首页 > 最新文献

ACM Computing Surveys (CSUR)最新文献

英文 中文
A Survey on Concept Drift in Process Mining 过程采矿中概念漂移的研究进展
Pub Date : 2021-10-07 DOI: 10.1145/3472752
D. M. V. Sato, Sheila Cristiana de Freitas, J. P. Barddal, E. Scalabrin
Concept drift in process mining (PM) is a challenge as classical methods assume processes are in a steady-state, i.e., events share the same process version. We conducted a systematic literature review on the intersection of these areas, and thus, we review concept drift in PM and bring forward a taxonomy of existing techniques for drift detection and online PM for evolving environments. Existing works depict that (i) PM still primarily focuses on offline analysis, and (ii) the assessment of concept drift techniques in processes is cumbersome due to the lack of common evaluation protocol, datasets, and metrics.
过程挖掘(PM)中的概念漂移是一个挑战,因为经典方法假设过程处于稳定状态,即事件共享相同的过程版本。我们对这些领域的交叉进行了系统的文献综述,因此,我们回顾了PM中的概念漂移,并提出了用于漂移检测的现有技术的分类,以及用于不断变化的环境的在线PM。现有的工作描述了(i) PM仍然主要关注离线分析,以及(ii)由于缺乏共同的评估协议、数据集和度量,过程中概念漂移技术的评估是繁琐的。
{"title":"A Survey on Concept Drift in Process Mining","authors":"D. M. V. Sato, Sheila Cristiana de Freitas, J. P. Barddal, E. Scalabrin","doi":"10.1145/3472752","DOIUrl":"https://doi.org/10.1145/3472752","url":null,"abstract":"Concept drift in process mining (PM) is a challenge as classical methods assume processes are in a steady-state, i.e., events share the same process version. We conducted a systematic literature review on the intersection of these areas, and thus, we review concept drift in PM and bring forward a taxonomy of existing techniques for drift detection and online PM for evolving environments. Existing works depict that (i) PM still primarily focuses on offline analysis, and (ii) the assessment of concept drift techniques in processes is cumbersome due to the lack of common evaluation protocol, datasets, and metrics.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"20 1","pages":"1 - 38"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91118519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions 现代勒索软件缓解:全面回顾、研究挑战和未来方向
Pub Date : 2021-10-07 DOI: 10.1145/3479393
Timothy R. McIntosh, A. Kayes, Yi-Ping Phoebe Chen, Alex Ng, P. Watters
Although ransomware has been around since the early days of personal computers, its sophistication and aggression have increased substantially over the years. Ransomware, as a type of malware to extort ransom payments from victims, has evolved to deliver payloads in different attack vectors and on multiple platforms, and creating repeated disruptions and financial loss to many victims. Many studies have performed ransomware analysis and/or presented detection, defense, or prevention techniques for ransomware. However, because the ransomware landscape has evolved aggressively, many of those studies have become less relevant or even outdated. Previous surveys on anti-ransomware studies have compared the methods and results of the studies they surveyed, but none of those surveys has attempted to critique on the internal or external validity of those studies. In this survey, we first examined the up-to-date concept of ransomware, and listed the inadequacies in current ransomware research. We then proposed a set of unified metrics to evaluate published studies on ransomware mitigation, and applied the metrics to 118 such studies to comprehensively compare and contrast their pros and cons, with the attempt to evaluate their relative strengths and weaknesses. Finally, we forecast the future trends of ransomware evolution, and propose future research directions.
