skip to main content
Volume 56, Issue 7July 2024
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue on Trustworthy AI
survey
Exploiting Blockchain to Make AI Trustworthy: A Software Development Lifecycle View
Article No.: 163, Pages 1–31https://doi.org/10.1145/3614424

Artificial intelligence (AI) is a very powerful technology and can be a potential disrupter and essential enabler. As AI expands into almost every aspect of our lives, people raise serious concerns about AI misbehaving and misuse. To address this concern, ...

research-article
Open Access
A Survey of Algorithmic Methods for Competency Self-Assessments in Human-Autonomy Teaming
Article No.: 164, Pages 1–31https://doi.org/10.1145/3616010

Humans working with autonomous artificially intelligent systems may not be experts in the inner workings of their machine teammates, but need to understand when to employ, trust, and rely on the system. A critical challenge is to develop machine agents ...

research-article
Open Access
Non-imaging Medical Data Synthesis for Trustworthy AI: A Comprehensive Survey
Article No.: 165, Pages 1–35https://doi.org/10.1145/3614425

Data quality is a key factor in the development of trustworthy AI in healthcare. A large volume of curated datasets with controlled confounding factors can improve the accuracy, robustness, and privacy of downstream AI algorithms. However, access to high-...

research-article
Open Access
Fairness in Machine Learning: A Survey
Article No.: 166, Pages 1–38https://doi.org/10.1145/3616865

When Machine Learning technologies are used in contexts that affect citizens, companies as well as researchers need to be confident that there will not be any unexpected social implications, such as bias towards gender, ethnicity, and/or people with ...

research-article
Trusting My Predictions: On the Value of Instance-Level Analysis
Article No.: 167, Pages 1–28https://doi.org/10.1145/3615354

Machine Learning solutions have spread along many domains, including critical applications. The development of such models usually relies on a dataset containing labeled data. This dataset is then split into training and test sets and the accuracy of the ...

research-article
Open Access
Explainable Reinforcement Learning: A Survey and Comparative Review
Article No.: 168, Pages 1–36https://doi.org/10.1145/3616864

Explainable reinforcement learning (XRL) is an emerging subfield of explainable machine learning that has attracted considerable attention in recent years. The goal of XRL is to elucidate the decision-making process of reinforcement learning (RL) agents ...

research-article
Byzantine Machine Learning: A Primer
Article No.: 169, Pages 1–39https://doi.org/10.1145/3616537

The problem of Byzantine resilience in distributed machine learning, a.k.a. Byzantine machine learning, consists of designing distributed algorithms that can train an accurate model despite the presence of Byzantine nodes—that is, nodes with corrupt data ...

research-article
Open Access
Secure and Trustworthy Artificial Intelligence-extended Reality (AI-XR) for Metaverses
Article No.: 170, Pages 1–38https://doi.org/10.1145/3614426

Metaverse is expected to emerge as a new paradigm for the next-generation Internet, providing fully immersive and personalized experiences to socialize, work, and play in self-sustaining and hyper-spatio-temporal virtual world(s). The advancements in ...

research-article
Open Access
A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation, and Research Challenges
Article No.: 171, Pages 1–37https://doi.org/10.1145/3618105

Graph Neural Networks (GNNs) perform well in community detection and molecule classification. Counterfactual Explanations (CE) provide counter-examples to overcome the transparency limitations of black-box models. Due to the growing attention in graph ...

research-article
A Survey of Dataset Refinement for Problems in Computer Vision Datasets
Article No.: 172, Pages 1–34https://doi.org/10.1145/3627157

Large-scale datasets have played a crucial role in the advancement of computer vision. However, they often suffer from problems such as class imbalance, noisy labels, dataset bias, or high resource costs, which can inhibit model performance and reduce ...

research-article
Open Access
Responsible AI Pattern Catalogue: A Collection of Best Practices for AI Governance and Engineering
Article No.: 173, Pages 1–35https://doi.org/10.1145/3626234

Responsible Artificial Intelligence (RAI) is widely considered as one of the greatest scientific challenges of our time and is key to increase the adoption of Artificial Intelligence (AI). Recently, a number of AI ethics principles frameworks have been ...

research-article
It Is All about Data: A Survey on the Effects of Data on Adversarial Robustness
Article No.: 174, Pages 1–41https://doi.org/10.1145/3627817

Adversarial examples are inputs to machine learning models that an attacker has intentionally designed to confuse the model into making a mistake. Such examples pose a serious threat to the applicability of machine learning-based systems, especially in ...

research-article
Open Access
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
Article No.: 175, Pages 1–39https://doi.org/10.1145/3627536

Data Poisoning Attacks (DPA) represent a sophisticated technique aimed at distorting the training data of machine learning models, thereby manipulating their behavior. This process is not only technically intricate but also frequently dependent on the ...

research-article
Open Access
Artificial Intelligence for Safety-Critical Systems in Industrial and Transportation Domains: A Survey
Article No.: 176, Pages 1–40https://doi.org/10.1145/3626314

Artificial Intelligence (AI) can enable the development of next-generation autonomous safety-critical systems in which Machine Learning (ML) algorithms learn optimized and safe solutions. AI can also support and assist human safety engineers in developing ...

SECTION: Regular Papers
survey
A Systematic Review of Cross-Lingual Sentiment Analysis: Tasks, Strategies, and Prospects
Article No.: 177, Pages 1–37https://doi.org/10.1145/3645106

Traditional methods for sentiment analysis, when applied in a monolingual context, often yield less than optimal results in multilingual settings. This underscores the need for a more thorough exploration of cross-lingual sentiment analysis (CLSA) ...

survey
Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
Article No.: 178, Pages 1–40https://doi.org/10.1145/3645109

Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle microarchitecture state to steal the user’s secret data and even compromise the operating systems. In recent years, considerable discussion lies in understanding the attack-...

survey
Blockchain Data Storage Optimisations: A Comprehensive Survey
Article No.: 179, Pages 1–27https://doi.org/10.1145/3645104

Blockchain offers immutability, transparency, and security in a decentralised way for many applications, including finance, supply chain, and the Internet of Things (IoT). Due to its popularity and widespread adoption, it has started to process an ...

survey
A Survey on Reversible Data Hiding for Uncompressed Images
Article No.: 180, Pages 1–33https://doi.org/10.1145/3645105

Reversible data hiding (RDH) has developed various theories and algorithms since the early 1990s. The existing works involve a large amount of specialized knowledge, making it difficult for researchers, especially primary learners, to have a good ...

survey
Open Access
Efficient High-Resolution Deep Learning: A Survey
Article No.: 181, Pages 1–35https://doi.org/10.1145/3645107

Cameras in modern devices such as smartphones, satellites and medical equipment are capable of capturing very high resolution images and videos. Such high-resolution data often need to be processed by deep learning models for cancer detection, automated ...

survey
A Systematic Mapping Study on Social Network Privacy: Threats and Solutions
Article No.: 182, Pages 1–29https://doi.org/10.1145/3645086

Online Social Networks (OSNs) are becoming pervasive in today’s world. Millions of people worldwide are involved in different forms of online networking. However, this ease of use of OSNs comes with a cost in terms of privacy. Users of OSNs become victims ...

survey
Open Access
Wearable Activity Trackers: A Survey on Utility, Privacy, and Security
Article No.: 183, Pages 1–40https://doi.org/10.1145/3645091

Over the past decade, wearable activity trackers (WATs) have become increasingly popular. However, despite many research studies in different fields (e.g. psychology, health, and design), few have sought to jointly examine the critical aspects of utility (...

survey
Open Access
Who’s in Charge Here? A Survey on Trustworthy AI in Variable Autonomy Robotic Systems
Article No.: 184, Pages 1–32https://doi.org/10.1145/3645090

This article surveys the Variable Autonomy (VA) robotics literature that considers two contributory elements to Trustworthy AI: transparency and explainability. These elements should play a crucial role when designing and adopting robotic systems, ...

survey
Utilizing BERT for Information Retrieval: Survey, Applications, Resources, and Challenges
Article No.: 185, Pages 1–33https://doi.org/10.1145/3648471

Recent years have witnessed a substantial increase in the use of deep learning to solve various natural language processing (NLP) problems. Early deep learning models were constrained by their sequential or unidirectional nature, such that they struggled ...

survey
Open Access
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT
Article No.: 186, Pages 1–38https://doi.org/10.1145/3645087

Authentication and Session Key Generation Protocols (SKGPs) play an essential role in securing the communication channels of connected Internet of Things (IoT) devices. Recently, through blockchain integration, scholars have tried to enhance the security ...

survey
A Survey and an Empirical Evaluation of Multi-View Clustering Approaches
Article No.: 187, Pages 1–38https://doi.org/10.1145/3645108

Multi-view clustering (MVC) holds a significant role in domains like machine learning, data mining, and pattern recognition. Despite the development of numerous new MVC approaches employing various techniques, there remains a gap in comprehensive studies ...

survey
Going Beyond XAI: A Systematic Survey for Explanation-Guided Learning
Article No.: 188, Pages 1–39https://doi.org/10.1145/3644073

As the societal impact of Deep Neural Networks (DNNs) grows, the goals for advancing DNNs become more complex and diverse, ranging from improving a conventional model accuracy metric to infusing advanced human virtues such as fairness, accountability, ...

survey
Generalized Video Anomaly Event Detection: Systematic Taxonomy and Comparison of Deep Models
Article No.: 189, Pages 1–38https://doi.org/10.1145/3645101

Video Anomaly Detection (VAD) serves as a pivotal technology in the intelligent surveillance systems, enabling the temporal or spatial identification of anomalous events within videos. While existing reviews predominantly concentrate on conventional ...

survey
Intelligent Wearable Systems: Opportunities and Challenges in Health and Sports
Article No.: 190, Pages 1–42https://doi.org/10.1145/3648469

Wearable devices, or wearables, designed to be attached to the human body, can gather personalized real-time data and continuously monitor an individual’s health status and physiological disposition in a non-invasive manner. Intelligent wearables ...

Subjects

Comments