首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
Natural Language Processing for Dialects of a Language: A Survey 语言方言的自然语言处理研究综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-13 DOI: 10.1145/3712060
Aditya Joshi, Raj Dabre, Diptesh Kanojia, Zhuang Li, Haolan Zhan, Gholamreza Haffari, Doris Dippold
State-of-the-art natural language processing (NLP) models are trained on massive training corpora, and report a superlative performance on evaluation datasets. This survey delves into an important attribute of these datasets: the dialect of a language. Motivated by the performance degradation of NLP models for dialectal datasets and its implications for the equity of language technologies, we survey past research in NLP for dialects in terms of datasets, and approaches. We describe a wide range of NLP tasks in terms of two categories: natural language understanding (NLU) (for tasks such as dialect classification, sentiment analysis, parsing, and NLU benchmarks) and natural language generation (NLG) (for summarisation, machine translation, and dialogue systems). The survey is also broad in its coverage of languages which include English, Arabic, German, among others. We observe that past work in NLP concerning dialects goes deeper than mere dialect classification, and extends to several NLU and NLG tasks. For these tasks, we describe classical machine learning using statistical models, along with the recent deep learning-based approaches based on pre-trained language models. We expect that this survey will be useful to NLP researchers interested in building equitable language technologies by rethinking LLM benchmarks and model architectures.
最先进的自然语言处理(NLP)模型在大量的训练语料库上进行训练,并在评估数据集上报告了最高的性能。这项调查深入研究了这些数据集的一个重要属性:语言的方言。基于方言数据集NLP模型的性能退化及其对语言技术公平性的影响,我们从数据集和方法的角度回顾了过去在方言NLP方面的研究。我们根据两类描述了广泛的NLP任务:自然语言理解(NLU)(用于方言分类、情感分析、解析和NLU基准等任务)和自然语言生成(NLG)(用于摘要、机器翻译和对话系统)。这项调查涵盖的语言也很广泛,包括英语、阿拉伯语、德语等。我们观察到,过去关于方言的NLP工作比单纯的方言分类深入,并扩展到几个NLU和NLG任务。对于这些任务,我们使用统计模型描述了经典的机器学习,以及最近基于预训练语言模型的基于深度学习的方法。我们希望通过重新思考LLM基准和模型架构,这项调查将对有兴趣构建公平语言技术的NLP研究人员有用。
{"title":"Natural Language Processing for Dialects of a Language: A Survey","authors":"Aditya Joshi, Raj Dabre, Diptesh Kanojia, Zhuang Li, Haolan Zhan, Gholamreza Haffari, Doris Dippold","doi":"10.1145/3712060","DOIUrl":"https://doi.org/10.1145/3712060","url":null,"abstract":"State-of-the-art natural language processing (NLP) models are trained on massive training corpora, and report a superlative performance on evaluation datasets. This survey delves into an important attribute of these datasets: the dialect of a language. Motivated by the performance degradation of NLP models for dialectal datasets and its implications for the equity of language technologies, we survey past research in NLP for dialects in terms of datasets, and approaches. We describe a wide range of NLP tasks in terms of two categories: natural language understanding (NLU) (for tasks such as dialect classification, sentiment analysis, parsing, and NLU benchmarks) and natural language generation (NLG) (for summarisation, machine translation, and dialogue systems). The survey is also broad in its coverage of languages which include English, Arabic, German, among others. We observe that past work in NLP concerning dialects goes deeper than mere dialect classification, and extends to several NLU and NLG tasks. For these tasks, we describe classical machine learning using statistical models, along with the recent deep learning-based approaches based on pre-trained language models. We expect that this survey will be useful to NLP researchers interested in building equitable language technologies by rethinking LLM benchmarks and model architectures.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"87 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142968459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy Challenges of Large Language Models: A Survey 大型语言模型的安全和隐私挑战:调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-13 DOI: 10.1145/3712001
Badhan Chandra Das, M. Hadi Amini, Yanzhao Wu
Large language models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering. Nowadays, LLMs have become very popular tools in natural language processing (NLP) tasks, with the capability to analyze complicated linguistic patterns and provide relevant responses depending on the context. While offering significant advantages, these models are also vulnerable to security and privacy attacks, such as jailbreaking attacks, data poisoning attacks, and personally identifiable information (PII) leakage attacks. This survey provides a thorough review of the security and privacy challenges of LLMs, along with the application-based risks in various domains, such as transportation, education, and healthcare. We assess the extent of LLM vulnerabilities, investigate emerging security and privacy attacks against LLMs, and review potential defense mechanisms. Additionally, the survey outlines existing research gaps and highlights future research directions.
大型语言模型(llm)已经展示了非凡的能力,并在多个领域做出了贡献,例如生成和总结文本、语言翻译和问答。如今,llm已成为自然语言处理(NLP)任务中非常流行的工具,具有分析复杂语言模式并根据上下文提供相关响应的能力。虽然这些模型具有显著的优势,但也容易受到安全和隐私攻击,例如越狱攻击、数据中毒攻击和个人可识别信息(PII)泄漏攻击。本调查全面回顾了法学硕士面临的安全和隐私挑战,以及交通、教育和医疗保健等各个领域基于应用程序的风险。我们评估LLM漏洞的程度,调查针对LLM的新出现的安全和隐私攻击,并审查潜在的防御机制。此外,调查概述了现有的研究差距,并强调了未来的研究方向。
{"title":"Security and Privacy Challenges of Large Language Models: A Survey","authors":"Badhan Chandra Das, M. Hadi Amini, Yanzhao Wu","doi":"10.1145/3712001","DOIUrl":"https://doi.org/10.1145/3712001","url":null,"abstract":"Large language models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering. Nowadays, LLMs have become very popular tools in natural language processing (NLP) tasks, with the capability to analyze complicated linguistic patterns and provide relevant responses depending on the context. While offering significant advantages, these models are also vulnerable to security and privacy attacks, such as jailbreaking attacks, data poisoning attacks, and personally identifiable information (PII) leakage attacks. This survey provides a thorough review of the security and privacy challenges of LLMs, along with the application-based risks in various domains, such as transportation, education, and healthcare. We assess the extent of LLM vulnerabilities, investigate emerging security and privacy attacks against LLMs, and review potential defense mechanisms. Additionally, the survey outlines existing research gaps and highlights future research directions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"29 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142968458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Group Re-identification in Surveillance Videos 监控视频中的群体再识别研究综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-10 DOI: 10.1145/3711126
KAMAKSHYA NAYAK, Debi Prosad Dogra
Computer vision plays an important role in the automated analysis of human groups. The appearance of human groups has been studied for various reasons, including detection, identification, tracking, and re-identification. Person re-identification has been studied extensively over the last decade. Despite significant efforts by the computer vision research community, person re-identification often suffers from issues such as similar clothing appearances, occlusion, viewpoint changes, etc. On the contrary, group re-identification has not received much attention. It involves identifying human groups across multiple non-overlapping camera views. It is a challenging problem that suffers from issues related to person re-identification and additional challenges like variations in the number of persons, the structural layout of groups, etc. This paper summarises the research paradigms of human group analysis. It reviews the recent advancements in group re-identification, including key challenges, datasets, and state-of-the-art methods. The paper concludes with a discussion of open research challenges and future directions in group re-identification, including the need for reliable techniques, varied datasets, and ethical considerations regarding privacy. Overall, this paper offers a thorough and up-to-date summary of the most recent findings in group re-identification. It also identifies the research gaps as placeholders for further study.
计算机视觉在人类群体的自动分析中起着重要的作用。人类群体的出现由于各种原因而被研究,包括发现、识别、跟踪和重新识别。在过去的十年里,人们对人的再识别进行了广泛的研究。尽管计算机视觉研究界做出了巨大的努力,但人的再识别经常受到诸如相似的服装外观,遮挡,视点变化等问题的困扰。相反,群体再认同并没有受到太多关注。它包括在多个不重叠的摄像机视图中识别人类群体。这是一个具有挑战性的问题,包括与人员重新识别有关的问题,以及人员数量变化、群体结构布局等其他挑战。本文综述了人类群体分析的研究范式。它回顾了群体再识别的最新进展,包括主要挑战、数据集和最先进的方法。本文最后讨论了开放研究的挑战和群体再识别的未来方向,包括对可靠技术的需求,不同的数据集,以及关于隐私的伦理考虑。总的来说,这篇论文提供了一个彻底的和最新的总结,在群体再识别的最新发现。它还确定了研究空白,作为进一步研究的占位符。
{"title":"A Comprehensive Review on Group Re-identification in Surveillance Videos","authors":"KAMAKSHYA NAYAK, Debi Prosad Dogra","doi":"10.1145/3711126","DOIUrl":"https://doi.org/10.1145/3711126","url":null,"abstract":"Computer vision plays an important role in the automated analysis of human groups. The appearance of human groups has been studied for various reasons, including detection, identification, tracking, and re-identification. Person re-identification has been studied extensively over the last decade. Despite significant efforts by the computer vision research community, person re-identification often suffers from issues such as similar clothing appearances, occlusion, viewpoint changes, etc. On the contrary, group re-identification has not received much attention. It involves identifying human groups across multiple non-overlapping camera views. It is a challenging problem that suffers from issues related to person re-identification and additional challenges like variations in the number of persons, the structural layout of groups, etc. This paper summarises the research paradigms of human group analysis. It reviews the recent advancements in group re-identification, including key challenges, datasets, and state-of-the-art methods. The paper concludes with a discussion of open research challenges and future directions in group re-identification, including the need for reliable techniques, varied datasets, and ethical considerations regarding privacy. Overall, this paper offers a thorough and up-to-date summary of the most recent findings in group re-identification. It also identifies the research gaps as placeholders for further study.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"16 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142961372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning 面向可信赖的人工智能在线广告拍卖实时竞价
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-10 DOI: 10.1145/3701741
Xiaoli Tang, Han Yu
Artificial intelligence-empowred Real-Time Bidding (AIRTB) is regarded as one of the most enabling technologies for online advertising. It has attracted significant research attention from diverse fields such as pattern recognition, game theory and mechanism design. Despite of its remarkable development and deployment, the AIRTB system can sometimes harm the interest of its participants (e.g., depleting the advertisers’ budget with various kinds of fraud). As such, building trustworthy AIRTB auctioning systems has emerged as an important direction of research in this field in recent years. Due to the highly interdisciplinary nature of this field and a lack of a comprehensive survey, it is a challenge for researchers to enter this field and contribute towards building trustworthy AIRTB technologies. This paper bridges this important gap in trustworthy AIRTB literature. We start by analysing the key concerns of various AIRTB stakeholders and identify five main dimensions of trust building in AIRTB, namely robustness, explainability, fairness, auditability & accountability, and environmental well-being. For each of these dimensions, we propose a unique taxonomy of the state of the art, trace the root causes of possible breakdown of trust, and discuss the necessity of the given dimension. This is followed by a comprehensive review of existing strategies for fulfilling the requirements of each trust dimension. In addition, we discuss the promising future directions of research essential towards building trustworthy AIRTB systems to benefit the field of online advertising.
人工智能实时竞价(AIRTB)被认为是网络广告最具潜力的技术之一。它引起了模式识别、博弈论和机制设计等不同领域的研究关注。尽管AIRTB系统有了显著的发展和部署,但它有时也会损害参与者的利益(例如,用各种欺诈手段耗尽广告商的预算)。因此,建立可信的AIRTB拍卖系统已成为近年来该领域研究的重要方向。由于该领域的高度跨学科性质和缺乏全面的调查,研究人员进入该领域并为建立值得信赖的AIRTB技术做出贡献是一个挑战。本文在值得信赖的AIRTB文献中弥补了这一重要差距。我们首先分析了AIRTB各利益相关者的主要关注点,并确定了AIRTB信任建立的五个主要维度,即稳健性、可解释性、公平性、可审计性和;问责制和环境福利。对于这些维度中的每一个,我们都提出了一种独特的技术现状分类法,追踪可能导致信任崩溃的根本原因,并讨论了给定维度的必要性。然后对满足每个信任层面的要求的现有战略进行全面审查。此外,我们还讨论了未来有希望的研究方向,这些方向对于建立值得信赖的AIRTB系统至关重要,以使在线广告领域受益。
