Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges

[1]  M. Ridley Explainable Artificial Intelligence (XAI) , 2022, Information Technology and Libraries.

[2]  Xingda Qu,et al.  A Temporal–Spatial Deep Learning Approach for Driver Distraction Detection Based on EEG Signals , 2021, IEEE Transactions on Automation Science and Engineering.

[3]  Yujie Li,et al.  Adaptive Square Attack: Fooling Autonomous Cars With Adversarial Traffic Signs , 2021, IEEE Internet of Things Journal.

[4]  Jeanna Neefe Matthews,et al.  Towards intellectual freedom in an AI Ethics Global Community , 2021, AI and Ethics.

[5]  Inioluwa Deborah Raji,et al.  You Can't Sit With Us: Exclusionary Pedagogy in AI Ethics Education , 2021, FAccT.

[6]  J. Borenstein,et al.  AI Ethics in the Public, Private, and NGO Sectors: A Review of a Global Document Collection , 2021, IEEE Transactions on Technology and Society.

[7]  Luciano Floridi,et al.  Ethics as a Service: A Pragmatic Operationalisation of AI Ethics , 2021, Minds and Machines.

[8]  Bo Chen,et al.  Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep Learning Approach , 2021, IEEE Transactions on Smart Grid.

[9]  Mohammad Ahsan Chishti,et al.  A neuro fuzzy system for incorporating ethics in the internet of things , 2021, J. Ambient Intell. Humaniz. Comput..

[10]  Fabrizio Falchi,et al.  Cross-resolution face recognition adversarial attacks , 2020, Pattern Recognit. Lett..

[11]  Hui Tian,et al.  Data Auditing for the Internet of Things Environments Leveraging Smart Contract , 2020, FCS.

[12]  Junaid Qadir,et al.  Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security , 2020, Frontiers in Big Data.

[13]  Jonathan H. Chen,et al.  Planning for the Known Unknown: Machine Learning for Human Healthcare Systems , 2020, The American journal of bioethics : AJOB.

[14]  K. Hristovski,et al.  Real-time monitoring and prediction of water quality parameters and algae concentrations using microbial potentiometric sensor signals and machine learning tools. , 2020, The Science of the total environment.

[15]  Merve Hickok,et al.  Lessons learned from AI ethics principles for future actions , 2020, AI and Ethics.

[16]  Trevor Hastie,et al.  Transparency and reproducibility in artificial intelligence , 2020, Nature.

[17]  Shravya Shetty,et al.  Reply to: Transparency and reproducibility in artificial intelligence , 2020, Nature.

[18]  F. Kreuter,et al.  Collecting Survey and Smartphone Sensor Data With an App: Opportunities and Challenges Around Privacy and Informed Consent , 2020, Social Science Computer Review.

[19]  A. Howard,et al.  Emerging challenges in AI and the need for AI ethics education , 2020, AI and Ethics.

[20]  A. Aljabali,et al.  Graduate students reported practices regarding the issue of informed consent and maintaining of data confidentiality in a developing country , 2020, Heliyon.

[21]  Thomas Ploug In Defence of informed consent for health record research - why arguments from ‘easy rescue’, ‘no harm’ and ‘consent bias’ fail , 2020, BMC medical ethics.

[22]  Mohsen Guizani,et al.  Trust-Based Cloud Machine Learning Model Selection for Industrial IoT and Smart City Services , 2020, IEEE Internet of Things Journal.

[23]  Benjamin Turnbull,et al.  Robustness Evaluations of Sustainable Machine Learning Models against Data Poisoning Attacks in the Internet of Things , 2020, Sustainability.

[24]  Medhat Moussa,et al.  Deep Learning for Intelligent Transportation Systems: A Survey of Emerging Trends , 2020, IEEE Transactions on Intelligent Transportation Systems.

[25]  M. Haeffelin,et al.  Meteorology-driven variability of air pollution (PM1) revealed with explainable machine learning , 2020, Atmospheric Chemistry and Physics.

[26]  Yogesh Kumar Dwivedi,et al.  Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework , 2020, Information Systems Frontiers.

[27]  L. Floridi,et al.  The ethics of AI in health care: A mapping review. , 2020, Social science & medicine.

