Volume 54, Issue 6July 2022Invited Tuturial
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT
July 2021, Article No.: 112, pp 1–38https://doi.org/10.1145/3453159

Random numbers are an essential input to many functions on the Internet of Things (IoT). Common use cases of randomness range from low-level packet transmission to advanced algorithms of artificial intelligence as well as security and trust, which ...

Images in Space and Time: Real Big Data in Healthcare
July 2021, Article No.: 113, pp 1–38https://doi.org/10.1145/3453657

Medical imaging diagnosis is mostly subjective, as it depends on medical experts. Hence, the service provided is limited by expert opinion variations and image complexity as well. However, with the increasing advancements in deep learning field, ...

A Unified Model for Context-Sensitive Program Analyses:: The Blind Men and the Elephant
July 2021, Article No.: 114, pp 1–37https://doi.org/10.1145/3456563

Context-sensitive methods of program analysis increase the precision of interprocedural analysis by achieving the effect of call inlining. These methods have been defined using different formalisms and hence appear as algorithms that are very different ...

A Survey on Bias and Fairness in Machine Learning
July 2021, Article No.: 115, pp 1–35https://doi.org/10.1145/3457607

With the widespread use of artificial intelligence (AI) systems and applications in our everyday lives, accounting for fairness has gained significant importance in designing and engineering of such systems. AI systems can be used in many sensitive ...

Data Modeling and NoSQL Databases - A Systematic Mapping Review
July 2021, Article No.: 116, pp 1–26https://doi.org/10.1145/3457608

Modeling is one of the most important steps in developing a database. In traditional databases, the Entity Relationship (ER) and Unified Modeling Language (UML) models are widely used. But how are NoSQL databases being modeled? We performed a systematic ...

A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms
July 2021, Article No.: 117, pp 1–36https://doi.org/10.1145/3453153

Ransomware remains an alarming threat in the 21st century. It has evolved from being a simple scare tactic into a complex malware capable of evasion. Formerly, end-users were targeted via mass infection campaigns. Nevertheless, in recent years, the ...

Topic-based Video Analysis: A Survey
July 2021, Article No.: 118, pp 1–34https://doi.org/10.1145/3459089

Manual processing of a large volume of video data captured through closed-circuit television is challenging due to various reasons. First, manual analysis is highly time-consuming. Moreover, as surveillance videos are recorded in dynamic conditions such ...

Open Access
The Hypervolume Indicator: Computational Problems and Algorithms
July 2021, Article No.: 119, pp 1–42https://doi.org/10.1145/3453474

The hypervolume indicator is one of the most used set-quality indicators for the assessment of stochastic multiobjective optimizers, as well as for selection in evolutionary multiobjective optimization algorithms. Its theoretical properties justify its ...

Towards Indistinguishable Augmented Reality: A Survey on Optical See-through Head-mounted Displays
July 2021, Article No.: 120, pp 1–36https://doi.org/10.1145/3453157

Adding virtual information that is indistinguishable from reality has been a long-awaited goal in Augmented Reality (AR). While already demonstrated in the 1960s, only recently have Optical See-Through Head-Mounted Displays (OST-HMDs) seen a reemergence,...

Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks
July 2021, Article No.: 121, pp 1–36https://doi.org/10.1145/3453648

Software Defined Networking (SDN) is an evolving technology that decouples the control functionality from the underlying hardware managed by the control plane. The application plane supports programmers to develop numerous applications (such as ...

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography
July 2022, Article No.: 122, pp 1–37https://doi.org/10.1145/3456629

Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection ...

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures
July 2021, Article No.: 123, pp 1–35https://doi.org/10.1145/3457904

The adoption of network traffic encryption is continually growing. Popular applications use encryption protocols to secure communications and protect the privacy of users. In addition, a large portion of malware is spread through the network traffic ...

Open Access
Survey of Post-OCR Processing Approaches
July 2021, Article No.: 124, pp 1–37https://doi.org/10.1145/3453476

Optical character recognition (OCR) is one of the most popular techniques used for converting printed documents into machine-readable ones. While OCR engines can do well with modern text, their performance is unfortunately significantly reduced on ...

On the Use of Intelligent Models towards Meeting the Challenges of the Edge Mesh
July 2022, Article No.: 125, pp 1–42https://doi.org/10.1145/3456630

Nowadays, we are witnessing the advent of the Internet of Things (IoT) with numerous devices performing interactions between them or with their environment. The huge number of devices leads to huge volumes of data that demand the appropriate processing. ...

Open Access
Security Vulnerabilities of SGX and Countermeasures: A Survey
July 2021, Article No.: 126, pp 1–36https://doi.org/10.1145/3456631

Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of ...

A Survey of Reinforcement Learning Algorithms for Dynamically Varying Environments
July 2021, Article No.: 127, pp 1–25https://doi.org/10.1145/3459991

Reinforcement learning (RL) algorithms find applications in inventory control, recommender systems, vehicular traffic management, cloud computing, and robotics. The real-world complications arising in these domains makes them difficult to solve with the ...

Open Access
k-Nearest Neighbour Classifiers - A Tutorial
July 2022, Article No.: 128, pp 1–25https://doi.org/10.1145/3459665

Perhaps the most straightforward classifier in the arsenal or Machine Learning techniques is the Nearest Neighbour Classifier—classification is achieved by identifying the nearest neighbours to a query example and using those neighbours to determine the ...

Machine Learning into Metaheuristics: A Survey and Taxonomy
July 2022, Article No.: 129, pp 1–32https://doi.org/10.1145/3459664

During the past few years, research in applying machine learning (ML) to design efficient, effective, and robust metaheuristics has become increasingly popular. Many of those machine learning-supported metaheuristics have generated high-quality results ...

A Survey on Automated Log Analysis for Reliability Engineering
July 2021, Article No.: 130, pp 1–37https://doi.org/10.1145/3460345

Logs are semi-structured text generated by logging statements in software source code. In recent decades, software logs have become imperative in the reliability assurance mechanism of many software systems, because they are often the only data ...

Open Access
A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions
July 2021, Article No.: 131, pp 1–36https://doi.org/10.1145/3460427

The past four years have witnessed the rapid development of federated learning (FL). However, new privacy concerns have also emerged during the aggregation of the distributed intermediate results. The emerging privacy-preserving FL (PPFL) has been ...

Open Access
Generative Adversarial Networks: A Survey Toward Private and Secure Applications
July 2021, Article No.: 132, pp 1–38https://doi.org/10.1145/3459992

Generative Adversarial Networks (GANs) have promoted a variety of applications in computer vision and natural language processing, among others, due to its generative model’s compelling ability to generate realistic examples plausibly drawn from an ...

Design Guidelines on Deep Learning–based Pedestrian Detection Methods for Supporting Autonomous Vehicles
July 2022, Article No.: 133, pp 1–36https://doi.org/10.1145/3460770

Intelligent transportation systems (ITS) enable transportation participants to communicate with each other by sending and receiving messages, so that they can be aware of their surroundings and facilitate efficient transportation through better decision ...

SECTION: Invited Tuturial

Applying Machine Learning for Sensor Data Analysis in Interactive Systems: Common Pitfalls of Pragmatic Use and Ways to Avoid Them
July 2021, Article No.: 134, pp 1–25https://doi.org/10.1145/3459666

With the widespread proliferation of (miniaturized) sensing facilities and the massive growth and popularity of the field of machine learning (ML) research, new frontiers in automated sensor data analysis have been explored that lead to paradigm shifts ...



About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!