Export Citations
- Selected
- All Results
61,964 Results for: All: hand-reference-drawing-holding-gunEdit SearchSave SearchFailed to save your search, try again laterSearch has been saved (My Saved Searches) Pleaselogin to be able to save your searches and receive alerts for new content matching your search criteria.Save this search
Searched The ACM Full-Text Collection (743,661 records)|Expand your search to The ACM Guide to Computing Literature (3,704,006 records)
Showing 1 - 20of61,964 Results
Filters
Select All
Export CitationsSave to Binder
Save to Binder
Create a New Binder
per page:
- 10
- 20
- 50
- Relevance
- Earliest
- Downloaded
- Cited
research-article
July 2024
Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability
- Mohammed M. Alani,
- Atefeh Mashatan,
- Ali Miri
CPSS '24: Proceedings of the 10th ACM Cyber-Physical System Security WorkshopJuly 2024, pp 16–23https://doi.org/10.1145/3626205.3659150
The growing popularity of Internet-of-Things devices makes them a desired target for malicious actors. Most attacks start with a reconnaissance phase where the attacker gathers information about the services running on the device, the open ports, and any ...
- 0
Metrics
Total Citations0
research-article
Open Access
June 2024
Improving Steganographic Security with Source Biasing
- Eli Dworetzky,
- Edgar Kaziakhmedov,
- Jessica Fridrich
June 2024, pp 19–30https://doi.org/10.1145/3658664.3659646
By selecting covers in which steganographic embedding is harder to detect, the steganographer can decrease the chances of being caught by the Warden. On the other hand, sampling from the cover source with a bias is detectable on its own. In this paper, ...
- 0
Metrics
Total Citations0
research-article
Open Access
June 2024
Exploring Diffusion-Inspired Pixel Predictors for WS Steganalysis
- Martin Beneš,
- Rainer Böhme
June 2024, pp 75–86https://doi.org/10.1145/3658664.3659645
Analytical estimators of the steganographic change rate in images, such as WS steganalysis, often operate on the noise residual. The residual can be obtained by estimating the cover content with pixel predictors and subtracting it from the image under ...
- 0
Metrics
Total Citations0
research-article
Open Access
June 2024
Investigating Translation Invariance and Shiftability in CNNs for Robust Multimedia Forensics: A JPEG Case Study
- Edoardo Daniele Cannas,
- Sara Mandelli,
- Paolo Bestagini,
- Stefano Tubaro
June 2024, pp 53–63https://doi.org/10.1145/3658664.3659644
Convolutional Neural Networks (CNNs) have been the state of the art in many applications, including computer vision and multimedia forensics. Translation invariance is often included among the reasons for their success. However, the recent literature has ...
research-article
June 2024
Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing
- Li Zhang,
- Yong Liu,
- Xinpeng Zhang,
- Hanzhou Wu
June 2024, pp 223–234https://doi.org/10.1145/3658664.3659634
Protecting deep neural networks (DNNs) against intellectual property (IP) infringement has attracted an increasing attention in recent years. Recent advances focus on IP protection of generative models, which embed the watermark information into the ...
- 0
Metrics
Total Citations0
short-paper
June 2024
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection: Data/Toolset Paper
- Gabriel Loiseau,
- Valentin Lefils,
- Maxime Meyer,
- Damien Riquet
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyJune 2024, pp 361–366https://doi.org/10.1145/3626232.3653283
Phishing remains a pervasive security threat, necessitating effective and universally comparable detection systems. The use of supervised machine learning models for phishing detection has been generalized in the literature to automate predictions and ...
- 0
Metrics
Total Citations0
research-article
June 2024
SAMANTHA: A chatbot to assist users in training tasks to prevent workplace hazards
- David Contreras Aguilar,
- Fernando Medina,
- Mauricio Oyanedel,
- Maria Salamó,
- Miquel Sànchez-Marrè
Interacción '24: Proceedings of the XXIV International Conference on Human Computer InteractionJune 2024, Article No.: 11, pp 1–8https://doi.org/10.1145/3657242.3658587
In businesses, preventing workplace hazards becomes crucial. In order to limit negative effects on people, society, and the economy, it is crucial for both the organization and its employees to reduce accidents and occupational illnesses. Staff training ...
- 0
Metrics
Total Citations0
short-paper
June 2024
Insight AI Risk Detection Model - Vulnerable People Emotional Situation Support
- Diego Gosmar,
- Elena Peretto,
- Oita Coleman
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 437–441https://doi.org/10.1145/3661167.3661235
This paper presents an AI-based risk detection model (architectural framework) for real-time emotional support and risk assessment, addressing the rise in mental health issues among youth. The model leverages Insight AI (Sentiment and Emotional Analysis) ...
- 0
Metrics
Total Citations0
short-paper
June 2024
Leveraging Large Language Models for Preliminary Security Risk Analysis: A Mission-Critical Case Study
- Matteo Esposito,
- Francesco Palagiano
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 442–445https://doi.org/10.1145/3661167.3661226
Preliminary security risk analysis (PSRA) provides a quick approach to identify, evaluate, and propose remediation to potential risks in specific scenarios. The extensive expertise required for an effective PSRA and the substantial textual-related tasks ...
- 0
Metrics
Total Citations0
research-article
June 2024
Trustworthy AI in practice: an analysis of practitioners' needs and challenges
- Maria Teresa Baldassarre,
- Domenico Gigante,
- Marcos Kalinowski,
- Azzurra Ragone,
- Sara Tibidò
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 293–302https://doi.org/10.1145/3661167.3661214
Recently, there has been growing attention on behalf of both academic and practice communities towards the ability of Artificial Intelligence (AI) systems to operate responsibly and ethically. As a result, a plethora of frameworks and guidelines have ...
