ACM Computing Surveys最新文献

筛选
英文 中文
Decoding Fake News and Hate Speech: A Survey of Explainable AI Techniques 解码假新闻和仇恨言论:可解释人工智能技术概览
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-17 DOI: 10.1145/3711123
Mikel Ngueajio, Saurav Aryal, Marcellin Atemkeng, Gloria Washington, Danda Rawat
{"title":"Decoding Fake News and Hate Speech: A Survey of Explainable AI Techniques","authors":"Mikel Ngueajio, Saurav Aryal, Marcellin Atemkeng, Gloria Washington, Danda Rawat","doi":"10.1145/3711123","DOIUrl":"https://doi.org/10.1145/3711123","url":null,"abstract":"This survey emphasizes the significance of Explainable AI (XAI) techniques in detecting hateful speech and misinformation/Fake news. It explores recent trends in detecting these phenomena, highlighting current research that reveals a synergistic relationship between them. Additionally, it presents recent trends in the use of XAI methods to mitigate the occurrences of hateful land Fake contents in conversations. The survey reviews state-of-the-art XAI approaches, algorithms, modeling datasets, as well as the evaluation metrics leveraged for assessing model interpretability, and thus provides a comprehensive summary table of the literature surveyed and relevant datasets. It concludes with an overview of key observations, offering insights into the prominent model explainability methods used in hate speech and misinformation detection. The research strengths, limitations are also presented, as well as perspectives and suggestions for future directions in this research domain.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"30 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142989096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dense Video Captioning: A Survey of Techniques, Datasets and Evaluation Protocols 密集视频字幕:技术,数据集和评估协议的调查
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-14 DOI: 10.1145/3712059
Iqra Qasim, Alexander Horsch, Dilip Prasad
{"title":"Dense Video Captioning: A Survey of Techniques, Datasets and Evaluation Protocols","authors":"Iqra Qasim, Alexander Horsch, Dilip Prasad","doi":"10.1145/3712059","DOIUrl":"https://doi.org/10.1145/3712059","url":null,"abstract":"Untrimmed videos have interrelated events, dependencies, context, overlapping events, object-object interactions, domain specificity, and other semantics that are worth highlighting while describing a video in natural language. Owing to such a vast diversity, a single sentence can only correctly describe a portion of the video. Dense Video Captioning (DVC) aims to detect and describe different events in a given video. The term DVC originated in the 2017 ActivityNet challenge, after which considerable effort has been made to address the challenge. Dense Video Captioning is divided into three sub-tasks: (1) Video Feature Extraction (VFE), (2) Temporal Event Localization (TEL), and (3) Dense Caption Generation (DCG). In this survey, we discuss all the studies that claim to perform DVC along with its sub-tasks and summarize their results. We also discuss all the datasets that have been used for DVC. Lastly, current challenges in the field are highlighted along with observatory remarks and future trends in the field.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"22 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142981760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Natural Language Processing for Dialects of a Language: A Survey 语言方言的自然语言处理研究综述
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-13 DOI: 10.1145/3712060
Aditya Joshi, Raj Dabre, Diptesh Kanojia, Zhuang Li, Haolan Zhan, Gholamreza Haffari, Doris Dippold
{"title":"Natural Language Processing for Dialects of a Language: A Survey","authors":"Aditya Joshi, Raj Dabre, Diptesh Kanojia, Zhuang Li, Haolan Zhan, Gholamreza Haffari, Doris Dippold","doi":"10.1145/3712060","DOIUrl":"https://doi.org/10.1145/3712060","url":null,"abstract":"State-of-the-art natural language processing (NLP) models are trained on massive training corpora, and report a superlative performance on evaluation datasets. This survey delves into an important attribute of these datasets: the dialect of a language. Motivated by the performance degradation of NLP models for dialectal datasets and its implications for the equity of language technologies, we survey past research in NLP for dialects in terms of datasets, and approaches. We describe a wide range of NLP tasks in terms of two categories: natural language understanding (NLU) (for tasks such as dialect classification, sentiment analysis, parsing, and NLU benchmarks) and natural language generation (NLG) (for summarisation, machine translation, and dialogue systems). The survey is also broad in its coverage of languages which include English, Arabic, German, among others. We observe that past work in NLP concerning dialects goes deeper than mere dialect classification, and extends to several NLU and NLG tasks. For these tasks, we describe classical machine learning using statistical models, along with the recent deep learning-based approaches based on pre-trained language models. We expect that this survey will be useful to NLP researchers interested in building equitable language technologies by rethinking LLM benchmarks and model architectures.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"87 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142968459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy Challenges of Large Language Models: A Survey 大型语言模型的安全和隐私挑战:调查
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-13 DOI: 10.1145/3712001
Badhan Chandra Das, M. Hadi Amini, Yanzhao Wu
