首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
The Many Faces of Data Deletion: On the Significance and Implications of Deleting Data 数据删除的多面性:论删除数据的意义和含义
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-05 DOI: 10.1145/3779299
Ignacio Marco-Pérez, Beatriz Pérez, Angel Luis Rubio Garcia, María A. Zapata
Today, our data is not only stored on personal computers, but is managed by many devices, from cell phones or watches to smart TVs, and stored in remote repositories (usually referred to as “the cloud”). In this new context, defining what exactly “data deletion” is becomes a challenge, especially considering the many different scenarios in which it is becoming more increasingly important. This is the case, for example, of the “right to be forgotten” established by regulations such as the European General Data Protection Regulation (GDPR) or the deletion of data used as a source to feed machine learning processes, the long-term effects of which are very difficult to estimate. This work reviews the various terminology used when dealing with data deletion and analyzes the different fields and technologies to which it is related. We conclude by offering a structured discussion of key takeaways, lessons learned, and future research directions.
今天,我们的数据不仅存储在个人电脑上,而且由许多设备管理,从手机或手表到智能电视,并存储在远程存储库(通常称为“云”)中。在这种新的背景下,定义“数据删除”究竟是什么成为一项挑战,特别是考虑到它在许多不同的情况下变得越来越重要。例如,《欧洲通用数据保护条例》(GDPR)等法规规定的“被遗忘权”或删除用作机器学习过程来源的数据就是这种情况,其长期影响很难估计。这项工作回顾了处理数据删除时使用的各种术语,并分析了与之相关的不同领域和技术。最后,我们对关键要点、经验教训和未来研究方向进行了结构化的讨论。
{"title":"The Many Faces of Data Deletion: On the Significance and Implications of Deleting Data","authors":"Ignacio Marco-Pérez, Beatriz Pérez, Angel Luis Rubio Garcia, María A. Zapata","doi":"10.1145/3779299","DOIUrl":"https://doi.org/10.1145/3779299","url":null,"abstract":"Today, our data is not only stored on personal computers, but is managed by many devices, from cell phones or watches to smart TVs, and stored in remote repositories (usually referred to as “the cloud”). In this new context, defining what exactly “data deletion” is becomes a challenge, especially considering the many different scenarios in which it is becoming more increasingly important. This is the case, for example, of the “right to be forgotten” established by regulations such as the European General Data Protection Regulation (GDPR) or the deletion of data used as a source to feed machine learning processes, the long-term effects of which are very difficult to estimate. This work reviews the various terminology used when dealing with data deletion and analyzes the different fields and technologies to which it is related. We conclude by offering a structured discussion of key takeaways, lessons learned, and future research directions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"10 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Large Language Models: A Survey of Watermarking and Fingerprinting Techniques 保护大型语言模型:水印和指纹技术综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-05 DOI: 10.1145/3773028
Peigen Ye, Huali Ren, Zhengdao Li, Anli Yan, Hongyang Yan, Shaowei Wang, Jin Li
State-of-the-art watermarking and fingerprinting techniques for Large Language Models (LLMs) are explored, with our analysis spanning a wide array of methodologies designed to protect the intellectual property of LLMs. The review of watermarking techniques is based on embedding watermarks during the training, logits generation, and token sampling phases. Meanwhile, we investigate the application of watermarking technology in multimodal LLMs and potential attacks on watermarks. Moreover, our examination of fingerprinting techniques revealed the ingenuity behind methods used to identify LLMs. We discussed the development of fingerprints based on model behavior and using deep learning models to learn thresholds for fingerprint comparison. Our survey has underscored the importance of advancing security measures for LLMs, especially in light of the increasing sophistication of adversarial attacks. As LLMs continue to play a pivotal role in advancing AI technologies, developing and refining security measures that safeguard their intellectual property and ensure their ethical deployment is imperative.
