首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
Privacy-preserved and Responsible Recommenders: From Conventional Defense to Federated Learning and Blockchain 隐私保护和负责任的推荐:从传统防御到联邦学习和b区块链
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-19 DOI: 10.1145/3708982
Waqar Ali, Xiangmin Zhou, Jie Shao
Recommender systems (RS) play an integral role in many online platforms. Exponential growth and potential commercial interests are raising significant concerns around privacy, security, fairness, and overall responsibility. The existing literature around responsible recommendation services is diverse and multi-disciplinary. Most literature reviews cover a specific aspect or a single technology for responsible behavior, such as federated learning or blockchain. This study integrates relevant concepts across disciplines to provide a broader representation of the landscape. We review the latest advancements toward building privacy-preserved and responsible recommendation services for the e-commerce industry. The survey summarizes recent, high-impact works on diverse aspects and technologies that ensure responsible behavior in RS through an interconnected taxonomy. We contextualize potential privacy threats, practical significance, industrial expectations, and research remedies. From the technical viewpoint, we analyze conventional privacy defenses and provide an overview of emerging technologies including differential privacy, federated learning, and blockchain. The methods and concepts across technologies are linked based on their objectives, challenges, and future directions. In addition, we also develop an open-source repository that summarizes a wide range of evaluation benchmarks, codebases, and toolkits to aid the further research. The survey offers a holistic perspective on this rapidly evolving landscape by synthesizing insights from both recommender systems and responsible AI literature.
推荐系统(RS)在许多在线平台中扮演着不可或缺的角色。指数增长和潜在的商业利益引起了人们对隐私、安全、公平和整体责任的重大关注。关于负责任的推荐服务的现有文献是多种多样的,多学科的。大多数文献综述涵盖了负责任行为的特定方面或单一技术,例如联邦学习或区块链。本研究整合了跨学科的相关概念,以提供更广泛的景观代表。我们回顾了为电子商务行业建立隐私保护和负责任的推荐服务的最新进展。该调查总结了最近在不同方面和技术方面的高影响力工作,通过相互关联的分类确保RS中的负责任行为。我们将潜在的隐私威胁、实际意义、行业期望和研究补救措施置于背景中。从技术角度来看,我们分析了传统的隐私防御,并概述了新兴技术,包括差分隐私、联邦学习和区块链。跨技术的方法和概念是根据它们的目标、挑战和未来方向联系在一起的。此外,我们还开发了一个开源存储库,它总结了广泛的评估基准、代码库和工具包,以帮助进一步的研究。该调查综合了来自推荐系统和负责任的人工智能文献的见解,为这一快速发展的领域提供了一个全面的视角。
{"title":"Privacy-preserved and Responsible Recommenders: From Conventional Defense to Federated Learning and Blockchain","authors":"Waqar Ali, Xiangmin Zhou, Jie Shao","doi":"10.1145/3708982","DOIUrl":"https://doi.org/10.1145/3708982","url":null,"abstract":"Recommender systems (RS) play an integral role in many online platforms. Exponential growth and potential commercial interests are raising significant concerns around privacy, security, fairness, and overall responsibility. The existing literature around responsible recommendation services is diverse and multi-disciplinary. Most literature reviews cover a specific aspect or a single technology for responsible behavior, such as federated learning or blockchain. This study integrates relevant concepts across disciplines to provide a broader representation of the landscape. We review the latest advancements toward building privacy-preserved and responsible recommendation services for the e-commerce industry. The survey summarizes recent, high-impact works on diverse aspects and technologies that ensure responsible behavior in RS through an interconnected taxonomy. We contextualize potential privacy threats, practical significance, industrial expectations, and research remedies. From the technical viewpoint, we analyze conventional privacy defenses and provide an overview of emerging technologies including differential privacy, federated learning, and blockchain. The methods and concepts across technologies are linked based on their objectives, challenges, and future directions. In addition, we also develop an open-source repository that summarizes a wide range of evaluation benchmarks, codebases, and toolkits to aid the further research. The survey offers a holistic perspective on this rapidly evolving landscape by synthesizing insights from both recommender systems and responsible AI literature.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"40 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142857991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISP Meets Deep Learning: A Survey on Deep Learning Methods for Image Signal Processing ISP与深度学习:图像信号处理的深度学习方法综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-19 DOI: 10.1145/3708516
Claudio Filipi Goncalves dos Santos, Rodrigo Reis Arrais, Jhessica Victoria Santos da Silva, Matheus Henrique Marques da Silva, Wladimir Barroso Guedes de Araujo Neto, Leonardo Tadeu Lopes, Guilherme Augusto Bileki, Iago Oliveira Lima, Lucas Borges Rondon, Bruno Melo de Souza, Mayara Costa Regazio, Rodolfo Coelho Dalapicola, Arthur Alves Tasca
The entire Image Signal Processor (ISP) of a camera relies on several processes to transform the data from the Color Filter Array (CFA) sensor, such as demosaicing, denoising, and enhancement. These processes can be executed either by some hardware or via software. In recent years, Deep Learning(DL) has emerged as one solution for some of them or even to replace the entire ISP using a single neural network for the task. In this work, we investigated several recent pieces of research in this area and provide deeper analysis and comparison among them, including results and possible points of improvement for future researchers.
