Vis enkel innførsel

dc.contributor.authorUpreti, Ramesh
dc.contributor.authorLind, Pedro
dc.contributor.authorElmokashfi, Ahmed
dc.contributor.authorYazidi, Anis
dc.date.accessioned2024-06-05T06:57:04Z
dc.date.available2024-06-05T06:57:04Z
dc.date.created2024-05-29T10:29:05Z
dc.date.issued2024
dc.identifier.citationInternational Journal of Information Security. 2024, 23 2287-2314.en_US
dc.identifier.issn1615-5262
dc.identifier.urihttps://hdl.handle.net/11250/3132599
dc.description.abstractArtificial intelligence-based algorithms are widely adopted in critical applications such as healthcare and autonomous vehicles. Mitigating the security and privacy issues of AI models, and enhancing their trustworthiness have become of paramount importance. We present a detailed investigation of existing security, privacy, and defense techniques and strategies to make machine learning more secure and trustworthy. We focus on the new paradigm of machine learning called federated learning, where one aims to develop machine learning models involving different partners (data sources) that do not need to share data and information with each other. In particular, we discuss how federated learning bridges security and privacy, how it guarantees privacy requirements of AI applications, and then highlight challenges that need to be addressed in the future. Finally, after having surveyed the high-level concepts of trustworthy AI and its different components and identifying present research trends addressing security, privacy, and trustworthiness separately, we discuss possible interconnections and dependencies between these three fields. All in all, we provide some insight to explain how AI researchers should focus on building a unified solution combining security, privacy, and trustworthy AI in the future.en_US
dc.language.isoengen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleTrustworthy machine learning in the context of security and privacyen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionsubmittedVersionen_US
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.qualitycode2
dc.identifier.doihttps://doi.org/10.1007/s10207-024-00813-3
dc.identifier.cristin2271641
dc.source.journalInternational Journal of Information Securityen_US
dc.source.volume23en_US
dc.source.pagenumber2287-2314en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal