A review on human–machine trust evaluation: Human-centric and machine-centric perspectives
As complex autonomous systems become increasingly ubiquitous, their deployment and
integration into our daily lives will become a significant endeavor. Human–machine trust …
integration into our daily lives will become a significant endeavor. Human–machine trust …
A survey on trust in autonomous systems
S Shahrdar, L Menezes, M Nojoumian - … Computing: Proceedings of the …, 2019 - Springer
As a result of the exponential growth in technology and computing in recent years,
autonomous systems are becoming more relevant in our daily lives. As these systems …
autonomous systems are becoming more relevant in our daily lives. As these systems …
Human trust measurement using an immersive virtual reality autonomous vehicle simulator
S Shahrdar, C Park, M Nojoumian - Proceedings of the 2019 AAAI/ACM …, 2019 - dl.acm.org
Recent studies indicate that people are negatively predisposed toward utilizing autonomous
systems. These findings highlight the necessity of conducting research to better understand …
systems. These findings highlight the necessity of conducting research to better understand …
EEG-based classification of emotional state using an autonomous vehicle simulator
C Park, S Shahrdar… - 2018 IEEE 10th sensor …, 2018 - ieeexplore.ieee.org
Societal acceptance of self-driving cars (SDC) is predicated on a level of trust between
humans and the autonomous vehicle. Although the performance of SDCs has improved …
humans and the autonomous vehicle. Although the performance of SDCs has improved …
Social acceptability of autonomous vehicles: unveiling correlation of passenger trust and emotional response
C Park, M Nojoumian - International Conference on Human-Computer …, 2022 - Springer
Social acceptability of fully autonomous systems, such as self-driving cars (SDC), is a
prominent challenge that academic communities as well as industries are now facing …
prominent challenge that academic communities as well as industries are now facing …
[PDF][PDF] Trust, satisfaction and frustration measurements during human-robot interaction
MA Abd, I Gonzalez, M Nojoumian… - Proceedings of the …, 2017 - faculty.eng.fau.edu
Since the beginning of human race, we have always sought ways to develop bonds and
create meaningful relationships with others. In these interactions, there are several …
create meaningful relationships with others. In these interactions, there are several …
Simulated robotic device malfunctions resembling malicious cyberattacks impact human perception of trust, satisfaction, and frustration
MA Abd, I Gonzalez, C Ades… - International …, 2019 - journals.sagepub.com
Robot assistants and wearable devices are highly useful; however, these artificial systems
are susceptible to hackers. In this article, two sets of experiments were conducted. The first …
are susceptible to hackers. In this article, two sets of experiments were conducted. The first …
Rational trust modeling
M Nojoumian - Decision and Game Theory for Security: 9th …, 2018 - Springer
Trust models are widely used in various computer science disciplines. The primary purpose
of a trust model is to continuously measure the trustworthiness of a set of entities based on …
of a trust model is to continuously measure the trustworthiness of a set of entities based on …
[PDF][PDF] Impacts of robot assistant performance on human trust, satisfaction, and frustration
M Abd, I Gonzalez, M Nojoumian… - RSS: Morality and …, 2017 - faculty.eng.fau.edu
People look for ways to develop bonds and create meaningful relationships with others. In
these interactions, there are several parameters that play an important role when it comes to …
these interactions, there are several parameters that play an important role when it comes to …
Analysis of reputation-based mining paradigm under dishonest mining attacks
P Pourtahmasbi, M Nojoumian - Blockchain: Research and Applications, 2022 - Elsevier
Since the introduction of Bitcoin, numerous studies on Bitcoin mining attacks have been
conducted, and as a result, many countermeasures to these attacks have been proposed …
conducted, and as a result, many countermeasures to these attacks have been proposed …