[28]  Joanna J. Bryson,et al.  The Artificial Intelligence of the Ethics of Artificial Intelligence , 2020 .

[29]  Fang Deng,et al.  Data augmentation in fault diagnosis based on the Wasserstein generative adversarial network with gradient penalty , 2020, Neurocomputing.

[30]  Mohan Li,et al.  Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.

[31]  Stephen Flowerday,et al.  Duplicitous social media and data surveillance: An evaluation of privacy risk , 2020, Comput. Secur..

[32]  M. Shamim Hossain,et al.  B5G and Explainable Deep Learning Assisted Healthcare Vertical at the Edge: COVID-I9 Perspective , 2020, IEEE Network.

[33]  Matthias Braun,et al.  Own Data? Ethical Reflections on Data Ownership , 2020, Philosophy & Technology.

[34]  E. Poll,et al.  Adversarial Examples on Object Recognition , 2020, ACM Comput. Surv..

[35]  Max David Champneys,et al.  On the vulnerability of data-driven structural health monitoring models to adversarial attack , 2020 .

[36]  Mianxiong Dong,et al.  DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems , 2020, IEEE Transactions on Industrial Informatics.

[37]  Jorg Henkel,et al.  Hierarchical Classification for Constrained IoT Devices: A Case Study on Human Activity Recognition , 2020, IEEE Internet of Things Journal.

[38]  Silvia Tulli,et al.  Explainability in Autonomous Pedagogical Agents , 2020, AAAI.

[39]  Trevor J. M. Bench-Capon,et al.  Ethical approaches and autonomous systems , 2020, Artif. Intell..

[40]  Quan Z. Sheng,et al.  Adversarial Attacks on Deep-learning Models in Natural Language Processing , 2020, ACM Trans. Intell. Syst. Technol..

[41]  Dmitry Goldgof,et al.  Mitigating Adversarial Attacks on Medical Image Understanding Systems , 2020, 2020 IEEE 17th International Symposium on Biomedical Imaging (ISBI).

[42]  Seoung Bum Kim,et al.  Intelligent traffic control for autonomous vehicle systems based on machine learning , 2020, Expert Syst. Appl..

[43]  Fadi Al-Turjman,et al.  Applications of Artificial Intelligence and Machine learning in smart cities , 2020, Comput. Commun..

[44]  Kui Ren,et al.  Adversarial Attacks and Defenses in Deep Learning , 2020, Engineering.

[45]  Ankur Srivastava,et al.  A Survey on Neural Trojans , 2020, 2020 21st International Symposium on Quality Electronic Design (ISQED).

[46]  Michele Meroni,et al.  Estimating and understanding crop yields with explainable deep learning in the Indian Wheat Belt , 2020, Environmental Research Letters.

[47]  Steffen Staab,et al.  Bias in data‐driven artificial intelligence systems—An introductory survey , 2020, WIREs Data Mining Knowl. Discov..

[48]  Myunghwa Kang,et al.  Machine learning of robots in tourism and hospitality: interactive technology acceptance model (iTAM) – cutting edge , 2020 .

[49]  David S. Melnick,et al.  International evaluation of an AI system for breast cancer screening , 2020, Nature.

[50]  Hyungheon Kim,et al.  A Study on the Security Threats and Privacy Policy of Intelligent Video Surveillance System Considering 5G Network Architecture , 2020, 2020 International Conference on Electronics, Information, and Communication (ICEIC).

[51]  Richard Bowden,et al.  A Survey of Deep Learning Applications to Autonomous Vehicle Control , 2019, IEEE Transactions on Intelligent Transportation Systems.

[52]  Juan-José Boté,et al.  Reusing Data Technical and Ethical Challenges , 2019 .

[53]  Patrici Calvo The ethics of Smart City (EoSC): moral implications of hyperconnectivity, algorithmization and the datafication of urban digital society , 2019, Ethics and Information Technology.

[54]  Peter A. Flach,et al.  Explainability fact sheets: a framework for systematic assessment of explainable approaches , 2019, FAT*.

[55]  Yansong Gao,et al.  STRIP , 2019, Proceedings of the 35th Annual Computer Security Applications Conference.

[56]  S. Han,et al.  Keratinocytic Skin Cancer Detection on the Face Using Region-Based Convolutional Neural Network. , 2019, JAMA dermatology.

