ACM Computing Surveys最新文献

筛选
英文 中文
Multi-Scale Simulation of Complex Systems: A Perspective of Integrating Knowledge and Data 复杂系统的多尺度模拟:整合知识与数据的视角
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-04-03 DOI: 10.1145/3654662
Huandong Wang, Huan Yan, Can Rong, Yuan Yuan, Fenyu Jiang, Zhenyu Han, Hongjie Sui, Depeng Jin, Yong Li
{"title":"Multi-Scale Simulation of Complex Systems: A Perspective of Integrating Knowledge and Data","authors":"Huandong Wang, Huan Yan, Can Rong, Yuan Yuan, Fenyu Jiang, Zhenyu Han, Hongjie Sui, Depeng Jin, Yong Li","doi":"10.1145/3654662","DOIUrl":"https://doi.org/10.1145/3654662","url":null,"abstract":"<p>Complex system simulation has been playing an irreplaceable role in understanding, predicting, and controlling diverse complex systems. In the past few decades, the multi-scale simulation technique has drawn increasing attention for its remarkable ability to overcome the challenges of complex system simulation with unknown mechanisms and expensive computational costs. In this survey, we will systematically review the literature on multi-scale simulation of complex systems from the perspective of knowledge and data. Firstly, we will present background knowledge about simulating complex systems and the scales in complex systems. Then, we divide the main objectives of multi-scale modeling and simulation into five categories by considering scenarios with clear scale and scenarios with unclear scale, respectively. After summarizing the general methods for multi-scale simulation based on the clues of knowledge and data, we introduce the adopted methods to achieve different objectives. Finally, we introduce the applications of multi-scale simulation in typical matter systems and social systems.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140346328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Horizontal Federated Recommender System: A Survey 横向联合推荐系统:调查
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-04-03 DOI: 10.1145/3656165
Lingyun Wang, Hanlin Zhou, Yinwei Bao, Xiaoran Yan, Guojiang Shen, Xiangjie Kong
{"title":"Horizontal Federated Recommender System: A Survey","authors":"Lingyun Wang, Hanlin Zhou, Yinwei Bao, Xiaoran Yan, Guojiang Shen, Xiangjie Kong","doi":"10.1145/3656165","DOIUrl":"https://doi.org/10.1145/3656165","url":null,"abstract":"<p>Due to underlying privacy-sensitive information in user-item interaction data, the risk of privacy leakage exists in the centralized-training recommender system (RecSys). To this issue, federated learning, a privacy-oriented distributed computing paradigm, is introduced and promotes the crossing field “Federated Recommender System (FedRec).” Regarding data distribution characteristics, there are horizontal, vertical and transfer variants, where horizontal FedRec (HFedRec) occupies a dominant position. User devices can personally participate in the horizontal federated architecture, making user-level privacy feasible. Therefore, we target the horizontal point and summarize existing works more elaborately than existing FedRec surveys: (1) From the model perspective, we group them into different learning paradigms (<i>e.g.</i>, deep learning and meta learning). (2) From the privacy perspective, privacy-preserving techniques are systematically organized (<i>e.g.</i>, homomorphic encryption and differential privacy). (3) From the federated perspective, fundamental issues (<i>e.g.</i>, communication and fairness) are discussed. (4) Each perspective has detailed subcategories, and we specifically state their unique challenges with the observation of current progress. (5) Finally, we figure out potential issues and promising directions for future research.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140346377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Politeness in Natural Language Processing: A Survey 自然语言处理中的计算礼貌:调查
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-04-02 DOI: 10.1145/3654660
Priyanshu Priya, Mauajama Firdaus, Asif Ekbal
{"title":"Computational Politeness in Natural Language Processing: A Survey","authors":"Priyanshu Priya, Mauajama Firdaus, Asif Ekbal","doi":"10.1145/3654660","DOIUrl":"https://doi.org/10.1145/3654660","url":null,"abstract":"<p>Computational approach to politeness is the task of automatically predicting and/or generating politeness in text. This is a pivotal task for conversational analysis, given the ubiquity and challenges of politeness in interactions. The computational approach to politeness has witnessed great interest from the conversational analysis community. This article is a compilation of past works in computational politeness in natural language processing. We view four milestones in the research so far, <i>viz.</i> supervised and weakly-supervised feature extraction to identify and induce politeness in a given text, incorporation of context beyond the target text, study of politeness across different social factors, and study the relationship between politeness and various socio-linguistic cues. In this article, we describe the datasets, approaches, trends, and issues in computational politeness research. We also discuss representative performance values and provide pointers to future works, as given in the prior works. In terms of resources to understand the state-of-the-art, this survey presents several valuable illustrations — most prominently, a table summarizing the past papers along different dimensions, such as the types of features, annotation techniques, and datasets used.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140340746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain Adaptation and Generalization of Functional Medical Data: A Systematic Survey of Brain Data 功能医学数据的领域适应性和通用性:脑数据系统调查
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-04-01 DOI: 10.1145/3654664
Gita Sarafraz, Armin Behnamnia, Mehran Hosseinzadeh, Ali Balapour, Amin Meghrazi, Hamid R. Rabiee
{"title":"Domain Adaptation and Generalization of Functional Medical Data: A Systematic Survey of Brain Data","authors":"Gita Sarafraz, Armin Behnamnia, Mehran Hosseinzadeh, Ali Balapour, Amin Meghrazi, Hamid R. Rabiee","doi":"10.1145/3654664","DOIUrl":"https://doi.org/10.1145/3654664","url":null,"abstract":"<p>In spite of the excellent capabilities of machine learning algorithms, their performance deteriorates when the distribution of test data differs from the distribution of training data. In medical data research, this problem is exacerbated by its connection to human health, expensive equipment, and meticulous setups. Consequently, achieving domain generalizations (DG) and domain adaptations (DA) under distribution shifts is an essential step in the analysis of medical data. As the first systematic review of DG and DA on functional brain signals, the paper discusses and categorizes various methods, tasks, and datasets in this field. Moreover, it discusses relevant directions for future research.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140333517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Automatic Generation of Figurative Language: From Rule-based Systems to Large Language Models 关于自动生成形象语言的调查:从基于规则的系统到大型语言模型
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-03-30 DOI: 10.1145/3654795
Huiyuan Lai, Malvina Nissim
{"title":"A Survey on Automatic Generation of Figurative Language: From Rule-based Systems to Large Language Models","authors":"Huiyuan Lai, Malvina Nissim","doi":"10.1145/3654795","DOIUrl":"https://doi.org/10.1145/3654795","url":null,"abstract":"<p>Figurative language generation (FLG) is the task of reformulating a given text to include a desired figure of speech, such as a hyperbole, a simile, and several others, while still being faithful to the original context. This is a fundamental, yet challenging task in Natural Language Processing (NLP), which has recently received increased attention due to the promising performance brought by pre-trained language models. Our survey provides a systematic overview of the development of FLG, mostly in English, starting with the description of some common figures of speech, their corresponding generation tasks and datasets. We then focus on various modelling approaches and assessment strategies, leading us to discussing some challenges in this field, and suggesting some potential directions for future research. To the best of our knowledge, this is the first survey that summarizes the progress of FLG including the most recent development in NLP. We also organize corresponding resources, e.g., paper lists and datasets, and make them accessible in an open repository. We hope this survey can help researchers in NLP and related fields to easily track the academic frontier, providing them with a landscape and a roadmap of this area.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140329119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning in Metaverse Security: Current Solutions and Future Challenges 元数据安全中的机器学习:当前的解决方案和未来的挑战
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-03-28 DOI: 10.1145/3654663
Yazan Otoum, Navya Gottimukkala, Neeraj Kumar, Amiya Nayak
