首页 > 最新文献

ACM Computing Surveys最新文献

英文 中文
Continual Learning in Medical Imaging: A Survey and Practical Analysis 医学影像学的持续学习:调查与实践分析
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1145/3785663
Mohammad Areeb Qazi, Anees Ur Rehman Hashmi, Santosh Sanjeev, Ibrahim Almakky, Numan Saeed, Camila González, Mohammad Yaqub
Deep Learning has shown great success in reshaping medical imaging, yet it faces several challenges hindering widespread application. Distribution shifts in the continuously evolving data stream and catastrophic forgetting are two barriers that considerably increase the performance gap between research and applications. Continual Learning offers promise in addressing these hurdles by enabling the sequential acquisition of new knowledge without forgetting previous information. In this survey, we comprehensively review the recent literature on continual learning in the medical domain, highlight recent trends, and point out several practical issues. Specifically, we survey the continual learning studies on classification, segmentation, detection, and other related tasks in the medical domain and develop a taxonomy for the reviewed studies. We also critically discuss the current state of continual learning in medical imaging, including identifying open problems and outlining promising future directions. We hope that this survey provides researchers with a useful overview of the developments in the field and further increases engagement with this topic within the community. To keep up with the fast-paced advancements in the field, we will routinely update the repository with the latest relevant papers at https://github.com/BioMedIA-MBZUAI/awesome-cl-in-medical.
深度学习在重塑医学成像方面取得了巨大成功,但它面临着一些阻碍其广泛应用的挑战。不断发展的数据流中的分布变化和灾难性遗忘是大大增加研究和应用之间性能差距的两个障碍。持续学习为解决这些障碍提供了希望,它使人们能够在不忘记以前信息的情况下连续获取新知识。在这项调查中,我们全面回顾了医学领域持续学习的最新文献,突出了最近的趋势,并指出了几个实际问题。具体来说,我们调查了医学领域中关于分类、分割、检测和其他相关任务的持续学习研究,并为所审查的研究制定了分类。我们还批判性地讨论了医学成像中持续学习的现状,包括确定开放的问题和概述有希望的未来方向。我们希望这项调查能够为研究人员提供对该领域发展的有用概述,并进一步增加社区对该主题的参与。为了跟上该领域的快速发展,我们将定期在https://github.com/BioMedIA-MBZUAI/awesome-cl-in-medical上更新存储库中最新的相关论文。
{"title":"Continual Learning in Medical Imaging: A Survey and Practical Analysis","authors":"Mohammad Areeb Qazi, Anees Ur Rehman Hashmi, Santosh Sanjeev, Ibrahim Almakky, Numan Saeed, Camila González, Mohammad Yaqub","doi":"10.1145/3785663","DOIUrl":"https://doi.org/10.1145/3785663","url":null,"abstract":"Deep Learning has shown great success in reshaping medical imaging, yet it faces several challenges hindering widespread application. Distribution shifts in the continuously evolving data stream and catastrophic forgetting are two barriers that considerably increase the performance gap between research and applications. Continual Learning offers promise in addressing these hurdles by enabling the sequential acquisition of new knowledge without forgetting previous information. In this survey, we comprehensively review the recent literature on continual learning in the medical domain, highlight recent trends, and point out several practical issues. Specifically, we survey the continual learning studies on classification, segmentation, detection, and other related tasks in the medical domain and develop a taxonomy for the reviewed studies. We also critically discuss the current state of continual learning in medical imaging, including identifying open problems and outlining promising future directions. We hope that this survey provides researchers with a useful overview of the developments in the field and further increases engagement with this topic within the community. To keep up with the fast-paced advancements in the field, we will routinely update the repository with the latest relevant papers at https://github.com/BioMedIA-MBZUAI/awesome-cl-in-medical.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"7 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145770766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review: Zero-Watermarking Techniques Analysis for 3D Video Protection 三维视频保护中的零水印技术分析
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1145/3778748
Dalal Thair, Hala Abdulwahab, Fahad AL-Dhief, Nurhizam Safie
This systematic review provides a detailed analysis of zero-watermarking techniques specifically designed for the safeguarding of 3D video content, which is presented in this study, emphasizing the distinct difficulties and intricacies involved in ensuring the security of digital assets in this specialized field. The research systematically examines various zero-watermarking methodologies through a comprehensive review and comparative analysis, assessing their performance metrics, practical applications, and effectiveness in real-world scenarios. Through a thorough examination and comparative analysis, the study methodically evaluates different zero-watermarking approaches, analyzing their performance indicators, practical uses, and efficacy in real-world situations. The research also examines the incorporation of state-of-the-art technologies, such as Generative Adversarial Networks (GANs) and blockchain, which signify notable progress in the domain of digital watermarking. The aforementioned technologies highlight the necessity for more resilient, undetectable, and secure methods to maintain the authenticity and ownership of 3D video material. This research presented a series of answers to the most significant challenges encountered by previous studies, such as picture quality decline and resistance to geometric assaults. It also addressed the issue of 3D model damage. Ultimately contributing to the development of more sophisticated and reliable digital rights management strategies, the findings of this research emphasize the crucial role of zero watermarking enhanced by artificial intelligence in addressing the specific challenges associated with 3D video content protection.
