-
AI-Empowered Persuasive Video Generation: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-22 Chang Liu, Han Yu
Promotional videos are rapidly becoming a popular medium for persuading people to change their behaviours in many settings (e.g., online shopping, social enterprise initiatives). Today, such videos are often produced by professionals, which is a time-, labour- and cost-intensive undertaking. In order to produce such contents to support a large applications (e.g., e-commerce), the field of artificial
-
Security threats, countermeasures, and challenges of digital supply chains ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-22 Badis Hammi, Sherali Zeadally, Jamel Nebhen
The rapid growth of Information Communication Technologies (ICT) has impacted many fields. In this context, the supply chain has also quickly evolved toward the digital supply chain where digital and electronic technologies have been integrated into every aspect of its end-to-end process. This evolution provides numerous benefits such as profit maximization, loss reduction, and the optimization of
-
Representation Bias in Data: A Survey on Identification and Resolution Techniques ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-17 Nima Shahbazi, Yin Lin, Abolfazl Asudeh, H. V. Jagadish
Data-driven algorithms are only as good as the data they work with, while data sets, especially social data, often fail to represent minorities adequately. Representation Bias in data can happen due to various reasons ranging from historical discrimination to selection and sampling biases in the data acquisition and preparation methods. Given that “bias in, bias out”, one cannot expect AI-based solutions
-
Resource-Efficient Convolutional Networks: A Survey on Model-, Arithmetic-, and Implementation-Level Techniques ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-14 JunKyu Lee, Lev Mukhanov, Amir Sabbagh Molahosseini, Umar Minhas, Yang Hua, Jesus Martinez del Rincon, Kiril Dichev, Cheol-Ho Hong (Corresponding Author), Hans Vandierendonck
The Convolutional Neural Networks (CNNs) are used in our daily life, including self-driving cars, virtual assistants, social network services, healthcare services, face recognition, etc. However, deep CNNs demand substantial compute resources during training and inference. The machine learning community has mainly focused on model-level optimizations such as architectural compression of CNNs, while
-
Continuous Human Action Recognition for Human-Machine Interaction: A Review ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-14 Harshala Gammulle, David Ahmedt-Aristizabal, Simon Denman, Lachlan Tychsen-Smith, Lars Petersson, Clinton Fookes
With advances in data-driven machine learning research, a wide variety of prediction models have been proposed to capture spatio-temporal features for the analysis of video streams. Recognising actions and detecting action transitions within an input video are challenging but necessary tasks for applications that require real-time human-machine interaction. By reviewing a large body of recent related
-
Combining Machine Learning and Semantic Web: A Systematic Mapping Study ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-09 Anna Breit, Laura Waltersdorfer, Fajar J. Ekaputra, Marta Sabou, Andreas Ekelhart, Andreea Iana, Heiko Paulheim, Jan Portisch, Artem Revenko, Annete ten Teije, Frank van Harmelen
In line with the general trend in artificial intelligence research to create intelligent systems that combine learning and symbolic components, a new sub-area has emerged that focuses on combining machine learning (ML) components with techniques developed by the Semantic Web (SW) community – Semantic Web Machine Learning (SWeML for short). Due to its rapid growth and impact on several communities in
-
Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-07 Karl Olson, Jack Wampler, Eric Keller
With the transition to IPv6, addressing constraints that necessitated a common security architecture under NAT are no longer present. Instead, manufacturers are now able to choose between an open model design, where devices are end-to-end reachable, or a more familiar closed model, where the home gateway may continue to serve as a perimeter security device. The potential for further nuance, such as
-
A Practical Survey on Faster and Lighter Transformers ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-04 Quentin Fournier, Gaétan Marceau Caron, Daniel Aloise
Recurrent neural networks are effective models to process sequences. However, they are unable to learn long-term dependencies because of their inherent sequential nature. As a solution, Vaswani et al. introduced the Transformer, a model solely based on the attention mechanism that is able to relate any two positions of the input sequence, hence modelling arbitrary long dependencies. The Transformer
-
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Md Rayhanur Rahman, Rezvan Mahdavi Hezaveh, Laurie Williams
Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles describing cyberattack strategies, procedures, and tools. The goal of this article is to aid cybersecurity researchers in understanding the current techniques used for cyberthreat intelligence extraction from text through a survey of relevant studies in the
-
Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-03 Jayashree Dey, Ratna Dutta
Multivariate Public Key Cryptosystem (MPKC) seem to be promising toward future digital security even in the presence of quantum adversaries. MPKCs derive their security from the difficulty of solving a random system of multivariate polynomial equations over a finite field, which is known to be an NP-hard problem. This article aims at presenting a comprehensive survey that covers multivariate public
-
Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-03 Arash Heidari, Nima Jafari Navimipour, Mehmet Unal, Guodao Zhang
Deep Learning (DL) and Machine Learning (ML) are effectively utilized in various complicated challenges in healthcare, industry, and academia. The Internet of Drones (IoD) has lately cropped up due to high adjustability to a broad range of unpredictable circumstances. In addition, Unmanned Aerial Vehicles (UAVs) could be utilized efficiently in a multitude of scenarios, including rescue missions and
-
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-03 Behrouz Zolfaghari, Leila Mirsadeghi, Khodakhast Bibak, Kaveh Kavousi
Ensemble methods try to improve performance via integrating different kinds of input data, features, or learning algorithms. In addition to other areas, they are finding their applications in cancer prognosis and diagnosis. However, in this area, the research community is lagging behind the technology. A systematic review along with a taxonomy on ensemble methods used in cancer prognosis and diagnosis
-
Predictive maintenance in the military domain: A systematic review of the literature ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-03 Jovani Dalzochio, Rafael Kunst, Jorge Luis Victória Barbosa, Pedro Clarindo da Silva Neto, Edison Pignaton, Carla Schwengber ten Caten, Alex de Lima Teodoro da Penha
Military troops rely on maintenance management projects and operations to preserve the materials’ ordinary conditions or restore them to combat or military training. Maintenance management in the defense domain has its particularities, such as those related to the type of equipment operated, the environment and operating conditions, the need to maintain equipment readiness in cases of external aggression
-
Computational Resource Allocation in Fog Computing: A Comprehensive Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-03 Joao Bachiega Jr., Breno Costa, Leonardo R. Carvalho, Michel J. F. Rosa, Aleteia Araujo
Fog computing is a paradigm that allows the provisioning of computational resources and services at the edge of the network, closer to the end devices and users, complementing cloud computing. The heterogeneity and large number of devices are challenges to obtaining optimized resource allocation in this environment. Over time, some surveys have been presented on resource management in fog computing
-
Survey of Hallucination in Natural Language Generation ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-03 Ziwei Ji, Nayeon Lee, Rita Frieske, Tiezheng Yu, Dan Su, Yan Xu, Etsuko Ishii, Ye Jin Bang, Andrea Madotto, Pascale Fung
Natural Language Generation (NLG) has improved exponentially in recent years thanks to the development of sequence-to-sequence deep learning technologies such as Transformer-based language models. This advancement has led to more fluent and coherent NLG, leading to improved development in downstream tasks such as abstractive summarization, dialogue generation, and data-to-text generation. However,
-
Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-03 Hans Jakob Damsgaard, Aleksandr Ometov, Jari Nurmi
With the increasing popularity of the Internet of Things and massive Machine Type Communication technologies, the number of connected devices is rising. However, although enabling valuable effects to our lives, bandwidth and latency constraints challenge Cloud processing of their associated data amounts. A promising solution to these challenges is the combination of Edge and approximate computing techniques
-
SoK: DAG-based Blockchain Systems ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-03 Qin Wang, Jiangshan Yu, Shiping Chen, Yang Xiang
Limitations on high latency and low scalability of classical blockchain systems retard their adoptions and applications. Reconstructed blockchain systems have been proposed to avoid the consumption of competitive transactions caused by linear sequenced blocks. These systems, instead, structure transactions/blocks in the form of Directed Acyclic Graph (DAG) and consequently rebuild upper layer components
-