探索了大型语言模型(llm)的最先进的水印和指纹识别技术,我们的分析跨越了一系列旨在保护llm知识产权的方法。对水印技术的回顾是基于在训练、逻辑生成和令牌采样阶段嵌入水印。同时,我们研究了水印技术在多模态llm中的应用以及对水印的潜在攻击。此外,我们对指纹技术的研究揭示了用于识别llm的方法背后的独创性。我们讨论了基于模型行为的指纹的发展,并使用深度学习模型来学习指纹比较的阈值。我们的调查强调了推进llm安全措施的重要性,特别是在对抗性攻击日益复杂的情况下。随着法学硕士在推进人工智能技术方面继续发挥关键作用,制定和完善保护其知识产权并确保其道德部署的安全措施势在必行。
{"title":"Securing Large Language Models: A Survey of Watermarking and Fingerprinting Techniques","authors":"Peigen Ye, Huali Ren, Zhengdao Li, Anli Yan, Hongyang Yan, Shaowei Wang, Jin Li","doi":"10.1145/3773028","DOIUrl":"https://doi.org/10.1145/3773028","url":null,"abstract":"State-of-the-art watermarking and fingerprinting techniques for Large Language Models (LLMs) are explored, with our analysis spanning a wide array of methodologies designed to protect the intellectual property of LLMs. The review of watermarking techniques is based on embedding watermarks during the training, logits generation, and token sampling phases. Meanwhile, we investigate the application of watermarking technology in multimodal LLMs and potential attacks on watermarks. Moreover, our examination of fingerprinting techniques revealed the ingenuity behind methods used to identify LLMs. We discussed the development of fingerprints based on model behavior and using deep learning models to learn thresholds for fingerprint comparison. Our survey has underscored the importance of advancing security measures for LLMs, especially in light of the increasing sophistication of adversarial attacks. As LLMs continue to play a pivotal role in advancing AI technologies, developing and refining security measures that safeguard their intellectual property and ensure their ethical deployment is imperative.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"250 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Efficient Underwater Visual Perception through Image Enhancement, Compression, and Understanding 通过图像增强、压缩和理解实现高效的水下视觉感知
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-03 DOI: 10.1145/3779223
Rongxin Zhu, Lei Sheng, Kaitao Wu, Azzedine Boukerche, Libo Long, Qiuling Yang
The growing demand for marine exploration, environmental monitoring, and autonomous underwater operations has elevated the role of underwater image processing in both research and practical applications. However, the acquisition and transmission of underwater visual data are fundamentally constrained by the harsh aquatic environment, where factors such as limited bandwidth, strong light scattering, color distortion, and complex noise severely degrade image quality and restrict data throughput. These challenges not only hinder real-time perception and decision-making but also affect the efficiency of data-driven tasks such as mapping, object recognition, and navigation. To address these issues, a broad spectrum of underwater image processing methods has emerged, aiming to enhance visual clarity, compress data for efficient transmission, restore degraded signals, and enable accurate scene understanding. This survey provides a structured and comprehensive review of existing techniques, categorizing them into four core domains: image enhancement, image restoration, image compression and segmentation, and image classification. Representative methods within each domain are critically analyzed in terms of their underlying principles, computational complexity, and applicability across diverse underwater scenarios. Furthermore, the survey highlights emerging trends including deep learning-based approaches, cross-modal information fusion, and resource-efficient designs, offering insights for future development in underwater visual computing and communication systems.