本系统综述详细分析了专为保护3D视频内容而设计的零水印技术,强调了在这一专业领域确保数字资产安全所涉及的独特困难和复杂性。本研究通过全面回顾和比较分析,系统地研究了各种零水印方法,评估了它们的性能指标、实际应用和在现实世界场景中的有效性。通过深入的研究和比较分析,本研究系统地评估了不同的零水印方法,分析了它们的性能指标、实际用途和在现实世界中的有效性。该研究还探讨了最先进技术的结合,如生成对抗网络(gan)和区块链,这表明数字水印领域取得了显著进展。上述技术强调了更有弹性、不可检测和安全的方法来维护3D视频材料的真实性和所有权的必要性。这项研究提出了一系列先前研究遇到的最重大挑战的答案,例如图像质量下降和抵抗几何攻击。它还解决了3D模型损坏的问题。本研究的结果最终有助于开发更复杂、更可靠的数字版权管理策略,强调了通过人工智能增强的零水印在解决与3D视频内容保护相关的具体挑战方面的关键作用。
{"title":"A Systematic Review: Zero-Watermarking Techniques Analysis for 3D Video Protection","authors":"Dalal Thair, Hala Abdulwahab, Fahad AL-Dhief, Nurhizam Safie","doi":"10.1145/3778748","DOIUrl":"https://doi.org/10.1145/3778748","url":null,"abstract":"This systematic review provides a detailed analysis of zero-watermarking techniques specifically designed for the safeguarding of 3D video content, which is presented in this study, emphasizing the distinct difficulties and intricacies involved in ensuring the security of digital assets in this specialized field. The research systematically examines various zero-watermarking methodologies through a comprehensive review and comparative analysis, assessing their performance metrics, practical applications, and effectiveness in real-world scenarios. Through a thorough examination and comparative analysis, the study methodically evaluates different zero-watermarking approaches, analyzing their performance indicators, practical uses, and efficacy in real-world situations. The research also examines the incorporation of state-of-the-art technologies, such as Generative Adversarial Networks (GANs) and blockchain, which signify notable progress in the domain of digital watermarking. The aforementioned technologies highlight the necessity for more resilient, undetectable, and secure methods to maintain the authenticity and ownership of 3D video material. This research presented a series of answers to the most significant challenges encountered by previous studies, such as picture quality decline and resistance to geometric assaults. It also addressed the issue of 3D model damage. Ultimately contributing to the development of more sophisticated and reliable digital rights management strategies, the findings of this research emphasize the crucial role of zero watermarking enhanced by artificial intelligence in addressing the specific challenges associated with 3D video content protection.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"21 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145770763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Another Brick in the Wall: A Systematic Mapping Study Toward Defining Metaverse Engineering Through Socio-Technical Issues 墙上的另一块砖:通过社会技术问题定义元宇宙工程的系统映射研究
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1145/3785659
Dario Di Dario, Fabio Palomba, Carmine Gravino
Nowadays, virtual worlds are evolving into immersive metaverses , i.e., collective, shared virtual spaces that arise from the convergence of virtual reality (VR), augmented reality (AR), the internet, and additional digital technologies. These environments allow users to interact through avatars. While research has explored the technologies and social dynamics of the metaverse, two key limitations remain. First, there is no systematic overview of the expertise required to build metaverses and the key publication venues. Second, the socio-technical issues have not been fully synthesized or made instrumental for developing holistic design approaches that address both social and technical constraints. A deeper investigation is needed to guide future research, highlight challenges, and foster collaboration across disciplines. In this paper, we propose a systematic mapping study that addresses the limitations identified. From an initial pool of 2,323 sources, we identify 63 primary resources to (1) characterize the research community around metaverse and (2) elicit, synthesize, and categorize 19 social and 18 technical issues affecting the development of an effective metaverse. Based on our results, we contextualize the catalog of issues with respect to the current body of knowledge, providing insights and a research roadmap that transforms issues into actionable challenges in the scope of a novel, unified research asset coined “metaverse engineering” , i.e., the multidisciplinary discipline to identify processes and instruments to design socio-technical metaverses.
