Skip to main content

Design Challenges of Trustworthy Artificial Intelligence Learning Systems

  • Conference paper
  • First Online:
Intelligent Information and Database Systems (ACIIDS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1178))

Included in the following conference series:

Abstract

In the near future, more than two thirds of the world’s population is expected to be living in cities. In this interconnected world, data collection from various sensors is eased up and unavoidable. Handling the right data is an important factor for decision making and improving services. While at the same time keeping the right level of privacy for end users is crucial. This position paper discusses the necessary trade-off between privacy needs and data handling for the improvement of services. Pseudo-anonymization techniques have shown their limits and local computation and aggregation of data seems the way to go. To illustrate the opportunity, the case for a novel generation of clustering algorithms is made that implements a privacy by design approach. Preliminary results of such a clustering algorithm use case show that our approach exhibits a high degree of elasticity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ISO/IEC PD TR 24028: Information technology - Artificial Intelligence (AI) - Overview of trustworthiness in Artificial Intelligence. Standard, International Organization for Standardization, Geneva, CH

    Google Scholar 

  2. Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: OSDI, vol. 16, pp. 265–283 (2016)

    Google Scholar 

  3. Andronache, A., Brust, M.R., Rothkugel, S.: Hycast-podcast discovery in mobile networks. In: Proceedings of the 3rd ACM Workshop on Wireless Multimedia Networking and Performance Modeling, pp. 27–34. ACM (2007)

    Google Scholar 

  4. Bassett, D.S., Zurn, P., Gold, J.I.: On the nature and use of models in network neuroscience. Nat. Rev. Neurosci. 19, 566–578 (2018)

    Article  Google Scholar 

  5. Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), P10008 (2008)

    Article  Google Scholar 

  6. Brust, M.R., Akbaş, M.I., Turgut, D.: VBCA: a virtual forces clustering algorithm for autonomous aerial drone systems. In: 2016 Annual IEEE Systems Conference (SysCon), pp. 1–6. IEEE (2016)

    Google Scholar 

  7. Brust, M.R., Frey, H., Rothkugel, S.: Adaptive multi-hop clustering in mobile networks. In: Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, pp. 132–138. ACM (2007)

    Google Scholar 

  8. Brust, M.R., Frey, H., Rothkugel, S.: Dynamic multi-hop clustering for mobile hybrid wireless networks. In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, pp. 130–135. ACM (2008)

    Google Scholar 

  9. CEN-CENELEC: Artificial Intelligence, Blockchain and Distributed Ledger Technologies (2019). https://www.cencenelec.eu/standards/Topics/ArtificialIntelligence

  10. Chen, J., Brust, M., Kiremire, A., Phoha, V.: Modeling privacy settings of an online social network from a game-theoretical perspective. In: IEEE CollaborateCom (2013)

    Google Scholar 

  11. Cihon, P.: Standards for AI governance: international standards to enable global coordination in AI research & development (2019)

    Google Scholar 

  12. Dilmaghani, S., Brust, M.R., Danoy, G., Cassagnes, N., Pecero, J., Bouvry, P.: Privacy and security of big data in AI systems: a research and standards perspective. In: Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2019), International Workshop on Privacy and Security of Big Data (PSBD 2019). IEEE BigData (2019)

    Google Scholar 

  13. Dilmaghani, S., Brust, M.R., Piyatumrong, A., Danoy, G., Bouvry, P.: Link definition ameliorating community detection in collaboration networks. Front. Big Data 2, 22 (2019)

    Article  Google Scholar 

  14. Celebi, M.E., Aydin, K. (eds.): Unsupervised Learning Algorithms. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-24211-8

    Book  Google Scholar 

  15. Hinnefeld, J.H., Cooman, P., Mammo, N., Deese, R.: Evaluating fairness metrics in the presence of dataset bias. arXiv preprint arXiv:1809.09245 (2018)

  16. Hong, S., et al.: Discriminating topology in galaxy distributions using network analysis. Mon. Not. R. Astron. Soc. 459(3), 2690–2700 (2016)

    Article  Google Scholar 

  17. Mai, S.T., He, X., Feng, J., Böhm, C.: Efficient anytime density-based clustering. In: Proceedings of the 2013 SIAM International Conference on Data Mining, pp. 112–120 (2013)

    Google Scholar 

  18. Pan, L., Zhou, T., Lü, L., Hu, C.K.: Predicting missing links and identifying spurious links via likelihood analysis. Sci. Rep. 6, 22955 (2016)

    Article  Google Scholar 

  19. Rao, B., Minakakis, L.: Evolution of mobile location-based services. Commun. ACM 46(12), 61–65 (2003)

    Article  Google Scholar 

  20. Rubinstein, B.I., et al.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet measurement (2009)

    Google Scholar 

  21. Sha, Z., et al.: A network-based approach to modeling and predicting product coconsideration relations. Complexity 2018, 14 (2018)

    Article  Google Scholar 

  22. Shirinivas, S., Vetrivel, S., Elango, N.: Applications of graph theory in computer science an overview. Int. J. Eng. Sci. Technol. 2(9), 4610–4621 (2010)

    Google Scholar 

  23. Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: IEEE Symposium on Security and Privacy (SP), pp. 3–18 (2017)

    Google Scholar 

  24. Siegler, M.G.: Eric schmidt: Every 2 days we create as much information as we did up to 2003, August 2010. http://social.techcrunch.com/2010/08/04/schmidt-data/. Accessed 7 Mar 2018

  25. Steinhardt, J., Koh, P.W.W., Liang, P.S.: Certified defenses for data poisoning attacks. In: Advances in Neural Information Processing Systems (2017)

    Google Scholar 

  26. Tramèr, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: 25th USENIX Security Symposium (2016)

    Google Scholar 

  27. Wall, M.: Biased and wrong? Facial recognition tech in the dock, July 2019. https://www.bbc.com/news/business-48842750

  28. Wu, F.J., Brust, M.R., Chen, Y.A., Luo, T.: The privacy exposure problem in mobile location-based services. In: Global Communications Conference (GLOBECOM), 2016 IEEE, pp. 1–7. IEEE (2016)

    Google Scholar 

  29. Wu, J.: Advances in K-means Clustering: A Data Mining Thinking. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29807-3

    Book  MATH  Google Scholar 

  30. Xu, R., Wunsch 2nd, D.: Survey of clustering algorithms. IEEE Trans. Neural Netw. 16(3), 645–678 (2005)

    Article  Google Scholar 

  31. Yang, J., Zhang, X.D.: Predicting missing links in complex networks based on common neighbors and distance. Sci. Rep. 6, 38208 (2016)

    Article  Google Scholar 

  32. Zhang, S.X., Roberts, R.E., Farabee, D.: An analysis of prisoner reentry and parole risk using COMPAS and traditional criminal history measures. Crime Delinq. 60, 167–192 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This work has been partially funded by the joint research programme University of Luxembourg/SnT-ILNAS on Digital Trust for Smart-ICT.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthias R. Brust .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Brust, M.R., Bouvry, P., Danoy, G., Talbi, EG. (2020). Design Challenges of Trustworthy Artificial Intelligence Learning Systems. In: Sitek, P., Pietranik, M., Krótkiewicz, M., Srinilta, C. (eds) Intelligent Information and Database Systems. ACIIDS 2020. Communications in Computer and Information Science, vol 1178. Springer, Singapore. https://doi.org/10.1007/978-981-15-3380-8_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3380-8_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3379-2

  • Online ISBN: 978-981-15-3380-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics