{"id":8838,"date":"2024-01-19T15:34:33","date_gmt":"2024-01-19T14:34:33","guid":{"rendered":"https:\/\/sites.unica.it\/pralab\/rexlearn\/"},"modified":"2025-01-08T11:20:36","modified_gmt":"2025-01-08T10:20:36","slug":"trustml","status":"publish","type":"page","link":"https:\/\/sites.unica.it\/pralab\/trustml\/","title":{"rendered":"TrustML Project"},"content":{"rendered":"\n<p style=\"line-height:1.66;letter-spacing:0.7px;font-size:39px\" class=\"has-custom-lineheight has-custom-letterspacing\"><strong>TrustML project <\/strong><\/p>\n\n\n\n<p style=\"line-height:1.66;letter-spacing:0.7px;font-size:25px\" class=\"has-custom-lineheight has-custom-letterspacing\"><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized has-custom-border\"><img loading=\"lazy\" decoding=\"async\" width=\"928\" height=\"426\" src=\"https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML_logo.jpg\" alt=\"\" class=\"wp-image-8861\" style=\"border-width:9px;border-radius:12px;width:604px;height:auto\" srcset=\"https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML_logo.jpg 928w, https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML_logo-300x138.jpg 300w, https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML_logo-768x353.jpg 768w\" sizes=\"auto, (max-width: 928px) 100vw, 928px\" \/><\/figure><\/div>\n\n\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<p class=\"coblocks-animate\" data-coblocks-animation=\"slideInLeft\"><mark style=\"background-color:var(--nv-site-bg)\" class=\"has-inline-color has-neve-link-color-color\"><strong>Project coordinator<\/strong><br>Prof. <a href=\"https:\/\/sites.unica.it\/pralab\/people\/battista-biggio\/\" data-type=\"page\" data-id=\"7295\">Battista Biggio<\/a><br>PRA Lab &#8211; University of Cagliari<\/mark><\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<p class=\"coblocks-animate\" data-coblocks-animation=\"slideInBottom\"><mark style=\"background-color:var(--nv-site-bg)\" class=\"has-inline-color has-neve-link-color-color\"><strong>Duration<\/strong><br>25 Months<br>September 2022 &#8211; October 2024<\/mark><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><\/div><\/div>\n\n\n\n<p class=\"coblocks-animate\" data-coblocks-animation=\"slideInRight\"><mark style=\"background-color:var(--nv-site-bg)\" class=\"has-inline-color has-neve-link-color-color\"><strong>Budget<\/strong><br>Total budget: 52777.78 \u20ac<br>FDS funded budget: <mark style=\"background-color:var(--nv-site-bg)\" class=\"has-inline-color has-neve-link-color-color\">52777.78 \u20ac<\/mark><\/mark><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"coblocks-animate\" data-coblocks-animation=\"slideInLeft\"><br><strong><mark class=\"has-inline-color has-neve-link-color-color\">People involved<\/mark><\/strong><\/p>\n\n\n\n<p class=\"is-style-default coblocks-animate\" data-coblocks-animation=\"slideInLeft\" style=\"font-size:14px\">Prof. <a href=\"https:\/\/sites.unica.it\/pralab\/people\/giorgio-giacinto\/\" data-type=\"page\" data-id=\"7254\">Giorgio Giacinto<\/a><br>Prof. <a href=\"https:\/\/sites.unica.it\/pralab\/people\/giorgio-fumera\/\" data-type=\"page\" data-id=\"7251\">Giorgio Fumera<\/a><br>Prof. <a href=\"https:\/\/sites.unica.it\/pralab\/people\/luca-didaci\/\" data-type=\"page\" data-id=\"7288\">Luca Didaci<\/a><br>Prof. Matteo Fraschini<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column coblocks-animate is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\" data-coblocks-animation=\"slideInRight\">\n<p class=\"coblocks-animate\" data-coblocks-animation=\"slideInRight\"><br><strong><mark class=\"has-inline-color has-neve-link-color-color\">Funding<\/mark><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized has-custom-border coblocks-animate\" data-coblocks-animation=\"slideInRight\"><img decoding=\"async\" src=\"https:\/\/www.nurnet.net\/wp-content\/uploads\/2018\/12\/fondazione-di-sardegna-logo.png\" alt=\"\" style=\"border-style:none;border-width:0px;border-radius:0px;width:231px;height:auto\" \/><\/figure>\n\n\n\n<p class=\"coblocks-animate\" data-coblocks-animation=\"slideInRight\" style=\"font-size:14px\"><\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:20px\"><strong>Project context<\/strong> <strong>and challenges<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:15px\"><strong>Machine learning<\/strong> (ML) and <strong>Artificial intelligence<\/strong> (AI) have recorded unprecedented success in different applications, including computer vision, speech recognition, and natural language processing. <\/p>\n\n\n\n<p style=\"font-size:15px\">Despite providing accurate predictions, such models <strong>suffer from several limitations which prevent their applicability in security-sensitive and safety-critical domains<\/strong>. <\/p>\n\n\n\n<p style=\"font-size:15px\">In this project, we aim to address three main challenges that are hindering the development of <strong>trustworthy AI\/ML<\/strong> models in these domains.