首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
Early-Exit Deep Neural Network - A Comprehensive Survey 早期退出深度神经网络--全面调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-07 DOI: 10.1145/3698767
Haseena Rahmath P, Vishal Srivastava, Kuldeep Chaurasia, Roberto G. Pacheco, Rodrigo S. Couto
Deep neural networks (DNNs) typically have a single exit point that makes predictions by running the entire stack of neural layers. Since not all inputs require the same amount of computation to reach a confident prediction, recent research has focused on incorporating multiple ”exits” into the conventional DNN architecture. Early-exit DNNs are multi-exit neural networks that attach many side branches to the conventional DNN, enabling inference to stop early at intermediate points. This approach offers several advantages, including speeding up the inference process, mitigating the vanishing gradients problems, reducing overfitting and overthinking tendencies. It also supports DNN partitioning across devices and is ideal for multi-tier computation platforms such as edge computing. This paper decomposes the early-exit DNN architecture and reviews the recent advances in the field. The study explores its benefits, designs, training strategies, and adaptive inference mechanisms. Various design challenges, application scenarios, and future directions are also extensively discussed.
深度神经网络(DNN)通常只有一个出口,通过运行整个神经层栈进行预测。由于并非所有输入都需要相同的计算量才能达到有把握的预测,因此最近的研究重点是在传统 DNN 架构中加入多个 "出口"。早期出口 DNN 是一种多出口神经网络,它在传统 DNN 上附加了许多侧枝,使推理能够在中间点提前停止。这种方法有几个优点,包括加快推理过程、缓解梯度消失问题、减少过度拟合和过度思考倾向。它还支持 DNN 跨设备分区,是边缘计算等多层计算平台的理想选择。本文分解了早期退出 DNN 架构,并回顾了该领域的最新进展。研究探讨了其优势、设计、训练策略和自适应推理机制。本文还广泛讨论了各种设计挑战、应用场景和未来发展方向。
{"title":"Early-Exit Deep Neural Network - A Comprehensive Survey","authors":"Haseena Rahmath P, Vishal Srivastava, Kuldeep Chaurasia, Roberto G. Pacheco, Rodrigo S. Couto","doi":"10.1145/3698767","DOIUrl":"https://doi.org/10.1145/3698767","url":null,"abstract":"Deep neural networks (DNNs) typically have a single exit point that makes predictions by running the entire stack of neural layers. Since not all inputs require the same amount of computation to reach a confident prediction, recent research has focused on incorporating multiple ”exits” into the conventional DNN architecture. Early-exit DNNs are multi-exit neural networks that attach many side branches to the conventional DNN, enabling inference to stop early at intermediate points. This approach offers several advantages, including speeding up the inference process, mitigating the vanishing gradients problems, reducing overfitting and overthinking tendencies. It also supports DNN partitioning across devices and is ideal for multi-tier computation platforms such as edge computing. This paper decomposes the early-exit DNN architecture and reviews the recent advances in the field. The study explores its benefits, designs, training strategies, and adaptive inference mechanisms. Various design challenges, application scenarios, and future directions are also extensively discussed.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142384405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Editing for Large Language Models: A Survey 大型语言模型的知识编辑:调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-07 DOI: 10.1145/3698590
Song Wang, Yaochen Zhu, Haochen Liu, Zaiyi Zheng, Chen Chen, Jundong Li
Large Language Models (LLMs) have recently transformed both the academic and industrial landscapes due to their remarkable capacity to understand, analyze, and generate texts based on their vast knowledge and reasoning ability. Nevertheless, one major drawback of LLMs is their substantial computational cost for pre-training due to their unprecedented amounts of parameters. The disadvantage is exacerbated when new knowledge frequently needs to be introduced into the pre-trained model. Therefore, it is imperative to develop effective and efficient techniques to update pre-trained LLMs. Traditional methods encode new knowledge in pre-trained LLMs through direct fine-tuning. However, naively re-training LLMs can be computationally intensive and risks degenerating valuable pre-trained knowledge irrelevant to the update in the model. Recently, Knowledge-based Model Editing (KME), also known as Knowledge Editing or Model Editing , has attracted increasing attention, which aims to precisely modify the LLMs to incorporate specific knowledge, without negatively influencing other irrelevant knowledge. In this survey, we aim to provide a comprehensive and in-depth overview of recent advances in the field of KME. We first introduce a general formulation of KME to encompass different KME strategies. Afterward, we provide an innovative taxonomy of KME techniques based on how the new knowledge is introduced into pre-trained LLMs, and investigate existing KME strategies while analyzing key insights, advantages, and limitations of methods from each category. Moreover, representative metrics, datasets, and applications of KME are introduced accordingly. Finally, we provide an in-depth analysis regarding the practicality and remaining challenges of KME and suggest promising research directions for further advancement in this field.
大型语言模型(LLMs)凭借其丰富的知识和推理能力,在理解、分析和生成文本方面具有非凡的能力,近来已改变了学术界和工业界的面貌。然而,LLMs 的一个主要缺点是,由于参数数量空前庞大,预训练的计算成本非常高。如果经常需要在预训练模型中引入新知识,这一缺点就会更加严重。因此,当务之急是开发有效且高效的技术来更新预训练 LLM。传统方法通过直接微调将新知识编码到预训练 LLM 中。然而,天真地重新训练 LLM 可能会耗费大量计算,并有可能使模型中与更新无关的有价值的预训练知识退化。最近,基于知识的模型编辑(Knowledge-based Model Editing,KME),也称为知识编辑或模型编辑(Model Editing),吸引了越来越多的关注,其目的是精确修改 LLMs,以纳入特定知识,同时不对其他无关知识产生负面影响。在本研究中,我们旨在全面深入地概述 KME 领域的最新进展。我们首先介绍了 KME 的一般表述,以涵盖不同的 KME 策略。随后,我们根据如何将新知识引入预训练的 LLM,提供了一种创新的 KME 技术分类法,并研究了现有的 KME 策略,同时分析了各类方法的关键见解、优势和局限性。此外,我们还介绍了 KME 的代表性指标、数据集和应用。最后,我们深入分析了 KME 的实用性和仍然存在的挑战,并为进一步推动该领域的发展提出了有前景的研究方向。
{"title":"Knowledge Editing for Large Language Models: A Survey","authors":"Song Wang, Yaochen Zhu, Haochen Liu, Zaiyi Zheng, Chen Chen, Jundong Li","doi":"10.1145/3698590","DOIUrl":"https://doi.org/10.1145/3698590","url":null,"abstract":"Large Language Models (LLMs) have recently transformed both the academic and industrial landscapes due to their remarkable capacity to understand, analyze, and generate texts based on their vast knowledge and reasoning ability. Nevertheless, one major drawback of LLMs is their substantial computational cost for pre-training due to their unprecedented amounts of parameters. The disadvantage is exacerbated when new knowledge frequently needs to be introduced into the pre-trained model. Therefore, it is imperative to develop effective and efficient techniques to update pre-trained LLMs. Traditional methods encode new knowledge in pre-trained LLMs through direct fine-tuning. However, naively re-training LLMs can be computationally intensive and risks degenerating valuable pre-trained knowledge irrelevant to the update in the model. Recently, Knowledge-based Model Editing (KME), also known as Knowledge Editing or Model Editing , has attracted increasing attention, which aims to precisely modify the LLMs to incorporate specific knowledge, without negatively influencing other irrelevant knowledge. In this survey, we aim to provide a comprehensive and in-depth overview of recent advances in the field of KME. We first introduce a general formulation of KME to encompass different KME strategies. Afterward, we provide an innovative taxonomy of KME techniques based on how the new knowledge is introduced into pre-trained LLMs, and investigate existing KME strategies while analyzing key insights, advantages, and limitations of methods from each category. Moreover, representative metrics, datasets, and applications of KME are introduced accordingly. Finally, we provide an in-depth analysis regarding the practicality and remaining challenges of KME and suggest promising research directions for further advancement in this field.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142384404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co-clustering: a Survey of the Main Methods, Recent Trends and Open Problems 协同聚类:主要方法、最新趋势和未决问题概览
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-04 DOI: 10.1145/3698875
Elena Battaglia, Federico Peiretti, Ruggero Gaetano Pensa
Since its early formulations, co-clustering has gained popularity and interest both within and outside the machine learning community as a powerful learning paradigm for clustering high-dimensional data with good explainability properties. The simultaneous partitioning of all the modes of the input data tensors (rows and columns in a data matrix) is both a method for improving clustering on one mode while performing dimensionality reduction on the other mode(s), and a tool for providing an actionable interpretation of the clusters in the main mode as summaries of the features in each other mode(s). Hence, it is useful in many complex decision systems and data science applications. In this paper, we survey the the co-clustering literature by reviewing the main co-clustering methods, with a special focus on the work done in the last twenty-five years. We identify, describe and compare the main algorithmic categories, and provide a practical characterization with respect to similar unsupervised techniques. Additionally, we also try to explain why it is still a powerful tool despite the apparent recent decreasing interest shown by the machine learning community. To this purpose, we review the most recent trends in co-clustering research and outline the open problems and promising future research perspectives.
