情感音乐生成系统:方法与挑战综述
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-06-17 DOI: 10.1145/3672554
Adyasha Dash, Kathleen Agres

Music is a powerful medium for altering the emotional state of the listener. In recent years, with significant advancements in computing capabilities, artificial intelligence-based (AI-based) approaches have become popular for creating affective music generation (AMG) systems. Entertainment, healthcare, and sensor-integrated interactive system design are a few of the areas in which AI-based affective music generation (AI-AMG) systems may have a significant impact. Given the surge of interest in this topic, this article aims to provide a comprehensive review of controllable AI-AMG systems. The main building blocks of an AI-AMG system are discussed, and existing systems are formally categorized based on the core algorithm used for music generation. In addition, this article discusses the main musical features employed to compose affective music, along with the respective AI-based approaches used for tailoring them. Lastly, the main challenges and open questions in this field, as well as their potential solutions, are presented to guide future research. We hope that this review will be useful for readers seeking to understand the state-of-the-art in AI-AMG systems, and gain an overview of the methods used for developing them, thereby helping them explore this field in the future.

音乐是改变听众情绪状态的强大媒介。近年来,随着计算能力的大幅提升,基于人工智能(AI)的方法已成为创建情感音乐生成(AMG)系统的流行方法。娱乐、医疗保健和传感器集成互动系统设计是基于人工智能的情感音乐生成(AI-AMG)系统可能产生重大影响的几个领域。鉴于人们对这一主题的兴趣激增,本文旨在对可控人工智能情感音乐生成系统进行全面评述。文章讨论了人工智能-AMG 系统的主要构件,并根据音乐生成所使用的核心算法对现有系统进行了正式分类。此外,本文还讨论了用于创作情感音乐的主要音乐特征,以及用于调整这些特征的基于人工智能的方法。最后,本文提出了这一领域的主要挑战和悬而未决的问题,以及潜在的解决方案,以指导未来的研究。我们希望这篇综述能帮助读者了解人工智能-AMG 系统的最新进展,并对开发这些系统所使用的方法有一个全面的认识,从而帮助他们在未来探索这一领域。
{"title":"AI-Based Affective Music Generation Systems: A Review of Methods and Challenges","authors":"Adyasha Dash, Kathleen Agres","doi":"10.1145/3672554","DOIUrl":"https://doi.org/10.1145/3672554","url":null,"abstract":"<p>Music is a powerful medium for altering the emotional state of the listener. In recent years, with significant advancements in computing capabilities, artificial intelligence-based (AI-based) approaches have become popular for creating affective music generation (AMG) systems. Entertainment, healthcare, and sensor-integrated interactive system design are a few of the areas in which AI-based affective music generation (AI-AMG) systems may have a significant impact. Given the surge of interest in this topic, this article aims to provide a comprehensive review of controllable AI-AMG systems. The main building blocks of an AI-AMG system are discussed, and existing systems are formally categorized based on the core algorithm used for music generation. In addition, this article discusses the main musical features employed to compose affective music, along with the respective AI-based approaches used for tailoring them. Lastly, the main challenges and open questions in this field, as well as their potential solutions, are presented to guide future research. We hope that this review will be useful for readers seeking to understand the state-of-the-art in AI-AMG systems, and gain an overview of the methods used for developing them, thereby helping them explore this field in the future.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141333730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward a Privacy-Preserving Face Recognition System: A Survey of Leakages and Solutions 实现保护隐私的人脸识别系统:泄漏与解决方案调查
IF 16.6 1区 计算机科学 Q1 Mathematics Pub Date : 2024-06-17 DOI: 10.1145/3673224
Lamyanba Laishram, Muhammad Shaheryar, Jong Taek Lee, Soon Ki Jung

Abstract Recent advancements in face recognition (FR) technology in surveillance systems make it possible to monitor a person as they move around. FR gathers a lot of information depending on the quantity and data sources. The most severe privacy concern with FR technology is its use to identify people in real-time public monitoring applications or via an aggregation of datasets without their consent. Due to the importance of private data leakage in the FR environment, academia and business have given it a lot of attention, leading to the creation of several research initiatives meant to solve the corresponding challenges. As a result, this study aims to look at privacy-preserving face recognition (PPFR) methods. We propose a detailed and systematic study of the PPFR based on our suggested six-level framework. Along with all the levels, more emphasis is given to the processing of face images as it is more crucial for FR technology. We explore the privacy leakage issues and offer an up-to-date and thorough summary of current research trends in the FR system from six perspectives. We also encourage additional research initiatives in this promising area for further investigation.

摘要 监控系统中人脸识别(FR)技术的最新进展使监视一个人的行动成为可能。根据数量和数据来源的不同,人脸识别技术可以收集大量信息。人脸识别技术最令人担忧的隐私问题是,它在实时公共监控应用中或在未经本人同意的情况下通过数据集的汇总来识别人的身份。由于私人数据泄漏在 FR 环境中的重要性,学术界和企业界对此给予了极大关注,并发起了多项旨在解决相应挑战的研究计划。因此,本研究旨在探讨保护隐私的人脸识别(PPFR)方法。我们根据建议的六级框架对 PPFR 进行了详细而系统的研究。在所有层次中,我们更加重视人脸图像的处理,因为这对于人脸识别技术来说更为关键。我们探讨了隐私泄露问题,并从六个方面对当前 FR 系统的研究趋势进行了最新、最全面的总结。我们还鼓励在这一前景广阔的领域开展更多的研究活动,以作进一步探讨。
{"title":"Toward a Privacy-Preserving Face Recognition System: A Survey of Leakages and Solutions","authors":"Lamyanba Laishram, Muhammad Shaheryar, Jong Taek Lee, Soon Ki Jung","doi":"10.1145/3673224","DOIUrl":"https://doi.org/10.1145/3673224","url":null,"abstract":"<p><b>Abstract</b> Recent advancements in face recognition (FR) technology in surveillance systems make it possible to monitor a person as they move around. FR gathers a lot of information depending on the quantity and data sources. The most severe privacy concern with FR technology is its use to identify people in real-time public monitoring applications or via an aggregation of datasets without their consent. Due to the importance of private data leakage in the FR environment, academia and business have given it a lot of attention, leading to the creation of several research initiatives meant to solve the corresponding challenges. As a result, this study aims to look at privacy-preserving face recognition (PPFR) methods. We propose a detailed and systematic study of the PPFR based on our suggested six-level framework. Along with all the levels, more emphasis is given to the processing of face images as it is more crucial for FR technology. We explore the privacy leakage issues and offer an up-to-date and thorough summary of current research trends in the FR system from six perspectives. We also encourage additional research initiatives in this promising area for further investigation.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141333700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1