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized has-custom-border coblocks-animate\" data-coblocks-animation=\"slideInRight\"><img loading=\"lazy\" decoding=\"async\" width=\"872\" height=\"571\" src=\"https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML.jpg\" alt=\"\" class=\"wp-image-8843\" style=\"border-width:4px;border-radius:9px;width:466px;height:auto\" srcset=\"https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML.jpg 872w, https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML-300x196.jpg 300w, https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML-768x503.jpg 768w\" sizes=\"auto, (max-width: 872px) 100vw, 872px\" \/><\/figure><\/div><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-media-text is-stacked-on-mobile coblocks-animate\" data-coblocks-animation=\"slideInBottom\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"842\" height=\"517\" src=\"https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML_challenges__.png\" alt=\"\" class=\"wp-image-8853 size-full\" srcset=\"https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML_challenges__.png 842w, https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML_challenges__-300x184.png 300w, https:\/\/sites.unica.it\/pralab\/files\/2024\/03\/TrustML_challenges__-768x472.png 768w\" sizes=\"auto, (max-width: 842px) 100vw, 842px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"font-size:14px\"><br>1. The challenge of adversarial robustness<br><br>2. The challenge of model explainability<br><br>3. The challenge of uncertainty estimation<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:15px\">The first is<em> <strong>the challenge of adversarial robustness.<\/strong><\/em> AI\/ML models have been shown to be vulnerable to adversarial examples, i.e., carefully optimized perturbations added to the input images, text, or audio. Evaluating robustness in other domains, like malware detection, remains an open challenge due to the lack of a proper formalization of the feasible, structural, and more complex input manipulations specific to such domains. <br>The second is<em> <strong>the challenge of model explainability<\/strong><\/em>. AI\/ML models output predictions which are hardly interpretable; it is difficult to identify which features of the input samples contribute to predicting them within a given class, or which training samples support such a decision. Explainability is a desirable property not only to build users\u2019 trust in AI\/ML, but also to understand what models learn, enabling detection and mitigation of potential dataset\/model biases. <br>The third challenge is about<em> <strong>evaluating uncertainty<\/strong><\/em>. It arises from the fact that AI\/ML models can output highly confident predictions even when the input data is outside the support of the training data distribution, as in the case of adversarial examples.<\/p>\n\n\n\n<p class=\"is-style-info\" style=\"font-size:15px\">These problems have been addressed by the development of appropriate scientific methodologies allowing a significant <strong>advancement of the state of the art<\/strong>. The methodological advancement concerned:<\/p>\n\n\n\n<p style=\"font-size:15px\">&#8211; the <strong>development of techniques for evaluating the robustness\/safety of machine learning<\/strong> algorithms with respect to inputs disrupted to compromise their decisions, known as <strong>adversarial examples<\/strong>;<br>&#8211; the <strong>development of techniques for improving the robustness of algorithms<\/strong> against these inputs.<br>&#8211; the development of techniques <strong>to improve<\/strong> <strong>the interpretability of the decisions provided by these algorithms<\/strong>. <\/p>\n\n\n\n<p style=\"font-size:15px\">A large <strong>collection of datasets<\/strong> for the experimentation on<strong> use cases<\/strong> was performed, followed by the <strong>development and testing of prototype systems <\/strong>on applications of interest, which included <strong>image recognition<\/strong> and automatic detection of <strong>computer viruses<\/strong>.