Gabriele Costa, Silvia De Francisci, Rocco De Nicola
{"title":"The Beauty and the Beast: A survey on process algebras and cybersecurity","authors":"Gabriele Costa, Silvia De Francisci, Rocco De Nicola","doi":"10.1016/j.cosrev.2025.100758","DOIUrl":"10.1016/j.cosrev.2025.100758","url":null,"abstract":"<div><div>Process algebras (PAs) provide the mathematical foundation for several verification techniques and have profoundly influenced many areas of computer science. One of the main reasons for their success is their compact yet expressive and flexible syntax, which allows for the modeling of the relevant aspects of computation while abstracting away the irrelevant ones. Cybersecurity is no exception, and most authors acknowledge the importance of PAs in this field. However, estimating the impact of PAs is not trivial.</div><div>In this survey, we consider lines of research that employ PAs to address security problems. Our systematization of knowledge aims to assess and measure the impact of PAs. To achieve this goal, we start by briefly reviewing the evolution of PAs. Then, we analyze the literature by mapping each contribution to three cybersecurity sub-fields: <em>secure development</em>, <em>attack modeling</em>, and <em>vulnerability assessment</em>. Our methodology follows the chronological development of process algebras and identifies the emerging features specifically introduced for dealing with security problems. Although our analysis confirms that PAs have been greatly influential in general, it provides a fine-grained understanding of how PAs have shaped research in cybersecurity. Interestingly, our work highlights that some application areas remain underexplored, thus providing the research community with valuable insights on future directions.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100758"},"PeriodicalIF":13.3,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143864756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Zou , Xia Sun , Xiaodi Zhao , Jun Feng , Yunfei Long , Yaqiong Xing
{"title":"A survey on aspect sentiment triplet extraction methods and challenges","authors":"Wang Zou , Xia Sun , Xiaodi Zhao , Jun Feng , Yunfei Long , Yaqiong Xing","doi":"10.1016/j.cosrev.2025.100761","DOIUrl":"10.1016/j.cosrev.2025.100761","url":null,"abstract":"<div><div>Aspect-based sentiment analysis (ABSA) has gradually become an important technique for mining online reviews and is widely popular across various domains, such as producer–consumer, pharmaceutical reviews, political campaigns, and celebrity popularity. Aspect sentiment triplet extraction (ASTE) is a core technique within the ABSA, as it automatically extracts aspect terms, opinion terms, and sentiment polarity triplets from textual data. Since the ASTE task is a relatively recent research direction, there is still a lack of comprehensive summaries and syntheses of the research in this task. To address this issue, this paper provides a comprehensive introduction to various methods, performance evaluations, challenges, and future research directions for the ASTE task. Specifically, we categorize the current ASTE approaches into six types: Pipeline, End-to-end, Generative, MRC-based, Table-filling, and Span-based methods. Subsequently, we provide a detailed introduction to the characteristics of each method, along with their strengths and weaknesses. Additionally, we organize the performance of these methods on two benchmark datasets, ASTE-Data-v1 and ASTE-Data-v2. Finally, we discuss the challenges faced in current work and potential future directions.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100761"},"PeriodicalIF":13.3,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143859282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages","authors":"Samreen Kazi , Shakeel Khoja , Ali Daud","doi":"10.1016/j.cosrev.2025.100756","DOIUrl":"10.1016/j.cosrev.2025.100756","url":null,"abstract":"<div><div>With the increasing need for efficient document retrieval in low-resource languages (LRLs), traditional retrieval methods struggle to overcome linguistic challenges such as data scarcity, morphological complexity, and orthographic variations. To address this, hybrid and neural ranking approaches have been explored, integrating statistical retrieval with transformer-based models to enhance search accuracy. Unlike high-resource languages, LRL retrieval requires specialized strategies, including cross-lingual retrieval, domain adaptation, and culturally aware search mechanisms. This article provides a comprehensive review of document retrieval in LRLs, covering classical models, deep learning-based techniques, and their adaptation to resource-constrained languages. A structured taxonomy is introduced, classifying retrieval methods based on model architectures, linguistic processing, and ranking strategies.The paper concludes by highlighting key challenges, benchmarking efforts, and future directions for improving retrieval effectiveness in LRLs.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100756"},"PeriodicalIF":13.3,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143833854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lam Pham , Phat Lam , Dat Tran , Hieu Tang , Tin Nguyen , Alexander Schindler , Florian Skopik , Alexander Polonsky , Hai Canh Vu
