Volume 55, Issue 8August 2023
Bibliometrics
Skip Table Of Content Section
survey
Deep Learning for Android Malware Defenses: A Systematic Literature Review
Article No.: 153, pp 1–36https://doi.org/10.1145/3544968

Malicious applications (particularly those targeting the Android platform) pose a serious threat to developers and end-users. Numerous research efforts have been devoted to developing effective approaches to defend against Android malware. However, given ...

survey
An Empirical Survey on Long Document Summarization: Datasets, Models, and Metrics
Article No.: 154, pp 1–35https://doi.org/10.1145/3545176

Long documents such as academic articles and business reports have been the standard format to detail out important issues and complicated subjects that require extra attention. An automatic summarization system that can effectively condense long ...

survey
Open Access
Post-hoc Interpretability for Neural NLP: A Survey
Article No.: 155, pp 1–42https://doi.org/10.1145/3546577

Neural networks for NLP are becoming increasingly complex and widespread, and there is a growing concern if these models are responsible to use. Explaining models helps to address the safety and ethical concerns and is essential for accountability. ...

survey
A Survey of Joint Intent Detection and Slot Filling Models in Natural Language Understanding
Article No.: 156, pp 1–38https://doi.org/10.1145/3547138

Intent classification, to identify the speaker’s intention, and slot filling, to label each token with a semantic type, are critical tasks in natural language understanding. Traditionally the two tasks have been addressed independently. More recently ...

survey
Open Access
Taxonomy of Machine Learning Safety: A Survey and Primer
Article No.: 157, pp 1–38https://doi.org/10.1145/3551385

The open-world deployment of Machine Learning (ML) algorithms in safety-critical applications such as autonomous vehicles needs to address a variety of ML vulnerabilities such as interpretability, verifiability, and performance limitations. Research ...

survey
Eye-tracking Technologies in Mobile Devices Using Edge Computing: A Systematic Review
Article No.: 158, pp 1–33https://doi.org/10.1145/3546938

Eye-tracking provides invaluable insight into the cognitive activities underlying a wide range of human behaviours. Identifying cognitive activities provides valuable perceptions of human learning patterns and signs of cognitive diseases like Alzheimer’s, ...

survey
Deep Learning in Sentiment Analysis: Recent Architectures
Article No.: 159, pp 1–37https://doi.org/10.1145/3548772

Humans are increasingly integrated with devices that enable the collection of vast unstructured opinionated data. Accurately analysing subjective information from this data is the task of sentiment analysis (an actively researched area in NLP). Deep ...

survey
A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning
Article No.: 160, pp 1–16https://doi.org/10.1145/3547139

We review the use of differential privacy (DP) for privacy protection in machine learning (ML). We show that, driven by the aim of preserving the accuracy of the learned models, DP-based ML implementations are so loose that they do not offer the ex ante ...

survey
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks
Article No.: 161, pp 1–35https://doi.org/10.1145/3547299

Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also increased the risk of privacy invasion. An online image can reveal various types of sensitive information, prompting the public to ...

survey
A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques
Article No.: 162, pp 1–28https://doi.org/10.1145/3547331

The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol (IP) addresses plays a foundational role in Internet communications. By default, DNS queries and responses are exchanged in unencrypted plaintext, and hence, can be read ...

survey
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
Article No.: 163, pp 1–39https://doi.org/10.1145/3547330

The outstanding performance of deep neural networks has promoted deep learning applications in a broad set of domains. However, the potential risks caused by adversarial samples have hindered the large-scale deployment of deep learning. In these scenarios,...

survey
Open Access
Quantum Software Components and Platforms: Overview and Quality Assessment
Article No.: 164, pp 1–31https://doi.org/10.1145/3548679

Quantum computing is the latest revolution in computing and will probably come to be seen as an advance as important as the steam engine or the information society. In the last few decades, our understanding of quantum computers has expanded and multiple ...

survey
Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey
Article No.: 165, pp 1–38https://doi.org/10.1145/3549932

X-ray imagery systems have enabled security personnel to identify potential threats contained within the baggage and cargo since the early 1970s. However, the manual process of screening the threatening items is time-consuming and vulnerable to human ...

survey
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
Article No.: 166, pp 1–35https://doi.org/10.1145/3551636

The prosperity of machine learning has been accompanied by increasing attacks on the training process. Among them, poisoning attacks have become an emerging threat during model training. Poisoning attacks have profound impacts on the target models, e.g., ...

survey
Open Access
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey
Article No.: 167, pp 1–44https://doi.org/10.1145/3551386

Remote electronic voting, often called online or Internet voting, has been subject to research for the last four decades. It is regularly discussed in public debates, especially in the context of enabling voters to conveniently cast their ballot from home ...

survey
Formal Concept Analysis Applications in Bioinformatics
Article No.: 168, pp 1–40https://doi.org/10.1145/3554728

The bioinformatics discipline seeks to solve problems in biology with computational theories and methods. Formal concept analysis (FCA) is one such theoretical model, based on partial orders. FCA allows the user to examine the structural properties of ...

survey
Honeyword-based Authentication Techniques for Protecting Passwords: A Survey
Article No.: 169, pp 1–37https://doi.org/10.1145/3552431

Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this ...

survey
Open Access
Evaluating Recommender Systems: Survey and Framework
Article No.: 170, pp 1–38https://doi.org/10.1145/3556536

The comprehensive evaluation of the performance of a recommender system is a complex endeavor: many facets need to be considered in configuring an adequate and effective evaluation setting. Such facets include, for instance, defining the specific goals of ...

survey
Systematic Literature Review on Parallel Trajectory-based Metaheuristics
Article No.: 171, pp 1–34https://doi.org/10.1145/3550484

In the past 35 years, parallel computing has drawn increasing interest from the academic community, especially in solving complex optimization problems that require large amounts of computational power. The use of parallel (multi-core and distributed) ...

survey
Open Access
AUC Maximization in the Era of Big Data and AI: A Survey
Article No.: 172, pp 1–37https://doi.org/10.1145/3554729

Area under the ROC curve, a.k.a. AUC, is a measure of choice for assessing the performance of a classifier for imbalanced data. AUC maximization refers to a learning paradigm that learns a predictive model by directly maximizing its AUC score. It has been ...

survey
A Survey of Natural Language Generation
Article No.: 173, pp 1–38https://doi.org/10.1145/3554727

This article offers a comprehensive review of the research on Natural Language Generation (NLG) over the past two decades, especially in relation to data-to-text generation and text-to-text generation deep learning methods, as well as new applications of ...

survey
Edge-computing-driven Internet of Things: A Survey
Article No.: 174, pp 1–41https://doi.org/10.1145/3555308

The Internet of Things (IoT) is impacting the world’s connectivity landscape. More and more IoT devices are connected, bringing many benefits to our daily lives. However, the influx of IoT devices poses non-trivial challenges for the existing cloud-based ...

Subjects

Currently Not Available

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!