首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
LiDAR-Based Place Recognition For Autonomous Driving: A Survey 基于激光雷达的自动驾驶位置识别研究进展
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-05 DOI: 10.1145/3707446
Yongjun Zhang, Pengcheng Shi, Jiayuan Li
LiDAR has gained popularity in autonomous driving due to advantages like long measurement distance, rich 3D information, and stability in harsh environments. Place Recognition (PR) enables vehicles to identify previously visited locations despite variations in appearance, weather, and viewpoints, even determining their global location within prior maps. This capability is crucial for accurate localization in autonomous driving. Consequently, LiDAR-based Place Recognition (LPR) has emerged as a research hotspot in robotics. However, existing reviews predominantly concentrate on Visual Place Recognition (VPR), leaving a gap in systematic reviews on LPR. This paper bridges this gap by providing a comprehensive review of LPR methods, thus facilitating and encouraging further research. We commence by exploring the relationship between PR and autonomous driving components. Then, we delve into the problem formulation of LPR, challenges, and relations to previous surveys. Subsequently, we conduct an in-depth review of related research, which offers detailed classifications, strengths and weaknesses, and architectures. Finally, we summarize existing datasets and evaluation metrics and envision promising future directions. This paper can serve as a valuable tutorial for newcomers entering the field of place recognition. We plan to maintain an up-to-date project on https://github.com/ShiPC-AI/LPR-Survey.
激光雷达由于测量距离远、3D信息丰富、恶劣环境下的稳定性等优点,在自动驾驶领域得到了广泛的应用。位置识别(PR)使车辆能够识别以前访问过的位置,尽管外观、天气和视点存在变化,甚至可以在先前的地图中确定其全球位置。这种能力对于自动驾驶的精确定位至关重要。因此,基于激光雷达的位置识别(LPR)已成为机器人领域的研究热点。然而,现有的研究主要集中在视觉位置识别(VPR)方面,对视觉位置识别的系统研究还存在空白。本文通过提供LPR方法的全面回顾来弥补这一差距,从而促进和鼓励进一步的研究。我们首先探讨公关与自动驾驶组件之间的关系。然后,我们深入研究了LPR的问题表述、挑战以及与以往调查的关系。随后,我们对相关研究进行了深入的回顾,提供了详细的分类、优缺点和架构。最后,我们总结了现有的数据集和评估指标,并展望了未来的发展方向。本文可以为进入位置识别领域的新手提供有价值的指导。我们计划在https://github.com/ShiPC-AI/LPR-Survey上维护一个最新的项目。
{"title":"LiDAR-Based Place Recognition For Autonomous Driving: A Survey","authors":"Yongjun Zhang, Pengcheng Shi, Jiayuan Li","doi":"10.1145/3707446","DOIUrl":"https://doi.org/10.1145/3707446","url":null,"abstract":"LiDAR has gained popularity in autonomous driving due to advantages like long measurement distance, rich 3D information, and stability in harsh environments. Place Recognition (PR) enables vehicles to identify previously visited locations despite variations in appearance, weather, and viewpoints, even determining their global location within prior maps. This capability is crucial for accurate localization in autonomous driving. Consequently, LiDAR-based Place Recognition (LPR) has emerged as a research hotspot in robotics. However, existing reviews predominantly concentrate on Visual Place Recognition (VPR), leaving a gap in systematic reviews on LPR. This paper bridges this gap by providing a comprehensive review of LPR methods, thus facilitating and encouraging further research. We commence by exploring the relationship between PR and autonomous driving components. Then, we delve into the problem formulation of LPR, challenges, and relations to previous surveys. Subsequently, we conduct an in-depth review of related research, which offers detailed classifications, strengths and weaknesses, and architectures. Finally, we summarize existing datasets and evaluation metrics and envision promising future directions. This paper can serve as a valuable tutorial for newcomers entering the field of place recognition. We plan to maintain an up-to-date project on https://github.com/ShiPC-AI/LPR-Survey.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"19 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142782797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review 无线传感器网络的安全挑战、缓解策略和未来趋势综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-02 DOI: 10.1145/3706583
Ahmet Oztoprak, Reza Hassanpour, Aysegul Ozkan, Kasim Oztoprak
Wireless Sensor Networks (WSNs) represent an innovative technology that integrates compact, energy-efficient sensors with wireless communication functionalities, facilitating instantaneous surveillance and data gathering from the surrounding environment. WSNs are utilized across diverse domains, such as environmental monitoring, industrial automation, healthcare, smart agriculture, home automation, and beyond. Due to the inherent characteristics of WSNs they face many security challenges ranging from resource-based attacks, such as energy depletion or computational overload, to eavesdropping, interception, and tampering. Moreover, the dynamic and often ad-hoc deployment of sensors in varying environments increases their vulnerability to physical intrusion attacks, the distributed and collaborative nature of WSNs raises concerns about data integrity, as compromised nodes can potentially propagate misleading or malicious information throughout the network. In this article, we categorize WSN attacks, identifying vulnerabilities and corresponding mitigation strategies. We also explore current research directions in WSN security, emphasizing the challenges in addressing these issues.