- 0
Metrics
Total Citations0
short-paper
June 2024
AI-enabled efficient PVM performance monitoring
- Mario Veniero,
- Davide Varriale
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 417–420https://doi.org/10.1145/3661167.3661201
The recent expansion of photovoltaic (PV) systems and increased production scale necessitate enhanced monitoring to assess system performance, detect potential degradation, and identify imminent failures, ensuring sustained quality and optimal ...
- 0
Metrics
Total Citations0
research-article
Open Access
June 2024
Motivation Research Using Labeling Functions
- Idan Amit,
- Dror G. Feitelson
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 222–231https://doi.org/10.1145/3661167.3661224
Motivation is an important factor in software development. However, it is a subjective concept that is hard to quantify and study empirically. In order to use the wealth of data available about real software development projects in GitHub, we represent ...
- 0
Metrics
Total Citations0
extended-abstract
June 2024
Assessing healthcare software built using IoT and LLM technologies
- Gabriele De Vito
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 476–481https://doi.org/10.1145/3661167.3661202
In the fast-paced world of healthcare technology, combining IoT devices with large language models (LLMs) offers a promising path to transform Clinical Decision-Support Systems (CDSS). This Ph.D. project is designed to tap into IoT’s extensive data ...
- 0
Metrics
Total Citations0
keynote
June 2024
Why Large Language Models will (not) Kill Software Engineering Research
- Massimiliano Di Penta
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 5https://doi.org/10.1145/3661167.3661270
Over the last decade, we have witnessed a flourishing activity in the application of deep learning techniques to solve software engineering problems that were poorly addressed in the past, or not addressed at all. In this context, researchers put effort ...
- 0
Metrics
Total Citations0
short-paper
Open Access
June 2024
Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers
- Therese Fehrer,
- Rocio Cabrera Lozoya,
- Antonino Sabetta,
- Dario Di Nucci,
- Damian A. Tamburri
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 429–432https://doi.org/10.1145/3661167.3661217
The sources of reliable, code-level information about vulnerabilities that affect open-source software (OSS) are scarce, which hinders a broad adoption of advanced tools that provide code-level detection and assessment of vulnerable OSS dependencies.
In ...
- 0
Metrics
Total Citations0
keynote
June 2024
Surfing the AI Wave in Software Engineering: Opportunities and Challenges
- Nicole Novielli
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, pp 6https://doi.org/10.1145/3661167.3661271
The diffusion of generative AI, specifically Large Language Models (LLMs), is profoundly affecting Software Engineering. Thanks to their unprecedented potential for disruptive changes, which mainly reside in their ability to reduce the need for large-...
- 0
Metrics
Total Citations0
research-article
Open Access
June 2024
System Optimizations for Enabling Training of Extreme Long Sequence Transformer Models
- Sam Ade Jacobs,
- Masahiro Tanaka,
- Chengming Zhang,
- Minjia Zhang,
- Reza Yazdani Aminadabi,
- Shuaiwen Leon Song,
- Samyam Rajbhandari,
- Yuxiong He
PODC '24: Proceedings of the 43rd ACM Symposium on Principles of Distributed ComputingJune 2024, pp 121–130https://doi.org/10.1145/3662158.3662806
Computation in a typical Transformer-based large language model (LLM) can be characterized by batch size, hidden dimension, number of layers, and sequence length. Until now, system works for accelerating LLM training have focused on the first three ...
- 0
Metrics
Total Citations0
extended-abstract
June 2024
ExTra CTI: Explainable and Transparent Child-Technology Interaction
- Elmira Yadollahi,
- Mike E.U. Ligthart,
- Ksh*tij Sharma,
- Elisa Rubegni
IDC '24: Proceedings of the 23rd Annual ACM Interaction Design and Children ConferenceJune 2024, pp 1016–1019https://doi.org/10.1145/3628516.3661151
When the technology encompasses some form of intelligence or agency in the form of robots, virtual agents or artificial intelligence, understanding the reasoning behind their actions and decisions becomes an integral part of the interaction. This ...
- 0
Metrics
Total Citations0
extended-abstract
June 2024
Toward Personalised Learning Experiences: Beyond Prompt Engineering
- Joost Kruis,
- Maria Soledad Pera,
- Zoë ten Napel,
- Monica Landoni,
- Emiliana Murgia,
- Theo Huibers,
- Remco Feskens
IDC '24: Proceedings of the 23rd Annual ACM Interaction Design and Children ConferenceJune 2024, pp 644–649https://doi.org/10.1145/3628516.3659367
We discuss the foundation of a collaborative effort to explore AI’s role in supporting (teachers and) children in their learning experiences. We integrate principles of educational psychology, AI, and HCI, and align with best practices in education ...
- 0
Metrics
Total Citations0
research-article
Open Access
June 2024
Batch Active Learning of Reward Functions from Human Preferences
- Erdem Biyik,
- Nima Anari,
- Dorsa Sadigh
ACM Transactions on Human-Robot Interaction (THRI), Volume 13, Issue 2Article No.: 24, pp 1–27https://doi.org/10.1145/3649885
Data generation and labeling are often expensive in robot learning. Preference-based learning is a concept that enables reliable labeling by querying users with preference questions. Active querying methods are commonly employed in preference-based ...
- 0
- 250
Metrics
Total Citations0
Total Downloads250
Last 12 Months250
Last 6 weeks105
- View online with eReader