{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T21:07:47Z","timestamp":1778706467755,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":97,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T00:00:00Z","timestamp":1580083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R033595\/1"],"award-info":[{"award-number":["EP\/R033595\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,27]]},"DOI":"10.1145\/3351095.3372834","type":"proceedings-article","created":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T21:36:21Z","timestamp":1607463381000},"page":"272-283","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":229,"title":["The relationship between trust in AI and trustworthy machine learning technologies"],"prefix":"10.1145","author":[{"given":"Ehsan","family":"Toreini","sequence":"first","affiliation":[{"name":"Newcastle University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mhairi","family":"Aitken","sequence":"additional","affiliation":[{"name":"Newcastle University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kovila","family":"Coopamootoo","sequence":"additional","affiliation":[{"name":"Newcastle University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Karen","family":"Elliott","sequence":"additional","affiliation":[{"name":"Newcastle University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlos Gonzalez","family":"Zelaya","sequence":"additional","affiliation":[{"name":"Newcastle University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[{"name":"Newcastle University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806429"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1093\/scipol\/scv075"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An introduction to kernel and nearest-neighbor nonparametric regression","volume":"46","author":"Altman Naomi S","year":"1992","unstructured":"Naomi S Altman . 1992 . An introduction to kernel and nearest-neighbor nonparametric regression . The American Statistician 46 , 3 (1992), 175 -- 185 . Naomi S Altman. 1992. An introduction to kernel and nearest-neighbor nonparametric regression. The American Statistician 46, 3 (1992), 175--185.","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2018.2876107"},{"key":"e_1_3_2_1_6_1","volume-title":"Machine learning methods for estimating heterogeneous causal effects. stat 1050, 5","author":"Athey Susan","year":"2015","unstructured":"Susan Athey and Guido W Imbens . 2015. Machine learning methods for estimating heterogeneous causal effects. stat 1050, 5 ( 2015 ), 1--26. Susan Athey and Guido W Imbens. 2015. Machine learning methods for estimating heterogeneous causal effects. stat 1050, 5 (2015), 1--26."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_8_1","unstructured":"Akanksha Baid Wentao Wu Chong Sun AnHai Doan and Jeffrey F Naughton. 2015. On Debugging Non-Answers in Keyword Search Systems.. In EDBT. 37--48. Akanksha Baid Wentao Wu Chong Sun AnHai Doan and Jeffrey F Naughton. 2015. On Debugging Non-Answers in Keyword Search Systems.. In EDBT. 37--48."},{"key":"e_1_3_2_1_9_1","volume-title":"Consumer-Lending Discrimination in the Era of FinTech. Unpublished working paper","author":"Bartlett Robert","year":"2018","unstructured":"Robert Bartlett , Adair Morse , Richard Stanton , and Nancy Wallace . 2018. Consumer-Lending Discrimination in the Era of FinTech. Unpublished working paper . University of California , Berkeley ( 2018 ). Robert Bartlett, Adair Morse, Richard Stanton, and Nancy Wallace. 2018. Consumer-Lending Discrimination in the Era of FinTech. Unpublished working paper. University of California, Berkeley (2018)."},{"key":"e_1_3_2_1_10_1","unstructured":"Nicole Bidoit Melanie Herschel and Katerina Tzompanaki. 2014. Query-based why-not provenance with nedexplain. In Extending database technology (EDBT). Nicole Bidoit Melanie Herschel and Katerina Tzompanaki. 2014. Query-based why-not provenance with nedexplain. In Extending database technology (EDBT)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2040895.2040945"},{"key":"e_1_3_2_1_12_1","volume-title":"Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli.","author":"Biggio Battista","year":"2014","unstructured":"Battista Biggio , Igino Corona , Blaine Nelson , Benjamin I P Rubinstein , Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli. 2014 . Security evaluation of support vector machines in adversarial environments. In Support Vector Machines Applications. Springer , 105--153. Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I P Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli. 2014. Security evaluation of support vector machines in adversarial environments. In Support Vector Machines Applications. Springer, 105--153."