Trustworthy AI: From principles to practices

B Li, P Qi, B Liu, S Di, J Liu, J Pei, J Yi… - ACM Computing Surveys, 2023 - dl.acm.org
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …

The foundation model transparency index

R Bommasani, K Klyman, S Longpre, S Kapoor… - arxiv preprint arxiv …, 2023 - arxiv.org
Foundation models have rapidly permeated society, catalyzing a wave of generative AI
applications spanning enterprise and consumer-facing contexts. While the societal impact of …

Smartphone-based DNA diagnostics for malaria detection using deep learning for local decision support and blockchain technology for security

X Guo, MA Khalid, I Domingos, AL Michala… - Nature …, 2021 - nature.com
In infectious disease diagnosis, results need to be communicated rapidly to healthcare
professionals once testing has been completed so that care pathways can be implemented …

Securely outsourcing neural network inference to the cloud with lightweight techniques

X Liu, Y Zheng, X Yuan, X Yi - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Neural network (NN) inference services enrich many applications, like image classification,
object recognition, facial verification, and more. These NN inference services are …

Exploring design and governance challenges in the development of privacy-preserving computation

N Agrawal, R Binns, M Van Kleek, K Laine… - Proceedings of the …, 2021 - dl.acm.org
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …

Guarding machine learning hardware against physical side-channel attacks

A Dubey, R Cammarota, V Suresh, A Aysu - ACM Journal on Emerging …, 2022 - dl.acm.org
Machine learning (ML) models can be trade secrets due to their development cost. Hence,
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …

1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits

DM Mehta, M Hashemi, D Forte, S Tajik… - IACR Transactions on …, 2024 - tosc.iacr.org
A universal circuit (UC) can be thought of as a programmable circuit that can simulate any
circuit up to a certain size by specifying its secret configuration bits. UCs have been …

Visual privacy protection in mobile image recognition using protective perturbation

M Ye, Z Tang, H Phan, Y **e, B Yuan… - Proceedings of the 13th …, 2022 - dl.acm.org
Deep neural networks (DNNs) have been widely adopted in mobile image recognition
applications. Considering intellectual property and computation resources, the image …

A Guide for Trustworthy AI Implementations in the Smart Living Domain

C Mihale-Wilson, M Lowin - INFORMATIK 2024, 2024 - dl.gi.de
Advances in AI facilitate the development of numerous smart solutions that significantly
enhance efficiency and comfort for organizations and individual users. However, AI systems …

Intelligent Information Technology for Obtaining Trust Decisions Based on the Ontology of Trust in a Human-Centered Approach

Е МАНЗЮК - Computer systems and information …, 2022 - csitjournal.khmnu.edu.ua
The paper presents the results of research on the development of intelligent information
technology for obtaining trust decisions to determine the constituent elements and the …