无线传感器网络(wsn)代表了一种创新技术,它将紧凑、节能的传感器与无线通信功能集成在一起,促进了对周围环境的即时监控和数据收集。无线传感器网络应用于各种领域,如环境监测、工业自动化、医疗保健、智能农业、家庭自动化等。由于无线传感器网络的固有特性,它们面临着许多安全挑战,从基于资源的攻击(如能量耗尽或计算过载)到窃听、拦截和篡改。此外,传感器在不同环境中的动态和经常临时部署增加了它们对物理入侵攻击的脆弱性,wsn的分布式和协作性质引起了对数据完整性的担忧,因为受损的节点可能会在整个网络中传播误导或恶意信息。在本文中,我们对WSN攻击进行分类,识别漏洞和相应的缓解策略。探讨了当前无线传感器网络安全的研究方向,强调了解决这些问题所面临的挑战。
{"title":"Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review","authors":"Ahmet Oztoprak, Reza Hassanpour, Aysegul Ozkan, Kasim Oztoprak","doi":"10.1145/3706583","DOIUrl":"https://doi.org/10.1145/3706583","url":null,"abstract":"Wireless Sensor Networks (WSNs) represent an innovative technology that integrates compact, energy-efficient sensors with wireless communication functionalities, facilitating instantaneous surveillance and data gathering from the surrounding environment. WSNs are utilized across diverse domains, such as environmental monitoring, industrial automation, healthcare, smart agriculture, home automation, and beyond. Due to the inherent characteristics of WSNs they face many security challenges ranging from resource-based attacks, such as energy depletion or computational overload, to eavesdropping, interception, and tampering. Moreover, the dynamic and often ad-hoc deployment of sensors in varying environments increases their vulnerability to physical intrusion attacks, the distributed and collaborative nature of WSNs raises concerns about data integrity, as compromised nodes can potentially propagate misleading or malicious information throughout the network. In this article, we categorize WSN attacks, identifying vulnerabilities and corresponding mitigation strategies. We also explore current research directions in WSN security, emphasizing the challenges in addressing these issues.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"12 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142758171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review of Enterprise Architecture Evaluation Methods 企业架构评估方法的系统文献综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-30 DOI: 10.1145/3706582
Norbert Rudolf Busch, Andrzej Zalewski
Enterprise Architecture (EA) is a systematic and holistic approach to designing and managing an organization's information systems components, aiding in optimizing resources, managing risk, and facilitating change. It weighs different architectural quality attributes against each other to achieve the most advantageous architecture. However, the evaluation of EA lacks a systematic approach. This study employs a Systematic Literature Review, analyzing, in detail, 109 articles carefully selected from 3644 papers published since 2005. The key outcome of the research reveals that a crucial factor for the extensive worldwide adoption of EA evaluation methods lies in the automation of the assessment and architecture modeling processes, particularly emphasizing the facet of data collection. The automation of EA evaluation will empower organizations to streamline their processes, make data-driven decisions, and respond more effectively to change, ultimately contributing to their competitiveness and long-term success in the global market. The study identifies diverse evaluation methods, determines evaluation criteria, examines the extent to which these methods have been verified in practice, and provides directions for further research and advancement.
