-
Human in the AI loop via xAI and Active Learning for Visual Inspection
Authors:
Jože M. Rožanec,
Elias Montini,
Vincenzo Cutrona,
Dimitrios Papamartzivanos,
Timotej Klemenčič,
Blaž Fortuna,
Dunja Mladenić,
Entso Veliou,
Thanassis Giannetsos,
Christos Emmanouilidis
Abstract:
Industrial revolutions have historically disrupted manufacturing by introducing automation into production. Increasing automation reshapes the role of the human worker. Advances in robotics and artificial intelligence open new frontiers of human-machine collaboration. Such collaboration can be realized considering two sub-fields of artificial intelligence: active learning and explainable artificia…
▽ More
Industrial revolutions have historically disrupted manufacturing by introducing automation into production. Increasing automation reshapes the role of the human worker. Advances in robotics and artificial intelligence open new frontiers of human-machine collaboration. Such collaboration can be realized considering two sub-fields of artificial intelligence: active learning and explainable artificial intelligence. Active learning aims to devise strategies that help obtain data that allows machine learning algorithms to learn better. On the other hand, explainable artificial intelligence aims to make the machine learning models intelligible to the human person. The present work first describes Industry 5.0, human-machine collaboration, and state-of-the-art regarding quality inspection, emphasizing visual inspection. Then it outlines how human-machine collaboration could be realized and enhanced in visual inspection. Finally, some of the results obtained in the EU H2020 STAR project regarding visual inspection are shared, considering artificial intelligence, human digital twins, and cybersecurity.
△ Less
Submitted 17 July, 2023; v1 submitted 3 July, 2023;
originally announced July 2023.
-
ID-based self-encryption via Hyperledger Fabric based smart contract
Authors:
Ilya Grishkov,
Roland Kromes,
Thanassis Giannetsos,
Kaitai Liang
Abstract:
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user's data that is being uploaded to the distributed ledger. A new extension to the self-encryption scheme was deployed by integrating data owner's identity into the encryption process. Such integration allows to permanently…
▽ More
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user's data that is being uploaded to the distributed ledger. A new extension to the self-encryption scheme was deployed by integrating data owner's identity into the encryption process. Such integration allows to permanently preserve ownership of the original file and link it to the person/entity who originally uploaded it. Moreover, self-encryption provides strong security guarantees that decryption of a file is computationally not feasible under the condition that the encrypted file and the key are safely stored.
△ Less
Submitted 4 July, 2022;
originally announced July 2022.
-
Combining ID's, Attributes, and Policies in Hyperledger Fabric
Authors:
Daan Gordijn,
Roland Kromes,
Thanassis Giannetsos,
Kaitai Liang
Abstract:
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID's, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the existing solution but provides users and developers with…
▽ More
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID's, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the existing solution but provides users and developers with easier ways to make access control decisions based on combinations of multiple ID's, attributes, and policies. Our proposed implementation encapsulates the Fabric CA client to facilitate attribute addition and simplify the process of registering and enrolling a newly created certificate (corresponding to a new user). This research, concludes that it is possible to combine multiple ID's, attributes, and policies with the help of Hyperledger Fabric's smart contract technology. Furthermore, it could be seen that the performance impact for real-world applications is negligible compared to the insecure case of always providing access to a resource without performing access control.
△ Less
Submitted 4 July, 2022;
originally announced July 2022.
-
Human-Centric Artificial Intelligence Architecture for Industry 5.0 Applications
Authors:
Jože M. Rožanec,
Inna Novalija,
Patrik Zajec,
Klemen Kenda,
Hooman Tavakoli,
Sungho Suh,
Entso Veliou,
Dimitrios Papamartzivanos,
Thanassis Giannetsos,
Sofia Anna Menesidou,
Ruben Alonso,
Nino Cauli,
Antonello Meloni,
Diego Reforgiato Recupero,
Dimosthenis Kyriazis,
Georgios Sofianidis,
Spyros Theodoropoulos,
Blaž Fortuna,
Dunja Mladenić,
John Soldatos
Abstract:
Human-centricity is the core value behind the evolution of manufacturing towards Industry 5.0. Nevertheless, there is a lack of architecture that considers safety, trustworthiness, and human-centricity at its core. Therefore, we propose an architecture that integrates Artificial Intelligence (Active Learning, Forecasting, Explainable Artificial Intelligence), simulated reality, decision-making, an…
▽ More
Human-centricity is the core value behind the evolution of manufacturing towards Industry 5.0. Nevertheless, there is a lack of architecture that considers safety, trustworthiness, and human-centricity at its core. Therefore, we propose an architecture that integrates Artificial Intelligence (Active Learning, Forecasting, Explainable Artificial Intelligence), simulated reality, decision-making, and users' feedback, focusing on synergies between humans and machines. Furthermore, we align the proposed architecture with the Big Data Value Association Reference Architecture Model. Finally, we validate it on three use cases from real-world case studies.
