skip to main content
Volume 56, Issue 6June 2024
Bibliometrics
Skip Table Of Content Section
survey
Open Access
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
Article No.: 135, Pages 1–38https://doi.org/10.1145/3637059

In the past years, the automotive industry has experienced a technological revolution driven by the increasing demand of connectivity and data to develop driver-assistance systems and autonomous vehicles, and improve the mobility experience. To provide ...

survey
Multi-Hop and Mesh for LoRa Networks: Recent Advancements, Issues, and Recommended Applications
Article No.: 136, Pages 1–43https://doi.org/10.1145/3638241

A comprehensive review is presented on the latest approaches to solutions focusing on multi-hop and mesh LoRa networks through the evaluation of simulations and real-world experiments, based on papers published between 2015 and 2023. The approaches are ...

survey
3D Brain and Heart Volume Generative Models: A Survey
Article No.: 137, Pages 1–37https://doi.org/10.1145/3638044

Generative models such as generative adversarial networks and autoencoders have gained a great deal of attention in the medical field due to their excellent data generation capability. This article provides a comprehensive survey of generative models for ...

survey
Open Access
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks
Article No.: 138, Pages 1–37https://doi.org/10.1145/3636551

Benefiting from the rapid development of deep learning, 2D and 3D computer vision applications are deployed in many safe-critical systems, such as autopilot and identity authentication. However, deep learning models are not trustworthy enough because of ...

survey
Scaling Blockchains with Error Correction Codes: A Survey on Coded Blockchains
Article No.: 139, Pages 1–33https://doi.org/10.1145/3637224

A fundamental issue in blockchain systems is their scalability in terms of data storage, computation, communication, and security. To resolve this issue, a promising research direction is coding theory, which is widely used for distributed storage, ...

survey
A Survey on Fashion Image Retrieval
Article No.: 140, Pages 1–25https://doi.org/10.1145/3636552

Fashion is the manner in which we introduce ourselves to the world and has become perhaps the biggest industry on the planet. In recent years, fashion-related research has received a lot of attention from computer vision researchers as a result of the ...

survey
Open Access
A Systematic Literature Review on Hardware Reliability Assessment Methods for Deep Neural Networks
Article No.: 141, Pages 1–39https://doi.org/10.1145/3638242

Artificial Intelligence (AI) and, in particular, Machine Learning (ML), have emerged to be utilized in various applications due to their capability to learn how to solve complex problems. Over the past decade, rapid advances in ML have presented Deep ...

survey
Cross-Chain Smart Contract Invocations: A Systematic Multi-Vocal Literature Review
Article No.: 142, Pages 1–38https://doi.org/10.1145/3638045

The introduction of smart contracts has expanded the applicability of blockchains to many domains beyond finance and cryptocurrencies. Moreover, different blockchain technologies have evolved that target special requirements. As a result, in practice, ...

survey
Surveying Emerging Network Approaches for Military Command and Control Systems
Article No.: 143, Pages 1–38https://doi.org/10.1145/3626090

This survey paper examines emerging network approaches for military Command and Control (C2) systems. An extensive literature review is provided along the text on network-centric C2 systems. Also, it provides a comprehensive analysis of the paradigm based ...

survey
Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey
Article No.: 144, Pages 1–31https://doi.org/10.1145/3638043

We use sensor technologies in many areas of everyday life. We use sensors to check and study various phenomena and to improve our lives. Hence, the sensors are used in medicine, industry, sports, and many other aspects of everyday life. Interconnected ...

survey
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Article No.: 145, Pages 1–41https://doi.org/10.1145/3638240

Malware is one of the most common and severe cyber threats today. Malware infects millions of devices and can perform several malicious activities including compromising sensitive data, encrypting data, crippling system performance, and many more. Hence, ...

survey
Open Access
Deep Learning Workload Scheduling in GPU Datacenters: A Survey
Article No.: 146, Pages 1–38https://doi.org/10.1145/3638757

Deep learning (DL) has demonstrated its remarkable success in a wide variety of fields. The development of a DL model is a time-consuming and resource-intensive procedure. Hence, dedicated GPU accelerators have been collectively constructed into a GPU ...

survey
Open Access
A Survey of Generative Adversarial Networks for Synthesizing Structured Electronic Health Records
Article No.: 147, Pages 1–34https://doi.org/10.1145/3636424

Electronic Health Records (EHRs) are a valuable asset to facilitate clinical research and point of care applications; however, many challenges such as data privacy concerns impede its optimal utilization. Deep generative models, particularly Generative ...

research-article
Open Access
Malware Detection with Artificial Intelligence: A Systematic Literature Review
Article No.: 148, Pages 1–33https://doi.org/10.1145/3638552

In this survey, we review the key developments in the field of malware detection using AI and analyze core challenges. We systematically survey state-of-the-art methods across five critical aspects of building an accurate and robust AI-powered malware-...