随着海洋勘探、环境监测和自主水下作业需求的不断增长,水下图像处理在研究和实际应用中的作用得到了提升。然而,水下视觉数据的采集和传输从根本上受到了恶劣的水生环境的制约,其中有限的带宽、强烈的光散射、色彩失真、复杂的噪声等因素严重降低了图像质量,限制了数据吞吐量。这些挑战不仅阻碍了实时感知和决策,而且影响了数据驱动任务(如地图、目标识别和导航)的效率。为了解决这些问题,出现了各种各样的水下图像处理方法,旨在提高视觉清晰度,压缩数据以实现高效传输,恢复退化的信号,并实现准确的场景理解。本调查对现有技术进行了结构化和全面的回顾,将其分为四个核心领域:图像增强,图像恢复,图像压缩和分割以及图像分类。在每个领域的代表性方法严格分析其基本原理,计算复杂性和适用性在不同的水下场景。此外,该调查还强调了新兴趋势,包括基于深度学习的方法、跨模态信息融合和资源高效设计,为水下视觉计算和通信系统的未来发展提供了见解。
{"title":"Toward Efficient Underwater Visual Perception through Image Enhancement, Compression, and Understanding","authors":"Rongxin Zhu, Lei Sheng, Kaitao Wu, Azzedine Boukerche, Libo Long, Qiuling Yang","doi":"10.1145/3779223","DOIUrl":"https://doi.org/10.1145/3779223","url":null,"abstract":"The growing demand for marine exploration, environmental monitoring, and autonomous underwater operations has elevated the role of underwater image processing in both research and practical applications. However, the acquisition and transmission of underwater visual data are fundamentally constrained by the harsh aquatic environment, where factors such as limited bandwidth, strong light scattering, color distortion, and complex noise severely degrade image quality and restrict data throughput. These challenges not only hinder real-time perception and decision-making but also affect the efficiency of data-driven tasks such as mapping, object recognition, and navigation. To address these issues, a broad spectrum of underwater image processing methods has emerged, aiming to enhance visual clarity, compress data for efficient transmission, restore degraded signals, and enable accurate scene understanding. This survey provides a structured and comprehensive review of existing techniques, categorizing them into four core domains: image enhancement, image restoration, image compression and segmentation, and image classification. Representative methods within each domain are critically analyzed in terms of their underlying principles, computational complexity, and applicability across diverse underwater scenarios. Furthermore, the survey highlights emerging trends including deep learning-based approaches, cross-modal information fusion, and resource-efficient designs, offering insights for future development in underwater visual computing and communication systems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"130 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145657753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twins Paradigm: A Systematic Review from the Reinforcement Learning Perspective 数字孪生范式:强化学习视角下的系统回顾
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-02 DOI: 10.1145/3777367
Shahmir Khan Mohammed, Shakti Singh, Rabeb Mizouni, Hadi Otrok, Ernesto Damiani
The Digital Twins (DT) paradigm has emerged as a powerful tool for simulating and analyzing complex systems in various domains. A DT is a virtual representation of a real-world object(s) whose goal is to accurately emulate real systems, optimize processes, minimize synchronization delays, cut down on overhead, and automate decision-making. DT technology is moving at a faster than expected pace with advances in Artificial Intelligence (AI), Internet of Things (IoT), Distributed Computing, and 5/6G. Being a highly beneficial technology, DT still faces issues of - (1) limited adaptability, (2) incomplete model representation, (3) suboptimal decision making, (4) limited generalization, and (5) scalability and computational efficiency. Reinforcement Learning (RL) offers unsupervised decision-making and intelligence, which can be immensely beneficial in addressing the current challenges faced by DT. This study offers a thorough analysis of the DT paradigm from the standpoint of RL. The survey compares and contrasts existing reinforcement learning-based Digital Twin frameworks, assessing their advantages and disadvantages. Moreover, discussions of approaches highlighting the trade-offs between simulation fidelity and computing complexity is also studied. Additionally, a thorough understanding of the Digital Twins paradigm from a reinforcement learning perspective, is presented as a helpful resource for academics and industry professionals in the field. Finally, future research directions in this developing field at the nexus of digital modeling, simulation, and artificial intelligence is discussed.
