{"id":"https://openalex.org/W3136881583","doi":"https://doi.org/10.1145/3430984.3431966","title":"Trustworthy AI","display_name":"Trustworthy AI","publication_year":2020,"publication_date":"2020-12-28","ids":{"openalex":"https://openalex.org/W3136881583","doi":"https://doi.org/10.1145/3430984.3431966","mag":"3136881583"},"language":"en","primary_location":{"id":"doi:10.1145/3430984.3431966","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3430984.3431966","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM India Joint International Conference on Data Science &amp; Management of Data (8th ACM IKDD CODS &amp; 26th COMAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011779957","display_name":"Richa Singh","orcid":"https://orcid.org/0000-0003-4060-4573"},"institutions":[{"id":"https://openalex.org/I154549908","display_name":"Indian Institute of Technology Jodhpur","ror":"https://ror.org/03yacj906","country_code":"IN","type":"education","lineage":["https://openalex.org/I154549908"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Richa Singh","raw_affiliation_strings":["IIT Jodhpur, India"],"affiliations":[{"raw_affiliation_string":"IIT Jodhpur, India","institution_ids":["https://openalex.org/I154549908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050521702","display_name":"Mayank Vatsa","orcid":"https://orcid.org/0000-0001-5952-2274"},"institutions":[{"id":"https://openalex.org/I154549908","display_name":"Indian Institute of Technology Jodhpur","ror":"https://ror.org/03yacj906","country_code":"IN","type":"education","lineage":["https://openalex.org/I154549908"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mayank Vatsa","raw_affiliation_strings":["IIT Jodhpur, India"],"affiliations":[{"raw_affiliation_string":"IIT Jodhpur, India","institution_ids":["https://openalex.org/I154549908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003836761","display_name":"Nalini Ratha","orcid":"https://orcid.org/0000-0001-7913-5722"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nalini Ratha","raw_affiliation_strings":["University of Buffalo, USA"],"affiliations":[{"raw_affiliation_string":"University of Buffalo, USA","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011779957"],"corresponding_institution_ids":["https://openalex.org/I154549908"],"apc_list":null,"apc_paid":null,"fwci":0.6628,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.77082561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"449","last_page":"453"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.8138941526412964},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8003016114234924},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.772401750087738},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6910937428474426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.576048731803894},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.478128582239151},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4122144877910614},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37461328506469727},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3456963300704956},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16208627820014954}],"concepts":[{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.8138941526412964},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8003016114234924},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.772401750087738},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6910937428474426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.576048731803894},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.478128582239151},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4122144877910614},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37461328506469727},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3456963300704956},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16208627820014954},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3430984.3431966","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3430984.3431966","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM India Joint International Conference on Data Science &amp; Management of Data (8th ACM IKDD CODS &amp; 26th COMAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1546640831","https://openalex.org/W2607219512","https://openalex.org/W2611576673","https://openalex.org/W2788741149","https://openalex.org/W2806344213","https://openalex.org/W2940483533","https://openalex.org/W2952388520","https://openalex.org/W2962710014","https://openalex.org/W2963178695","https://openalex.org/W2963257145","https://openalex.org/W2982175467","https://openalex.org/W2997532515","https://openalex.org/W2999616218","https://openalex.org/W3004493409","https://openalex.org/W3008058947","https://openalex.org/W3025775630","https://openalex.org/W3035232573","https://openalex.org/W3048102985","https://openalex.org/W3083754600","https://openalex.org/W3091059919","https://openalex.org/W3102720581","https://openalex.org/W6632757909"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W189760887","https://openalex.org/W24713225","https://openalex.org/W2492278949"],"abstract_inverted_index":{"Modern":[0],"AI":[1,109,130],"systems":[2],"are":[3,16,78,103],"reaping":[4],"the":[5,18,31,37,40,52,55,81,86,91,113,161,168],"advantage":[6],"of":[7,22,50,54,76,80,90,107,142,164],"novel":[8],"learning":[9],"methods.":[10],"With":[11],"their":[12,43],"increasing":[13],"usage,":[14],"we":[15],"realizing":[17],"limitations":[19],"and":[20,61,63,67,88,99,126,135,148,156,173],"shortfalls":[21],"these":[23],"systems.":[24],"Brittleness":[25],"to":[26,35,96,118,167],"minor":[27],"adversarial":[28,143],"changes":[29],"in":[30,42,48,123,129,150,175],"input":[32],"data,":[33,45,92],"ability":[34],"explain":[36],"decisions,":[38],"address":[39,119],"bias":[41,134],"training":[44],"high":[46],"opacity":[47],"terms":[49],"revealing":[51],"lineage":[53],"system,":[56],"how":[57],"they":[58,69],"were":[59],"trained":[60],"tested,":[62],"under":[64],"which":[65],"parameters":[66],"conditions":[68],"can":[70],"reliably":[71],"guarantee":[72],"a":[73],"certain":[74],"level":[75,163],"performance,":[77],"some":[79],"most":[82],"prominent":[83],"limitations.":[84],"Ensuring":[85],"privacy":[87,147],"security":[89,149],"assigning":[93],"appropriate":[94],"credits":[95],"data":[97,169],"sources,":[98,170],"delivering":[100],"decent":[101],"outputs":[102],"also":[104],"required":[105],"features":[106],"an":[108],"system.":[110],"We":[111],"propose":[112],"tutorial":[114],"on":[115],"\u201cTrustworthy":[116],"AI\u201d":[117],"six":[120],"critical":[121],"issues":[122],"enhancing":[124],"user":[125],"public":[127],"trust":[128],"systems,":[131],"namely:":[132],"(i)":[133],"fairness,":[136],"(ii)":[137],"explainability,":[138],"(iii)":[139],"robust":[140],"mitigation":[141],"attacks,":[144],"(iv)":[145],"improved":[146],"model":[151,158,171],"building,":[152],"(v)":[153],"being":[154],"decent,":[155],"(vi)":[157],"attribution,":[159],"including":[160],"right":[162],"credit":[165],"assignment":[166],"architectures,":[172],"transparency":[174],"lineage.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-03-29T00:00:00"}
