首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models 开放伦理人工智能:以人为本的开源神经语言模型的进展
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-06 DOI: 10.1145/3703454
Sabrina Sicari, Jesus F. Cevallos M., Alessandra Rizzardi, Alberto Coen-Porisini
This survey summarizes the most recent methods for building and assessing helpful, honest, and harmless neural language models, considering small, medium, and large-size models. Pointers to open-source resources that help to align pre-trained models are given, including methods that use parameter-efficient techniques, specialized prompting frameworks, adapter modules, case-specific knowledge injection, and adversarially robust training techniques. Special care is given to evidencing recent progress on value alignment, commonsense reasoning, factuality enhancement, and abstract reasoning of language models. Most reviewed works in this survey publicly shared their code and related data and were accepted in world-leading Machine Learning venues. This work aims to help researchers and practitioners accelerate their entrance into the field of human-centric neural language models, which might be a cornerstone of the contemporary and near-future industrial and societal revolution.
本调查总结了构建和评估有益、诚实和无害神经语言模型的最新方法,并考虑了小型、中型和大型模型。文中提供了有助于对齐预训练模型的开源资源,包括使用参数高效技术的方法、专门的提示框架、适配器模块、特定案例知识注入以及对抗性强的训练技术。本调查还特别关注了价值对齐、常识推理、事实性增强和语言模型抽象推理方面的最新进展。本调查报告中的大多数综述作品都公开分享了其代码和相关数据,并被世界领先的机器学习刊物所接受。这项工作旨在帮助研究人员和从业人员加速进入以人为本的神经语言模型领域,这可能是当代和不久将来工业和社会革命的基石。
{"title":"Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models","authors":"Sabrina Sicari, Jesus F. Cevallos M., Alessandra Rizzardi, Alberto Coen-Porisini","doi":"10.1145/3703454","DOIUrl":"https://doi.org/10.1145/3703454","url":null,"abstract":"This survey summarizes the most recent methods for building and assessing <jats:italic>helpful, honest, and harmless</jats:italic> neural language models, considering small, medium, and large-size models. Pointers to open-source resources that help to align pre-trained models are given, including methods that use parameter-efficient techniques, specialized prompting frameworks, adapter modules, case-specific knowledge injection, and adversarially robust training techniques. Special care is given to evidencing recent progress on value alignment, commonsense reasoning, factuality enhancement, and abstract reasoning of language models. Most reviewed works in this survey publicly shared their code and related data and were accepted in world-leading Machine Learning venues. This work aims to help researchers and practitioners accelerate their entrance into the field of human-centric neural language models, which might be a cornerstone of the contemporary and near-future industrial and societal revolution.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"17 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments 5G 和 6G 在医疗环境中的新兴趋势和应用调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-02 DOI: 10.1145/3703154
Shamsher Ullah, Jianqiang Li, Jie Chen, IKRAM ALI, Salabat Khan, Abdul Ahad, Farhan Ullah, Victor Leung
A delay, interruption, or failure in the wireless connection has a significant impact on the performance of wirelessly connected medical equipment. Researchers presented the fastest technological innovations and industrial changes to address these problems and improve the applications of information and communication technology. The development of the 6G communication infrastructure was greatly aided by the use of Block-chain technology, artificial intelligence (AI), virtual reality (VR), and the Internet of Things (IoT). In this paper, we comprehensively discuss 6G technologies enhancement, its fundamental architecture, difficulties, and other issues associated with it. In addition, the outcomes of our research help make 6G technology more applicable to real-world medical environments. The most important thing that this study has contributed is an explanation of the path that future research will take and the current state of the art. This study might serve as a jumping-off point for future researchers in the academic world who are interested in investigating the possibilities of 6G technological developments.
