453 research outputs found

    Distrust in (X)AI -- Measurement Artifact or Distinct Construct?

    Full text link
    Trust is a key motivation in developing explainable artificial intelligence (XAI). However, researchers attempting to measure trust in AI face numerous challenges, such as different trust conceptualizations, simplified experimental tasks that may not induce uncertainty as a prerequisite for trust, and the lack of validated trust questionnaires in the context of AI. While acknowledging these issues, we have identified a further challenge that currently seems underappreciated - the potential distinction between trust as one construct and \emph{distrust} as a second construct independent of trust. While there has been long-standing academic discourse for this distinction and arguments for both the one-dimensional and two-dimensional conceptualization of trust, distrust seems relatively understudied in XAI. In this position paper, we not only highlight the theoretical arguments for distrust as a distinct construct from trust but also contextualize psychometric evidence that likewise favors a distinction between trust and distrust. It remains to be investigated whether the available psychometric evidence is sufficient for the existence of distrust or whether distrust is merely a measurement artifact. Nevertheless, the XAI community should remain receptive to considering trust and distrust for a more comprehensive understanding of these two relevant constructs in XAI

    SGXIO: Generic Trusted I/O Path for Intel SGX

    Full text link
    Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well. To overcome this dependency, Intel introduced SGX, which allows to protect application code against a subverted or malicious OS by running it in a hardware-protected enclave. However, SGX lacks support for generic trusted I/O paths to protect user input and output between enclaves and I/O devices. This work presents SGXIO, a generic trusted path architecture for SGX, allowing user applications to run securely on top of an untrusted OS, while at the same time supporting trusted paths to generic I/O devices. To achieve this, SGXIO combines the benefits of SGX's easy programming model with traditional hypervisor-based trusted path architectures. Moreover, SGXIO can tweak insecure debug enclaves to behave like secure production enclaves. SGXIO surpasses traditional use cases in cloud computing and makes SGX technology usable for protecting user-centric, local applications against kernel-level keyloggers and likewise. It is compatible to unmodified operating systems and works on a modern commodity notebook out of the box. Hence, SGXIO is particularly promising for the broad x86 community to which SGX is readily available.Comment: To appear in CODASPY'1

    Analysis of Security Overhead in Broadcast V2V Communications

    Get PDF
    This paper concerns security issues for broadcast vehicle to vehicle (V2V) messages carrying vehicle status information ((location, heading, speed, etc.). These are often consumed by safety-related applications that e.g. augment situational awareness, issue alerts, recommend courses of action, and even trigger autonomous action. Consequently, the messages need to be both trustworthy and timely. We explore the impact of authenticity and integrity protection mechanisms on message latency using a model based on queuing theory. In conditions of high traffic density such as found in busy city centres, even the latency requirement of 100ms for first generation V2V applications was found to be challenging. Our main objective was to compare the performance overhead of the standard, PKC-based, message authenticity and integrity protection mechanism with that of an alternative scheme, TESLA, which uses symmetric-key cryptography combine with hash chains. This type of scheme has been dismissed in the past due to sup-posed high latency, but we found that in high traffic density conditions it outperformed the PKC-based scheme. without invoking congestion management measures. Perhaps the most significant observation from a security perspective is that denial of service attacks appear very easy to carry out and hard to defend against. This merits attention from the research and practitioner communities and is a topic we intend to address in the future

    High Speed Flow Visualisation of an Impinging Jet on a Pelton Turbine Bucket

    Get PDF
    This paper deals with flow investigations using endoscopes in a single-injector reduced scale Pelton turbine performed with a CMOS high-speed camera. Both onboard and external visualizations techniques of the flow in a bucket are presented. The flow observations evidence the unsteadiness of the successive steps of jet/bucket interaction, free surface flow development and evolution throughout the bucket duty cycle

    More than just meat: Carcass decomposition shapes trophic identities in a terrestrial vertebrate

    Get PDF
    Most food web models fail to account for the full complexity of interactions within a community, particularly where microbes are involved. Carcasses are microbe-rich resources and may represent a common nexus for the macrobiome and microbiome, effectively uniting autotrophs, consumers, predators and microbiota. We evaluated the role of carcasses as multitrophic resources and explored dietary partitioning for a sexually dimorphic obligate scavenger known for its hierarchical social system. This study was set in a well-studied community of camelids Vicugna, Lama guanicoe, pumas Puma concolor and Andean condors Vultur gryphus in the Andes. We hypothesized that condors, by feeding on trophically distinct dietary substrates within any given carcass, would have highly variable trophic position (TP) values. Furthermore, we expected that the microbial consumers within the carcass would inflate TP values in both, the carrion and the condors. Thus, we expected that the trophic heterogeneity within a carcass could facilitate sex-based dietary partitioning in condors. We used a multifaceted approach to assess the foraging of Andean condors, using regurgitated pellet and bulk isotopic analyses, and also quantified the TP of the entire community of graminoids, camelids, camelid carrion, pumas, and female and male condors employing compound-specific stable isotopes analysis of amino acids. Our analysis of condor pellets and bulk isotopes revealed non-trivial plant consumption, close to 10% of condor diet. Isotope analysis of amino acids revealed that condors had highly variable TPs (2.9 ± 0.3) compared to pumas (3.0 ± 0.0) and camelids (2.0 ± 0.1), likely representing ‘trophic omnivory’, wherein the condors consume plants (TP = 1.0 ± 0.1) and microbe-colonized carrion (2.3 ± 0.1). Female condors exhibited a TP (2.8 ± 0.2) lower than strict carnivory, suggesting that they consume more plant biomass in a carcass, while males (TP = 3.1 ± 0.3) are likely consuming more of the microbe-rich animal tissue. Our study highlights that carcasses represent a trophically heterogeneous resource and that vertebrate scavengers can feed across trophic groups within the carcass, from autotrophs to secondary consumers, and from both the macrobiome and microbiome. Thus, integration of microbes in macroecological contexts can help to resolve trophic identity, and better characterize the importance of microbes in detritivorous and omnivorous species. Read the free Plain Language Summary for this article on the Journal blog.Fil: Barceló, Gonzalo. University of Wisconsin; Estados UnidosFil: Perrig, Paula Leticia. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Patagonia Norte. Instituto de Investigaciones en Biodiversidad y Medioambiente. Universidad Nacional del Comahue. Centro Regional Universidad Bariloche. Instituto de Investigaciones en Biodiversidad y Medioambiente; Argentina. University of Wisconsin; Estados UnidosFil: Dharampal, Prarthana. University of Wisconsin; Estados UnidosFil: Donadio, Emiliano. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Patagonia Norte. Instituto de Investigaciones en Biodiversidad y Medioambiente. Universidad Nacional del Comahue. Centro Regional Universidad Bariloche. Instituto de Investigaciones en Biodiversidad y Medioambiente; Argentina. Fundación Rewilding Argentina; ArgentinaFil: Steffan, Shawn A.. United States Department of Agriculture. Agriculture Research Service; Estados Unidos. University of Wisconsin; Estados UnidosFil: Pauli, Jonathan Nicholas. University of Wisconsin; Estados Unido

    What makes a successful relationship? Subjective beliefs of older married, divorced and widowed individuals

    Get PDF
    Beliefs of a successful partnership influence goals, motivations, and behaviour in romantic relationships. Life transitions could have an influence on the personal templates of an ideal partnership. Every critical life event generates a discrepancy between perceptions and individual standards, which drives emotions and cognitions and motivates behaviour designed to reduce or resolve the discrepancy. We examined the differences between the beliefs of a successful relationship that divorced spouses, widowed persons and long-term married couples (N = 800, age 62–91 years) subscribe to, regarding what constitutes a successful marriage, and how their assumptions relate to various subjective dimensions of well-being. Results revealed that the prioritization given to the key elements of a successful relationship (i.e., mutual respect in long-term married couples, successful communication in divorced spouses and love in widowed persons) varied among the groups. Comparing low and high scores for individual well-being resulted in differences between beliefs of a successful partnership held by divorced and widowed persons but not married couples. These findings provide important considerations for counselling persons after the loss of a partner due to separation, divorce or death. An idealized view of the deceased spouse as a soulmate and emphasis on the shared love could be adaptive for widowed persons, whereas the emphasis on successful communication techniques could be an important step in improving cognitive and emotional well-being for divorced persons

    A Privacy Enhancing Architecture for Collaborative Working Environments

    Full text link

    Simulation des écoulements à surface libre dans les turbines Pelton par une méthode hybride SPH-ALE

    Get PDF
    International audienceAn Arbitrary Lagrange Euler (ALE) description of fluid flows is used together with the meshless numerical method Smoothed Particle Hydrodynamics (SPH) to simulate free surface flows. The ALE description leads to an hybrid method that can be closely connected to the finite volume approach. It is then possible to adapt some common techniques like upwind schemes and preconditioning to remedy some of the well known drawbacks of SPH like stability and accuracy. An efficient boundary treatment based on a proper upwinding of fluid information at the boundary surface is settled. The resulting SPH-ALE numerical method is applied to simulate free surface flows encountered in Pelton turbines.La méthode numérique sans maillage Smoothed Particle Hydrodynamics (SPH) est modifiée par l'adoption d'une description Arbitrary Lagrange Euler (ALE) des écoulements fluides, dans le but de simuler des écoulements à surface libre. Le formalisme ALE conduit à une méthode numérique hybride s'apparentant sur de nombreux points à une approche volumes finis. Il est alors possible d'adapter des techniques numériques courantes comme les schémas décentrés et le préconditionnement pour résoudre certains défauts majeurs de la méthode SPH, comme la stabilité numérique ou le manque de précision. Par ailleurs, le traitement des conditions limites est réalisé par un décentrement approprié des informations fluides sur les surfaces frontières. La méthode numérique SPH-ALE résultante est appliquée à la simulation d'écoulements à surface libre tels que ceux rencontrés dans les turbines Pelton

    TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer

    Get PDF
    Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis. On the other hand, high-latency anonymity systems offer strong security guarantees at the cost of computational overhead and long delays, which are excessive for interactive applications. We propose TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead. In TARANET's setup phase, traffic analysis is thwarted by mixing. In the data transmission phase, end hosts and ASes coordinate to shape traffic into constant-rate transmission using packet splitting. Our prototype implementation shows that TARANET can forward anonymous traffic at over 50 Gbps using commodity hardware

    Exploring the effects of human-centered AI explanations on trust and reliance

    Get PDF
    Transparency is widely regarded as crucial for the responsible real-world deployment of artificial intelligence (AI) and is considered an essential prerequisite to establishing trust in AI. There are several approaches to enabling transparency, with one promising attempt being human-centered explanations. However, there is little research into the effectiveness of human-centered explanations on end-users' trust. What complicates the comparison of existing empirical work is that trust is measured in different ways. Some researchers measure subjective trust using questionnaires, while others measure objective trust-related behavior such as reliance. To bridge these gaps, we investigated the effects of two promising human-centered post-hoc explanations, feature importance and counterfactuals, on trust and reliance. We compared these two explanations with a control condition in a decision-making experiment (N = 380). Results showed that human-centered explanations can significantly increase reliance but the type of decision-making (increasing a price vs. decreasing a price) had an even greater influence. This challenges the presumed importance of transparency over other factors in human decision-making involving AI, such as potential heuristics and biases. We conclude that trust does not necessarily equate to reliance and emphasize the importance of appropriate, validated, and agreed-upon metrics to design and evaluate human-centered AI
    • …
    corecore