An Overview of Trustworthy AI: Advances in IP Protection, Privacy-preserving Federated Learning, Security Verification, and GAI Safety Alignment

Y Zheng, CH Chang, SH Huang… - IEEE Journal on …, 2024 - ieeexplore.ieee.org
AI has undergone a remarkable evolution journey marked by groundbreaking milestones.
Like any powerful tool, it can be turned into a weapon for devastation in the wrong hands …

Approximate conformance checking for closed-loop systems with neural network controllers

P Habeeb, L Gupta, P Prabhakar - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this article, we consider the problem of checking approximate conformance of closed-loop
systems with the same plant but different neural network (NN) controllers. First, we introduce …

Network intrusion detection using adversarial computational intelligence

SK Pandey, D Sinha - International Journal of Computing …, 2024 - inderscienceonline.com
Conventional intrusion detection systems (IDSs) in network ecosystems frequently face
difficulties in recognising new types of attacks and navigating intricate network architectures …