[57]  Dimitar Filev,et al.  Explainable Density-Based Approach for Self-Driving Actions Classification , 2019, 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA).

[58]  Miao Pan,et al.  Robust Truth Discovery against Data Poisoning in Mobile Crowdsensing , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[59]  Stefano Ricciardi,et al.  An integrated VR/AR framework for user-centric interactive experience of cultural heritage: The ArkaeVision project , 2019, Digit. Appl. Archaeol. Cult. Heritage.

[60]  Peter Volgyesi,et al.  Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks , 2019, 2019 Resilience Week (RWS).

[61]  Ender Konukoglu,et al.  Injecting and removing suspicious features in breast imaging with CycleGAN: A pilot study of automated adversarial attacks using neural networks on small images. , 2019, European journal of radiology.

[62]  Kemal Davaslioglu,et al.  Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning , 2019, 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[63]  Alejandro Barredo Arrieta,et al.  Explainable Artificial Intelligence (XAI): Concepts, Taxonomies, Opportunities and Challenges toward Responsible AI , 2019, Inf. Fusion.

[64]  Araz Taeihagh,et al.  Algorithmic Decision-Making in AVs: Understanding Ethical and Technical Concerns for Smart Cities , 2019, Sustainability.

[65]  Jai Kotia,et al.  Risk Susceptibility of Brain Tumor Classification to Adversarial Attacks , 2019, ICMMI.

[66]  Javier Del Ser,et al.  What Lies Beneath: A Note on the Explainability of Black-box Machine Learning Models for Road Traffic Forecasting , 2019, 2019 IEEE Intelligent Transportation Systems Conference (ITSC).

[67]  Sanjay Chawla,et al.  Reinforcement Learning with Explainability for Traffic Signal Control , 2019, 2019 IEEE Intelligent Transportation Systems Conference (ITSC).

[68]  J. Horvat THE ETHICS OF ARTIFICIAL INTELLIGENCE , 2016 .

[69]  Anna Jobin,et al.  The global landscape of AI ethics guidelines , 2019, Nature Machine Intelligence.

[70]  Elisa Bertino,et al.  Data Transparency with Blockchain and AI Ethics , 2019, ACM J. Data Inf. Qual..

[71]  Asheesh K. Singh,et al.  Plant disease identification using explainable 3D deep learning on hyperspectral images , 2019, Plant Methods.

[72]  Sherali Zeadally,et al.  Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures , 2019, IEEE Transactions on Industrial Informatics.

[73]  James Bailey,et al.  Understanding Adversarial Attacks on Deep Learning Based Medical Image Analysis Systems , 2019, Pattern Recognit..

[74]  Haichao Zhang,et al.  Defense Against Adversarial Attacks Using Feature Scattering-based Adversarial Training , 2019, NeurIPS.

[75]  Corrado Aaron Visaggio,et al.  Adversarial deep learning for energy management in buildings , 2019, SummerSim.

[76]  Kevin Fu,et al.  Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.

[77]  Zhiyuan Tan,et al.  SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application , 2019, J. Netw. Comput. Appl..

[78]  Mario Fritz,et al.  Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks , 2019, ICLR.

[79]  Fabrício Benevenuto,et al.  Explainable Machine Learning for Fake News Detection , 2019, WebSci.

[80]  J. Kleinberg,et al.  Mitigating bias in algorithmic hiring: evaluating claims and practices , 2019, FAT*.

[81]  Karen Yeung,et al.  AI Governance by Human Rights-Centred Design, Deliberation and Oversight: An End to Ethics Washing , 2019, SSRN Electronic Journal.

[82]  Nicola Conci,et al.  How Deep Features Have Improved Event Recognition in Multimedia , 2019, ACM Trans. Multim. Comput. Commun. Appl..

[83]  Junaid Qadir,et al.  Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward , 2019, IEEE Communications Surveys & Tutorials.

[84]  Rajnikant Sharma,et al.  Learning-Based Adversarial Agent Detection and Identification in Cyber Physical Systems Applied to Autonomous Vehicular Platoon , 2019, 2019 IEEE/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS).

[85]  Ribana Roscher,et al.  Explainable Machine Learning for Scientific Insights and Discoveries , 2019, IEEE Access.

