scholarly journals Cyber-Physical Trust Systems Driven by Blockchain

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 66423-66437 ◽  
Author(s):  
Alexander J. M. Milne ◽  
Arnold Beckmann ◽  
Pardeep Kumar
Keyword(s):  
2021 ◽  
Author(s):  
Daoming Lyu ◽  
Fangkai Yang ◽  
Hugh Kwon ◽  
Bo Liu ◽  
Wen Dong ◽  
...  

Human-robot interactive decision-making is increasingly becoming ubiquitous, and explainability is an influential factor in determining the reliance on autonomy. However, it is not reasonable to trust systems beyond our comprehension, and typical machine learning and data-driven decision-making are black-box paradigms that impede explainability. Therefore, it is critical to establish computational efficient decision-making mechanisms enhanced by explainability-aware strategies. To this end, we propose the Trustworthy Decision-Making (TDM), which is an explainable neuro-symbolic approach by integrating symbolic planning into hierarchical reinforcement learning. The framework of TDM enables the subtask-level explainability from the causal relational and understandable subtasks. Besides, TDM also demonstrates the advantage of the integration between symbolic planning and reinforcement learning, reaping the benefits of both worlds. Experimental results validate the effectiveness of proposed method while improving the explainability in the process of decision-making.


2020 ◽  
pp. 1-15 ◽  
Author(s):  
Yoshihiko Kadoya ◽  
Mostafa Saidur Rahim Khan ◽  
Hikaru Oba ◽  
Jin Narumoto

2007 ◽  
Vol 10 (4) ◽  
pp. 146-148
Author(s):  
Andrew Matthews
Keyword(s):  

Author(s):  
Stephen Marsh ◽  
Natasha Dwyer ◽  
Anirban Basu ◽  
Tim Storer ◽  
Karen Renaud ◽  
...  

Security is an interesting area, one in which we may well be guilty of misunderstanding the very people we are working for whilst trying to protect them. It is often said that people (users) are a weak link in the security chain. This may be true, but there are nuances. In this chapter, the authors discuss some of the work they have done and are doing to help users understand their information and device security and make informed, guided, and responsible decisions. This includes Device Comfort, Annoying Technologies, and Ten Commandments for designers and implementers of security and trust systems. This work is exploratory and unfinished (it should in fact never be finished), and this chapter presents a step along the way to better security users.


Author(s):  
Ciarán Bryce ◽  
Nathan Dimmock ◽  
Karl Krukow ◽  
Jean-Marc Seigneur ◽  
Vinny Cahill ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document