The Challenges and Opportunities of Artificial Intelligence for Trustworthy Robots and Autonomous Systems

Trust is essential in designing autonomous and semiautonomous Robots and Autonomous Systems (RAS), because of the “No trust, no use” concept. RAS should provide high quality services, with four key properties that make them trustworthy: they must be (i) robust with regards to any system health related issues, (ii) safe for any matters in their surrounding environments, (iii) secure against any threats from cyber spaces, and (iv) trusted for human-machine interaction. This article thoroughly analyses the challenges in implementing the trustworthy RAS in respects of the four properties, and addresses the power of AI in improving the trustworthiness of RAS. While we focus on the benefits that AI brings to human, we should realize the potential risks that could be caused by AI. This article introduces for the first time the set of key aspects of human-centered AI for RAS, which can serve as a cornerstone for implementing trustworthy RAS by design in the future.

[1]  Chang Nho Cho,et al.  Neural Network Based Adaptive Actuator Fault Detection Algorithm for Robot Manipulators , 2019, J. Intell. Robotic Syst..

[2]  Erik Cambria,et al.  Recent Trends in Deep Learning Based Natural Language Processing , 2017, IEEE Comput. Intell. Mag..

[3]  Wei Xu,et al.  Toward human-centered AI , 2019, Interactions.

[4]  Bernt Schiele,et al.  Computer vision systems , 2003, Machine Vision and Applications.

[5]  Sahin Yildirim,et al.  Fault detection on robot manipulators using artificial neural networks , 2011 .

[6]  Ouarda Hachour Neural path planning for mobile robots , 2011 .

[7]  Jagadish Chandra Mohanta,et al.  A knowledge based fuzzy-probabilistic roadmap method for mobile robot navigation , 2019, Appl. Soft Comput..

[8]  Jay Lee,et al.  Industrial Artificial Intelligence for industry 4.0-based manufacturing systems , 2018, Manufacturing Letters.

[9]  Gang Xu,et al.  Recognition of speed signs in uncertain and dynamic environments , 2019 .

[10]  Xiang Yang Xu,et al.  Adaptive control of the shifting process in automatic transmissions , 2017 .

[11]  Nils Ole Tippenhauer,et al.  The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR , 2019, USENIX Security Symposium.

[12]  Ping Wu,et al.  Vision-Based Robot Path Planning with Deep Learning , 2017, ICVS.

[13]  Devesh Bhatt,et al.  Considerations in Assuring Safety of Increasingly Autonomous Systems [STUB] , 2018 .

[14]  Yue Li,et al.  PathMarker: protecting web contents against inside crawlers , 2019, Cybersecur..

[15]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[16]  Rajkumar Roy,et al.  A Design Approach to IoT Endpoint Security for Production Machinery Monitoring , 2019, Sensors.

[17]  Xukai Zou,et al.  A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[18]  Manuela Veloso A Few Issues on Human-Robot Interaction for Multiple Persistent Service Mobile Robots , 2014, AAAI Fall Symposia.

[19]  Xianbin Wang,et al.  Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement , 2019, IEEE Network.

[20]  Stefan Katzenbeisser,et al.  Security in Autonomous Systems , 2019, 2019 IEEE European Test Symposium (ETS).

[21]  David A. Wagner,et al.  Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[22]  Virender Ranga,et al.  Machine Learning Based Intrusion Detection Systems for IoT Applications , 2019, Wireless Personal Communications.

[23]  Spencer Rugaber,et al.  Using knowledge representation to understand interactive systems , 1997, Proceedings Fifth International Workshop on Program Comprehension. IWPC'97.

[24]  Guang-Zhong Yang,et al.  Normalization in Training U-Net for 2-D Biomedical Semantic Segmentation , 2018, IEEE Robotics and Automation Letters.

[25]  Bo Lang,et al.  Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey , 2019, Applied Sciences.

[26]  Zhang Qingta Design of a Smart Visual Sensor Based on Fast Template Matching , 2013 .

[27]  Steven X. Ding,et al.  A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part I: Fault Diagnosis With Model-Based and Signal-Based Approaches , 2015, IEEE Transactions on Industrial Electronics.

[28]  陈佳佳,et al.  Lidar Based Dynamic Obstacle Detection, Tracking and Recognition , 2016 .

[29]  Michael Fisher,et al.  Probabilistic Model Checking of Robots Deployed in Extreme Environments , 2018, AAAI.

[30]  David D. Coleman,et al.  CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100) , 2006 .

[31]  Hajime Asama,et al.  A system for self-diagnosis of an autonomous mobile robot using an internal state sensory system: fault detection and coping with the internal condition , 2003, Adv. Robotics.

[32]  Jason Weston,et al.  Natural Language Processing (Almost) from Scratch , 2011, J. Mach. Learn. Res..

[33]  T. Martin McGinnity,et al.  Linguistic Decision Making for Robot Route Learning , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[34]  Lyazzat Atymtayeva Automation of HCI Engineering processes: System Architecture and Knowledge Representation , 2015 .

[35]  Ming-Wei Chang,et al.  BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.

[36]  Markus Vincze,et al.  Computer Vision Systems , 2003, Lecture Notes in Computer Science.

[37]  Ashutosh Tiwari,et al.  The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).

[38]  Shady Elbassuoni,et al.  Website Navigation Behavior Analysis for Bot Detection , 2017, 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[39]  Masafumi Hashimoto,et al.  A multi-model based fault detection and diagnosis of internal sensors for mobile robot , 2003, Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453).

[40]  Roberto Baldoni,et al.  Survey on the Usage of Machine Learning Techniques for Malware Analysis , 2017, Comput. Secur..

[41]  Yifan Zhao,et al.  Online Anomaly Detection of Time Series at Scale , 2019, 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).

[42]  Syed S. H. Rizvi,et al.  A Threat to Vehicular Cyber Security and the Urgency for Correction , 2017 .

[43]  Steven X. Ding,et al.  A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part II: Fault Diagnosis With Knowledge-Based and Hybrid/Active Approaches , 2015, IEEE Transactions on Industrial Electronics.