协同聚类作为一种强大的学习范式,可对高维数据进行聚类,并具有良好的可解释性。对输入数据张量(数据矩阵中的行和列)的所有模式同时进行分区,既是一种在一种模式上改进聚类的方法,同时又能在其他模式上进行降维,还是一种将主要模式中的聚类解释为其他模式中特征总结的工具。因此,它在许多复杂的决策系统和数据科学应用中都非常有用。在本文中,我们通过回顾主要的协同聚类方法,对协同聚类文献进行了调查,并特别关注了过去二十五年所做的工作。我们识别、描述和比较了主要的算法类别,并提供了类似无监督技术的实用特征。此外,我们还试图解释为什么尽管最近机器学习界对无监督技术的兴趣明显减弱,但它仍然是一种强大的工具。为此,我们回顾了协同聚类研究的最新趋势,并概述了有待解决的问题和未来的研究前景。
{"title":"Co-clustering: a Survey of the Main Methods, Recent Trends and Open Problems","authors":"Elena Battaglia, Federico Peiretti, Ruggero Gaetano Pensa","doi":"10.1145/3698875","DOIUrl":"https://doi.org/10.1145/3698875","url":null,"abstract":"Since its early formulations, co-clustering has gained popularity and interest both within and outside the machine learning community as a powerful learning paradigm for clustering high-dimensional data with good explainability properties. The simultaneous partitioning of all the modes of the input data tensors (rows and columns in a data matrix) is both a method for improving clustering on one mode while performing dimensionality reduction on the other mode(s), and a tool for providing an actionable interpretation of the clusters in the main mode as summaries of the features in each other mode(s). Hence, it is useful in many complex decision systems and data science applications. In this paper, we survey the the co-clustering literature by reviewing the main co-clustering methods, with a special focus on the work done in the last twenty-five years. We identify, describe and compare the main algorithmic categories, and provide a practical characterization with respect to similar unsupervised techniques. Additionally, we also try to explain why it is still a powerful tool despite the apparent recent decreasing interest shown by the machine learning community. To this purpose, we review the most recent trends in co-clustering research and outline the open problems and promising future research perspectives.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge-based Cyber Physical Security at Smart Home: A Review 基于知识的智能家居网络物理安全:综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1145/3698768
Azhar Alsufyani, Omar Rana, Charith Perera
Smart-home systems represent the future of modern building infrastructure as they integrate numerous devices and applications to improve the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies and algorithmic controls to monitor and manage physical environments. However, ensuring robust security in smart homes, along with securing smart devices, presents a formidable challenge. A substantial number of security solutions for smart homes rely on data-driven approaches (e.g., machine/deep learning) to identify and mitigate potential threats. These approaches involve training models on extensive datasets, which distinguishes them from knowledge-driven methods. In this review, we examine the role of knowledge within smart homes, focusing on understanding and reasoning regarding various events and their utility towards securing smart homes. We propose a taxonomy to characterize the categorization of decision-making approaches. By specifying the most common vulnerabilities, attacks, and threats, we can analyze and assess the countermeasures against them. We also examine how smart homes have been evaluated in the reviewed literature. Furthermore, we explore the challenges inherent in smart homes and investigate existing solutions that aim to overcome these limitations. Finally, we examine the key gaps in smart-home-security research and define future research directions for knowledge-driven schemes.
