{"id":"https://openalex.org/W4414242119","doi":"https://doi.org/10.3233/faia250564","title":"A DIKWP-Based Value Alignment Generation Method Oriented Toward Sovereign Artificial Intelligence","display_name":"A DIKWP-Based Value Alignment Generation Method Oriented Toward Sovereign Artificial Intelligence","publication_year":2025,"publication_date":"2025-09-16","ids":{"openalex":"https://openalex.org/W4414242119","doi":"https://doi.org/10.3233/faia250564"},"language":"en","primary_location":{"id":"doi:10.3233/faia250564","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250564","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia250564","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054692411","display_name":"Yingtian Mei","orcid":"https://orcid.org/0000-0002-3727-0835"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yingtian Mei","raw_affiliation_strings":["School of Cyberspace Security, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029925325","display_name":"Yucong Duan","orcid":"https://orcid.org/0000-0001-8417-892X"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yucong Duan","raw_affiliation_strings":["School of Computer Science and Technology, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031597959","display_name":"Hien Nguyen","orcid":"https://orcid.org/0000-0002-4132-9684"},"institutions":[{"id":"https://openalex.org/I10052268","display_name":"New Mexico State University","ror":"https://ror.org/00hpz7z43","country_code":"US","type":"education","lineage":["https://openalex.org/I10052268"]},{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["US","VN"],"is_corresponding":false,"raw_author_name":"Hien D. Nguyen","raw_affiliation_strings":["Computer Science Department, New Mexico State University, USA","University of Information Technology, Ho Chi Minh city, Vietnam","Vietnam National University, Ho Chi Minh city, Vietnam"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, New Mexico State University, USA","institution_ids":["https://openalex.org/I10052268"]},{"raw_affiliation_string":"University of Information Technology, Ho Chi Minh city, Vietnam","institution_ids":[]},{"raw_affiliation_string":"Vietnam National University, Ho Chi Minh city, Vietnam","institution_ids":["https://openalex.org/I123565023"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101962630","display_name":"Yingbo Li","orcid":"https://orcid.org/0000-0003-3933-4342"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingbo Li","raw_affiliation_strings":["School of Cyberspace Security, Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054692411"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54299342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.10610000044107437,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.10610000044107437,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.6144000291824341},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5871999859809875},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4104999899864197},{"id":"https://openalex.org/keywords/retraining","display_name":"Retraining","score":0.37040001153945923},{"id":"https://openalex.org/keywords/generative-model","display_name":"Generative model","score":0.3395000100135803},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.33889999985694885}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6254000067710876},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.6144000291824341},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5993000268936157},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5871999859809875},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41200000047683716},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4104999899864197},{"id":"https://openalex.org/C2778712577","wikidata":"https://www.wikidata.org/wiki/Q3505966","display_name":"Retraining","level":2,"score":0.37040001153945923},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.3395000100135803},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C186229450","wikidata":"https://www.wikidata.org/wiki/Q42008","display_name":"Sovereignty","level":3,"score":0.3163999915122986},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2531000077724457}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia250564","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250564","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia250564","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250564","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,37,44,50,72,82,132,148,153,161],"rapid":[2],"development":[3],"of":[4,40,95,125,157],"Generative":[5],"Artificial":[6],"Intelligence":[7],"(Generative":[8],"AI),":[9],"Sovereign":[10,54,78],"AI\u2014a":[11],"vital":[12],"vehicle":[13],"for":[14,22,67,77,182],"national":[15],"digital":[16],"sovereignty\u2014has":[17],"introduced":[18],"new":[19],"technical":[20,180],"challenges":[21],"value":[23,68,106,158],"alignment.":[24],"Traditional":[25],"alignment":[26,69,116,159],"methods":[27],"struggle":[28],"to":[29,101,145],"effectively":[30],"address":[31],"issues":[32],"such":[33],"as":[34,49],"multicultural":[35],"divergence,":[36],"abstract":[38],"complexity":[39],"ethical":[41],"principles,":[42],"and":[43,89,97,108,155,163,186],"high":[45],"computational":[46],"cost":[47],"known":[48],"\u201calignment":[51],"tax\u201d":[52],"under":[53],"AI.":[55,79],"To":[56,114],"tackle":[57],"these":[58],"challenges,":[59],"a":[60,92,120,178],"multi-granular":[61],"semantic":[62,103],"reasoning":[63,134],"method":[64,150],"is":[65,99],"proposed":[66,149],"based":[70],"on":[71,160],"DIKWP":[73],"framework,":[74],"designed":[75],"explicitly":[76,127],"By":[80],"mapping":[81],"interrelations":[83],"among":[84],"Data,":[85],"Information,":[86],"Knowledge,":[87],"Wisdom,":[88],"Purpose":[90],"(DIKWP),":[91],"dual":[93],"system":[94],"intention":[96],"behavior":[98],"constructed":[100],"resolve":[102],"conflicts,":[104],"fragmented":[105],"expressions,":[107],"dynamic":[109],"adaptation":[110],"in":[111,167],"complex":[112,168],"contexts.":[113],"reduce":[115],"costs,":[117],"we":[118],"design":[119],"dedicated,":[121],"prompt":[122],"template\u2014DIKWP":[123],"Chain":[124],"Thought(DIKWP-CoT)\u2014that":[126],"embeds":[128],"value-behavior":[129],"logic":[130],"into":[131],"model\u2019s":[133],"process,":[135],"significantly":[136,151],"minimizing":[137],"retraining":[138],"needs.":[139],"Experimental":[140],"results":[141],"show":[142],"that,":[143],"compared":[144],"traditional":[146],"approaches,":[147],"improves":[152],"accuracy":[154],"robustness":[156],"CoreValue":[162],"CMOS":[164],"datasets,":[165],"especially":[166],"scenarios":[169],"involving":[170],"implicit":[171],"intentions":[172],"or":[173],"biased":[174],"expressions.":[175],"This":[176],"provides":[177],"novel":[179],"pathway":[181],"building":[183],"safe,":[184],"trustworthy,":[185],"sovereignty-aligned":[187],"generative":[188],"AI":[189],"systems.":[190]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