{"title":"Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning","authors":"Xiaoli Tang, Han Yu","doi":"10.1145/3701741","DOIUrl":"https://doi.org/10.1145/3701741","url":null,"abstract":"Artificial intelligence-empowred Real-Time Bidding (AIRTB) is regarded as one of the most enabling technologies for online advertising. It has attracted significant research attention from diverse fields such as pattern recognition, game theory and mechanism design. Despite of its remarkable development and deployment, the AIRTB system can sometimes harm the interest of its participants (e.g., depleting the advertisers’ budget with various kinds of fraud). As such, building trustworthy AIRTB auctioning systems has emerged as an important direction of research in this field in recent years. Due to the highly interdisciplinary nature of this field and a lack of a comprehensive survey, it is a challenge for researchers to enter this field and contribute towards building trustworthy AIRTB technologies. This paper bridges this important gap in trustworthy AIRTB literature. We start by analysing the key concerns of various AIRTB stakeholders and identify five main dimensions of trust building in AIRTB, namely robustness, explainability, fairness, auditability & accountability, and environmental well-being. For each of these dimensions, we propose a unique taxonomy of the state of the art, trace the root causes of possible breakdown of trust, and discuss the necessity of the given dimension. This is followed by a comprehensive review of existing strategies for fulfilling the requirements of each trust dimension. In addition, we discuss the promising future directions of research essential towards building trustworthy AIRTB systems to benefit the field of online advertising.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"82 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142961368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities 车辆网络中的位置隐私方案:分类、比较分析、设计挑战和未来机遇
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-10 DOI: 10.1145/3711681
Ikram Ullah, Munam Ali Shah, Abid Khan, Mohsen Guizani
Vehicular ad-hoc networks (VANETs) have revolutionized the world with smart traffic management, better utilizing the road environment, and providing safety and convenience to the vehicles’ drivers. Despite the useful features of VANETs, there are some privacy issues, which hinder their way toward achieving smarter and safer traffic in the world. Location privacy is one of the critical research challenges for the efficient deployment of VANETs. This challenge can be solved using a pseudonym instead of an actual vehicle identity in the beacon messages. For this purpose, many location privacy schemes are introduced in the literature. In this paper, we thoroughly review the existing location privacy schemes and present their comprehensive taxonomy. We discuss the design challenges for the development of an efficient location privacy scheme. Moreover, the existing location privacy techniques are critically analyzed based on diverse road network environments and parameters. Various issues and challenges regarding the pseudonym-changing process are elaborated in detail. Finally, we discuss the future trends for the implementation of location privacy in a vehicular network.
车辆自组织网络(VANETs)通过智能交通管理,更好地利用道路环境,为车辆驾驶员提供安全和便利,彻底改变了世界。尽管VANETs有很多有用的功能,但也存在一些隐私问题,这阻碍了他们在世界上实现更智能、更安全的交通。位置隐私是有效部署vanet的关键研究挑战之一。这个挑战可以使用假名而不是信标消息中的实际车辆身份来解决。为此,文献中介绍了许多位置隐私方案。在本文中,我们全面地回顾了现有的位置隐私方案,并给出了它们的综合分类。我们讨论了开发一个有效的位置隐私方案所面临的设计挑战。此外,基于不同的道路网络环境和参数,对现有的位置隐私技术进行了批判性分析。详细阐述了假名变更过程中的各种问题和挑战。最后,我们讨论了车载网络中位置隐私实现的未来趋势。
{"title":"Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities","authors":"Ikram Ullah, Munam Ali Shah, Abid Khan, Mohsen Guizani","doi":"10.1145/3711681","DOIUrl":"https://doi.org/10.1145/3711681","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) have revolutionized the world with smart traffic management, better utilizing the road environment, and providing safety and convenience to the vehicles’ drivers. Despite the useful features of VANETs, there are some privacy issues, which hinder their way toward achieving smarter and safer traffic in the world. Location privacy is one of the critical research challenges for the efficient deployment of VANETs. This challenge can be solved using a pseudonym instead of an actual vehicle identity in the beacon messages. For this purpose, many location privacy schemes are introduced in the literature. In this paper, we thoroughly review the existing location privacy schemes and present their comprehensive taxonomy. We discuss the design challenges for the development of an efficient location privacy scheme. Moreover, the existing location privacy techniques are critically analyzed based on diverse road network environments and parameters. Various issues and challenges regarding the pseudonym-changing process are elaborated in detail. Finally, we discuss the future trends for the implementation of location privacy in a vehicular network.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"25 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142961375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI Empowered Network Digital Twins: Architecture, Technologies, and Applications 生成人工智能支持的网络数字双胞胎:架构、技术和应用
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-10 DOI: 10.1145/3711682
Tong Li, Qingyue Long, Haoye Chai, Shiyuan Zhang, Fenyu Jiang, Haoqiang Liu, Wenzhen Huang, Depeng Jin, Yong Li
The rapid advancement of mobile networks highlights the limitations of traditional network planning and optimization methods, particularly in modeling, evaluation, and application. Network Digital Twins, which simulate networks in the digital domain for evaluation, offer a solution to these challenges. This concept is further enhanced by generative AI technology, which promises more efficient and accurate AI-driven data generation for network simulation and optimization. This survey provides insights into generative AI-empowered network digital twins. We begin by outlining the architecture of a network digital twin, which encompasses both digital and physical domains. This architecture involves four key steps: data processing and network monitoring, digital replication and network simulation, designing and training network optimizers, Sim2Real and network control. Next, we systematically discuss the related studies in each step and make a detailed taxonomy of the problem studied, the methods used, and the key designs leveraged. Each step is examined with a focus on the role of generative AI, from estimating missing data and simulating network behaviors to designing control strategies and bridging the gap between digital and physical domains. Finally, we discuss the open issues and challenges of generative AI-based network digital twins.
移动网络的快速发展凸显了传统网络规划和优化方法的局限性,特别是在建模、评估和应用方面。网络数字孪生(Network Digital Twins)为应对这些挑战提供了一种解决方案,它可以模拟数字领域中的网络进行评估。生成式人工智能技术进一步增强了这一概念,该技术为网络仿真和优化提供了更高效、更准确的人工智能驱动数据生成。这项调查提供了对生成人工智能支持的网络数字双胞胎的见解。我们首先概述网络数字孪生的体系结构,它包括数字和物理领域。该体系结构包括四个关键步骤:数据处理和网络监控、数字复制和网络仿真、设计和培训网络优化器、Sim2Real和网络控制。接下来,我们系统地讨论了每一步的相关研究,并对研究的问题、使用的方法和利用的关键设计进行了详细的分类。从估计缺失数据和模拟网络行为到设计控制策略和弥合数字和物理领域之间的差距,每一步都将重点放在生成人工智能的作用上。最后,我们讨论了基于生成人工智能的网络数字孪生的开放问题和挑战。
{"title":"Generative AI Empowered Network Digital Twins: Architecture, Technologies, and Applications","authors":"Tong Li, Qingyue Long, Haoye Chai, Shiyuan Zhang, Fenyu Jiang, Haoqiang Liu, Wenzhen Huang, Depeng Jin, Yong Li","doi":"10.1145/3711682","DOIUrl":"https://doi.org/10.1145/3711682","url":null,"abstract":"The rapid advancement of mobile networks highlights the limitations of traditional network planning and optimization methods, particularly in modeling, evaluation, and application. Network Digital Twins, which simulate networks in the digital domain for evaluation, offer a solution to these challenges. This concept is further enhanced by generative AI technology, which promises more efficient and accurate AI-driven data generation for network simulation and optimization. This survey provides insights into generative AI-empowered network digital twins. We begin by outlining the architecture of a network digital twin, which encompasses both digital and physical domains. This architecture involves four key steps: data processing and network monitoring, digital replication and network simulation, designing and training network optimizers, Sim2Real and network control. Next, we systematically discuss the related studies in each step and make a detailed taxonomy of the problem studied, the methods used, and the key designs leveraged. Each step is examined with a focus on the role of generative AI, from estimating missing data and simulating network behaviors to designing control strategies and bridging the gap between digital and physical domains. Finally, we discuss the open issues and challenges of generative AI-based network digital twins.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"82 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142961341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review 可信赖的基于人工智能的云应用性能诊断系统综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-09 DOI: 10.1145/3701740
Ruyue Xin, Jingye Wang, Peng Chen, Zhiming Zhao
Performance diagnosis systems are defined as detecting abnormal performance phenomena and play a crucial role in cloud applications. An effective performance diagnosis system is often developed based on artificial intelligence (AI) approaches, which can be summarized into a general framework from data to models. However, the AI-based framework has potential hazards that could degrade the user experience and trust. For example, a lack of data privacy may compromise the security of AI models, and low robustness can be hard to apply in complex cloud environments. Therefore, defining the requirements for building a trustworthy AI-based performance diagnosis system has become essential. This article systematically reviews trustworthiness requirements in AI-based performance diagnosis systems. We first introduce trustworthiness requirements and extract six key requirements from a technical perspective, including data privacy, fairness, robustness, explainability, efficiency, and human intervention. We then unify these requirements into a general performance diagnosis framework, ranging from data collection to model development. Next, we comprehensively provide related works for each component and concrete actions to improve trustworthiness in the framework. Finally, we identify possible research directions and challenges for the future development of trustworthy AI-based performance diagnosis systems.