{"title":"Security and Privacy Challenges of Large Language Models: A Survey","authors":"Badhan Chandra Das, M. Hadi Amini, Yanzhao Wu","doi":"10.1145/3712001","DOIUrl":"https://doi.org/10.1145/3712001","url":null,"abstract":"Large language models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering. Nowadays, LLMs have become very popular tools in natural language processing (NLP) tasks, with the capability to analyze complicated linguistic patterns and provide relevant responses depending on the context. While offering significant advantages, these models are also vulnerable to security and privacy attacks, such as jailbreaking attacks, data poisoning attacks, and personally identifiable information (PII) leakage attacks. This survey provides a thorough review of the security and privacy challenges of LLMs, along with the application-based risks in various domains, such as transportation, education, and healthcare. We assess the extent of LLM vulnerabilities, investigate emerging security and privacy attacks against LLMs, and review potential defense mechanisms. Additionally, the survey outlines existing research gaps and highlights future research directions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"29 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142968458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Group Re-identification in Surveillance Videos 监控视频中的群体再识别研究综述
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-10 DOI: 10.1145/3711126
KAMAKSHYA NAYAK, Debi Prosad Dogra
{"title":"A Comprehensive Review on Group Re-identification in Surveillance Videos","authors":"KAMAKSHYA NAYAK, Debi Prosad Dogra","doi":"10.1145/3711126","DOIUrl":"https://doi.org/10.1145/3711126","url":null,"abstract":"Computer vision plays an important role in the automated analysis of human groups. The appearance of human groups has been studied for various reasons, including detection, identification, tracking, and re-identification. Person re-identification has been studied extensively over the last decade. Despite significant efforts by the computer vision research community, person re-identification often suffers from issues such as similar clothing appearances, occlusion, viewpoint changes, etc. On the contrary, group re-identification has not received much attention. It involves identifying human groups across multiple non-overlapping camera views. It is a challenging problem that suffers from issues related to person re-identification and additional challenges like variations in the number of persons, the structural layout of groups, etc. This paper summarises the research paradigms of human group analysis. It reviews the recent advancements in group re-identification, including key challenges, datasets, and state-of-the-art methods. The paper concludes with a discussion of open research challenges and future directions in group re-identification, including the need for reliable techniques, varied datasets, and ethical considerations regarding privacy. Overall, this paper offers a thorough and up-to-date summary of the most recent findings in group re-identification. It also identifies the research gaps as placeholders for further study.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"16 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142961372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning 面向可信赖的人工智能在线广告拍卖实时竞价
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-10 DOI: 10.1145/3701741
Xiaoli Tang, Han Yu
{"title":"Towards Trustworthy AI-Empowered Real-Time Bidding for Online Advertisement Auctioning","authors":"Xiaoli Tang, Han Yu","doi":"10.1145/3701741","DOIUrl":"https://doi.org/10.1145/3701741","url":null,"abstract":"Artificial intelligence-empowred Real-Time Bidding (AIRTB) is regarded as one of the most enabling technologies for online advertising. It has attracted significant research attention from diverse fields such as pattern recognition, game theory and mechanism design. Despite of its remarkable development and deployment, the AIRTB system can sometimes harm the interest of its participants (e.g., depleting the advertisers’ budget with various kinds of fraud). As such, building trustworthy AIRTB auctioning systems has emerged as an important direction of research in this field in recent years. Due to the highly interdisciplinary nature of this field and a lack of a comprehensive survey, it is a challenge for researchers to enter this field and contribute towards building trustworthy AIRTB technologies. This paper bridges this important gap in trustworthy AIRTB literature. We start by analysing the key concerns of various AIRTB stakeholders and identify five main dimensions of trust building in AIRTB, namely robustness, explainability, fairness, auditability & accountability, and environmental well-being. For each of these dimensions, we propose a unique taxonomy of the state of the art, trace the root causes of possible breakdown of trust, and discuss the necessity of the given dimension. This is followed by a comprehensive review of existing strategies for fulfilling the requirements of each trust dimension. In addition, we discuss the promising future directions of research essential towards building trustworthy AIRTB systems to benefit the field of online advertising.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"82 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142961368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities 车辆网络中的位置隐私方案:分类、比较分析、设计挑战和未来机遇
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-10 DOI: 10.1145/3711681
Ikram Ullah, Munam Ali Shah, Abid Khan, Mohsen Guizani
{"title":"Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities","authors":"Ikram Ullah, Munam Ali Shah, Abid Khan, Mohsen Guizani","doi":"10.1145/3711681","DOIUrl":"https://doi.org/10.1145/3711681","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) have revolutionized the world with smart traffic management, better utilizing the road environment, and providing safety and convenience to the vehicles’ drivers. Despite the useful features of VANETs, there are some privacy issues, which hinder their way toward achieving smarter and safer traffic in the world. Location privacy is one of the critical research challenges for the efficient deployment of VANETs. This challenge can be solved using a pseudonym instead of an actual vehicle identity in the beacon messages. For this purpose, many location privacy schemes are introduced in the literature. In this paper, we thoroughly review the existing location privacy schemes and present their comprehensive taxonomy. We discuss the design challenges for the development of an efficient location privacy scheme. Moreover, the existing location privacy techniques are critically analyzed based on diverse road network environments and parameters. Various issues and challenges regarding the pseudonym-changing process are elaborated in detail. Finally, we discuss the future trends for the implementation of location privacy in a vehicular network.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"25 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142961375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI Empowered Network Digital Twins: Architecture, Technologies, and Applications 生成人工智能支持的网络数字双胞胎:架构、技术和应用