[86]  Murat Kantarcioglu,et al.  A survey of game theoretic approach for adversarial machine learning , 2019, WIREs Data Mining Knowl. Discov..

[87]  Qian Zhu,et al.  Analyzing the Impact of Traffic Congestion Mitigation: From an Explainable Neural Network Learning Framework to Marginal Effect Analyses , 2019, Sensors.

[88]  Baosen Zhang,et al.  Exploiting Vulnerabilities of Load Forecasting Through Adversarial Attacks , 2019, e-Energy.

[89]  Ruqiang Yan,et al.  Generative adversarial networks for data augmentation in machine fault diagnosis , 2019, Comput. Ind..

[90]  Junaid Qadir,et al.  Leveraging Machine Learning and Big Data for Smart Buildings: A Comprehensive Survey , 2019, IEEE Access.

[91]  Nello Cristianini,et al.  Can Machines Read our Minds? , 2019, Minds and Machines.

[92]  Siddique Latif,et al.  Caveat Emptor: The Risks of Using Big Data for Human Development , 2019, IEEE Technology and Society Magazine.

[93]  Davinia Hernández Leo,et al.  Ethics in educational technology research: Informing participants on data sharing risks , 2019, Br. J. Educ. Technol..

[94]  Andrew L. Beam,et al.  Adversarial attacks on medical machine learning , 2019, Science.

[95]  Germain Forestier,et al.  Adversarial Attacks on Deep Neural Networks for Time Series Classification , 2019, 2019 International Joint Conference on Neural Networks (IJCNN).

[96]  Syed Ali Hassan,et al.  Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[97]  Katina Michael,et al.  Machine Ethics: The Design and Governance of Ethical AI and Autonomous Systems , 2019, Proc. IEEE.

[98]  Thilo Hagendorff,et al.  The Ethics of AI Ethics: An Evaluation of Guidelines , 2019, Minds and Machines.

[99]  F. Richard Yu,et al.  A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[100]  Weifeng Chen,et al.  A Lightweight And privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities , 2019, Comput. Stand. Interfaces.

[101]  Sendhil Mullainathan,et al.  Dissecting Racial Bias in an Algorithm that Guides Health Decisions for 70 Million People , 2019, FAT.

[102]  Nicola Conci,et al.  Natural disasters detection in social media and satellite imagery: a survey , 2019, Multimedia Tools and Applications.

[103]  Michael Riegler,et al.  Automatic detection of passable roads after floods in remote sensed and social media data , 2019, Signal Process. Image Commun..

[104]  Jinjun Chen,et al.  Differential Privacy Techniques for Cyber Physical Systems: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[105]  Lingkun Fu,et al.  DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[106]  Steven Euijong Whang,et al.  A Survey on Data Collection for Machine Learning: A Big Data - AI Integration Perspective , 2018, IEEE Transactions on Knowledge and Data Engineering.

[107]  Xin Wu,et al.  Hierarchical travel demand estimation using multiple data sources: A forward and backward propagation algorithmic framework on a layered computational graph , 2018, Transportation Research Part C: Emerging Technologies.

[108]  J. Henrich,et al.  The Moral Machine experiment , 2018, Nature.

[109]  Eamonn J. Keogh,et al.  The UCR time series archive , 2018, IEEE/CAA Journal of Automatica Sinica.

[110]  Scott M. Lundberg,et al.  Explainable machine-learning predictions for the prevention of hypoxaemia during surgery , 2018, Nature Biomedical Engineering.

[111]  Daniel L. Marino,et al.  An Adversarial Approach for Explainable AI in Intrusion Detection Systems , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[112]  Yalin E. Sagduyu,et al.  Spectrum Data Poisoning with Adversarial Deep Learning , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).

[113]  Amina Adadi,et al.  Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI) , 2018, IEEE Access.

[114]  David J. Hand,et al.  Aspects of Data Ethics in a Changing World: Where Are We Now? , 2018, Big Data.

[115]  Jichen Zhu,et al.  Explainable AI for Designers: A Human-Centered Perspective on Mixed-Initiative Co-Creation , 2018, 2018 IEEE Conference on Computational Intelligence and Games (CIG).

[116]  Trevor Darrell,et al.  Textual Explanations for Self-Driving Vehicles , 2018, ECCV.