△ Less
Submitted 19 October, 2022; v1 submitted 21 March, 2022;
originally announced March 2022.
-
BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains
Authors:
Heini Bergsson Debes,
Thanassis Giannetsos,
Ioannis Krontiris
Abstract:
With the rapidly evolving next-generation systems-of-systems, we face new security, resilience, and operational assurance challenges. In the face of the increasing attack landscape, it is necessary to cater to efficient mechanisms to verify software and device integrity to detect run-time modifications. Towards this direction, remote attestation is a promising defense mechanism that allows a third…
▽ More
With the rapidly evolving next-generation systems-of-systems, we face new security, resilience, and operational assurance challenges. In the face of the increasing attack landscape, it is necessary to cater to efficient mechanisms to verify software and device integrity to detect run-time modifications. Towards this direction, remote attestation is a promising defense mechanism that allows a third party, the verifier, to ensure a remote device's (the prover's) integrity. However, many of the existing families of attestation solutions have strong assumptions on the verifying entity's trustworthiness, thus not allowing for privacy preserving integrity correctness. Furthermore, they suffer from scalability and efficiency issues. This paper presents a lightweight dynamic configuration integrity verification that enables inter and intra-device attestation without disclosing any configuration information and can be applied on both resource-constrained edge devices and cloud services. Our goal is to enhance run-time software integrity and trustworthiness with a scalable solution eliminating the need for federated infrastructure trust.
△ Less
Submitted 11 July, 2021;
originally announced July 2021.
-
STARdom: an architecture for trusted and secure human-centered manufacturing systems
Authors:
Jože M. Rožanec,
Patrik Zajec,
Klemen Kenda,
Inna Novalija,
Blaž Fortuna,
Dunja Mladenić,
Entso Veliou,
Dimitrios Papamartzivanos,
Thanassis Giannetsos,
Sofia Anna Menesidou,
Rubén Alonso,
Nino Cauli,
Diego Reforgiato Recupero,
Dimosthenis Kyriazis,
Georgios Sofianidis,
Spyros Theodoropoulos,
John Soldatos
Abstract:
There is a lack of a single architecture specification that addresses the needs of trusted and secure Artificial Intelligence systems with humans in the loop, such as human-centered manufacturing systems at the core of the evolution towards Industry 5.0. To realize this, we propose an architecture that integrates forecasts, Explainable Artificial Intelligence, supports collecting users' feedback,…
▽ More
There is a lack of a single architecture specification that addresses the needs of trusted and secure Artificial Intelligence systems with humans in the loop, such as human-centered manufacturing systems at the core of the evolution towards Industry 5.0. To realize this, we propose an architecture that integrates forecasts, Explainable Artificial Intelligence, supports collecting users' feedback, and uses Active Learning and Simulated Reality to enhance forecasts and provide decision-making recommendations. The architecture security is addressed as a general concern. We align the proposed architecture with the Big Data Value Association Reference Architecture Model. We tailor it for the domain of demand forecasting and validate it on a real-world case study.
△ Less
Submitted 2 April, 2021;
originally announced April 2021.
-
Unsupervised Learning for Trustworthy IoT
Authors:
Nikhil Banerjee,
Thanassis Giannetsos,
Emmanouil Panaousis,
Clive Cheong Took
Abstract:
The advancement of Internet-of-Things (IoT) edge devices with various types of sensors enables us to harness diverse information with Mobile Crowd-Sensing applications (MCS). This highly dynamic setting entails the collection of ubiquitous data traces, originating from sensors carried by people, introducing new information security challenges; one of them being the preservation of data trustworthi…
▽ More
The advancement of Internet-of-Things (IoT) edge devices with various types of sensors enables us to harness diverse information with Mobile Crowd-Sensing applications (MCS). This highly dynamic setting entails the collection of ubiquitous data traces, originating from sensors carried by people, introducing new information security challenges; one of them being the preservation of data trustworthiness. What is needed in these settings is the timely analysis of these large datasets to produce accurate insights on the correctness of user reports. Existing data mining and other artificial intelligence methods are the most popular to gain hidden insights from IoT data, albeit with many challenges. In this paper, we first model the cyber trustworthiness of MCS reports in the presence of intelligent and colluding adversaries. We then rigorously assess, using real IoT datasets, the effectiveness and accuracy of well-known data mining algorithms when employed towards IoT security and privacy. By taking into account the spatio-temporal changes of the underlying phenomena, we demonstrate how concept drifts can masquerade the existence of attackers and their impact on the accuracy of both the clustering and classification processes. Our initial set of results clearly show that these unsupervised learning algorithms are prone to adversarial infection, thus, magnifying the need for further research in the field by leveraging a mix of advanced machine learning models and mathematical optimization techniques.
△ Less
Submitted 25 May, 2018;
originally announced May 2018.