Volume 55, Issue 1January 2023Issue-in-Progress
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation
January 2023, Article No.: 1, pp 1–35https://doi.org/10.1145/3479428

Image representation is an important topic in computer vision and pattern recognition. It plays a fundamental role in a range of applications toward understanding visual contents. Moment-based image representation has been reported to be effective in ...

A Survey on Privacy Preservation in Fog-Enabled Internet of Things
January 2023, Article No.: 2, pp 1–39https://doi.org/10.1145/3474554

Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical challenges that need to be addressed before the full adoption of the IoT. Data privacy is one of the hurdles towards the adoption of IoT as there might be ...

Open Access
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols
January 2023, Article No.: 3, pp 1–36https://doi.org/10.1145/3485131

Many proximity-based tracing (PCT) protocols have been proposed and deployed to combat the spreading of COVID-19. In this article, we take a systematic approach to analyze PCT protocols. We identify a list of desired properties of a contact tracing design ...

Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges
January 2023, Article No.: 4, pp 1–46https://doi.org/10.1145/3485129

Vehicular Edge Computing (VEC), based on the Edge Computing motivation and fundamentals, is a promising technology supporting Intelligent Transport Systems services, smart city applications, and urban computing. VEC can provide and manage computational ...

Reinforcement Learning in Healthcare: A Survey
January 2023, Article No.: 5, pp 1–36https://doi.org/10.1145/3477600

As a subfield of machine learning, reinforcement learning (RL) aims at optimizing decision making by using interaction samples of an agent with its environment and the potentially delayed feedbacks. In contrast to traditional supervised learning that ...

A Unified Perspective for Disinformation Detection and Truth Discovery in Social Sensing: A Survey
January 2023, Article No.: 6, pp 1–33https://doi.org/10.1145/3477138

With the proliferation of social sensing, large amounts of observation are contributed by people or devices. However, these observations contain disinformation. Disinformation can propagate across online social networks at a relatively low cost, but ...

A Survey on Deep Learning for Human Mobility
January 2023, Article No.: 7, pp 1–44https://doi.org/10.1145/3485125

The study of human mobility is crucial due to its impact on several aspects of our society, such as disease spreading, urban planning, well-being, pollution, and more. The proliferation of digital mobility data, such as phone records, GPS traces, and ...

Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s Perspective
January 2023, Article No.: 8, pp 1–38https://doi.org/10.1145/3485133

Deep Learning algorithms have achieved state-of-the-art performance for Image Classification. For this reason, they have been used even in security-critical applications, such as biometric recognition systems and self-driving cars. However, recent works ...

A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions
January 2023, Article No.: 9, pp 1–35https://doi.org/10.1145/3485130

In the era of Industry 4.0, the Internet-of-Things (IoT) performs the driving position analogous to the initial industrial metamorphosis. IoT affords the potential to couple machine-to-machine intercommunication and real-time information-gathering within ...

A Survey on Embedding Dynamic Graphs
January 2023, Article No.: 10, pp 1–37https://doi.org/10.1145/3483595

Embedding static graphs in low-dimensional vector spaces plays a key role in network analytics and inference, supporting applications like node classification, link prediction, and graph visualization. However, many real-world networks present dynamic ...

Query Processing on Heterogeneous CPU/GPU Systems
January 2023, Article No.: 11, pp 1–38https://doi.org/10.1145/3485126

Due to their high computational power and internal memory bandwidth, graphic processing units (GPUs) have been extensively studied by the database systems research community. A heterogeneous query processing system that employs CPUs and GPUs at the same ...

A Review on Fact Extraction and Verification
January 2023, Article No.: 12, pp 1–35https://doi.org/10.1145/3485127

We study the fact-checking problem, which aims to identify the veracity of a given claim. Specifically, we focus on the task of Fact Extraction and VERification (FEVER) and its accompanied dataset. The task consists of the subtasks of retrieving the ...

Open Access
Deep Learning-based Face Super-resolution: A Survey
January 2023, Article No.: 13, pp 1–36https://doi.org/10.1145/3485132

Face super-resolution (FSR), also known as face hallucination, which is aimed at enhancing the resolution of low-resolution (LR) face images to generate high-resolution face images, is a domain-specific image super-resolution problem. Recently, FSR has ...

Open Access
Neural Network–Based Financial Volatility Forecasting: A Systematic Review
January 2023, Article No.: 14, pp 1–30https://doi.org/10.1145/3483596

Volatility forecasting is an important aspect of finance as it dictates many decisions of market players. A snapshot of state-of-the-art neural network–based financial volatility forecasting was generated by examining 35 studies, published after 2015. ...

Arms Race in Adversarial Malware Detection: A Survey
January 2023, Article No.: 15, pp 1–35https://doi.org/10.1145/3484491

Malicious software (malware) is a major cyber threat that has to be tackled with Machine Learning (ML) techniques because millions of new malware examples are injected into cyberspace on a daily basis. However, ML is vulnerable to attacks known as ...

A Survey on String Constraint Solving
January 2023, Article No.: 16, pp 1–38https://doi.org/10.1145/3484198

String constraint solving refers to solving combinatorial problems involving constraints over string variables. String solving approaches have become popular over the past few years given the massive use of strings in different application domains like ...

Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking
January 2023, Article No.: 17, pp 1–33https://doi.org/10.1145/3483790

Information flow tracking was proposed more than 40 years ago to address the limitations of access control mechanisms to guarantee the confidentiality and integrity of information flowing within a system, but has not yet been widely applied in practice ...

Software Visualizations to Analyze Memory Consumption: A Literature Review
January 2023, Article No.: 18, pp 1–34https://doi.org/10.1145/3485134

Understanding and optimizing memory usage of software applications is a difficult task, usually involving the analysis of large amounts of memory-related complex data. Over the years, numerous software visualizations have been proposed to help developers ...

A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features
January 2023, Article No.: 19, pp 1–41https://doi.org/10.1145/3486860

Binary code fingerprinting is crucial in many security applications. Examples include malware detection, software infringement, vulnerability analysis, and digital forensics. It is also useful for security researchers and reverse engineers since it ...

Artificial Intelligence Security: Threats and Countermeasures
January 2023, Article No.: 20, pp 1–36https://doi.org/10.1145/3487890

In recent years, with rapid technological advancement in both computing hardware and algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human being in a wide range of fields, such as image recognition, education, ...

A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis
January 2023, Article No.: 21, pp 1–35https://doi.org/10.1145/3485272

Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for commercial applications, embracing many domains ranging from human safety to the medical field, agriculture and environment, multimedia production, and even commercial ...

Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques
January 2023, Article No.: 22, pp 1–51https://doi.org/10.1145/3485273

Studying information diffusion in SNS (Social Networks Service) has remarkable significance in both academia and industry. Theoretically, it boosts the development of other subjects such as statistics, sociology, and data mining. Practically, diffusion ...

A Comprehensive Taxonomy of Dynamic Texture Representation
January 2023, Article No.: 23, pp 1–39https://doi.org/10.1145/3487892

Representing dynamic textures (DTs) plays an important role in many real implementations in the computer vision community. Due to the turbulent and non-directional motions of DTs along with the negative impacts of different factors (e.g., environmental ...



About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!