Publication search
with trust measurement as keyword
rupanetti, dulana kaabouch, naima
The integration of edge computing with IoT (EC-IoT) systems provides significant improvements in addressing security and privacy challenges in IoT networks. This paper examines the combination of EC-IoT and artificial intelligence (AI), highlighting practical strategies to improve data and network security. The published literature has suggested de...
Li, Mengyao Erickson, Isabel M Cross, Ernest V Lee, John D
Published in
Human factors
The objective of this study was to estimate trust from conversations using both lexical and acoustic data. As NASA moves to long-duration space exploration operations, the increasing need for cooperation between humans and virtual agents requires real-time trust estimation by virtual agents. Measuring trust through conversation is a novel and unint...
Li, Yugang Wu, Baizhou Huang, Yuqi Luan, Shenghua
Published in
Frontiers in Psychology
The rapid advancement of artificial intelligence (AI) has impacted society in many aspects. Alongside this progress, concerns such as privacy violation, discriminatory bias, and safety risks have also surfaced, highlighting the need for the development of ethical, responsible, and socially beneficial AI. In response, the concept of trustworthy AI h...
Alsaid, Areen Li, Mengyao Chiou, Erin K. Lee, John D.
Published in
Frontiers in Psychology
Introduction Trust has emerged as a prevalent construct to describe relationships between people and between people and technology in myriad domains. Across disciplines, researchers have relied on many different questionnaires to measure trust. The degree to which these questionnaires differ has not been systematically explored. In this paper, we u...
zuo, jinxin cao, ruohan jiahao, qi gao, peng wang, ziping jin, li zhang, long yueming, lu
In response to the challenge of low accuracy in node trust evaluation due to the high dynamics of entry and exit of drone cluster nodes, we propose a hierarchical blockchain-based trust measurement method for drone cluster nodes. This method overcomes the difficulties related to trust inheritance for dynamic nodes, trust re-evaluation of dynamic cl...