acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning
From Communications of the ACM

Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning

"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al., addresses the challenge of processing an intractably large set of trained models...

Proving Data-Poisoning Robustness in Decision Trees
From Communications of the ACM

Proving Data-Poisoning Robustness in Decision Trees

We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for...

Technical Perspective: The Impact of Auditing for Algorithmic Bias
From Communications of the ACM

Technical Perspective: The Impact of Auditing for Algorithmic Bias

"Actionable Auditing Revisited," by Inioluwa Deborah Raji and Joy Buolamwini, examines how companies producing commercial facial classification software responded...

Actionable Auditing Revisited
From Communications of the ACM

Actionable Auditing Revisited: Investigating the Impact of Publicly Naming Biased Performance Results of Commercial AI Products

This paper investigates the commercial impact of Gender Shades, the first algorithmic audit of gender- and skin-type performance disparities in commercial facial...

Technical Perspective: The Power of Low-Power GPS Receivers for Nanosats
From Communications of the ACM

Technical Perspective: The Power of Low-Power GPS Receivers for Nanosats

The work explored in "Hummingbird," by Sujay Narayana et al., focuses on the energy consumption of a typical GPS receiver and its operational challenges in a nanosat...

Hummingbird
From Communications of the ACM

Hummingbird: An Energy-Efficient GPS Receiver for Small Satellites

In this work, we elucidate the design of a low-cost, low-power GPS receiver for small satellites.

Technical Perspective: Traffic Classification in the Era of Deep Learning
From Communications of the ACM

Technical Perspective: Traffic Classification in the Era of Deep Learning

"Traffic Classification in an Increasingly Encrypted Web," by Iman Akbari et al., does a great job in reviewing related work in the network traffic classification...

Traffic Classification in an Increasingly Encrypted Web
From Communications of the ACM

Traffic Classification in an Increasingly Encrypted Web

In this paper, we design a novel feature engineering approach used for encrypted Web protocols, and develop a neural network architecture based on stacked long...

Technical Perspective: The Effectiveness of Security Measures
From Communications of the ACM

Technical Perspective: The Effectiveness of Security Measures

"Measuring Security Practices," by Louis F. DeKoven et al., provide a unique perspective into how users choose to implement common security advice in practice. ...

Measuring Security Practices
From Communications of the ACM

Measuring Security Practices

This paper seeks to make progress on the prevalence of popular security practices and their relationship to security outcomes via the longitudinal empirical measurement...

Technical Perspective: Physical Layer Resilience through Deep Learning in Software Radios
From Communications of the ACM

Technical Perspective: Physical Layer Resilience through Deep Learning in Software Radios

"Polymorphic Wireless Receivers," by Francesco Restuccia and Tommaso Melodia, tackles the problem of physical layer resilience in wireless systems from a completely...

Polymorphic Wireless Receivers
From Communications of the ACM

Polymorphic Wireless Receivers

We introduce PolymoRF, a deep learning-based polymorphic receiver able to reconfigure itself in real time based on the inferred waveform parameters.

Technical Perspective: Personalized Recommendation of PoIs to People with Autism
From Communications of the ACM

Technical Perspective: Personalized Recommendation of PoIs to People with Autism

"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs
From Communications of the ACM

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs: An Inclusive Recommender System

We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...

Technical Perspective: A Recipe for Protecting Against Speculation Attacks
From Communications of the ACM

Technical Perspective: A Recipe for Protecting Against Speculation Attacks

"Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data," by Jiyong Yu et al., might be a beginning of an end to speculation...

Speculative Taint Tracking (STT)
From Communications of the ACM

Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data

This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism, to block speculative execution attacks.

Technical Perspective: On Proofs, Entanglement, and Games
From Communications of the ACM

Technical Perspective: On Proofs, Entanglement, and Games

"MIP* = RE," by Zhengfeng Ji et al., studies quantum interactive proofs.

MIP* = RE
From Communications of the ACM

MIP* = RE

In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design
From Communications of the ACM

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design

"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts...

Securing the Wireless Emergency Alerts System
From Communications of the ACM

Securing the Wireless Emergency Alerts System

We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account