智能家居系统代表着现代建筑基础设施的未来,因为这些系统集成了众多设备和应用程序,以提高整体生活质量。这些系统在智能设备之间建立连接,利用网络技术和算法控制来监控和管理物理环境。然而,如何确保智能家居的稳健安全,同时确保智能设备的安全,是一项艰巨的挑战。大量智能家居安全解决方案都依赖于数据驱动方法(如机器/深度学习)来识别和减轻潜在威胁。这些方法涉及在大量数据集上训练模型,这使它们有别于知识驱动型方法。在本综述中,我们将研究知识在智能家居中的作用,重点关注对各种事件的理解和推理,以及它们在确保智能家居安全方面的效用。我们提出了一种分类法,用于描述决策方法的分类特征。通过说明最常见的漏洞、攻击和威胁,我们可以分析和评估针对它们的对策。我们还研究了所查阅文献中对智能家居的评估方式。此外,我们还探讨了智能家居固有的挑战,并研究了旨在克服这些局限性的现有解决方案。最后,我们探讨了智能家居安全研究中的主要差距,并确定了知识驱动方案的未来研究方向。
{"title":"Knowledge-based Cyber Physical Security at Smart Home: A Review","authors":"Azhar Alsufyani, Omar Rana, Charith Perera","doi":"10.1145/3698768","DOIUrl":"https://doi.org/10.1145/3698768","url":null,"abstract":"Smart-home systems represent the future of modern building infrastructure as they integrate numerous devices and applications to improve the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies and algorithmic controls to monitor and manage physical environments. However, ensuring robust security in smart homes, along with securing smart devices, presents a formidable challenge. A substantial number of security solutions for smart homes rely on data-driven approaches (e.g., machine/deep learning) to identify and mitigate potential threats. These approaches involve training models on extensive datasets, which distinguishes them from knowledge-driven methods. In this review, we examine the role of knowledge within smart homes, focusing on understanding and reasoning regarding various events and their utility towards securing smart homes. We propose a taxonomy to characterize the categorization of decision-making approaches. By specifying the most common vulnerabilities, attacks, and threats, we can analyze and assess the countermeasures against them. We also examine how smart homes have been evaluated in the reviewed literature. Furthermore, we explore the challenges inherent in smart homes and investigate existing solutions that aim to overcome these limitations. Finally, we examine the key gaps in smart-home-security research and define future research directions for knowledge-driven schemes.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of Privacy Policy Literature 隐私政策文献的系统回顾
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-01 DOI: 10.1145/3698393
Yousra Javed, Ayesha Sajid
An organization’s privacy policy states how it collects, stores, processes, and shares its users’ personal information. The growing number of data protection laws and regulations as well as the numerous sectors where the organizations are collecting user information, has led to the investigation of privacy policies with regards to their accessibility, readability, completeness, comparison with organization’s actual data practices, use of machine learning/natural language processing for automated analysis, and comprehension/perception/concerns of end-users via summarization/visualization tools and user studies. However, there is limited work on systematically reviewing the existing research on this topic. We address this gap by conducting a systematic review of the existing privacy policy literature. To this end, we compiled and analyzed 202 papers (published till 31 st December 2023) that investigated privacy policies. Our work advances the field of privacy policies by summarizing the analysis techniques that have been used to study them, the data protection laws/regulations explored, and the sectors to which these policies pertain. We provide actionable insights for organizations to achieve better end-user privacy.
一个组织的隐私政策说明了它如何收集、存储、处理和共享用户的个人信息。随着数据保护法律法规的不断增多,以及企业收集用户信息的领域不断扩大,人们开始对隐私政策的可访问性、可读性、完整性、与企业实际数据实践的比较、机器学习/自然语言处理在自动分析中的应用,以及最终用户通过总结/可视化工具和用户研究对隐私政策的理解/感知/关注等方面进行研究。然而,系统回顾有关这一主题的现有研究的工作十分有限。针对这一空白,我们对现有的隐私政策文献进行了系统回顾。为此,我们汇编并分析了 202 篇研究隐私政策的论文(发表至 2023 年 12 月 31 日)。我们的工作总结了用于研究隐私政策的分析技术、所探讨的数据保护法律/法规以及这些政策所涉及的行业,从而推动了隐私政策领域的发展。我们为企业提供了可操作的见解,以实现更好的最终用户隐私保护。
{"title":"A Systematic Review of Privacy Policy Literature","authors":"Yousra Javed, Ayesha Sajid","doi":"10.1145/3698393","DOIUrl":"https://doi.org/10.1145/3698393","url":null,"abstract":"An organization’s privacy policy states how it collects, stores, processes, and shares its users’ personal information. The growing number of data protection laws and regulations as well as the numerous sectors where the organizations are collecting user information, has led to the investigation of privacy policies with regards to their accessibility, readability, completeness, comparison with organization’s actual data practices, use of machine learning/natural language processing for automated analysis, and comprehension/perception/concerns of end-users via summarization/visualization tools and user studies. However, there is limited work on systematically reviewing the existing research on this topic. We address this gap by conducting a systematic review of the existing privacy policy literature. To this end, we compiled and analyzed 202 papers (published till 31 <jats:sup>st</jats:sup> December 2023) that investigated privacy policies. Our work advances the field of privacy policies by summarizing the analysis techniques that have been used to study them, the data protection laws/regulations explored, and the sectors to which these policies pertain. We provide actionable insights for organizations to achieve better end-user privacy.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions 电动汽车和飞行器的网络安全:威胁、挑战、人工智能解决方案和未来方向
