首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
Mathematical Information Retrieval: A Review 数学信息检索:综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-09 DOI: 10.1145/3699953
Pankaj Dadure, Partha Pakray, Sivaji Bandyopadhyay
Mathematical formulas are commonly used to demonstrate theories and basic fundamentals in the Science, Technology, Engineering, and Mathematics (STEM) domain. The burgeoning research in the STEM domain results in the mass production of scientific documents that contain both textual and mathematical terms. In scientific information, the definition of mathematical formulas is expressed through context and symbolic structure that adheres to strong domain-specific notions. Whereas the retrieval of textual information is well-researched, and numerous text-based search engines are present. However, textual information retrieval systems are inadequate for searching scientific information containing mathematical formulas, including simple symbols to complicated mathematical structures. The retrieval of mathematical information is infancy, and it requires the inclusion of new technologies and tools to promote the retrieval of scientific information and the management of digital libraries. This paper provides a comprehensive study of mathematical information retrieval, highlights their challenges and future opportunities.
数学公式通常用于展示科学、技术、工程和数学(STEM)领域的理论和基本原理。随着 STEM 领域研究的蓬勃发展,大量的科学文献都包含了文字和数学术语。在科学信息中,数学公式的定义是通过上下文和符号结构来表达的,这些上下文和符号结构都遵循特定领域的强烈概念。而文本信息检索则是经过深入研究的,目前已有许多基于文本的搜索引擎。然而,文本信息检索系统不足以搜索包含数学公式的科学信息,包括从简单符号到复杂数学结构的信息。数学信息检索尚处于起步阶段,需要加入新的技术和工具来促进科学信息检索和数字图书馆的管理。本文对数学信息检索进行了全面研究,强调了其面临的挑战和未来的机遇。
{"title":"Mathematical Information Retrieval: A Review","authors":"Pankaj Dadure, Partha Pakray, Sivaji Bandyopadhyay","doi":"10.1145/3699953","DOIUrl":"https://doi.org/10.1145/3699953","url":null,"abstract":"Mathematical formulas are commonly used to demonstrate theories and basic fundamentals in the Science, Technology, Engineering, and Mathematics (STEM) domain. The burgeoning research in the STEM domain results in the mass production of scientific documents that contain both textual and mathematical terms. In scientific information, the definition of mathematical formulas is expressed through context and symbolic structure that adheres to strong domain-specific notions. Whereas the retrieval of textual information is well-researched, and numerous text-based search engines are present. However, textual information retrieval systems are inadequate for searching scientific information containing mathematical formulas, including simple symbols to complicated mathematical structures. The retrieval of mathematical information is infancy, and it requires the inclusion of new technologies and tools to promote the retrieval of scientific information and the management of digital libraries. This paper provides a comprehensive study of mathematical information retrieval, highlights their challenges and future opportunities.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"2 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective 深度伪造检测:从可靠性角度进行全面调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-08 DOI: 10.1145/3699710
Tianyi Wang, Xin Liao, Kam Pui Chow, Xiaodong Lin, Yinglong Wang
The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the existing Deepfake detection studies from the reliability perspective. We identify three reliability-oriented research challenges in the current Deepfake detection domain: transferability, interpretability, and robustness. Moreover, while solutions have been frequently addressed regarding the three challenges, the general reliability of a detection model has been barely considered, leading to the lack of reliable evidence in real-life usages and even for prosecutions on Deepfake-related cases in court. We, therefore, introduce a model reliability study metric using statistical random sampling knowledge and the publicly available benchmark datasets to review the reliability of the existing detection models on arbitrary Deepfake candidate suspects. Case studies are further executed to justify the real-life Deepfake cases including different groups of victims with the help of the reliably qualified detection models as reviewed in this survey. Reviews and experiments on the existing approaches provide informative discussions and future research directions for Deepfake detection.
