Machine Learning in Metaverse Security: Current Solutions and Future Challenges
Abstract
References
Index Terms
- Machine Learning in Metaverse Security: Current Solutions and Future Challenges
Recommendations
Regulating the Metaverse, a Blueprint for the Future
Extended RealityAbstractThe core Immersive Media (IM) technologies of Virtual Reality (VR) and Augmented Reality (AR) have steadily advanced over the last thirty years, enabling high fidelity experiences at consumer prices. Over the same period, networking speeds have ...
Will the metaverse be out of control? Addressing the ethical and governance implications of a developing virtual society
The development of the metaverse presents novel ethical challenges to society. There is a lack of knowledge of the potential metaverse and its effects on society. In this paper, several ethical challenges of the future metaverse are discussed to ...
Privacy computing meets metaverse: Necessity, taxonomy and challenges
AbstractMetaverse, the core of the next-generation Internet, is a computer-generated holographic digital environment that simultaneously combines spatio-temporal, immersive, real-time, sustainable, interoperable, and data-sensitive characteristics. It ...
Highlights- Discussing the necessity and feasibility of applying privacy computing in metaverse.
- Summarizing cutting-edge research on the application of privacy computing in metaverse.
- Outlining the challenges in metaverse and urging companies ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Computing Surveys](/cms/asset/2d5ebfdd-f637-430d-ac0f-ccd465a4686d/3613627.cover.jpg)
- Editors:
- David Atienza,
- Michela Milano
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Survey
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 555Total Downloads
- Downloads (Last 12 months)555
- Downloads (Last 6 weeks)112
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in