性能诊断系统被定义为检测异常的性能现象,在云应用中起着至关重要的作用。一个有效的性能诊断系统往往是基于人工智能(AI)方法开发的,从数据到模型可以归纳为一个通用的框架。然而,基于人工智能的框架具有潜在的危险,可能会降低用户体验和信任。例如,缺乏数据隐私可能会危及人工智能模型的安全性,并且低鲁棒性可能难以在复杂的云环境中应用。因此,定义构建可信赖的基于人工智能的绩效诊断系统的需求变得至关重要。本文系统地综述了基于人工智能的绩效诊断系统的可信度要求。我们首先介绍了可信度需求,并从技术角度提取了六个关键需求,包括数据隐私性、公平性、鲁棒性、可解释性、效率和人为干预。然后,我们将这些需求统一到一个通用的性能诊断框架中,范围从数据收集到模型开发。接下来,我们在框架中全面提供了各组成部分的相关工作和提高可信度的具体行动。最后,我们确定了可信的基于人工智能的性能诊断系统的未来发展可能的研究方向和挑战。
{"title":"Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review","authors":"Ruyue Xin, Jingye Wang, Peng Chen, Zhiming Zhao","doi":"10.1145/3701740","DOIUrl":"https://doi.org/10.1145/3701740","url":null,"abstract":"Performance diagnosis systems are defined as detecting abnormal performance phenomena and play a crucial role in cloud applications. An effective performance diagnosis system is often developed based on artificial intelligence (AI) approaches, which can be summarized into a general framework from data to models. However, the AI-based framework has potential hazards that could degrade the user experience and trust. For example, a lack of data privacy may compromise the security of AI models, and low robustness can be hard to apply in complex cloud environments. Therefore, defining the requirements for building a trustworthy AI-based performance diagnosis system has become essential. This article systematically reviews trustworthiness requirements in AI-based performance diagnosis systems. We first introduce trustworthiness requirements and extract six key requirements from a technical perspective, including data privacy, fairness, robustness, explainability, efficiency, and human intervention. We then unify these requirements into a general performance diagnosis framework, ranging from data collection to model development. Next, we comprehensively provide related works for each component and concrete actions to improve trustworthiness in the framework. Finally, we identify possible research directions and challenges for the future development of trustworthy AI-based performance diagnosis systems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"57 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142940440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools 密码管理器和双因素认证工具的深入分析
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-06 DOI: 10.1145/3711117
Mohammed Jubur, PrakashPrakash Shrestha, Nitesh Saxena
Passwords remain the primary authentication method in online services, a domain increasingly crucial in our digital age. However, passwords suffer from several well-documented security and usability issues. Addressing these concerns, password managers and two-factor authentication (2FA) have emerged as key solutions. This paper examines these methods with a focus on enhancing password security without compromising usability. Utilizing an adapted Bonneau et al. (IEEE S&P 2012) framework tailored to the specific challenges of password managers and 2FA. This allows us to categorize and evaluate prominent solutions from both academic research and industry practice, with a focus on their security, privacy, and usability. A crucial aspect of our study involves evaluating the effectiveness of a combined PM+2FA system in balancing security and usability. This study not only examines current trends but also suggests potential areas for future research, offering valuable insights to both users and developers in the evolving landscape of digital security.