[117]  Ghassan Hamarneh,et al.  Vulnerability Analysis of Chest X-Ray Image Classification Against Adversarial Attacks , 2018, MLCN/DLF/iMIMIC@MICCAI.

[118]  Lynne E. Parker,et al.  Creation of the National Artificial Intelligence Research and Development Strategic Plan , 2018, AI Mag..

[119]  Chenglin Miao,et al.  Towards Data Poisoning Attacks in Crowd Sensing Systems , 2018, MobiHoc.

[120]  Jake Ryland Williams,et al.  BuzzFace: A News Veracity Dataset with Facebook User Commentary and Egos , 2018, ICWSM.

[121]  Alberto Ferreira de Souza,et al.  Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[122]  Sandra Wachter,et al.  Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR , 2018, Comput. Law Secur. Rev..

[123]  Ankur Teredesai,et al.  Interpretable Machine Learning in Healthcare , 2018, 2018 IEEE International Conference on Healthcare Informatics (ICHI).

[124]  Lalana Kagal,et al.  Explaining Explanations: An Overview of Interpretability of Machine Learning , 2018, 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA).

[125]  Samuel Marchal,et al.  PRADA: Protecting Against DNN Model Stealing Attacks , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).

[126]  Sahil Sholla,et al.  Docile Smart City Architecture: Moving Toward an Ethical Smart City , 2018 .

[127]  Benjamin C. M. Fung,et al.  Security and privacy challenges in smart cities , 2018 .

[128]  Baskar Ganapathysubramanian,et al.  An explainable deep machine vision framework for plant stress phenotyping , 2018, Proceedings of the National Academy of Sciences.

[129]  Chenglin Miao,et al.  Attack under Disguise: An Intelligent Data Poisoning Attack Mechanism in Crowdsourcing , 2018, WWW.

[130]  Jaegul Choo,et al.  Visual Analytics for Explainable Deep Learning , 2018, IEEE Computer Graphics and Applications.

[131]  Kemal Davaslioglu,et al.  Generative Adversarial Learning for Spectrum Sensing , 2018, 2018 IEEE International Conference on Communications (ICC).

[132]  Tao Liu,et al.  SIN2: Stealth infection on neural network — A low-cost agile neural Trojan attack methodology , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[133]  Dawn M. Tilbury,et al.  Explanations and Expectations: Trust Building in Automated Vehicles , 2018, HRI.

[134]  Franco Turini,et al.  A Survey of Methods for Explaining Black Box Models , 2018, ACM Comput. Surv..

[135]  Juan-Carlos Cano,et al.  Crowdsensing in Smart Cities: Overview, Platforms, and Environment Sensing Issues , 2018, Sensors.

[136]  Timnit Gebru,et al.  Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification , 2018, FAT.

[137]  David A. Wagner,et al.  Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[138]  Fabio Roli,et al.  Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2017, Pattern Recognit..

[139]  Vijay Arya,et al.  Model Extraction Warning in MLaaS Paradigm , 2017, ACSAC.

[140]  Alastair R. Beresford,et al.  Ethical issues in research using datasets of illicit origin , 2017, Internet Measurement Conference.

[141]  Kouichi Sakurai,et al.  One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.

[142]  Abhishek Verma,et al.  Deep CNN-LSTM with combined kernels from multiple branches for IMDb review sentiment analysis , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).

[143]  Yong Yu,et al.  Improved dynamic remote data auditing protocol for smart city security , 2017, Personal and Ubiquitous Computing.

[144]  Ryan Calo,et al.  Artificial Intelligence Policy: A Primer and Roadmap , 2017 .

[145]  Mohsen Guizani,et al.  Smart Cities: A Survey on Data Management, Security, and Enabling Technologies , 2017, IEEE Communications Surveys & Tutorials.

[146]  Valentina Zantedeschi,et al.  Efficient Defenses Against Adversarial Attacks , 2017, AISec@CCS.

[147]  Susan B. Newman,et al.  Improving informed consent: Stakeholder views , 2017, AJOB empirical bioethics.

[148]  Kyarash Shahriari,et al.  IEEE standard review — Ethically aligned design: A vision for prioritizing human wellbeing with artificial intelligence and autonomous systems , 2017, 2017 IEEE Canada International Humanitarian Technology Conference (IHTC).