相机的整个图像信号处理器(ISP)依赖于几个处理过程来转换来自彩色滤波阵列(CFA)传感器的数据,如去马赛克、去噪和增强。这些过程可以通过硬件或软件执行。近年来,深度学习(Deep Learning,DL)作为一种解决方案出现了,它可以解决其中一些问题,甚至可以用一个神经网络取代整个 ISP 来完成任务。在这项工作中,我们调查了这一领域最近的几项研究,并对它们进行了深入分析和比较,包括结果和可能的改进点,供未来的研究人员参考。
{"title":"ISP Meets Deep Learning: A Survey on Deep Learning Methods for Image Signal Processing","authors":"Claudio Filipi Goncalves dos Santos, Rodrigo Reis Arrais, Jhessica Victoria Santos da Silva, Matheus Henrique Marques da Silva, Wladimir Barroso Guedes de Araujo Neto, Leonardo Tadeu Lopes, Guilherme Augusto Bileki, Iago Oliveira Lima, Lucas Borges Rondon, Bruno Melo de Souza, Mayara Costa Regazio, Rodolfo Coelho Dalapicola, Arthur Alves Tasca","doi":"10.1145/3708516","DOIUrl":"https://doi.org/10.1145/3708516","url":null,"abstract":"The entire Image Signal Processor (ISP) of a camera relies on several processes to transform the data from the Color Filter Array (CFA) sensor, such as demosaicing, denoising, and enhancement. These processes can be executed either by some hardware or via software. In recent years, Deep Learning(DL) has emerged as one solution for some of them or even to replace the entire ISP using a single neural network for the task. In this work, we investigated several recent pieces of research in this area and provide deeper analysis and comparison among them, including results and possible points of improvement for future researchers.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"276 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142857992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Generation of Graphical Game Assets: A Conceptual Framework and Systematic Review of the State of the Art 图像游戏资产的智能生成:概念框架和技术现状的系统回顾
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-18 DOI: 10.1145/3708499
Kaisei Fukaya, Damon Daylamani-Zad, Harry Agius
Procedural content generation (PCG) can be applied to a wide variety of tasks in games, from narratives, levels and sounds, to trees and weapons. A large amount of game content is comprised of graphical assets , such as clouds, buildings or vegetation, that do not require gameplay function considerations. There is also a breadth of literature examining the procedural generation of such elements for purposes outside of games. The body of research, focused on specific methods for generating specific assets, provides a narrow view of the available possibilities. Hence, it is difficult to have a clear picture of all approaches and possibilities, with no guide for interested parties to discover possible methods and approaches for their needs, and no facility to guide them through each technique or approach to map out the process of using them. Therefore, a systematic literature review has been conducted, yielding 239 accepted papers. This paper explores state-of-the-art approaches to graphical asset generation, examining research from a wide range of applications, inside and outside of games. Informed by the literature, a conceptual framework has been derived to address the aforementioned gaps.
程序内容生成(PCG)可以应用于游戏中的各种任务,从叙述、关卡、声音到树木和武器。大量的游戏内容是由图像资产组成的,如云、建筑或植被,这些都不需要考虑游戏功能。在游戏之外,也有大量的文献研究这些元素的程序生成。研究的主体集中在产生特定资产的特定方法上,提供了对可用可能性的狭隘看法。因此,很难对所有的方法和可能性有一个清晰的了解,因为没有指导感兴趣的各方为他们的需要发现可能的方法和途径,也没有设施来指导他们通过每种技术或途径来规划使用它们的过程。因此,我们进行了系统的文献综述,共收到239篇论文。本文探讨了图像资产生成的最新方法,并检查了来自游戏内外广泛应用的研究。根据文献资料,已衍生出一个概念性框架来解决上述差距。
{"title":"Intelligent Generation of Graphical Game Assets: A Conceptual Framework and Systematic Review of the State of the Art","authors":"Kaisei Fukaya, Damon Daylamani-Zad, Harry Agius","doi":"10.1145/3708499","DOIUrl":"https://doi.org/10.1145/3708499","url":null,"abstract":"Procedural content generation (PCG) can be applied to a wide variety of tasks in games, from narratives, levels and sounds, to trees and weapons. A large amount of game content is comprised of <jats:italic>graphical assets</jats:italic> , such as clouds, buildings or vegetation, that do not require gameplay function considerations. There is also a breadth of literature examining the procedural generation of such elements for purposes outside of games. The body of research, focused on specific methods for generating specific assets, provides a narrow view of the available possibilities. Hence, it is difficult to have a clear picture of all approaches and possibilities, with no guide for interested parties to discover possible methods and approaches for their needs, and no facility to guide them through each technique or approach to map out the process of using them. Therefore, a systematic literature review has been conducted, yielding 239 accepted papers. This paper explores state-of-the-art approaches to <jats:italic>graphical asset</jats:italic> generation, examining research from a wide range of applications, inside and outside of games. Informed by the literature, a conceptual framework has been derived to address the aforementioned gaps.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"10 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach 面向生产中的可信机器学习:MLOps方法鲁棒性概述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-18 DOI: 10.1145/3708497
Firas Bayram, Bestoun S. Ahmed
Artificial intelligence (AI), and especially its sub-field of Machine Learning (ML), are impacting the daily lives of everyone with their ubiquitous applications. In recent years, AI researchers and practitioners have introduced principles and guidelines to build systems that make reliable and trustworthy decisions. From a practical perspective, conventional ML systems process historical data to extract the features that are consequently used to train ML models that perform the desired task. However, in practice, a fundamental challenge arises when the system needs to be operationalized and deployed to evolve and operate in real-life environments continuously. To address this challenge, Machine Learning Operations (MLOps) have emerged as a potential recipe for standardizing ML solutions in deployment. Although MLOps demonstrated great success in streamlining ML processes, thoroughly defining the specifications of robust MLOps approaches remains of great interest to researchers and practitioners. In this paper, we provide a comprehensive overview of the trustworthiness property of MLOps systems. Specifically, we highlight technical practices to achieve robust MLOps systems. In addition, we survey the existing research approaches that address the robustness aspects of ML systems in production. We also review the tools and software available to build MLOps systems and summarize their support to handle the robustness aspects. Finally, we present the open challenges and propose possible future directions and opportunities within this emerging field. The aim of this paper is to provide researchers and practitioners working on practical AI applications with a comprehensive view to adopt robust ML solutions in production environments.
人工智能(AI),尤其是它的子领域机器学习(ML),正以其无处不在的应用影响着每个人的日常生活。近年来,人工智能研究人员和从业者已经引入了一些原则和指导方针,以构建做出可靠和值得信赖决策的系统。从实际的角度来看,传统的机器学习系统处理历史数据以提取特征,从而用于训练执行所需任务的机器学习模型。然而,在实践中,当系统需要在实际环境中不断发展和运行时,一个基本的挑战就出现了。为了应对这一挑战,机器学习操作(MLOps)已经成为部署中标准化机器学习解决方案的潜在配方。尽管MLOps在简化ML过程方面取得了巨大的成功,但彻底定义健壮的MLOps方法的规范仍然是研究人员和实践者非常感兴趣的问题。在本文中,我们对MLOps系统的可信性进行了全面的概述。具体来说,我们强调了实现健壮的MLOps系统的技术实践。此外,我们调查了现有的研究方法,以解决生产中的机器学习系统的鲁棒性方面。我们还回顾了可用于构建MLOps系统的工具和软件,并总结了它们对处理健壮性方面的支持。最后,我们提出了开放的挑战,并提出了在这个新兴领域可能的未来方向和机会。本文的目的是为从事实际人工智能应用的研究人员和实践者提供一个全面的视角,以便在生产环境中采用强大的机器学习解决方案。
{"title":"Towards Trustworthy Machine Learning in Production: An Overview of the Robustness in MLOps Approach","authors":"Firas Bayram, Bestoun S. Ahmed","doi":"10.1145/3708497","DOIUrl":"https://doi.org/10.1145/3708497","url":null,"abstract":"Artificial intelligence (AI), and especially its sub-field of Machine Learning (ML), are impacting the daily lives of everyone with their ubiquitous applications. In recent years, AI researchers and practitioners have introduced principles and guidelines to build systems that make reliable and trustworthy decisions. From a practical perspective, conventional ML systems process historical data to extract the features that are consequently used to train ML models that perform the desired task. However, in practice, a fundamental challenge arises when the system needs to be operationalized and deployed to evolve and operate in real-life environments continuously. To address this challenge, Machine Learning Operations (MLOps) have emerged as a potential recipe for standardizing ML solutions in deployment. Although MLOps demonstrated great success in streamlining ML processes, thoroughly defining the specifications of robust MLOps approaches remains of great interest to researchers and practitioners. In this paper, we provide a comprehensive overview of the trustworthiness property of MLOps systems. Specifically, we highlight technical practices to achieve robust MLOps systems. In addition, we survey the existing research approaches that address the robustness aspects of ML systems in production. We also review the tools and software available to build MLOps systems and summarize their support to handle the robustness aspects. Finally, we present the open challenges and propose possible future directions and opportunities within this emerging field. The aim of this paper is to provide researchers and practitioners working on practical AI applications with a comprehensive view to adopt robust ML solutions in production environments.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"28 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning 多代理强化学习中的对抗性机器学习攻击与防御
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-18 DOI: 10.1145/3708320
Maxwell Standen, Junae Kim, Claudia Szabo
Multi-Agent Reinforcement Learning (MARL) is susceptible to Adversarial Machine Learning (AML) attacks. Execution-time AML attacks against MARL are complex due to effects that propagate across time and between agents. To understand the interaction between AML and MARL, this survey covers attacks and defences for MARL, Multi-Agent Learning (MAL), and Deep Reinforcement Learning (DRL). This survey proposes a novel perspective on AML attacks based on attack vectors. This survey also proposes a framework that addresses gaps in current modelling frameworks and enables the comparison of different attacks against MARL. Lastly, the survey identifies knowledge gaps and future avenues of research.
多智能体强化学习(MARL)容易受到对抗性机器学习(AML)攻击。针对MARL的执行时AML攻击很复杂,因为影响会跨时间和在代理之间传播。为了理解AML和MARL之间的相互作用,本调查涵盖了MARL、多智能体学习(MAL)和深度强化学习(DRL)的攻击和防御。本研究提出了一种基于攻击向量的反洗钱攻击的新视角。本调查还提出了一个框架,该框架解决了当前建模框架中的差距,并能够比较针对MARL的不同攻击。最后,调查确定了知识差距和未来的研究途径。
{"title":"Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning","authors":"Maxwell Standen, Junae Kim, Claudia Szabo","doi":"10.1145/3708320","DOIUrl":"https://doi.org/10.1145/3708320","url":null,"abstract":"Multi-Agent Reinforcement Learning (MARL) is susceptible to Adversarial Machine Learning (AML) attacks. Execution-time AML attacks against MARL are complex due to effects that propagate across time and between agents. To understand the interaction between AML and MARL, this survey covers attacks and defences for MARL, Multi-Agent Learning (MAL), and Deep Reinforcement Learning (DRL). This survey proposes a novel perspective on AML attacks based on attack vectors. This survey also proposes a framework that addresses gaps in current modelling frameworks and enables the comparison of different attacks against MARL. Lastly, the survey identifies knowledge gaps and future avenues of research.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"23 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Content Privacy Protection: A Survey 视觉内容隐私保护:一项调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-16 DOI: 10.1145/3708501
Ruoyu Zhao, Yushu Zhang, Tao Wang, Wenying Wen, Yong Xiang, Xiaochun Cao
Vision is the most important sense for people, and it is also one of the main ways of cognition. As a result, people tend to utilize visual content to capture and share their life experiences, which greatly facilitates the transfer of information. Meanwhile, it also increases the risk of privacy violations, e.g., an image or video can reveal different kinds of privacy-sensitive information. Scholars have persistently pursued the advancement of tailored privacy protection measures. Various surveys attempt to consolidate these efforts from specific viewpoints. Nevertheless, these surveys tend to focus on particular issues, scenarios, or technologies, hindering a comprehensive overview of existing solutions on a broader scale. In this survey, a framework that encompasses various concerns and solutions for visual privacy is proposed, which allows for a macro understanding of privacy concerns from a comprehensive level. It is based on the fact that privacy concerns have corresponding adversaries, and divides privacy protection into three categories, based on computer vision (CV) adversary, based on human vision (HV) adversary, and based on CV & HV adversary. For each category, we analyze the characteristics of the main approaches to privacy protection, and then systematically review representative solutions. Open challenges and future directions for visual privacy protection are also discussed.
视觉是人们最重要的感官,也是人们认知的主要方式之一。因此,人们倾向于利用视觉内容来捕捉和分享自己的生活体验,这极大地方便了信息的传递。同时,这也增加了侵犯隐私的风险,例如,图像或视频可能会泄露各种隐私敏感信息。学者们一直坚持不懈地追求有针对性的隐私保护措施。各种调查试图从特定角度整合这些努力。然而,这些调查往往侧重于特定的问题、场景或技术,阻碍了在更大范围内对现有解决方案的全面概述。在本调查中,我们提出了一个包含视觉隐私的各种问题和解决方案的框架,以便从综合层面宏观了解隐私问题。它基于隐私问题都有相应的对手这一事实,将隐私保护分为三类:基于计算机视觉(CV)的对手、基于人类视觉(HV)的对手和基于 CV & HV 的对手。针对每个类别,我们分析了隐私保护主要方法的特点,然后系统回顾了具有代表性的解决方案。我们还讨论了视觉隐私保护面临的挑战和未来发展方向。
{"title":"Visual Content Privacy Protection: A Survey","authors":"Ruoyu Zhao, Yushu Zhang, Tao Wang, Wenying Wen, Yong Xiang, Xiaochun Cao","doi":"10.1145/3708501","DOIUrl":"https://doi.org/10.1145/3708501","url":null,"abstract":"Vision is the most important sense for people, and it is also one of the main ways of cognition. As a result, people tend to utilize visual content to capture and share their life experiences, which greatly facilitates the transfer of information. Meanwhile, it also increases the risk of privacy violations, e.g., an image or video can reveal different kinds of privacy-sensitive information. Scholars have persistently pursued the advancement of tailored privacy protection measures. Various surveys attempt to consolidate these efforts from specific viewpoints. Nevertheless, these surveys tend to focus on particular issues, scenarios, or technologies, hindering a comprehensive overview of existing solutions on a broader scale. In this survey, a framework that encompasses various concerns and solutions for visual privacy is proposed, which allows for a macro understanding of privacy concerns from a comprehensive level. It is based on the fact that privacy concerns have corresponding adversaries, and divides privacy protection into three categories, based on computer vision (CV) adversary, based on human vision (HV) adversary, and based on CV &amp; HV adversary. For each category, we analyze the characteristics of the main approaches to privacy protection, and then systematically review representative solutions. Open challenges and future directions for visual privacy protection are also discussed.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"16 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142831945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches 物理层认证技术综合调查:模型驱动和数据驱动方法的分类与分析
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-16 DOI: 10.1145/3708496
Zhifan Lai, Zikai Chang, Mingrui Sha, Qihong Zhang, Ning Xie, Changsheng Chen, Dusit (Tao) Niyato
The open and broadcast nature of wireless mediums introduces significant security vulnerabilities, making authentication a critical concern in wireless networks. In recent years, Physical-Layer Authentication (PLA) techniques have garnered considerable research interest due to their advantages over Upper-Layer Authentication (ULA) methods, such as lower complexity, enhanced security, and greater compatibility. The application of signal processing techniques in PLA serves as a crucial link between the extraction of Physical-Layer Features (PLFs) and the authentication of received signals. Different signal processing approaches, even with the same PLF, can result in varying authentication performances and computational demands. Despite this, there remains a shortage of comprehensive overviews on state-of-the-art PLA schemes with a focus on signal processing approaches. This paper presents the first thorough survey of signal processing in various PLA schemes, categorizing existing approaches into model-based and Machine Learning (ML)-based schemes. We discuss motivation and address key issues in signal processing for PLA schemes. The applications, challenges, and future research directions of PLA are discussed in Part 3 of the Appendix, which can be found in supplementary materials online.
无线介质的开放性和广播性带来了严重的安全漏洞,使身份验证成为无线网络中的关键问题。近年来,物理层身份验证(PLA)技术因其相对于上层身份验证(ULA)方法的优势,如更低的复杂性、更强的安全性和更大的兼容性,引起了相当大的研究兴趣。信号处理技术在 PLA 中的应用是提取物理层特征 (PLF) 和验证接收信号之间的关键环节。不同的信号处理方法,即使是相同的物理层特征,也会产生不同的验证性能和计算需求。尽管如此,以信号处理方法为重点的最新 PLA 方案仍然缺乏全面的概述。本文首次全面介绍了各种 PLA 方案中的信号处理方法,并将现有方法分为基于模型的方案和基于机器学习 (ML) 的方案。我们讨论了 PLA 方案信号处理的动机和关键问题。附录第 3 部分讨论了 PLA 的应用、挑战和未来研究方向,该部分可在在线补充材料中找到。
{"title":"A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches","authors":"Zhifan Lai, Zikai Chang, Mingrui Sha, Qihong Zhang, Ning Xie, Changsheng Chen, Dusit (Tao) Niyato","doi":"10.1145/3708496","DOIUrl":"https://doi.org/10.1145/3708496","url":null,"abstract":"The open and broadcast nature of wireless mediums introduces significant security vulnerabilities, making authentication a critical concern in wireless networks. In recent years, Physical-Layer Authentication (PLA) techniques have garnered considerable research interest due to their advantages over Upper-Layer Authentication (ULA) methods, such as lower complexity, enhanced security, and greater compatibility. The application of signal processing techniques in PLA serves as a crucial link between the extraction of Physical-Layer Features (PLFs) and the authentication of received signals. Different signal processing approaches, even with the same PLF, can result in varying authentication performances and computational demands. Despite this, there remains a shortage of comprehensive overviews on state-of-the-art PLA schemes with a focus on signal processing approaches. This paper presents the first thorough survey of signal processing in various PLA schemes, categorizing existing approaches into model-based and Machine Learning (ML)-based schemes. We discuss motivation and address key issues in signal processing for PLA schemes. The applications, challenges, and future research directions of PLA are discussed in Part 3 of the Appendix, which can be found in supplementary materials online.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"11 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142832040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Machine Learning in Edge Computing: Challenges, Solutions and Future Directions 边缘计算中的分布式机器学习:挑战、解决方案和未来方向
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-13 DOI: 10.1145/3708495
Jingke Tu, Lei Yang, Jiannong Cao
Distributed machine learning on edges is widely used in intelligent transportation, smart home, industrial manufacturing, and underground pipe network monitoring to achieve low latency and real time data processing and prediction. However, the presence of a large number of sensing and edge devices with limited computing, storage, and communication capabilities prevents the deployment of huge machine learning models and hinders its application. At the same time, although distributed machine learning on edges forms an emerging and rapidly growing research area, there has not been a systematic survey on this topic. The article begins by detailing the challenges of distributed machine learning in edge environments, such as limited node resources, data heterogeneity, privacy, security issues, and summarizes common metrics for model optimization. We then present a detailed analysis of parallelism patterns, distributed architectures, and model communication and aggregation schemes in edge computing. we subsequently present a comprehensive classification and intensive description of node resource-constrained processing, heterogeneous data processing, attacks and protection of privacy. The article ends by summarizing the applications of distributed machine learning in edge computing and presenting problems and challenges for further research.
边缘上的分布式机器学习广泛应用于智能交通、智能家居、工业制造、地下管网监控等领域,实现低延迟、实时的数据处理和预测。然而,大量计算、存储和通信能力有限的传感和边缘设备的存在阻碍了大型机器学习模型的部署,并阻碍了其应用。与此同时,尽管边缘上的分布式机器学习是一个新兴且快速发展的研究领域,但目前还没有对这一主题进行系统的调查。本文首先详细介绍了边缘环境中分布式机器学习的挑战,例如有限的节点资源、数据异构、隐私和安全问题,并总结了用于模型优化的常用指标。然后,我们详细分析了并行模式、分布式架构以及边缘计算中的模型通信和聚合方案。随后,我们对节点资源约束处理、异构数据处理、攻击和隐私保护进行了全面的分类和深入的描述。文章最后总结了分布式机器学习在边缘计算中的应用,并提出了进一步研究的问题和挑战。
{"title":"Distributed Machine Learning in Edge Computing: Challenges, Solutions and Future Directions","authors":"Jingke Tu, Lei Yang, Jiannong Cao","doi":"10.1145/3708495","DOIUrl":"https://doi.org/10.1145/3708495","url":null,"abstract":"Distributed machine learning on edges is widely used in intelligent transportation, smart home, industrial manufacturing, and underground pipe network monitoring to achieve low latency and real time data processing and prediction. However, the presence of a large number of sensing and edge devices with limited computing, storage, and communication capabilities prevents the deployment of huge machine learning models and hinders its application. At the same time, although distributed machine learning on edges forms an emerging and rapidly growing research area, there has not been a systematic survey on this topic. The article begins by detailing the challenges of distributed machine learning in edge environments, such as limited node resources, data heterogeneity, privacy, security issues, and summarizes common metrics for model optimization. We then present a detailed analysis of parallelism patterns, distributed architectures, and model communication and aggregation schemes in edge computing. we subsequently present a comprehensive classification and intensive description of node resource-constrained processing, heterogeneous data processing, attacks and protection of privacy. The article ends by summarizing the applications of distributed machine learning in edge computing and presenting problems and challenges for further research.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"3 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142820634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges 网络边缘隐私保护缓存研究:分类、解决方案和挑战
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-10 DOI: 10.1145/3706630
Xianzhi Zhang, Yipeng Zhou, Di Wu, Quan Z. Sheng, Shazia Riaz, Miao Hu, Linchang Xiao
Caching content at the edge network is a popular and effective technique widely deployed to alleviate the burden of network backhaul, shorten service delay and improve service quality. However, there has been some controversy over privacy violations in caching content at the edge network. On the one hand, the multi-access open edge network provides an ideal entrance or interface for external attackers to obtain private data from edge caches by extracting sensitive information. On the other hand, privacy can be infringed on by curious edge caching providers through caching trace analysis targeting the achievement of better caching performance or higher profits. Therefore, an in-depth understanding of privacy issues in edge caching networks is vital and indispensable for creating a privacy-preserving caching service at the edge network. In this article, we are among the first to fill this gap by examining privacy-preserving techniques for caching content at the edge network. Firstly, we provide an introduction to the background of privacy-preserving edge caching (PPEC). Next, we summarize the key privacy issues and present a taxonomy for caching at the edge network from the perspective of private information. Additionally, we conduct a retrospective review of the state-of-the-art countermeasures against privacy leakage from content caching at the edge network. Finally, we conclude the survey and envision challenges for future research.
边缘网络内容缓存技术是一种广泛应用的有效技术,可以减轻网络回程负担,缩短业务延迟,提高业务质量。然而,在边缘网络中缓存内容侵犯隐私的问题上存在一些争议。一方面,多访问开放边缘网络为外部攻击者通过提取敏感信息从边缘缓存中获取私有数据提供了理想的入口或接口。另一方面,好奇的边缘缓存提供商可能会通过缓存跟踪分析来侵犯隐私,目的是实现更好的缓存性能或更高的利润。因此,深入了解边缘缓存网络中的隐私问题对于在边缘网络中创建保护隐私的缓存服务至关重要。在本文中,我们将通过研究在边缘网络中缓存内容的隐私保护技术来填补这一空白。首先,我们介绍了隐私保护边缘缓存(PPEC)的背景。接下来,我们总结了关键的隐私问题,并从隐私信息的角度提出了边缘网络缓存的分类。此外,我们对防止边缘网络中内容缓存的隐私泄露的最新对策进行了回顾性审查。最后,我们总结了调查并展望了未来研究的挑战。
{"title":"A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges","authors":"Xianzhi Zhang, Yipeng Zhou, Di Wu, Quan Z. Sheng, Shazia Riaz, Miao Hu, Linchang Xiao","doi":"10.1145/3706630","DOIUrl":"https://doi.org/10.1145/3706630","url":null,"abstract":"Caching content at the edge network is a popular and effective technique widely deployed to alleviate the burden of network backhaul, shorten service delay and improve service quality. However, there has been some controversy over privacy violations in caching content at the edge network. On the one hand, the multi-access open edge network provides an ideal entrance or interface for external attackers to obtain private data from edge caches by extracting sensitive information. On the other hand, privacy can be infringed on by curious edge caching providers through caching trace analysis targeting the achievement of better caching performance or higher profits. Therefore, an in-depth understanding of privacy issues in edge caching networks is vital and indispensable for creating a privacy-preserving caching service at the edge network. In this article, we are among the first to fill this gap by examining privacy-preserving techniques for caching content at the edge network. Firstly, we provide an introduction to the background of privacy-preserving edge caching (PPEC). Next, we summarize the key privacy issues and present a taxonomy for caching at the edge network from the perspective of private information. Additionally, we conduct a retrospective review of the state-of-the-art countermeasures against privacy leakage from content caching at the edge network. Finally, we conclude the survey and envision challenges for future research.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"19 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142804572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Advances of Foundation Language Models-based Continual Learning: A Survey 基于基础语言模型的持续学习研究进展综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-09 DOI: 10.1145/3705725
Yutao Yang, Jie Zhou, Xuanwen Ding, Tianyu Huai, Shunyu Liu, Qin Chen, Yuan Xie, Liang He
Recently, foundation language models (LMs) have marked significant achievements in the domains of natural language processing (NLP) and computer vision (CV). Unlike traditional neural network models, foundation LMs obtain a great ability for transfer learning by acquiring rich commonsense knowledge through pre-training on extensive unsupervised datasets with a vast number of parameters. Despite these capabilities, LMs still struggle with catastrophic forgetting, hindering their ability to learn continuously like humans. To address this, continual learning (CL) methodologies have been introduced, allowing LMs to adapt to new tasks while retaining learned knowledge. However, a systematic taxonomy of existing approaches and a comparison of their performance are still lacking. In this paper, we delve into a comprehensive review, summarization, and classification of the existing literature on CL-based approaches applied to foundation language models, such as pre-trained language models (PLMs), large language models (LLMs) and vision-language models (VLMs). We divide these studies into offline and online CL, which consist of traditional methods, parameter-efficient-based methods, instruction tuning-based methods and continual pre-training methods. Additionally, we outline the typical datasets and metrics employed in CL research and provide a detailed analysis of the challenges and future work for LMs-based continual learning.
近年来,基础语言模型(LMs)在自然语言处理(NLP)和计算机视觉(CV)领域取得了显著成就。与传统的神经网络模型不同,基础LMs通过对具有大量参数的广泛无监督数据集进行预训练,获得丰富的常见性知识,从而获得了很强的迁移学习能力。尽管有这些能力,LMs仍然与灾难性遗忘作斗争,阻碍了它们像人类一样持续学习的能力。为了解决这个问题,引入了持续学习(CL)方法,允许LMs在保留所学知识的同时适应新的任务。然而,对现有方法的系统分类和对其性能的比较仍然缺乏。在本文中,我们深入研究了应用于基础语言模型(如预训练语言模型(PLMs)、大型语言模型(LLMs)和视觉语言模型(VLMs)的基于cl的方法的现有文献,进行了全面的回顾、总结和分类。我们将这些研究分为离线CL和在线CL,包括传统方法、基于参数效率的方法、基于指令调优的方法和持续预训练方法。此外,我们概述了CL研究中使用的典型数据集和指标,并详细分析了基于lms的持续学习面临的挑战和未来的工作。
{"title":"Recent Advances of Foundation Language Models-based Continual Learning: A Survey","authors":"Yutao Yang, Jie Zhou, Xuanwen Ding, Tianyu Huai, Shunyu Liu, Qin Chen, Yuan Xie, Liang He","doi":"10.1145/3705725","DOIUrl":"https://doi.org/10.1145/3705725","url":null,"abstract":"Recently, foundation language models (LMs) have marked significant achievements in the domains of natural language processing (NLP) and computer vision (CV). Unlike traditional neural network models, foundation LMs obtain a great ability for transfer learning by acquiring rich commonsense knowledge through pre-training on extensive unsupervised datasets with a vast number of parameters. Despite these capabilities, LMs still struggle with catastrophic forgetting, hindering their ability to learn continuously like humans. To address this, continual learning (CL) methodologies have been introduced, allowing LMs to adapt to new tasks while retaining learned knowledge. However, a systematic taxonomy of existing approaches and a comparison of their performance are still lacking. In this paper, we delve into a comprehensive review, summarization, and classification of the existing literature on CL-based approaches applied to foundation language models, such as pre-trained language models (PLMs), large language models (LLMs) and vision-language models (VLMs). We divide these studies into offline and online CL, which consist of traditional methods, parameter-efficient-based methods, instruction tuning-based methods and continual pre-training methods. Additionally, we outline the typical datasets and metrics employed in CL research and provide a detailed analysis of the challenges and future work for LMs-based continual learning.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"27 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142797158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1