Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Human Body Pose Estimation for Gait Identification: A Comprehensive Survey of Datasets and Models

Luke K. TophamORCID; Wasiq KhanORCID; Dhiya Al-JumeilyORCID; Abir HussainORCID

<jats:p>Person identification is a problem that has received substantial attention, particularly in security domains. Gait recognition is one of the most convenient approaches enabling person identification at a distance without the need of high-quality images. There are several review studies addressing person identification such as the utilization of facial images, silhouette images, and wearable sensor. Despite skeleton-based person identification gaining popularity while overcoming the challenges of traditional approaches, existing survey studies lack the comprehensive review of skeleton-based approaches to gait identification. We present a detailed review of the human pose estimation and gait analysis that make the skeleton-based approaches possible. The study covers various types of related datasets, tools, methodologies, and evaluation metrics with associated challenges, limitations, and application domains. Detailed comparisons are presented for each of these aspects with recommendations for potential research and alternatives. A common trend throughout this paper is the positive impact that deep learning techniques are beginning to have on topics such as human pose estimation and gait identification. The survey outcomes might be useful for the related research community and other stakeholders in terms of performance analysis of existing methodologies, potential research gaps, application domains, and possible contributions in the future.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Timed automata as a formalism for expressing security: A survey on theory and practice

Johan Arcile; Étienne André

<jats:p> Timed automata are a common formalism for the verification of concurrent systems subject to timing constraints. They extend finite-state automata with clocks, that constrain the system behavior in locations, and to take transitions. While timed automata were originally designed for <jats:italic>safety</jats:italic> (in the wide sense of correctness w.r.t. a formal property), they were progressively used in a number of works to guarantee <jats:italic>security</jats:italic> properties. In this work, we review works studying security properties for timed automata in the last two decades. We notably review theoretical works, with a particular focus on opacity, as well as more practical works, with a particular focus on attack trees and their extensions. We derive main conclusions concerning open perspectives, as well as tool support. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Deep Learning for Time Series Forecasting: Tutorial and Literature Survey

Konstantinos BenidisORCID; Syama Sundar RangapuramORCID; Valentin FlunkertORCID; Yuyang WangORCID; Danielle MaddixORCID; Caner TurkmenORCID; Jan GasthausORCID; Michael Bohlke-SchneiderORCID; David SalinasORCID; Lorenzo StellaORCID; François-Xavier AubetORCID; Laurent CallotORCID; Tim JanuschowskiORCID

<jats:p> Deep learning based forecasting methods have become the methods of choice in many applications of time series prediction or <jats:italic>forecasting</jats:italic> often outperforming other approaches. Consequently, over the last years, these methods are now ubiquitous in large-scale industrial forecasting applications and have consistently ranked among the best entries in forecasting competitions (e.g., M4 and M5). This practical success has further increased the academic interest to understand and improve deep forecasting methods. In this article we provide an introduction and overview of the field: We present important building blocks for deep forecasting in some depth; using these building blocks, we then survey the breadth of the recent deep forecasting literature. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part I: Models and Data Transformations

Denis KleykoORCID; Dmitri A. RachkovskijORCID; Evgeny OsipovORCID; Abbas RahimiORCID

<jats:p>This two-part comprehensive survey is devoted to a computing framework most commonly known under the names Hyperdimensional Computing and Vector Symbolic Architectures (HDC/VSA). Both names refer to a family of computational models that use high-dimensional distributed representations and rely on the algebraic properties of their key operations to incorporate the advantages of structured symbolic representations and vector distributed representations. Notable models in the HDC/VSA family are Tensor Product Representations, Holographic Reduced Representations, Multiply-Add-Permute, Binary Spatter Codes, and Sparse Binary Distributed Representations but there are other models too. HDC/VSA is a highly interdisciplinary field with connections to computer science, electrical engineering, artificial intelligence, mathematics, and cognitive science. This fact makes it challenging to create a thorough overview of the field. However, due to a surge of new researchers joining the field in recent years, the necessity for a comprehensive survey of the field has become extremely important. Therefore, amongst other aspects of the field, this Part I surveys important aspects such as: known computational models of HDC/VSA and transformations of various input data types to high-dimensional distributed representations. Part II of this survey [84]</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

A Comprehensive Survey on Imputation of Missing Data in Internet of Things

Deepak Adhikari; Wei Jiang; Jinyu Zhan; Danda B. Rawat; Uwe Aickelin; Hadi A. Khorshidi

<jats:p>Internet of Things (IoT) is enabled by the latest developments in smart sensors, communication technologies, and Internet protocols with broad applications. Collecting data from IoT and generating information from these data become tedious tasks in real-life applications when missing data is encountered in datasets. It is of critical importance to deal with the missing data timely for intelligent decision making. Hence, this survey attempts to provide a structured and comprehensive overview of the research on the imputation of incomplete data in IoT. The paper starts by providing an overview of incomplete data based on the architecture of IoT. Then, it discusses the various strategies to handle the missing data, the assumptions used, the computing platform, and the issues related to them. The paper also explores the application of imputation in the area of IoT. We encourage researchers and data analysts to use known imputation techniques and discuss various issues and challenges. Finally, potential future directions regarding the method are suggested. We believe this survey will provide a better understanding of the research of incomplete data and serve as a guide for future research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Indexing Metric Spaces for Exact Similarity Search

Lu ChenORCID; Yunjun GaoORCID; Xuan SongORCID; Zheng LiORCID; Yifan ZhuORCID; Xiaoye MiaoORCID; Christian S. JensenORCID