企业架构(EA)是设计和管理组织的信息系统组件、帮助优化资源、管理风险和促进变更的系统和整体方法。它权衡不同的体系结构质量属性,以获得最有利的体系结构。然而,企业环境评估缺乏系统的方法。本研究采用系统文献综述法,从2005年以来发表的3644篇论文中精选109篇进行详细分析。研究的主要结果表明,EA评估方法在世界范围内广泛采用的一个关键因素在于评估和体系结构建模过程的自动化,特别是强调数据收集方面。EA评估的自动化将使组织能够简化他们的过程,做出数据驱动的决策,并更有效地响应变化,最终有助于他们在全球市场上的竞争力和长期成功。本研究确定了多种评价方法,确定了评价标准,考察了这些方法在实践中的验证程度,并为进一步的研究和推进提供了方向。
{"title":"A Systematic Literature Review of Enterprise Architecture Evaluation Methods","authors":"Norbert Rudolf Busch, Andrzej Zalewski","doi":"10.1145/3706582","DOIUrl":"https://doi.org/10.1145/3706582","url":null,"abstract":"Enterprise Architecture (EA) is a systematic and holistic approach to designing and managing an organization's information systems components, aiding in optimizing resources, managing risk, and facilitating change. It weighs different architectural quality attributes against each other to achieve the most advantageous architecture. However, the evaluation of EA lacks a systematic approach. This study employs a Systematic Literature Review, analyzing, in detail, 109 articles carefully selected from 3644 papers published since 2005. The key outcome of the research reveals that a crucial factor for the extensive worldwide adoption of EA evaluation methods lies in the automation of the assessment and architecture modeling processes, particularly emphasizing the facet of data collection. The automation of EA evaluation will empower organizations to streamline their processes, make data-driven decisions, and respond more effectively to change, ultimately contributing to their competitiveness and long-term success in the global market. The study identifies diverse evaluation methods, determines evaluation criteria, examines the extent to which these methods have been verified in practice, and provides directions for further research and advancement.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"46 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142756117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object Selection and Manipulation in VR Headsets: Research Challenges, Solutions, and Success Measurements VR头显中的对象选择和操作:研究挑战,解决方案和成功测量
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-30 DOI: 10.1145/3706417
Difeng Yu, Tilman Dingler, Eduardo Velloso, Jorge Goncalves
Object selection and manipulation are the foundation of VR interactions. With the rapid development of VR technology and the field of virtual object selection and manipulation, the literature demands a structured understanding of the core research challenges and a critical reflection of the current practices. To provide such understanding and reflections, we systematically reviewed 106 papers. We identified classic and emerging topics, categorized existing solutions, and evaluated how success was measured in these publications. Based on our analysis, we discuss future research directions and propose a framework for developing and determining appropriate solutions for different application scenarios.
对象选择和操作是VR交互的基础。随着虚拟现实技术和虚拟对象选择和操作领域的快速发展,文献要求对核心研究挑战进行结构化理解,并对当前实践进行批判性反思。为了提供这样的理解和思考,我们系统地回顾了106篇论文。我们确定了经典和新兴的主题,对现有的解决方案进行了分类,并评估了如何在这些出版物中衡量成功。在此基础上,我们讨论了未来的研究方向,并提出了针对不同应用场景开发和确定合适解决方案的框架。
{"title":"Object Selection and Manipulation in VR Headsets: Research Challenges, Solutions, and Success Measurements","authors":"Difeng Yu, Tilman Dingler, Eduardo Velloso, Jorge Goncalves","doi":"10.1145/3706417","DOIUrl":"https://doi.org/10.1145/3706417","url":null,"abstract":"Object selection and manipulation are the foundation of VR interactions. With the rapid development of VR technology and the field of virtual object selection and manipulation, the literature demands a structured understanding of the core research challenges and a critical reflection of the current practices. To provide such understanding and reflections, we systematically reviewed 106 papers. We identified classic and emerging topics, categorized existing solutions, and evaluated how success was measured in these publications. Based on our analysis, we discuss future research directions and propose a framework for developing and determining appropriate solutions for different application scenarios.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"259 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142752989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks 当SDN遇到低速率威胁:可编程网络中的攻击与对策综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-30 DOI: 10.1145/3704434
Dan Tang, Rui Dai, Yudong Yan, Keqin Li, Wei Liang, Zheng Qin
Low-rate threats are a class of attack vectors that are disruptive and stealthy, typically crafted for security vulnerabilities. They have been the significant concern for cyber security, impacting both conventional IP-based networks and emerging Software-Defined Networking (SDN). SDN is a revolutionary architecture that separates the control and data planes, offering advantages such as enhanced manageability, flexibility, and network programmability, as well as the ability to introduce new solutions to address security threats. However, its innovative design also poses new vulnerabilities and threats, especially susceptibility to low-rate threats. To this end, this paper presents a comprehensive overview of low-rate threats in programmable networks. It explores low-rate threats and countermeasures within the SDN architecture, encompassing the data plane, control plane, control channel, and application plane, together with traditional low-rate threats and countermeasures in SDN. Furthermore, the paper offers detailed insight into threats and countermeasures against low-rate attacks exploiting SDN vulnerabilities and low-rate attacks related to Programmable Data Plane (PDP). Additionally, it presents a comparative analysis and discussion of low-rate attacks versus high-volume attacks, along with suggestions for enhancing SDN security. This thorough review aims to assist researchers in developing more resilient and dependable countermeasures against low-rate threats in programmable networks.
低速率威胁是一类具有破坏性和隐蔽性的攻击媒介,通常是针对安全漏洞设计的。它们一直是网络安全的重要关注点,影响着传统的基于ip的网络和新兴的软件定义网络(SDN)。SDN是一种革命性的架构,它将控制平面和数据平面分开,提供了诸如增强的可管理性、灵活性和网络可编程性等优势,以及引入新解决方案以应对安全威胁的能力。然而,它的创新设计也带来了新的漏洞和威胁,特别是对低速率威胁的敏感性。为此,本文对可编程网络中的低速率威胁进行了全面概述。探讨SDN架构下的低速率威胁与对策,包括数据平面、控制平面、控制通道和应用平面,以及SDN中传统的低速率威胁与对策。此外,本文还提供了针对利用SDN漏洞的低速率攻击和与可编程数据平面(PDP)相关的低速率攻击的威胁和对策的详细见解。此外,本文还对低速率攻击和大容量攻击进行了对比分析和讨论,并提出了增强SDN安全性的建议。这篇全面的综述旨在帮助研究人员在可编程网络中开发更有弹性和可靠的对抗低速率威胁的对策。
{"title":"When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks","authors":"Dan Tang, Rui Dai, Yudong Yan, Keqin Li, Wei Liang, Zheng Qin","doi":"10.1145/3704434","DOIUrl":"https://doi.org/10.1145/3704434","url":null,"abstract":"Low-rate threats are a class of attack vectors that are disruptive and stealthy, typically crafted for security vulnerabilities. They have been the significant concern for cyber security, impacting both conventional IP-based networks and emerging Software-Defined Networking (SDN). SDN is a revolutionary architecture that separates the control and data planes, offering advantages such as enhanced manageability, flexibility, and network programmability, as well as the ability to introduce new solutions to address security threats. However, its innovative design also poses new vulnerabilities and threats, especially susceptibility to low-rate threats. To this end, this paper presents a comprehensive overview of low-rate threats in programmable networks. It explores low-rate threats and countermeasures within the SDN architecture, encompassing the data plane, control plane, control channel, and application plane, together with traditional low-rate threats and countermeasures in SDN. Furthermore, the paper offers detailed insight into threats and countermeasures against low-rate attacks exploiting SDN vulnerabilities and low-rate attacks related to Programmable Data Plane (PDP). Additionally, it presents a comparative analysis and discussion of low-rate attacks versus high-volume attacks, along with suggestions for enhancing SDN security. This thorough review aims to assist researchers in developing more resilient and dependable countermeasures against low-rate threats in programmable networks.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"11 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142756107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Authentication Protocols: Challenges, and Comparative Analysis 物联网认证协议:挑战和比较分析
