Assessing XAI: unveiling evaluation metrics for local explanation, taxonomies, key concepts, and practical applications

MA Kadir, A Mosavi, D Sonntag - 2023 - engrxiv.org
Within the past few years, the accuracy of deep learning and machine learning models has
been improving significantly while less attention has been paid to their responsibility …

Evaluation Metrics for XAI: A Review, Taxonomy, and Practical Applications

MA Kadir, A Mosavi, D Sonntag - 2023 IEEE 27th International …, 2023 - ieeexplore.ieee.org
Within the past few years, the accuracy of deep learning and machine learning models has
been improving significantly while less attention has been paid to their responsibility …

[HTML][HTML] Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

S Chockalingam, W Pieters, A Teixeira, P van Gelder - Cybersecurity, 2021 - Springer
Water management infrastructures such as floodgates are critical and increasingly operated
by Industrial Control Systems (ICS). These systems are becoming more connected to the …

Machine learning for threat recognition in critical cyber-physical systems

P Perrone, F Flammini, R Setola - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Cybersecurity has become an emerging challenge for business information management
and critical infrastructure protection in recent years. Artificial Intelligence (AI) has been …

Detection of Offensive and Threatening Online Content in a Low Resource Language

FM Adam, AY Zandam, I Inuwa-Dutse - arXiv preprint arXiv:2311.10541, 2023 - arxiv.org
Hausa is a major Chadic language, spoken by over 100 million people in Africa. However,
from a computational linguistic perspective, it is considered a low-resource language, with …

A modular infrastructure for the validation of cyberattack detection systems

D Cerotti, D Codetta Raiteri, G Dondossola… - … Methods, Concepts, and …, 2023 - Springer
We propose a framework for the evaluation of cyberattack detection systems in which
theoretical results can be tested in a realistic setup. We emulate a power control …

Taming Toxic Talk: Detecting Offensive Online Content in Hausa

FM Adam, AY Zandam, I Inuwa-Dutse - 2024 - researchsquare.com
Hausa, a major Chadic language spoken by over 100 million people in Africa, faces a
challenge in the digital age. While widely used, it is considered a low-resource language …

Online Security Detection System of Client Side Terminal Equipment Based on Energy Internet Construction

L Zhao, H Wang, S Han, L Chao - The International Conference on Cyber …, 2022 - Springer
In the 21st century, the combination of the energy revolution of renewable energy and the
information revolution of the Internet has given birth to the turning point of the third industrial …

An Improved Adaptive Genetic Algorithm Based on Dynamic Bayesian Network

J Daqi, H Wang - Proceedings of 2021 5th Chinese Conference on …, 2022 - Springer
With the prosperous development of information and science technology, the future modern
electronic information warfare will have the characteristics of a high degree of equipment …

[PDF][PDF] TECHNICAL REPORT TR-INF-2022-05-01-UNIPMN (May 2022)

D Cerotti, DC Raiteri, G Dondossola, L Egidi… - 2019 - di.unipmn.it
We propose a framework for the evaluation of cyberattack detection systems in which
methodological results can be tested in a realistic setup. We emulate a power control …