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-30 DOI: 10.1145/3697830
Hamed Alqahtani, Gulshan Kumar
Electric and Flying Vehicles (EnFVs) represent a transformative shift in transportation, promising enhanced efficiency and reduced environmental impact. However, their integration into interconnected digital ecosystems poses significant cybersecurity challenges, including cyber-physical threats, privacy vulnerabilities, and supply chain risks. This paper comprehensively explores these challenges and investigates artificial intelligence (AI)-driven solutions to bolster EnFV cybersecurity. The study begins with an overview of EnFV cybersecurity issues, emphasizing the increasing complexity of threats in digital transportation systems. Methodologically, the paper reviews existing literature to identify gaps and assesses recent advancements in AI for cybersecurity applications. Key methodologies include AI-powered intrusion detection, threat analysis leveraging machine learning algorithms, predictive maintenance strategies, and enhanced authentication protocols. Results underscore the effectiveness of AI technologies in mitigating EnFV cybersecurity risks, demonstrating improved threat detection and response capabilities. The study concludes by outlining future research directions, highlighting the need for continued innovation in AI, quantum computing resilience, blockchain applications, and ethical considerations. These findings contribute to a clearer understanding of EnFV cybersecurity dynamics and provide a roadmap for enhancing the security and reliability of future transportation systems.
电动汽车和飞行汽车(EnFVs)代表了交通运输领域的变革,有望提高效率并减少对环境的影响。然而,它们与互联数字生态系统的整合带来了巨大的网络安全挑战,包括网络物理威胁、隐私漏洞和供应链风险。本文全面探讨了这些挑战,并研究了人工智能(AI)驱动的解决方案,以加强 EnFV 网络安全。研究首先概述了 EnFV 网络安全问题,强调了数字运输系统中日益复杂的威胁。在方法论上,本文回顾了现有文献以找出差距,并评估了人工智能在网络安全应用方面的最新进展。主要方法包括人工智能驱动的入侵检测、利用机器学习算法进行威胁分析、预测性维护策略以及增强型身份验证协议。研究结果强调了人工智能技术在降低 EnFV 网络安全风险方面的有效性,并展示了经过改进的威胁检测和响应能力。研究最后概述了未来的研究方向,强调了在人工智能、量子计算弹性、区块链应用和伦理考虑方面持续创新的必要性。这些发现有助于更清晰地了解 EnFV 网络安全动态,并为提高未来运输系统的安全性和可靠性提供了路线图。
{"title":"Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions","authors":"Hamed Alqahtani, Gulshan Kumar","doi":"10.1145/3697830","DOIUrl":"https://doi.org/10.1145/3697830","url":null,"abstract":"Electric and Flying Vehicles (EnFVs) represent a transformative shift in transportation, promising enhanced efficiency and reduced environmental impact. However, their integration into interconnected digital ecosystems poses significant cybersecurity challenges, including cyber-physical threats, privacy vulnerabilities, and supply chain risks. This paper comprehensively explores these challenges and investigates artificial intelligence (AI)-driven solutions to bolster EnFV cybersecurity. The study begins with an overview of EnFV cybersecurity issues, emphasizing the increasing complexity of threats in digital transportation systems. Methodologically, the paper reviews existing literature to identify gaps and assesses recent advancements in AI for cybersecurity applications. Key methodologies include AI-powered intrusion detection, threat analysis leveraging machine learning algorithms, predictive maintenance strategies, and enhanced authentication protocols. Results underscore the effectiveness of AI technologies in mitigating EnFV cybersecurity risks, demonstrating improved threat detection and response capabilities. The study concludes by outlining future research directions, highlighting the need for continued innovation in AI, quantum computing resilience, blockchain applications, and ethical considerations. These findings contribute to a clearer understanding of EnFV cybersecurity dynamics and provide a roadmap for enhancing the security and reliability of future transportation systems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explaining the Explainers in Graph Neural Networks: a Comparative Study 图神经网络中的解释器:一项比较研究
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-24 DOI: 10.1145/3696444
Antonio Longa, Steve Azzolin, Gabriele Santin, Giulia Cencetti, Pietro Lio, Bruno Lepri, Andrea Passerini
Following a fast initial breakthrough in graph based learning, Graph Neural Networks (GNNs) have reached a widespread application in many science and engineering fields, prompting the need for methods to understand their decision process. GNN explainers have started to emerge in recent years, with a multitude of methods both novel or adapted from other domains. To sort out this plethora of alternative approaches, several studies have benchmarked the performance of different explainers in terms of various explainability metrics. However, these earlier works make no attempts at providing insights into why different GNN architectures are more or less explainable, or which explainer should be preferred in a given setting. In this survey we fill these gaps by devising a systematic experimental study, which tests twelve explainers on eight representative message-passing architectures trained on six carefully designed graph and node classification datasets. With our results we provide key insights on the choice and applicability of GNN explainers, we isolate key components that make them usable and successful and provide recommendations on how to avoid common interpretation pitfalls. We conclude by highlighting open questions and directions of possible future research.