Resource Management in Cloud and Cloud-influenced Technologies for Internet of Things Applications ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Rathinaraja Jeyaraj, Anandkumar Balasubramaniam, Ajay Kumara M.A., Nadra Guizani, Anand Paul
The trend of adopting Internet of Things (IoT) in healthcare, smart cities, Industry 4.0, and so on is increasing by means of cloud computing, which provides on-demand storage and computation facilities over the Internet. To meet specific requirements of IoT applications, the cloud has also shifted its service offering platform to its next-generation models, such as fog, mist, and dew computing. As
-
Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Nitin Rathi, Indranil Chakraborty, Adarsh Kosta, Abhronil Sengupta, Aayush Ankit, Priyadarshini Panda, Kaushik Roy
Neuromorphic Computing, a concept pioneered in the late 1980s, is receiving a lot of attention lately due to its promise of reducing the computational energy, latency, as well as learning complexity in artificial neural networks. Taking inspiration from neuroscience, this interdisciplinary field performs a multi-stack optimization across devices, circuits, and algorithms by providing an end-to-end
-
A Systematic Survey of General Sparse Matrix-matrix Multiplication ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Jianhua Gao, Weixing Ji, Fangli Chang, Shiyu Han, Bingxin Wei, Zeming Liu, Yizhuo Wang
General Sparse Matrix-Matrix Multiplication (SpGEMM) has attracted much attention from researchers in graph analyzing, scientific computing, and deep learning. Many optimization techniques have been developed for different applications and computing architectures over the past decades. The objective of this article is to provide a structured and comprehensive overview of the researches on SpGEMM. Existing
-
A Survey on Perceptually Optimized Video Coding ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Yun Zhang, Linwei Zhu, Gangyi Jiang, Sam Kwong, C.-C. Jay Kuo
To provide users with more realistic visual experiences, videos are developing in the trends of Ultra High Definition (UHD), High Frame Rate (HFR), High Dynamic Range (HDR), Wide Color Gammut (WCG), and high clarity. However, the data amount of videos increases exponentially, which requires high efficiency video compression for storage and network transmission. Perceptually optimized video coding aims
-
Strategic Decisions: Survey, Taxonomy, and Future Directions from Artificial Intelligence Perspective ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Caesar Wu, Rui Zhang, Ramamohanarao Kotagiri, Pascal Bouvry
Strategic Decision-Making is always challenging because it is inherently uncertain, ambiguous, risky, and complex. By contrast to tactical and operational decisions, strategic decisions are decisive, pivotal, and often irreversible, which may result in long-term and significant consequences. A strategic decision-making process usually involves many aspects of inquiry, including sensory perception,
-
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Maxime Buser, Rafael Dowsley, Muhammed Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason Legrow, Joseph Liu, Raphaël Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu
Blockchain technology provides efficient and secure solutions to various online activities by utilizing a wide range of cryptographic tools. In this article, we survey the existing literature on post-quantum secure digital signatures that possess exotic advanced features and that are crucial cryptographic tools used in the blockchain ecosystem for (1) account management, (2) consensus efficiency, (3)
-
More Recent Advances in (Hyper)Graph Partitioning ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Ümit Çatalyürek, Karen Devine, Marcelo Faraj, Lars Gottesbüren, Tobias Heuer, Henning Meyerhenke, Peter Sanders, Sebastian Schlag, Christian Schulz, Daniel Seemaier, Dorothea Wagner
In recent years, significant advances have been made in the design and evaluation of balanced (hyper)graph partitioning algorithms. We survey trends of the past decade in practical algorithms for balanced (hyper)graph partitioning together with future research directions. Our work serves as an update to a previous survey on the topic [29]. In particular, the survey extends the previous survey by also
-
Performance Interference of Virtual Machines: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Weiwei Lin, Chennian Xiong, Wentai Wu, Fang Shi, Keqin Li, Minxian Xu
The rapid development of cloud computing with virtualization technology has benefited both academia and industry. For any cloud data center at scale, one of the primary challenges is how to effectively orchestrate a large number of virtual machines (VMs) in a performance-aware and cost-effective manner. A key problem here is that the performance interference between VMs can significantly undermine
-
