{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:01:42Z","timestamp":1771038102619,"version":"3.50.1"},"reference-count":123,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100016172","name":"Luxembourg Institute of Science and Technology (LIST) Ph.D. Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016172","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3176385","type":"journal-article","created":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T19:32:15Z","timestamp":1652902335000},"page":"55308-55337","source":"Crossref","is-referenced-by-count":20,"title":["A Survey on Trusted Distributed Artificial Intelligence"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5986-3829","authenticated-orcid":false,"given":"Muhammed Akif","family":"A\u011eCA","sequence":"first","affiliation":[{"name":"Luxembourg Institute of Science and Technology (LIST), Esch-Sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4446-749X","authenticated-orcid":false,"given":"S\u00e9bastien","family":"Faye","sequence":"additional","affiliation":[{"name":"Luxembourg Institute of Science and Technology (LIST), Esch-Sur-Alzette, Luxembourg"}]},{"given":"Djamel","family":"Khadraoui","sequence":"additional","affiliation":[{"name":"Luxembourg Institute of Science and Technology (LIST), Esch-Sur-Alzette, Luxembourg"}]}],"member":"263","reference":[{"key":"ref39","first-page":"213","article-title":"Can we trust trust?","author":"gambetta","year":"1990","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"ref38","author":"kuo","year":"2010","journal-title":"Automatic Control Systems"},{"key":"ref33","article-title":"Trustworthy AI","author":"wing","year":"2020","journal-title":"arXiv 2002 06276"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32236-6_51"},{"key":"ref31","author":"eberhart","year":"2001","journal-title":"Swarm Intelligence"},{"key":"ref30","article-title":"AI enabling technologies: A survey","author":"gadepally","year":"2019","journal-title":"arXiv 1905 03592"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00587-9"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75018-3_14"},{"key":"ref35","article-title":"The potential impact of artificial intelligence on preventive diplomacy from a balance-of-threat perspective","author":"oriesek","year":"2022"},{"key":"ref34","article-title":"The role of normware in trustworthy and explainable AI","author":"sileno","year":"2018","journal-title":"arXiv 1812 02471"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/PBPC006E"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1504\/IJCC.2016.075096","article-title":"Opinion mining of microblog texts on Hadoop ecosystem","volume":"5","author":"a?ca","year":"2016","journal-title":"Int J Cloud Comput"},{"key":"ref20","first-page":"505","author":"agha","year":"1999","journal-title":"Multiagent Systems A Modern Approach to Distributed Artificial Intelligence"},{"key":"ref22","first-page":"87","article-title":"The dartmouth college artificial intelligence conference: The next fifty years","volume":"27","author":"moor","year":"2006","journal-title":"AI Magazine"},{"key":"ref21","first-page":"433","article-title":"Turing","volume":"59","author":"alan","year":"1950","journal-title":"Comput Mach Intell"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-2448-2_6"},{"key":"ref23","author":"mccarthy","year":"1959","journal-title":"Artificial Intelligence"},{"key":"ref101","article-title":"MISIM: A neural code semantics similarity system using the context-aware semantics structure","author":"ye","year":"2020","journal-title":"arXiv 2006 05265"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1567-8_2"},{"key":"ref100","first-page":"299","article-title":"Overload control for $\\mu$\ns-scale RPCs with breakwater","author":"cho","year":"2020","journal-title":"Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI)"},{"key":"ref25","article-title":"What is artificial intelligence?","author":"mccarthy","year":"1998"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.21"},{"key":"ref51","article-title":"A modern primer on processing in memory","author":"mutlu","year":"2020","journal-title":"arXiv 2012 03112"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.njas.2020.100323"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE49799.2020.9272215"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref55","author":"agarwal","year":"2013","journal-title":"Online distributed interaction"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/48012.48037"},{"key":"ref53","article-title":"Intelligent architectures for intelligent computing systems","author":"mutlu","year":"2020","journal-title":"arXiv 2012 12381"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/71.97897"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.213"},{"key":"ref4","first-page":"1644","article-title":"Trusted AI and the contribution of trust modeling in multiagent systems","author":"cohen","year":"2019","journal-title":"Proc 19th Int Conf Auton Agents Multiagent Syst (AAMAS)"},{"key":"ref3","article-title":"End-to-end training of differentiable pipelines across machine learning frameworks","author":"milutinovic","year":"2017","journal-title":"Proc Neural Inf Process Syst (NIPS) Autodiff Workshop Future Gradient?Based Mach Learn Softw Techn"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1340"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00267"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2019.00025"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2007.4378780"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops48775.2020.9156127"},{"key":"ref9","article-title":"Research directions for developing and operating artificial intelligence models in trustworthy autonomous systems","author":"mart\u00ednez-fern\u00e1ndez","year":"2020","journal-title":"arXiv 2003 05434"},{"key":"ref46","article-title":"Software engineering challenges in realizing smart-city systems","author":"aksit","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.06.026"},{"key":"ref48","author":"agarwal","year":"2019","journal-title":"U S Patent 10 248 566"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.997877"},{"key":"ref42","first-page":"1","article-title":"Data ecosystems-fuelling the digital age","author":"proper","year":"2020","journal-title":"Proc VMBO"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982548"},{"key":"ref44","author":"antoniou","year":"2004","journal-title":"A Semantic Web Primer"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0501-34"},{"key":"ref73","first-page":"312","article-title":"Persisting trust in intrusted varying resilient citv context V","author":"a?ca","year":"2019","journal-title":"Proc Int Conf Artif Intell (ICAI)"},{"key":"ref72","article-title":"Seven defining features of terahertz (THz) wireless systems: A fellowship of communication and sensing","author":"chaccour","year":"2021","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref71","article-title":"D3.4: Harmonisation of standards for 5G technologies","author":"ladid","year":"2019"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/MNET.2020.9277891","article-title":"A perspective of O-RAN integration with MEC, SON, and network slicing in the 5G era","volume":"34","author":"chih-lin","year":"2020","journal-title":"IEEE Netw"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.9785\/cri-2019-200402"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1017\/err.2019.65"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1126\/science.aay3638"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2020.100049"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00561-z"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.18"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/225830.223985"},{"key":"ref62","article-title":"&#x00D6;zelle?tirilmi? analitik bulut mimarilerinde da??t?k dosya sistemleri ile performans iyile?tirilmesi","author":"a?ca","year":"2015"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.3026245"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476259"},{"key":"ref64","article-title":"TIRAMISU: A polyhedral compiler for dense and sparse deep learning","author":"baghdadi","year":"2020","journal-title":"arXiv 2005 04091"},{"key":"ref65","article-title":"Replication robust payoff allocation in submodular cooperative games","author":"han","year":"2020","journal-title":"arXiv 2006 14583"},{"key":"ref66","article-title":"On computational tractability for rational verification","author":"gutierrez","year":"2020"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2020.104556"},{"key":"ref68","article-title":"Artificial intelligence requires more than deep learning","author":"wooldridge","year":"2020"},{"key":"ref69","author":"marcus","year":"2019","journal-title":"Rebooting AI Building Artificial Intelligence We Can Trust"},{"key":"ref2","first-page":"1","article-title":"MLbase: A distributed machine-learning system","volume":"1","author":"kraska","year":"2013","journal-title":"CIDR"},{"key":"ref1","first-page":"5595","article-title":"Automatic differentiation in machine learning: A survey","volume":"18","author":"baydin","year":"2017","journal-title":"J Mach Learn Res"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"ref109","year":"2021","journal-title":"Artificial Intelligence Technology Use Cases and Applications Trustworthiness and Technical Standardization"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016542229220"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359661"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313529"},{"key":"ref107","first-page":"49","article-title":"IX: A protected dataplane operating system for high throughput and low latency","author":"belay","year":"2014","journal-title":"Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI)"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref106","article-title":"DBOS: A proposal for a data-centric operating system","author":"cafarella","year":"2020","journal-title":"arXiv 2007 11112"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.66"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref104","article-title":"Regulating artificial intelligence systems: Risks, challenges, competencies, and strategies","author":"scherer","year":"2016"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746562"},{"key":"ref102","author":"balakrishnan","year":"2015","journal-title":"U S Patent 14 529 812"},{"key":"ref111","article-title":"Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses","author":"goldblum","year":"2020","journal-title":"arXiv 2012 10544"},{"key":"ref112","article-title":"On evaluating adversarial robustness","author":"carlini","year":"2019","journal-title":"arXiv 1902 06705"},{"key":"ref110","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"arXiv 1706 06083"},{"key":"ref98","first-page":"353","article-title":"ABC: A simple explicit congestion controller for wireless networks","author":"goyal","year":"2020","journal-title":"Proc 17th USENIX Symp Netw Syst Design Implement (NSDI)"},{"key":"ref99","article-title":"RFocus: Practical beamforming for small devices","author":"arun","year":"2019","journal-title":"arXiv 1905 05130"},{"key":"ref96","author":"balakrishnan","year":"2020","journal-title":"Surface for Controlled Radio Frequency Signal Propagation"},{"key":"ref97","article-title":"SonicPACT: An ultrasonic ranging method for the private automated contact tracing (PACT) protocol","author":"meklenburg","year":"2020","journal-title":"arXiv 2012 04770"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/16M1080173"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2736066"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182821"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/201977.201989"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-016-0508-7"},{"key":"ref15","first-page":"633","article-title":"Challenges for swarm of UAV\/drones based intelligence","author":"a?ca","year":"2021","journal-title":"Parallel and Distributed Processing and Applications"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70296-0_43"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/2.223543"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2004.1309810"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC49654.2021.9622850"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008942012299"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70296-0_38"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372834"},{"key":"ref83","author":"machovec","year":"2020","journal-title":"Dynamic heuristics for surveillance mission scheduling with unmanned aerial vehicles in heterogeneous environments"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2877359"},{"key":"ref19","first-page":"94","article-title":"Trust in distributed artificial intelligence","author":"marsh","year":"1992","journal-title":"Proc Eur Workshop Modelling Auton Agents Multi-Agent World"},{"key":"ref114","first-page":"39","article-title":"Post-quantum cryptography: Current state and quantum mitigation","author":"beullens","year":"2021","journal-title":"Proc ENISA"},{"key":"ref113","article-title":"Unadversarial examples: Designing objects for robust vision","author":"salman","year":"2020","journal-title":"arXiv 2012 12235"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2004.1310922"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC43674.2020.9286149"},{"key":"ref115","article-title":"BioDynaMo: A general platform for scalable agent-based simulation","author":"breitwieser","year":"2021","journal-title":"BioRxiv"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2558199"},{"key":"ref121","article-title":"Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses","author":"goldblum","year":"2020","journal-title":"arXiv 2012 10544"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.019"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3105682"},{"key":"ref85","article-title":"EU commission","author":"stuckman","year":"2021","journal-title":"The European 5G Annual Journal"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/90.650137"},{"key":"ref87","first-page":"497","article-title":"Vision based control law using 3D visual features","volume":"3","author":"martinet","year":"1996","journal-title":"Proc Robot Manuf Syst World Automat Congr (WAC)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.38094\/jastt1466"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09777972.pdf?arnumber=9777972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T19:03:44Z","timestamp":1700247824000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9777972\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":123,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3176385","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}