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0007-7"},{"key":"e_1_3_2_1_14_1","volume-title":"Security evaluation of pattern classifiers under attack","author":"Biggio Battista","year":"2014","unstructured":"Battista Biggio , Giorgio Fumera , and Fabio Roli . 2014. Security evaluation of pattern classifiers under attack . IEEE transactions on knowledge and data engineering 26, 4 ( 2014 ), 984--996. Battista Biggio, Giorgio Fumera, and Fabio Roli. 2014. Security evaluation of pattern classifiers under attack. IEEE transactions on knowledge and data engineering 26, 4 (2014), 984--996."},{"key":"e_1_3_2_1_15_1","volume-title":"Asian Conference on Machine Learning. 97--112","author":"Biggio Battista","year":"2011","unstructured":"Battista Biggio , Blaine Nelson , and Pavel Laskov . 2011 . Support vector machines under adversarial label noise . In Asian Conference on Machine Learning. 97--112 . Battista Biggio, Blaine Nelson, and Pavel Laskov. 2011. Support vector machines under adversarial label noise. In Asian Conference on Machine Learning. 97--112."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.159"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142534"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.11.077"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376715"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75987-4_10"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_2_1_23_1","volume-title":"The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning. arXiv preprint arXiv:1808.00023","author":"Corbett-Davies Sam","year":"2018","unstructured":"Sam Corbett-Davies and Sharad Goel . 2018. The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning. arXiv preprint arXiv:1808.00023 ( 2018 ). Sam Corbett-Davies and Sharad Goel. 2018. The Measure and Mismeasure of Fairness: A Critical Review of Fair Machine Learning. arXiv preprint arXiv:1808.00023 (2018)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1159\/000092658"},{"key":"e_1_3_2_1_25_1","volume-title":"Conscientious classification: A data scientist's guide to discrimination-aware classification. Big data 5, 2","author":"Alessandro Brian","year":"2017","unstructured":"Brian d' Alessandro , Cathy O'Neil , and Tom LaGatta . 2017. Conscientious classification: A data scientist's guide to discrimination-aware classification. Big data 5, 2 ( 2017 ), 120--134. Brian d'Alessandro, Cathy O'Neil, and Tom LaGatta. 2017. Conscientious classification: A data scientist's guide to discrimination-aware classification. Big data 5, 2 (2017), 120--134."},{"key":"e_1_3_2_1_26_1","volume-title":"machine learning can be more secure! a case study on android malware detection","author":"Demontis Ambra","year":"2017","unstructured":"Ambra Demontis , Marco Melis , Battista Biggio , Davide Maiorca , Daniel Arp , Konrad Rieck , Igino Corona , Giorgio Giacinto , and Fabio Roli . 2017. Yes , machine learning can be more secure! a case study on android malware detection . IEEE Transactions on Dependable and Secure Computing ( 2017 ). Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, and Fabio Roli. 2017. Yes, machine learning can be more secure! a case study on android malware detection. IEEE Transactions on Dependable and Secure Computing (2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/3007263.3007303"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824039"},{"key":"e_1_3_2_1_29_1","volume-title":"Measuring trust inside organisations. Personnel review 35, 5","author":"Dietz Graham","year":"2006","unstructured":"Graham Dietz and Deanne N Den Hartog . 2006. Measuring trust inside organisations. Personnel review 35, 5 ( 2006 ), 557--588. Graham Dietz and Deanne N Den Hartog. 2006. Measuring trust inside organisations. Personnel review 35, 5 (2006), 557--588."},{"key":"e_1_3_2_1_30_1","volume-title":"Recovery of Trust: Case Studies of Organisational Failures and Trust Repair","author":"Dietz Graham","unstructured":"Graham Dietz and Nicole Gillespie . 2012. Recovery of Trust: Case Studies of Organisational Failures and Trust Repair . Vol. 5 . Institute of Business Ethics London . Graham Dietz and Nicole Gillespie. 2012. Recovery of Trust: Case Studies of Organisational Failures and Trust Repair. Vol. 5. Institute of Business Ethics London."},{"key":"e_1_3_2_1_31_1","volume-title":"Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608","author":"Doshi-Velez Finale","year":"2017","unstructured":"Finale Doshi-Velez and Been Kim . 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 ( 2017 ). Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551514534143"},{"key":"e_1_3_2_1_34_1","volume-title":"Differential privacy. Encyclopedia of Cryptography and Security","author":"Dwork Cynthia","year":"2011","unstructured":"Cynthia Dwork . 2011. Differential privacy. Encyclopedia of Cryptography and Security ( 2011 ), 338--340. Cynthia Dwork. 2011. Differential privacy. Encyclopedia of Cryptography and Security (2011), 338--340."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090255"},{"key":"e_1_3_2_1_36_1","first-page":"625","article-title":"Why does unsupervised pre-training help deep learning","author":"Erhan Dumitru","year":"2010","unstructured":"Dumitru Erhan , Yoshua Bengio , Aaron Courville , Pierre-Antoine Manzagol , Pascal Vincent , and Samy Bengio . 2010 . Why does unsupervised pre-training help deep learning ? Journal of Machine Learning Research 11 , Feb (2010), 625 -- 660 . Dumitru Erhan, Yoshua Bengio, Aaron Courville, Pierre-Antoine Manzagol, Pascal Vincent, and Samy Bengio. 2010. Why does unsupervised pre-training help deep learning? Journal of Machine Learning Research 11, Feb (2010), 625--660.","journal-title":"Journal of Machine Learning Research 11"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783311"},{"key":"e_1_3_2_1_38_1","volume-title":"Sally Kagay, and Joshua Feldman.","author":"Fjeld Jessica","year":"2019","unstructured":"Jessica Fjeld , Hannah Hilligoss , Nele Achten , Maia Levy Daniel , Sally Kagay, and Joshua Feldman. 2019 . Principled Artificial Intelligence: Mapping Consensus and Divergence in Ethical and Rights-Based Approaches . (2019). https:\/\/aihr.cyber.harvard.edu\/ Jessica Fjeld, Hannah Hilligoss, Nele Achten, Maia Levy Daniel, Sally Kagay, and Joshua Feldman. 2019. Principled Artificial Intelligence: Mapping Consensus and Divergence in Ethical and Rights-Based Approaches. (2019). https:\/\/aihr.cyber.harvard.edu\/"},{"key":"e_1_3_2_1_39_1","volume-title":"Safetynets: Verifiable execution of deep neural networks on an untrusted cloud. In Advances in Neural Information Processing Systems. 4672--4681.","author":"Ghodsi Zahra","year":"2017","unstructured":"Zahra Ghodsi , Tianyu Gu , and Siddharth Garg . 2017 . Safetynets: Verifiable execution of deep neural networks on an untrusted cloud. In Advances in Neural Information Processing Systems. 4672--4681. Zahra Ghodsi, Tianyu Gu, and Siddharth Garg. 2017. Safetynets: Verifiable execution of deep neural networks on an untrusted cloud. In Advances in Neural Information Processing Systems. 4672--4681."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2009.35713319"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 10th International Workshop on Pattern Recognition in Information Systems, PRIS 2010, In conjunction with ICEIS 2010","author":"Gon\u00e7alves Carlos Adriano","year":"2010","unstructured":"Carlos Adriano Gon\u00e7alves , Celia Talma Gon\u00e7alves , Rui Camacho , and Eugenio C Oliveira . 2010 . The impact of Pre-Processing on the Classification of MEDLINE Documents. Pattern Recognition in Information Systems , Proceedings of the 10th International Workshop on Pattern Recognition in Information Systems, PRIS 2010, In conjunction with ICEIS 2010 (2010), 10. Carlos Adriano Gon\u00e7alves, Celia Talma Gon\u00e7alves, Rui Camacho, and Eugenio C Oliveira. 2010. The impact of Pre-Processing on the Classification of MEDLINE Documents. Pattern Recognition in Information Systems, Proceedings of the 10th International Workshop on Pattern Recognition in Information Systems, PRIS 2010, In conjunction with ICEIS 2010 (2010), 10."},{"key":"e_1_3_2_1_42_1","volume-title":"Towards Explaining the Effects of Data Preprocessing on Machine Learning. 2019 IEEE 35th International Conference on Data Engineering (ICDE)","author":"Gonz\u00e1lez Zelaya Carlos Vladimiro","year":"2019","unstructured":"Carlos Vladimiro Gonz\u00e1lez Zelaya . 2019 . Towards Explaining the Effects of Data Preprocessing on Machine Learning. 2019 IEEE 35th International Conference on Data Engineering (ICDE) (2019). Carlos Vladimiro Gonz\u00e1lez Zelaya. 2019. Towards Explaining the Effects of Data Preprocessing on Machine Learning. 2019 IEEE 35th International Conference on Data Engineering (ICDE) (2019)."},{"key":"e_1_3_2_1_43_1","volume-title":"A survey of methods for explaining black box models. ACM computing surveys (CSUR) 51, 5","author":"Guidotti Riccardo","year":"2018","unstructured":"Riccardo Guidotti , Anna Monreale , Salvatore Ruggieri , Franco Turini , Fosca Giannotti , and Dino Pedreschi . 2018. A survey of methods for explaining black box models. ACM computing surveys (CSUR) 51, 5 ( 2018 ), 93. Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, and Dino Pedreschi. 2018. A survey of methods for explaining black box models. ACM computing surveys (CSUR) 51, 5 (2018), 93."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.91"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11024-006-0012-x"},{"key":"e_1_3_2_1_46_1","unstructured":"Moritz Hardt Eric Price Nati Srebro and others. 2016. Equality of opportunity in supervised learning. In Advances in neural information processing systems. 3315--3323. Moritz Hardt Eric Price Nati Srebro and others. 2016. Equality of opportunity in supervised learning. In Advances in neural information processing systems. 3315--3323."},{"key":"e_1_3_2_1_47_1","volume-title":"Generating adversarial malware examples for black-box attacks based on GAN. arXiv preprint arXiv:1702.05983","author":"Hu Weiwei","year":"2017","unstructured":"Weiwei Hu and Ying Tan . 2017. Generating adversarial malware examples for black-box attacks based on GAN. arXiv preprint arXiv:1702.05983 ( 2017 ). Weiwei Hu and Ying Tan. 2017. Generating adversarial malware examples for black-box attacks based on GAN. arXiv preprint arXiv:1702.05983 (2017)."},{"key":"e_1_3_2_1_48_1","volume-title":"Data clustering: a review. ACM computing surveys (CSUR) 31, 3","author":"Jain Anil K","year":"1999","unstructured":"Anil K Jain , M Narasimha Murty , and Patrick J Flynn . 1999. Data clustering: a review. ACM computing surveys (CSUR) 31, 3 ( 1999 ), 264--323. Anil K Jain, M Narasimha Murty, and Patrick J Flynn. 1999. Data clustering: a review. ACM computing surveys (CSUR) 31, 3 (1999), 264--323."},{"key":"e_1_3_2_1_49_1","volume-title":"Rawlsian Fairness for Machine Learning. FATML","author":"Joseph Matthew","year":"2016","unstructured":"Matthew Joseph , Michael Kearns , Jamie Morgenstern , Seth Neel , and Aaron Roth . 2016. Rawlsian Fairness for Machine Learning. FATML ( 2016 ), 1--26. http:\/\/arxiv.org\/abs\/1610.09559 Matthew Joseph, Michael Kearns, Jamie Morgenstern, Seth Neel, and Aaron Roth. 2016. Rawlsian Fairness for Machine Learning. FATML (2016), 1--26. http:\/\/arxiv.org\/abs\/1610.09559"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33486-3_3"},{"key":"e_1_3_2_1_51_1","unstructured":"Been Kim Elena Glassman Brittney Johnson and Julie Shah. 2015. iBCM: Interactive Bayesian case model empowering humans via intuitive interaction. (2015). Been Kim Elena Glassman Brittney Johnson and Julie Shah. 2015. iBCM: Interactive Bayesian case model empowering humans via intuitive interaction. (2015)."},{"key":"e_1_3_2_1_52_1","unstructured":"Sabine Theresia Koszegi. 2019. High-Level Expert Group on Artificial Intelligence. Sabine Theresia Koszegi. 2019. High-Level Expert Group on Artificial Intelligence."},{"key":"e_1_3_2_1_54_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105. Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_55_1","unstructured":"Matt J Kusner Joshua Loftus Chris Russell and Ricardo Silva. 2017. Counterfactual fairness. In Advances in Neural Information Processing Systems. 4066--4076. Matt J Kusner Joshua Loftus Chris Russell and Ricardo Silva. 2017. Counterfactual fairness. In Advances in Neural Information Processing Systems. 4066--4076."},{"key":"e_1_3_2_1_56_1","volume-title":"Curie: A method for protecting SVM Classifier from Poisoning Attack. arXiv preprint arXiv:1606.01584","author":"Laishram Ricky","year":"2016","unstructured":"Ricky Laishram and Vir Virander Phoha . 2016 . Curie: A method for protecting SVM Classifier from Poisoning Attack. arXiv preprint arXiv:1606.01584 (2016). Ricky Laishram and Vir Virander Phoha. 2016. Curie: A method for protecting SVM Classifier from Poisoning Attack. arXiv preprint arXiv:1606.01584 (2016)."},{"key":"e_1_3_2_1_57_1","unstructured":"Himabindu Lakkaraju Ece Kamar Rich Caruana and Jure Leskovec. 2017. Interpretable & Explorable Approximations of Black Box Models. (7 2017). Himabindu Lakkaraju Ece Kamar Rich Caruana and Jure Leskovec. 2017. Interpretable & Explorable Approximations of Black Box Models. (7 2017)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654990"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2008.01.001"},{"key":"e_1_3_2_1_60_1","volume-title":"The mythos of model interpretability. arXiv preprint arXiv:1606.03490","author":"Lipton Zachary C","year":"2016","unstructured":"Zachary C Lipton . 2016. The mythos of model interpretability. arXiv preprint arXiv:1606.03490 ( 2016 ). Zachary C Lipton. 2016. The mythos of model interpretability. arXiv preprint arXiv:1606.03490 (2016)."