survey
Open Access
Survey on Recommender Systems for Biomedical Items in Life and Health Sciences
Article No.: 149, Pages 1–32https://doi.org/10.1145/3639047

The generation of biomedical data is of such magnitude that its retrieval and analysis have posed several challenges. A survey of recommender system (RS) approaches in biomedical fields is provided in this analysis, along with a discussion of existing ...

survey
Open Access
Completeness, Recall, and Negation in Open-world Knowledge Bases: A Survey
Article No.: 150, Pages 1–42https://doi.org/10.1145/3639563

General-purpose knowledge bases (KBs) are a cornerstone of knowledge-centric AI. Many of them are constructed pragmatically from web sources and are thus far from complete. This poses challenges for the consumption as well as the curation of their ...

survey
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
Article No.: 151, Pages 1–38https://doi.org/10.1145/3638531

The rapid development of Machine Learning (ML) has demonstrated superior performance in many areas, such as computer vision and video and speech recognition. It has now been increasingly leveraged in software systems to automate the core tasks. However, ...

survey
Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures
Article No.: 152, Pages 1–39https://doi.org/10.1145/3640312

Deep Reinforcement Learning (DRL) is an essential subfield of Artificial Intelligence (AI), where agents interact with environments to learn policies for solving complex tasks. In recent years, DRL has achieved remarkable breakthroughs in various tasks, ...

survey
Deep Learning for Plant Identification and Disease Classification from Leaf Images: Multi-prediction Approaches
Article No.: 153, Pages 1–37https://doi.org/10.1145/3639816

Deep learning (DL) plays an important role in modern agriculture, especially in plant pathology using leaf images where convolutional neural networks (CNN) are attracting a lot of attention. While numerous reviews have explored the applications of DL ...

survey
Mouse Dynamics Behavioral Biometrics: A Survey
Article No.: 154, Pages 1–33https://doi.org/10.1145/3640311

Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy and security of our data and systems. Therefore, there is a pressing need to protect our data and systems by improving authentication mechanisms, which are ...

survey
Open Access
The Art of Cybercrime Community Research
Article No.: 155, Pages 1–26https://doi.org/10.1145/3639362

In the last decade, cybercrime has risen considerably. One key factor is the proliferation of online cybercrime communities, where actors trade products and services, and also learn from each other. Accordingly, understanding the operation and behavior of ...

survey
Open Access
Machine Learning for Refining Knowledge Graphs: A Survey
Article No.: 156, Pages 1–38https://doi.org/10.1145/3640313

Knowledge graph (KG) refinement refers to the process of filling in missing information, removing redundancies, and resolving inconsistencies in KGs. With the growing popularity of KG in various domains, many techniques involving machine learning have ...

survey
Open Access
Model-based Trustworthiness Evaluation of Autonomous Cyber-Physical Production Systems: A Systematic Mapping Study
Article No.: 157, Pages 1–28https://doi.org/10.1145/3640314

The fourth industrial revolution, i.e., Industry 4.0, is associated with Cyber-Physical Systems (CPS), which are entities integrating hardware (e.g., smart sensors and actuators connected through the Industrial Internet of Things) together with control ...

survey
Open Access
Drug–Drug Interaction Relation Extraction Based on Deep Learning: A Review
Article No.: 158, Pages 1–33https://doi.org/10.1145/3645089

Drug–drug interaction (DDI) is an important part of drug development and pharmacovigilance. At the same time, DDI is an important factor in treatment planning, monitoring effects of medicine and patient safety, and has a significant impact on public ...

survey
Knowledge Graph Embedding: A Survey from the Perspective of Representation Spaces
Article No.: 159, Pages 1–42https://doi.org/10.1145/3643806

Knowledge graph embedding (KGE) is an increasingly popular technique that aims to represent entities and relations of knowledge graphs into low-dimensional semantic spaces for a wide spectrum of applications such as link prediction, knowledge reasoning ...

survey
On Trust Recommendations in the Social Internet of Things – A Survey
Article No.: 160, Pages 1–35https://doi.org/10.1145/3645100

The novel paradigm Social Internet of Things (SIoT) improves the network navigability, identifies suitable service providers, and addresses scalability concerns. Ensuring trustworthy collaborations among devices is a key aspect in SIoT and can be realized ...

survey
Open Access
Symbolic Knowledge Extraction and Injection with Sub-symbolic Predictors: A Systematic Literature Review
Article No.: 161, Pages 1–35https://doi.org/10.1145/3645103

In this article, we focus on the opacity issue of sub-symbolic machine learning predictors by promoting two complementary activities—symbolic knowledge extraction (SKE) and symbolic knowledge injection (SKI)—from and into sub-symbolic predictors. We ...

Subjects

Comments