Instance Space Analysis for Algorithm Testing: Methodology and Software Tools ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Kate Smith-Miles, Mario Andrés Muñoz
Instance Space Analysis (ISA) is a recently developed methodology to (a) support objective testing of algorithms and (b) assess the diversity of test instances. Representing test instances as feature vectors, the ISA methodology extends Rice’s 1976 Algorithm Selection Problem framework to enable visualization of the entire space of possible test instances, and gain insights into how algorithm performance
-
Machine Learning for Software Engineering: A Tertiary Study ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Zoe Kotti, Rafaila Galanopoulou, Diomidis Spinellis
Machine learning (ML) techniques increase the effectiveness of software engineering (SE) lifecycle activities. We systematically collected, quality-assessed, summarized, and categorized 83 reviews in ML for SE published between 2009 and 2022, covering 6,117 primary studies. The SE areas most tackled with ML are software quality and testing, while human-centered areas appear more challenging for ML
-
A Survey of Implicit Discourse Relation Recognition ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Wei Xiang, Bang Wang
A discourse containing one or more sentences describes daily issues and events for people to communicate their thoughts and opinions. As sentences are normally consist of multiple text segments, correct understanding of the theme of a discourse should take into consideration of the relations in between text segments. Although sometimes a connective exists in raw texts for conveying relations, it is
-
Efficient Deep Learning: A Survey on Making Deep Learning Models Smaller, Faster, and Better ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Gaurav Menghani
Deep learning has revolutionized the fields of computer vision, natural language understanding, speech recognition, information retrieval, and more. However, with the progressive improvements in deep learning models, their number of parameters, latency, and resources required to train, among others, have all increased significantly. Consequently, it has become important to pay attention to these footprint
-
Deep Learning Techniques for COVID-19 Diagnosis and Prognosis Based on Radiological Imaging ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-02 Robert Hertel, Rachid Benlamri
This literature review summarizes the current deep learning methods developed by the medical imaging AI research community that have been focused on resolving lung imaging problems related to coronavirus disease 2019 (COVID-19). COVID-19 shares many of the same imaging characteristics as other common forms of bacterial and viral pneumonia. Differentiating COVID-19 from other common pulmonary infections
-
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-01 Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Sebastiano Vascon, Werner Zellinger, Bernhard A. Moser, Alina Oprea, Battista Biggio, Marcello Pelillo, Fabio Roli
The success of machine learning is fueled by the increasing availability of computing power and large training datasets. The training data is used to learn new models or update existing ones, assuming that it is sufficiently representative of the data that will be encountered at test time. This assumption is challenged by the threat of poisoning, an attack that manipulates the training data to compromise
-
Multimodal Sentiment Analysis: A Survey of Methods, Trends and Challenges ACM Comput. Surv. (IF 14.324) Pub Date : 2023-03-01 Ringki Das, Thoudam Doren Singh
Sentiment analysis has come long way since it was introduced as a natural language processing task nearly 20 years ago. Sentiment analysis aims to extract the underlying attitudes and opinions toward an entity. It has become a powerful tool used by governments, businesses, medicine, marketing etc. The traditional sentiment analysis model focuses mainly on text content. However, technological advances
-
Private Graph Data Release: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-22 Yang Li, Michael Purcell, Thierry Rakotoarivelo, David Smith, Thilina Ranbaduge, Kee Siong Ng
The application of graph analytics to various domains has yielded tremendous societal and economical benefits in recent years. However, the increasingly widespread adoption of graph analytics comes with a commensurate increase in the need to protect private information in graph data, especially in light of the many privacy breaches in real-world graph data that were supposed to preserve sensitive information
-
From Anecdotal Evidence to Quantitative Evaluation Methods: A Systematic Review on Evaluating Explainable AI ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-24 Meike Nauta, Jan Trienes, Shreyasi Pathak, Elisa Nguyen, Michelle Peters, Yasmin Schmitt, Jörg Schlötterer, Maurice van Keulen, Christin Seifert
