Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyNovember 2024
A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future Directions
- Sheng Zhou,
- Hongjia Xu,
- Zhuonan Zheng,
- Jiawei Chen,
- Zhao Li,
- Jiajun Bu,
- Jia Wu,
- Xin Wang,
- Wenwu Zhu,
- Martin Ester
ACM Computing Surveys (CSUR), Volume 57, Issue 3Article No.: 69, Pages 1–38https://doi.org/10.1145/3689036Clustering is a fundamental machine learning task, which aim at assigning instances into groups so that similar samples belong to the same cluster while dissimilar samples belong to different clusters. Shallow clustering methods usually assume that data ...
- surveyNovember 2024
Advancements in Federated Learning: Models, Methods, and Privacy
ACM Computing Surveys (CSUR), Volume 57, Issue 2Article No.: 46, Pages 1–39https://doi.org/10.1145/3664650Federated learning (FL) is a promising technique for resolving the rising privacy and security concerns. Its main ingredient is to cooperatively learn the model among the distributed clients without uploading any sensitive data. In this article, we ...
- surveyOctober 2024
Video Unsupervised Domain Adaptation with Deep Learning: A Comprehensive Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 12Article No.: 317, Pages 1–36https://doi.org/10.1145/3679010Video analysis tasks such as action recognition have received increasing research interest with growing applications in fields such as smart healthcare, thanks to the introduction of large-scale datasets and deep learning based representations. However, ...
- tutorialApril 2024
Optimizing with Attractor: A Tutorial
ACM Computing Surveys (CSUR), Volume 56, Issue 9Article No.: 235, Pages 1–41https://doi.org/10.1145/3648354This tutorial presents a novel search system—the Attractor-Based Search System (ABSS)—that can solve the Traveling Salesman Problem very efficiently with optimality guarantee. From the perspective of dynamical systems, a heuristic local search algorithm ...
- surveyMarch 2024
Symbolic Knowledge Extraction and Injection with Sub-symbolic Predictors: A Systematic Literature Review
ACM Computing Surveys (CSUR), Volume 56, Issue 6Article No.: 161, Pages 1–35https://doi.org/10.1145/3645103In this article, we focus on the opacity issue of sub-symbolic machine learning predictors by promoting two complementary activities—symbolic knowledge extraction (SKE) and symbolic knowledge injection (SKI)—from and into sub-symbolic predictors. We ...
-
- surveySeptember 2023
Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries
- Maciej Besta,
- Robert Gerstenberger,
- Emanuel Peter,
- Marc Fischer,
- Michał Podstawski,
- Claude Barthels,
- Gustavo Alonso,
- Torsten Hoefler
ACM Computing Surveys (CSUR), Volume 56, Issue 2Article No.: 31, Pages 1–40https://doi.org/10.1145/3604932Numerous irregular graph datasets, for example social networks or web graphs, may contain even trillions of edges. Often, their structure changes over time and they have domain-specific rich data associated with vertices and edges. Graph database systems ...
- surveyJuly 2023
Survey on Privacy-Preserving Techniques for Microdata Publication
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 309, Pages 1–42https://doi.org/10.1145/3588765The exponential growth of collected, processed, and shared microdata has given rise to concerns about individuals’ privacy. As a result, laws and regulations have emerged to control what organisations do with microdata and how they protect it. Statistical ...
- surveyJuly 2023
Recent Advances in Bayesian Optimization
ACM Computing Surveys (CSUR), Volume 55, Issue 13sArticle No.: 287, Pages 1–36https://doi.org/10.1145/3582078Bayesian optimization has emerged at the forefront of expensive black-box optimization due to its data efficiency. Recent years have witnessed a proliferation of studies on the development of new Bayesian optimization algorithms and their applications. ...
- surveyDecember 2022
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
ACM Computing Surveys (CSUR), Volume 55, Issue 8Article No.: 163, Pages 1–39https://doi.org/10.1145/3547330The outstanding performance of deep neural networks has promoted deep learning applications in a broad set of domains. However, the potential risks caused by adversarial samples have hindered the large-scale deployment of deep learning. In these scenarios,...
- surveyDecember 2022
How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 7Article No.: 136, Pages 1–38https://doi.org/10.1145/3539604In a blockchain-based system, the lack of centralized control requires active participation and cooperative behaviors of system entities to ensure system security and sustainability. However, dynamic environments and unpredictable entity behaviors ...
- surveyDecember 2022
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems
ACM Computing Surveys (CSUR), Volume 55, Issue 7Article No.: 134, Pages 1–36https://doi.org/10.1145/3538707Machine learning (ML) has been universally adopted for automated decisions in a variety of fields, including recognition and classification applications, recommendation systems, natural language processing, and so on. However, in light of high expenses on ...
- surveySeptember 2022
A Survey on Differential Privacy for Unstructured Data Content
ACM Computing Surveys (CSUR), Volume 54, Issue 10sArticle No.: 207, Pages 1–28https://doi.org/10.1145/3490237Huge amounts of unstructured data including image, video, audio, and text are ubiquitously generated and shared, and it is a challenge to protect sensitive personal information in them, such as human faces, voiceprints, and authorships. Differential ...
- surveyNovember 2021
Arms Race in Adversarial Malware Detection: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 1Article No.: 15, Pages 1–35https://doi.org/10.1145/3484491Malicious software (malware) is a major cyber threat that has to be tackled with Machine Learning (ML) techniques because millions of new malware examples are injected into cyberspace on a daily basis. However, ML is vulnerable to attacks known as ...
- surveyOctober 2021
Evolutionary Large-Scale Multi-Objective Optimization: A Survey
ACM Computing Surveys (CSUR), Volume 54, Issue 8Article No.: 174, Pages 1–34https://doi.org/10.1145/3470971Multi-objective evolutionary algorithms (MOEAs) have shown promising performance in solving various optimization problems, but their performance may deteriorate drastically when tackling problems containing a large number of decision variables. In recent ...
- research-articleJuly 2021
More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design
ACM Computing Surveys (CSUR), Volume 54, Issue 7Article No.: 136, Pages 1–37https://doi.org/10.1145/3460771The vast majority of artificial intelligence solutions are founded on game theory, and differential privacy is emerging as perhaps the most rigorous and widely adopted privacy paradigm in the field. However, alongside all the advancements made in both ...
- research-articleMay 2021
Community Detection in Multiplex Networks
ACM Computing Surveys (CSUR), Volume 54, Issue 3Article No.: 48, Pages 1–35https://doi.org/10.1145/3444688A multiplex network models different modes of interaction among same-type entities. In this article, we provide a taxonomy of community detection algorithms in multiplex networks. We characterize the different algorithms based on various properties and ...
- research-articleApril 2021
Human Induction in Machine Learning: A Survey of the Nexus
ACM Computing Surveys (CSUR), Volume 54, Issue 3Article No.: 59, Pages 1–18https://doi.org/10.1145/3444691As our epistemic ambitions grow, the common and scientific endeavours are becoming increasingly dependent on Machine Learning (ML). The field rests on a single experimental paradigm, which consists of splitting the available data into a training and ...
- research-articleMarch 2021
Indexing Highly Repetitive String Collections, Part I: Repetitiveness Measures
ACM Computing Surveys (CSUR), Volume 54, Issue 2Article No.: 29, Pages 1–31https://doi.org/10.1145/3434399Two decades ago, a breakthrough in indexing string collections made it possible to represent them within their compressed space while at the same time offering indexed search functionalities. As this new technology permeated through applications like ...
- research-articleFebruary 2021
Evolution of Semantic Similarity—A Survey
ACM Computing Surveys (CSUR), Volume 54, Issue 2Article No.: 41, Pages 1–37https://doi.org/10.1145/3440755Estimating the semantic similarity between text data is one of the challenging and open research problems in the field of Natural Language Processing (NLP). The versatility of natural language makes it difficult to define rule-based methods for ...
- surveyJune 2020
An Overview of Service Placement Problem in Fog and Edge Computing
ACM Computing Surveys (CSUR), Volume 53, Issue 3Article No.: 65, Pages 1–35https://doi.org/10.1145/3391196To support the large and various applications generated by the Internet of Things (IoT), Fog Computing was introduced to complement the Cloud Computing and offer Cloud-like services at the edge of the network with low latency and real-time responses. ...