ACM Computing Surveys最新文献

筛选
英文 中文
A Comprehensive Survey of Transformers in Text Recognition: Techniques, Challenges, and Future Directions 文本识别中变形的综合研究:技术、挑战和未来方向
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-09 DOI: 10.1145/3771273
Ali Afkari-Fahandari, Elham Shabaninia, Fatemeh Asadi-Zeydabadi, Hossein Nezamabadi-Pour
{"title":"A Comprehensive Survey of Transformers in Text Recognition: Techniques, Challenges, and Future Directions","authors":"Ali Afkari-Fahandari, Elham Shabaninia, Fatemeh Asadi-Zeydabadi, Hossein Nezamabadi-Pour","doi":"10.1145/3771273","DOIUrl":"https://doi.org/10.1145/3771273","url":null,"abstract":"Optical character recognition is a rapidly evolving field within pattern recognition, enabling the automatic conversion of printed or handwritten text images into machine-readable formats. This technology plays a critical role across various sectors, including banking, healthcare, government, and education. While Optical character recognition systems encompass multiple stages such as text detection, segmentation, and post-processing, this paper focuses on text recognition as a core and technically challenging component. In particular, we provide an in-depth review of recent advances driven by Transformer-based models, which have significantly pushed the state-of-the-art. To contextualize these advancements, a detailed comparative analysis of Transformer-based techniques is presented against earlier deep learning approaches, highlighting their respective limitations and the improvements introduced by Transformers, including parallel sequence processing, global context modeling, better handling of long-range dependencies, and enhanced robustness to irregular or noisy text layouts. We also examine widely used benchmark datasets in the literature and provide a detailed discussion of the performance achieved by recent state-of-the-art methods. Finally, this survey outlines open research challenges and potential future directions. It aims to serve as a comprehensive reference for both novice and experienced researchers by summarizing the latest developments in text recognition, including architectures, datasets, evaluation metrics, and practical considerations in model performance trade-offs and deployment.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"11 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145247628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Proactive Deepfake Defense: Disruption and Watermarking 主动深度伪造防御研究综述:干扰与水印
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-08 DOI: 10.1145/3771296
Hong-Hanh Nguyen-Le, Van-Tuan Tran, Thuc Nguyen, Nhien-An Le-Khac
{"title":"A Survey on Proactive Deepfake Defense: Disruption and Watermarking","authors":"Hong-Hanh Nguyen-Le, Van-Tuan Tran, Thuc Nguyen, Nhien-An Le-Khac","doi":"10.1145/3771296","DOIUrl":"https://doi.org/10.1145/3771296","url":null,"abstract":"The rapid proliferation of generative AI has led to led to unprecedented capabilities in synthesizing realistic deepfakes (DFs) across multiple modalities. This raises significant concerns regarding privacy, security, and copyright protection. Unlike passive detection approaches that operate after DFs have been created and distributed, proactive defense mechanisms aim to prevent the generation of malicious synthetic content at its source. This paper provides a comprehensive survey of current proactive DF defense strategies, including Disruption and Watermarking. Disruption approaches protect individuals’ data by introducing imperceptible perturbations that prevent unauthorized exploitation by generative models, while watermarking approaches embed verifiable messages into data or models to enable content authentication and attribution. We also analyze proactive approaches across various evaluation metrics (imperceptibility, protectability/detectability, transferability, traceability, and robustness), and examine their effectiveness in real-world settings. Furthermore, we review the evolution of DF generation techniques, highlighting their rapid developments. Finally, we identify key challenges and promising future research directions to enhance proactive defense mechanisms.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"7 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145247631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Representations of Programs: A Systematic Literature Review 程序的深度学习表示:系统的文献综述
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-08 DOI: 10.1145/3769008
Deepika Shanmugasundaram, Pallavi Arivukkarasu, Huaming Chen, Haipeng Cai
{"title":"Deep Learning Representations of Programs: A Systematic Literature Review","authors":"Deepika Shanmugasundaram, Pallavi Arivukkarasu, Huaming Chen, Haipeng Cai","doi":"10.1145/3769008","DOIUrl":"https://doi.org/10.1145/3769008","url":null,"abstract":"In the contemporary era, deep learning (DL) is increasingly recognized as a promising approach for enabling and optimizing various techniques, notably in the domain of <jats:italic toggle=\"yes\">DL for code</jats:italic> (software programs). In essence, deep learning is mainly representation learning, which naturally holds for this domain. Thus, at the core of DL for code is deep representation learning for programs. The learned program representations can then be applied to various coding related tasks, such as detecting vulnerabilities, providing recommendations for API usage, and extracting semantic and syntactic insights from extensive code lines. This is achieved by harnessing deep neural network <jats:italic toggle=\"yes\">architectures</jats:italic> and deep-learning <jats:italic toggle=\"yes\">algorithms</jats:italic> that take programs as <jats:italic toggle=\"yes\">inputs</jats:italic> , serving various software engineering <jats:italic toggle=\"yes\">applications</jats:italic> . In this paper, we conduct a systematic literature search to review studies pertaining to the representation of programs using deep learning approaches and their corresponding applications. Our search yielded 178 primary studies published between 2017 and 2023. Through these studies in the latest literature, we provide a systematization of knowledge in deep learning representation of programs, concerning the <jats:italic toggle=\"yes\">raw inputs</jats:italic> to the learning pipeline, <jats:italic toggle=\"yes\">neural network architecture</jats:italic> employed, learning algorithm utilized, and downstream tasks (i.e., <jats:italic toggle=\"yes\">applications</jats:italic> ) of the learned representations. While examining the current landscape, we also identify limitations and challenges faced in the state of the art, as well as promising future research directions in deep program representation learning.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"56 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145247629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Privacy-Preserving Computing in the Automotive Domain 汽车领域隐私保护计算研究综述