尽管勒索软件早在个人电脑出现的早期就已经存在,但它的复杂性和攻击性在过去几年里大幅增加。勒索软件作为一种向受害者勒索赎金的恶意软件,已经发展到以不同的攻击媒介和多个平台提供有效载荷,并给许多受害者造成反复的中断和经济损失。许多研究已经进行了勒索软件分析和/或提出了勒索软件的检测、防御或预防技术。然而,由于勒索软件领域的迅猛发展,许多研究已经变得不那么相关,甚至过时了。之前关于反勒索软件研究的调查比较了他们所调查的研究的方法和结果,但这些调查都没有试图批评这些研究的内部或外部有效性。在本调查中,我们首先检查了勒索软件的最新概念,并列出了当前勒索软件研究的不足之处。然后,我们提出了一套统一的指标来评估已发表的勒索软件缓解研究,并将这些指标应用于118项此类研究,以全面比较和对比它们的优缺点,并试图评估它们的相对优势和劣势。最后,对勒索软件的未来发展趋势进行了预测,并提出了未来的研究方向。
{"title":"Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions","authors":"Timothy R. McIntosh, A. Kayes, Yi-Ping Phoebe Chen, Alex Ng, P. Watters","doi":"10.1145/3479393","DOIUrl":"https://doi.org/10.1145/3479393","url":null,"abstract":"Although ransomware has been around since the early days of personal computers, its sophistication and aggression have increased substantially over the years. Ransomware, as a type of malware to extort ransom payments from victims, has evolved to deliver payloads in different attack vectors and on multiple platforms, and creating repeated disruptions and financial loss to many victims. Many studies have performed ransomware analysis and/or presented detection, defense, or prevention techniques for ransomware. However, because the ransomware landscape has evolved aggressively, many of those studies have become less relevant or even outdated. Previous surveys on anti-ransomware studies have compared the methods and results of the studies they surveyed, but none of those surveys has attempted to critique on the internal or external validity of those studies. In this survey, we first examined the up-to-date concept of ransomware, and listed the inadequacies in current ransomware research. We then proposed a set of unified metrics to evaluate published studies on ransomware mitigation, and applied the metrics to 118 such studies to comprehensively compare and contrast their pros and cons, with the attempt to evaluate their relative strengths and weaknesses. Finally, we forecast the future trends of ransomware evolution, and propose future research directions.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"31 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88275533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey 多密钥同态加密数据的盲计算研究综述
Pub Date : 2021-10-07 DOI: 10.1145/3477139
Asma Aloufi, Peizhao Hu, Yongsoo Song, K. Lauter
With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry’s breakthrough discovery of how we might support arbitrary computations on encrypted data, many studies followed and improved various aspects of HE, such as faster bootstrapping and ciphertext packing. However, the topic of how to support secure computations on ciphertexts encrypted under multiple keys does not receive enough attention. This capability is crucial in many application scenarios where data owners want to engage in joint computations and are preferred to protect their sensitive data under their own secret keys. Enabling this capability is a non-trivial task. In this article, we present a comprehensive survey of the state-of-the-art multi-key techniques and schemes that target different systems and threat models. In particular, we review recent constructions based on Threshold Homomorphic Encryption (ThHE) and Multi-Key Homomorphic Encryption (MKHE). We analyze these cryptographic techniques and schemes based on a new secure outsourced computation model and examine their complexities. We share lessons learned and draw observations for designing better schemes with reduced overheads.
同态加密(HE)能够在不需要密钥的情况下对加密数据执行计算,是一种很有前途的加密技术,它使外包计算变得安全和隐私保护。在Gentry突破性发现如何支持加密数据上的任意计算十年后,许多研究跟进并改进了HE的各个方面,例如更快的引导和密文打包。然而,如何支持对多密钥加密的密文进行安全计算的问题却没有得到足够的重视。在许多应用程序场景中,此功能至关重要,因为数据所有者希望参与联合计算,并且倾向于使用自己的密钥保护敏感数据。启用此功能是一项非常重要的任务。在本文中,我们对针对不同系统和威胁模型的最先进的多密钥技术和方案进行了全面的调查。特别地,我们回顾了最近基于阈值同态加密(ThHE)和多密钥同态加密(MKHE)的结构。我们基于一种新的安全外包计算模型分析了这些加密技术和方案,并分析了它们的复杂性。我们分享了经验教训,并得出了设计更好的方案并减少了管理费用的观察结果。
{"title":"Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey","authors":"Asma Aloufi, Peizhao Hu, Yongsoo Song, K. Lauter","doi":"10.1145/3477139","DOIUrl":"https://doi.org/10.1145/3477139","url":null,"abstract":"With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry’s breakthrough discovery of how we might support arbitrary computations on encrypted data, many studies followed and improved various aspects of HE, such as faster bootstrapping and ciphertext packing. However, the topic of how to support secure computations on ciphertexts encrypted under multiple keys does not receive enough attention. This capability is crucial in many application scenarios where data owners want to engage in joint computations and are preferred to protect their sensitive data under their own secret keys. Enabling this capability is a non-trivial task. In this article, we present a comprehensive survey of the state-of-the-art multi-key techniques and schemes that target different systems and threat models. In particular, we review recent constructions based on Threshold Homomorphic Encryption (ThHE) and Multi-Key Homomorphic Encryption (MKHE). We analyze these cryptographic techniques and schemes based on a new secure outsourced computation model and examine their complexities. We share lessons learned and draw observations for designing better schemes with reduced overheads.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"4 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78954164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures 支持mec的5G用例:安全漏洞和对策调查
Pub Date : 2021-10-07 DOI: 10.1145/3474552
Pasika Sashmal Ranaweera, A. Jurcut, Madhusanka Liyanage
The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.
移动和互联网技术的未来正在表现出超越现有科学范围的进步。自动驾驶、增强现实和机器类型通信的概念相当复杂,需要提升当前的移动基础设施才能启动。第五代(5G)移动技术可以作为解决方案,尽管它缺乏满足服务保障的近距网络基础设施。多访问边缘计算(MEC)设想了这样一个边缘计算平台。在这项调查中,我们揭示了在MEC上下文中部署的基于5g的关键用例的安全漏洞。指出了每种情况下可能出现的安全流,并提出了缓解安全流的对策。
{"title":"MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures","authors":"Pasika Sashmal Ranaweera, A. Jurcut, Madhusanka Liyanage","doi":"10.1145/3474552","DOIUrl":"https://doi.org/10.1145/3474552","url":null,"abstract":"The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"24 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78062700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example 自主无人机飞行安全的计算机视觉研究综述及基于视觉的安全著陆管道实例
Pub Date : 2021-10-07 DOI: 10.1145/3472288
Efstratios Kakaletsis, C. Symeonidis, Maria Tzelepi, Ioannis Mademlis, A. Tefas, N. Nikolaidis, I. Pitas
Recent years have seen an unprecedented spread of Unmanned Aerial Vehicles (UAVs, or “drones”), which are highly useful for both civilian and military applications. Flight safety is a crucial issue in UAV navigation, having to ensure accurate compliance with recently legislated rules and regulations. The emerging use of autonomous drones and UAV swarms raises additional issues, making it necessary to transfuse safety- and regulations-awareness to relevant algorithms and architectures. Computer vision plays a pivotal role in such autonomous functionalities. Although the main aspects of autonomous UAV technologies (e.g., path planning, navigation control, landing control, mapping and localization, target detection/tracking) are already mature and well-covered, ensuring safe flying in the vicinity of crowds, avoidance of passing over persons, or guaranteed emergency landing capabilities in case of malfunctions, are generally treated as an afterthought when designing autonomous UAV platforms for unstructured environments. This fact is reflected in the fragmentary coverage of the above issues in current literature. This overview attempts to remedy this situation, from the point of view of computer vision. It examines the field from multiple aspects, including regulations across the world and relevant current technologies. Finally, since very few attempts have been made so far towards a complete UAV safety flight and landing pipeline, an example computer vision-based UAV flight safety pipeline is introduced, taking into account all issues present in current autonomous drones. The content is relevant to any kind of autonomous drone flight (e.g., for movie/TV production, news-gathering, search and rescue, surveillance, inspection, mapping, wildlife monitoring, crowd monitoring/management), making this a topic of broad interest.