The rising popularity of explainable artificial intelligence (XAI) to understand high-performing black boxes raised the question of how to evaluate explanations of machine learning (ML) models. While interpretability and explainability are often presented as a subjectively validated binary property, we consider it a multi-faceted concept. We identify 12 conceptual properties, such as Compactness and
-
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-22 Juncen Zhu, Jiannong Cao, Divya Saxena, Shan Jiang, Houda Ferradi
Federated learning is a privacy-preserving machine learning technique that trains models across multiple devices holding local data samples without exchanging them. There are many challenging issues in federated learning, such as coordinating participants’ activities, arbitrating their benefits, and aggregating models. Most existing solutions employ a centralized approach, in which a trustworthy central
-
A Survey on Multi-modal Summarization ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-21 Anubhav Jangra, Sourajit Mukherjee, Adam Jatowt, Sriparna Saha, Mohammad Hasanuzzaman
The new era of technology has brought us to the point where it is convenient for people to share their opinions over an abundance of platforms. These platforms have a provision for the users to express themselves in multiple forms of representations, including text, images, videos, and audio. This, however, makes it difficult for users to obtain all the key information about a topic, making the task
-
Device Fingerprinting for Cyber-Physical System: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-21 Vijay Kumar, Kolin Paul
The continued growth of the Cyber-Physical System (CPS) and Internet of Things (IoT) technologies raises device security and monitoring concerns. For device identification, authentication, conditioning, and security, device fingerprints (DFP) are increasingly used. However, finding the correct DFP features and sources to establish a unique and stable fingerprint is challenging. We present a state-of-the-art
-
Guided Depth Map Super-resolution: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-17 Zhiwei Zhong, Xianming Liu, Junjun Jiang, Debin Zhao, Xiangyang Ji
Guided depth map super-resolution (GDSR), which aims to reconstruct a high-resolution (HR) depth map from a low-resolution (LR) observation with the help of a paired HR color image, is a longstanding and fundamental problem, it has attracted considerable attention from computer vision and image processing communities. A myriad of novel and effective approaches have been proposed recently, especially
-
A Survey on Event-based News Narrative Extraction ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-17 Brian Felipe Keith Norambuena, Tanushree Mitra, Chris North
Narratives are fundamental to our understanding of the world, providing us with a natural structure for knowledge representation over time. Computational narrative extraction is a subfield of artificial intelligence that makes heavy use of information retrieval and natural language processing techniques. Despite the importance of computational narrative extraction, relatively little scholarly work
-
Edge Computing and Sensor-Cloud: Overview, Solutions, and Directions ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-13 Tian Wang, Yuzhu Liang, Xuewei Shen, Xi Zheng, Adnan Mahmood, Quan Z. Sheng
Sensor-cloud originates from extensive recent applications of wireless sensor networks and cloud computing. To draw a roadmap of the current research activities of the sensor-cloud community, we first investigate the state-of-the-art sensor-cloud literature reviews published in the recent five years, and discover that these surveys have primarily studied the sensor-cloud in specific aspects, namely
-
Content-based and Knowledge-enriched Representations for Classification Across Modalities: a Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-13 Nikiforos Pittaras, George Giannakopoulos, Panagiotis Stamatopoulos, Vangelis Karkaletsis
This survey documents representation approaches for classification across different modalities, from purely content-based methods to techniques utilizing external sources of structured knowledge. We present studies related to three paradigms used for representation, namely a) low-level template-matching methods, b) aggregation-based approaches and c) deep representation learning systems. We then describe
-
Intelligence at the Extreme Edge: A Survey on Reformable TinyML ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-13 Visal Rajapakse, Ishan Karunanayake, Nadeem Ahmed
Tiny Machine Learning (TinyML) is an upsurging research field that proposes to democratize the use of Machine Learning and Deep Learning on highly energy-efficient frugal Microcontroller Units. Considering the general assumption that TinyML can only run inference, growing interest in the domain has led to work that makes them reformable, i.e., solutions that permit models to improve once deployed.