图神经网络(Graph Neural Networks,GNN)在基于图的学习方面取得了快速的初步突破,并在许多科学和工程领域得到了广泛应用,这促使人们需要了解其决策过程的方法。近年来,GNN 解释器开始出现,其中既有新颖的方法,也有从其他领域改编而来的大量方法。为了剔除这些大量的替代方法,一些研究根据各种可解释性指标对不同解释器的性能进行了基准测试。然而,这些早期研究并没有深入探讨为什么不同的 GNN 架构具有更高或更低的可解释性,或者在特定环境下哪种解释器更受青睐。在这份调查报告中,我们通过系统的实验研究填补了这些空白,在六个精心设计的图和节点分类数据集上对八个具有代表性的消息传递架构上的十二种解释器进行了测试。通过研究结果,我们对 GNN 解释器的选择和适用性提出了重要见解,找出了使解释器可用和成功的关键要素,并就如何避免常见解释陷阱提出了建议。最后,我们强调了有待解决的问题和未来可能的研究方向。
{"title":"Explaining the Explainers in Graph Neural Networks: a Comparative Study","authors":"Antonio Longa, Steve Azzolin, Gabriele Santin, Giulia Cencetti, Pietro Lio, Bruno Lepri, Andrea Passerini","doi":"10.1145/3696444","DOIUrl":"https://doi.org/10.1145/3696444","url":null,"abstract":"Following a fast initial breakthrough in graph based learning, Graph Neural Networks (GNNs) have reached a widespread application in many science and engineering fields, prompting the need for methods to understand their decision process. GNN explainers have started to emerge in recent years, with a multitude of methods both novel or adapted from other domains. To sort out this plethora of alternative approaches, several studies have benchmarked the performance of different explainers in terms of various explainability metrics. However, these earlier works make no attempts at providing insights into why different GNN architectures are more or less explainable, or which explainer should be preferred in a given setting. In this survey we fill these gaps by devising a systematic experimental study, which tests twelve explainers on eight representative message-passing architectures trained on six carefully designed graph and node classification datasets. With our results we provide key insights on the choice and applicability of GNN explainers, we isolate key components that make them usable and successful and provide recommendations on how to avoid common interpretation pitfalls. We conclude by highlighting open questions and directions of possible future research.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Multi-Agents in Digital Twin Implementation: Short Survey 多重代理在数字孪生实施中的作用:简短调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-24 DOI: 10.1145/3697350
Kalyani Yogeswaranathan, Rem Collier
In recent years, Digital Twin (DT) technology has emerged as a significant technological advancement. A digital twin is a digital representation of a physical asset that mirrors its data model, behaviour, and interactions with other physical assets. Digital Twin aims to achieve adaptability, seamless data integration, modelling, simulation, automation, and real-time data management. The primary goal of this paper is to explore the role of agents in DT implementations, seeking to understand their predominant usage scenarios and purposes. From our perspective, agents serving as intelligent entities play a role in realising the features of DTs. This paper also discusses the gaps in DT, highlights future directions, and analyses various technologies integrated with multi-agent systems technologies in DT implementations. Finally, the paper briefly discusses an overview of an architecture to implement a DT for smart agriculture with multi-agents.
近年来,数字孪生(DT)技术已成为一项重要的技术进步。数字孪生是物理资产的数字表示,它反映了物理资产的数据模型、行为以及与其他物理资产的交互。数字孪生旨在实现适应性、无缝数据集成、建模、模拟、自动化和实时数据管理。本文的主要目标是探索代理在数字孪生实施中的作用,试图了解它们的主要使用场景和目的。从我们的角度来看,作为智能实体的代理在实现 DT 功能方面发挥着作用。本文还讨论了数据传输中存在的差距,强调了未来的发展方向,并分析了在数据传输实施中与多代理系统技术相结合的各种技术。最后,本文简要讨论了利用多代理实施智能农业 DT 的架构概述。
{"title":"The Role of Multi-Agents in Digital Twin Implementation: Short Survey","authors":"Kalyani Yogeswaranathan, Rem Collier","doi":"10.1145/3697350","DOIUrl":"https://doi.org/10.1145/3697350","url":null,"abstract":"In recent years, Digital Twin (DT) technology has emerged as a significant technological advancement. A digital twin is a digital representation of a physical asset that mirrors its data model, behaviour, and interactions with other physical assets. Digital Twin aims to achieve adaptability, seamless data integration, modelling, simulation, automation, and real-time data management. The primary goal of this paper is to explore the role of agents in DT implementations, seeking to understand their predominant usage scenarios and purposes. From our perspective, agents serving as intelligent entities play a role in realising the features of DTs. This paper also discusses the gaps in DT, highlights future directions, and analyses various technologies integrated with multi-agent systems technologies in DT implementations. Finally, the paper briefly discusses an overview of an architecture to implement a DT for smart agriculture with multi-agents.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Aided Intelligent Reflective Surfaces for 6G: A Survey 面向 6G 的深度学习辅助智能反射表面:一项调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-23 DOI: 10.1145/3696414
Muhammad Tariq, Sohail Ahmad, Ahmad Jan Mian, Houbing Song
The envisioned sixth-generation (6G) networks anticipate robust support for diverse applications, including massive machine-type communications, ultra-reliable low-latency communications, and enhanced mobile broadband. Intelligent Reflecting Surfaces (IRS) have emerged as a key technology capable of intelligently reconfiguring wireless propagation environments, thereby enhancing overall network performance. Traditional optimization techniques face limitations in meeting the stringent performance requirements of 6G networks due to the intricate and dynamic nature of the wireless environment. Consequently, Deep Learning (DL) techniques are employed within the IRS framework to optimize wireless system performance. This paper provides a comprehensive survey of the latest research in DL-aided IRS models, covering optimal beamforming, resource allocation control, channel estimation and prediction, signal detection, and system deployment. The focus is on presenting promising solutions within the constraints of different hardware configurations. The survey explores challenges, opportunities, and open research issues in DL-aided IRS, considering emerging technologies such as digital twins (DTs), computer vision (CV), blockchain, network function virtualization (NFC), integrated sensing and communication (ISAC), software-defined networking (SDN), mobile edge computing (MEC), unmanned aerial vehicles (UAVs), and non-orthogonal multiple access (NOMA). Practical design issues associated with these enabling technologies are also discussed, providing valuable insights into the current state and future directions of this evolving field.
设想中的第六代(6G)网络将为各种应用提供强大的支持,包括大规模机器型通信、超可靠低延迟通信和增强型移动宽带。智能反射面(IRS)已成为一项关键技术,能够智能地重新配置无线传播环境,从而提高整体网络性能。由于无线环境的复杂性和动态性,传统的优化技术在满足 6G 网络严格的性能要求方面面临限制。因此,在 IRS 框架内采用了深度学习(DL)技术来优化无线系统性能。本文全面介绍了深度学习辅助 IRS 模型的最新研究成果,涵盖优化波束成形、资源分配控制、信道估计和预测、信号检测和系统部署。重点是在不同硬件配置的限制条件下提出有前景的解决方案。考虑到数字孪生(DT)、计算机视觉(CV)、区块链、网络功能虚拟化(NFC)、集成传感与通信(ISAC)、软件定义网络(SDN)、移动边缘计算(MEC)、无人机(UAV)和非正交多址接入(NOMA)等新兴技术,本调查探讨了数字线路辅助 IRS 所面临的挑战、机遇和开放研究课题。还讨论了与这些使能技术相关的实际设计问题,为了解这一不断发展领域的现状和未来方向提供了宝贵的见解。
{"title":"Deep Learning Aided Intelligent Reflective Surfaces for 6G: A Survey","authors":"Muhammad Tariq, Sohail Ahmad, Ahmad Jan Mian, Houbing Song","doi":"10.1145/3696414","DOIUrl":"https://doi.org/10.1145/3696414","url":null,"abstract":"The envisioned sixth-generation (6G) networks anticipate robust support for diverse applications, including massive machine-type communications, ultra-reliable low-latency communications, and enhanced mobile broadband. Intelligent Reflecting Surfaces (IRS) have emerged as a key technology capable of intelligently reconfiguring wireless propagation environments, thereby enhancing overall network performance. Traditional optimization techniques