This article explores the application of computer vision technology in user interface design, particularly through gesture recognition to enhance human–computer interaction. Gestures offer natural and versatile advan...
详细信息
The increased quality and human-likeness of AI generated texts has resulted in a rising demand for neural text detectors, i.e. software that is able to detect whether a text was written by a human or generated by an A...
详细信息
作者:
Abu-Nassar, Ahmad M.Morsi, Walid G.
Electrical Computer and Software Engineering Department Faculty of Engineering and Applied Science OshawaONL1G 0C5 Canada
Transportation electrification plays an important role in the operation of the smart grid through the integration of the electric vehicle fast charging stations (EVFCSs), which allows the electric vehicles to provide ...
详细信息
Counterfactuals, or modified inputs that lead to a different outcome, are an important tool for understanding the logic used by machine learning classifiers and how to change an undesirable classification. Even if a c...
详细信息
Counterfactuals, or modified inputs that lead to a different outcome, are an important tool for understanding the logic used by machine learning classifiers and how to change an undesirable classification. Even if a counterfactual changes a classifier's decision, however, it may not affect the true underlying class probabilities, i.e. the counterfactual may act like an adversarial attack and "fool" the classifier. We propose a new framework for creating modified inputs that change the true underlying probabilities in a beneficial way which we call Trustworthy Actionable Perturbations (TAP). This includes a novel verification procedure to ensure that TAP change the true class probabilities instead of acting adversarially. Our framework also includes new cost, reward, and goal definitions that are better suited to effectuating change in the real world. We present PAC-learnability results for our verification procedure and theoretically analyze our new method for measuring reward. We also develop a methodology for creating TAP and compare our results to those achieved by previous counterfactual methods. Copyright 2024 by the author(s)
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
This paper studies a homogeneous decentralized multi-armed bandit problem, in which a network of multiple agents faces the same set of arms, and each agent aims to minimize its own regret. A fully decentralized upper ...
详细信息
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy...
详细信息
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy, trust, and transparency hurdles. Hence, there is a need for an efficient and trusted mechanism to resolve such problems. Blockchain technology has the potential to bring transparency and trust in several applications. Therefore, in this work, we explore blockchain technology in conjunction with a secure partitioning scheme to promote transparency, trust, and privacy between users and participating authorities in a decentralized platform. This paper presents a chaincode-based implementation of our proposed secure and verifiable vote counting mechanism that enables trust and fairness over a decentralized platform. Multiple authorities participate in the vote counting process in a trusted manner to cooperate and coordinate in a decision process over a decentralized platform. Our research exhibits that blockchain technology can eliminate the trust gaps and increase transparency and fairness in the election and vote counting procedure. We register user votes in the blockchain platform based on the secret sharing mechanism to enable fairness and openness between counting authorities. Each vote is recorded into the distributed ledger to support openness and verifiability in our mechanism. The ledger is accessible to every registered user as per the permissioned blockchain policy. We created many authorities in the blockchain network and deployed multiple smart contracts on the Hyperledger platform to analyze the feasibility of our strategy. The performance results are obtained and reported using the Hyperledger Caliper benchmark tool. The results demonstrate that the proposed chaincode-based solution achieves the highest throughput at 200–400 tps for fetching and removing contracts. We achieve the optimal latency of 18.09 s for the vote distribution contract
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial fals...
详细信息
Nowadays, millions of Internet of Things (IoT) devices communicate over the Internet, thus becoming potential targets for cyberattacks. Due to the limited hardware capabilities of these devices, host-based countermeas...
详细信息
We study Multi-Agent Path Finding for arrangements of labeled agents in the interior of a simply connected domain: Given a unique start and target position for each agent, the goal is to find a sequence of parallel, c...
详细信息
暂无评论