密码仍然是在线服务的主要认证方式,在我们这个数字时代,密码越来越重要。然而,密码存在几个有充分记录的安全性和可用性问题。为了解决这些问题,密码管理器和双因素身份验证(2FA)已经成为关键的解决方案。本文研究了这些方法,重点是在不影响可用性的情况下提高密码安全性。利用改编的Bonneau等人(IEEE S&P 2012)框架,针对密码管理器和2FA的特定挑战量身定制。这使我们能够从学术研究和行业实践中对突出的解决方案进行分类和评估,重点关注其安全性、隐私性和可用性。我们研究的一个关键方面涉及评估组合PM+2FA系统在平衡安全性和可用性方面的有效性。这项研究不仅考察了当前的趋势,还提出了未来研究的潜在领域,为用户和开发人员在不断发展的数字安全领域提供了有价值的见解。
{"title":"An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools","authors":"Mohammed Jubur, PrakashPrakash Shrestha, Nitesh Saxena","doi":"10.1145/3711117","DOIUrl":"https://doi.org/10.1145/3711117","url":null,"abstract":"Passwords remain the primary authentication method in online services, a domain increasingly crucial in our digital age. However, passwords suffer from several well-documented security and usability issues. Addressing these concerns, password managers and two-factor authentication (2FA) have emerged as key solutions. This paper examines these methods with a focus on enhancing password security without compromising usability. Utilizing an adapted Bonneau et al. (IEEE S&P 2012) framework tailored to the specific challenges of password managers and 2FA. This allows us to categorize and evaluate prominent solutions from both academic research and industry practice, with a focus on their security, privacy, and usability. A crucial aspect of our study involves evaluating the effectiveness of a combined PM+2FA system in balancing security and usability. This study not only examines current trends but also suggests potential areas for future research, offering valuable insights to both users and developers in the evolving landscape of digital security.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"12 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142929492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of Android Malwares and their families Android恶意软件及其家族的特征
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-06 DOI: 10.1145/3708500
Tejpal Sharma, Dhavleesh Rattan
Nowadays, smartphones have made our lives easier and have become essential gadgets for us. Apart from calling, mobiles are used for various purposes, such as banking, chatting, data storage, connecting to the internet and running apps which make life easier. Therefore, attackers are developing new methods or malware to steal smartphone data. Primarily, the study outlines various types of Android malware families, the evolution of Android malware and its effects on detection techniques over time. We report malware timelines and Android app datasets with their source web links. Data is collected from various recent studies and reported. In this study, we have reported 384 Android malware families and their year of discovery, i.e., from 2001 to 2020. According to the malfunctions they perform on the device, we categorized the families into 11 types. Information about datasets which is divided into three categories, along with their source links is presented. The categorization and timeline of malware will make it easy for researchers to focus on upcoming trends according to the malware category and activities they perform. Various open issues and future challenges are also addressed for future researchers.
