ACM Computing Surveys最新文献

筛选
英文 中文
Diffusion-Based Visual Art Creation: A Survey and New Perspectives
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-04-05 DOI: 10.1145/3728459
Bingyuan Wang, Qifeng Chen, Zeyu Wang
{"title":"Diffusion-Based Visual Art Creation: A Survey and New Perspectives","authors":"Bingyuan Wang, Qifeng Chen, Zeyu Wang","doi":"10.1145/3728459","DOIUrl":"https://doi.org/10.1145/3728459","url":null,"abstract":"The integration of generative AI in visual art has revolutionized not only how visual content is created but also how AI interacts with and reflects the underlying domain knowledge. This survey explores the emerging realm of diffusion-based visual art creation, examining its development from both artistic and technical perspectives. We structure the survey into three phases, data feature and framework identification, detailed analyses using a structured coding process, and open-ended prospective outlooks. Our findings reveal how artistic requirements are transformed into technical challenges and highlight the design and application of diffusion-based methods within visual art creation. We also provide insights into future directions from technical and synergistic perspectives, suggesting that the confluence of generative AI and art has shifted the creative paradigm and opened up new possibilities. By summarizing the development and trends of this emerging interdisciplinary area, we aim to shed light on the mechanisms through which AI systems emulate and possibly, enhance human capacities in artistic perception and creativity.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"290 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143782800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tree-based Models for Vertical Federated Learning: A Survey
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-04-04 DOI: 10.1145/3728314
Bingchen Qian, Yuexiang Xie, Yaliang Li, Bolin Ding, Jingren Zhou
{"title":"Tree-based Models for Vertical Federated Learning: A Survey","authors":"Bingchen Qian, Yuexiang Xie, Yaliang Li, Bolin Ding, Jingren Zhou","doi":"10.1145/3728314","DOIUrl":"https://doi.org/10.1145/3728314","url":null,"abstract":"Tree-based models have achieved great success in a wide range of real-world applications due to their effectiveness, robustness, and interpretability, which inspired people to apply them in vertical federated learning (VFL) scenarios in recent years. In this paper, we conduct a comprehensive study to give an overall picture of applying tree-based models in VFL, from the perspective of their communication and computation protocols. We categorize tree-based models in VFL into two types, <jats:italic>i.e.,</jats:italic> feature-gathering models and label-scattering models, and provide a detailed discussion regarding their characteristics, advantages, privacy protection mechanisms, and applications. This study also focuses on the implementation of tree-based models in VFL, summarizing several design principles for better satisfying various requirements from both academic research and industrial deployment. We conduct a series of experiments to provide empirical observations on the differences and advances of different types of tree-based models.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"3 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143782802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unified Empirical Evaluation and Comparison of Session-based Recommendation Algorithms
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-04-04 DOI: 10.1145/3728358
Qingbo Zhang, Xiangmin Zhou, Xiuzhen Zhang, Xiaochun Yang, Bin Wang, Xun Yi
{"title":"Unified Empirical Evaluation and Comparison of Session-based Recommendation Algorithms","authors":"Qingbo Zhang, Xiangmin Zhou, Xiuzhen Zhang, Xiaochun Yang, Bin Wang, Xun Yi","doi":"10.1145/3728358","DOIUrl":"https://doi.org/10.1145/3728358","url":null,"abstract":"Recently, session-based recommendation systems (SBRSs) have become a highly explored area, and numerous methods have been proposed. The abundance of related work poses a challenge for newcomers in comprehending the current research landscape and burdens researchers during method validation. Offering a thorough research overview helps newcomers understand the current research. Additionally, comparing representative methods in a consistent environment allows researchers to streamline their workload by focusing on the top-performing methods. Existing theory-oriented review articles introduce the main techniques employed in SBRSs but lack a detailed exploration of their specific applications. The most recent neural method evaluated in existing experiment-driven review was published in 2019, and the latest state-of-the-art methods haven’t been included. To address these gaps, this paper offers a more thorough overview of SBRSs. Specifically, we first categorize and overview existing methods. Then, we introduce the main techniques and illustrate their applications. The performance of representative methods is validated under identical experimental conditions to ensure reliable comparative results. Our findings indicate that dataset characteristics significantly impact model performance, and attention mechanisms-based and gated neural networks (GNNs)-based models generally outperform others. Finally, we propose potential directions for future research in SBRSs.