如今,虚拟世界正在演变成沉浸式元世界,即由虚拟现实(VR)、增强现实(AR)、互联网和其他数字技术融合而成的集体共享虚拟空间。这些环境允许用户通过虚拟形象进行交互。虽然研究已经探索了虚拟世界的技术和社会动态,但仍然存在两个关键限制。首先,对构建元数据库所需的专业知识和关键的发布场所没有系统的概述。第二,社会技术问题还没有完全综合起来,也没有成为制定解决社会和技术限制的整体设计方法的工具。需要更深入的调查来指导未来的研究,突出挑战,促进跨学科的合作。在本文中,我们提出了一个系统的地图研究,以解决所确定的局限性。从最初的2323个来源中,我们确定了63个主要资源,以(1)表征围绕元宇宙的研究社区;(2)引出、综合和分类影响有效元宇宙开发的19个社会和18个技术问题。基于我们的研究结果,我们将问题目录与当前的知识体系联系起来,提供见解和研究路线图,将问题转化为可操作的挑战,在一个新的、统一的研究资产的范围内,创造了“元宇宙工程”,即多学科学科,以确定设计社会技术元宇宙的过程和工具。
{"title":"Another Brick in the Wall: A Systematic Mapping Study Toward Defining Metaverse Engineering Through Socio-Technical Issues","authors":"Dario Di Dario, Fabio Palomba, Carmine Gravino","doi":"10.1145/3785659","DOIUrl":"https://doi.org/10.1145/3785659","url":null,"abstract":"Nowadays, virtual worlds are evolving into immersive metaverses , i.e., collective, shared virtual spaces that arise from the convergence of virtual reality (VR), augmented reality (AR), the internet, and additional digital technologies. These environments allow users to interact through avatars. While research has explored the technologies and social dynamics of the metaverse, two key limitations remain. First, there is no systematic overview of the expertise required to build metaverses and the key publication venues. Second, the socio-technical issues have not been fully synthesized or made instrumental for developing holistic design approaches that address both social and technical constraints. A deeper investigation is needed to guide future research, highlight challenges, and foster collaboration across disciplines. In this paper, we propose a systematic mapping study that addresses the limitations identified. From an initial pool of 2,323 sources, we identify 63 primary resources to (1) characterize the research community around metaverse and (2) elicit, synthesize, and categorize 19 social and 18 technical issues affecting the development of an effective metaverse. Based on our results, we contextualize the catalog of issues with respect to the current body of knowledge, providing insights and a research roadmap that transforms issues into actionable challenges in the scope of a novel, unified research asset coined “metaverse engineering” , i.e., the multidisciplinary discipline to identify processes and instruments to design socio-technical metaverses.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"111 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145770764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AGI-Enabled Solutions for Service Explosion in IoX: A Cyber-Physical-Social-Thinking Perspective 基于agi的IoX服务爆炸解决方案:网络-物理-社会思维视角
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1145/3785669
Qikai Wei, Huansheng Ning, Feifei Shi, Tao Zhu, Jianguo Ding, Abdelouahid Derhab, Mahmoud Daneshmand
With the rapid growth of the Internet of Things, service explosion has become a serious challenge, hindering efficient collaboration in the Cyber-Physical-Social-Thinking (CPST) space. In response, the Internet of X (IoX) under the CPST framework is examined through an in-depth analysis from three dimensions: Internet of Things (IoT), Internet of People (IoP), and Internet of Thinking (IoTk). The rapid growth of IoT devices and data, the significant increase in the frequency of personalized interactions in IoP, and the explosive growth in the demand for IoTk cognitive services have caused existing communication, computing, and storage systems to face problems such as response delays and resource bottlenecks. To address the above challenges, a new AGI-based paradigm is proposed to address the problem of service explosion. The main mitigation approaches include interoperability, data/network efficiency, and security in IoT; scalable user management, personalization, and privacy in IoP; and brain-computer interaction, neural data processing, and brain information privacy in IoTk. Subsequently, the case of smart homes is employed to elaborate on how AGI alleviates the service explosion phenomenon in IoT, IoP, and IoTk scenarios. Finally, the development of artificial super intelligence is anticipated, and potential directions for future research are outlined.
