Transparency and Verification

Verifiable evaluations of machine learning models using zkSNARKs

Authors: Tobin South, Alexander Camuto, Shrey Jain, Shayla Nguyen, Robert Mahari, Christian Paquin, Jason Morton, Alex 'Sandy' Pentland | Published: 2024-02-05 | Updated: 2024-05-22
Model Performance Evaluation
Watermark Evaluation
Transparency and Verification

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13
Model Performance Evaluation
Intrusion Detection System
Transparency and Verification

How to Peel a Million: Validating and Expanding Bitcoin Clusters

Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn | Published: 2022-05-27
Data Management System
Transaction Profit and Performance
Transparency and Verification

Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform

Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari | Published: 2021-10-31
IoT Security
Application of XAI
Transparency and Verification

Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques

Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03
Backdoor Attack
Detection of Model Extraction Attacks
Transparency and Verification