<jats:p>With the continued digitization of societal processes, we are seeing an explosion in available data. This is referred to as big data. In a research setting, three aspects of the data are often viewed as the main sources of challenges when attempting to enable value creation from big data: volume, velocity, and variety. Many studies address volume or velocity, while fewer studies concern the variety. Metric spaces are ideal for addressing variety because they can accommodate any data as long as it can be equipped with a distance notion that satisfies the triangle inequality. To accelerate search in metric spaces, a collection of indexing techniques for metric data have been proposed. However, existing surveys offer limited coverage, and a comprehensive empirical study exists has yet to be reported. We offer a comprehensive survey of existing metric indexes that support exact similarity search: we summarize existing partitioning, pruning, and validation techniques used by metric indexes to support exact similarity search; we provide the time and space complexity analyses of index construction; and we offer an empirical comparison of their query processing performance. Empirical studies are important when evaluating metric indexing performance, because performance can depend highly on the effectiveness of available pruning and validation as well as on the data distribution, which means that complexity analyses often offer limited insights. This article aims at revealing strengths and weaknesses of different indexing techniques to offer guidance on selecting an appropriate indexing technique for a given setting, and to provide directions for future research on metric indexing.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements

Trivikram MuralidharanORCID; Aviad CohenORCID; Noa GersonORCID; Nir NissimORCID

<jats:p>With the growing sophistication of malware, the need to devise improved malware detection schemes is crucial. The packing of executable files, which is one of the most common techniques for code protection, has been repurposed for code obfuscation by malware authors as a means of evading malware detectors (mainly static analysis-based detectors). This paper provides statistics on the use of packers based on an extensive analysis of 24,000 PE files (both malicious and benign files) for the past 10 years, which allowed us to observe trends in packing use during that time and showed that packing is still widely used in malware. This paper then surveys 23 methods proposed in academic research for the detection and classification of packed portable executable (PE) files and highlights various trends in malware packing. The paper highlights the differences between the methods and their abilities to detect and identify various aspects of packing. A taxonomy is presented, classifying the methods as static, dynamic, and hybrid analysis-based methods. The paper also sheds light on the increasing role of machine learning methods in the development of modern packing detection methods. We analyzed and mapped the different packing methods and identified which of them can be countered by the detection methods surveyed in this paper.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Survey and Taxonomy of Adversarial Reconnaissance Techniques

Shanto RoyORCID; Nazia SharminORCID; Jaime C. AcostaORCID; Christopher KiekintveldORCID; Aron LaszkaORCID

<jats:p>Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain. We summarize and analyze the methods, tactics, and tools that adversaries use to conduct reconnaissance activities throughout the attack process. First, we discuss what types of information adversaries seek, and how and when they can obtain this information. Then, we provide a taxonomy and detailed overview of adversarial reconnaissance techniques. The taxonomy introduces a categorization of reconnaissance techniques based on the source as third-party, human-, and system-based information gathering. This paper provides a comprehensive view of adversarial reconnaissance that can help in understanding and modeling this complex but vital aspect of cyber attacks as well as insights that can improve defensive strategies, such as cyber deception.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems

Zhibo WangORCID; Jingjing MaORCID; Xue WangORCID; Jiahui HuORCID; Zhan QinORCID; Kui RenORCID

<jats:p>Machine learning (ML) has been universally adopted for automated decisions in a variety of fields, including recognition and classification applications, recommendation systems, natural language processing, etc. However, in the light of high expenses on training data and computing resources, recent years have witnessed a rapid increase in outsourced ML training, either partially or completely, which provides vulnerabilities for adversaries to exploit. A prime threat in training phase is called poisoning attack, where adversaries strive to subvert the behavior of machine learning systems by poisoning training data or other means of interference. Although a growing number of relevant studies have been proposed, the research among poisoning attack is still overly scattered, with each paper focusing on a particular task in a specific domain. In this survey, we summarize and categorize existing attack methods and corresponding defenses, as well as demonstrate compelling application scenarios, thus providing a unified framework to analyze poisoning attacks. Besides, we also discuss the main limitations of current works, along with the corresponding future directions to facilitate further researches. Our ultimate motivation is to provide a comprehensive and self-contained survey of this growing field of research and lay the foundation for a more standardized approach to reproducible studies.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible

How to Approach Ambiguous Queries in Conversational Search? A Survey of Techniques, Approaches, Tools and Challenges

Kimiya KeyvanORCID; Jimmy Xiangji HuangORCID

<jats:p> The advent of recent Natural Language Processing technology has led human and machine interactions more towards conversation. In Conversational Search Systems (CSS) like chatbots and Virtual Personal Assistants (VPA) such as Apple’s Siri, Amazon Alexa, Microsoft’s Cortana, and Google Assistant both user and device have limited platform to communicate through chatting or voice. In the information seeking process, often users do not know how to properly describe their information need in a machine understandable language. Consequently, it is hard for the assistant agent to predict the user’s intent and yield relevant results by only relying on the original query. Study has shown many unsatisfactory results can be enhanced with the benefit of CSS. Conversational search systems can dig deeper into the user’s query to reveal the real need. This survey intends to provide a comprehensive and comparative overview of <jats:italic>ambiguous query clarification</jats:italic> task in the context of conversational search technology. We investigate different approaches, their evaluation methods, and future work. We also address the importance of understanding a query for retrieving the most relevant document(s) and satisfying user’s need by predicting their potential request. This work provides a divine overview of characteristics of ambiguous queries and contributes to better understanding of the existing technologies and challenges in CSS focus on disambiguation of unclear queries from various dimensions. </jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. No disponible