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-30 DOI: 10.1145/3703444
Amar Alsheavi, Ammar Hawbani, Wajdy Othman, XINGFU WANG, Gamil Qaid, Liang Zhao, Ahmed Al-Dubai, Liu Zhi, A.S. Ismail, Rutvij Jhaveri, Saeed Alsamhi, Mohammed A. A. Al-qaness
In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a subject of intricate security challenges spawned by its multifaceted manifestations. Central to securing IoT infrastructures is the crucial aspect of authentication, necessitating a comprehensive examination of its nuances, including benefits, challenges, opportunities, trends, and societal implications. In this paper, we thoroughly review the IoT authentication protocols, addressing the main challenges such as privacy protection, scalability, and human factors that may impact security. Through exacting analysis, we evaluate the strengths and weaknesses of existing authentication protocols and conduct a comparative performance analysis to evaluate their effectiveness and scalability in securing IoT environments and devices. At the end of this study, we summarize the main findings and suggest ways to improve the security of IoT devices in the future.
在不断发展的信息技术领域,物联网(IoT)是连接物理世界和数字世界的突破性概念。它是日益复杂的互动环境的支柱,但由于其多方面的表现,它也是一个复杂的安全挑战的主题。保护物联网基础设施的核心是身份验证的关键方面,需要全面检查其细微差别,包括好处、挑战、机遇、趋势和社会影响。在本文中,我们全面回顾了物联网认证协议,解决了隐私保护、可扩展性和可能影响安全性的人为因素等主要挑战。通过严格的分析,我们评估了现有认证协议的优点和缺点,并进行了比较性能分析,以评估其在保护物联网环境和设备方面的有效性和可扩展性。在本研究的最后,我们总结了主要发现,并提出了未来提高物联网设备安全性的方法。
{"title":"IoT Authentication Protocols: Challenges, and Comparative Analysis","authors":"Amar Alsheavi, Ammar Hawbani, Wajdy Othman, XINGFU WANG, Gamil Qaid, Liang Zhao, Ahmed Al-Dubai, Liu Zhi, A.S. Ismail, Rutvij Jhaveri, Saeed Alsamhi, Mohammed A. A. Al-qaness","doi":"10.1145/3703444","DOIUrl":"https://doi.org/10.1145/3703444","url":null,"abstract":"In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a subject of intricate security challenges spawned by its multifaceted manifestations. Central to securing IoT infrastructures is the crucial aspect of authentication, necessitating a comprehensive examination of its nuances, including benefits, challenges, opportunities, trends, and societal implications. In this paper, we thoroughly review the IoT authentication protocols, addressing the main challenges such as privacy protection, scalability, and human factors that may impact security. Through exacting analysis, we evaluate the strengths and weaknesses of existing authentication protocols and conduct a comparative performance analysis to evaluate their effectiveness and scalability in securing IoT environments and devices. At the end of this study, we summarize the main findings and suggest ways to improve the security of IoT devices in the future.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"17 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142756116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource-efficient Algorithms and Systems of Foundation Models: A Survey 资源效率算法和基础模型系统:综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-29 DOI: 10.1145/3706418
Mengwei Xu, Dongqi Cai, Wangsong Yin, Shangguang Wang, Xin Jin, Xuanzhe Liu
Large foundation models, including large language models, vision transformers, diffusion, and LLM-based multimodal models, are revolutionizing the entire machine learning lifecycle, from training to deployment. However, the substantial advancements in versatility and performance these models offer come at a significant cost in terms of hardware resources. To support the growth of these large models in a scalable and environmentally sustainable way, there has been a considerable focus on developing resource-efficient strategies. This survey delves into the critical importance of such research, examining both algorithmic and systemic aspects. It offers a comprehensive analysis and valuable insights gleaned from existing literature, encompassing a broad array of topics from cutting-edge model architectures and training/serving algorithms to practical system designs and implementations. The goal of this survey is to provide an overarching understanding of how current approaches are tackling the resource challenges posed by large foundation models and to potentially inspire future breakthroughs in this field.
大型基础模型,包括大型语言模型、视觉转换、扩散和基于llm的多模态模型,正在彻底改变整个机器学习生命周期,从训练到部署。然而,这些模型在多功能性和性能方面的巨大进步是以硬件资源方面的巨大成本为代价的。为了以可扩展和环境可持续的方式支持这些大型模型的增长,开发资源节约型战略受到了相当大的关注。本调查深入研究了此类研究的关键重要性,检查了算法和系统方面。它提供了从现有文献中收集的全面分析和有价值的见解,涵盖了从前沿模型架构和培训/服务算法到实际系统设计和实现的广泛主题。本调查的目的是提供一个总体的理解,当前的方法是如何解决大型基础模型带来的资源挑战的,并有可能激发该领域未来的突破。
{"title":"Resource-efficient Algorithms and Systems of Foundation Models: A Survey","authors":"Mengwei Xu, Dongqi Cai, Wangsong Yin, Shangguang Wang, Xin Jin, Xuanzhe Liu","doi":"10.1145/3706418","DOIUrl":"https://doi.org/10.1145/3706418","url":null,"abstract":"Large foundation models, including large language models, vision transformers, diffusion, and LLM-based multimodal models, are revolutionizing the entire machine learning lifecycle, from training to deployment. However, the substantial advancements in versatility and performance these models offer come at a significant cost in terms of hardware resources. To support the growth of these large models in a scalable and environmentally sustainable way, there has been a considerable focus on developing resource-efficient strategies. This survey delves into the critical importance of such research, examining both algorithmic and systemic aspects. It offers a comprehensive analysis and valuable insights gleaned from existing literature, encompassing a broad array of topics from cutting-edge model architectures and training/serving algorithms to practical system designs and implementations. The goal of this survey is to provide an overarching understanding of how current approaches are tackling the resource challenges posed by large foundation models and to potentially inspire future breakthroughs in this field.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"84 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142752990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: Access Control Policy Generation from High-level Natural Language Requirements 从高级自然语言需求生成访问控制策略
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-28 DOI: 10.1145/3706057
Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello
Administrator-centered access control failures can cause data breaches, putting organizations at risk of financial loss and reputation damage. Existing graphical policy configuration tools and automated policy generation frameworks attempt to help administrators configure and generate access control policies by avoiding such failures. However, graphical policy configuration tools are prone to human errors, making them unusable. On the other hand, automated policy generation frameworks are prone to erroneous predictions, making them unreliable. Therefore, to find ways to improve their usability and reliability, we conducted a Systematic Literature Review analyzing 49 publications. The thematic analysis of the publications revealed that graphical policy configuration tools are developed to write and visualize policies manually. Moreover, automated policy generation frameworks are developed using machine learning (ML) and natural language processing (NLP) techniques to automatically generate access control policies from high-level requirement specifications. Despite their utility in the access control domain, limitations of these tools, such as the lack of flexibility, and limitations of frameworks, such as the lack of domain adaptation, negatively affect their usability and reliability, respectively. Our study offers recommendations to address these limitations through real-world applications and recent advancements in the NLP domain, paving the way for future research.