face limitations in meeting the stringent performance requirements of 6G networks due to the intricate and dynamic nature of the wireless environment. Consequently, Deep Learning (DL) techniques are employed within the IRS framework to optimize wireless system performance. This paper provides a comprehensive survey of the latest research in DL-aided IRS models, covering optimal beamforming, resource allocation control, channel estimation and prediction, signal detection, and system deployment. The focus is on presenting promising solutions within the constraints of different hardware configurations. The survey explores challenges, opportunities, and open research issues in DL-aided IRS, considering emerging technologies such as digital twins (DTs), computer vision (CV), blockchain, network function virtualization (NFC), integrated sensing and communication (ISAC), software-defined networking (SDN), mobile edge computing (MEC), unmanned aerial vehicles (UAVs), and non-orthogonal multiple access (NOMA). Practical design issues associated with these enabling technologies are also discussed, providing valuable insights into the current state and future directions of this evolving field.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey 垂直应用移动网络安全的挑战与机遇:调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-21 DOI: 10.1145/3696446
Álvaro Sobrinho, Matheus Vilarim, Amanda Barbosa, Edmar Candeia Gurjão, Danilo F. S. Santos, Dalton Valadares, Leandro Dias da Silva
Ensuring the security of vertical applications in fifth-generation (5G) mobile communication systems and previous generations is crucial. These systems must prioritize maintaining the confidentiality, integrity, and availability of services and data. Examples of vertical applications include smart cities, smart transportation, public services, Industry 4.0, smart grids, smart health, and smart agriculture. Each vertical application has specific security requirements and faces unique threats within the mobile network environment. Thus, it is essential to implement comprehensive and robust security measures. This approach helps minimize the attack surface and effectively manage risks. This survey thoroughly examines mobile networks and their security challenges in vertical applications, shedding light on associated threats and potential solutions. Our study considers the interplay between security considerations in 5G, legacy networks, and vertical applications. We emphasize the challenges, opportunities, and promising directions for future research in this field and the importance of securing vertical applications in the evolving landscape of mobile technology.
确保第五代(5G)移动通信系统和前几代系统中垂直应用的安全性至关重要。这些系统必须优先维护服务和数据的保密性、完整性和可用性。垂直应用的例子包括智能城市、智能交通、公共服务、工业 4.0、智能电网、智能健康和智能农业。每个垂直应用都有特定的安全要求,并在移动网络环境中面临独特的威胁。因此,实施全面、稳健的安全措施至关重要。这种方法有助于最大限度地减少攻击面并有效管理风险。本调查深入研究了垂直应用中的移动网络及其安全挑战,揭示了相关威胁和潜在解决方案。我们的研究考虑了 5G、传统网络和垂直应用中的安全因素之间的相互作用。我们强调了这一领域的挑战、机遇和未来的研究方向,以及在不断发展的移动技术环境中确保垂直应用安全的重要性。
{"title":"Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey","authors":"Álvaro Sobrinho, Matheus Vilarim, Amanda Barbosa, Edmar Candeia Gurjão, Danilo F. S. Santos, Dalton Valadares, Leandro Dias da Silva","doi":"10.1145/3696446","DOIUrl":"https://doi.org/10.1145/3696446","url":null,"abstract":"Ensuring the security of vertical applications in fifth-generation (5G) mobile communication systems and previous generations is crucial. These systems must prioritize maintaining the confidentiality, integrity, and availability of services and data. Examples of vertical applications include smart cities, smart transportation, public services, Industry 4.0, smart grids, smart health, and smart agriculture. Each vertical application has specific security requirements and faces unique threats within the mobile network environment. Thus, it is essential to implement comprehensive and robust security measures. This approach helps minimize the attack surface and effectively manage risks. This survey thoroughly examines mobile networks and their security challenges in vertical applications, shedding light on associated threats and potential solutions. Our study considers the interplay between security considerations in 5G, legacy networks, and vertical applications. We emphasize the challenges, opportunities, and promising directions for future research in this field and the importance of securing vertical applications in the evolving landscape of mobile technology.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1