Affiliation:
1. Department of Computer Science, Częstochowa University of Technology, 42-201 Czestochowa, Poland
Abstract
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Artificial Intelligence techniques must inspire users’ trust because they significantly impact virtually every industry and person. For this reason, systems using Artificial Intelligence are subject to many requirements to verify their trustworthiness in various aspects. This review focused on users’ physical and environmental security, considering the safety and robustness dimensions of Trustworthy Artificial Intelligence. We examined these Trustworthy Artificial Intelligence solutions and dimensions because security is one of the most-critical aspects of human life and can be considered in many different contexts. We examined the trustworthiness of Artificial Intelligence techniques in systems supporting road safety and securing computer network users. Also, we analyzed the challenges and requirements of the newly designed solutions using Trustworthy Artificial Intelligence methods. Verifying Trustworthy Artificial Intelligence solutions and their practical use will increase users’ physical and environmental security.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference179 articles.
1. Liu, J., Tang, Y., Zhao, H., Wang, X., Li, F., and Zhang, J. (2023). CPS Attack Detection under Limited Local Information in Cyber Security: An Ensemble Multi-node Multi-class Classification Approach. ACM Trans. Sens. Netw.
2. Trustworthy artificial intelligence;Thiebes;Electron. Mark.,2021
3. Trustworthy Artificial Intelligence: A Review;Kaur;ACM Comput. Surv.,2022
4. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations;Hasan;J. Netw. Comput. Appl.,2023
5. Automated Analysis of Blood Smear Images for Leukemia Detection: A Comprehensive Review;Mittal;ACM Comput. Surv.,2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献