Ma, 2025 - Google Patents
Examining Human-AI Interactions in Security and Privacy: Successes, Failures, and Risk Mitigation in Decision-MakingMa, 2025
- Document ID
- 1325745350542389859
- Author
- Ma X
- Publication year
External Links
Snippet
With the rapid proliferation of artificial intelligence (AI), many tasks traditionally reliant on human intelligence—such as interpreting language, analyzing visual data, and even navigating complex environments—are increasingly delegated to machines. Technologies …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4421—Execution paradigms
- G06F9/4428—Object-oriented
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vuorikari et al. | DigComp 2.2: The Digital Competence Framework for Citizens-With new examples of knowledge, skills and attitudes | |
Shin | Artificial misinformation | |
DeVos et al. | Toward User-Driven Algorithm Auditing: Investigating users’ strategies for uncovering harmful algorithmic behavior | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Sherman et al. | Designing media provenance indicators to combat fake media | |
Zieglmeier et al. | Designing trustworthy user interfaces | |
Nguyen et al. | Measuring user perception for detecting unexpected access to sensitive resource in mobile apps | |
Tang et al. | “Who Knows? Maybe it Really Works”: Analysing Users' Perceptions of Health Misinformation on Social Media | |
Amon et al. | Modeling user characteristics associated with interdependent privacy perceptions on social media | |
Yu et al. | Exploring the influence of spiritual leadership, leader–member exchange, and traditionality orientation on employee voice behavior | |
Mühlhoff | The ethics of AI: Power, critique, responsibility | |
Zhai et al. | Hear Us, then Protect Us: Navigating Deepfake Scams and Safeguard Interventions with Older Adults through Participatory Design | |
Ma | Examining Human-AI Interactions in Security and Privacy: Successes, Failures, and Risk Mitigation in Decision-Making | |
Jenkins | Alleviating insider threats: Mitigation strategies and detection techniques | |
Sherman et al. | Designing indicators to combat fake media | |
Hasegawa et al. | How weird is usable privacy and security research?(extended version) | |
Kuric et al. | User modeling for detecting faking-good intent in online personality questionnaires in the wild based on mouse dynamics | |
Suleman | Learning to trust: exploring the relationship between user engagement and perceptions of trustworthiness in self-sovereign blockchain systems | |
Stewart et al. | In tech we rely: How technology dependence fuels consumer vulnerability | |
Di Campi et al. | Accessible authentication methods for persons with diverse cognitive abilities | |
Lewis et al. | Accessible Computing | |
Malevé | Practices of benchmarking, vulnerability in the computer vision pipeline | |
Georgiev | Continuous touchscreen biometrics: authentication and privacy concerns | |
Bruneault et al. | in Higher Education | |
Akter | Reducing Privacy Risks of Visually Impaired People with Camera Based Assistive Technologies |