欢迎来到第壹文秘! | 帮助中心 分享价值,成长自我!
第壹文秘
全部分类
  • 幼儿/小学教育>
  • 中学教育>
  • 高等教育>
  • 研究生考试>
  • 外语学习>
  • 资格/认证考试>
  • 论文>
  • IT计算机>
  • 法律/法学>
  • 建筑/环境>
  • 通信/电子>
  • 医学/心理学>
  • ImageVerifierCode 换一换
    首页 第壹文秘 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    ISOIECTR24028-2020信息技术人工智能人工智能的可信度概述.docx

    • 资源ID:919282       资源大小:171.27KB        全文页数:55页
    • 资源格式: DOCX        下载积分:5金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: 微信开放平台登录 QQ登录
    下载资源需要5金币
    邮箱/手机:
    温馨提示:
    快捷下载时,如果您不填写信息,系统将为您自动创建临时账号,适用于临时下载。
    如果您填写信息,用户名和密码都是您填写的【邮箱或者手机号】(系统自动生成),方便查询和重复下载。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,免费下载
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ISOIECTR24028-2020信息技术人工智能人工智能的可信度概述.docx

    TECHNICALREPORTISO/IECTR24028Firstedition2020-05InformationtechnologyArtificialintelligence-OverviewoftrustworthinessinartificialintelligenceTechnologiesdeVinformationIntelligenceartificielleExamend'ensembledelaJkIbiIiiCenmatieredintelligenceartificielle3 by *<Siow hNo reproduction Or Gtworkng PeEned without license from IHSNot for fwte.06103-202020 29:40 MDTReferencenumberISO/IECTR24028:2020(E)COPYRIGHTPROTECTEDDOCUMENTISO/EC2()20Allrightsreserved.Unlessotherwisespecified,orrequiredinthecontextofitsimplementation,nopartofthispublicationmaybereproducedorutilizedotherwiseinanyformorbyanymeans,electronicormechanical,includingphotocopying,orpostingontheinternetoranintranet,withoutpriorwrittenpermission.PermissioncanberequestedfromeitherISOaltheaddressbeloworISO'smemberbodyinthecountryoftherequesterISOcopyrightofficeCP401Ch.deBlandonnet8CH-1214Vemier1GenevaPhone:+41227490111Fax41227490947Email:copyrightiso.orgWebsite:www.iso.orgPublishedinSwitzerlandmationalOrganizatianforStarxSarcizationProvidedbyIHSMar¼tunderIioemewithIECNorproductaarnetwolhgPennaedwithotlicensefromHSPageviJ J J.7.77.881010UU12121313131414141515151516161616161717171718181919192121212122222323232424iiiContentsIntroduction1 Scope2 Normativereferences3 Termsanddefinitions4 Overview5 Existingframeworksapplicabletotrustworthiness5.1 Background5.2 Recognitionoflayersoftrust5.3 Applicationofsoftwareanddataqualitystandards5.4 Applicationofriskmanagement5.5 Hardware-assistedapproaches6 Stakeholders6.1 Generalconcepts6.2 Types6.3 AsSets6.4 Values7 Recognitionofhigh-levelconcerns7.1 Responsibility,accountabilityandgovernance7.2 Safety8 Vulnerabilities,threatsandchallenges8.1 General8.2 AIspecificsecuritythreats8.2.1 General8.2.2 Datapoisoning8.2.3 Adversarialattacks8.2.4 Modelstealing8.2.5 Hardware-focusedthreatstoconfidentialityandintegrity8.3 Alspecificprivacythreats8.3.1 General8.3.2 Dataacquisition8.3.3 Datapre-processingandmodelling8.3.4 Modelquery8.4 Bias8.5 Unpredictability8.6 Opaqueness8.7 ChallengesrelatedtothespecificationofAlsystems8.8 ChallengesrelatedtotheimplementationofAlsystems8.8.1 Dataacquisitionandpreparation8.8.2 Modelling8.8.3 Modelupdates8.8.4 Softwaredefects8.9 ChallengesrelatedtotheuseOfAlSyStems8.9.1 Human-computerinteraction(HCI)factors8.9.2 MisapplicationofAlsystemsthatdemonstraterealistichumanbehaviour.8.10 Systemhardwarefaults9 Mitigationmeasures9.1 General9.2 Transparency9.3 ExplainabilityCoprioht nenstlSO/ IEC 2O2> Allrights rescncrPRividoI by IHS Markil IlXJCT iccnse with IECNV *eMi*liAif *M (l*tvlit: (»3«ifNcd *ilHwl Iktfnc f<n IliS9.3.1 GeneralO14.56.7.89JJ99.999.9999.3.2 Aimsofexplanation9.3.3 Ex-antevsex-postexplanation9.3.4 Approachestoexplainability9.3.5 Modesofex-postexplanation9.3.6 1.evelsofexplainability9.3.7 EvaluationoftheexplanationsControllability9.4.1 General9.4.2 Human-in-the-loopcontrolpointsStrategiesforreducingbiaPrivacyReliability,resilienceandrobustnessMitigatingsystemhardwarefaultsFunctionalsafetyTestingandevaluation9.10.1 General9.10.2 Softwarevalidationandverificationmethods9.10.3Robustnessconsiderations9.10.4 Privacy-relatedconsiderations9.10.5 SystempredictabilityconsiderationsUseandapplicability9.11.1 Compliance9.11.2 Managingexpectations9.11.3 Productlabelling9.11.4 Cognitivescienceresearch.24242525,26272727282828282929303030323333M.34M.3434AnnexA(infbrmative)RelatedWOrkolISOCietalissues36Bibliography37CoPvVOhlIGrMrtiOnalOrganizationRxSumdiWEitionPiwidedbvIHSMarhkiiunderIiCabewithIECNoptsJulMi*etM>lMUeemilloJsiiaUKittlefruIHSISO/IEC2020-A11rightsreservedNoifo<Resale.O6IO32O2O2029:40MDTForewordISO(theInternationalOrganizationforStandardization)andIEC(theInternationalElectrotechnicalCommission)formthespecializedsystemforworldwidestandardization.NationalbodiesthataremembersofISOorIECparticipateinthedevelopmentofInternationalStandardsthroughtechnicalcommitteesestablishedbytherespectiveorganizationtodealwithparticularfieldsoftechnicalactivity.ISOandIECtechnicalcommitteescollaborateinfieldsofmutualinterest.Otherinternationalorganizations,governmentalandnon-governmental,inliaisonwithISOandIEC,alsotakepartinthework.TheproceduresusedtodevelopthisdocumentandthoseintendedforitsfurthermaintenancearedescribedintheISO/IECDirectives,Partl.Inparticular,thedifferentapprovalcriterianeededforthedifferenttypesofdocumentshouldbenoted.ThisdocumentwasdraftedinaccordancewiththeeditorialrulesoftheISO/IECDirectives,Part2(seewwwiso.org/directives).Attentionisdrawntothepossibilitythatsomeoftheelementsofthisdocumentmaybethesubjectofpatentrights.ISOandIECshallnotbeheldresponsibleforide

    注意事项

    本文(ISOIECTR24028-2020信息技术人工智能人工智能的可信度概述.docx)为本站会员(p**)主动上传,第壹文秘仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知第壹文秘(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2023 1wenmi网站版权所有

    经营许可证编号:宁ICP备2022001189号-1

    本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。第壹文秘仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知第壹文秘网,我们立即给予删除!

    收起
    展开