Generative Policies for Coalition Systems - A Symbolic Learning Framework
暂无分享,去创建一个
Elisa Bertino | Dinesh C. Verma | John Ingham | Amani Abu Jabal | Geeth de Mel | Seraphin B. Calo | Graham White | Alessandra Russo | Daniel Cunnington | Mark Law | Gregory H. Cirincione | Irene Manotas | Jorge Lobo | E. Bertino | Jorge Lobo | S. Calo | D. Verma | A. Russo | Irene Manotas | J. Ingham | Mark Law | G. Cirincione | G. White | Daniel Cunnington | A. A. Jabal
[1] Robert Givan,et al. Learning Control Knowledge for Forward Search Planning , 2008, J. Mach. Learn. Res..
[2] Krysia Broda,et al. The complexity and generality of learning answer set programs , 2018, Artif. Intell..
[3] Krysia Broda,et al. Inductive Learning of Answer Set Programs , 2014, JELIA.
[4] Elisa Bertino,et al. How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management) , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[5] Jorge Lobo,et al. Representing and Learning Grammars in Answer Set Programming , 2019, AAAI.
[6] Sayandeep Sen,et al. Demultiplexing activities of daily living in IoT enabled smarthomes , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[7] Rafael H. Bordini,et al. Multi-Agent Programming: Languages, Platforms and Applications , 2005, Multi-Agent Programming.
[8] Brian Rivera,et al. DAIS-ITA scenario , 2019, Defense + Commercial Sensing.
[9] Cristina Nita-Rotaru,et al. Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols , 2019, AAAI.
[10] Elisa Bertino,et al. ProFact: A Provenance-based Analytics Framework for Access Control Policies , 2019 .
[11] Dinesh C. Verma,et al. Federated AI for building AI Solutions across Multiple Agencies , 2018, ArXiv.
[12] Hui-Min Huang,et al. Autonomy levels for unmanned systems (ALFUS) framework: safety and application issues , 2007, PerMIS.
[13] Tao Xie,et al. Conformance Checking of Access Control Policies Specified in XACML , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[14] Chris Russell,et al. Counterfactual Explanations Without Opening the Black Box: Automated Decisions and the GDPR , 2017, ArXiv.
[15] Elisa Bertino,et al. Generative policy model for autonomic management , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[16] Franco Turini,et al. A Survey of Methods for Explaining Black Box Models , 2018, ACM Comput. Surv..
[17] Manoj A. Thomas,et al. Federated Machine Learning for Translational Research , 2018, AMCIS.
[18] Elisa Bertino,et al. A Generative Policy Model for Connected and Autonomous Vehicles , 2019, 2019 IEEE Intelligent Transportation Systems Conference (ITSC).
[19] Robert W. Reeder,et al. Improving user-interface dependability through mitigation of human error , 2005, Int. J. Hum. Comput. Stud..
[20] Carlos Guestrin,et al. "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.
[21] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[22] Benjamin Kuipers,et al. How can we trust a robot? , 2018, Commun. ACM.
[23] Adnan Darwiche,et al. Human-level intelligence or animal-like abilities? , 2017, Commun. ACM.
[24] Jorge Lobo,et al. Automating role-based provisioning by learning from examples , 2009, SACMAT '09.
[25] Thomas Eiter,et al. Answer Set Programming: A Primer , 2009, Reasoning Web.
[26] Elisa Bertino,et al. The Challenge of Access Control Policies Quality , 2018, ACM J. Data Inf. Qual..
[27] Judea Pearl,et al. Theoretical Impediments to Machine Learning With Seven Sparks from the Causal Revolution , 2018, WSDM.
[28] Elisa Bertino,et al. Methods and Tools for Policy Analysis , 2019, ACM Comput. Surv..
[29] Tao Xie,et al. Automated extraction of security policies from natural-language software documents , 2012, SIGSOFT FSE.
[30] Ron Kohavi,et al. Feature Subset Selection Using the Wrapper Method: Overfitting and Dynamic Search Space Topology , 1995, KDD.
[31] Elisa Bertino,et al. Provenance-Based Analytics Services for Access Control Policies , 2017, 2017 IEEE World Congress on Services (SERVICES).
[32] Elisa Bertino,et al. Access Control for Databases: Concepts and Systems , 2011, Found. Trends Databases.
[33] Elisa Bertino,et al. A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[34] Stephen Muggleton,et al. Inductive Logic Programming , 2011, Lecture Notes in Computer Science.
[35] Michael Sipser,et al. Introduction to the Theory of Computation , 1996, SIGA.
[36] Amit Dhurandhar,et al. Explanations based on the Missing: Towards Contrastive Explanations with Pertinent Negatives , 2018, NeurIPS.
[37] James Bret Michael,et al. Natural-language processing support for developing policy-governed software systems , 2001, Proceedings 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems. TOOLS 39.
[38] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[39] Mehdi Bennis,et al. Wireless Network Intelligence at the Edge , 2018, Proceedings of the IEEE.
[40] Wei Shi,et al. Federated learning of predictive models from federated Electronic Health Records , 2018, Int. J. Medical Informatics.
[41] Jürgen Dix,et al. Multi-Agent Programming: Languages, Tools and Applications , 2009 .
[42] Elisa Bertino,et al. Community-based self generation of policies and processes for assets: Concepts and research directions , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[43] Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles , 2022 .