以管理员为中心的访问控制失败可能导致数据泄露,使组织面临财务损失和声誉受损的风险。现有的图形策略配置工具和自动策略生成框架试图通过避免此类故障来帮助管理员配置和生成访问控制策略。但是,图形化策略配置工具容易出现人为错误,使其无法使用。另一方面,自动化策略生成框架容易产生错误的预测,使其不可靠。因此,为了寻找提高其可用性和可靠性的方法,我们对49篇文献进行了系统的文献回顾分析。对出版物的专题分析显示,开发了图形化策略配置工具来手动编写和可视化策略。此外,使用机器学习(ML)和自然语言处理(NLP)技术开发了自动策略生成框架,以从高级需求规范自动生成访问控制策略。尽管这些工具在访问控制领域很有用,但它们的局限性,如缺乏灵活性,以及框架的局限性,如缺乏领域适应性,分别对它们的可用性和可靠性产生了负面影响。我们的研究通过实际应用和NLP领域的最新进展提出了解决这些限制的建议,为未来的研究铺平了道路。
{"title":"SoK: Access Control Policy Generation from High-level Natural Language Requirements","authors":"Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello","doi":"10.1145/3706057","DOIUrl":"https://doi.org/10.1145/3706057","url":null,"abstract":"Administrator-centered access control failures can cause data breaches, putting organizations at risk of financial loss and reputation damage. Existing graphical policy configuration tools and automated policy generation frameworks attempt to help administrators configure and generate access control policies by avoiding such failures. However, graphical policy configuration tools are prone to human errors, making them unusable. On the other hand, automated policy generation frameworks are prone to erroneous predictions, making them unreliable. Therefore, to find ways to improve their usability and reliability, we conducted a Systematic Literature Review analyzing 49 publications. The thematic analysis of the publications revealed that graphical policy configuration tools are developed to write and visualize policies manually. Moreover, automated policy generation frameworks are developed using machine learning (ML) and natural language processing (NLP) techniques to automatically generate access control policies from high-level requirement specifications. Despite their utility in the access control domain, limitations of these tools, such as the lack of flexibility, and limitations of frameworks, such as the lack of domain adaptation, negatively affect their usability and reliability, respectively. Our study offers recommendations to address these limitations through real-world applications and recent advancements in the NLP domain, paving the way for future research.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"14 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142742597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-powered Fraud Detection in Decentralized Finance: A Project Life Cycle Perspective 去中心化金融中的人工智能欺诈检测:项目生命周期视角
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-25 DOI: 10.1145/3705296
Bingqiao Luo, Zhen Zhang, Qian Wang, Anli Ke, Shengliang Lu, Bingsheng He
Decentralized finance (DeFi) represents a novel financial system but faces significant fraud challenges, leading to substantial losses. Recent advancements in artificial intelligence (AI) show potential for complex fraud detection. Despite growing interest, a systematic review of these methods is lacking. This survey correlates fraud types with DeFi project stages, presenting a taxonomy based on the project life cycle. We evaluate AI techniques, revealing notable findings such as the superiority of tree-based and graph-related models. Based on these insights, we offer recommendations and outline future research directions to aid researchers, practitioners, and regulators in enhancing DeFi security.
去中心化金融(DeFi)是一种新颖的金融系统,但也面临着巨大的欺诈挑战,导致大量损失。人工智能(AI)的最新进展显示了复杂欺诈检测的潜力。尽管人们对这些方法的兴趣与日俱增,但却缺乏对这些方法的系统回顾。本调查将欺诈类型与 DeFi 项目阶段相关联,提出了基于项目生命周期的分类法。我们对人工智能技术进行了评估,发现了基于树的模型和图相关模型的优越性等显著发现。基于这些见解,我们提出了建议并概述了未来的研究方向,以帮助研究人员、从业人员和监管机构提高 DeFi 的安全性。
{"title":"AI-powered Fraud Detection in Decentralized Finance: A Project Life Cycle Perspective","authors":"Bingqiao Luo, Zhen Zhang, Qian Wang, Anli Ke, Shengliang Lu, Bingsheng He","doi":"10.1145/3705296","DOIUrl":"https://doi.org/10.1145/3705296","url":null,"abstract":"Decentralized finance (DeFi) represents a novel financial system but faces significant fraud challenges, leading to substantial losses. Recent advancements in artificial intelligence (AI) show potential for complex fraud detection. Despite growing interest, a systematic review of these methods is lacking. This survey correlates fraud types with DeFi project stages, presenting a taxonomy based on the project life cycle. We evaluate AI techniques, revealing notable findings such as the superiority of tree-based and graph-related models. Based on these insights, we offer recommendations and outline future research directions to aid researchers, practitioners, and regulators in enhancing DeFi security.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"65 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wi-Fi Sensing Techniques for Human Activity Recognition: Brief Survey, Potential Challenges, and Research Directions 用于人类活动识别的 Wi-Fi 传感技术:简要调查、潜在挑战和研究方向