-
A Review on Tools, Mechanics, Benefits, and Challenges of Gamified Software Testing ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-10 Tommaso Fulcini, Riccardo Coppola, Luca Ardito, Marco Torchiano
Gamification is an established practice in Software Engineering to increase effectiveness and engagement in many practices. This manuscript provides a characterisation of the application of gamification to the Software Testing area. Such practice in fact reportedly suffers from low engagement by both personnel in industrial contexts and learners in educational contexts. Our goal is to identify the
-
From Reactive to Active Sensing: a Survey on Information Gathering in Decision-Theoretic Planning ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-10 Tiago Veiga, Jennifer Renoux
In traditional decision-theoretic planning, information gathering is a means to a goal. The agent receives information about its environment (state or observation) and uses it as a way to optimize a state-based reward function. Recent works, however, have focused on application domains in which information gathering is not only the mean but the goal itself. The agent must optimize its knowledge of
-
Code Search: A Survey of Techniques for Finding Code ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Luca Di Grazia, Michael Pradel
The immense amounts of source code provide ample challenges and opportunities during software development. To handle the size of code bases, developers commonly search for code, e.g., when trying to find where a particular feature is implemented or when looking for code examples to reuse. To support developers in finding relevant code, various code search engines have been proposed. This article surveys
-
Transforming Large-Size to Lightweight Deep Neural Networks for IoT Applications ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Rahul Mishra, Hari Gupta
Deep Neural Networks (DNNs) have gained unprecedented popularity due to their high-order performance and automated feature extraction capability. This has encouraged researchers to incorporate DNN in different Internet of Things (IoT) applications in recent years. However, the colossal requirement of computation, energy, and storage of DNNs make their deployment prohibitive on resource-constrained
-
Presentation-Level Privacy Protection Techniques for Automated Face Recognition - A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Md Rezwan Hasan, Richard Guest, Farzin Deravi
The use of Biometric Facial Recognition (FR) Systems have become increasingly widespread, especially since the advent of deep neural network-based architectures (DNNs). Although FR systems provide substantial benefits in terms of security and safety, the use of these systems also raises significant privacy concerns. This paper discusses recent advances in facial identity hiding techniques, focusing
-
Exploring Blockchains Interoperability: A Systematic Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-08 Gang Wang, Qin Wang, Shiping Chen
The next-generation blockchain ecosystem is expected to integrate both homogeneous and heterogeneous distributed ledgers. These systems require operations across multiple blockchains to enrich advanced functionalities for future applications. However, the development of blockchain interoperability involves much more complexity regarding the variety of underlying architectures. Guaranteeing the properties
-
Botnet Business Models, Takedown Attempts, and the Darkweb Market: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis
Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb marketplaces to promote and provide their services, which can vary from renting or buying a botnet (or parts of it) to hiring services (e.g., distributed denial of service attacks). At the same time, botnet takedown attempts have proven to be challenging, demanding a combination of technical and legal methods, and often
-
A Survey on Virtual Network Functions for Media Streaming: Solutions and Future Challenges ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Roberto Viola, Ángel Martín, Mikel Zorrilla, Jon Montalbán, Pablo Angueira, Gabriel-Miro Muntean
Media services must ensure an enhanced user’s perceived quality during content playback to attract and retain audiences, especially while the streams are distributed remotely via networks. Thus, media streaming services rely heavily on good and predictable network performance when delivered to a large number of people. Furthermore, as the quality of media content gets high, the network performance
-
Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 José María Jorquera Valero, Pedro Miguel Sánchez Sánchez, Manuel Gil Pérez, Alberto Huertas Celdrán, Gregorio Martinez Perez
In 5G and beyond, the figure of cross-operator/domain connections and relationships grows exponentially among stakeholders, resources, and services, with reputation-based trust models being one of the capital technologies leveraged for trustworthy decision-making. This work studies novel 5G assets on which trust can be used to overcome unsuitable decision-making and address current requirements. First
-