随着物联网的快速发展,服务爆炸已经成为一个严峻的挑战,阻碍了网络-物理-社会-思维(CPST)领域的高效协作。为此,本文从物联网(IoT)、人联网(IoP)和思维互联网(IoTk)三个维度对CPST框架下的X互联网(IoX)进行了深入分析。物联网设备和数据的快速增长,物联网中个性化交互频率的显著增加,以及物联网认知服务需求的爆发式增长,使得现有的通信、计算和存储系统面临响应延迟和资源瓶颈等问题。为了应对上述挑战,提出了一种新的基于agi的范式来解决服务爆炸问题。主要缓解方法包括物联网中的互操作性、数据/网络效率和安全性;IoP中可扩展的用户管理、个性化和隐私;脑机交互、神经数据处理、脑信息隐私等。随后,以智能家居为例,阐述AGI如何缓解IoT、IoP、IoTk场景下的业务爆炸现象。最后,对人工超级智能的发展进行了展望,并对未来的研究方向进行了展望。
{"title":"AGI-Enabled Solutions for Service Explosion in IoX: A Cyber-Physical-Social-Thinking Perspective","authors":"Qikai Wei, Huansheng Ning, Feifei Shi, Tao Zhu, Jianguo Ding, Abdelouahid Derhab, Mahmoud Daneshmand","doi":"10.1145/3785669","DOIUrl":"https://doi.org/10.1145/3785669","url":null,"abstract":"With the rapid growth of the Internet of Things, service explosion has become a serious challenge, hindering efficient collaboration in the Cyber-Physical-Social-Thinking (CPST) space. In response, the Internet of X (IoX) under the CPST framework is examined through an in-depth analysis from three dimensions: Internet of Things (IoT), Internet of People (IoP), and Internet of Thinking (IoTk). The rapid growth of IoT devices and data, the significant increase in the frequency of personalized interactions in IoP, and the explosive growth in the demand for IoTk cognitive services have caused existing communication, computing, and storage systems to face problems such as response delays and resource bottlenecks. To address the above challenges, a new AGI-based paradigm is proposed to address the problem of service explosion. The main mitigation approaches include interoperability, data/network efficiency, and security in IoT; scalable user management, personalization, and privacy in IoP; and brain-computer interaction, neural data processing, and brain information privacy in IoTk. Subsequently, the case of smart homes is employed to elaborate on how AGI alleviates the service explosion phenomenon in IoT, IoP, and IoTk scenarios. Finally, the development of artificial super intelligence is anticipated, and potential directions for future research are outlined.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"13 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145770765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways 从5G到6G:安全、隐私和标准化路径调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1145/3785467
Mengmeng Yang, Youyang Qu, Thilina Ranbaduge, Chandra Thapa, Nazatul Haque Sultan, Ming Ding, Hajime Suzuki, Wei Ni, Sharif Abuadbba, David Smith, Paul Tyler, Josef Pieprzyk, Thierry Rakotoarivelo, Xinlong Guan, Sirine Mrabet
The vision for 6G aims to enhance network capabilities, supporting an intelligent digital ecosystem where artificial intelligence (AI) is a key. However, the expansion of 6G raises critical security and privacy concerns due to the increased integration of IoT devices, edge computing, and AI. This survey provides a comprehensive overview of 6G protocols with a focus on security and privacy, identifying risks that have not been experienced in preceding 5G systems, and presenting mitigation strategies. While many vulnerabilities from earlier generations persist, the introduction of AI/ML introduces novel risks like model inversion and malicious manipulation of AI. Vulnerabilities in emerging personal IoT networks and autonomous vehicles are also underscored, where falsified command signaling or privacy leakage can pose safety and ethical concerns. The survey also discusses the transition toward lattice-based, post-quantum encryption standards, and identifies limitations in current security frameworks and calls for new, dynamic approaches tailored to 6G’s complexity. Close collaboration among stakeholders, including governments, industry, and researchers, is indispensable to developing robust standards, secure architectures, and risk assessment frameworks that address AI, quantum threats, and privacy at scale.