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-25 DOI: 10.1145/3705893
Fucheng Miao, Youxiang Huang, Zhiyi Lu, Tomoaki Ohtsuki, Guan Gui, Hikmet Sari
Recent advancements in wireless communication technologies have made Wi-Fi signals indispensable in both personal and professional settings. The utilization of these signals for Human Activity Recognition (HAR) has emerged as a cutting-edge technology. By leveraging the fluctuations in Wi-Fi signals for HAR, this approach offers enhanced privacy compared to traditional visual surveillance methods. The essence of this technique lies in detecting subtle changes when Wi-Fi signals interact with the human body, which are then captured and interpreted by advanced algorithms. This paper initially provides an overview of the key methodologies in HAR and the evolution of non-contact sensing, introducing sensor-based recognition, computer vision, and Wi-Fi signal-based approaches, respectively. It then explores tools for Wi-Fi-based HAR signal collection and lists several high-quality datasets. Subsequently, the paper reviews various sensing tasks enabled by Wi-Fi signal recognition, highlighting the application of deep learning networks in Wi-Fi signal detection. The fourth section presents experimental results that assess the capabilities of different networks. The findings indicate significant variability in the generalization capacities of neural networks and notable differences in test accuracy for various motion analyses.
无线通信技术的最新进展使 Wi-Fi 信号在个人和专业环境中都变得不可或缺。利用这些信号进行人类活动识别(HAR)已成为一项尖端技术。与传统的视觉监控方法相比,利用 Wi-Fi 信号的波动进行人类活动识别(HAR)可增强隐私性。这种技术的精髓在于检测 Wi-Fi 信号与人体相互作用时的微妙变化,然后通过先进的算法捕捉和解读这些变化。本文首先概述了 HAR 的主要方法和非接触式传感的发展,分别介绍了基于传感器的识别、计算机视觉和基于 Wi-Fi 信号的方法。然后,论文探讨了基于 Wi-Fi 的 HAR 信号采集工具,并列出了几个高质量的数据集。随后,论文回顾了通过 Wi-Fi 信号识别实现的各种传感任务,重点介绍了深度学习网络在 Wi-Fi 信号检测中的应用。第四部分介绍了评估不同网络能力的实验结果。研究结果表明,神经网络的泛化能力存在很大差异,各种运动分析的测试准确性也存在明显差异。
{"title":"Wi-Fi Sensing Techniques for Human Activity Recognition: Brief Survey, Potential Challenges, and Research Directions","authors":"Fucheng Miao, Youxiang Huang, Zhiyi Lu, Tomoaki Ohtsuki, Guan Gui, Hikmet Sari","doi":"10.1145/3705893","DOIUrl":"https://doi.org/10.1145/3705893","url":null,"abstract":"Recent advancements in wireless communication technologies have made Wi-Fi signals indispensable in both personal and professional settings. The utilization of these signals for Human Activity Recognition (HAR) has emerged as a cutting-edge technology. By leveraging the fluctuations in Wi-Fi signals for HAR, this approach offers enhanced privacy compared to traditional visual surveillance methods. The essence of this technique lies in detecting subtle changes when Wi-Fi signals interact with the human body, which are then captured and interpreted by advanced algorithms. This paper initially provides an overview of the key methodologies in HAR and the evolution of non-contact sensing, introducing sensor-based recognition, computer vision, and Wi-Fi signal-based approaches, respectively. It then explores tools for Wi-Fi-based HAR signal collection and lists several high-quality datasets. Subsequently, the paper reviews various sensing tasks enabled by Wi-Fi signal recognition, highlighting the application of deep learning networks in Wi-Fi signal detection. The fourth section presents experimental results that assess the capabilities of different networks. The findings indicate significant variability in the generalization capacities of neural networks and notable differences in test accuracy for various motion analyses.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"191 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142713368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1