数字孪生(DT)范式已经成为模拟和分析各个领域复杂系统的强大工具。DT是真实世界对象的虚拟表示,其目标是精确地模拟真实系统、优化流程、最小化同步延迟、减少开销和自动化决策。随着人工智能(AI)、物联网(IoT)、分布式计算和5/6G的进步,DT技术的发展速度比预期的要快。作为一项非常有益的技术,DT仍然面临着(1)有限的适应性,(2)不完整的模型表示,(3)次优决策,(4)有限的泛化,(5)可扩展性和计算效率等问题。强化学习(RL)提供无监督的决策和智能,这对于解决当前DT面临的挑战非常有益。本研究从RL的角度对DT范式进行了全面的分析。该调查比较和对比了现有的基于强化学习的数字孪生框架,评估了它们的优点和缺点。此外,还讨论了强调仿真保真度和计算复杂性之间权衡的方法。此外,从强化学习的角度对数字孪生范式进行了全面的理解,为该领域的学者和行业专业人士提供了有用的资源。最后,对数字建模、仿真和人工智能相结合的未来研究方向进行了展望。
{"title":"Digital Twins Paradigm: A Systematic Review from the Reinforcement Learning Perspective","authors":"Shahmir Khan Mohammed, Shakti Singh, Rabeb Mizouni, Hadi Otrok, Ernesto Damiani","doi":"10.1145/3777367","DOIUrl":"https://doi.org/10.1145/3777367","url":null,"abstract":"The Digital Twins (DT) paradigm has emerged as a powerful tool for simulating and analyzing complex systems in various domains. A DT is a virtual representation of a real-world object(s) whose goal is to accurately emulate real systems, optimize processes, minimize synchronization delays, cut down on overhead, and automate decision-making. DT technology is moving at a faster than expected pace with advances in Artificial Intelligence (AI), Internet of Things (IoT), Distributed Computing, and 5/6G. Being a highly beneficial technology, DT still faces issues of - (1) limited adaptability, (2) incomplete model representation, (3) suboptimal decision making, (4) limited generalization, and (5) scalability and computational efficiency. Reinforcement Learning (RL) offers unsupervised decision-making and intelligence, which can be immensely beneficial in addressing the current challenges faced by DT. This study offers a thorough analysis of the DT paradigm from the standpoint of RL. The survey compares and contrasts existing reinforcement learning-based Digital Twin frameworks, assessing their advantages and disadvantages. Moreover, discussions of approaches highlighting the trade-offs between simulation fidelity and computing complexity is also studied. Additionally, a thorough understanding of the Digital Twins paradigm from a reinforcement learning perspective, is presented as a helpful resource for academics and industry professionals in the field. Finally, future research directions in this developing field at the nexus of digital modeling, simulation, and artificial intelligence is discussed.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"93 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145651429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review on the Intersection of Self-X System Classes 关于Self-X系统类相交的系统文献综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-27 DOI: 10.1145/3778859
Inga Miadowicz, Daniel Maldonado Quinto, Michael Felderer
Alongside the vision of autonomous systems, similar system concepts are being discussed in the research fields of highly automated, intelligent, adaptive, autonomic, and organic systems. Although these types of system are studied in scattered research fields that consider them as distinct system classes, they share similar characteristics and are interrelated to some extent. Experts in various fields present a very heterogeneous view on the intersection of autonomous and comparable system concepts, for example, as interchangeable, distinct, or complementary research approaches. Therefore, this study performs a systematic literature review based on more than 300 articles to investigate the intersection of the system classes, emphasizing their similarities, differences, and relationships from the current state of the art.
