Näytä suppeat kuvailutiedot

dc.contributor.authorAgbese, Mamia
dc.contributor.authorMäkitalo, Niko
dc.contributor.authorWaseem, Muhammad
dc.contributor.authorMohanani, Rahul
dc.contributor.authorAbrahamsson, Pekka
dc.contributor.authorMikkonen, Tommi
dc.contributor.editorKawaguchi, Nobuo
dc.contributor.editorYasumoto, Keiichi
dc.contributor.editorRiedel, Till
dc.contributor.editorDing, Aaron
dc.date.accessioned2024-04-11T07:28:54Z
dc.date.available2024-04-11T07:28:54Z
dc.date.issued2023
dc.identifier.citationAgbese, M., Mäkitalo, N., Waseem, M., Mohanani, R., Abrahamsson, P., & Mikkonen, T. (2023). Examining Privacy and Trust Issues at the Edge of Isomorphic IoT Architectures : Case Liquid AI. In N. Kawaguchi, K. Yasumoto, T. Riedel, & A. Ding (Eds.), <i>IoT '23 : Proceedings of the 13th International Conference on the Internet of Things</i> (pp. 245-252). ACM. <a href="https://doi.org/10.1145/3627050.3631574" target="_blank">https://doi.org/10.1145/3627050.3631574</a>
dc.identifier.otherCONVID_207801930
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/94281
dc.description.abstractThe growing domain of liquidity in computing extends its boundaries to include advancements like liquid artificial intelligence (AI). Liquid AI leverages liquid software using isomorphic Internet of Things (IoT) architecture to enhance computation at the edge. This innovation unveils vast opportunities yet also introduces significant challenges, particularly around privacy and trust. We explore the vulnerabilities that might hinder the progression of this technological fusion toward achieving trustworthy AI. Through an intensive examination of the literature, this research highlights the heightened threats to data integrity and stakeholder trust in these evolving ecosystems. Four main challenges: Data collection, Data storage and Access, Data utilization and sharing, and Surveillance and profiling were identified and examined under privacy, and two, Algorithms and decision-making and Security of IoT infrastructure under trust. The concerns are further categorized to highlight their impact on the development of trustworthy AI. The study acknowledges the early state of the field. Consequently, this research navigates through the limited available literature, initiating a pioneering discourse emphasizing fostering a foundation for developing secure and trustworthy Liquid AI environments.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherACM
dc.relation.ispartofIoT '23 : Proceedings of the 13th International Conference on the Internet of Things
dc.rightsCC BY 4.0
dc.subject.otherartificial intelligence
dc.subject.otherliquid software
dc.subject.otherisomorphic IoT architecture
dc.subject.otherliquid AI
dc.subject.otheredge computing
dc.subject.othertrustworthy AI
dc.titleExamining Privacy and Trust Issues at the Edge of Isomorphic IoT Architectures : Case Liquid AI
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202404112849
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn979-8-4007-0854-1
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange245-252
dc.type.versionpublishedVersion
dc.rights.copyright© 2023 the Authors
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on the Internet of Things
dc.subject.ysoreunalaskenta
dc.subject.ysoesineiden internet
dc.subject.ysotietosuoja
dc.subject.ysotekoäly
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p39139
jyx.subject.urihttp://www.yso.fi/onto/yso/p27206
jyx.subject.urihttp://www.yso.fi/onto/yso/p3636
jyx.subject.urihttp://www.yso.fi/onto/yso/p2616
dc.rights.urlhttps://creativecommons.org/licenses/by/4.0/
dc.relation.doi10.1145/3627050.3631574
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY 4.0