近年来,无人驾驶飞行器(uav,或“无人机”)在民用和军事应用中都非常有用。飞行安全是无人机导航的一个关键问题,必须确保准确遵守最近颁布的法规和条例。自主无人机和无人机群的新兴应用引发了其他问题,因此有必要将安全和法规意识融入相关算法和架构中。计算机视觉在这种自主功能中起着关键作用。尽管自主无人机技术的主要方面(例如,路径规划、导航控制、着陆控制、测绘和定位、目标探测/跟踪)已经成熟且覆盖很好,但在设计用于非结构化环境的自主无人机平台时,通常将确保在人群附近安全飞行、避免经过人员或保证发生故障时的紧急着陆能力视为事后考虑。这一事实反映在当前文献中对上述问题的零星报道中。这篇综述试图从计算机视觉的角度来纠正这种情况。它从多个方面考察了该领域,包括世界各地的法规和相关的当前技术。最后,由于迄今为止对完整的无人机安全飞行和着陆管道的尝试很少,因此考虑到当前自主无人机中存在的所有问题,介绍了一个基于计算机视觉的无人机飞行安全管道示例。内容与任何类型的自主无人机飞行相关(例如,用于电影/电视制作,新闻采集,搜索和救援,监视,检查,绘图,野生动物监测,人群监测/管理),使其成为广泛关注的话题。
{"title":"Computer Vision for Autonomous UAV Flight Safety: An Overview and a Vision-based Safe Landing Pipeline Example","authors":"Efstratios Kakaletsis, C. Symeonidis, Maria Tzelepi, Ioannis Mademlis, A. Tefas, N. Nikolaidis, I. Pitas","doi":"10.1145/3472288","DOIUrl":"https://doi.org/10.1145/3472288","url":null,"abstract":"Recent years have seen an unprecedented spread of Unmanned Aerial Vehicles (UAVs, or “drones”), which are highly useful for both civilian and military applications. Flight safety is a crucial issue in UAV navigation, having to ensure accurate compliance with recently legislated rules and regulations. The emerging use of autonomous drones and UAV swarms raises additional issues, making it necessary to transfuse safety- and regulations-awareness to relevant algorithms and architectures. Computer vision plays a pivotal role in such autonomous functionalities. Although the main aspects of autonomous UAV technologies (e.g., path planning, navigation control, landing control, mapping and localization, target detection/tracking) are already mature and well-covered, ensuring safe flying in the vicinity of crowds, avoidance of passing over persons, or guaranteed emergency landing capabilities in case of malfunctions, are generally treated as an afterthought when designing autonomous UAV platforms for unstructured environments. This fact is reflected in the fragmentary coverage of the above issues in current literature. This overview attempts to remedy this situation, from the point of view of computer vision. It examines the field from multiple aspects, including regulations across the world and relevant current technologies. Finally, since very few attempts have been made so far towards a complete UAV safety flight and landing pipeline, an example computer vision-based UAV flight safety pipeline is introduced, taking into account all issues present in current autonomous drones. The content is relevant to any kind of autonomous drone flight (e.g., for movie/TV production, news-gathering, search and rescue, surveillance, inspection, mapping, wildlife monitoring, crowd monitoring/management), making this a topic of broad interest.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"11 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88239891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Design Guidelines for Cooperative UAV-supported Services and Applications 协同无人机支持的服务和应用设计指南
Pub Date : 2021-10-07 DOI: 10.1145/3467964
I. A. Ridhawi, Ouns Bouachir, M. Aloqaily, A. Boukerche
Internet of Things (IoT) systems have advanced greatly in the past few years, especially with the support of Machine Learning (ML) and Artificial Intelligence (AI) solutions. Numerous AI-supported IoT devices are playing a significant role in providing complex and user-specific smart city services. Given the multitude of heterogeneous wireless networks, the plethora of computer and storage architectures and paradigms, and the abundance of mobile and vehicular IoT devices, true smart city experiences are only attainable through a cooperative intelligent and secure IoT framework. This article provides an extensive study on different cooperative systems and envisions a cooperative solution that supports the integration and collaboration among both centralized and distributed systems, in which intelligent AI-supported IoT devices such as smart UAVs provide support in the data collection, processing and service provisioning process. Moreover, secure and collaborative decentralized solutions such as Blockchain are considered in the service provisioning process to enable enhanced privacy and authentication features for IoT applications. As such, user-specific complex services and applications within smart city environments will be delivered and made available in a timely, secure, and efficient manner.