除了自主系统的愿景,在高度自动化、智能、自适应、自主和有机系统的研究领域也在讨论类似的系统概念。虽然这些类型的系统是分散的研究领域,将它们视为不同的系统类,但它们具有相似的特征,并在一定程度上相互关联。不同领域的专家对自主和可比较系统概念的交叉点提出了非常不同的观点,例如,作为可互换的、不同的或互补的研究方法。因此,本研究在300多篇文献的基础上进行了系统的文献综述,以调查系统类的交集,强调它们的异同,以及从当前的艺术状态的关系。
{"title":"A Systematic Literature Review on the Intersection of Self-X System Classes","authors":"Inga Miadowicz, Daniel Maldonado Quinto, Michael Felderer","doi":"10.1145/3778859","DOIUrl":"https://doi.org/10.1145/3778859","url":null,"abstract":"Alongside the vision of autonomous systems, similar system concepts are being discussed in the research fields of highly automated, intelligent, adaptive, autonomic, and organic systems. Although these types of system are studied in scattered research fields that consider them as distinct system classes, they share similar characteristics and are interrelated to some extent. Experts in various fields present a very heterogeneous view on the intersection of autonomous and comparable system concepts, for example, as interchangeable, distinct, or complementary research approaches. Therefore, this study performs a systematic literature review based on more than 300 articles to investigate the intersection of the system classes, emphasizing their similarities, differences, and relationships from the current state of the art.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"14 10 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145609212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: Acoustic Side Channels SoK:声学侧通道
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-26 DOI: 10.1145/3778350
Ping Wang, Shishir Nagaraja, Aurélien Bourquard, Haichang Gao, Jeff Yan
Acoustic side channels (ASCs) have been discovered for several decades, highlighting the tangible security risks posed by unintended sound emissions from computing and electronic systems. Their existence has drawn considerable attention from researchers, driving rapid progress in both attack methodologies and defense mechanisms across a wide range of scenarios. In this paper, we provide a state-of-the-art analysis of ASCs, covering all the significant academic research in the area. First, we clarify existing ambiguities and conceptual confusion, proposing a clear definition of ASC. Second, we analyse the characteristics of known ASCs, discuss their security implications, and propose the first taxonomy. Next, we summarise attack techniques, discuss countermeasures, and identify areas for future research. We also link side channels and inverse problems, two fields that appear to be completely isolated from each other but have deep connections.
声学侧通道(ASCs)已经被发现了几十年,突出了计算机和电子系统意外声发射带来的切实安全风险。它们的存在引起了研究人员的极大关注,推动了在各种情况下攻击方法和防御机制的快速发展。在本文中,我们提供了最先进的ASCs分析,涵盖了该领域所有重要的学术研究。首先,我们澄清了现有的歧义和概念混淆,提出了一个明确的ASC定义。其次,我们分析了已知ASCs的特征,讨论了它们的安全含义,并提出了第一种分类方法。接下来,我们总结攻击技术,讨论对策,并确定未来研究的领域。我们还将侧通道和逆问题联系起来,这两个领域看起来彼此完全隔离,但却有很深的联系。
{"title":"SoK: Acoustic Side Channels","authors":"Ping Wang, Shishir Nagaraja, Aurélien Bourquard, Haichang Gao, Jeff Yan","doi":"10.1145/3778350","DOIUrl":"https://doi.org/10.1145/3778350","url":null,"abstract":"Acoustic side channels (ASCs) have been discovered for several decades, highlighting the tangible security risks posed by unintended sound emissions from computing and electronic systems. Their existence has drawn considerable attention from researchers, driving rapid progress in both attack methodologies and defense mechanisms across a wide range of scenarios. In this paper, we provide a state-of-the-art analysis of ASCs, covering all the significant academic research in the area. First, we clarify existing ambiguities and conceptual confusion, proposing a clear definition of ASC. Second, we analyse the characteristics of known ASCs, discuss their security implications, and propose the first taxonomy. Next, we summarise attack techniques, discuss countermeasures, and identify areas for future research. We also link side channels and inverse problems, two fields that appear to be completely isolated from each other but have deep connections.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"17 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145599034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Humor Modeling: A Survey on the State of the Art 计算幽默建模:技术现状综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-26 DOI: 10.1145/3778357
Jens Lemmens, Victor De Marez
AI systems are not only becoming better in solving complex reasoning challenges, but also in performing creative tasks. One of the creative tasks where AI systems still struggle to achieve human performance, however, is humor processing, for which mixed results have been reported. Therefore, the goal of this survey is to categorize recent research in computational humor modeling in order to identify current trends, advancements, and remaining gaps. The scope of this work is broader than previous survey papers, as we tackle not only text-based models, but also multimodal models, and discuss a variety of detection and generation tasks.
