Trustworthy AI: From principles to practices
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …
of various systems based on it. However, many current AI systems are found vulnerable to …
The foundation model transparency index
Foundation models have rapidly permeated society, catalyzing a wave of generative AI
applications spanning enterprise and consumer-facing contexts. While the societal impact of …
applications spanning enterprise and consumer-facing contexts. While the societal impact of …
Smartphone-based DNA diagnostics for malaria detection using deep learning for local decision support and blockchain technology for security
In infectious disease diagnosis, results need to be communicated rapidly to healthcare
professionals once testing has been completed so that care pathways can be implemented …
professionals once testing has been completed so that care pathways can be implemented …
Securely outsourcing neural network inference to the cloud with lightweight techniques
Neural network (NN) inference services enrich many applications, like image classification,
object recognition, facial verification, and more. These NN inference services are …
object recognition, facial verification, and more. These NN inference services are …
Exploring design and governance challenges in the development of privacy-preserving computation
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …
an emerging class of Privacy Enhancing Technologies which share a common promise: to …
Guarding machine learning hardware against physical side-channel attacks
Machine learning (ML) models can be trade secrets due to their development cost. Hence,
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits
A universal circuit (UC) can be thought of as a programmable circuit that can simulate any
circuit up to a certain size by specifying its secret configuration bits. UCs have been …
circuit up to a certain size by specifying its secret configuration bits. UCs have been …
Visual privacy protection in mobile image recognition using protective perturbation
Deep neural networks (DNNs) have been widely adopted in mobile image recognition
applications. Considering intellectual property and computation resources, the image …
applications. Considering intellectual property and computation resources, the image …
A Guide for Trustworthy AI Implementations in the Smart Living Domain
Advances in AI facilitate the development of numerous smart solutions that significantly
enhance efficiency and comfort for organizations and individual users. However, AI systems …
enhance efficiency and comfort for organizations and individual users. However, AI systems …
Intelligent Information Technology for Obtaining Trust Decisions Based on the Ontology of Trust in a Human-Centered Approach
Е МАНЗЮК - Computer systems and information …, 2022 - csitjournal.khmnu.edu.ua
The paper presents the results of research on the development of intelligent information
technology for obtaining trust decisions to determine the constituent elements and the …
technology for obtaining trust decisions to determine the constituent elements and the …