物联网(IoT)系统在过去几年中取得了很大的进步,特别是在机器学习(ML)和人工智能(AI)解决方案的支持下。众多人工智能支持的物联网设备在提供复杂和用户特定的智慧城市服务方面发挥着重要作用。考虑到大量的异构无线网络,过多的计算机和存储架构和范式,以及丰富的移动和车载物联网设备,真正的智慧城市体验只有通过协作的智能和安全的物联网框架才能实现。本文对不同的协作系统进行了广泛的研究,并设想了一种支持集中式和分布式系统之间集成和协作的协作解决方案,其中智能无人机等智能ai支持的物联网设备在数据收集、处理和服务提供过程中提供支持。此外,在服务提供过程中考虑了安全和协作的去中心化解决方案,如区块链,以增强物联网应用的隐私和身份验证功能。因此,智能城市环境中特定于用户的复杂服务和应用将以及时、安全和高效的方式交付和提供。
{"title":"Design Guidelines for Cooperative UAV-supported Services and Applications","authors":"I. A. Ridhawi, Ouns Bouachir, M. Aloqaily, A. Boukerche","doi":"10.1145/3467964","DOIUrl":"https://doi.org/10.1145/3467964","url":null,"abstract":"Internet of Things (IoT) systems have advanced greatly in the past few years, especially with the support of Machine Learning (ML) and Artificial Intelligence (AI) solutions. Numerous AI-supported IoT devices are playing a significant role in providing complex and user-specific smart city services. Given the multitude of heterogeneous wireless networks, the plethora of computer and storage architectures and paradigms, and the abundance of mobile and vehicular IoT devices, true smart city experiences are only attainable through a cooperative intelligent and secure IoT framework. This article provides an extensive study on different cooperative systems and envisions a cooperative solution that supports the integration and collaboration among both centralized and distributed systems, in which intelligent AI-supported IoT devices such as smart UAVs provide support in the data collection, processing and service provisioning process. Moreover, secure and collaborative decentralized solutions such as Blockchain are considered in the service provisioning process to enable enhanced privacy and authentication features for IoT applications. As such, user-specific complex services and applications within smart city environments will be delivered and made available in a timely, secure, and efficient manner.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"25 1","pages":"1 - 35"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91022126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Survey on Data-driven Network Intrusion Detection 数据驱动网络入侵检测研究进展
Pub Date : 2021-10-07 DOI: 10.1145/3472753
Dylan Chou, Meng Jiang
Data-driven network intrusion detection (NID) has a tendency towards minority attack classes compared to normal traffic. Many datasets are collected in simulated environments rather than real-world networks. These challenges undermine the performance of intrusion detection machine learning models by fitting machine learning models to unrepresentative “sandbox” datasets. This survey presents a taxonomy with eight main challenges and explores common datasets from 1999 to 2020. Trends are analyzed on the challenges in the past decade and future directions are proposed on expanding NID into cloud-based environments, devising scalable models for large network data, and creating labeled datasets collected in real-world networks.