人工智能系统不仅在解决复杂的推理挑战方面越来越好,而且在执行创造性任务方面也越来越好。然而,人工智能系统仍难以达到人类表现的创造性任务之一是幽默处理,据报道,这方面的结果好坏参半。因此,本调查的目的是对最近在计算幽默建模方面的研究进行分类,以确定当前的趋势、进步和剩余的差距。这项工作的范围比以前的调查论文更广泛,因为我们不仅处理基于文本的模型,而且还处理多模态模型,并讨论了各种检测和生成任务。
{"title":"Computational Humor Modeling: A Survey on the State of the Art","authors":"Jens Lemmens, Victor De Marez","doi":"10.1145/3778357","DOIUrl":"https://doi.org/10.1145/3778357","url":null,"abstract":"AI systems are not only becoming better in solving complex reasoning challenges, but also in performing creative tasks. One of the creative tasks where AI systems still struggle to achieve human performance, however, is humor processing, for which mixed results have been reported. Therefore, the goal of this survey is to categorize recent research in computational humor modeling in order to identify current trends, advancements, and remaining gaps. The scope of this work is broader than previous survey papers, as we tackle not only text-based models, but also multimodal models, and discuss a variety of detection and generation tasks.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"89 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145599033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Deep Face Restoration: From Non-blind to Blind and Beyond 深度面部修复研究:从非盲到盲及以后
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-25 DOI: 10.1145/3778162
Wenjie Li, Mei Wang, Kai Zhang, Juncheng Li, Xiaoming Li, Yuhang Zhang, Guangwei Gao, Zhanyu Ma
Face restoration (FR) is a specialized field within image restoration that aims to recover low-quality (LQ) face images into high-quality (HQ) face images. Recent advances in deep learning technology have led to significant progress in FR methods. In this paper, we begin by examining the prevalent factors responsible for real-world LQ images and introduce degradation techniques used to synthesize LQ images. We also discuss notable benchmarks commonly utilized in the field. Next, we categorize FR methods based on different tasks and explain their evolution. Furthermore, we explore the various facial priors commonly utilized in restoration and discuss strategies to enhance their effectiveness. In the experimental section, we thoroughly evaluate the performance of state-of-the-art FR methods across various tasks using a unified benchmark. We analyze their performance from different perspectives. Finally, we discuss real-world applications and challenges faced in the field of FR, propose potential directions for future advancements. The open-source repository corresponding to this work can be found at https://github.com/24wenjie-li/Awesome-Face-Restoration .
人脸恢复(FR)是图像恢复中的一个专业领域,旨在将低质量的人脸图像恢复为高质量的人脸图像。深度学习技术的最新进展使FR方法取得了重大进展。在本文中,我们首先研究了导致现实世界LQ图像的普遍因素,并介绍了用于合成LQ图像的降解技术。我们还讨论了该领域中常用的重要基准。接下来,我们根据不同的任务对FR方法进行了分类,并解释了它们的演变。此外,我们还探讨了修复中常用的各种面部先验,并讨论了提高其有效性的策略。在实验部分,我们使用统一的基准全面评估了最先进的FR方法在各种任务中的性能。我们从不同的角度来分析他们的表现。最后,我们讨论了实际应用和面临的挑战,并提出了未来发展的潜在方向。与这项工作相对应的开源存储库可以在https://github.com/24wenjie-li/Awesome-Face-Restoration上找到。
{"title":"Survey on Deep Face Restoration: From Non-blind to Blind and Beyond","authors":"Wenjie Li, Mei Wang, Kai Zhang, Juncheng Li, Xiaoming Li, Yuhang Zhang, Guangwei Gao, Zhanyu Ma","doi":"10.1145/3778162","DOIUrl":"https://doi.org/10.1145/3778162","url":null,"abstract":"Face restoration (FR) is a specialized field within image restoration that aims to recover low-quality (LQ) face images into high-quality (HQ) face images. Recent advances in deep learning technology have led to significant progress in FR methods. In this paper, we begin by examining the prevalent factors responsible for real-world LQ images and introduce degradation techniques used to synthesize LQ images. We also discuss notable benchmarks commonly utilized in the field. Next, we categorize FR methods based on different tasks and explain their evolution. Furthermore, we explore the various facial priors commonly utilized in restoration and discuss strategies to enhance their effectiveness. In the experimental section, we thoroughly evaluate the performance of state-of-the-art FR methods across various tasks using a unified benchmark. We analyze their performance from different perspectives. Finally, we discuss real-world applications and challenges faced in the field of FR, propose potential directions for future advancements. The open-source repository corresponding to this work can be found at <jats:italic toggle=\"yes\">https://github.com/24wenjie-li/Awesome-Face-Restoration</jats:italic> .","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"141 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controlled Natural Language for Requirements Specification: A Systematic Literature Review 需求说明的受控自然语言:系统文献综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-25 DOI: 10.1145/3778169
