Results 231 to 240 of about 162,835 (326)
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Secure distributed multiple imputation enables missing data inference for private data proprietors. [PDF]
Smajlović H +4 more
europepmc +1 more source
ABSTRACT Enhancing infrastructure resilience, a key component of transforming and sustainably developing service utilities, requires a transdisciplinary and systems engineering framework. Addressing vulnerabilities in system architecture offers opportunities for resilience improvements, thereby mitigating the environmental, social, and economic impacts
Bob Hasanabadi +2 more
wiley +1 more source
A Blockchain-Enabled Multi-Authority Secure IoT Data-Sharing Scheme with Attribute-Based Searchable Encryption for Intelligent Systems. [PDF]
Zhang F, Xia X, Gao H, Ma Z, Chen X.
europepmc +1 more source
(Dis)information Systems: a Systemic View of Disinformation
ABSTRACT Disinformation is an ancient social phenomenon that has found a favourable environment for dissemination in internet‐based social networks. While the scientific community seeks to address the problem by creating specific tools to detect and classify the various types of false information, we argue that systems thinking is necessary to ...
Herbert Laroca +2 more
wiley +1 more source
Secure mobile agents for efficient medical information retrieval: A verifiable variable threshold secret sharing approach. [PDF]
Kumar P +5 more
europepmc +1 more source
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley +1 more source
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source