},{"key":"e_1_3_2_1_61_1","volume-title":"A survey on security threats and defensive techniques of machine learning: A data driven view","author":"Liu Qiang","year":"2018","unstructured":"Qiang Liu , Pan Li , Wentao Zhao , Wei Cai , Shui Yu , and Victor C M Leung . 2018. A survey on security threats and defensive techniques of machine learning: A data driven view . IEEE access 6 ( 2018 ), 12103--12117. Qiang Liu, Pan Li, Wentao Zhao, Wei Cai, Shui Yu, and Victor C M Leung. 2018. A survey on security threats and defensive techniques of machine learning: A data driven view. IEEE access 6 (2018), 12103--12117."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487579"},{"key":"e_1_3_2_1_63_1","volume-title":"A statistical framework for fair predictive algorithms. arXiv preprint arXiv:1610.08077","author":"Lum Kristian","year":"2016","unstructured":"Kristian Lum and James Johndrow . 2016. A statistical framework for fair predictive algorithms. arXiv preprint arXiv:1610.08077 ( 2016 ). Kristian Lum and James Johndrow. 2016. A statistical framework for fair predictive algorithms. arXiv preprint arXiv:1610.08077 (2016)."},{"key":"e_1_3_2_1_64_1","unstructured":"Scott M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. In Advances in Neural Information Processing Systems. 4765--4774. Scott M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. In Advances in Neural Information Processing Systems. 4765--4774."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020488"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505624"},{"key":"e_1_3_2_1_67_1","volume-title":"An integrative model of organizational trust","author":"Mayer Roger C","year":"1995","unstructured":"Roger C Mayer , James H Davis , and F David Schoorman . 1995. An integrative model of organizational trust . Academy of management review 20, 3 ( 1995 ), 709--734. Roger C Mayer, James H Davis, and F David Schoorman. 1995. An integrative model of organizational trust. Academy of management review 20, 3 (1995), 709--734."},{"key":"e_1_3_2_1_68_1","volume-title":"Machine learning. Neural and Statistical Classification 13","author":"Michie Donald","year":"1994","unstructured":"Donald Michie , David J Spiegelhalter , C C Taylor , and others. 1994. Machine learning. Neural and Statistical Classification 13 ( 1994 ). Donald Michie, David J Spiegelhalter, C C Taylor, and others. 1994. Machine learning. Neural and Statistical Classification 13 (1994)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.10.011"},{"key":"e_1_3_2_1_70_1","volume-title":"Proc. Conf. Fairness Accountability Transp.","author":"Narayanan Arvind","year":"2018","unstructured":"Arvind Narayanan . 2018 . Translation tutorial: 21 fairness definitions and their politics . In Proc. Conf. Fairness Accountability Transp. , New York, USA. Arvind Narayanan. 2018. Translation tutorial: 21 fairness definitions and their politics. In Proc. Conf. Fairness Accountability Transp., New York, USA."},{"key":"e_1_3_2_1_71_1","volume-title":"25th ${$USENIX$}$ Security Symposium (${$USENIX$}$ Security 16). 619--636.","author":"Ohrimenko Olga","unstructured":"Olga Ohrimenko , Felix Schuster , C\u00e9dric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016. Oblivious multi-party machine learning on trusted processors . In 25th ${$USENIX$}$ Security Symposium (${$USENIX$}$ Security 16). 619--636. Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious multi-party machine learning on trusted processors. In 25th ${$USENIX$}$ Security Symposium (${$USENIX$}$ Security 16). 619--636."},{"key":"e_1_3_2_1_72_1","volume-title":"Towards the science of security and privacy in machine learning. arXiv preprint arXiv:1611.03814","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Arunesh Sinha , and Michael Wellman . 2016. Towards the science of security and privacy in machine learning. arXiv preprint arXiv:1611.03814 ( 2016 ). Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, and Michael Wellman. 2016. Towards the science of security and privacy in machine learning. arXiv preprint arXiv:1611.03814 (2016)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453943"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_76_1","volume-title":"Learning decision lists. Machine learning 2, 3","author":"Rivest Ronald L","year":"1987","unstructured":"Ronald L Rivest . 1987. Learning decision lists. Machine learning 2, 3 ( 1987 ), 229--246. Ronald L Rivest. 1987. Learning decision lists. Machine learning 2, 3 (1987), 229--246."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888913000039"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"e_1_3_2_1_79_1","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, 1310--1321","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov . 2015 . Privacy-preserving deep learning . In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, 1310--1321 . Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, 1310--1321."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305890.3306006"},{"key":"e_1_3_2_1_81_1","first-page":"47","article-title":"Building trust in artificial intelligence, machine learning, and robotics","volume":"31","author":"Siau Keng","year":"2018","unstructured":"Keng Siau and Weiyu Wang . 2018 . Building trust in artificial intelligence, machine learning, and robotics . Cutter Business Technology Journal 31 , 2 (2018), 47 -- 53 . Keng Siau and Weiyu Wang. 2018. Building trust in artificial intelligence, machine learning, and robotics. Cutter Business Technology Journal 31, 2 (2018), 47--53.","journal-title":"Cutter Business Technology Journal"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887201"},{"key":"e_1_3_2_1_83_1","unstructured":"Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104--3112. Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104--3112."},{"key":"e_1_3_2_1_84_1","volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","unstructured":"Richard S Sutton and Andrew G Barto . 2018. Reinforcement learning: An introduction . MIT press . Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_1_85_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2013.08.006"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2641562"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314289"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00374"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544881"},{"key":"e_1_3_2_1_91_1","volume-title":"Misunderstood misunderstanding: social identities and public uptake of science. Public understanding of science 1, 3","author":"Wynne Brian","year":"1992","unstructured":"Brian Wynne . 1992. Misunderstood misunderstanding: social identities and public uptake of science. Public understanding of science 1, 3 ( 1992 ), 281--304. Brian Wynne. 1992. Misunderstood misunderstanding: social identities and public uptake of science. Public understanding of science 1, 3 (1992), 281--304."},{"key":"e_1_3_2_1_92_1","volume-title":"A reflexive view of the expert-lay knowledge divide. Risk, environment and modernity: Towards a new ecology 40","author":"Wynne Brian","year":"1996","unstructured":"Brian Wynne . 1996. A reflexive view of the expert-lay knowledge divide. Risk, environment and modernity: Towards a new ecology 40 ( 1996 ), 44. Brian Wynne. 1996. A reflexive view of the expert-lay knowledge divide. Risk, environment and modernity: Towards a new ecology 40 (1996), 44."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1159\/000092659"},{"key":"e_1_3_2_1_94_1","first-page":"14","article-title":"Evaluation of a hybrid approach for efficient provenance storage","volume":"9","author":"Xie Yulai","year":"2013","unstructured":"Yulai Xie , Kiran-Kumar Muniswamy-Reddy , Dan Feng , Yan Li , and Darrell D E Long . 2013 . Evaluation of a hybrid approach for efficient provenance storage . ACM Transactions on Storage (TOS) 9 , 4 (2013), 14 . Yulai Xie, Kiran-Kumar Muniswamy-Reddy, Dan Feng, Yan Li, and Darrell D E Long. 2013. Evaluation of a hybrid approach for efficient provenance storage. ACM Transactions on Storage (TOS) 9, 4 (2013), 14.","journal-title":"ACM Transactions on Storage (TOS)"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167204271305"},{"key":"e_1_3_2_1_96_1","unstructured":"Muhammad Bilal Zafar. 2019. Discrimination in Algorithmic Decision Making: From Principles to Measures and Mechanisms. (2019). Muhammad Bilal Zafar. 2019. Discrimination in Algorithmic Decision Making: From Principles to Measures and Mechanisms. (2019)."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052660"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-017-0506-1"}],"event":{"name":"FAT* '20: Conference on Fairness, Accountability, and Transparency","location":"Barcelona Spain","acronym":"FAT* '20","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351095.3372834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351095.3372834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:22Z","timestamp":1750200082000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351095.3372834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,27]]},"references-count":97,"alternative-id":["10.1145\/3351095.3372834","10.1145\/3351095"],"URL":"https:\/\/doi.org\/10.1145\/3351095.3372834","relation":{},"subject":[],"published":{"date-parts":[[2020,1,27]]},"assertion":[{"value":"2020-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}