Setup basic template
This commit is contained in:
parent
be31aaaba5
commit
d358de4942
3
.gitignore
vendored
3
.gitignore
vendored
@ -5,3 +5,6 @@
|
|||||||
*.fls
|
*.fls
|
||||||
*.log
|
*.log
|
||||||
*.synctex.gz
|
*.synctex.gz
|
||||||
|
*.bbl
|
||||||
|
*.blg
|
||||||
|
*.out
|
||||||
|
|||||||
73
trustworthy-ai.bib
Normal file
73
trustworthy-ai.bib
Normal file
@ -0,0 +1,73 @@
|
|||||||
|
|
||||||
|
@article{dustdar_social_2011,
|
||||||
|
title = {The {Social} {Compute} {Unit}},
|
||||||
|
volume = {15},
|
||||||
|
issn = {1941-0131},
|
||||||
|
doi = {10.1109/MIC.2011.68},
|
||||||
|
abstract = {Social computing is perceived mainly as a vehicle for establishing and maintaining private relationships and thus lacks mainstream adoption in enterprises. Collaborative computing, however, is firmly established, but no tight integration of the two approaches exists. Here, the authors look at how to integrate people, in the form of human-based computing, and software services into one composite system.},
|
||||||
|
number = {3},
|
||||||
|
journal = {IEEE Internet Computing},
|
||||||
|
author = {Dustdar, Schahram and Bhattacharya, Kamal},
|
||||||
|
month = may,
|
||||||
|
year = {2011},
|
||||||
|
note = {Conference Name: IEEE Internet Computing},
|
||||||
|
keywords = {Collaboration, Online services, Privacy, service-oriented computing, social compute power, social compute unit, social computing, Social network services, workflow},
|
||||||
|
pages = {64--69},
|
||||||
|
file = {IEEE Xplore Full Text PDF:/home/zenon/Zotero/storage/BRUJCIMC/Dustdar and Bhattacharya - 2011 - The Social Compute Unit.pdf:application/pdf;IEEE Xplore Abstract Record:/home/zenon/Zotero/storage/IB8NK88P/5755601.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{liu_trustworthy_2021,
|
||||||
|
title = {Trustworthy {AI}: {A} {Computational} {Perspective}},
|
||||||
|
shorttitle = {Trustworthy {AI}},
|
||||||
|
url = {http://arxiv.org/abs/2107.06641},
|
||||||
|
abstract = {In the past few decades, artificial intelligence (AI) technology has experienced swift developments, changing everyone's daily life and profoundly altering the course of human society. The intention of developing AI is to benefit humans, by reducing human labor, bringing everyday convenience to human lives, and promoting social good. However, recent research and AI applications show that AI can cause unintentional harm to humans, such as making unreliable decisions in safety-critical scenarios or undermining fairness by inadvertently discriminating against one group. Thus, trustworthy AI has attracted immense attention recently, which requires careful consideration to avoid the adverse effects that AI may bring to humans, so that humans can fully trust and live in harmony with AI technologies. Recent years have witnessed a tremendous amount of research on trustworthy AI. In this survey, we present a comprehensive survey of trustworthy AI from a computational perspective, to help readers understand the latest technologies for achieving trustworthy AI. Trustworthy AI is a large and complex area, involving various dimensions. In this work, we focus on six of the most crucial dimensions in achieving trustworthy AI: (i) Safety \& Robustness, (ii) Non-discrimination \& Fairness, (iii) Explainability, (iv) Privacy, (v) Accountability \& Auditability, and (vi) Environmental Well-Being. For each dimension, we review the recent related technologies according to a taxonomy and summarize their applications in real-world systems. We also discuss the accordant and conflicting interactions among different dimensions and discuss potential aspects for trustworthy AI to investigate in the future.},
|
||||||
|
urldate = {2021-11-03},
|
||||||
|
journal = {arXiv:2107.06641 [cs]},
|
||||||
|
author = {Liu, Haochen and Wang, Yiqi and Fan, Wenqi and Liu, Xiaorui and Li, Yaxin and Jain, Shaili and Liu, Yunhao and Jain, Anil K. and Tang, Jiliang},
|
||||||
|
month = aug,
|
||||||
|
year = {2021},
|
||||||
|
note = {arXiv: 2107.06641
|
||||||
|
version: 3},
|
||||||
|
keywords = {Computer Science - Artificial Intelligence},
|
||||||
|
