Circular Image

97 records found

Authored

The pursuit of values drives human behavior and promotes cooperation. Existing research is focused on general (e.g., Schwartz) values that transcend contexts. However, context-specific values are necessary to (1) understand human decisions, and (2) engineer intelligent agents tha ...
Value alignment is a crucial aspect of ethical multiagent systems. An important step toward value alignment is identifying values specific to an application context. However, identifying contextspecific values is complex and cognitively demanding. To support this process, we deve ...

Discrimination between social groups

The influence of inclusiveness-enhancing mechanisms on trade

The bargaining power of prosumers in a market can vary significantly. Participants can range from industrial participants to powerful and less powerful citizens. Existing trade mechanisms in such markets, e.g., in rural India’s energy trade market, show occurrences of discrimi ...

A large number of studies suggest that employees in an open-plan office are disturbed during their day-to-day work for a variety of reasons. In particular, disturbances caused by speech are difficult to estimate during the early design phase. Multi-agent models provide a way to p ...

Geographical characteristics have been proven to be effective in improving the quality of point-of-interest (POI) recommendation. However, existing works on POI recommendation focus on cost (time or money) of travel for a user. An important geographical aspect that has not bee ...

The surprising capabilities demonstrated by AI technologies overlaid on detailed data and fine-grained control give cause for concern that agents can wield enormous power over human welfare, drawing increasing attention to ethics in AI.

@en
Ethics is inherently a multiagent concern. However, research on AI ethics today is dominated by work on individual agents: (1) how an autonomous robot or car may harm or (differentially) benefit people in hypothetical situations (the so-called trolley problems) and (2) how a mach ...

This article introduces some of the key concepts and challenges pertaining to ethics from the standpoint of Internet applications.

@en
Vacant lots are municipally-owned land parcels which were acquired post-abandonment or due to tax foreclosures. With time, failure to sell or find alternate uses for vacant lots results in them causing adverse effects on the health and safety of residents, and cost the city both ...

Ethics is inherently a multiagent concern. However, research on AI ethics today is dominated by work on individual agents: (1) how an autonomous robot or car may harm or (differentially) benefit people in hypothetical situations (the so-called trolley problems) and (2) how a m ...

We address the problem of designing agents that navigate social norms by selecting ethically appropriate actions. We present Elessar, a framework in which agents aggregate value preferences of users and select ethically appropriate actions through multicriteria decision making in ...
Trust between developers influences the success of open source software (OSS) projects. Although existing research recognizes the importance of trust, there is a lack of an effective and scalable computational method to measure trust in an OSS community. Consequently, OSS project ...

Contributed

Unravelling Twitter chaos during a policy crisis

Applying Sentiment Analysis and Topic Modelling to Tweets about the Dutch Nitrogen Crisis

In May 2019, the Dutch Council of State rejected the national approach for reducing nitrogen emissions in Dutch nature. Farmers were targeted by the policy change: all licenses for agricultural expansion were revoked, affecting the financial livelihoods of farmers. Farmers did no ...
Stance detection is a Natural Language Processing task that can detect if the input text is in favour, against or neutral towards a target. Research on stance detection has been growing and evolving over the last decade. In this paper, the current approaches for stance detection ...
The increasing amount of untrusted content on the internet is a worrisome trend. The headline of an article can be adjusted to influence a potential readers attention and click-through rate. This clickbait or sensationalism can mislead the reader as the headline does not accurate ...

On the Sequential Data Models in Side-Channel Analysis

RNN, LSTM, GRU Hyperparameters, Autoencoder and Embedding Layer

A side-channel attack is performed by analyzing unwanted physical leakage to achieve a more effective attack on the cryptographic key. An attacker performs a profiled attack when he has a physical and identical copy of the target device, meaning the attacker is in full control of ...
To detect malicious activities in a network, intrusion detection systems are used. Even though these solutions are widely deployed for this purpose they have one serious shortcoming which is the huge amount of false alarms that they are generating. Different measures are taken to ...
In recent time, there has been a rise in the number of coworking and activity-based working spaces. This increase has brought a high return to the real-estate developers but at the same time has compromised with occupant satisfaction. It brings an additional challenge for the arc ...
In the past years, society has become increasingly more reliant on the Internet. Consequently, the security of the Internet became of critical importance. This thesis focusses on the security of one of the Internet's main protocols. This protocol, called the Border Gateway Proto ...

An Analysis of Deep Learning Based Profiled Side-channel Attacks

Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings

A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical leakages such as power consumption. In a profiled SCA, we assume an adversary has control over a target and copy device. Using the copy device the adversary learns a profile of the de ...