无线连接的延迟、中断或故障会对无线连接医疗设备的性能产生重大影响。研究人员提出了最快的技术创新和产业变革来解决这些问题,并改善信息和通信技术的应用。区块链技术、人工智能(AI)、虚拟现实(VR)和物联网(IoT)的应用极大地促进了 6G 通信基础设施的发展。在本文中,我们全面讨论了 6G 技术的提升、其基本架构、难点以及与之相关的其他问题。此外,我们的研究成果有助于使 6G 技术更适用于现实世界的医疗环境。本研究最重要的贡献是解释了未来研究的方向和当前的技术水平。本研究可作为未来有兴趣研究 6G 技术发展可能性的学术界研究人员的跳板。
{"title":"A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments","authors":"Shamsher Ullah, Jianqiang Li, Jie Chen, IKRAM ALI, Salabat Khan, Abdul Ahad, Farhan Ullah, Victor Leung","doi":"10.1145/3703154","DOIUrl":"https://doi.org/10.1145/3703154","url":null,"abstract":"A delay, interruption, or failure in the wireless connection has a significant impact on the performance of wirelessly connected medical equipment. Researchers presented the fastest technological innovations and industrial changes to address these problems and improve the applications of information and communication technology. The development of the 6G communication infrastructure was greatly aided by the use of Block-chain technology, artificial intelligence (AI), virtual reality (VR), and the Internet of Things (IoT). In this paper, we comprehensively discuss 6G technologies enhancement, its fundamental architecture, difficulties, and other issues associated with it. In addition, the outcomes of our research help make 6G technology more applicable to real-world medical environments. The most important thing that this study has contributed is an explanation of the path that future research will take and the current state of the art. This study might serve as a jumping-off point for future researchers in the academic world who are interested in investigating the possibilities of 6G technological developments.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"26 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142566124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation Methodologies in Software Protection Research 软件保护研究中的评估方法
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-02 DOI: 10.1145/3702314
Bjorn De Sutter, Sebastian Schrittwieser, Bart Coppens, Patrick Kochberger
Man-at-the-end (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware authors want to prevent such attacks. This has driven an arms race between attackers and defenders, resulting in a plethora of different protection and analysis methods. However, it remains difficult to measure the strength of protections because MATE attackers can reach their goals in many different ways and a universally accepted evaluation methodology does not exist. This survey systematically reviews the evaluation methodologies of papers on obfuscation, a major class of protections against MATE attacks. For 571 papers, we collected 113 aspects of their evaluation methodologies, ranging from sample set types and sizes, over sample treatment, to performed measurements. We provide detailed insights into how the academic state of the art evaluates both the protections and analyses thereon. In summary, there is a clear need for better evaluation methodologies. We identify nine challenges for software protection evaluations, which represent threats to the validity, reproducibility, and interpretation of research results in the context of MATE attacks and formulate a number of concrete recommendations for improving the evaluations reported in future research papers.
终端人(MATE)攻击者可以完全控制被攻击软件运行的系统,并试图破坏软件中嵌入资产的机密性或完整性。公司和恶意软件作者都希望防止此类攻击。这推动了攻击者和防御者之间的军备竞赛,从而产生了大量不同的保护和分析方法。然而,由于 MATE 攻击者可以通过多种不同的方式达到目的,而且不存在普遍接受的评估方法,因此仍然很难衡量保护措施的强度。本调查系统地回顾了有关混淆的论文的评估方法,混淆是抵御 MATE 攻击的一类主要保护措施。在 571 篇论文中,我们收集了 113 个方面的评估方法,从样本集类型和大小、样本处理到执行测量。我们提供了关于学术界如何评估保护和分析的详细见解。总之,显然需要更好的评估方法。我们指出了软件保护评估所面临的九大挑战,这些挑战对 MATE 攻击背景下研究成果的有效性、可重复性和解释性构成了威胁。
{"title":"Evaluation Methodologies in Software Protection Research","authors":"Bjorn De Sutter, Sebastian Schrittwieser, Bart Coppens, Patrick Kochberger","doi":"10.1145/3702314","DOIUrl":"https://doi.org/10.1145/3702314","url":null,"abstract":"<jats:italic>Man-at-the-end</jats:italic> (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware authors want to prevent such attacks. This has driven an arms race between attackers and defenders, resulting in a plethora of different protection and analysis methods. However, it remains difficult to measure the strength of protections because MATE attackers can reach their goals in many different ways and a universally accepted evaluation methodology does not exist. This survey systematically reviews the evaluation methodologies of papers on obfuscation, a major class of protections against MATE attacks. For 571 papers, we collected 113 aspects of their evaluation methodologies, ranging from sample set types and sizes, over sample treatment, to performed measurements. We provide detailed insights into how the academic state of the art evaluates both the protections and analyses thereon. In summary, there is a clear need for better evaluation methodologies. We identify nine challenges for software protection evaluations, which represent threats to the validity, reproducibility, and interpretation of research results in the context of MATE attacks and formulate a number of concrete recommendations for improving the evaluations reported in future research papers.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"7 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142566121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gender Bias in Natural Language Processing and Computer Vision: A Comparative Survey 自然语言处理和计算机视觉中的性别偏见:比较调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-02 DOI: 10.1145/3700438
Marion Bartl, Abhishek Mandal, Susan Leavy, Suzanne Little
Taking an interdisciplinary approach to surveying issues around gender bias in textual and visual AI, we present literature on gender bias detection and mitigation in NLP, CV, as well as combined visual-linguistic models. We identify conceptual parallels between these strands of research as well as how methodologies were adapted cross-disciplinary from NLP to CV. We also find that there is a growing awareness for theoretical frameworks from the social sciences around gender in NLP that could be beneficial for aligning bias analytics in CV with human values and conceptualising gender beyond the binary categories of male/female.