Ikram Darif, Ghizlane El Boussaidi, Segla Kpodjedo, Cristiano Politowski
Requirements are critical artifacts of the software development life-cycle. They express capabilities that the system should provide, guiding both the development and testing process. Given their significance, requirements specification has attracted the interest of researchers and practitioners in recent years. Requirements specification is an activity where requirements are specified, i.e., documented. In this context, Controlled Natural Languages (CNL) were proposed as a compromise between the ambiguity of natural language and the complexity of formal languages. CNLs enable the specification of requirements using accurate statements that can be processed automatically, while remaining understandable by stakeholders. In this paper, we perform a Systematic Literature Review (SLR) to identify, categorize, and compare CNL approaches for requirements specification. The SLR covers 133 primary studies published between 2000 and 2024. We evaluate them according to seven dimensions: context, scope, targeted requirements types, specification technique, tool support, validation method, and adoption. We provide a categorization framework that summarizes the evaluated dimensions, and we identify directions for future research. Our main results reveal: (1) four types of CNL: standalone templates, requirement patterns, elementary templates, and linguistic rules, (2) limited support for automated tools and domain vocabulary usage, and (3) lack of validation through case studies and limited adoption for the majority of approaches.
需求是软件开发生命周期的关键工件。它们表达了系统应该提供的功能,指导开发和测试过程。鉴于其重要意义,需求规范近年来引起了研究人员和实践者的兴趣。需求规范是一项活动,其中需求被指定,也就是说,被文档化。在这种背景下,受控自然语言(CNL)作为自然语言的模糊性和形式语言的复杂性之间的折衷而被提出。cnl能够使用准确的语句来规范需求,这些语句可以自动处理,同时保持利益相关者的理解。在本文中,我们执行系统文献综述(SLR)来识别、分类和比较需求规范的CNL方法。SLR涵盖了2000年至2024年间发表的133项主要研究。我们根据以下七个维度对它们进行评估:环境、范围、目标需求类型、规范技术、工具支持、验证方法和采用。我们提供了一个分类框架,总结了评估的维度,并确定了未来的研究方向。我们的主要结果显示:(1)四种类型的CNL:独立模板、需求模式、基本模板和语言规则;(2)对自动化工具和领域词汇使用的支持有限;(3)缺乏通过案例研究的验证,并且大多数方法的采用有限。
{"title":"Controlled Natural Language for Requirements Specification: A Systematic Literature Review","authors":"Ikram Darif, Ghizlane El Boussaidi, Segla Kpodjedo, Cristiano Politowski","doi":"10.1145/3778169","DOIUrl":"https://doi.org/10.1145/3778169","url":null,"abstract":"Requirements are critical artifacts of the software development life-cycle. They express capabilities that the system should provide, guiding both the development and testing process. Given their significance, requirements specification has attracted the interest of researchers and practitioners in recent years. Requirements specification is an activity where requirements are specified, i.e., documented. In this context, Controlled Natural Languages (CNL) were proposed as a compromise between the ambiguity of natural language and the complexity of formal languages. CNLs enable the specification of requirements using accurate statements that can be processed automatically, while remaining understandable by stakeholders. In this paper, we perform a Systematic Literature Review (SLR) to identify, categorize, and compare CNL approaches for requirements specification. The SLR covers 133 primary studies published between 2000 and 2024. We evaluate them according to seven dimensions: context, scope, targeted requirements types, specification technique, tool support, validation method, and adoption. We provide a categorization framework that summarizes the evaluated dimensions, and we identify directions for future research. Our main results reveal: (1) four types of CNL: standalone templates, requirement patterns, elementary templates, and linguistic rules, (2) limited support for automated tools and domain vocabulary usage, and (3) lack of validation through case studies and limited adoption for the majority of approaches.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"17 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145593751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Enhancing Technologies for Intelligent Healthcare: Research Challenges and Opportunities 智能医疗的隐私增强技术:研究挑战与机遇
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-22 DOI: 10.1145/3771543
Fawad Khan, Syed Aziz Shah, Shahzaib Tahir, Yazeed Yasin Ghadi, Syed Ikram Shah, Adnan Zahid, Jawad Ahmad, Qammer Hussain Abbasi
The efficient and secure processing of confidential health data always remained an important challenge for healthcare professionals and policymakers as this information needs to be shared among several parties for both data analytics and improved health treatments. In this regard, Privacy Enhancing Technologies (PETs) have already shown great potential in deploying intelligent healthcare systems for improved prognosis and diagnosis. This article explains important privacy-preserving techniques by focusing on their security models and performance issues. It specifically discusses libraries and tools that can be used to implement a particular PET model. Moreover, a detailed comparison is provided to highlight the strengths and weaknesses of each of the privacy enhancing approaches. It further sheds light on the security requirements of the health sector and summarizes state-of-the-art homomorphic encryption, secure multi-party computation, differential privacy, and trusted execution environment approaches used in the healthcare setting. Finally, important parameters are discussed that must be kept in consideration while choosing an optimal PET. The survey is concluded by presenting some future directions to improve the performance of PETs and their usage in the healthcare domain. To the best of our knowledge, it is the first paper that comprehensively discusses PETs in the context of healthcare.
高效、安全地处理机密健康数据始终是医疗保健专业人员和政策制定者面临的一个重要挑战,因为这些信息需要在多方之间共享,以进行数据分析和改进健康治疗。在这方面,隐私增强技术(pet)在部署智能医疗系统以改善预后和诊断方面已经显示出巨大的潜力。本文通过关注它们的安全模型和性能问题来解释重要的隐私保护技术。它特别讨论了可用于实现特定PET模型的库和工具。此外,还提供了详细的比较,以突出每种隐私增强方法的优缺点。它进一步阐明了医疗保健部门的安全需求,并总结了医疗保健环境中使用的最先进的同态加密、安全多方计算、差异隐私和可信执行环境方法。最后,讨论了在选择最佳PET时必须考虑的重要参数。调查的最后提出了一些未来的方向,以提高pet的性能和它们在医疗保健领域的使用。据我们所知,这是第一篇在医疗保健背景下全面讨论pet的论文。
{"title":"Privacy Enhancing Technologies for Intelligent Healthcare: Research Challenges and Opportunities","authors":"Fawad Khan, Syed Aziz Shah, Shahzaib Tahir, Yazeed Yasin Ghadi, Syed Ikram Shah, Adnan Zahid, Jawad Ahmad, Qammer Hussain Abbasi","doi":"10.1145/3771543","DOIUrl":"https://doi.org/10.1145/3771543","url":null,"abstract":"The efficient and secure processing of confidential health data always remained an important challenge for healthcare professionals and policymakers as this information needs to be shared among several parties for both data analytics and improved health treatments. In this regard, Privacy Enhancing Technologies (PETs) have already shown great potential in deploying intelligent healthcare systems for improved prognosis and diagnosis. This article explains important privacy-preserving techniques by focusing on their security models and performance issues. It specifically discusses libraries and tools that can be used to implement a particular PET model. Moreover, a detailed comparison is provided to highlight the strengths and weaknesses of each of the privacy enhancing approaches. It further sheds light on the security requirements of the health sector and summarizes state-of-the-art homomorphic encryption, secure multi-party computation, differential privacy, and trusted execution environment approaches used in the healthcare setting. Finally, important parameters are discussed that must be kept in consideration while choosing an optimal PET. The survey is concluded by presenting some future directions to improve the performance of PETs and their usage in the healthcare domain. To the best of our knowledge, it is the first paper that comprehensively discusses PETs in the context of healthcare.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"30 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145567256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1