与正常流量相比,数据驱动网络入侵检测(NID)具有少数攻击类的倾向。许多数据集是在模拟环境中收集的,而不是在现实世界的网络中。这些挑战通过将机器学习模型拟合到不具代表性的“沙盒”数据集,破坏了入侵检测机器学习模型的性能。本调查提出了一个分类法的八个主要挑战,并探讨了1999年至2020年的常用数据集。分析了过去十年的趋势和挑战,并提出了将NID扩展到基于云的环境,为大型网络数据设计可扩展模型以及创建在现实网络中收集的标记数据集的未来方向。
{"title":"A Survey on Data-driven Network Intrusion Detection","authors":"Dylan Chou, Meng Jiang","doi":"10.1145/3472753","DOIUrl":"https://doi.org/10.1145/3472753","url":null,"abstract":"Data-driven network intrusion detection (NID) has a tendency towards minority attack classes compared to normal traffic. Many datasets are collected in simulated environments rather than real-world networks. These challenges undermine the performance of intrusion detection machine learning models by fitting machine learning models to unrepresentative “sandbox” datasets. This survey presents a taxonomy with eight main challenges and explores common datasets from 1999 to 2020. Trends are analyzed on the challenges in the past decade and future directions are proposed on expanding NID into cloud-based environments, devising scalable models for large network data, and creating labeled datasets collected in real-world networks.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"45 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87047349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Screen Content Quality Assessment: Overview, Benchmark, and Beyond 屏幕内容质量评估:概述,基准和超越
Pub Date : 2021-10-07 DOI: 10.1145/3470970
Xiongkuo Min, Ke Gu, Guangtao Zhai, Xiaokang Yang, Wenjun Zhang, P. Callet, Chang Wen Chen
Screen content, which is often computer-generated, has many characteristics distinctly different from conventional camera-captured natural scene content. Such characteristic differences impose major challenges to the corresponding content quality assessment, which plays a critical role to ensure and improve the final user-perceived quality of experience (QoE) in various screen content communication and networking systems. Quality assessment of such screen content has attracted much attention recently, primarily because the screen content grows explosively due to the prevalence of cloud and remote computing applications in recent years, and due to the fact that conventional quality assessment methods can not handle such content effectively. As the most technology-oriented part of QoE modeling, image/video content/media quality assessment has drawn wide attention from researchers, and a large amount of work has been carried out to tackle the problem of screen content quality assessment. This article is intended to provide a systematic and timely review on this emerging research field, including (1) background of natural scene vs. screen content quality assessment; (2) characteristics of natural scene vs. screen content; (3) overview of screen content quality assessment methodologies and measures; (4) relevant benchmarks and comprehensive evaluation of the state-of-the-art; (5) discussions on generalizations from screen content quality assessment to QoE assessment, and other techniques beyond QoE assessment; and (6) unresolved challenges and promising future research directions. Throughout this article, we focus on the differences and similarities between screen content and conventional natural scene content. We expect that this review article shall provide readers with an overview of the background, history, recent progress, and future of the emerging screen content quality assessment research.
