Skip to main content

Showing 1–3 of 3 results for author: Hecker, D

.
  1. Develo** trustworthy AI applications with foundation models

    Authors: Michael Mock, Sebastian Schmidt, Felix Müller, Rebekka Görge, Anna Schmitz, Elena Haedecke, Angelika Voss, Dirk Hecker, Maximillian Poretschkin

    Abstract: The trustworthiness of AI applications has been the subject of recent research and is also addressed in the EU's recently adopted AI Regulation. The currently emerging foundation models in the field of text, speech and image processing offer completely new possibilities for develo** AI applications. This whitepaper shows how the trustworthiness of an AI application developed with foundation mode… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 24 pages, 11 figures

    ACM Class: I.2.0

  2. arXiv:2307.03681  [pdf

    cs.CY cs.AI cs.LG

    Guideline for Trustworthy Artificial Intelligence -- AI Assessment Catalog

    Authors: Maximilian Poretschkin, Anna Schmitz, Maram Akila, Linara Adilova, Daniel Becker, Armin B. Cremers, Dirk Hecker, Sebastian Houben, Michael Mock, Julia Rosenzweig, Joachim Sicking, Elena Schulz, Angelika Voss, Stefan Wrobel

    Abstract: Artificial Intelligence (AI) has made impressive progress in recent years and represents a key technology that has a crucial impact on the economy and society. However, it is clear that AI and business models based on it can only reach their full potential if AI applications are developed according to high quality standards and are effectively protected against new AI risks. For instance, AI bears… ▽ More

    Submitted 20 June, 2023; originally announced July 2023.

  3. arXiv:1910.07269  [pdf, other

    cs.CR cs.HC

    "Get a Free Item Pack with Every Activation!" -- Do Incentives Increase the Adoption Rates of Two-Factor Authentication?

    Authors: Karoline Busse, Sabrina Amft, Daniel Hecker, Emanuel von Zezschwitz

    Abstract: Account security is an ongoing issue in practice. Two-Factor Authentication (2FA) is a mechanism which could help mitigate this problem, however adoption is not very high in most domains. Online gaming has adopted an interesting approach to drive adoption: Games offer small rewards such as visual modifications to the player's avatar's appearance, if players utilize 2FA. In this paper, we evaluate… ▽ More

    Submitted 16 October, 2019; originally announced October 2019.

    Comments: Accepted in Journal of Interactive Media (i-com), Special Issue on Usable Security and Privacy