互联网上如雨后春笋般流传的Deepfake合成材料对全世界的政治家、名人和个人产生了深远的社会影响。在这份调查报告中,我们从可靠性的角度对现有的 Deepfake 检测研究进行了全面回顾。我们指出了当前 Deepfake 检测领域以可靠性为导向的三个研究挑战:可转移性、可解释性和鲁棒性。此外,虽然针对这三个挑战的解决方案屡见不鲜,但检测模型的一般可靠性却几乎没有被考虑过,这导致在实际应用中甚至在法庭起诉 Deepfake 相关案件时都缺乏可靠的证据。因此,我们引入了模型可靠性研究指标,利用统计随机抽样知识和公开可用的基准数据集来审查现有检测模型对任意 Deepfake 候选嫌疑人的可靠性。我们还进一步开展了案例研究,借助本调查中审查的可靠合格的检测模型,对现实生活中的 Deepfake 案件(包括不同的受害者群体)进行论证。对现有方法的评论和实验为 Deepfake 检测提供了翔实的讨论和未来研究方向。
{"title":"Deepfake Detection: A Comprehensive Survey from the Reliability Perspective","authors":"Tianyi Wang, Xin Liao, Kam Pui Chow, Xiaodong Lin, Yinglong Wang","doi":"10.1145/3699710","DOIUrl":"https://doi.org/10.1145/3699710","url":null,"abstract":"The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the existing Deepfake detection studies from the reliability perspective. We identify three reliability-oriented research challenges in the current Deepfake detection domain: transferability, interpretability, and robustness. Moreover, while solutions have been frequently addressed regarding the three challenges, the general reliability of a detection model has been barely considered, leading to the lack of reliable evidence in real-life usages and even for prosecutions on Deepfake-related cases in court. We, therefore, introduce a model reliability study metric using statistical random sampling knowledge and the publicly available benchmark datasets to review the reliability of the existing detection models on arbitrary Deepfake candidate suspects. Case studies are further executed to justify the real-life Deepfake cases including different groups of victims with the help of the reliably qualified detection models as reviewed in this survey. Reviews and experiments on the existing approaches provide informative discussions and future research directions for Deepfake detection.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"23 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142385150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of Studies on Predicting Anatomical Therapeutic Chemical Classes of Drugs 预测药物解剖治疗化学类别研究的综合调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-08 DOI: 10.1145/3699713
Pranab Das, Dilwar Hussain Mazumder
Drug classification plays a crucial role in contemporary drug discovery, design, and development. Determining the Anatomical Therapeutic Chemical (ATC) classes for new drugs is a laborious, costly, and intricate process, often requiring multiple clinical trial phases. Computational models offer significant benefits by accelerating drug evaluation, reducing complexity, and lowering costs; however, challenges persist in the drug classification system. To address this, a literature survey of computational models used for predicting ATC classes was conducted, covering research from 2008 to 2024. This study reviews numerous research articles on drug classification, focusing on drug descriptors, data sources, tasks, computational methods, model performance, and challenges in predicting ATC classes. It also examines the evolution of computational techniques and their application in identifying ATC classes. Finally, the study highlights open problems and research gaps, suggesting areas for further investigation in ATC class prediction. CCS Concepts: Applied computing → Life and medical sciences → Bioinformatics
药物分类在当代药物发现、设计和开发中起着至关重要的作用。确定新药的解剖治疗化学(ATC)类别是一个费力、昂贵且复杂的过程,通常需要多个临床试验阶段。计算模型通过加速药物评估、减少复杂性和降低成本带来了显著的好处;然而,药物分类系统仍然面临挑战。为了解决这个问题,我们对用于预测 ATC 类别的计算模型进行了文献调查,调查范围涵盖 2008 年至 2024 年的研究。本研究回顾了有关药物分类的大量研究文章,重点关注药物描述符、数据源、任务、计算方法、模型性能以及预测 ATC 类别所面临的挑战。研究还探讨了计算技术的发展及其在确定 ATC 类别中的应用。最后,研究强调了尚未解决的问题和研究空白,提出了在 ATC 类别预测方面需要进一步研究的领域。CCS 概念:应用计算 → 生命和医学科学 → 生物信息学
{"title":"A Comprehensive Survey of Studies on Predicting Anatomical Therapeutic Chemical Classes of Drugs","authors":"Pranab Das, Dilwar Hussain Mazumder","doi":"10.1145/3699713","DOIUrl":"https://doi.org/10.1145/3699713","url":null,"abstract":"Drug classification plays a crucial role in contemporary drug discovery, design, and development. Determining the Anatomical Therapeutic Chemical (ATC) classes for new drugs is a laborious, costly, and intricate process, often requiring multiple clinical trial phases. Computational models offer significant benefits by accelerating drug evaluation, reducing complexity, and lowering costs; however, challenges persist in the drug classification system. To address this, a literature survey of computational models used for predicting ATC classes was conducted, covering research from 2008 to 2024. This study reviews numerous research articles on drug classification, focusing on drug descriptors, data sources, tasks, computational methods, model performance, and challenges in predicting ATC classes. It also examines the evolution of computational techniques and their application in identifying ATC classes. Finally, the study highlights open problems and research gaps, suggesting areas for further investigation in ATC class prediction. CCS Concepts: Applied computing → Life and medical sciences → Bioinformatics","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"23 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142385551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering Agrifood System with Artificial Intelligence: A Survey of the Progress, Challenges and Opportunities 利用人工智能增强农业食品系统的能力:进展、挑战和机遇概览
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-07 DOI: 10.1145/3698589
Tao Chen, Liang Lv, Di Wang, Jing Zhang, Yue Yang, Zeyang Zhao, Chen Wang, Xiaowei Guo, Hao Chen, Qingye Wang, Yufei Xu, Qiming Zhang, Bo Du, Liangpei Zhang, Dacheng Tao
With the world population rapidly increasing, transforming our agrifood systems to be more productive, efficient, safe, and sustainable is crucial to mitigate potential food shortages. Recently, artificial intelligence (AI) techniques such as deep learning (DL) have demonstrated their strong abilities in various areas, including language, vision, remote sensing (RS), and agrifood systems applications. However, the overall impact of AI on agrifood systems remains unclear. In this paper, we thoroughly review how AI techniques can transform agrifood systems and contribute to the modern agrifood industry. Firstly, we summarize the data acquisition methods in agrifood systems, including acquisition, storage, and processing techniques. Secondly, we present a progress review of AI methods in agrifood systems, specifically in agriculture, animal husbandry, and fishery, covering topics such as agrifood classification, growth monitoring, yield prediction, and quality assessment. Furthermore, we highlight potential challenges and promising research opportunities for transforming modern agrifood systems with AI. We hope this survey could offer an overall picture to newcomers in the field and serve as a starting point for their further research. The project website is https://github.com/Frenkie14/Agrifood-Survey.
随着世界人口的快速增长,改造我们的农粮系统,使其更具生产力、效率、安全性和可持续性,对于缓解潜在的粮食短缺问题至关重要。最近,深度学习(DL)等人工智能(AI)技术已在语言、视觉、遥感(RS)和农业食品系统应用等多个领域展现出强大的能力。然而,人工智能对农粮系统的总体影响仍不明确。在本文中,我们将深入探讨人工智能技术如何改变农业食品系统,并为现代农业食品工业做出贡献。首先,我们总结了农业食品系统中的数据采集方法,包括采集、存储和处理技术。其次,我们对农粮系统中的人工智能方法进行了进展回顾,特别是在农业、畜牧业和渔业方面,涵盖了农粮分类、生长监测、产量预测和质量评估等主题。此外,我们还强调了利用人工智能改造现代农业食品系统的潜在挑战和有前途的研究机会。我们希望这份调查报告能够为这一领域的新手提供一个全面的了解,并作为他们进一步研究的起点。项目网站:https://github.com/Frenkie14/Agrifood-Survey。
{"title":"Empowering Agrifood System with Artificial Intelligence: A Survey of the Progress, Challenges and Opportunities","authors":"Tao Chen, Liang Lv, Di Wang, Jing Zhang, Yue Yang, Zeyang Zhao, Chen Wang, Xiaowei Guo, Hao Chen, Qingye Wang, Yufei Xu, Qiming Zhang, Bo Du, Liangpei Zhang, Dacheng Tao","doi":"10.1145/3698589","DOIUrl":"https://doi.org/10.1145/3698589","url":null,"abstract":"With the world population rapidly increasing, transforming our agrifood systems to be more productive, efficient, safe, and sustainable is crucial to mitigate potential food shortages. Recently, artificial intelligence (AI) techniques such as deep learning (DL) have demonstrated their strong abilities in various areas, including language, vision, remote sensing (RS), and agrifood systems applications. However, the overall impact of AI on agrifood systems remains unclear. In this paper, we thoroughly review how AI techniques can transform agrifood systems and contribute to the modern agrifood industry. Firstly, we summarize the data acquisition methods in agrifood systems, including acquisition, storage, and processing techniques. Secondly, we present a progress review of AI methods in agrifood systems, specifically in agriculture, animal husbandry, and fishery, covering topics such as agrifood classification, growth monitoring, yield prediction, and quality assessment. Furthermore, we highlight potential challenges and promising research opportunities for transforming modern agrifood systems with AI. We hope this survey could offer an overall picture to newcomers in the field and serve as a starting point for their further research. The project website is https://github.com/Frenkie14/Agrifood-Survey.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"39 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142384403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early-Exit Deep Neural Network - A Comprehensive Survey 早期退出深度神经网络--全面调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-07 DOI: 10.1145/3698767
Haseena Rahmath P, Vishal Srivastava, Kuldeep Chaurasia, Roberto G. Pacheco, Rodrigo S. Couto
Deep neural networks (DNNs) typically have a single exit point that makes predictions by running the entire stack of neural layers. Since not all inputs require the same amount of computation to reach a confident prediction, recent research has focused on incorporating multiple ”exits” into the conventional DNN architecture. Early-exit DNNs are multi-exit neural networks that attach many side branches to the conventional DNN, enabling inference to stop early at intermediate points. This approach offers several advantages, including speeding up the inference process, mitigating the vanishing gradients problems, reducing overfitting and overthinking tendencies. It also supports DNN partitioning across devices and is ideal for multi-tier computation platforms such as edge computing. This paper decomposes the early-exit DNN architecture and reviews the recent advances in the field. The study explores its benefits, designs, training strategies, and adaptive inference mechanisms. Various design challenges, application scenarios, and future directions are also extensively discussed.