{"title":"A comprehensive survey with critical analysis for deepfake speech detection","authors":"Lam Pham , Phat Lam , Dat Tran , Hieu Tang , Tin Nguyen , Alexander Schindler , Florian Skopik , Alexander Polonsky , Hai Canh Vu","doi":"10.1016/j.cosrev.2025.100757","DOIUrl":"10.1016/j.cosrev.2025.100757","url":null,"abstract":"<div><div>Thanks to advancements in deep learning, speech generation systems now power a variety of real-world applications, such as text-to-speech for individuals with speech disorders, voice chatbots in call centers, cross-linguistic speech translation, etc. While these systems can autonomously generate human-like speech and replicate specific voices, they also pose risks when misused for malicious purposes. This motivates the research community to develop models for detecting synthesized speech (e.g., fake speech) generated by deep-learning-based models, referred to as the Deepfake Speech Detection task. As the Deepfake Speech Detection task has emerged in recent years, there are not many survey papers proposed for this task. Additionally, existing surveys for the Deepfake Speech Detection task tend to summarize techniques used to construct a Deepfake Speech Detection system rather than providing a thorough analysis. This gap motivated us to conduct a comprehensive survey, providing a critical analysis of the challenges and developments in Deepfake Speech Detection (This work is a part of our projects of STARLIGHT, EUCINF, and DEFAME FAKEs). Our survey is innovatively structured, offering an in-depth analysis of current challenge competitions, public datasets, and the deep-learning techniques that provide enhanced solutions to address existing challenges in the field. From our analysis, we propose hypotheses on leveraging and combining specific deep learning techniques to improve the effectiveness of Deepfake Speech Detection systems. Beyond conducting a survey, we perform extensive experiments to validate these hypotheses and propose a highly competitive model for the task of Deepfake Speech Detection. Given the analysis and the experimental results, we finally indicate potential and promising research directions for the Deepfake Speech Detection task.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100757"},"PeriodicalIF":13.3,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143838005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advancements in image encryption: A comprehensive review of design principles and performance metrics","authors":"Biswarup Yogi , Ajoy Kumar Khan","doi":"10.1016/j.cosrev.2025.100759","DOIUrl":"10.1016/j.cosrev.2025.100759","url":null,"abstract":"<div><div>With the rise of digital image sharing in fields like healthcare, defence, and multimedia, strong image encryption is needed to protect sensitive information. This study provides a detailed overview of the analysis of image encryption algorithms, focusing on their design principles and performance metrics. This study covers different encryption methods, from traditional symmetric and asymmetric to modern chaos-based and quantum encryption. The design principles include substitution-permutation, diffusion, and key generation strategies. They are carefully evaluated to understand their actual input towards achieving high security. This study discusses key performance metrics such as encryption speed, sensitivity to key changes, statistical and differential attacks, computational complexity, and efficiency required to analyze the feasibility of various algorithms in practical applications. Explores issues such as the balance between security and resource limits, scalability, and adaptability to new threats. The analysis highlights the strengths and weaknesses of existing techniques, providing useful insights for developing next-generation encryption methods for specific applications. The combination of theoretical concepts along with performance evaluations presented in this work thus provides a significant and valuable reference source for research and practice aimed at designing effective yet secure image encryption algorithms in this rapidly growing world of technology.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100759"},"PeriodicalIF":13.3,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143815567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on quantum-safe blockchain security infrastructure","authors":"Arya Wicaksana","doi":"10.1016/j.cosrev.2025.100752","DOIUrl":"10.1016/j.cosrev.2025.100752","url":null,"abstract":"<div><div>Security infrastructure is vital in blockchain for its decentralized and distributed characteristics. Blockchain security infrastructure comprises several components: cryptographic algorithms, consensus protocols, key and identity management, network architecture, and smart contract deployment and execution. These components are vulnerable to the advancement of quantum computing and the realization of more powerful quantum computers. Classical security countermeasures used across the entire blockchain security infrastructure are exposed to quantum computing attacks. The exploitation is catastrophic to the sustainability of blockchain research and applications. This paper outlines the blockchain security infrastructure and quantum-safe solutions. The promising quantum-resistant cryptographic algorithms released by the National Institute of Standards and Technology (NIST) are evaluated for their relevance and use in blockchain security infrastructure. This paper also discusses the practical implementation and adoption of quantum-safe solutions for blockchain security infrastructure, including recent developments on the quantum-safe blockchain. The holy grail in adopting quantum-safe solutions for blockchain security infrastructure solutions is without sacrificing scalability and decentralization.