A survey of algorithmic recourse: contrastive explanations and consequential recommendations

AH Karimi, G Barthe, B Schölkopf, I Valera - ACM Computing Surveys, 2022‏ - dl.acm.org
Machine learning is increasingly used to inform decision making in sensitive situations
where decisions have consequential effects on individuals' lives. In these settings, in …

Machine learning for healthcare wearable devices: the big picture

F Sabry, T Eltaras, W Labda, K Alzoubi… - Journal of Healthcare …, 2022‏ - Wiley Online Library
Using artificial intelligence and machine learning techniques in healthcare applications has
been actively researched over the last few years. It holds promising opportunities as it is …

I know what you trained last summer: A survey on stealing machine learning models and defences

D Oliynyk, R Mayer, A Rauber - ACM Computing Surveys, 2023‏ - dl.acm.org
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making
even the most complex Machine Learning models available for clients via, eg, a pay-per …

A survey of algorithmic recourse: definitions, formulations, solutions, and prospects

AH Karimi, G Barthe, B Schölkopf, I Valera - arxiv preprint arxiv …, 2020‏ - arxiv.org
Machine learning is increasingly used to inform decision-making in sensitive situations
where decisions have consequential effects on individuals' lives. In these settings, in …

MP2ML: A mixed-protocol machine learning framework for private inference

F Boemer, R Cammarota, D Demmler… - Proceedings of the 15th …, 2020‏ - dl.acm.org
Privacy-preserving machine learning (PPML) has many applications, from medical image
classification and anomaly detection to financial analysis. nGraph-HE enables data …

[HTML][HTML] Adversarial machine learning in industry: A systematic literature review

FV Jedrzejewski, L Thode, J Fischbach, T Gorschek… - Computers & …, 2024‏ - Elsevier
Abstract Adversarial Machine Learning (AML) discusses the act of attacking and defending
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …

Secure and trustworthy artificial intelligence-extended reality (AI-XR) for metaverses

A Qayyum, MA Butt, H Ali, M Usman, O Halabi… - ACM Computing …, 2024‏ - dl.acm.org
Metaverse is expected to emerge as a new paradigm for the next-generation Internet,
providing fully immersive and personalized experiences to socialize, work, and play in self …

Generating robust dnn with resistance to bit-flip based adversarial weight attack

L Liu, Y Guo, Y Cheng, Y Zhang… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
Rowhammer Attack, a new DRAM-based attack, was developed exploiting weak cells to
alter their content. Such attacks can be launched at the user level without requiring access …

Securing machine learning in the cloud: A systematic review of cloud machine learning security

A Qayyum, A Ijaz, M Usama, W Iqbal, J Qadir… - Frontiers in big …, 2020‏ - frontiersin.org
With the advances in machine learning (ML) and deep learning (DL) techniques, and the
potency of cloud computing in offering services efficiently and cost-effectively, Machine …

A blockchain-enabled explainable federated learning for securing internet-of-things-based social media 3.0 networks

S Salim, B Turnbull, N Moustafa - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
Social media (SM) 3.0 integrates SM platforms, such as Facebook and Twitter, with the
Internet of Things (IoT), and has a great potential to change how we interact with mobile …