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"183 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143782801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Leveraging Uncertainty Estimation Towards Trustworthy Deep Neural Networks: The Case of Reject Option and Post-training Processing
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-04-03 DOI: 10.1145/3727633
Md Mehedi Hasan, Moloud Abdar, Abbas Khosravi, Uwe Aickelin, Pietro Lio, Ibrahim Hossain, Ashikur Rahman, Saeid Nahavandi
{"title":"Survey on Leveraging Uncertainty Estimation Towards Trustworthy Deep Neural Networks: The Case of Reject Option and Post-training Processing","authors":"Md Mehedi Hasan, Moloud Abdar, Abbas Khosravi, Uwe Aickelin, Pietro Lio, Ibrahim Hossain, Ashikur Rahman, Saeid Nahavandi","doi":"10.1145/3727633","DOIUrl":"https://doi.org/10.1145/3727633","url":null,"abstract":"Although neural networks (especially deep neural networks) have achieved <jats:italic>better-than-human</jats:italic> performance in many fields, their real-world deployment is still questionable due to the lack of awareness about the limitations in their knowledge. To incorporate such awareness in the machine learning model, prediction with reject option (also known as selective classification or classification with abstention) has been proposed in the literature. In this paper, we present a systematic review of the prediction with the reject option in the context of various neural networks. To the best of our knowledge, this is the first study focusing on this aspect of neural networks. Moreover, we discuss different novel loss functions related to the reject option and post-training processing (if any) of network output for generating suitable measurements for knowledge awareness of the model. Finally, we address the application of the rejection option in reducing the prediction time for real-time problems and present a comprehensive summary of the techniques related to the reject option in the context of a wide variety of neural networks. Our code is available on GitHub: https://github.com/MehediHasanTutul/Reject_option.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"62 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143766549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Primer on Pretrained Multilingual Language Models
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-04-01 DOI: 10.1145/3727339
Sumanth Doddapaneni, Gowtham Ramesh, Mitesh Khapra, Anoop Kunchukuttan, Pratyush Kumar
{"title":"A Primer on Pretrained Multilingual Language Models","authors":"Sumanth Doddapaneni, Gowtham Ramesh, Mitesh Khapra, Anoop Kunchukuttan, Pratyush Kumar","doi":"10.1145/3727339","DOIUrl":"https://doi.org/10.1145/3727339","url":null,"abstract":"Multilingual Language Models (MLLMs) such as mBERT, XLM, XLM-R, <jats:italic>etc.</jats:italic> have emerged as a viable option for bringing the power of pretraining to a large number of languages. Given their success in zero-shot transfer learning, there has emerged a large body of work in (i) building bigger MLLMs covering a large number of languages (ii) creating exhaustive benchmarks covering a wider variety of tasks and languages for evaluating MLLMs (iii) analysing the performance of MLLMs on monolingual, zero-shot cross-lingual and bilingual tasks (iv) understanding the universal language patterns (if any) learnt by MLLMs and (v) augmenting the (often) limited capacity of MLLMs to improve their performance on seen or even unseen languages. In this survey, we review the existing literature covering the above broad areas of research pertaining to MLLMs. Based on our survey, we recommend some promising directions of future research.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"58 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143744770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trojan Attacks and Countermeasures on Deep Neural Networks from Life-Cycle Perspective: A Review
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-03-31 DOI: 10.1145/3727640
Lingxin Jin, Xiangyu Wen, Wei Jiang, Jinyu Zhan, Xingzhi Zhou
{"title":"Trojan Attacks and Countermeasures on Deep Neural Networks from Life-Cycle Perspective: A Review","authors":"Lingxin Jin, Xiangyu Wen, Wei Jiang, Jinyu Zhan, Xingzhi Zhou","doi":"10.1145/3727640","DOIUrl":"https://doi.org/10.1145/3727640","url":null,"abstract":"Deep Neural Networks (DNNs) have been widely deployed in security-critical artificial intelligence systems, such as autonomous driving and facial recognition systems. However, recent research has revealed their susceptibility to Trojan information maliciously injected by attackers. This vulnerability is caused, on the one hand, by the complex architecture and non-interpretability of DNNs. On the other hand, external open-source datasets, pre-trained models, and intelligent service platforms further exacerbate the threat of Trojan attacks. This article presents the first comprehensive survey of Trojan attacks against DNNs from a lifecycle perspective, including training, post-training, and inference (deployment) stages. Specifically, this article reformulates the relationships of Trojan attacks with poisoning attacks, adversarial example attacks, and bit-flip attacks. Then, research on Trojan attacks against newly emerged model architectures (e.g., vision transformers and spiking neural networks) and in other research fields is investigated. Moreover, this article also provides a comprehensive review of countermeasures (including detection and elimination) against Trojan attacks. Further, it evaluates the practical effectiveness of existing defense strategies against Trojan attacks at different lifecycle stages. Finally, we conclude the survey and provide constructive insights to advance research on Trojan attacks and countermeasures.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"12 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Autonomous Navigation
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-03-31 DOI: 10.1145/3727642
Saeid Nahavandi, Roohallah Alizadehsani, Darius Nahavandi, Shady Mohamed, Navid Mohajer, Mohammad Rokonuzzaman, Ibrahim Hossain
{"title":"A Comprehensive Review on Autonomous Navigation","authors":"Saeid Nahavandi, Roohallah Alizadehsani, Darius Nahavandi, Shady Mohamed, Navid Mohajer, Mohammad Rokonuzzaman, Ibrahim Hossain","doi":"10.1145/3727642","DOIUrl":"https://doi.org/10.1145/3727642","url":null,"abstract":"The field of autonomous mobile robots has undergone dramatic advancements over the past decades. Despite achieving important milestones, several challenges are yet to be addressed. Aggregating the achievements of the robotic community as survey papers is vital to keep the track of current state-of-the-art and the challenges that must be tackled in the future. This paper tries to provide a comprehensive review of autonomous mobile robots covering topics such as sensor types, mobile robot platforms, simulation tools, path planning and following, sensor fusion methods, obstacle avoidance, and SLAM. The urge to present a survey paper is twofold. First, autonomous navigation field evolves fast so writing survey papers regularly is crucial to keep the research community well-aware of the current status of this field. Second, deep learning methods have revolutionized many fields including autonomous navigation. Therefore, it is necessary to give an appropriate treatment of the role of deep learning in autonomous navigation as well which is covered in this paper. Future works and research gaps will also be discussed.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"102 4 Pt 1 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-03-31 DOI: 10.1145/3727643
Md Palash Uddin, Yong Xiang, Mahmudul Hasan, Jun Bai, Yao Zhao, Longxiang Gao
{"title":"A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions","authors":"Md Palash Uddin, Yong Xiang, Mahmudul Hasan, Jun Bai, Yao Zhao, Longxiang Gao","doi":"10.1145/3727643","DOIUrl":"https://doi.org/10.1145/3727643","url":null,"abstract":"Federated Learning (FL) has emerged as a promising paradigm for training machine learning models across distributed devices while preserving their data privacy. However, the robustness of FL models against adversarial data and model attacks, noisy updates, and label-flipped data issues remain a critical concern. In this paper, we present a systematic literature review using the PRISMA framework to comprehensively analyze existing research on robust FL. Through a rigorous selection process using six key databases (ACM Digital Library, IEEE Xplore, ScienceDirect, Springer, Web of Science, and Scopus), we identify and categorize 244 studies into eight themes of ensuring robustness in FL: objective regularization, optimizer modification, differential privacy employment, additional dataset requirement and decentralization orchestration, manifold, client selection, new aggregation algorithms, and aggregation hyperparameter tuning. We synthesize the findings from these themes, highlighting the various approaches and their potential gaps proposed to enhance the robustness of FL models. Furthermore, we discuss future research directions, focusing on the potential of hybrid approaches, ensemble techniques, and adaptive mechanisms for addressing the challenges associated with robust FL. This review not only provides a comprehensive overview of the state-of-the-art in robust FL but also serves as a roadmap for researchers and practitioners seeking to advance the field and develop more robust and resilient FL systems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"15 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review of Secure Instant Messaging Applications from a Digital Forensics Perspective
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-03-31 DOI: 10.1145/3727641
Abdur Rahman Onik, Joseph Brown, Clinton Walker, Ibrahim Baggili
{"title":"A Systematic Literature Review of Secure Instant Messaging Applications from a Digital Forensics Perspective","authors":"Abdur Rahman Onik, Joseph Brown, Clinton Walker, Ibrahim Baggili","doi":"10.1145/3727641","DOIUrl":"https://doi.org/10.1145/3727641","url":null,"abstract":"The use of instant messengers in organized crime has made retrieving digital evidence from these platforms crucial in investigations. However, the wide implementation of end-to-end encryption (e2ee) has made forensic analysis challenging since all data and multimedia stored in these platforms are encrypted. To retrieve evidence, forensic examiners rely on artifacts produced by secure messaging applications. Therefore, identifying the artifacts that can be gathered from secure messaging applications is crucial during emergency analysis, as law enforcement agencies monitor these platforms. This literature review aims to provide a comprehensive understanding of artifact retrieval and forensic analysis trends by summarizing studies conducted since inception on popular secure messaging applications, including WhatsApp, Signal, Telegram, Wickr, and Threema. The review covers artifact retrieval, forensic methodologies, and tools. The review findings are significant to the cybersecurity and research communities, as well as the users of these applications. Forensic investigators can leverage the information during their investigations, cybersecurity practitioners can identify weaknesses in implementation to develop better security policies, and users can make informed decisions regarding their privacy.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"31 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Primitives in Script-based and Scriptless Payment Channel Networks: A Survey
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-03-26 DOI: 10.1145/3725846
Xiuyuan Chen, Junzuo Lai, Chao Lin, Xinyi Huang, Debiao He
{"title":"Cryptographic Primitives in Script-based and Scriptless Payment Channel Networks: A Survey","authors":"Xiuyuan Chen, Junzuo Lai, Chao Lin, Xinyi Huang, Debiao He","doi":"10.1145/3725846","DOIUrl":"https://doi.org/10.1145/3725846","url":null,"abstract":"Payment Channel Networks (PCNs), pivotal for blockchain scalability, facilitate multiple off-chain payments between any two users. They utilize scripts to define and execute payment conditions in various blockchains, but this poses privacy, efficiency, and compatibility challenges. To overcome these, scriptless cleverly embeds payment conditions into digital signatures instead of complex scripts. Cryptography effectively safeguards the construction and publication of transactions in script-based and scriptless PCNs. Although several surveys analyze PCN protocols, only a few discuss their underlying scripting languages and even none explore the cryptography involved. This survey is the first to comprehensively overview cryptography in PCNs from scripting perspectives, filling the existing knowledge void. Our analysis offers a complete picture of script-based and scriptless protocols and their coexistence. We then explore advanced cryptographic primitives in both categories, systematically studying these for the first time, and demonstrate their instantiations in atomic swaps. Finally, we research vast related surveys and provide a future-oriented outlook.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"11 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143702812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信