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100752"},"PeriodicalIF":13.3,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143807674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques","authors":"Rui Wang, Zhiyong Gao, Liuyang Zhang, Shuaibing Yue, Ziyi Gao","doi":"10.1016/j.cosrev.2025.100755","DOIUrl":"10.1016/j.cosrev.2025.100755","url":null,"abstract":"<div><div>Large language models (LLMs) have showcased exceptional capabilities across various natural language processing (NLP) tasks in recent years, such as machine translation, text summarization, and question answering. Despite their impressive performance, the deployment of these models on edge devices, such as mobile phones, IoT devices, and edge computing nodes, is significantly hindered by their substantial computational and memory requirements. This survey provides a comprehensive overview of the state-of-the-art techniques and strategies for enabling efficient inference of LLMs on edge devices. We explore approaches including the development of small language models (SLMs), model compression techniques, inference optimization strategies, and dedicated frameworks for edge deployment. Our goal is to highlight the advancements and ongoing challenges in this field, offering valuable insights for researchers and practitioners striving to bring the power of LLMs to edge environments.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100755"},"PeriodicalIF":13.3,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143799152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The ML-based sensor data deception targeting cyber–physical systems: A review","authors":"Nektaria Kaloudi , Jingyue Li","doi":"10.1016/j.cosrev.2025.100753","DOIUrl":"10.1016/j.cosrev.2025.100753","url":null,"abstract":"<div><div>The security of cyber–physical systems is crucial due to their critical applications. The increasing success of machine learning (ML) has raised growing concerns about its impact on the cybersecurity of cyber–physical systems. Although several studies have assessed the cybersecurity of cyber–physical systems, there remains a lack of systematic understanding of how ML techniques can contribute to the use of deception on these systems. In this study, we aim to systematize findings on the use of ML for sensor data deception in both attack and defense scenarios. We analyzed 13 offensive and 3 defensive approaches that leverage ML for sensor data deception targeting cyber–physical systems. We summarized the offensive and defensive sensor data deception implementations with impact on cyber–physical systems at the system level, and the mechanisms to defend offensive deception. Additionally, we provide key insights and outline challenges intended to guide future research on defending against ML-based cyber deception in cyber–physical systems.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100753"},"PeriodicalIF":13.3,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143768232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiachen Wang , Zikun Deng , Dazhen Deng , Xingbo Wang , Rui Sheng , Yi Cai , Huamin Qu
{"title":"Empowering multimodal analysis with visualization: A survey","authors":"Jiachen Wang , Zikun Deng , Dazhen Deng , Xingbo Wang , Rui Sheng , Yi Cai , Huamin Qu","doi":"10.1016/j.cosrev.2025.100748","DOIUrl":"10.1016/j.cosrev.2025.100748","url":null,"abstract":"<div><div>Multimodal data, which encompasses text, audio, image, and other modalities, is a popular research target in the field of visualization research. Existing visualization techniques for multimodal data are scattered and categorized by application domains, such as multimodal model analysis or online education. It lacks a comprehensive review from the perspective of data that summarizes the methodologies, research gaps, and future trends for researchers and practitioners. In this study, we delve into existing visualization research, identifying their data modalities, applications, strengths, and limitations. Furthermore, we shed light on the potential challenges and opportunities for further research in this domain to advance intelligent visualizations for multimodal data.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100748"},"PeriodicalIF":13.3,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143760346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial intelligence in COVID-19 research: A comprehensive survey of innovations, challenges, and future directions","authors":"Richard Annan, Letu Qingge","doi":"10.1016/j.cosrev.2025.100751","DOIUrl":"10.1016/j.cosrev.2025.100751","url":null,"abstract":"<div><div>The COVID-19 pandemic has accelerated the use of AI and ML in healthcare, improving diagnosis, treatment, and resource allocation. This survey examines the AI applications in disease detection, differential diagnosis, and post-COVID complication analysis. Our findings show that 53% of the reviewed studies focus on COVID-19 detection, while only 14% address post-COVID complications. This reveals a gap in long-term patient monitoring. Convolutional Neural Networks (CNNs) are the most frequently used models, appearing in 23% of reviewed studies as standalone architectures and even more often in hybrid models. Meanwhile, transformers and multimodal models remain underutilized. Each appears in only 4% of the studies, limiting the integration of diverse data sources, such as imaging, audio, and lab results. Federated learning, a privacy-preserving AI approach, appears in 9% of studies. However, it is still less common than centralized models. This restricts secure and collaborative AI development. Despite these progress, challenges such as data bias, limited model generalization, and ethical concerns persist. Advanced methods including transformer models and knowledge distillation offer potential solutions for improving computational efficiency. To strengthen AI-driven healthcare, this survey highlights three key needs: (1) broader adoption of multimodal AI, (2) development of computationally efficient and interpretable AI models, and (3) increased use of federated learning to support privacy-preserving AI training. By synthesizing insights from various studies, this paper provides a comprehensive evaluation of AI innovations in COVID-19 research and outlines key directions for future advancements in ethical and scalable AI-driven healthcare.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100751"},"PeriodicalIF":13.3,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143760347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}