file = {arXiv Fulltext PDF:/home/zenon/Zotero/storage/3SPRGW2M/Liu et al. - 2021 - Trustworthy AI A Computational Perspective.pdf:application/pdf;arXiv.org Snapshot:/home/zenon/Zotero/storage/8AUMUFD2/2107.html:text/html},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{ferrario_ai_2020,
|
||||||
|
title = {In {AI} {We} {Trust} {Incrementally}: a {Multi}-layer {Model} of {Trust} to {Analyze} {Human}-{Artificial} {Intelligence} {Interactions}},
|
||||||
|
volume = {33},
|
||||||
|
issn = {2210-5441},
|
||||||
|
shorttitle = {In {AI} {We} {Trust} {Incrementally}},
|
||||||
|
url = {https://doi.org/10.1007/s13347-019-00378-3},
|
||||||
|
doi = {10.1007/s13347-019-00378-3},
|
||||||
|
abstract = {Real engines of the artificial intelligence (AI) revolution, machine learning (ML) models, and algorithms are embedded nowadays in many services and products around us. As a society, we argue it is now necessary to transition into a phronetic paradigm focused on the ethical dilemmas stemming from the conception and application of AIs to define actionable recommendations as well as normative solutions. However, both academic research and society-driven initiatives are still quite far from clearly defining a solid program of study and intervention. In this contribution, we will focus on selected ethical investigations around AI by proposing an incremental model of trust that can be applied to both human-human and human-AI interactions. Starting with a quick overview of the existing accounts of trust, with special attention to Taddeo’s concept of “e-trust,” we will discuss all the components of the proposed model and the reasons to trust in human-AI interactions in an example of relevance for business organizations. We end this contribution with an analysis of the epistemic and pragmatic reasons of trust in human-AI interactions and with a discussion of kinds of normativity in trustworthiness of AIs.},
|
||||||
|
language = {en},
|
||||||
|
number = {3},
|
||||||
|
urldate = {2021-11-03},
|
||||||
|
journal = {Philosophy \& Technology},
|
||||||
|
author = {Ferrario, Andrea and Loi, Michele and Viganò, Eleonora},
|
||||||
|
month = sep,
|
||||||
|
year = {2020},
|
||||||
|
pages = {523--539},
|
||||||
|
file = {Springer Full Text PDF:/home/zenon/Zotero/storage/TKPD5797/Ferrario et al. - 2020 - In AI We Trust Incrementally a Multi-layer Model .pdf:application/pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{suh_trustworthiness_2021,
|
||||||
|
title = {Trustworthiness in {Mobile} {Cyber}-{Physical} {Systems}},
|
||||||
|
volume = {11},
|
||||||
|
copyright = {http://creativecommons.org/licenses/by/3.0/},
|
||||||
|
url = {https://www.mdpi.com/2076-3417/11/4/1676},
|
||||||
|
doi = {10.3390/app11041676},
|
||||||
|
abstract = {As they continue to become faster and cheaper, devices with enhanced computing and communication capabilities are increasingly incorporated into diverse objects and structures in the physical environment [...]},
|
||||||
|
language = {en},
|
||||||
|
number = {4},
|
||||||
|
urldate = {2021-11-03},
|
||||||
|
journal = {Applied Sciences},
|
||||||
|
author = {Suh, Hyo-Joong and Son, Junggab and Kang, Kyungtae},
|
||||||
|
month = jan,
|
||||||
|
year = {2021},
|
||||||
|
note = {Number: 4
|
||||||
|
Publisher: Multidisciplinary Digital Publishing Institute},
|
||||||
|
keywords = {n/a},
|
||||||
|
pages = {1676},
|
||||||
|
file = {Full Text PDF:/home/zenon/Zotero/storage/EQDGFNC4/Suh et al. - 2021 - Trustworthiness in Mobile Cyber-Physical Systems.pdf:application/pdf;Snapshot:/home/zenon/Zotero/storage/798R34VM/1676.html:text/html},
|
||||||
|
}
|
||||||
@ -1,150 +1,54 @@
|
|||||||
% This is samplepaper.tex, a sample chapter demonstrating the
|
|
||||||
% LLNCS macro package for Springer Computer Science proceedings;
|
|
||||||
% Version 2.20 of 2017/10/04
|
|
||||||
%
|
|
||||||
\documentclass[runningheads]{llncs}
|
\documentclass[runningheads]{llncs}
|
||||||
%
|
|
||||||
\usepackage{graphicx}
|
\usepackage{graphicx}
|
||||||
% Used for displaying a sample figure. If possible, figure files should
|
\usepackage{hyperref}
|
||||||
% be included in EPS format.
|
|
||||||
%
|
\hypersetup{
|
||||||
% If you use the hyperref package, please uncomment the following line
|
colorlinks=true,
|
||||||
% to display URLs in blue roman font according to Springer's eBook style:
|
linkcolor=true,
|
||||||
% \renewcommand\UrlFont{\color{blue}\rmfamily}
|
urlcolor=blue,
|
||||||
|
citecolor=black
|
||||||
|
}
|
||||||
|
|
||||||
\begin{document}
|
\begin{document}
|
||||||
%
|
|
||||||
\title{Contribution Title\thanks{Supported by organization x.}}
|
\title{Trustworthy Artificial Intelligence}
|
||||||
%
|
\author{Tobias Eidelpes}
|
||||||
%\titlerunning{Abbreviated paper title}
|
\authorrunning{T. Eidelpes}
|
||||||
% If the paper title is too long for the running head, you can set
|
|
||||||
% an abbreviated paper title here
|
\institute{Technische Universität Wien, Karlsplatz 13, 1040 Wien, Austria
|
||||||
%
|
\email{e1527193@student.tuwien.ac.at}}
|
||||||
\author{First Author\inst{1}\orcidID{0000-1111-2222-3333} \and
|
|
||||||
Second Author\inst{2,3}\orcidID{1111-2222-3333-4444} \and
|
\maketitle
|
||||||
Third Author\inst{3}\orcidID{2222--3333-4444-5555}}
|
|
||||||
%
|
|
||||||
\authorrunning{F. Author et al.}
|
|
||||||
% First names are abbreviated in the running head.
|
|
||||||
% If there are more than two authors, 'et al.' is used.
|
|
||||||
%
|
|
||||||
\institute{Princeton University, Princeton NJ 08544, USA \and
|
|
||||||
Springer Heidelberg, Tiergartenstr. 17, 69121 Heidelberg, Germany
|
|
||||||
\email{lncs@springer.com}\\
|
|
||||||
\url{http://www.springer.com/gp/computer-science/lncs} \and
|
|
||||||
ABC Institute, Rupert-Karls-University Heidelberg, Heidelberg, Germany\\
|
|
||||||
\email{\{abc,lncs\}@uni-heidelberg.de}}
|
|
||||||
%
|
|
||||||
\maketitle % typeset the header of the contribution
|
|
||||||
%
|
|
||||||
\begin{abstract}
|
\begin{abstract}
|
||||||
The abstract should briefly summarize the contents of the paper in
|
The abstract should briefly summarize the contents of the paper in
|
||||||
150--250 words.
|
150--250 words.
|
||||||
|
|
||||||
\keywords{First keyword \and Second keyword \and Another keyword.}
|
\keywords{Artificial Intelligence, Trustworthiness, Social Computing}
|
||||||
\end{abstract}
|
\end{abstract}
|
||||||
%
|
|
||||||
%
|
|
||||||
%
|
|
||||||
\section{First Section}
|
|
||||||
\subsection{A Subsection Sample}
|
|
||||||
Please note that the first paragraph of a section or subsection is
|
|
||||||
not indented. The first paragraph that follows a table, figure,
|
|
||||||
equation etc. does not need an indent, either.
|
|
||||||
|
|
||||||
Subsequent paragraphs, however, are indented.
|
|
||||||
|
|
||||||
\subsubsection{Sample Heading (Third Level)} Only two levels of
|
|
||||||
headings should be numbered. Lower level headings remain unnumbered;
|
|
||||||
they are formatted as run-in headings.
|
|
||||||
|
|
||||||
\paragraph{Sample Heading (Fourth Level)}
|
|
||||||
The contribution should contain no more than four levels of
|
|
||||||
headings. Table~\ref{tab1} gives a summary of all heading levels.
|
|
||||||
|
|
||||||
\begin{table}
|
|
||||||
\caption{Table captions should be placed above the
|
|
||||||
tables.}\label{tab1}
|
|
||||||
\begin{tabular}{|l|l|l|}
|
|
||||||
\hline
|
|
||||||
Heading level & Example & Font size and style\\
|
|
||||||
\hline
|
|
||||||
Title (centered) & {\Large\bfseries Lecture Notes} & 14 point, bold\\
|
|
||||||
1st-level heading & {\large\bfseries 1 Introduction} & 12 point, bold\\
|
|
||||||
2nd-level heading & {\bfseries 2.1 Printing Area} & 10 point, bold\\
|
|
||||||
3rd-level heading & {\bfseries Run-in Heading in Bold.} Text follows & 10 point, bold\\
|
|
||||||
4th-level heading & {\itshape Lowest Level Heading.} Text follows & 10 point, italic\\
|
|
||||||
\hline
|
|
||||||
\end{tabular}
|
|
||||||
\end{table}
|
|
||||||
|
|
||||||
|
|
||||||
\noindent Displayed equations are centered and set on a separate
|
\section{Introduction}
|
||||||
line.
|
|
||||||
\begin{equation}
|
|
||||||
x + y = z
|
|
||||||
\end{equation}
|
|
||||||
Please try to avoid rasterized images for line-art diagrams and
|
|
||||||
schemas. Whenever possible, use vector graphics instead (see
|
|
||||||
Fig.~\ref{fig1}).
|
|
||||||
|
|
||||||
\begin{figure}
|
This is a sample citation: \cite{liu_trustworthy_2021}.
|
||||||
\includegraphics[width=\textwidth]{fig1.eps}
|
|
||||||
\caption{A figure caption is always placed below the illustration.
|
|
||||||
Please note that short captions are centered, while long ones are
|
|
||||||
justified by the macro package automatically.} \label{fig1}
|
|
||||||
\end{figure}
|
|
||||||
|
|
||||||
\begin{theorem}
|
\section{Related Work}
|
||||||
This is a sample theorem. The run-in heading is set in bold, while
|
|
||||||
the following text appears in italics. Definitions, lemmas,
|
|
||||||
propositions, and corollaries are styled the same way.
|
|
||||||
\end{theorem}
|
|
||||||
%
|
|
||||||
% the environments 'definition', 'lemma', 'proposition', 'corollary',
|
|
||||||
% 'remark', and 'example' are defined in the LLNCS documentclass as well.
|
|
||||||
%
|
|
||||||
\begin{proof}
|
|
||||||
Proofs, examples, and remarks have the initial word in italics,
|
|
||||||
while the following text appears in normal font.
|
|
||||||
\end{proof}
|
|
||||||
For citations of references, we prefer the use of square brackets
|
|
||||||
and consecutive numbers. Citations using labels or the author/year
|
|
||||||
convention are also acceptable. The following bibliography provides
|
|
||||||
a sample reference list with entries for journal
|
|
||||||
articles~\cite{ref_article1}, an LNCS chapter~\cite{ref_lncs1}, a
|
|
||||||
book~\cite{ref_book1}, proceedings without editors~\cite{ref_proc1},
|
|
||||||
and a homepage~\cite{ref_url1}. Multiple citations are grouped
|
|
||||||
\cite{ref_article1,ref_lncs1,ref_book1},
|
|
||||||
\cite{ref_article1,ref_book1,ref_proc1,ref_url1}.
|
|
||||||
%
|
|
||||||
% ---- Bibliography ----
|
|
||||||
%
|
|
||||||
% BibTeX users should specify bibliography style 'splncs04'.
|
|
||||||
% References will then be sorted and formatted in the correct style.
|
|
||||||
%
|
|
||||||
% \bibliographystyle{splncs04}
|
|
||||||
% \bibliography{mybibliography}
|
|
||||||
%
|
|
||||||
\begin{thebibliography}{8}
|
|
||||||
\bibitem{ref_article1}
|
|
||||||
Author, F.: Article title. Journal \textbf{2}(5), 99--110 (2016)
|
|
||||||
|
|
||||||
\bibitem{ref_lncs1}
|
|
||||||
Author, F., Author, S.: Title of a proceedings paper. In: Editor,
|
|
||||||
F., Editor, S. (eds.) CONFERENCE 2016, LNCS, vol. 9999, pp. 1--13.
|
|
||||||
Springer, Heidelberg (2016). \doi{10.10007/1234567890}
|
|
||||||
|
|
||||||
\bibitem{ref_book1}
|
\section{Modeling Trust}
|
||||||
Author, F., Author, S., Author, T.: Book title. 2nd edn. Publisher,
|
|
||||||
Location (1999)
|
|
||||||
|
|
||||||
\bibitem{ref_proc1}
|
|
||||||
Author, A.-B.: Contribution title. In: 9th International Proceedings
|
|
||||||
on Proceedings, pp. 1--2. Publisher, Location (2010)
|
|
||||||
|
|
||||||
\bibitem{ref_url1}
|
\section{Taxonomy for Trustworthy AI}
|
||||||
LNCS Homepage, \url{http://www.springer.com/lncs}. Last accessed 4
|
|
||||||
Oct 2017
|
|
||||||
\end{thebibliography}
|
\section{Social Computing}
|
||||||
|
|
||||||
|
|
||||||
|
\section{Conclusion}
|
||||||
|
|
||||||
|
|
||||||
|
\bibliographystyle{splncs04}
|
||||||
|
\bibliography{trustworthy-ai}
|
||||||
|
|
||||||
\end{document}
|
\end{document}
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user