Khalid A. Eldrandaly, Mohamed Abdel-Basset, Mahmoud Ibrahim, Nabil M. Abdel-Aziz
{"title":"可解释和安全的人工智能:分类法、研究案例、经验教训、挑战和未来方向","authors":"Khalid A. Eldrandaly, Mohamed Abdel-Basset, Mahmoud Ibrahim, Nabil M. Abdel-Aziz","doi":"10.1080/17517575.2022.2098537","DOIUrl":null,"url":null,"abstract":"ABSTRACT Explainable artificial intelligence (XAI) is an evolving discipline that mainly emphasises unboxing in these Black-Boxes. This study provides in-depth review of XAI literature together with a new taxonomy of categorising XAI methods. Moreover, the security of Deep learning (DL) against different attacks turned to be a critical concern for both industry and academia. This study presents a taxonomic overview of the attacks on DL solutions and methods for securing DL against these attacks. Experiments are performed to evaluate and analyse the cutting-edge methods for explaining and securing DL models on real-world case studies of Twitter sentimental analysis using state-of-the-art DL models.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":" ","pages":""},"PeriodicalIF":4.4000,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Explainable and secure artificial intelligence: taxonomy, cases of study, learned lessons, challenges and future directions\",\"authors\":\"Khalid A. Eldrandaly, Mohamed Abdel-Basset, Mahmoud Ibrahim, Nabil M. Abdel-Aziz\",\"doi\":\"10.1080/17517575.2022.2098537\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT Explainable artificial intelligence (XAI) is an evolving discipline that mainly emphasises unboxing in these Black-Boxes. This study provides in-depth review of XAI literature together with a new taxonomy of categorising XAI methods. Moreover, the security of Deep learning (DL) against different attacks turned to be a critical concern for both industry and academia. This study presents a taxonomic overview of the attacks on DL solutions and methods for securing DL against these attacks. Experiments are performed to evaluate and analyse the cutting-edge methods for explaining and securing DL models on real-world case studies of Twitter sentimental analysis using state-of-the-art DL models.\",\"PeriodicalId\":11750,\"journal\":{\"name\":\"Enterprise Information Systems\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2022-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Enterprise Information Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1080/17517575.2022.2098537\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Enterprise Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/17517575.2022.2098537","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Explainable and secure artificial intelligence: taxonomy, cases of study, learned lessons, challenges and future directions
ABSTRACT Explainable artificial intelligence (XAI) is an evolving discipline that mainly emphasises unboxing in these Black-Boxes. This study provides in-depth review of XAI literature together with a new taxonomy of categorising XAI methods. Moreover, the security of Deep learning (DL) against different attacks turned to be a critical concern for both industry and academia. This study presents a taxonomic overview of the attacks on DL solutions and methods for securing DL against these attacks. Experiments are performed to evaluate and analyse the cutting-edge methods for explaining and securing DL models on real-world case studies of Twitter sentimental analysis using state-of-the-art DL models.
期刊介绍:
Enterprise Information Systems (EIS) focusses on both the technical and applications aspects of EIS technology, and the complex and cross-disciplinary problems of enterprise integration that arise in integrating extended enterprises in a contemporary global supply chain environment. Techniques developed in mathematical science, computer science, manufacturing engineering, and operations management used in the design or operation of EIS will also be considered.