我们采用跨学科的方法来研究文本和视觉人工智能中的性别偏见问题,介绍了在 NLP、CV 以及视觉-语言组合模型中检测和减轻性别偏见的文献。我们发现了这些研究领域在概念上的相似之处,以及从 NLP 到 CV 的跨学科方法是如何调整的。我们还发现,越来越多的人意识到社会科学的理论框架与 NLP 中的性别问题有关,这些理论框架有助于将 CV 中的偏差分析与人类价值观相统一,并将性别概念化,使其超越男性/女性的二元分类。
{"title":"Gender Bias in Natural Language Processing and Computer Vision: A Comparative Survey","authors":"Marion Bartl, Abhishek Mandal, Susan Leavy, Suzanne Little","doi":"10.1145/3700438","DOIUrl":"https://doi.org/10.1145/3700438","url":null,"abstract":"Taking an interdisciplinary approach to surveying issues around gender bias in textual and visual AI, we present literature on gender bias detection and mitigation in NLP, CV, as well as combined visual-linguistic models. We identify conceptual parallels between these strands of research as well as how methodologies were adapted cross-disciplinary from NLP to CV. We also find that there is a growing awareness for theoretical frameworks from the social sciences around gender in NLP that could be beneficial for aligning bias analytics in CV with human values and conceptualising gender beyond the binary categories of male/female.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"145 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142566122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog Computing Technology Research: A Retrospective Overview and Bibliometric Analysis 雾计算技术研究:回顾性概述和文献计量分析
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-02 DOI: 10.1145/3702313
Paola Vinueza-Naranjo, Janneth Chicaiza, Ruben Rumipamba-Zambrano
Researchers’ interest in Fog Computing and its application in different sectors has been increasing since the last decade. To discover the emerging trends inherent to this architecture, we analyzed the scientific literature indexed in Scopus through a bibliometric study. Exposing trends in areas of development will allow researchers to understand the changes and evolution over time. For analysis purposes, we used three approaches: performance analysis, science mapping, and literature clustering. Analysis results revealed promising investigation areas in the Fog Computing architecture from 2012 to 2021, which emphasizes that Fog Computing will continue to be an interesting field of research in the future.
自过去十年以来,研究人员对雾计算及其在不同领域应用的兴趣与日俱增。为了发现这一架构的内在新兴趋势,我们通过文献计量学研究分析了 Scopus 索引的科学文献。揭示发展领域的趋势将使研究人员了解随着时间推移发生的变化和演变。为了进行分析,我们采用了三种方法:性能分析、科学绘图和文献聚类。分析结果表明,从 2012 年到 2021 年,雾计算架构的研究领域大有可为,这强调了雾计算在未来仍将是一个有趣的研究领域。
{"title":"Fog Computing Technology Research: A Retrospective Overview and Bibliometric Analysis","authors":"Paola Vinueza-Naranjo, Janneth Chicaiza, Ruben Rumipamba-Zambrano","doi":"10.1145/3702313","DOIUrl":"https://doi.org/10.1145/3702313","url":null,"abstract":"Researchers’ interest in Fog Computing and its application in different sectors has been increasing since the last decade. To discover the emerging trends inherent to this architecture, we analyzed the scientific literature indexed in Scopus through a bibliometric study. Exposing trends in areas of development will allow researchers to understand the changes and evolution over time. For analysis purposes, we used three approaches: performance analysis, science mapping, and literature clustering. Analysis results revealed promising investigation areas in the Fog Computing architecture from 2012 to 2021, which emphasizes that Fog Computing will continue to be an interesting field of research in the future.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"45 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142566120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges 医学图像分析的对抗性攻击和防御调查:方法与挑战
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-30 DOI: 10.1145/3702638
Junhao Dong, Junxi Chen, Xiaohua Xie, Jianhuang Lai, Hao Chen
Deep learning techniques have achieved superior performance in computer-aided medical image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in potential misdiagnosis in clinical practice. Oppositely, recent years have also witnessed remarkable progress in defense against these tailored adversarial examples in deep medical diagnosis systems. In this exposition, we present a comprehensive survey on recent advances in adversarial attacks and defenses for medical image analysis with a systematic taxonomy in terms of the application scenario. We also provide a unified framework for different types of adversarial attack and defense methods in the context of medical image analysis. For a fair comparison, we establish a new benchmark for adversarially robust medical diagnosis models obtained by adversarial training under various scenarios. To the best of our knowledge, this is the first survey paper that provides a thorough evaluation of adversarially robust medical diagnosis models. By analyzing qualitative and quantitative results, we conclude this survey with a detailed discussion of current challenges for adversarial attack and defense in medical image analysis systems to shed light on future research directions. Code is available on GitHub.
深度学习技术在计算机辅助医学图像分析方面取得了卓越的性能,但仍容易受到不易察觉的对抗性攻击,从而在临床实践中造成潜在的误诊。与此相反,近年来深度医疗诊断系统在防御这些定制的对抗性实例方面也取得了显著进展。在这篇论文中,我们对医学图像分析中的对抗性攻击和防御的最新进展进行了全面调查,并根据应用场景进行了系统分类。我们还为医学图像分析中不同类型的对抗性攻击和防御方法提供了一个统一的框架。为了进行公平比较,我们为在各种场景下通过对抗训练获得的对抗鲁棒医学诊断模型建立了一个新的基准。据我们所知,这是第一篇对对抗性鲁棒医学诊断模型进行全面评估的调查论文。通过对定性和定量结果的分析,我们在本调查报告的最后详细讨论了当前医学图像分析系统中对抗性攻击和防御所面临的挑战,以阐明未来的研究方向。代码可在 GitHub 上获取。
{"title":"Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges","authors":"Junhao Dong, Junxi Chen, Xiaohua Xie, Jianhuang Lai, Hao Chen","doi":"10.1145/3702638","DOIUrl":"https://doi.org/10.1145/3702638","url":null,"abstract":"Deep learning techniques have achieved superior performance in computer-aided medical image analysis, yet they are still vulnerable to imperceptible adversarial attacks, resulting in potential misdiagnosis in clinical practice. Oppositely, recent years have also witnessed remarkable progress in defense against these tailored adversarial examples in deep medical diagnosis systems. In this exposition, we present a comprehensive survey on recent advances in adversarial attacks and defenses for medical image analysis with a systematic taxonomy in terms of the application scenario. We also provide a unified framework for different types of adversarial attack and defense methods in the context of medical image analysis. For a fair comparison, we establish a new benchmark for adversarially robust medical diagnosis models obtained by adversarial training under various scenarios. To the best of our knowledge, this is the first survey paper that provides a thorough evaluation of adversarially robust medical diagnosis models. By analyzing qualitative and quantitative results, we conclude this survey with a detailed discussion of current challenges for adversarial attack and defense in medical image analysis systems to shed light on future research directions. Code is available on GitHub.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"51 2 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142556041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backdoor Attacks against Voice Recognition Systems: A Survey 针对语音识别系统的后门攻击:调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-26 DOI: 10.1145/3701985
Baochen Yan, Jiahe Lan, Zheng Yan
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and speaker recognition. They have been widely deployed in various real-world applications, from intelligent voice assistance to telephony surveillance and biometric authentication. However, prior research has revealed the vulnerability of VRSs to backdoor attacks, which pose a significant threat to the security and privacy of VRSs. Unfortunately, existing literature lacks a thorough review on this topic. This paper fills this research gap by conducting a comprehensive survey on backdoor attacks against VRSs. We first present an overview of VRSs and backdoor attacks, elucidating their basic knowledge. Then we propose a set of evaluation criteria to assess the performance of backdoor attack methods. Next, we present a comprehensive taxonomy of backdoor attacks against VRSs from different perspectives and analyze the characteristic of different categories. After that, we comprehensively review existing attack methods and analyze their pros and cons based on the proposed criteria. Furthermore, we review classic backdoor defense methods and generic audio defense techniques. Then we discuss the feasibility of deploying them on VRSs. Finally, we figure out several open issues and further suggest future research directions to motivate the research of VRSs security.
