{"title":"Advancements in AI-Generated Content Forensics: A Systematic Literature Review","authors":"Qiang Xu, Wenpeng Mu, Jianing Li, Tanfeng Sun, Xinghao Jiang","doi":"10.1145/3760526","DOIUrl":"https://doi.org/10.1145/3760526","url":null,"abstract":"The rapid proliferation of AI-Generated Content (AIGC), spanning text, images, video, and audio, has created a dual-edged sword of unprecedented creativity and significant societal risks, including misinformation and disinformation. This survey provides a comprehensive and structured overview of the current landscape of AIGC detection technologies. We begin by chronicling the evolution of generative models, from foundational GANs to state-of-the-art diffusion and transformer-based architectures. We then systematically review detection methodologies across all modalities, organizing them into a novel taxonomy of External Detection and Internal Detection. For each modality, we trace the technical progression from early feature-based methods to advanced deep learning, while also covering critical tasks like model attribution and tampered region localization. Furthermore, we survey the ecosystem of publicly available detection tools and practical applications. Finally, we distill the primary challenges facing the field—including generalization, robustness, interpretability, and the lack of universal benchmarks—and conclude by outlining key future directions, such as the development of holistic AI Safety Agents, dynamic evaluation standards, and AI-driven governance frameworks. This survey aims to provide researchers and practitioners with a clear, in-depth understanding of the state of the art and critical frontiers in the ongoing endeavor to ensure a safe and trustworthy AIGC ecosystem.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"14 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144850855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Out-of-Distribution Detection: A Task-Oriented Survey of Recent Advances","authors":"Shuo Lu, Yingsheng Wang, Lijun Sheng, Lingxiao He, Aihua Zheng, Jian Liang","doi":"10.1145/3760390","DOIUrl":"https://doi.org/10.1145/3760390","url":null,"abstract":"Out-of-distribution (OOD) detection aims to detect test samples outside the training category space, which is an essential component in building reliable machine learning systems. Existing reviews on OOD detection primarily focus on method taxonomy, surveying the field by categorizing various approaches. However, many recent works concentrate on non-traditional OOD detection scenarios, such as test-time adaptation, multi-modal data sources and other novel contexts. In this survey, we uniquely review recent advances in OOD detection from the task-oriented perspective for the first time. According to the user’s access to the model, that is, whether the OOD detection method is allowed to modify or retrain the model, we classify the methods as training-driven or training-agnostic. Besides, considering the rapid development of pre-trained models, large pre-trained model-based OOD detection is also regarded as an important category and discussed separately. Furthermore, we provide a discussion of the evaluation scenarios, a variety of applications, and several future research directions. We believe this survey with new taxonomy will benefit the proposal of new methods and the expansion of more practical scenarios. A curated list of related papers is provided in the Github repository: https://github.com/shuolucs/Awesome-Out-Of-Distribution-Detection","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"31 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144850815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aref Miri Rekavandi, Shima Rashidi, Farid Boussaid, Stephen Hoefs, Emre Akbas, Mohammed Bennamoun
{"title":"Transformers in Small Object Detection: A Benchmark and Survey of State-of-the-Art","authors":"Aref Miri Rekavandi, Shima Rashidi, Farid Boussaid, Stephen Hoefs, Emre Akbas, Mohammed Bennamoun","doi":"10.1145/3758090","DOIUrl":"https://doi.org/10.1145/3758090","url":null,"abstract":"Transformers have rapidly gained popularity in computer vision, especially in the field of object detection. Upon examining the outcomes of state-of-the-art object detection methods, we noticed that transformers consistently outperformed well-established CNN-based detectors in almost every video or image dataset. Small objects have been identified as one of the most challenging object types in detection frameworks due to their low visibility. This paper aims to explore the performance benefits offered by such extensive networks and identify potential reasons for their Small Object Detection (SOD) superiority. We aim to investigate potential strategies that could further enhance transformers’ performance in SOD. This survey presents a taxonomy of over 60 research studies on developed transformers for the task of SOD, spanning the years 2020 to 2023. These studies encompass a variety of detection applications, including small object detection in generic images, aerial images, medical images, active millimeter images, underwater images, and videos. We also compile and present a list of 12 large-scale datasets suitable for SOD that were overlooked in previous studies and compare the performance of the reviewed studies using popular metrics such as mean Average Precision (mAP), Frames Per Second (FPS) and number of parameters. Researchers can keep track of newer studies on our web page, which is available at: https://github.com/arekavandi/Transformer-SOD.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"39 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144850844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Long Chen, Yuzhi Huang, Junyu Dong, Qi Xu, Sam Kwong, Huimin Lu, Huchuan Lu, Chongyi Li