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-08 DOI: 10.1145/3770580
Nergiz Yuca, Nikolay Matyunin, Ektor Arzoglou, Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser
{"title":"A Survey on Privacy-Preserving Computing in the Automotive Domain","authors":"Nergiz Yuca, Nikolay Matyunin, Ektor Arzoglou, Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser","doi":"10.1145/3770580","DOIUrl":"https://doi.org/10.1145/3770580","url":null,"abstract":"As vehicles become increasingly connected and autonomous, they accumulate and manage various personal data, thereby presenting a key challenge in preserving privacy during data sharing and processing. This survey reviews applications of Secure Multi-Party Computation (MPC) and Homomorphic Encryption (HE) that address these privacy concerns in the automotive domain. First, we identify the scope of privacy-sensitive use cases for these technologies, by surveying existing works that address privacy issues in different automotive contexts, such as location-based services, mobility infrastructures, traffic management, etc. Then, we review recent works that employ MPC and HE as solutions for these use cases in detail. Our survey highlights the applicability of these privacy-preserving technologies in the automotive context, while also identifying challenges and gaps in the current research landscape. This work aims to provide a clear and comprehensive overview of this emerging field and to encourage further research in this domain.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"55 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145247556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Deep Learning for Anomaly Detection in Automotive Trucks: A Survey 无监督深度学习在汽车卡车异常检测中的应用研究
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-07 DOI: 10.1145/3771089
Manuel Hirth, Daniel Meier, Ottmar Gehring, Nasser Jazdi, Enkelejda Kasneci
{"title":"Unsupervised Deep Learning for Anomaly Detection in Automotive Trucks: A Survey","authors":"Manuel Hirth, Daniel Meier, Ottmar Gehring, Nasser Jazdi, Enkelejda Kasneci","doi":"10.1145/3771089","DOIUrl":"https://doi.org/10.1145/3771089","url":null,"abstract":"As the collection of process data in intelligent vehicles progresses, using this data in data-driven prognosis models will become increasingly relevant. Anomaly detection in sensor data plays a critical role in ensuring vehicle safety, reliability, efficiency, and to automatically identifying abnormal behavior. The different operating points and design variants of the trucks make a manual analysis with statistical methods or expert knowledge impossible. Difficult is that, in most cases, there are no labels for the data, and primarily, only normal behavior data with sporadic error cases are available. Clustering, unsupervised, one-class classification, and anomaly detection approaches appear promising. This survey paper explores the application of unsupervised deep learning techniques in sensor data collected from trucks. We review and analyze various approaches, discuss their strengths and limitations, and identify open research challenges.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"18 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145235134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Stereotype Detection in Natural Language Processing 自然语言处理中的刻板印象检测研究综述
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-06 DOI: 10.1145/3770754
Alessandra Teresa Cignarella, Anastasia Giachanou, Els Lefever
{"title":"A Survey on Stereotype Detection in Natural Language Processing","authors":"Alessandra Teresa Cignarella, Anastasia Giachanou, Els Lefever","doi":"10.1145/3770754","DOIUrl":"https://doi.org/10.1145/3770754","url":null,"abstract":"Stereotypes influence social perceptions and can escalate into discrimination and violence. While NLP research has extensively addressed gender bias and hate speech, stereotype detection remains an emerging field with significant societal implications. This work presents a survey of existing research, drawing on definitions from psychology, sociology, and philosophy. A semi-automatic literature review was conducted using Semantic Scholar, through which over 6,000 papers (published between 2000–2025) were retrieved and filtered. The analysis identifies key trends, methodologies, challenges and future directions. The findings emphasize the potential of stereotype detection as an early-monitoring tool to prevent bias escalation and the rise of hate speech. The conclusions call for a broader, multilingual, and intersectional approach in NLP studies.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"103 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145235137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Defenses Against AI-Generated Visual Media: Detection, Disruption, and Authentication 对人工智能生成的视觉媒体的防御调查:检测、破坏和认证
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-04 DOI: 10.1145/3770916
Jingyi Deng, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Zhe Peng, Qian Wang, Chao Shen