深度神经网络(DNN)通常只有一个出口,通过运行整个神经层栈进行预测。由于并非所有输入都需要相同的计算量才能达到有把握的预测,因此最近的研究重点是在传统 DNN 架构中加入多个 "出口"。早期出口 DNN 是一种多出口神经网络,它在传统 DNN 上附加了许多侧枝,使推理能够在中间点提前停止。这种方法有几个优点,包括加快推理过程、缓解梯度消失问题、减少过度拟合和过度思考倾向。它还支持 DNN 跨设备分区,是边缘计算等多层计算平台的理想选择。本文分解了早期退出 DNN 架构,并回顾了该领域的最新进展。研究探讨了其优势、设计、训练策略和自适应推理机制。本文还广泛讨论了各种设计挑战、应用场景和未来发展方向。
{"title":"Early-Exit Deep Neural Network - A Comprehensive Survey","authors":"Haseena Rahmath P, Vishal Srivastava, Kuldeep Chaurasia, Roberto G. Pacheco, Rodrigo S. Couto","doi":"10.1145/3698767","DOIUrl":"https://doi.org/10.1145/3698767","url":null,"abstract":"Deep neural networks (DNNs) typically have a single exit point that makes predictions by running the entire stack of neural layers. Since not all inputs require the same amount of computation to reach a confident prediction, recent research has focused on incorporating multiple ”exits” into the conventional DNN architecture. Early-exit DNNs are multi-exit neural networks that attach many side branches to the conventional DNN, enabling inference to stop early at intermediate points. This approach offers several advantages, including speeding up the inference process, mitigating the vanishing gradients problems, reducing overfitting and overthinking tendencies. It also supports DNN partitioning across devices and is ideal for multi-tier computation platforms such as edge computing. This paper decomposes the early-exit DNN architecture and reviews the recent advances in the field. The study explores its benefits, designs, training strategies, and adaptive inference mechanisms. Various design challenges, application scenarios, and future directions are also extensively discussed.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"225 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142384405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Editing for Large Language Models: A Survey 大型语言模型的知识编辑:调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-07 DOI: 10.1145/3698590
Song Wang, Yaochen Zhu, Haochen Liu, Zaiyi Zheng, Chen Chen, Jundong Li
Large Language Models (LLMs) have recently transformed both the academic and industrial landscapes due to their remarkable capacity to understand, analyze, and generate texts based on their vast knowledge and reasoning ability. Nevertheless, one major drawback of LLMs is their substantial computational cost for pre-training due to their unprecedented amounts of parameters. The disadvantage is exacerbated when new knowledge frequently needs to be introduced into the pre-trained model. Therefore, it is imperative to develop effective and efficient techniques to update pre-trained LLMs. Traditional methods encode new knowledge in pre-trained LLMs through direct fine-tuning. However, naively re-training LLMs can be computationally intensive and risks degenerating valuable pre-trained knowledge irrelevant to the update in the model. Recently, Knowledge-based Model Editing (KME), also known as Knowledge Editing or Model Editing , has attracted increasing attention, which aims to precisely modify the LLMs to incorporate specific knowledge, without negatively influencing other irrelevant knowledge. In this survey, we aim to provide a comprehensive and in-depth overview of recent advances in the field of KME. We first introduce a general formulation of KME to encompass different KME strategies. Afterward, we provide an innovative taxonomy of KME techniques based on how the new knowledge is introduced into pre-trained LLMs, and investigate existing KME strategies while analyzing key insights, advantages, and limitations of methods from each category. Moreover, representative metrics, datasets, and applications of KME are introduced accordingly. Finally, we provide an in-depth analysis regarding the practicality and remaining challenges of KME and suggest promising research directions for further advancement in this field.
