Volume 55, Issue 9September 2023
Bibliometrics
Skip Table Of Content Section
survey
A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges
Article No.: 175, pp 1–52https://doi.org/10.1145/3558000

This is Part II of the two-part comprehensive survey devoted to a computing framework most commonly known under the names Hyperdimensional Computing and Vector Symbolic Architectures (HDC/VSA). Both names refer to a family of computational models that use ...

survey
Open Access
Camera Measurement of Physiological Vital Signs
Article No.: 176, pp 1–40https://doi.org/10.1145/3558518

The need for remote tools for healthcare monitoring has never been more apparent. Camera measurement of vital signs leverages imaging devices to compute physiological changes by analyzing images of the human body. Building on advances in optics, machine ...

survey
Trustworthy AI: From Principles to Practices
Article No.: 177, pp 1–46https://doi.org/10.1145/3555803

The rapid development of Artificial Intelligence (AI) technology has enabled the deployment of various systems based on it. However, many current AI systems are found vulnerable to imperceptible attacks, biased against underrepresented groups, lacking in ...

survey
Open Access
A Survey on Recent Approaches to Question Difficulty Estimation from Text
Article No.: 178, pp 1–37https://doi.org/10.1145/3556538

Question Difficulty Estimation from Text (QDET) is the application of Natural Language Processing techniques to the estimation of a value, either numerical or categorical, which represents the difficulty of questions in educational settings. We give an ...

survey
Lexical Complexity Prediction: An Overview
Article No.: 179, pp 1–42https://doi.org/10.1145/3557885

The occurrence of unknown words in texts significantly hinders reading comprehension. To improve accessibility for specific target populations, computational modeling has been applied to identify complex words in texts and substitute them for simpler ...

survey
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment
Article No.: 180, pp 1–38https://doi.org/10.1145/3558095

The security and privacy of smart home systems, particularly from a home user’s perspective, have been a very active research area in recent years. However, via a meta-review of 52 review papers covering related topics (published between 2000 and 2021), ...

survey
Emotion Ontology Studies: A Framework for Expressing Feelings Digitally and its Application to Sentiment Analysis
Article No.: 181, pp 1–38https://doi.org/10.1145/3555719

Emotion ontologies have been developed to capture affect, a concept that encompasses discrete emotions and feelings, especially for research on sentiment analysis, which analyzes a customer's attitude towards a company or a product. However, there have ...

survey
Trust in Edge-based Internet of Things Architectures: State of the Art and Research Challenges
Article No.: 182, pp 1–34https://doi.org/10.1145/3558779

The Internet of Things (IoT) aims to enable a scenario where smart objects, inserted into information networks, supply smart services for human beings. The introduction of edge computing in IoT can reduce the decision-making latency, save bandwidth ...

survey
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems
Article No.: 183, pp 1–36https://doi.org/10.1145/3559104

Although cyberattacks on machine learning (ML) production systems can be harmful, today, security practitioners are ill-equipped, lacking methodologies and tactical tools that would allow them to analyze the security risks of their ML-based systems. In ...

survey
Open Access
Edge Computing with Artificial Intelligence: A Machine Learning Perspective
Article No.: 184, pp 1–35https://doi.org/10.1145/3555802

Recent years have witnessed the widespread popularity of Internet of things (IoT). By providing sufficient data for model training and inference, IoT has promoted the development of artificial intelligence (AI) to a great extent. Under this background and ...

survey
A Survey of Security and Privacy Issues in V2X Communication Systems
Article No.: 185, pp 1–36https://doi.org/10.1145/3558052

Vehicle-to-Everything (V2X) communication is receiving growing attention from industry and academia as multiple pilot projects explore its capabilities and feasibility. With about 50% of global road vehicle exports coming from the European Union (EU), and ...

survey
Open Access
Advancing SDN from OpenFlow to P4: A Survey
Article No.: 186, pp 1–37https://doi.org/10.1145/3556973

Software-defined Networking (SDN) marked the beginning of a new era in the field of networking by decoupling the control and forwarding processes through the OpenFlow protocol. The Next Generation SDN is defined by Open Interfaces and full programmability ...

survey
Android Source Code Vulnerability Detection: A Systematic Literature Review
Article No.: 187, pp 1–37https://doi.org/10.1145/3556974

The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Many Android applications do not address ...

survey
A Survey on Video Moment Localization
Article No.: 188, pp 1–37https://doi.org/10.1145/3556537

Video moment localization, also known as video moment retrieval, aims to search a target segment within a video described by a given natural language query. Beyond the task of temporal action localization whereby the target actions are pre-defined, video ...

survey
Open Access
Mobile Augmented Reality: User Interfaces, Frameworks, and Intelligence
Article No.: 189, pp 1–36https://doi.org/10.1145/3557999

Mobile Augmented Reality (MAR) integrates computer-generated virtual objects with physical environments for mobile devices. MAR systems enable users to interact with MAR devices, such as smartphones and head-worn wearables, and perform seamless ...

survey
Technical Requirements and Approaches in Personal Data Control
Article No.: 190, pp 1–30https://doi.org/10.1145/3558766

There has been a trend of moving from simply de-identification to providing extended data control to their owner (e.g., data portability and right to be forgotten), partly due to the introduction of the General Data Protection Regulation (GDPR). Hence, in ...

survey
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey
Article No.: 191, pp 1–43https://doi.org/10.1145/3560816

The Internet of Things (IoT) ecosystem connects physical devices to the internet, offering significant advantages in agility, responsiveness, and potential environmental benefits. The number and variety of IoT devices are sharply increasing, and as they ...

survey
A Review on C3I Systems’ Security: Vulnerabilities, Attacks, and Countermeasures
Article No.: 192, pp 1–38https://doi.org/10.1145/3558001

Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. The critical civil and military ...

survey
Path Planning for UAV Communication Networks: Related Technologies, Solutions, and Opportunities
Article No.: 193, pp 1–37https://doi.org/10.1145/3560261

Path planning has been a hot and challenging field in unmanned aerial vehicles (UAV). With the increasing demand of society and the continuous progress of technologies, UAV communication networks (UAVCN) are also flourishing. The mobility of UAV nodes ...

survey
Explainable AI (XAI): Core Ideas, Techniques, and Solutions
Article No.: 194, pp 1–33https://doi.org/10.1145/3561048

As our dependence on intelligent machines continues to grow, so does the demand for more transparent and interpretable models. In addition, the ability to explain the model generally is now the gold standard for building trust and deployment of artificial ...

survey
Open Access
Pre-train, Prompt, and Predict: A Systematic Survey of Prompting Methods in Natural Language Processing
Article No.: 195, pp 1–35https://doi.org/10.1145/3560815

This article surveys and organizes research works in a new paradigm in natural language processing, which we dub “prompt-based learning.” Unlike traditional supervised learning, which trains a model to take in an input x and predict an output y as P(y|x), ...

survey
An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness
Article No.: 196, pp 1–38https://doi.org/10.1145/3559754

Text-based CAPTCHA has become one of the most popular methods for preventing bot attacks. With the rapid development of deep learning techniques, many new methods to break text-based CAPTCHAs have been developed in recent years. However, a holistic and ...

Subjects

Currently Not Available

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!