{"title":"Defense strategies for Adversarial Machine Learning: A survey","authors":"Panagiotis Bountakas, Apostolis Zarras, Alexios Lekidis, Christos Xenakis","doi":"10.1016/j.cosrev.2023.100573","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100573","url":null,"abstract":"<div><p>Adversarial Machine Learning<span><span> (AML) is a recently introduced technique, aiming to deceive Machine Learning (ML) models by providing falsified inputs to render those models ineffective. Consequently, most researchers focus on detecting new AML attacks that can undermine existing ML infrastructures, overlooking at the same time the significance of defense strategies. This article constitutes a survey of the existing literature on AML attacks and defenses with a special focus on a taxonomy of recent works on AML defense techniques for different application domains, such as audio, cyber-security, NLP, and computer vision. The proposed survey also explores the methodology of the defense solutions and compares them using several criteria, such as whether they are attack- and/or domain-agnostic, deploy appropriate AML </span>evaluation metrics, and whether they share their source code and/or their evaluation datasets. To the best of our knowledge, this article constitutes the first survey that seeks to systematize the existing knowledge focusing solely on the defense solutions against AML and providing innovative directions for future research on tackling the increasing threat of AML.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Private set intersection: A systematic literature review","authors":"Daniel Morales, Isaac Agudo, Javier Lopez","doi":"10.1016/j.cosrev.2023.100567","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100567","url":null,"abstract":"<div><p>Secure Multi-party Computation (SMPC) is a family of protocols which allow some parties to compute a function on their private inputs, obtaining the output at the end and nothing more. In this work, we focus on a particular SMPC problem named Private Set Intersection (PSI). The challenge in PSI is how two or more parties can compute the intersection of their private input sets, while the elements that are not in the intersection remain private. This problem has attracted the attention of many researchers because of its wide variety of applications, contributing to the proliferation of many different approaches. Despite that, current PSI protocols still require heavy cryptographic assumptions that may be unrealistic in some scenarios. In this paper, we perform a Systematic Literature Review of PSI solutions, with the objective of analyzing the main scenarios where PSI has been studied and giving the reader a general taxonomy of the problem together with a general understanding of the most common tools used to solve it. We also analyze the performance using different metrics, trying to determine if PSI is mature enough to be used in realistic scenarios, identifying the pros and cons of each protocol and the remaining open problems.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49751428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey","authors":"M. Nssibi, G. Manita, O. Korbaa","doi":"10.1016/j.cosrev.2023.100559","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100559","url":null,"abstract":"","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54128328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matteo Loporchio, A. Bernasconi, D. Maesa, L. Ricci
{"title":"A survey of set accumulators for blockchain systems","authors":"Matteo Loporchio, A. Bernasconi, D. Maesa, L. Ricci","doi":"10.1016/j.cosrev.2023.100570","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100570","url":null,"abstract":"","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54128365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hafiz Farooq Ahmad , Wajid Rafique , Raihan Ur Rasool , Abdulaziz Alhumam , Zahid Anwar , Junaid Qadir
{"title":"Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review","authors":"Hafiz Farooq Ahmad , Wajid Rafique , Raihan Ur Rasool , Abdulaziz Alhumam , Zahid Anwar , Junaid Qadir","doi":"10.1016/j.cosrev.2023.100558","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100558","url":null,"abstract":"<div><p><span><span>In recent years, the healthcare industry<span> has faced new challenges around staffing, human interaction, and the adoption of telehealth. Technological innovations can improve efficiency, productivity, and patient outcomes, but healthcare has been slow to adopt them. However, the promise of 6G communication, extended reality (XR), and the </span></span>Internet of Things<span> (IoT) big data analytics<span><span> may revolutionize healthcare policies. Next-generation healthcare systems can utilize these technologies to offer novel healthcare services such as </span>telepresence, holographic, and haptic communication. XR can provide </span></span></span>immersive experiences<span> that are revolutionizing many domains of the healthcare ecosystem<span>, from self-care to surgical procedures. IoT can connect miniature healthcare objects with the Internet to provide smart healthcare services, generating big data that can be analyzed using deep learning<span> to improve the quality of healthcare services, disease diagnosis, and treatment. There is a lack of reviews that focus on analyzing the latest perspectives and future trends on how a convergence of these technologies will influence future healthcare systems. This research paper aims to fill that gap by providing a detailed review of how the convergence of these technologies will influence the future of healthcare systems. It provides a detailed literature review of how healthcare systems have utilized technologies based on 6G, XR and IoT big data analytics for effective and scalable healthcare services provisioning. It also highlights how future healthcare systems can synergistically leverage 6G, XR, and IoT data analytics and provide insightful taxonomies based on different parameters along with a description of current challenges and future directions.</span></span></span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49726683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthetic data generation: State of the art in health care domain","authors":"Hajra Murtaza , Musharif Ahmed , Naurin Farooq Khan , Ghulam Murtaza , Saad Zafar , Ambreen Bano","doi":"10.1016/j.cosrev.2023.100546","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100546","url":null,"abstract":"<div><p><span>Recent progress in artificial intelligence and </span>machine learning<span> has led to the growth of research in every aspect of life including the health care domain. However, privacy risks and legislations hinder the availability of patient data to researchers. Synthetic data (SD) has been regarded as a privacy-safe alternative to real data and has lately been employed in many research and academic endeavors. This growing body of research needs to be consolidated for the researchers and practitioners to gain a quick and fruitful comprehension of the state of the art in synthetic data generation in health care. The purpose of this study is to collate and synthesize the current state of synthetic data generation following a narrative review of 70 peer-reviewed studies discussing privacy-preserving synthetic medical data generation techniques. The literature shows the effectiveness of synthetic datasets for different applications in research, academics, and testing according to existing statistical and task-based utility metrics. However, the focus on longitudinal synthetic data seems deficient. Moreover, a unified metric for generic quality assessment of synthetic data is lacking. The results of this review will serve as a quick reference guide for the researchers and practitioners in the healthcare domain to select a suitable synthetic data strategy for their application based on its strengths and weaknesses and pave the path for further research and development in healthcare.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guillermo Iglesias, Edgar Talavera, Alberto Díaz-Álvarez
{"title":"A survey on GANs for computer vision: Recent research, analysis and taxonomy","authors":"Guillermo Iglesias, Edgar Talavera, Alberto Díaz-Álvarez","doi":"10.1016/j.cosrev.2023.100553","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100553","url":null,"abstract":"<div><p>In the last few years, there have been several revolutions in the field of deep learning, mainly headlined by the large impact of Generative Adversarial Networks (GANs). GANs not only provide an unique architecture when defining their models, but also generate incredible results which have had a direct impact on society. Due to the significant improvements and new areas of research that GANs have brought, the community is constantly coming up with new researches that make it almost impossible to keep up with the times. Our survey aims to provide a general overview of GANs, showing the latest architectures, optimizations of the loss functions, validation metrics and application areas of the most widely recognized variants. The efficiency of the different variants of the model architecture will be evaluated, as well as showing the best application area; as a vital part of the process, the different metrics for evaluating the performance of GANs and the frequently used loss functions will be analyzed. The final objective of this survey is to provide a summary of the evolution and performance of the GANs which are having better results to guide future researchers in the field.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web service adaptation: A decade’s overview","authors":"Haithem Mezni","doi":"10.1016/j.cosrev.2023.100535","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100535","url":null,"abstract":"<div><p><span>With the exponential growth<span> of communication and information technologies, adaptation has gained a significant attention as it becomes a key feature of service-based systems, allowing them to operate and evolve in highly dynamic and uncertain environments. Although several Web service standards and frameworks have been proposed and extended, existing solutions do not provide a suitable architecture, in which all aspects of monitoring and adaptation (e.g., proactive, cross-layer, and autonomic adaptation) can be expressed. In addition, the emergence of new computing environments to host and execute various types of services (Web/cloud services, big data-intensive services, </span></span>mobile services<span><span>, microservices, etc.) raises the need for more efficient monitoring and adaptation systems. This survey aims to bring a synthesis and a road-map to the adaptation of service-based systems. We also discuss adaptation solutions in emerging service models, such as cloud services and big services. Based on an adaptation taxonomy which we extracted from the surveyed approaches, and by identifying the main requirements and goals of service adaptation in Web, cloud and </span>big data environments, detailed analysis and discussions, as well as the open issues, are provided.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49726375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Brian Hildebrand , Mohamed Baza , Tara Salman , Simra Tabassum , Bharath Konatham , Fathi Amsaad , Abdul Razaque
{"title":"A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions","authors":"Brian Hildebrand , Mohamed Baza , Tara Salman , Simra Tabassum , Bharath Konatham , Fathi Amsaad , Abdul Razaque","doi":"10.1016/j.cosrev.2023.100547","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100547","url":null,"abstract":"<div><p><span>Internet of Vehicles (IoVs) consists of smart vehicles, Autonomous Vehicles (AVs) as well as roadside units (RSUs) that communicate wirelessly to provide enhanced transportation services such as improved traffic efficiency and reduced traffic congestion and accidents. Unfortunately, current IoV networks suffer from security, privacy, and trust issues. Blockchain technology emerged as a decentralized approach for enhanced security without depending on trusted third parties to run services. Blockchain offers the benefits of trustworthiness and immutability and mitigates the problem of a </span>single point of failure<span><span><span> and other attacks. In this work, we present the state-of-the-art Blockchain-enabled IoVs (BIoVs) with a particular focus on their applications, such as crowdsourcing-based applications, energy trading, traffic congestion reduction, collision, accident avoidance, infotainment, and content caching. We also present in-depth applications of federated learning (FL) for BIoVs. The key challenges of integrating Blockchain with IoV are investigated in several domains, such as </span>edge computing<span>, machine learning, and Federated Learning (FL). Lastly, we present several open issues, challenges, and future opportunities in AI-enabled BIoV, hardware-assisted security for BIoV, and </span></span>quantum computing attacks on BIoV applications.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual language integration: A survey and open challenges","authors":"Sang-Min Park , Young-Gab Kim","doi":"10.1016/j.cosrev.2023.100548","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100548","url":null,"abstract":"<div><p>With the recent development of deep learning<span><span> technology comes the wide use of artificial intelligence (AI) models in various domains. AI shows good performance for definite-purpose tasks, such as image recognition and </span>text classification. The recognition performance for every single task has become more accurate than feature engineering, enabling more work that could not be done before. In addition, with the development of generation technology (e.g., GPT-3), AI models are showing stable performances in each recognition and generation task. However, not many studies have focused on how to integrate these models efficiently to achieve comprehensive human interaction. Each model grows in size with improved performance, thereby consequently requiring more computing power and more complicated designs to train than before. This requirement increases the complexity of each model and requires more paired data, making model integration difficult. This study provides a survey on visual language integration with a hierarchical approach for reviewing the recent trends that have already been performed on AI models among research communities as the interaction component. We also compare herein the strengths of existing AI models and integration approaches and the limitations they face. Furthermore, we discuss the current related issues and which research is needed for visual language integration. More specifically, we identify four aspects of visual language integration models: multimodal learning, multi-task learning, end-to-end learning, and embodiment for embodied visual language interaction. Finally, we discuss some current open issues and challenges and conclude our survey by giving possible future directions.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}