Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
From verification to causality-based explications
In view of the growing complexity of modern software architectures, formal models are
increasingly used to understand why a system works the way it does, opposed to simply …
increasingly used to understand why a system works the way it does, opposed to simply …
[SÁCH][B] Actual causality
JY Halpern - 2016 - books.google.com
A new approach for defining causality and such related notions as degree of responsibility,
degrees of blame, and causal explanation. Causality plays a central role in the way people …
degrees of blame, and causal explanation. Causality plays a central role in the way people …
Causality-based neural network repair
Neural networks have had discernible achievements in a wide range of applications. The
wide-spread adoption also raises the concern of their dependability and reliability. Similar to …
wide-spread adoption also raises the concern of their dependability and reliability. Similar to …
Responsibility and blame: A structural-model approach
Causality is typically treated an all-or-nothing concept; either A is a cause of B or it is not. We
extend the definition of causality introduced by Halpern and Pearl [2004a] to take into …
extend the definition of causality introduced by Halpern and Pearl [2004a] to take into …
The complexity of causality and responsibility for query answers and non-answers
An answer to a query has a well-defined lineage expression (alternatively called how-
provenance) that explains how the answer was derived. Recent work has also shown how to …
provenance) that explains how the answer was derived. Recent work has also shown how to …
Explaining counterexamples using causality
I Beer, S Ben-David, H Chockler, A Orni… - Formal Methods in System …, 2012 - Springer
When a model does not satisfy a given specification, a counterexample is produced by the
model checker to demonstrate the failure. A user must then examine the counterexample …
model checker to demonstrate the failure. A user must then examine the counterexample …
Axiomatic aggregations of abductive explanations
The recent criticisms of the robustness of post hoc model approximation explanation
methods (like LIME and SHAP) have led to the rise of model-precise abductive explanations …
methods (like LIME and SHAP) have led to the rise of model-precise abductive explanations …
Data provenance
B Glavic - Foundations and Trends® in Databases, 2021 - nowpublishers.com
Data provenance has evolved from a niche topic to a mainstream area of research in
databases and other research communities. This article gives a comprehensive introduction …
databases and other research communities. This article gives a comprehensive introduction …
Causality in databases
Provenance is often used to validate data, by verifying its origin and explaining its derivation.
When searching for “causes” of tuples in the query results or in general observations, the …
When searching for “causes” of tuples in the query results or in general observations, the …
Causality analysis for evaluating the security of large language models
Large Language Models (LLMs) such as GPT and Llama2 are increasingly adopted in many
safety-critical applications. Their security is thus essential. Even with considerable efforts …
safety-critical applications. Their security is thus essential. Even with considerable efforts …