大型语言模型(LLMs)凭借其丰富的知识和推理能力,在理解、分析和生成文本方面具有非凡的能力,近来已改变了学术界和工业界的面貌。然而,LLMs 的一个主要缺点是,由于参数数量空前庞大,预训练的计算成本非常高。如果经常需要在预训练模型中引入新知识,这一缺点就会更加严重。因此,当务之急是开发有效且高效的技术来更新预训练 LLM。传统方法通过直接微调将新知识编码到预训练 LLM 中。然而,天真地重新训练 LLM 可能会耗费大量计算,并有可能使模型中与更新无关的有价值的预训练知识退化。最近,基于知识的模型编辑(Knowledge-based Model Editing,KME),也称为知识编辑或模型编辑(Model Editing),吸引了越来越多的关注,其目的是精确修改 LLMs,以纳入特定知识,同时不对其他无关知识产生负面影响。在本研究中,我们旨在全面深入地概述 KME 领域的最新进展。我们首先介绍了 KME 的一般表述,以涵盖不同的 KME 策略。随后,我们根据如何将新知识引入预训练的 LLM,提供了一种创新的 KME 技术分类法,并研究了现有的 KME 策略,同时分析了各类方法的关键见解、优势和局限性。此外,我们还介绍了 KME 的代表性指标、数据集和应用。最后,我们深入分析了 KME 的实用性和仍然存在的挑战,并为进一步推动该领域的发展提出了有前景的研究方向。
{"title":"Knowledge Editing for Large Language Models: A Survey","authors":"Song Wang, Yaochen Zhu, Haochen Liu, Zaiyi Zheng, Chen Chen, Jundong Li","doi":"10.1145/3698590","DOIUrl":"https://doi.org/10.1145/3698590","url":null,"abstract":"Large Language Models (LLMs) have recently transformed both the academic and industrial landscapes due to their remarkable capacity to understand, analyze, and generate texts based on their vast knowledge and reasoning ability. Nevertheless, one major drawback of LLMs is their substantial computational cost for pre-training due to their unprecedented amounts of parameters. The disadvantage is exacerbated when new knowledge frequently needs to be introduced into the pre-trained model. Therefore, it is imperative to develop effective and efficient techniques to update pre-trained LLMs. Traditional methods encode new knowledge in pre-trained LLMs through direct fine-tuning. However, naively re-training LLMs can be computationally intensive and risks degenerating valuable pre-trained knowledge irrelevant to the update in the model. Recently, Knowledge-based Model Editing (KME), also known as Knowledge Editing or Model Editing , has attracted increasing attention, which aims to precisely modify the LLMs to incorporate specific knowledge, without negatively influencing other irrelevant knowledge. In this survey, we aim to provide a comprehensive and in-depth overview of recent advances in the field of KME. We first introduce a general formulation of KME to encompass different KME strategies. Afterward, we provide an innovative taxonomy of KME techniques based on how the new knowledge is introduced into pre-trained LLMs, and investigate existing KME strategies while analyzing key insights, advantages, and limitations of methods from each category. Moreover, representative metrics, datasets, and applications of KME are introduced accordingly. Finally, we provide an in-depth analysis regarding the practicality and remaining challenges of KME and suggest promising research directions for further advancement in this field.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"3 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142384404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co-clustering: a Survey of the Main Methods, Recent Trends and Open Problems 协同聚类:主要方法、最新趋势和未决问题概览
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-04 DOI: 10.1145/3698875
Elena Battaglia, Federico Peiretti, Ruggero Gaetano Pensa
Since its early formulations, co-clustering has gained popularity and interest both within and outside the machine learning community as a powerful learning paradigm for clustering high-dimensional data with good explainability properties. The simultaneous partitioning of all the modes of the input data tensors (rows and columns in a data matrix) is both a method for improving clustering on one mode while performing dimensionality reduction on the other mode(s), and a tool for providing an actionable interpretation of the clusters in the main mode as summaries of the features in each other mode(s). Hence, it is useful in many complex decision systems and data science applications. In this paper, we survey the the co-clustering literature by reviewing the main co-clustering methods, with a special focus on the work done in the last twenty-five years. We identify, describe and compare the main algorithmic categories, and provide a practical characterization with respect to similar unsupervised techniques. Additionally, we also try to explain why it is still a powerful tool despite the apparent recent decreasing interest shown by the machine learning community. To this purpose, we review the most recent trends in co-clustering research and outline the open problems and promising future research perspectives.