A Survey on Seismic Sensor based Target Detection, Localization, Identification, and Activity Recognition ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Priyankar Choudhary, Neeraj Goel, Mukesh Saini
Current sensor technologies facilitate device-free and non-invasive monitoring of target activities and infrastructures to ensure a safe and inhabitable environment. Device-free techniques for sensing the surrounding environment are an emerging area of research where a target does not need to carry or attach any device to provide information about its motion or the surrounding environment. Consequently
-
Knowledge Tracing: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Ghodai Abdelrahman, Qing Wang, Bernardo Nunes
Humans’ ability to transfer knowledge through teaching is one of the essential aspects for human intelligence. A human teacher can track the knowledge of students to customize the teaching on students’ needs. With the rise of online education platforms, there is a similar need for machines to track the knowledge of students and tailor their learning experience. This is known as the Knowledge Tracing
-
Non-relational Databases on FPGAs: Survey, Design Decisions, Challenges ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Jonas Dann, Daniel Ritter, Holger Fröning
Non-relational database systems (NRDS) such as graph and key-value have gained attention in various trending business and analytical application domains. However, while CPU performance scaling becomes increasingly more difficult, field-programmable gate arrays (FPGA)- accelerated NRDS have not been systematically studied yet. This survey describes and categorizes the inherent differences and non-trivial
-
SoK: Deep Learning-based Physical Side-channel Analysis ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina
Side-channel attacks represent a realistic and serious threat to the security of embedded devices for already almost three decades. A variety of attacks and targets they can be applied to have been introduced, and while the area of side-channel attacks and their mitigation is very well-researched, it is yet to be consolidated. Deep learning-based side-channel attacks entered the field in recent years
-
Hybrid Clouds Arising from Software as a Service Adoption: Challenges, Solutions, and Future Research Directions ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Michael Seifert, Stephan Kuehnel, Stefan Sackmann
Information technology (IT) departments are increasingly challenged to replace legacy applications with novel public cloud software as a service (SaaS) to innovate the organization's business processes. The resulting hybrid cloud is formed by integrating the added SaaS with existing IT services. The decision to adopt SaaS in such a hybrid cloud service composition requires appropriate consideration
-
Neural Machine Translation for Low-resource Languages: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Surangika Ranathunga, En-Shiun Annie Lee, Marjana Prifti Skenduli, Ravi Shekhar, Mehreen Alam, Rishemjit Kaur
Neural Machine Translation (NMT) has seen tremendous growth in the last ten years since the early 2000s and has already entered a mature phase. While considered the most widely used solution for Machine Translation, its performance on low-resource language pairs remains sub-optimal compared to the high-resource counterparts due to the unavailability of large parallel corpora. Therefore, the implementation
-
Scheduling of Resource Allocation Systems with Timed Petri Nets: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Bo Huang, Mengchu Zhou, Xiaoyu Sean Lu, Abdullah Abusorrah
Resource allocation systems (RASs) belong to a kind of discrete event system commonly seen in the industry. In such systems, available resources are allocated to concurrently running processes to optimize some performance criteria. Search strategies in the reachability graph (RG) of a timed Petri net (PN) attracted much attention in the past decades to cope with RAS scheduling problems (RSPs), since
-
Cross-Domain WiFi Sensing with Channel State Information: A Survey ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Chen Chen, Gang Zhou, Youfang Lin
The past years have witnessed the rapid conceptualization and development of wireless sensing based on Channel State Information (CSI) with commodity WiFi devices. Recent studies have demonstrated the vast potential of WiFi sensing in detection, recognition, and estimation applications. However, the widespread deployment of WiFi sensing systems still faces a significant challenge: how to ensure the
-
A Systematic Survey of Regularization and Normalization in GANs ACM Comput. Surv. (IF 14.324) Pub Date : 2023-02-09 Ziqiang Li, Muhammad Usman, Rentuo Tao, Pengfei Xia, Chaoyue Wang, Huanhuan Chen, Bin Li
Generative Adversarial Networks (GANs) have been widely applied in different scenarios thanks to the development of deep neural networks. The original GAN was proposed based on the non-parametric assumption of the infinite capacity of networks. However, it is still unknown whether GANs can fit the target distribution without any prior information. Due to the overconfident assumption, many issues remain