如今,智能手机使我们的生活更轻松,成为我们必不可少的小工具。除了打电话,手机还有各种各样的用途,比如银行、聊天、数据存储、上网和运行让生活更轻松的应用程序。因此,攻击者正在开发新的方法或恶意软件来窃取智能手机数据。首先,该研究概述了各种类型的Android恶意软件家族,Android恶意软件的演变及其对检测技术的影响。我们报告恶意软件时间表和Android应用程序数据集及其源web链接。数据是从最近的各种研究和报告中收集的。在这项研究中,我们报告了384个Android恶意软件家族及其发现年份,即从2001年到2020年。根据他们在设备上造成的故障,我们将这些家庭分为11类。关于数据集的信息分为三类,以及它们的源链接。恶意软件的分类和时间表将使研究人员更容易根据恶意软件的类别和他们所执行的活动来关注未来的趋势。各种开放的问题和未来的挑战也为未来的研究人员解决。
{"title":"Characterization of Android Malwares and their families","authors":"Tejpal Sharma, Dhavleesh Rattan","doi":"10.1145/3708500","DOIUrl":"https://doi.org/10.1145/3708500","url":null,"abstract":"Nowadays, smartphones have made our lives easier and have become essential gadgets for us. Apart from calling, mobiles are used for various purposes, such as banking, chatting, data storage, connecting to the internet and running apps which make life easier. Therefore, attackers are developing new methods or malware to steal smartphone data. Primarily, the study outlines various types of Android malware families, the evolution of Android malware and its effects on detection techniques over time. We report malware timelines and Android app datasets with their source web links. Data is collected from various recent studies and reported. In this study, we have reported 384 Android malware families and their year of discovery, i.e., from 2001 to 2020. According to the malfunctions they perform on the device, we categorized the families into 11 types. Information about datasets which is divided into three categories, along with their source links is presented. The categorization and timeline of malware will make it easy for researchers to focus on upcoming trends according to the malware category and activities they perform. Various open issues and future challenges are also addressed for future researchers.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"3 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142929587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning on Network Traffic Prediction: Recent Advances, Analysis, and Future Directions 网络流量预测的深度学习:最新进展、分析和未来方向
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-06 DOI: 10.1145/3703447
Ons Aouedi, Van An Le, Kandaraj Piamrat, Yusheng Ji
From the perspective of telecommunications, next-generation networks or beyond 5G will inevitably face the challenge of a growing number of users and devices. Such growth results in high-traffic generation with limited network resources. Thus, the analysis of the traffic and the precise forecast of user demands is essential for developing an intelligent network. In this line, Machine Learning (ML) and especially Deep Learning (DL) models can further benefit from the huge amount of network data. They can act in the background to analyze and predict traffic conditions more accurately than ever, and help to optimize the design and management of network services. Recently, a significant amount of research effort has been devoted to this area, greatly advancing network traffic prediction (NTP) abilities. In this paper, we bring together NTP and DL-based models and present recent advances in DL for NTP. We provide a detailed explanation of popular approaches and categorize the literature based on these approaches. Moreover, as a technical study, we conduct different data analyses and experiments with several DL-based models for traffic prediction. Finally, discussions regarding the challenges and future directions are provided.
从电信的角度来看,下一代或5G以后的网络将不可避免地面临用户和设备数量不断增长的挑战。这种增长导致在有限的网络资源下产生高流量。因此,对流量进行分析,对用户需求进行准确预测,对智能网络的建设至关重要。在这方面,机器学习(ML),特别是深度学习(DL)模型可以进一步受益于大量的网络数据。它们可以在后台操作,比以往更准确地分析和预测流量状况,帮助优化网络服务的设计和管理。最近,大量的研究工作已经投入到这一领域,极大地提高了网络流量预测(NTP)的能力。在本文中,我们将NTP和基于DL的模型结合在一起,并介绍了用于NTP的DL的最新进展。我们提供了一个流行的方法的详细解释和分类文献基于这些方法。此外,作为一项技术研究,我们对几种基于dl的流量预测模型进行了不同的数据分析和实验。最后,对面临的挑战和未来发展方向进行了讨论。
{"title":"Deep Learning on Network Traffic Prediction: Recent Advances, Analysis, and Future Directions","authors":"Ons Aouedi, Van An Le, Kandaraj Piamrat, Yusheng Ji","doi":"10.1145/3703447","DOIUrl":"https://doi.org/10.1145/3703447","url":null,"abstract":"From the perspective of telecommunications, next-generation networks or beyond 5G will inevitably face the challenge of a growing number of users and devices. Such growth results in high-traffic generation with limited network resources. Thus, the analysis of the traffic and the precise forecast of user demands is essential for developing an intelligent network. In this line, Machine Learning (ML) and especially Deep Learning (DL) models can further benefit from the huge amount of network data. They can act in the background to analyze and predict traffic conditions more accurately than ever, and help to optimize the design and management of network services. Recently, a significant amount of research effort has been devoted to this area, greatly advancing network traffic prediction (NTP) abilities. In this paper, we bring together NTP and DL-based models and present recent advances in DL for NTP. We provide a detailed explanation of popular approaches and categorize the literature based on these approaches. Moreover, as a technical study, we conduct different data analyses and experiments with several DL-based models for traffic prediction. Finally, discussions regarding the challenges and future directions are provided.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"80 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142929449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1