[149]  Anna Romanou,et al.  The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..

[150]  Percy Liang,et al.  Certified Defenses for Data Poisoning Attacks , 2017, NIPS.

[151]  Mohammad Ahsan Chishti,et al.  Ethics Aware Object Oriented Smart City Architecture , 2017, China Communications.

[152]  Majdi Maabreh,et al.  Parameters optimization of deep learning models using Particle swarm optimization , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[153]  Scott Lundberg,et al.  A Unified Approach to Interpreting Model Predictions , 2017, NIPS.

[154]  Wei Yu,et al.  Smart city: The state of the art, datasets, and evaluation platforms , 2017, 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS).

[155]  Ali Davoudi,et al.  Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids , 2017, IEEE Transactions on Industrial Informatics.

[156]  M. Deakin,et al.  The First Two Decades of Smart-City Research: A Bibliometric Analysis , 2017 .

[157]  R. Kitchin,et al.  The ethics of smart cities and urban science , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[158]  Cat Drew,et al.  Data science ethics in government , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[159]  L. Floridi,et al.  Data ethics , 2021, Effective Directors.

[160]  John Danaher,et al.  Robots, law and the retribution gap , 2016, Ethics and Information Technology.

[161]  Panagiotis Tsarchopoulos,et al.  Smart cities and cloud computing: lessons from the STORM CLOUDS experiment , 2016 .

[162]  Lujo Bauer,et al.  Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.

[163]  Vitaly Shmatikov,et al.  Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[164]  Ryan Calo,et al.  There is a blind spot in AI research , 2016, Nature.

[165]  Kush R. Varshney,et al.  On the Safety of Machine Learning: Cyber-Physical Systems, Decision Sciences, and Data Products , 2016, Big Data.

[166]  Francesco Solera,et al.  Performance Measures and a Data Set for Multi-target, Multi-camera Tracking , 2016, ECCV Workshops.

[167]  K. Crawford Artificial Intelligence's White Guy Problem , 2016 .

[168]  Howard Bauchner,et al.  Data Sharing: An Ethical and Scientific Imperative. , 2016, JAMA.

[169]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[170]  Janine S. Hiller,et al.  Smart Cities, Big Data, and the Resilience of Privacy , 2016 .

[171]  Raihan Ur Rasool,et al.  Big data for development: applications and techniques , 2016, ArXiv.

[172]  Ananthram Swami,et al.  Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.

[173]  John Danaher,et al.  The Threat of Algocracy: Reality, Resistance and Accommodation , 2016, Philosophy & Technology.

[174]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[175]  Michael Mattioli,et al.  Big data, bigger dilemmas: A critical review , 2015, J. Assoc. Inf. Sci. Technol..

[176]  Stuart J. Russell,et al.  Robotics: Ethics of artificial intelligence , 2015, Nature.

[177]  Ernest Davis,et al.  Ethical guidelines for a superintelligence , 2015, Artif. Intell..

[178]  Erik Strumbelj,et al.  Explaining prediction models and individual predictions with feature contributions , 2014, Knowledge and Information Systems.

[179]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[180]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[181]  Miles Brundage,et al.  Limitations and risks of machine ethics , 2014, J. Exp. Theor. Artif. Intell..

[182]  Fabio Roli,et al.  Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.

[183]  Andreas Geiger,et al.  Vision meets robotics: The KITTI dataset , 2013, Int. J. Robotics Res..

[184]  Alexey Potapov,et al.  Universal empathy and ethical bias for artificial general intelligence , 2013, J. Exp. Theor. Artif. Intell..

[185]  Johannes Stallkamp,et al.  Detection of traffic signs in real-world images: The German traffic sign detection benchmark , 2013, The 2013 International Joint Conference on Neural Networks (IJCNN).

[186]  Fabio Roli,et al.  Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues , 2013, Inf. Sci..

[187]  Agusti Solanas,et al.  The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.

[188]  Johannes Stallkamp,et al.  Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition , 2012, Neural Networks.

[189]  Geza Joos,et al.  On the Accuracy Versus Transparency Trade-Off of Data-Mining Models for Fast-Response PMU-Based Catastrophe Predictors , 2012, IEEE Transactions on Smart Grid.