6G的愿景旨在增强网络功能,支持以人工智能(AI)为关键的智能数字生态系统。然而,由于物联网设备、边缘计算和人工智能的集成增加,6G的扩展引发了关键的安全和隐私问题。本调查全面概述了6G协议,重点是安全性和隐私性,确定了之前5G系统未经历的风险,并提出了缓解策略。虽然前几代的许多漏洞仍然存在,但人工智能/机器学习的引入引入了新的风险,如模型反演和人工智能的恶意操纵。新兴的个人物联网网络和自动驾驶汽车的脆弱性也得到了强调,其中伪造的命令信号或隐私泄露可能带来安全和道德问题。该调查还讨论了向基于格的后量子加密标准的过渡,并确定了当前安全框架的局限性,并呼吁针对6G的复杂性量身定制新的动态方法。包括政府、行业和研究人员在内的利益相关者之间的密切合作,对于制定强大的标准、安全架构和风险评估框架,以解决大规模的人工智能、量子威胁和隐私问题,是不可或缺的。
{"title":"From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways","authors":"Mengmeng Yang, Youyang Qu, Thilina Ranbaduge, Chandra Thapa, Nazatul Haque Sultan, Ming Ding, Hajime Suzuki, Wei Ni, Sharif Abuadbba, David Smith, Paul Tyler, Josef Pieprzyk, Thierry Rakotoarivelo, Xinlong Guan, Sirine Mrabet","doi":"10.1145/3785467","DOIUrl":"https://doi.org/10.1145/3785467","url":null,"abstract":"The vision for 6G aims to enhance network capabilities, supporting an intelligent digital ecosystem where artificial intelligence (AI) is a key. However, the expansion of 6G raises critical security and privacy concerns due to the increased integration of IoT devices, edge computing, and AI. This survey provides a comprehensive overview of 6G protocols with a focus on security and privacy, identifying risks that have not been experienced in preceding 5G systems, and presenting mitigation strategies. While many vulnerabilities from earlier generations persist, the introduction of AI/ML introduces novel risks like model inversion and malicious manipulation of AI. Vulnerabilities in emerging personal IoT networks and autonomous vehicles are also underscored, where falsified command signaling or privacy leakage can pose safety and ethical concerns. The survey also discusses the transition toward lattice-based, post-quantum encryption standards, and identifies limitations in current security frameworks and calls for new, dynamic approaches tailored to 6G’s complexity. Close collaboration among stakeholders, including governments, industry, and researchers, is indispensable to developing robust standards, secure architectures, and risk assessment frameworks that address AI, quantum threats, and privacy at scale.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"34 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145771129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Sovereign Identity as a Secure and Trustworthy Approach to Digital Identity Management: A Comprehensive Survey 自我主权身份作为一种安全可信的数字身份管理方法:一项综合调查
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-17 DOI: 10.1145/3785466
Efat Fathalla, Mohamed Azab, ChunSheng Xin, Hongyi Wu
The digital landscape increasingly relies on data exchange, underscoring the importance of Digital Identity Management (DIM) systems. However, current models face vulnerabilities, leading to the demand for more secure, decentralized, and user-centric solutions. Self-sovereign Identity (SSI) has emerged as a promising paradigm supported by blockchain technology, granting users control over their digital identities. This paper reviews existing research and commercial SSI solutions, assessing their feasibility and effectiveness. We thoroughly explore SSI’s concept, structure, and components while addressing challenges like scalability, usability, Quantum computing-based attacks and corresponding resistance mechanisms, data storage, and governance. Additionally, we highlight recent advancements and identify research gaps, suggesting future directions for enhanced DIM solutions.
数字景观越来越依赖于数据交换,强调了数字身份管理(DIM)系统的重要性。然而,当前的模型面临着漏洞,导致对更安全、分散和以用户为中心的解决方案的需求。自我主权身份(Self-sovereign Identity, SSI)已成为区块链技术支持的一种有前途的范式,允许用户控制自己的数字身份。本文回顾了现有的研究和商业SSI解决方案,评估了它们的可行性和有效性。我们深入探讨了SSI的概念、结构和组件,同时解决了可扩展性、可用性、基于量子计算的攻击和相应的抵抗机制、数据存储和治理等挑战。此外,我们强调了最近的进展,并确定了研究差距,提出了增强DIM解决方案的未来方向。
{"title":"Self-Sovereign Identity as a Secure and Trustworthy Approach to Digital Identity Management: A Comprehensive Survey","authors":"Efat Fathalla, Mohamed Azab, ChunSheng Xin, Hongyi Wu","doi":"10.1145/3785466","DOIUrl":"https://doi.org/10.1145/3785466","url":null,"abstract":"The digital landscape increasingly relies on data exchange, underscoring the importance of Digital Identity Management (DIM) systems. However, current models face vulnerabilities, leading to the demand for more secure, decentralized, and user-centric solutions. Self-sovereign Identity (SSI) has emerged as a promising paradigm supported by blockchain technology, granting users control over their digital identities. This paper reviews existing research and commercial SSI solutions, assessing their feasibility and effectiveness. We thoroughly explore SSI’s concept, structure, and components while addressing challenges like scalability, usability, Quantum computing-based attacks and corresponding resistance mechanisms, data storage, and governance. Additionally, we highlight recent advancements and identify research gaps, suggesting future directions for enhanced DIM solutions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"23 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145765469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Off-chain Technologies Off-chain技术综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-17 DOI: 10.1145/3765897
Chaoming Shi, Haomeng Xie, Zheng Yan, Laurence T. Yang
Blockchain is a decentralized ledger with a secure and immutable chain structure. The advanced attributes of blockchain, including decentralization, anonymity, transparency, and zero trust support, have positioned it as a transformative technology across different areas of expertise, like medicine, finance, and the Internet of Things (IoT). Nonetheless, blockchain’s progress has been constrained in various aspects, revealing inefficiency, privacy, high transaction fees, and challenges with on-chain storage. To address these limitations, off-chain technology has emerged as a solution by moving computation and storage overhead away from the blockchain. However, a comprehensive survey on off-chain schemes is lacking in the current literature. In this paper, we conduct a thorough survey on off-chain technologies. We first introduce the fundamental concepts and characteristics of both blockchain and off-chain technologies. Furthermore, we establish a thorough taxonomy of off-chain technologies based on distinct application scenarios. We put forth a series of evaluation criteria, based on which we seriously review and analyze the existing off-chain schemes to assess their strengths and limitations. Conclusively, we outline a list of open issues and propose promising future research directions based on our thorough review and analysis on off-chain technologies.