{"title":"Underwater Optical Object Detection in the Era of Artificial Intelligence: Current, Challenge, and Future","authors":"Long Chen, Yuzhi Huang, Junyu Dong, Qi Xu, Sam Kwong, Huimin Lu, Huchuan Lu, Chongyi Li","doi":"10.1145/3759243","DOIUrl":"https://doi.org/10.1145/3759243","url":null,"abstract":"Underwater optical object detection (UOD), aiming to identify and localise objects in underwater optical images or videos, presents significant challenges due to the optical distortion, water turbidity, and changing illumination in underwater scenes. In recent years, artificial intelligence (AI) based methods, especially deep learning methods, have shown promising performance in UOD. To further facilitate future advancements, we comprehensively study AI-based UOD. In this survey, we first categorise existing algorithms into traditional machine learning-based methods and deep learning-based methods, and summarise them by considering learning strategies, experimental datasets, learning stages, employed features or techniques, and underlying frameworks. Next, we discuss the potential challenges and suggest possible solutions and new directions. We also perform both quantitative and qualitative evaluations of mainstream algorithms across multiple benchmark datasets, taking into account the diversity and biases in experimental setups. Finally, we introduce two off-the-shelf detection analysis tools, Diagnosis and TIDE, which will examine the effects of object characteristics and various types of errors on detector performance. These tools help identify the strengths and weaknesses of different detectors, providing insights for further improvement. The source code, trained models, utilized datasets, detection results, and detection analysis tools are publicly available at https://github.com/LongChenCV/UODReview and will be regularly updated.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"37 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144792851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load Balancing in the Internet of Vehicles: A Comprehensive Review of SDN and Machine Learning Approaches","authors":"Phibadeity S Marwein, Debdatta Kandar","doi":"10.1145/3759242","DOIUrl":"https://doi.org/10.1145/3759242","url":null,"abstract":"Efficient load balancing (LB) is crucial for optimizing network performance in Wireless Sensor Networks (WSN), the Internet of Things (IoT), and Unmanned Aerial Vehicles (UAV), as well as the emerging Internet of Vehicles (IoV). In this paper, we study various LB techniques across these domains, including Software-Defined Networking (SDN) and Machine Learning (ML)-based approaches. SDN enables centralized control and real-time adaptability, while ML enhances decision-making through predictive analytics. Given the limited research on IoV, we leverage insights from WSN, IoT, and UAVs to propose an innovative technique that integrates SDN with ML for intelligent, adaptive LB in IoV. This approach promises to optimize network performance, reduce latency, and improve fault tolerance, offering a new research direction in vehicular networks.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"53 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144792849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Agnostic Protocols: An Analysis of the State of the Art","authors":"Alessandro Bigiotti, Leonardo Mostarda, Alfredo Navarra, Andrea Pinna, Davide Sestili, Roberto Tonelli, Matteo Vaccargiu","doi":"10.1145/3758089","DOIUrl":"https://doi.org/10.1145/3758089","url":null,"abstract":"Blockchain is a relatively new technology that has attracted great interest in academia and industry. Given the characteristics of blockchains, the problem of inter-chain communication has become a hot topic. Numerous approaches to the problem have been proposed in order to transfer cryptocurrencies or tokens between different blockchains. However, to make the blockchain widely used, inter-chain communication must be extended to generic messages. In this paper we consider some approaches to the problem that aim at generalising the possibilities of communication. These approaches are called agnostic protocols. Our main contribution consists in presenting some emerging standards for the development of agnostic blockchain protocols, illustrating some projects that use them and understanding their peculiarities. We analyse how these protocols work, how agnostic they are and how much they lend themselves to generalising the problem of cross-chain communication between blockchains.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"7 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144778442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Neural Radiance Fields","authors":"Yun Liao, Yide Di, Hao Zhou, Kaijun Zhu, Mingyu Lu, Qing Duan, Junhui Liu","doi":"10.1145/3758085","DOIUrl":"https://doi.org/10.1145/3758085","url":null,"abstract":"View synthesis is a fundamental task in computer vision, known for its significantly higher complexity compared to conventional vision problems. The introduction of Neural Radiance Fields (NeRF) marked a major breakthrough in this field, substantially improving previous methods and pushing view synthesis to unprecedented levels. This survey aims to systematically review the progress of NeRF-based models in computer vision. We begin by explaining the core principles underlying the success of NeRF. Then, we delve into and analyze seven representative NeRF-based representation forms, including Implicit Representation, Neural Point Cloud, and others. Next, we provide a comprehensive comparison and analysis of 14 major research directions that enhance NeRF, such as Modeling Different Practical Capturing Scenarios, Generalization in Modeling, and Modeling Dynamic Scenes. In addition, we conduct both qualitative and quantitative evaluations of numerous NeRF-based methods on multiple datasets, comparing training time, rendering speed, and memory requirements. Finally, we discuss potential future research directions and challenges in this field. We hope that this work will inspire further interest and contribute to advancing the application and development of NeRF in computer vision.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"26 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144763358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing and Categorizing Emerging Cybersecurity Regulations","authors":"Angelica Marotta, Stuart Madnick","doi":"10.1145/3757318","DOIUrl":"https://doi.org/10.1145/3757318","url":null,"abstract":"As cyber-attacks become more frequent, sophisticated, and impactful, governments worldwide are responding by introducing or proposing new cybersecurity regulations. This paper examines over 170 recent regulations and trends in cybersecurity across various regions, including the United States, Europe, and beyond. It identifies 17 key features in many of these regulations, which we have grouped into 5 categories, analyzes observed patterns, and proposes areas for improvement. This paper's primary objective is to significantly contribute to the cybersecurity compliance domain by helping researchers understand the structure of these regulations and helping organizations to assess and mitigate their cyber risk within an increasingly complex and regulated cybersecurity environment. Our findings provide valuable direction to those trying to navigate the flood of new cybersecurity regulations and the governments enacting new cybersecurity regulations.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"7 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144763359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Integration of Cyber Engineering and Medical Cyber-Physical System: A Survey and Open Issues","authors":"Abhishek Kumar Pandey, Sherali Zeadally, Ashok Kumar Das, Neeraj Kumar","doi":"10.1145/3757731","DOIUrl":"https://doi.org/10.1145/3757731","url":null,"abstract":"Medical Cyber-Physical Systems (MCPS) are the prerequisites for a highly digital environment in medical facilities. All the technologies, methods, and problems that arise in developing MCPS should be mitigated systematically and continuously to meet this need. This study analytically discusses the currently available MCPS models, threat scenarios, attacks, and data breach statistics to evaluate the current security situation of the research community in the MCPS domain. The large and complex components of MCPS comprise many computational and physical aspects, making managing secure reliability challenging. To address this challenge, there is a need for security by design that incorporates built-in security functionality in the development of an MCPS. Our comprehensive review critically analyzes the current state-of-the-art in MCPS by considering various aspects, such as functionality, communication media, design characteristics, and security. Furthermore, we explore the security threats posed by MCPS as well as their potential impact. Finally, we propose a potential future pathway to effectively mitigate the identified threats by providing a promising direction for further investigation.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"30 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144763361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Build Optimization: A Systematic Literature Review","authors":"Henri Aïdasso, Mohammed Sayagh, Francis Bordeleau","doi":"10.1145/3757912","DOIUrl":"https://doi.org/10.1145/3757912","url":null,"abstract":"In modern software organizations, Continuous Integration (CI) consists of an automated build process triggered by change submissions and involving compilation, testing, and packaging to enable the continuous deployment of new software versions to end-users. While CI offers various advantages regarding software quality and delivery speed, it introduces challenges addressed by a large body of research. To better understand this literature, so as to help practitioners find solutions for their problems and guide future research, we conduct a systematic review of 97 studies published between 2006 and 2024, summarizing their goals, methodologies, datasets, and metrics. These studies target two main challenges: (1) long build durations and (2) build failures. To address the first, researchers have proposed techniques such as predicting build outcomes and durations, selective build execution, and build acceleration through caching or performance smell repair. On the other hand, build failure root causes have been studied, leading to techniques for predicting build script maintenance needs and automating repairs. Recent work also focuses on flaky build failures caused by environmental issues. Most techniques use machine learning and rely on build metrics, which we classify into five categories. Finally, we identify eight publicly available datasets to support future research on build optimization.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"15 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144763360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}