{"title":"A Survey of Defenses Against AI-Generated Visual Media: Detection, Disruption, and Authentication","authors":"Jingyi Deng, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Zhe Peng, Qian Wang, Chao Shen","doi":"10.1145/3770916","DOIUrl":"https://doi.org/10.1145/3770916","url":null,"abstract":"Deep generative models have demonstrated impressive performance in various computer vision applications, including image synthesis, video generation, and medical analysis. Despite their significant advancements, these models may be used for malicious purposes, such as misinformation, deception, and copyright violation. In this paper, we provide a systematic and timely review of research efforts on defenses against AI-generated visual media, covering detection, disruption, and authentication. We review existing methods and summarize the mainstream defense-related tasks within a unified passive and proactive framework. Moreover, we survey the derivative tasks concerning the trustworthiness of defenses, such as their robustness and fairness. For each defense strategy, we formulate its general pipeline and propose a multidimensional taxonomy applicable across defense tasks, based on methodological strategies. Additionally, we summarize the commonly used evaluation datasets, criteria, and metrics. Finally, by analyzing the reviewed studies, we provide insights into current research challenges and suggest possible directions for future research.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"110 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145215778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of the Use of Augmented Reality in Pedestrian Navigation 增强现实技术在行人导航中的应用综述
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-04 DOI: 10.1145/3770917
Yu Zhao, Holly Gagnon, Jeanine Stefanucci, Sarah Creem-Regehr, Bobby Bodenheimer
{"title":"A Systematic Review of the Use of Augmented Reality in Pedestrian Navigation","authors":"Yu Zhao, Holly Gagnon, Jeanine Stefanucci, Sarah Creem-Regehr, Bobby Bodenheimer","doi":"10.1145/3770917","DOIUrl":"https://doi.org/10.1145/3770917","url":null,"abstract":"Spatial computing in augmented reality (AR) overlays digital information into users’ view or immediate physical space, enhancing how we interact with our surroundings. It holds promise for pedestrian navigation, whether it is safety-critical or requires multi-tasking and real-time spatial information processing. Our systematic review of 79 articles delves into AR pedestrian navigation, covering device types, tracking methods, information taxonomy, and an evaluation of both technical and human factors. We highlight trends and future research directions, aiming to guide researchers and practitioners in identifying suitable techniques and designs that serve their applications and spurring innovation in adaptable systems and design concepts.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"97 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145215689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workload Shifting Techniques: From Digital Inebriation to Sobriety 工作量转移技术:从数字醉酒到清醒
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-03 DOI: 10.1145/3769301
Nicolas Tirel, Philippe Roose, Sergio Ilarri, Adel Noureddine, Olivier Le Goaër
{"title":"Workload Shifting Techniques: From Digital Inebriation to Sobriety","authors":"Nicolas Tirel, Philippe Roose, Sergio Ilarri, Adel Noureddine, Olivier Le Goaër","doi":"10.1145/3769301","DOIUrl":"https://doi.org/10.1145/3769301","url":null,"abstract":"Computing demand in cloud environments has grown exponentially over the past decade, due to the increase in cloud workload related to new services such as artificial intelligence, autonomous vehicles, augmented reality, etc. As a result, the ICT sector has seen its carbon emissions increase. It is possible to adopt less energy-intensive strategies and consume electricity produced by renewable energy to limit the increase in carbon emissions. In this paper, we present a review of the workload-shifting techniques available for sustainable workload deployment, providing an innovative framework that can be used to analyze energy-aware approaches that apply any type of shifting technique. We identified three main concepts: compute a workload at a different time, deploy a workload and/or its data in a different location, or use alternative processing to provide a good-enough option for a workload. A definition and some examples are given for each shifting concept, and then we explore the opportunities and challenges of combining different shifting techniques.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"121 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145209843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Self-Supervised Learning in Time Series Anomaly Detection: Recent Advances and Open Challenges 自监督学习在时间序列异常检测中的研究进展与挑战
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-03 DOI: 10.1145/3770575
Aitor Sánchez-Ferrera, Borja Calvo, Jose A. Lozano
{"title":"A Review on Self-Supervised Learning in Time Series Anomaly Detection: Recent Advances and Open Challenges","authors":"Aitor Sánchez-Ferrera, Borja Calvo, Jose A. Lozano","doi":"10.1145/3770575","DOIUrl":"https://doi.org/10.1145/3770575","url":null,"abstract":"Time series anomaly detection presents various challenges due to the sequential and dynamic nature of time-dependent data. Traditional unsupervised methods frequently encounter difficulties in generalization, often overfitting to known normal patterns observed during training and struggling to adapt to unseen normality. In response to this limitation, self-supervised techniques for time series have garnered attention as a potential solution to undertake this obstacle and enhance the performance of anomaly detectors. This paper presents a comprehensive review of the recent methods that make use of self-supervised learning for time series anomaly detection. A taxonomy is proposed to categorize these methods based on their primary characteristics, facilitating a clear understanding of their diversity within this field. The information contained in this survey, along with additional details that will be periodically updated, is available on the following GitHub repository: https://github.com/Aitorzan3/Awesome-Self-Supervised-Time-Series-Anomaly-Detection.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"152 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145209842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信