Yuan Jinhui, Lin Shengsheng, Ke Zhipeng, Zhou Hongwei
{"title":"用交叉视角构建可信的人工智能:案例研究","authors":"Yuan Jinhui, Lin Shengsheng, Ke Zhipeng, Zhou Hongwei","doi":"10.1109/ACEDPI58926.2023.00056","DOIUrl":null,"url":null,"abstract":"With the widespread application of artificial intelligence, the safety of artificial intelligence has also attracted people’s attention. In this paper, we propose to construct cross-views on three levels including parameter diversification, sample diversification and algorithm diversification which is able to improve the credibility of artificial intelligence. This paper discusses the difficulties and feasible solutions of the three methods, and illustrates the specific implementation of the three diversification with three cases. In our opinion, artificial intelligence security problems, in a short time, can not be completely solved. Taking diverse approaches and constructing cross-views may be a feasible way to mitigate AI security issues.","PeriodicalId":124469,"journal":{"name":"2023 Asia-Europe Conference on Electronics, Data Processing and Informatics (ACEDPI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Building Trusted Artificial Intelligence with Cross-view: Cases Study\",\"authors\":\"Yuan Jinhui, Lin Shengsheng, Ke Zhipeng, Zhou Hongwei\",\"doi\":\"10.1109/ACEDPI58926.2023.00056\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the widespread application of artificial intelligence, the safety of artificial intelligence has also attracted people’s attention. In this paper, we propose to construct cross-views on three levels including parameter diversification, sample diversification and algorithm diversification which is able to improve the credibility of artificial intelligence. This paper discusses the difficulties and feasible solutions of the three methods, and illustrates the specific implementation of the three diversification with three cases. In our opinion, artificial intelligence security problems, in a short time, can not be completely solved. Taking diverse approaches and constructing cross-views may be a feasible way to mitigate AI security issues.\",\"PeriodicalId\":124469,\"journal\":{\"name\":\"2023 Asia-Europe Conference on Electronics, Data Processing and Informatics (ACEDPI)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Asia-Europe Conference on Electronics, Data Processing and Informatics (ACEDPI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACEDPI58926.2023.00056\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Asia-Europe Conference on Electronics, Data Processing and Informatics (ACEDPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACEDPI58926.2023.00056","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Building Trusted Artificial Intelligence with Cross-view: Cases Study
With the widespread application of artificial intelligence, the safety of artificial intelligence has also attracted people’s attention. In this paper, we propose to construct cross-views on three levels including parameter diversification, sample diversification and algorithm diversification which is able to improve the credibility of artificial intelligence. This paper discusses the difficulties and feasible solutions of the three methods, and illustrates the specific implementation of the three diversification with three cases. In our opinion, artificial intelligence security problems, in a short time, can not be completely solved. Taking diverse approaches and constructing cross-views may be a feasible way to mitigate AI security issues.