{"title":"Machine Learning in Metaverse Security: Current Solutions and Future Challenges","authors":"Yazan Otoum, Navya Gottimukkala, Neeraj Kumar, Amiya Nayak","doi":"10.1145/3654663","DOIUrl":"https://doi.org/10.1145/3654663","url":null,"abstract":"<p>The Metaverse, positioned as the next frontier of the internet, has the ambition to forge a virtual shared realm characterized by immersion, hyper spatiotemporal dynamics, and self-sustainability. Recent technological strides in AI, Extended Reality (XR), 6G, and blockchain propel the Metaverse closer to realization, gradually transforming it from science fiction into an imminent reality. Nevertheless, the extensive deployment of the Metaverse faces substantial obstacles, primarily stemming from its potential to infringe on privacy and be susceptible to security breaches, whether inherent in its underlying technologies or arising from the evolving digital landscape. Metaverse security provisioning is poised to confront various foundational challenges owing to its distinctive attributes, encompassing immersive realism, hyper spatiotemporally, sustainability, and heterogeneity. This paper undertakes a comprehensive study of the security and privacy challenges facing the Metaverse, leveraging Machine Learning (ML) models for this purpose. In particular, our focus centers on an innovative distributed Metaverse architecture characterized by interactions across 3D worlds. Subsequently, we conduct a thorough review of the existing cutting-edge measures designed for Metaverse systems while also delving into the discourse surrounding security and privacy threats. As we contemplate the future of Metaverse systems, we outline directions for open research pursuits in this evolving landscape.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140310635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FairSNA: Algorithmic Fairness in Social Network Analysis FairSNA:社交网络分析中的算法公平性
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-03-27 DOI: 10.1145/3653711
Akrati Saxena, George Fletcher, Mykola Pechenizkiy
{"title":"FairSNA: Algorithmic Fairness in Social Network Analysis","authors":"Akrati Saxena, George Fletcher, Mykola Pechenizkiy","doi":"10.1145/3653711","DOIUrl":"https://doi.org/10.1145/3653711","url":null,"abstract":"<p>In recent years, designing fairness-aware methods has received much attention in various domains, including machine learning, natural language processing, and information retrieval. However, in social network analysis (SNA), designing fairness-aware methods for various research problems by considering structural bias and inequalities of large-scale social networks has not received much attention. In this work, we highlight how the structural bias of social networks impacts the fairness of different SNA methods. We further discuss fairness aspects that should be considered while proposing network structure-based solutions for different SNA problems, such as link prediction, influence maximization, centrality ranking, and community detection. This survey-cum-vision clearly highlights that very few works have considered fairness and bias while proposing solutions; even these works are mainly focused on some research topics, such as link prediction, influence maximization, and PageRank. However, fairness has not yet been addressed for other research topics, such as influence blocking and community detection. We review state-of-the-art for different research topics in SNA, including the considered fairness constraints, their limitations, and our vision. This survey also covers evaluation metrics, available datasets, and synthetic network generating models used in such studies. Finally, we highlight various open research directions that require researchers’ attention to bridge the gap between fairness and SNA.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140297396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How many FIDO protocols are needed? Analysing the technology, security and compliance 需要多少个 FIDO 协议?分析技术、安全性和合规性
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-03-27 DOI: 10.1145/3654661
Anna Angelogianni, Ilias Politis, Christos Xenakis
{"title":"How many FIDO protocols are needed? Analysing the technology, security and compliance","authors":"Anna Angelogianni, Ilias Politis, Christos Xenakis","doi":"10.1145/3654661","DOIUrl":"https://doi.org/10.1145/3654661","url":null,"abstract":"<p>To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap between user friendly interfaces and advanced security features, the Fast IDentity Online (FIDO) alliance defined a number of authentication protocols. The existing literature leverages all versions of the FIDO protocols, without indicating the reasons behind the choice of each individual FIDO protocol (i.e., U2F, UAF, FIDO2). Inevitably, the question ”which protocol is more suitable per case” becomes significant. To provide an answer to the previous question, this paper performs a thorough comparative analysis on the different protocol specifications and their technological and market support, to identify whether any protocol has become obsolete. To reach to a conclusion, the proposed approach i) explores the existing literature, ii) analyses the specifications released by the FIDO Alliance, elaborating on the security characteristics, iii) inspects the technical adoption by the industry and iv) investigates the compliance of the FIDO with standards, regulations and other identity verification protocols. Our results indicate that FIDO2 is the most widely adopted solution; however, U2F remains supported by numerous web services as a two-factor authentication (2FA) choice, while UAF continues to be utilized in mobile clients seeking to offer the Transaction Confirmation feature.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140297401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep and Exploratory Works 从网络物理系统中的对抗性攻击中恢复:浅层、深层和探索性工作
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-03-27 DOI: 10.1145/3653974
Pengyuan Lu, Lin Zhang, Mengyu Liu, Kaustubh Sridhar, Oleg Sokolsky, Fanxin Kong, Insup Lee
{"title":"Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep and Exploratory Works","authors":"Pengyuan Lu, Lin Zhang, Mengyu Liu, Kaustubh Sridhar, Oleg Sokolsky, Fanxin Kong, Insup Lee","doi":"10.1145/3653974","DOIUrl":"https://doi.org/10.1145/3653974","url":null,"abstract":"<p>Cyber-physical systems (CPS) have experienced rapid growth in recent decades. However, like any other computer-based systems, malicious attacks evolve mutually, driving CPS to undesirable physical states and potentially causing catastrophes. Although the current state-of-the-art is well aware of this issue, the majority of researchers have not focused on CPS recovery, the procedure we defined as restoring a CPS’s physical state back to a target condition under adversarial attacks. To call for attention on CPS recovery and identify existing efforts, we have surveyed a total of 30 relevant papers. We identify a major partition of the proposed recovery strategies: shallow recovery vs. deep recovery, where the former does not use a dedicated recovery controller while the latter does. Additionally, we surveyed exploratory research on topics that facilitate recovery. From these publications, we discuss the current state-of-the-art of CPS recovery, with respect to applications, attack type, attack surfaces and system dynamics. Then, we identify untouched sub-domains in this field and suggest possible future directions for researchers.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140297394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From conventional to programmable matter systems: A review of design, materials, and technologies 从传统物质系统到可编程物质系统:设计、材料和技术综述
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2024-03-26 DOI: 10.1145/3653671
Ahmed Amine Chafik, Jaafar Gaber, Souad Tayane, Mohamed Ennaji, Julien Bourgeois, Tarek El-Ghazawi
{"title":"From conventional to programmable matter systems: A review of design, materials, and technologies","authors":"Ahmed Amine Chafik, Jaafar Gaber, Souad Tayane, Mohamed Ennaji, Julien Bourgeois, Tarek El-Ghazawi","doi":"10.1145/3653671","DOIUrl":"https://doi.org/10.1145/3653671","url":null,"abstract":"<p>Programmable matter represents a system of elements whose interactions can be programmed for a certain behavior to emerge (e.g. color, shape) upon suitable commands (e.g., instruction, stimuli) by altering its physical characteristics. Even though its appellation may refer to a morphable physical material, programmable matter has been represented through several approaches from different perspectives (e.g., robots, smart materials) that seek the same objective: controllable behavior such as smart shape alteration. Researchers, engineers, and artists have expressed interest in the development of smart modeling clay as a novel alternative to conventional matter and classical means of prototyping. Henceforth, users will be able to do/undo/redo forms based on computed data (CAD) or interactions (sensors), which will help them unlock more features and increase the usefulness of their products. However, with such a promising technology, many challenges need to be addressed, as programmable matter relies on energy consumption, data transmission, stimuli control, and shape formation mechanisms. Furthermore, numerous devices and technologies are created under the name of programmable matter, which may pose ambiguity to the control strategies. In this study, we determine the basic operations required to form a shape, then review different realizations using the shape shifting ability of programmable matter, their fitting classifications, and finally discuss potential challenges.</p>","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":null,"pages":null},"PeriodicalIF":16.6,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140291632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信