{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:40:50Z","timestamp":1773931250139,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811533792","type":"print"},{"value":"9789811533808","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3380-8_50","type":"book-chapter","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:04:40Z","timestamp":1583193880000},"page":"574-584","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Design Challenges of Trustworthy Artificial Intelligence Learning Systems"],"prefix":"10.1007","author":[{"given":"Matthias R.","family":"Brust","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Bouvry","sequence":"additional","affiliation":[]},{"given":"Gr\u00e9goire","family":"Danoy","sequence":"additional","affiliation":[]},{"given":"El-Ghazil","family":"Talbi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"50_CR1","unstructured":"ISO\/IEC PD TR 24028: Information technology - Artificial Intelligence (AI) - Overview of trustworthiness in Artificial Intelligence. Standard, International Organization for Standardization, Geneva, CH"},{"key":"50_CR2","unstructured":"Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: OSDI, vol. 16, pp. 265\u2013283 (2016)"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Andronache, A., Brust, M.R., Rothkugel, S.: Hycast-podcast discovery in mobile networks. In: Proceedings of the 3rd ACM Workshop on Wireless Multimedia Networking and Performance Modeling, pp. 27\u201334. ACM (2007)","DOI":"10.1145\/1298216.1298224"},{"key":"50_CR4","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1038\/s41583-018-0038-8","volume":"19","author":"DS Bassett","year":"2018","unstructured":"Bassett, D.S., Zurn, P., Gold, J.I.: On the nature and use of models in network neuroscience. Nat. Rev. Neurosci. 19, 566\u2013578 (2018)","journal-title":"Nat. Rev. Neurosci."},{"issue":"10","key":"50_CR5","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), P10008 (2008)","journal-title":"J. Stat. Mech. Theory Exp."},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Brust, M.R., Akba\u015f, M.I., Turgut, D.: VBCA: a virtual forces clustering algorithm for autonomous aerial drone systems. In: 2016 Annual IEEE Systems Conference (SysCon), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/SYSCON.2016.7490517"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Brust, M.R., Frey, H., Rothkugel, S.: Adaptive multi-hop clustering in mobile networks. In: Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, pp. 132\u2013138. ACM (2007)","DOI":"10.1145\/1378063.1378086"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Brust, M.R., Frey, H., Rothkugel, S.: Dynamic multi-hop clustering for mobile hybrid wireless networks. In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, pp. 130\u2013135. ACM (2008)","DOI":"10.1145\/1352793.1352820"},{"key":"50_CR9","unstructured":"CEN-CENELEC: Artificial Intelligence, Blockchain and Distributed Ledger Technologies (2019). \nhttps:\/\/www.cencenelec.eu\/standards\/Topics\/ArtificialIntelligence"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Chen, J., Brust, M., Kiremire, A., Phoha, V.: Modeling privacy settings of an online social network from a game-theoretical perspective. In: IEEE CollaborateCom (2013)","DOI":"10.4108\/icst.collaboratecom.2013.254054"},{"key":"50_CR11","unstructured":"Cihon, P.: Standards for AI governance: international standards to enable global coordination in AI research & development (2019)"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Dilmaghani, S., Brust, M.R., Danoy, G., Cassagnes, N., Pecero, J., Bouvry, P.: Privacy and security of big data in AI systems: a research and standards perspective. In: Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2019), International Workshop on Privacy and Security of Big Data (PSBD 2019). IEEE BigData (2019)","DOI":"10.1109\/BigData47090.2019.9006283"},{"key":"50_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.3389\/fdata.2019.00022","volume":"2","author":"S Dilmaghani","year":"2019","unstructured":"Dilmaghani, S., Brust, M.R., Piyatumrong, A., Danoy, G., Bouvry, P.: Link definition ameliorating community detection in collaboration networks. Front. Big Data 2, 22 (2019)","journal-title":"Front. Big Data"},{"key":"50_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24211-8","volume-title":"Unsupervised Learning Algorithms","year":"2016","unstructured":"Celebi, M.E., Aydin, K. (eds.): Unsupervised Learning Algorithms. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-24211-8"},{"key":"50_CR15","unstructured":"Hinnefeld, J.H., Cooman, P., Mammo, N., Deese, R.: Evaluating fairness metrics in the presence of dataset bias. arXiv preprint \narXiv:1809.09245\n\n (2018)"},{"issue":"3","key":"50_CR16","doi-asserted-by":"publisher","first-page":"2690","DOI":"10.1093\/mnras\/stw803","volume":"459","author":"S Hong","year":"2016","unstructured":"Hong, S., et al.: Discriminating topology in galaxy distributions using network analysis. Mon. Not. R. Astron. Soc. 459(3), 2690\u20132700 (2016)","journal-title":"Mon. Not. R. Astron. Soc."},{"key":"50_CR17","doi-asserted-by":"crossref","unstructured":"Mai, S.T., He, X., Feng, J., B\u00f6hm, C.: Efficient anytime density-based clustering. In: Proceedings of the 2013 SIAM International Conference on Data Mining, pp. 112\u2013120 (2013)","DOI":"10.1137\/1.9781611972832.13"},{"key":"50_CR18","doi-asserted-by":"publisher","first-page":"22955","DOI":"10.1038\/srep22955","volume":"6","author":"L Pan","year":"2016","unstructured":"Pan, L., Zhou, T., L\u00fc, L., Hu, C.K.: Predicting missing links and identifying spurious links via likelihood analysis. Sci. Rep. 6, 22955 (2016)","journal-title":"Sci. Rep."},{"issue":"12","key":"50_CR19","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/953460.953490","volume":"46","author":"B Rao","year":"2003","unstructured":"Rao, B., Minakakis, L.: Evolution of mobile location-based services. Commun. ACM 46(12), 61\u201365 (2003)","journal-title":"Commun. ACM"},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I., et al.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet measurement (2009)","DOI":"10.1145\/1644893.1644895"},{"key":"50_CR21","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2018\/2753638","volume":"2018","author":"Z Sha","year":"2018","unstructured":"Sha, Z., et al.: A network-based approach to modeling and predicting product coconsideration relations. Complexity 2018, 14 (2018)","journal-title":"Complexity"},{"issue":"9","key":"50_CR22","first-page":"4610","volume":"2","author":"S Shirinivas","year":"2010","unstructured":"Shirinivas, S., Vetrivel, S., Elango, N.: Applications of graph theory in computer science an overview. Int. J. Eng. Sci. Technol. 2(9), 4610\u20134621 (2010)","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"50_CR23","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"50_CR24","unstructured":"Siegler, M.G.: Eric schmidt: Every 2 days we create as much information as we did up to 2003, August 2010. \nhttp:\/\/social.techcrunch.com\/2010\/08\/04\/schmidt-data\/\n\n. Accessed 7 Mar 2018"},{"key":"50_CR25","unstructured":"Steinhardt, J., Koh, P.W.W., Liang, P.S.: Certified defenses for data poisoning attacks. In: Advances in Neural Information Processing Systems (2017)"},{"key":"50_CR26","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: 25th USENIX Security Symposium (2016)"},{"key":"50_CR27","unstructured":"Wall, M.: Biased and wrong? Facial recognition tech in the dock, July 2019. \nhttps:\/\/www.bbc.com\/news\/business-48842750"},{"key":"50_CR28","unstructured":"Wu, F.J., Brust, M.R., Chen, Y.A., Luo, T.: The privacy exposure problem in mobile location-based services. In: Global Communications Conference (GLOBECOM), 2016 IEEE, pp. 1\u20137. IEEE (2016)"},{"key":"50_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29807-3","volume-title":"Advances in K-means Clustering: A Data Mining Thinking","author":"J Wu","year":"2012","unstructured":"Wu, J.: Advances in K-means Clustering: A Data Mining Thinking. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-29807-3"},{"issue":"3","key":"50_CR30","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R Xu","year":"2005","unstructured":"Xu, R., Wunsch 2nd, D.: Survey of clustering algorithms. IEEE Trans. Neural Netw. 16(3), 645\u2013678 (2005)","journal-title":"IEEE Trans. Neural Netw."},{"key":"50_CR31","doi-asserted-by":"publisher","first-page":"38208","DOI":"10.1038\/srep38208","volume":"6","author":"J Yang","year":"2016","unstructured":"Yang, J., Zhang, X.D.: Predicting missing links in complex networks based on common neighbors and distance. Sci. Rep. 6, 38208 (2016)","journal-title":"Sci. Rep."},{"key":"50_CR32","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1177\/0011128711426544","volume":"60","author":"SX Zhang","year":"2014","unstructured":"Zhang, S.X., Roberts, R.E., Farabee, D.: An analysis of prisoner reentry and parole risk using COMPAS and traditional criminal history measures. Crime Delinq. 60, 167\u2013192 (2014)","journal-title":"Crime Delinq."}],"container-title":["Communications in Computer and Information Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3380-8_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:09:32Z","timestamp":1583194172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3380-8_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811533792","9789811533808"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3380-8_50","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}