屏幕内容通常是由计算机生成的,具有许多与传统摄像机捕捉的自然场景内容截然不同的特征。这些特征差异给相应的内容质量评估带来了重大挑战,而内容质量评估对于保证和提高各种屏幕内容传播和网络系统的最终用户感知体验质量(QoE)起着至关重要的作用。近年来,由于云计算和远程计算应用的普及,屏幕内容呈爆炸式增长,传统的质量评估方法无法有效处理这些内容,因此屏幕内容的质量评估备受关注。图像/视频内容/媒体质量评估作为QoE建模中最具技术性的部分,受到了研究者的广泛关注,针对屏幕内容质量评估问题开展了大量的工作。本文旨在对这一新兴研究领域进行系统和及时的回顾,包括:(1)自然场景与屏幕内容质量评估的背景;(2)自然场景与屏幕内容的特点;(3)屏幕内容质量评估方法和措施概述;(四)相关基准和综合评价;(5)讨论从屏幕内容质量评估到质量质量评估的推广,以及质量质量评估之外的其他技术;(6)有待解决的挑战和未来的研究方向。在本文中,我们将重点讨论屏幕内容与传统自然场景内容之间的异同。我们希望这篇综述文章能够为读者提供对新兴屏幕内容质量评估研究的背景、历史、最新进展和未来的概述。
{"title":"Screen Content Quality Assessment: Overview, Benchmark, and Beyond","authors":"Xiongkuo Min, Ke Gu, Guangtao Zhai, Xiaokang Yang, Wenjun Zhang, P. Callet, Chang Wen Chen","doi":"10.1145/3470970","DOIUrl":"https://doi.org/10.1145/3470970","url":null,"abstract":"Screen content, which is often computer-generated, has many characteristics distinctly different from conventional camera-captured natural scene content. Such characteristic differences impose major challenges to the corresponding content quality assessment, which plays a critical role to ensure and improve the final user-perceived quality of experience (QoE) in various screen content communication and networking systems. Quality assessment of such screen content has attracted much attention recently, primarily because the screen content grows explosively due to the prevalence of cloud and remote computing applications in recent years, and due to the fact that conventional quality assessment methods can not handle such content effectively. As the most technology-oriented part of QoE modeling, image/video content/media quality assessment has drawn wide attention from researchers, and a large amount of work has been carried out to tackle the problem of screen content quality assessment. This article is intended to provide a systematic and timely review on this emerging research field, including (1) background of natural scene vs. screen content quality assessment; (2) characteristics of natural scene vs. screen content; (3) overview of screen content quality assessment methodologies and measures; (4) relevant benchmarks and comprehensive evaluation of the state-of-the-art; (5) discussions on generalizations from screen content quality assessment to QoE assessment, and other techniques beyond QoE assessment; and (6) unresolved challenges and promising future research directions. Throughout this article, we focus on the differences and similarities between screen content and conventional natural scene content. We expect that this review article shall provide readers with an overview of the background, history, recent progress, and future of the emerging screen content quality assessment research.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"85 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80481793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Handling Iterations in Distributed Dataflow Systems 分布式数据流系统中的迭代处理
Pub Date : 2021-10-07 DOI: 10.1145/3477602
G. Gévay, Juan Soto, V. Markl
Over the past decade, distributed dataflow systems (DDS) have become a standard technology. In these systems, users write programs in restricted dataflow programming models, such as MapReduce, which enable them to scale out program execution to a shared-nothing cluster of machines. Yet, there is no established consensus that prescribes how to extend these programming models to support iterative algorithms. In this survey, we review the research literature and identify how DDS handle control flow, such as iteration, from both the programming model and execution level perspectives. This survey will be of interest for both users and designers of DDS.
在过去的十年中,分布式数据流系统(DDS)已经成为一种标准技术。在这些系统中,用户使用受限的数据流编程模型(如MapReduce)编写程序,这使他们能够将程序执行扩展到无共享的机器集群。然而,对于如何扩展这些编程模型以支持迭代算法,目前还没有建立共识。在本调查中,我们回顾了研究文献,并从编程模型和执行层的角度确定了DDS如何处理控制流,例如迭代。这项调查对DDS的用户和设计者都很有意义。
{"title":"Handling Iterations in Distributed Dataflow Systems","authors":"G. Gévay, Juan Soto, V. Markl","doi":"10.1145/3477602","DOIUrl":"https://doi.org/10.1145/3477602","url":null,"abstract":"Over the past decade, distributed dataflow systems (DDS) have become a standard technology. In these systems, users write programs in restricted dataflow programming models, such as MapReduce, which enable them to scale out program execution to a shared-nothing cluster of machines. Yet, there is no established consensus that prescribes how to extend these programming models to support iterative algorithms. In this survey, we review the research literature and identify how DDS handle control flow, such as iteration, from both the programming model and execution level perspectives. This survey will be of interest for both users and designers of DDS.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"22 1","pages":"1 - 38"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82647370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evolutionary Machine Learning: A Survey 进化机器学习:综述
Pub Date : 2021-10-04 DOI: 10.1145/3467477
A. Telikani, A. Tahmassebi, W. Banzhaf, A. Gandomi
Evolutionary Computation (EC) approaches are inspired by nature and solve optimization problems in a stochastic manner. They can offer a reliable and effective approach to address complex problems in real-world applications. EC algorithms have recently been used to improve the performance of Machine Learning (ML) models and the quality of their results. Evolutionary approaches can be used in all three parts of ML: preprocessing (e.g., feature selection and resampling), learning (e.g., parameter setting, membership functions, and neural network topology), and postprocessing (e.g., rule optimization, decision tree/support vectors pruning, and ensemble learning). This article investigates the role of EC algorithms in solving different ML challenges. We do not provide a comprehensive review of evolutionary ML approaches here; instead, we discuss how EC algorithms can contribute to ML by addressing conventional challenges of the artificial intelligence and ML communities. We look at the contributions of EC to ML in nine sub-fields: feature selection, resampling, classifiers, neural networks, reinforcement learning, clustering, association rule mining, and ensemble methods. For each category, we discuss evolutionary machine learning in terms of three aspects: problem formulation, search mechanisms, and fitness value computation. We also consider open issues and challenges that should be addressed in future work.
进化计算(EC)方法受到自然的启发,以随机的方式解决最优化问题。它们可以提供可靠而有效的方法来解决实际应用程序中的复杂问题。EC算法最近被用于提高机器学习(ML)模型的性能和结果的质量。进化方法可以用于机器学习的所有三个部分:预处理(例如,特征选择和重新采样),学习(例如,参数设置,隶属函数和神经网络拓扑)和后处理(例如,规则优化,决策树/支持向量修剪和集成学习)。本文探讨了EC算法在解决不同ML挑战中的作用。我们在这里没有提供进化ML方法的全面回顾;相反,我们讨论EC算法如何通过解决人工智能和ML社区的传统挑战来为ML做出贡献。我们从九个子领域考察EC对ML的贡献:特征选择、重新采样、分类器、神经网络、强化学习、聚类、关联规则挖掘和集成方法。对于每个类别,我们从三个方面讨论进化机器学习:问题表述、搜索机制和适应度值计算。我们还考虑在未来工作中应解决的悬而未决的问题和挑战。
{"title":"Evolutionary Machine Learning: A Survey","authors":"A. Telikani, A. Tahmassebi, W. Banzhaf, A. Gandomi","doi":"10.1145/3467477","DOIUrl":"https://doi.org/10.1145/3467477","url":null,"abstract":"Evolutionary Computation (EC) approaches are inspired by nature and solve optimization problems in a stochastic manner. They can offer a reliable and effective approach to address complex problems in real-world applications. EC algorithms have recently been used to improve the performance of Machine Learning (ML) models and the quality of their results. Evolutionary approaches can be used in all three parts of ML: preprocessing (e.g., feature selection and resampling), learning (e.g., parameter setting, membership functions, and neural network topology), and postprocessing (e.g., rule optimization, decision tree/support vectors pruning, and ensemble learning). This article investigates the role of EC algorithms in solving different ML challenges. We do not provide a comprehensive review of evolutionary ML approaches here; instead, we discuss how EC algorithms can contribute to ML by addressing conventional challenges of the artificial intelligence and ML communities. We look at the contributions of EC to ML in nine sub-fields: feature selection, resampling, classifiers, neural networks, reinforcement learning, clustering, association rule mining, and ensemble methods. For each category, we discuss evolutionary machine learning in terms of three aspects: problem formulation, search mechanisms, and fitness value computation. We also consider open issues and challenges that should be addressed in future work.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"31 1","pages":"1 - 35"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85192877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
期刊
ACM Computing Surveys (CSUR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1