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-10 DOI: 10.1145/3711682
Tong Li, Qingyue Long, Haoye Chai, Shiyuan Zhang, Fenyu Jiang, Haoqiang Liu, Wenzhen Huang, Depeng Jin, Yong Li
{"title":"Generative AI Empowered Network Digital Twins: Architecture, Technologies, and Applications","authors":"Tong Li, Qingyue Long, Haoye Chai, Shiyuan Zhang, Fenyu Jiang, Haoqiang Liu, Wenzhen Huang, Depeng Jin, Yong Li","doi":"10.1145/3711682","DOIUrl":"https://doi.org/10.1145/3711682","url":null,"abstract":"The rapid advancement of mobile networks highlights the limitations of traditional network planning and optimization methods, particularly in modeling, evaluation, and application. Network Digital Twins, which simulate networks in the digital domain for evaluation, offer a solution to these challenges. This concept is further enhanced by generative AI technology, which promises more efficient and accurate AI-driven data generation for network simulation and optimization. This survey provides insights into generative AI-empowered network digital twins. We begin by outlining the architecture of a network digital twin, which encompasses both digital and physical domains. This architecture involves four key steps: data processing and network monitoring, digital replication and network simulation, designing and training network optimizers, Sim2Real and network control. Next, we systematically discuss the related studies in each step and make a detailed taxonomy of the problem studied, the methods used, and the key designs leveraged. Each step is examined with a focus on the role of generative AI, from estimating missing data and simulating network behaviors to designing control strategies and bridging the gap between digital and physical domains. Finally, we discuss the open issues and challenges of generative AI-based network digital twins.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"82 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142961341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review 可信赖的基于人工智能的云应用性能诊断系统综述
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-09 DOI: 10.1145/3701740
Ruyue Xin, Jingye Wang, Peng Chen, Zhiming Zhao
{"title":"Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review","authors":"Ruyue Xin, Jingye Wang, Peng Chen, Zhiming Zhao","doi":"10.1145/3701740","DOIUrl":"https://doi.org/10.1145/3701740","url":null,"abstract":"Performance diagnosis systems are defined as detecting abnormal performance phenomena and play a crucial role in cloud applications. An effective performance diagnosis system is often developed based on artificial intelligence (AI) approaches, which can be summarized into a general framework from data to models. However, the AI-based framework has potential hazards that could degrade the user experience and trust. For example, a lack of data privacy may compromise the security of AI models, and low robustness can be hard to apply in complex cloud environments. Therefore, defining the requirements for building a trustworthy AI-based performance diagnosis system has become essential. This article systematically reviews trustworthiness requirements in AI-based performance diagnosis systems. We first introduce trustworthiness requirements and extract six key requirements from a technical perspective, including data privacy, fairness, robustness, explainability, efficiency, and human intervention. We then unify these requirements into a general performance diagnosis framework, ranging from data collection to model development. Next, we comprehensively provide related works for each component and concrete actions to improve trustworthiness in the framework. Finally, we identify possible research directions and challenges for the future development of trustworthy AI-based performance diagnosis systems.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"57 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142940440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools 密码管理器和双因素认证工具的深入分析
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-01-06 DOI: 10.1145/3711117
Mohammed Jubur, PrakashPrakash Shrestha, Nitesh Saxena
{"title":"An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools","authors":"Mohammed Jubur, PrakashPrakash Shrestha, Nitesh Saxena","doi":"10.1145/3711117","DOIUrl":"https://doi.org/10.1145/3711117","url":null,"abstract":"Passwords remain the primary authentication method in online services, a domain increasingly crucial in our digital age. However, passwords suffer from several well-documented security and usability issues. Addressing these concerns, password managers and two-factor authentication (2FA) have emerged as key solutions. This paper examines these methods with a focus on enhancing password security without compromising usability. Utilizing an adapted Bonneau et al. (IEEE S&P 2012) framework tailored to the specific challenges of password managers and 2FA. This allows us to categorize and evaluate prominent solutions from both academic research and industry practice, with a focus on their security, privacy, and usability. A crucial aspect of our study involves evaluating the effectiveness of a combined PM+2FA system in balancing security and usability. This study not only examines current trends but also suggests potential areas for future research, offering valuable insights to both users and developers in the evolving landscape of digital security.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"12 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142929492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信