协同聚类作为一种强大的学习范式,可对高维数据进行聚类,并具有良好的可解释性。对输入数据张量(数据矩阵中的行和列)的所有模式同时进行分区,既是一种在一种模式上改进聚类的方法,同时又能在其他模式上进行降维,还是一种将主要模式中的聚类解释为其他模式中特征总结的工具。因此,它在许多复杂的决策系统和数据科学应用中都非常有用。在本文中,我们通过回顾主要的协同聚类方法,对协同聚类文献进行了调查,并特别关注了过去二十五年所做的工作。我们识别、描述和比较了主要的算法类别,并提供了类似无监督技术的实用特征。此外,我们还试图解释为什么尽管最近机器学习界对无监督技术的兴趣明显减弱,但它仍然是一种强大的工具。为此,我们回顾了协同聚类研究的最新趋势,并概述了有待解决的问题和未来的研究前景。
{"title":"Co-clustering: a Survey of the Main Methods, Recent Trends and Open Problems","authors":"Elena Battaglia, Federico Peiretti, Ruggero Gaetano Pensa","doi":"10.1145/3698875","DOIUrl":"https://doi.org/10.1145/3698875","url":null,"abstract":"Since its early formulations, co-clustering has gained popularity and interest both within and outside the machine learning community as a powerful learning paradigm for clustering high-dimensional data with good explainability properties. The simultaneous partitioning of all the modes of the input data tensors (rows and columns in a data matrix) is both a method for improving clustering on one mode while performing dimensionality reduction on the other mode(s), and a tool for providing an actionable interpretation of the clusters in the main mode as summaries of the features in each other mode(s). Hence, it is useful in many complex decision systems and data science applications. In this paper, we survey the the co-clustering literature by reviewing the main co-clustering methods, with a special focus on the work done in the last twenty-five years. We identify, describe and compare the main algorithmic categories, and provide a practical characterization with respect to similar unsupervised techniques. Additionally, we also try to explain why it is still a powerful tool despite the apparent recent decreasing interest shown by the machine learning community. To this purpose, we review the most recent trends in co-clustering research and outline the open problems and promising future research perspectives.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"57 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge-based Cyber Physical Security at Smart Home: A Review 基于知识的智能家居网络物理安全:综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1145/3698768
Azhar Alsufyani, Omar Rana, Charith Perera
Smart-home systems represent the future of modern building infrastructure as they integrate numerous devices and applications to improve the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies and algorithmic controls to monitor and manage physical environments. However, ensuring robust security in smart homes, along with securing smart devices, presents a formidable challenge. A substantial number of security solutions for smart homes rely on data-driven approaches (e.g., machine/deep learning) to identify and mitigate potential threats. These approaches involve training models on extensive datasets, which distinguishes them from knowledge-driven methods. In this review, we examine the role of knowledge within smart homes, focusing on understanding and reasoning regarding various events and their utility towards securing smart homes. We propose a taxonomy to characterize the categorization of decision-making approaches. By specifying the most common vulnerabilities, attacks, and threats, we can analyze and assess the countermeasures against them. We also examine how smart homes have been evaluated in the reviewed literature. Furthermore, we explore the challenges inherent in smart homes and investigate existing solutions that aim to overcome these limitations. Finally, we examine the key gaps in smart-home-security research and define future research directions for knowledge-driven schemes.
智能家居系统代表着现代建筑基础设施的未来,因为这些系统集成了众多设备和应用程序,以提高整体生活质量。这些系统在智能设备之间建立连接,利用网络技术和算法控制来监控和管理物理环境。然而,如何确保智能家居的稳健安全,同时确保智能设备的安全,是一项艰巨的挑战。大量智能家居安全解决方案都依赖于数据驱动方法(如机器/深度学习)来识别和减轻潜在威胁。这些方法涉及在大量数据集上训练模型,这使它们有别于知识驱动型方法。在本综述中,我们将研究知识在智能家居中的作用,重点关注对各种事件的理解和推理,以及它们在确保智能家居安全方面的效用。我们提出了一种分类法,用于描述决策方法的分类特征。通过说明最常见的漏洞、攻击和威胁,我们可以分析和评估针对它们的对策。我们还研究了所查阅文献中对智能家居的评估方式。此外,我们还探讨了智能家居固有的挑战,并研究了旨在克服这些局限性的现有解决方案。最后,我们探讨了智能家居安全研究中的主要差距,并确定了知识驱动方案的未来研究方向。
{"title":"Knowledge-based Cyber Physical Security at Smart Home: A Review","authors":"Azhar Alsufyani, Omar Rana, Charith Perera","doi":"10.1145/3698768","DOIUrl":"https://doi.org/10.1145/3698768","url":null,"abstract":"Smart-home systems represent the future of modern building infrastructure as they integrate numerous devices and applications to improve the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies and algorithmic controls to monitor and manage physical environments. However, ensuring robust security in smart homes, along with securing smart devices, presents a formidable challenge. A substantial number of security solutions for smart homes rely on data-driven approaches (e.g., machine/deep learning) to identify and mitigate potential threats. These approaches involve training models on extensive datasets, which distinguishes them from knowledge-driven methods. In this review, we examine the role of knowledge within smart homes, focusing on understanding and reasoning regarding various events and their utility towards securing smart homes. We propose a taxonomy to characterize the categorization of decision-making approaches. By specifying the most common vulnerabilities, attacks, and threats, we can analyze and assess the countermeasures against them. We also examine how smart homes have been evaluated in the reviewed literature. Furthermore, we explore the challenges inherent in smart homes and investigate existing solutions that aim to overcome these limitations. Finally, we examine the key gaps in smart-home-security research and define future research directions for knowledge-driven schemes.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"59 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of Privacy Policy Literature 隐私政策文献的系统回顾
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-01 DOI: 10.1145/3698393
Yousra Javed, Ayesha Sajid
An organization’s privacy policy states how it collects, stores, processes, and shares its users’ personal information. The growing number of data protection laws and regulations as well as the numerous sectors where the organizations are collecting user information, has led to the investigation of privacy policies with regards to their accessibility, readability, completeness, comparison with organization’s actual data practices, use of machine learning/natural language processing for automated analysis, and comprehension/perception/concerns of end-users via summarization/visualization tools and user studies. However, there is limited work on systematically reviewing the existing research on this topic. We address this gap by conducting a systematic review of the existing privacy policy literature. To this end, we compiled and analyzed 202 papers (published till 31 st December 2023) that investigated privacy policies. Our work advances the field of privacy policies by summarizing the analysis techniques that have been used to study them, the data protection laws/regulations explored, and the sectors to which these policies pertain. We provide actionable insights for organizations to achieve better end-user privacy.
一个组织的隐私政策说明了它如何收集、存储、处理和共享用户的个人信息。随着数据保护法律法规的不断增多,以及企业收集用户信息的领域不断扩大,人们开始对隐私政策的可访问性、可读性、完整性、与企业实际数据实践的比较、机器学习/自然语言处理在自动分析中的应用,以及最终用户通过总结/可视化工具和用户研究对隐私政策的理解/感知/关注等方面进行研究。然而,系统回顾有关这一主题的现有研究的工作十分有限。针对这一空白,我们对现有的隐私政策文献进行了系统回顾。为此,我们汇编并分析了 202 篇研究隐私政策的论文(发表至 2023 年 12 月 31 日)。我们的工作总结了用于研究隐私政策的分析技术、所探讨的数据保护法律/法规以及这些政策所涉及的行业,从而推动了隐私政策领域的发展。我们为企业提供了可操作的见解,以实现更好的最终用户隐私保护。
{"title":"A Systematic Review of Privacy Policy Literature","authors":"Yousra Javed, Ayesha Sajid","doi":"10.1145/3698393","DOIUrl":"https://doi.org/10.1145/3698393","url":null,"abstract":"An organization’s privacy policy states how it collects, stores, processes, and shares its users’ personal information. The growing number of data protection laws and regulations as well as the numerous sectors where the organizations are collecting user information, has led to the investigation of privacy policies with regards to their accessibility, readability, completeness, comparison with organization’s actual data practices, use of machine learning/natural language processing for automated analysis, and comprehension/perception/concerns of end-users via summarization/visualization tools and user studies. However, there is limited work on systematically reviewing the existing research on this topic. We address this gap by conducting a systematic review of the existing privacy policy literature. To this end, we compiled and analyzed 202 papers (published till 31 <jats:sup>st</jats:sup> December 2023) that investigated privacy policies. Our work advances the field of privacy policies by summarizing the analysis techniques that have been used to study them, the data protection laws/regulations explored, and the sectors to which these policies pertain. We provide actionable insights for organizations to achieve better end-user privacy.