[190]  Jiming Chen,et al.  Smart community: an internet of things application , 2011, IEEE Communications Magazine.

[191]  Peng Li,et al.  CUDA Implementation of Deformable Pattern Recognition and its Application to MNIST Handwritten Digit Database , 2010, 2010 20th International Conference on Pattern Recognition.

[192]  Ramez Elmasri,et al.  Issues in data fusion for healthcare monitoring , 2008, PETRA '08.

[193]  Bin Yu,et al.  Daytime Arctic Cloud Detection Based on Multi-Angle Satellite Data With Case Studies , 2008 .

[194]  Steve Torrance,et al.  Special issue on ethics and artificial agents , 2008, AI & SOCIETY.

[195]  James H. Moor,et al.  The Nature, Importance, and Difficulty of Machine Ethics , 2006, IEEE Intelligent Systems.

[196]  Michael Anderson,et al.  Guest Editors' Introduction: Machine Ethics , 2006, IEEE Intelligent Systems.

[197]  Jun Wang,et al.  A 3D facial expression database for facial behavior research , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[198]  Christopher Meek,et al.  Adversarial learning , 2005, KDD '05.

[199]  S. Bony,et al.  SIRTA, a ground-based atmospheric observatory for cloud and aerosol research , 2005 .

[200]  Varol Akman,et al.  Introduction to the special issue on philosophical foundations of artificial intelligence , 2000, J. Exp. Theor. Artif. Intell..

[201]  Michael J. Lyons,et al.  Coding facial expressions with Gabor wavelets , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.

[202]  Khalil Khan,et al.  Intelligent Fusion of Deep Features for Improved Waste Classification , 2020, IEEE Access.

[203]  N. Sri Madhava Raja,et al.  Deep-learning framework to detect lung abnormality - A study with chest X-Ray and lung CT scan images , 2020, Pattern Recognit. Lett..

[204]  A. Hosny,et al.  The Dataset Nutrition Label , 2020, Data Protection and Privacy.

[205]  Steven Bramhall,et al.  QLIME-A Quadratic Local Interpretable Model-Agnostic Explanation Approach , 2020 .

[206]  Yafit Lev Aretz Data Philanthropy , 2019, SSRN Electronic Journal.

[207]  Raja Chatila,et al.  The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems , 2019, Robotics and Well-Being.

[208]  Cristina Conati,et al.  Exploring the Need for Explainable Artificial Intelligence (XAI) in Intelligent Tutoring Systems (ITS) , 2019, IUI Workshops.

[209]  Richard O. Sinnott,et al.  Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology , 2019, IEEE Access.

[210]  Ryan Mark,et al.  Ethics of Using Smart City AI and Big Data: The Case of Four Large European Cities , 2019, The ORBIT Journal.

[211]  Wei Wu,et al.  Traffic Anomaly Detection via Perspective Map based on Spatial-temporal Information Matrix , 2019, CVPR Workshops.

[212]  Joao Marques-Silva,et al.  On Relating Explanations and Adversarial Examples , 2019, NeurIPS.

[213]  Helmut Krcmar,et al.  Semantic Web Technologies for Explainable Machine Learning Models: A Literature Review , 2019, PROFILES/SEMEX@ISWC.

[214]  Minh N. Do,et al.  Vehicle Re-identification with Learned Representation and Spatial Verification and Abnormality Detection with Multi-Adaptive Vehicle Detectors for Traffic Video Analysis , 2019, CVPR Workshops.

[215]  J. McNutt,et al.  Smart Cities, Transparency, Civic Technology and Reinventing Government , 2018 .

[216]  Leonid Stoimenov,et al.  Semantic Technologies in e-government: Toward Openness and Transparency , 2018 .

[217]  José M. Alonso,et al.  Building Cognitive Cities with Explainable Artificial Intelligent Systems , 2017, CEx@AI*IA.

[218]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[219]  Scott Cheng‐Hsin Yang,et al.  Explainable Artificial Intelligence via Bayesian Teaching , 2017 .

[220]  J. Savulescu,et al.  Moral Enhancement and Artificial Intelligence: Moral AI? , 2015 .

[221]  K. LaGrandeur Emotion, Artificial Intelligence, and Ethics , 2015 .

[222]  S. Sastry,et al.  Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.