语音识别系统(VRS)采用深度学习技术进行语音识别和说话人识别。它们已被广泛应用于各种现实世界的应用中,从智能语音辅助到电话监控和生物识别身份验证。然而,先前的研究揭示了 VRS 易受后门攻击的弱点,这对 VRS 的安全性和隐私构成了重大威胁。遗憾的是,现有文献缺乏对这一主题的全面综述。本文通过对针对 VRS 的后门攻击进行全面调查,填补了这一研究空白。我们首先概述了 VRS 和后门攻击,阐明了它们的基本知识。然后,我们提出了一套评估后门攻击方法性能的评价标准。接着,我们从不同角度对针对 VRS 的后门攻击进行了全面分类,并分析了不同类别的特点。之后,我们全面回顾了现有的攻击方法,并根据提出的标准分析了它们的优缺点。此外,我们还回顾了经典后门防御方法和通用音频防御技术。然后,我们讨论了在 VRS 上部署这些技术的可行性。最后,我们指出了几个有待解决的问题,并进一步提出了未来的研究方向,以推动 VRS 安全性的研究。
{"title":"Backdoor Attacks against Voice Recognition Systems: A Survey","authors":"Baochen Yan, Jiahe Lan, Zheng Yan","doi":"10.1145/3701985","DOIUrl":"https://doi.org/10.1145/3701985","url":null,"abstract":"Voice Recognition Systems (VRSs) employ deep learning for speech recognition and speaker recognition. They have been widely deployed in various real-world applications, from intelligent voice assistance to telephony surveillance and biometric authentication. However, prior research has revealed the vulnerability of VRSs to backdoor attacks, which pose a significant threat to the security and privacy of VRSs. Unfortunately, existing literature lacks a thorough review on this topic. This paper fills this research gap by conducting a comprehensive survey on backdoor attacks against VRSs. We first present an overview of VRSs and backdoor attacks, elucidating their basic knowledge. Then we propose a set of evaluation criteria to assess the performance of backdoor attack methods. Next, we present a comprehensive taxonomy of backdoor attacks against VRSs from different perspectives and analyze the characteristic of different categories. After that, we comprehensively review existing attack methods and analyze their pros and cons based on the proposed criteria. Furthermore, we review classic backdoor defense methods and generic audio defense techniques. Then we discuss the feasibility of deploying them on VRSs. Finally, we figure out several open issues and further suggest future research directions to motivate the research of VRSs security.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"15 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142490790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taxonomy and Survey of Collaborative Intrusion Detection System using Federated Learning 使用联盟学习的协作式入侵检测系统的分类与调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-25 DOI: 10.1145/3701724
Aulia Arif Wardana, Parman Sukarno
This review paper looks at recent research on Federated Learning (FL) for Collaborative Intrusion Detection Systems (CIDS) to establish a taxonomy and survey. The motivation behind this review comes from the difficulty of detecting coordinated cyberattacks in large-scale distributed networks. Collaborative anomalies are one of the network anomalies that need to be detected through robust collaborative learning methods. FL is promising collaborative learning method in recent research. This review aims to offer insights and lesson learn for creating a taxonomy of collaborative anomaly detection in CIDS using FL as a collaborative learning method. Our findings suggest that a taxonomy is required to map the discussion area, including an algorithm for training the learning model, the dataset, global aggregation model, system architecture, security, and privacy. Our results indicate that FL is a promising approach for collaborative anomaly detection in CIDS, and the proposed taxonomy could be useful for future research in this area. Overall, this review contributes to the growing knowledge of FL for CIDS, providing insights and lessons for researchers and practitioners. This research also concludes significant challenges, opportunities, and future directions in CIDS based on collaborative anomaly detection using FL.
这篇综述论文探讨了最近关于协作式入侵检测系统(CIDS)的联合学习(FL)研究,以建立分类和调查。这篇综述的动机来自于在大规模分布式网络中检测协同网络攻击的难度。协作异常是需要通过强大的协作学习方法来检测的网络异常之一。在最近的研究中,FL 是一种很有前景的协作学习方法。本综述旨在为使用 FL 作为协作学习方法在 CIDS 中创建协作异常检测分类法提供见解和经验教训。我们的研究结果表明,需要一个分类法来映射讨论领域,包括训练学习模型的算法、数据集、全局聚合模型、系统架构、安全性和隐私性。我们的研究结果表明,FL 是在 CIDS 中进行协作异常检测的一种很有前途的方法,所提出的分类法对这一领域的未来研究很有帮助。总之,本综述有助于加深人们对用于 CIDS 的 FL 的了解,为研究人员和从业人员提供见解和经验。本研究还总结了基于使用 FL 的协同异常检测的 CIDS 所面临的重大挑战、机遇和未来发展方向。
{"title":"Taxonomy and Survey of Collaborative Intrusion Detection System using Federated Learning","authors":"Aulia Arif Wardana, Parman Sukarno","doi":"10.1145/3701724","DOIUrl":"https://doi.org/10.1145/3701724","url":null,"abstract":"This review paper looks at recent research on Federated Learning (FL) for Collaborative Intrusion Detection Systems (CIDS) to establish a taxonomy and survey. The motivation behind this review comes from the difficulty of detecting coordinated cyberattacks in large-scale distributed networks. Collaborative anomalies are one of the network anomalies that need to be detected through robust collaborative learning methods. FL is promising collaborative learning method in recent research. This review aims to offer insights and lesson learn for creating a taxonomy of collaborative anomaly detection in CIDS using FL as a collaborative learning method. Our findings suggest that a taxonomy is required to map the discussion area, including an algorithm for training the learning model, the dataset, global aggregation model, system architecture, security, and privacy. Our results indicate that FL is a promising approach for collaborative anomaly detection in CIDS, and the proposed taxonomy could be useful for future research in this area. Overall, this review contributes to the growing knowledge of FL for CIDS, providing insights and lessons for researchers and practitioners. This research also concludes significant challenges, opportunities, and future directions in CIDS based on collaborative anomaly detection using FL.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"3 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142490644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Blockchain Technology, Current Challenges, and AI-Driven Solutions 区块链技术、当前挑战和人工智能驱动的解决方案综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-24 DOI: 10.1145/3700641
Moetez Abdelhamid, Layth Sliman, Raoudha Ben Djemaa, Guido Perboli
Blockchain provides several advantages, including decentralization, data integrity, traceability, and immutability. However, despite its advantages, blockchain suffers from significant limitations, including scalability, resource greediness, governance complexity, and some security related issues. These limitations prevent its adoption in mainstream applications. Artificial Intelligence (AI) can help addressing some of these limitations. This survey provides a detailed overview of the different blockchain AI-based optimization and improvement approaches, tools and methodologies proposed to meet the needs of existing systems and applications with their benefits and drawbacks. Afterwards, the focus is on suggesting AI-based directions where to address some of the fundamental limitations of blockchain.
区块链具有多种优势,包括去中心化、数据完整性、可追溯性和不变性。然而,尽管区块链具有这些优势,但它也存在着很大的局限性,包括可扩展性、资源贪婪性、治理复杂性以及一些与安全相关的问题。这些局限性阻碍了其在主流应用中的采用。人工智能(AI)可以帮助解决其中的一些限制。本调查详细概述了为满足现有系统和应用的需求而提出的基于人工智能的不同区块链优化和改进方法、工具和方法论及其优点和缺点。之后,重点是提出基于人工智能的方向,以解决区块链的一些基本限制。
{"title":"A Review on Blockchain Technology, Current Challenges, and AI-Driven Solutions","authors":"Moetez Abdelhamid, Layth Sliman, Raoudha Ben Djemaa, Guido Perboli","doi":"10.1145/3700641","DOIUrl":"https://doi.org/10.1145/3700641","url":null,"abstract":"Blockchain provides several advantages, including decentralization, data integrity, traceability, and immutability. However, despite its advantages, blockchain suffers from significant limitations, including scalability, resource greediness, governance complexity, and some security related issues. These limitations prevent its adoption in mainstream applications. Artificial Intelligence (AI) can help addressing some of these limitations. This survey provides a detailed overview of the different blockchain AI-based optimization and improvement approaches, tools and methodologies proposed to meet the needs of existing systems and applications with their benefits and drawbacks. Afterwards, the focus is on suggesting AI-based directions where to address some of the fundamental limitations of blockchain.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"15 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modality deep-learning frameworks for fake news detection on social networks: a systematic literature review 用于社交网络假新闻检测的模态深度学习框架:系统性文献综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-23 DOI: 10.1145/3700748
Mohamed Mostafa, Ahmad S Almogren, Muhammad Al-Qurishi, Majed Alrubaian
Fake news on social networks is a challenging problem due to the rapid dissemination and volume of information, as well as the ease of creating and sharing content anonymously. Fake news stories are problematic not only for the credibility of online journalism, but also due to their detrimental real-world consequences. The primary research objective of this study is: What are the recent state-of-the-art modalities based on deep learning to detect fake news in social networks. This paper presents a systematic literature review of deep learning-based fake news detection models in social networks. The methodology followed a rigorous approach, including predefined criteria for study selection of deep learning modalities. This study focuses on the types of deep learning modalities; unimodal (refers to the use of a single model for analysis or modeling purposes) and multimodal models (refers to the integration of multiple models). The results of this review reveal the strengths and weaknesses of modalities approaches, as well as the limitations of low-resource languages datasets. Furthermore, it provides insights into future directions for deep learning models and different fact checking techniques. At the end of this study, we discuss the problem of fake news detection in the era of large language models in terms of advantages, drawbacks, and challenges.
社交网络上的假新闻是一个具有挑战性的问题,这是因为信息传播速度快、数量大,而且匿名创建和分享内容非常容易。假新闻不仅会影响网络新闻的可信度,还会对现实世界造成有害影响。本研究的主要研究目标是最近有哪些基于深度学习的先进模式来检测社交网络中的假新闻。本文对基于深度学习的社交网络假新闻检测模型进行了系统的文献综述。研究方法遵循严格的方法,包括预定义的深度学习模式研究选择标准。本研究侧重于深度学习模式的类型;单模态(指使用单一模型进行分析或建模)和多模态模型(指整合多个模型)。综述结果揭示了模式方法的优缺点,以及低资源语言数据集的局限性。此外,它还为深度学习模型和不同事实检查技术的未来发展方向提供了见解。在本研究的最后,我们从优势、缺点和挑战三个方面讨论了大型语言模型时代的假新闻检测问题。
{"title":"Modality deep-learning frameworks for fake news detection on social networks: a systematic literature review","authors":"Mohamed Mostafa, Ahmad S Almogren, Muhammad Al-Qurishi, Majed Alrubaian","doi":"10.1145/3700748","DOIUrl":"https://doi.org/10.1145/3700748","url":null,"abstract":"Fake news on social networks is a challenging problem due to the rapid dissemination and volume of information, as well as the ease of creating and sharing content anonymously. Fake news stories are problematic not only for the credibility of online journalism, but also due to their detrimental real-world consequences. The primary research objective of this study is: What are the recent state-of-the-art modalities based on deep learning to detect fake news in social networks. This paper presents a systematic literature review of deep learning-based fake news detection models in social networks. The methodology followed a rigorous approach, including predefined criteria for study selection of deep learning modalities. This study focuses on the types of deep learning modalities; unimodal (refers to the use of a single model for analysis or modeling purposes) and multimodal models (refers to the integration of multiple models). The results of this review reveal the strengths and weaknesses of modalities approaches, as well as the limitations of low-resource languages datasets. Furthermore, it provides insights into future directions for deep learning models and different fact checking techniques. At the end of this study, we discuss the problem of fake news detection in the era of large language models in terms of advantages, drawbacks, and challenges.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"13 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142488348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1