区块链是一个分散的账本,具有安全不可变的链结构。区块链的高级属性,包括去中心化、匿名性、透明度和零信任支持,使其成为跨医学、金融和物联网(IoT)等不同专业领域的变革性技术。尽管如此,区块链的进展在各个方面都受到限制,暴露出效率低下、隐私、高交易费用以及链上存储的挑战。为了解决这些限制,链下技术作为一种解决方案出现了,它将计算和存储开销从区块链移开。然而,目前文献中缺乏对脱链方案的全面调查。在本文中,我们对链下技术进行了深入的调查。我们首先介绍区块链和off-chain技术的基本概念和特点。此外,我们基于不同的应用场景建立了一个完整的链下技术分类。我们提出了一系列的评估标准,在此基础上,我们认真审查和分析现有的脱链方案,以评估其优势和局限性。最后,我们在对脱链技术进行全面回顾和分析的基础上,概述了一系列悬而未决的问题,并提出了有希望的未来研究方向。
{"title":"A Survey on Off-chain Technologies","authors":"Chaoming Shi, Haomeng Xie, Zheng Yan, Laurence T. Yang","doi":"10.1145/3765897","DOIUrl":"https://doi.org/10.1145/3765897","url":null,"abstract":"Blockchain is a decentralized ledger with a secure and immutable chain structure. The advanced attributes of blockchain, including decentralization, anonymity, transparency, and zero trust support, have positioned it as a transformative technology across different areas of expertise, like medicine, finance, and the Internet of Things (IoT). Nonetheless, blockchain’s progress has been constrained in various aspects, revealing inefficiency, privacy, high transaction fees, and challenges with on-chain storage. To address these limitations, off-chain technology has emerged as a solution by moving computation and storage overhead away from the blockchain. However, a comprehensive survey on off-chain schemes is lacking in the current literature. In this paper, we conduct a thorough survey on off-chain technologies. We first introduce the fundamental concepts and characteristics of both blockchain and off-chain technologies. Furthermore, we establish a thorough taxonomy of off-chain technologies based on distinct application scenarios. We put forth a series of evaluation criteria, based on which we seriously review and analyze the existing off-chain schemes to assess their strengths and limitations. Conclusively, we outline a list of open issues and propose promising future research directions based on our thorough review and analysis on off-chain technologies.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"152 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145765468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for Acquiring and Incorporating Knowledge into Stock Price Prediction: A Survey 股票价格预测知识的获取与运用方法综述
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-16 DOI: 10.1145/3773079
Liping Wang, Jiawei Li, Lifan Zhao, Zhizhuo Kou, Xiaohan Wang, Xinyi Zhu, Hao Wang, Yanyan Shen, Chen Lei
Predicting stock prices presents a challenging research problem due to the inherent volatility and non-linear nature of the stock market. In recent years, knowledge-enhanced stock price prediction methods have shown groundbreaking results by utilizing external knowledge to understand the stock market. Despite the importance of these methods, there is a scarcity of scholarly works that systematically synthesize previous studies from the perspective of external knowledge types. Specifically, the external knowledge can be modeled in different data structures, which we group into non-graph-based formats and graph-based formats: 1) non-graph-based knowledge captures contextual information and multimedia descriptions specifically associated with an individual stock; 2) graph-based knowledge captures interconnected and interdependent information in the stock market. This survey paper aims to provide a systematic and comprehensive description of methods for acquiring external knowledge from various unstructured data sources and then incorporating it into stock price prediction models. We also explore fusion methods for combining external knowledge with historical price features. Moreover, this paper includes a compilation of relevant datasets and delves into potential future research directions in this domain.
由于股票市场固有的波动性和非线性特性,股票价格预测是一个具有挑战性的研究问题。近年来,利用外部知识来了解股票市场的知识增强股价预测方法取得了突破性的成果。尽管这些方法很重要,但从外部知识类型的角度系统地综合前人研究的学术著作却很少。具体而言,外部知识可以用不同的数据结构建模,我们将其分为非基于图的格式和基于图的格式:1)非基于图的知识捕获与单个股票特定相关的上下文信息和多媒体描述;2)基于图的知识捕获了股票市场中相互关联和相互依赖的信息。本文旨在系统全面地描述从各种非结构化数据源获取外部知识并将其纳入股票价格预测模型的方法。我们还探索了将外部知识与历史价格特征相结合的融合方法。此外,本文还汇编了相关数据集,并对该领域未来可能的研究方向进行了探讨。
{"title":"Methods for Acquiring and Incorporating Knowledge into Stock Price Prediction: A Survey","authors":"Liping Wang, Jiawei Li, Lifan Zhao, Zhizhuo Kou, Xiaohan Wang, Xinyi Zhu, Hao Wang, Yanyan Shen, Chen Lei","doi":"10.1145/3773079","DOIUrl":"https://doi.org/10.1145/3773079","url":null,"abstract":"Predicting stock prices presents a challenging research problem due to the inherent volatility and non-linear nature of the stock market. In recent years, knowledge-enhanced stock price prediction methods have shown groundbreaking results by utilizing external knowledge to understand the stock market. Despite the importance of these methods, there is a scarcity of scholarly works that systematically synthesize previous studies from the perspective of external knowledge types. Specifically, the external knowledge can be modeled in different data structures, which we group into non-graph-based formats and graph-based formats: 1) <jats:italic toggle=\"yes\">non-graph-based knowledge</jats:italic> captures contextual information and multimedia descriptions specifically associated with an individual stock; 2) <jats:italic toggle=\"yes\">graph-based knowledge</jats:italic> captures interconnected and interdependent information in the stock market. This survey paper aims to provide a systematic and comprehensive description of methods for acquiring external knowledge from various unstructured data sources and then incorporating it into stock price prediction models. We also explore fusion methods for combining external knowledge with historical price features. Moreover, this paper includes a compilation of relevant datasets and delves into potential future research directions in this domain.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"20 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145759516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Offloading for CAVs Edge Computing Environment: Taxonomy, Critical Review, and Future Road Map 自动驾驶汽车边缘计算环境的任务卸载:分类、关键审查和未来路线图
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-15 DOI: 10.1145/3783984
Bhoopendra Kumar, Aditya Bhardwaj, Dinesh Prasad Sahu
The rapid advancement of Intelligent Transportation Systems (ITS) has led to a paradigm shift towards the adoption of Connected Autonomous Vehicles (CAVs). In recent years, CAVs have emerged as a prominent research focus due to their potential to reduce road traffic accidents caused by human error, optimize traffic flow, create new economic opportunities, and enhance travel convenience. However, the increasing demand for compute and delay-sensitive applications, such as real-time navigation and sensor data processing, exceeds the capabilities of current onboard vehicle resources. Consequently, task offloading has gained significant attention, allowing certain computational tasks generated by CAVs operations to be offloaded to external cloud or edge servers. The existing review literature has been limited in its focus on task offloading techniques specifically for CAVs architecture. Therefore, this study aims to present a comprehensive survey on task offloading in CAVs through a systematic review guided by key research questions. We first provide a technical background and then propose a broad coverage taxonomy of existing literature, analyzing promising solutions such as Machine Learning (ML) and heuristic-based techniques. In addition, we present a taxonomy of execution environments, metrics, and datasets. Finally, we highlight key research challenges and future trends, providing valuable insights for advancing task offloading in CAVs architecture.
智能交通系统(ITS)的快速发展导致了一种范式的转变,即采用联网自动驾驶汽车(cav)。近年来,自动驾驶汽车因其在减少人为失误导致的道路交通事故、优化交通流、创造新的经济机会和提高出行便利性方面的潜力而成为一个突出的研究热点。然而,对计算和延迟敏感应用(如实时导航和传感器数据处理)日益增长的需求超出了当前车载资源的能力。因此,任务卸载获得了极大的关注,允许将cav操作生成的某些计算任务卸载到外部云或边缘服务器。现有的评论文献在关注cav架构的任务卸载技术方面受到了限制。因此,本研究旨在通过以关键研究问题为导向的系统综述,对cav的任务卸载进行全面调查。我们首先提供技术背景,然后提出现有文献的广泛覆盖分类,分析有前途的解决方案,如机器学习(ML)和基于启发式的技术。此外,我们还提供了执行环境、度量和数据集的分类。最后,我们强调了关键的研究挑战和未来趋势,为推进自动驾驶汽车架构中的任务卸载提供了有价值的见解。
{"title":"Task Offloading for CAVs Edge Computing Environment: Taxonomy, Critical Review, and Future Road Map","authors":"Bhoopendra Kumar, Aditya Bhardwaj, Dinesh Prasad Sahu","doi":"10.1145/3783984","DOIUrl":"https://doi.org/10.1145/3783984","url":null,"abstract":"The rapid advancement of Intelligent Transportation Systems (ITS) has led to a paradigm shift towards the adoption of Connected Autonomous Vehicles (CAVs). In recent years, CAVs have emerged as a prominent research focus due to their potential to reduce road traffic accidents caused by human error, optimize traffic flow, create new economic opportunities, and enhance travel convenience. However, the increasing demand for compute and delay-sensitive applications, such as real-time navigation and sensor data processing, exceeds the capabilities of current onboard vehicle resources. Consequently, task offloading has gained significant attention, allowing certain computational tasks generated by CAVs operations to be offloaded to external cloud or edge servers. The existing review literature has been limited in its focus on task offloading techniques specifically for CAVs architecture. Therefore, this study aims to present a comprehensive survey on task offloading in CAVs through a systematic review guided by key research questions. We first provide a technical background and then propose a broad coverage taxonomy of existing literature, analyzing promising solutions such as Machine Learning (ML) and heuristic-based techniques. In addition, we present a taxonomy of execution environments, metrics, and datasets. Finally, we highlight key research challenges and future trends, providing valuable insights for advancing task offloading in CAVs architecture.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"9 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145752827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate Computing in High-Level Synthesis: From Survey to Practical Implementation 高级综合中的近似计算:从调查到实际实现
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-12 DOI: 10.1145/3785334
Benjamin Carrion Schafer, Baharealsadat Parchamdar
Approximate Computing in hardware design has emerged as an alternative way to further reduce the power consumption of integrated circuits (ICs) by trading off errors at the output with simpler, and more efficient logic. So far, the main approaches in approximate computing have been to simplify the hardware circuit by applying different approximation primitives of different aggressiveness to the original hardware description until the maximum error threshold is met. Multiple of these primitives can also be combined to obtain better results. These primitives are often applied at different VLSI design stages to maximize their effect. Because of the importance of this topic, there exists a very large body of work and multiple surveys have tried to cover all of it. In this work we take a different approach and concentrate only on approximation computing techniques applied at the High-Level Synthesis (HLS) stage of the VLSI design flow. The reason for this is that approximations applied at the highest possible level of VLSI design abstraction also have the highest impact on the resultant circuit. Moreover, HLS is finally being widely embraced by hardware designers, and this work aims at presenting practical examples of how the different approximation primitives can be easily applied using commercial HLS tools. We finally present some typical pitfalls that designers should avoid when using approximate computing and point to some future direction in this area.
在硬件设计中,近似计算已经成为进一步降低集成电路(ic)功耗的一种替代方法,通过使用更简单、更高效的逻辑来抵消输出错误。到目前为止,近似计算的主要方法是通过对原始硬件描述应用不同程度的近似原语来简化硬件电路,直到满足最大误差阈值。这些原语中的多个也可以组合起来以获得更好的结果。这些原语通常应用于不同的VLSI设计阶段,以最大化其效果。由于这一主题的重要性,存在着大量的工作和多项调查,试图涵盖所有内容。在这项工作中,我们采取了不同的方法,只集中在VLSI设计流程的高级综合(HLS)阶段应用的近似计算技术。这样做的原因是,在VLSI设计抽象的最高可能水平上应用的近似也对所得电路产生最大的影响。此外,HLS最终被硬件设计师广泛接受,本工作旨在展示如何使用商业HLS工具轻松应用不同近似原语的实际示例。最后,我们提出了设计师在使用近似计算时应该避免的一些典型陷阱,并指出了该领域的一些未来方向。
{"title":"Approximate Computing in High-Level Synthesis: From Survey to Practical Implementation","authors":"Benjamin Carrion Schafer, Baharealsadat Parchamdar","doi":"10.1145/3785334","DOIUrl":"https://doi.org/10.1145/3785334","url":null,"abstract":"Approximate Computing in hardware design has emerged as an alternative way to further reduce the power consumption of integrated circuits (ICs) by trading off errors at the output with simpler, and more efficient logic. So far, the main approaches in approximate computing have been to simplify the hardware circuit by applying different approximation primitives of different aggressiveness to the original hardware description until the maximum error threshold is met. Multiple of these primitives can also be combined to obtain better results. These primitives are often applied at different VLSI design stages to maximize their effect. Because of the importance of this topic, there exists a very large body of work and multiple surveys have tried to cover all of it. In this work we take a different approach and concentrate only on approximation computing techniques applied at the High-Level Synthesis (HLS) stage of the VLSI design flow. The reason for this is that approximations applied at the highest possible level of VLSI design abstraction also have the highest impact on the resultant circuit. Moreover, HLS is finally being widely embraced by hardware designers, and this work aims at presenting practical examples of how the different approximation primitives can be easily applied using commercial HLS tools. We finally present some typical pitfalls that designers should avoid when using approximate computing and point to some future direction in this area.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"6 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145728835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Computing Surveys
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1