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"21 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions 电动汽车和飞行器的网络安全:威胁、挑战、人工智能解决方案和未来方向
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-30 DOI: 10.1145/3697830
Hamed Alqahtani, Gulshan Kumar
Electric and Flying Vehicles (EnFVs) represent a transformative shift in transportation, promising enhanced efficiency and reduced environmental impact. However, their integration into interconnected digital ecosystems poses significant cybersecurity challenges, including cyber-physical threats, privacy vulnerabilities, and supply chain risks. This paper comprehensively explores these challenges and investigates artificial intelligence (AI)-driven solutions to bolster EnFV cybersecurity. The study begins with an overview of EnFV cybersecurity issues, emphasizing the increasing complexity of threats in digital transportation systems. Methodologically, the paper reviews existing literature to identify gaps and assesses recent advancements in AI for cybersecurity applications. Key methodologies include AI-powered intrusion detection, threat analysis leveraging machine learning algorithms, predictive maintenance strategies, and enhanced authentication protocols. Results underscore the effectiveness of AI technologies in mitigating EnFV cybersecurity risks, demonstrating improved threat detection and response capabilities. The study concludes by outlining future research directions, highlighting the need for continued innovation in AI, quantum computing resilience, blockchain applications, and ethical considerations. These findings contribute to a clearer understanding of EnFV cybersecurity dynamics and provide a roadmap for enhancing the security and reliability of future transportation systems.
电动汽车和飞行汽车(EnFVs)代表了交通运输领域的变革,有望提高效率并减少对环境的影响。然而,它们与互联数字生态系统的整合带来了巨大的网络安全挑战,包括网络物理威胁、隐私漏洞和供应链风险。本文全面探讨了这些挑战,并研究了人工智能(AI)驱动的解决方案,以加强 EnFV 网络安全。研究首先概述了 EnFV 网络安全问题,强调了数字运输系统中日益复杂的威胁。在方法论上,本文回顾了现有文献以找出差距,并评估了人工智能在网络安全应用方面的最新进展。主要方法包括人工智能驱动的入侵检测、利用机器学习算法进行威胁分析、预测性维护策略以及增强型身份验证协议。研究结果强调了人工智能技术在降低 EnFV 网络安全风险方面的有效性,并展示了经过改进的威胁检测和响应能力。研究最后概述了未来的研究方向,强调了在人工智能、量子计算弹性、区块链应用和伦理考虑方面持续创新的必要性。这些发现有助于更清晰地了解 EnFV 网络安全动态,并为提高未来运输系统的安全性和可靠性提供了路线图。
{"title":"Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions","authors":"Hamed Alqahtani, Gulshan Kumar","doi":"10.1145/3697830","DOIUrl":"https://doi.org/10.1145/3697830","url":null,"abstract":"Electric and Flying Vehicles (EnFVs) represent a transformative shift in transportation, promising enhanced efficiency and reduced environmental impact. However, their integration into interconnected digital ecosystems poses significant cybersecurity challenges, including cyber-physical threats, privacy vulnerabilities, and supply chain risks. This paper comprehensively explores these challenges and investigates artificial intelligence (AI)-driven solutions to bolster EnFV cybersecurity. The study begins with an overview of EnFV cybersecurity issues, emphasizing the increasing complexity of threats in digital transportation systems. Methodologically, the paper reviews existing literature to identify gaps and assesses recent advancements in AI for cybersecurity applications. Key methodologies include AI-powered intrusion detection, threat analysis leveraging machine learning algorithms, predictive maintenance strategies, and enhanced authentication protocols. Results underscore the effectiveness of AI technologies in mitigating EnFV cybersecurity risks, demonstrating improved threat detection and response capabilities. The study concludes by outlining future research directions, highlighting the need for continued innovation in AI, quantum computing resilience, blockchain applications, and ethical considerations. These findings contribute to a clearer understanding of EnFV cybersecurity dynamics and provide a roadmap for enhancing the security and reliability of future transportation systems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"54 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1