Trust in robots: Challenges and opportunities

BC Kok, H Soh - Current Robotics Reports, 2020 - Springer
Abstract Purpose of Review To assess the state-of-the-art in research on trust in robots and
to examine if recent methodological advances can aid in the development of trustworthy …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

[HTML][HTML] A review of cyber attacks on sensors and perception systems in autonomous vehicle

T Islam, MA Sheakh, AN Jui, O Sharif… - Journal of Economy and …, 2023 - Elsevier
Vehicle automation has been in the works for a long time now. Automatic brakes, cruise
control, GPS satellite navigation, etc. are all common features seen in today's automobiles …

Unleashing the power of randomization in auditing differentially private ml

K Pillutla, G Andrew, P Kairouz… - Advances in …, 2023 - proceedings.neurips.cc
We present a rigorous methodology for auditing differentially private machine learning by
adding multiple carefully designed examples called canaries. We take a first principles …

Differentially private iterative synchronous consensus

Z Huang, S Mitra, G Dullerud - Proceedings of the 2012 ACM workshop …, 2012 - dl.acm.org
The iterative consensus problem requires a set of processes or agents with different initial
values, to interact and update their states to eventually converge to a common value …

Automatic identification of bug-introducing changes

S Kim, T Zimmermann, K Pan… - 21st IEEE/ACM …, 2006 - ieeexplore.ieee.org
Bug-fixes are widely used for predicting bugs or finding risky parts of software. However, a
bug-fix does not contain information about the change that initially introduced a bug. Such …

Detecting violations of differential privacy

Z Ding, Y Wang, G Wang, D Zhang, D Kifer - Proceedings of the 2018 …, 2018 - dl.acm.org
The widespread acceptance of differential privacy has led to the publication of many
sophisticated algorithms for protecting privacy. However, due to the subtle nature of this …

Probabilistic relational reasoning for differential privacy

G Barthe, B Köpf, F Olmedo… - Proceedings of the 39th …, 2012 - dl.acm.org
Differential privacy is a notion of confidentiality that protects the privacy of individuals while
allowing useful computations on their private data. Deriving differential privacy guarantees …

Differential privacy: Now it's getting personal

H Ebadi, D Sands, G Schneider - Acm Sigplan Notices, 2015 - dl.acm.org
Differential privacy provides a way to get useful information about sensitive data without
revealing much about any one individual. It enjoys many nice compositionality properties not …

Proving differential privacy via probabilistic couplings

G Barthe, M Gaboardi, B Grégoire, J Hsu… - Proceedings of the 31st …, 2016 - dl.acm.org
Over the last decade, differential privacy has achieved widespread adoption within the
privacy community. Moreover, it has attracted significant attention from the verification …