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:20px\"><br><strong>Project results<\/strong> <strong>and impact<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\">The project produced significant tangible results, including (i) scientific publications published in international journals and in the proceedings of conferences among the most important in the field of machine learning and artificial intelligence; (ii) the release of benchmark datasets and associated experimental prototypes, through the production of various projects with open code source; (iii) an intense dissemination and communication activity towards stakeholders and the scientific community.<br>The project has also <strong>fostered numerous scientific collaborations at national and international level<\/strong>, such as demonstrated by the number of publications with co-authors external to the project unit team. This led to the consolidation and formalization of agreements for carrying out some joint activities with companies and international institutions.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-coblocks-accordion\">\n<div class=\"wp-block-coblocks-accordion-item\"><details><summary class=\"wp-block-coblocks-accordion-item__title\">Publications<\/summary><div class=\"wp-block-coblocks-accordion-item__content\">\n<ol class=\"wp-block-list\">\n<li>G. Floris, R. Mura, L. Scionis, G. Piras, M. Pintor, A. Demontis, and B. Biggio. Improving fast minimum-norm attacks with hyperparameter optimization. In ESANN, 2023.<\/li>\n\n\n\n<li>R. Mura, G. Floris, L. Scionis, G. Piras, M. Pintor, A. Demontis, G. Giacinto, B. Biggio, and F. Roli. HO-FMN: Hyperparameter optimization for fast minimum-norm attacks. Neurocomputing, 616:128918, 2025.<\/li>\n\n\n\n<li>A. E. Cin\u00e0, K. Grosse, A. Demontis, S. Vascon, W. Zellinger, B. A. Moser, A. Oprea, B. Biggio, M. Pelillo, and F. Roli. Wild patterns reloaded: A survey of machine learning security against training data poisoning. ACM Comput. Surv., 55(13s):294:1\u2013294:39, jul 2023.<\/li>\n\n\n\n<li>K. Grosse, L. Bieringer, T. R. Besold, B. Biggio, and K. Krombholz. Machine learning security in industry: A quantitative survey. IEEE Transactions on Information Forensics and Security, 18:1749\u20131762, 2023.<\/li>\n\n\n\n<li>H. Eghbal-Zadeh, W. Zellinger, M. Pintor, K. Grosse, K. Koutini, B. A. Moser, B. Biggio, and G. Widmer. Rethinking data augmentation for adversarial robustness. Information Sciences, 654:119838, 2024.<\/li>\n\n\n\n<li>M. Pintor, L. Demetrio, A. Sotgiu, H.-Y. Lin, C. Fang, A. Demontis, and B. Biggio. Detecting attacks against deep reinforcement learning for autonomous driving. In International Conference on Machine Learning and Cybernetics, ICMLC. IEEE SMC, 2023.<\/li>\n\n\n\n<li>B. Montaruli, L. Demetrio, M. Pintor, L. Compagna, D. Balzarotti, and B. Biggio. Raze to the ground: Query-efficient adversarial HTML attacks on machine-learning phishing webpage detectors. In Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, AISec \u201923, pages 233\u2013244, New York, NY, USA, 2023. ACM.<\/li>\n\n\n\n<li>D. Trizna, L. Demetrio, B. Biggio, and F. Roli. Nebula: Self-attention for dynamic malware analysis. IEEE Transactions on Information Forensics and Security, 19:6155\u20136167, 2024.<\/li>\n\n\n\n<li>L. Minnei, H. Eddoubi, A. Sotgiu, M. Pintor, A. Demontis, and B. Biggio. Data drift in android malware detection. In International Conference on Machine Learning and Cybernetics, ICMLC. IEEE, 2024 (in press).<\/li>\n\n\n\n<li>W. Guo, A. Demontis, M. Pintor, P. P. K. Chan, and B. Biggio. LFPD: Local-feature-powered defense against adaptive backdoor attacks. In International Conference on Machine Learning and Cybernetics, ICMLC. IEEE, 2024 (in press).<\/li>\n\n\n\n<li>E. Ledda, D. Angioni, G. Piras, G. Fumera, B. Biggio, and F. Roli. Adversarial attacks against uncertainty quantification. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) Workshops, pages 4599\u20134608, October 2023.<\/li>\n\n\n\n<li>G. Faa, M. Castagnola, L. Didaci, F. Coghe, M. Scartozzi, L. Saba, and M. Fraschini. The Quest for the Application of Artificial Intelligence to Whole Slide Imaging: Unique Prospective from New Advanced Tools. Algorithms. 2024; 17(6):254.&nbsp;<\/li>\n\n\n\n<li>M. Fraschini, M. Castagnola, L. Barberini, R. Sanfilippo, F. Coghe, L. Didaci, R. Cau, C. Frongia, M. Scartozzi, L. Saba, and G. Faa. An Unsupervised Learning Tool for Plaque Tissue Characterization in Histopathological Images. Sensors. 2024; 24(16), 5383.&nbsp;<\/li>\n\n\n\n<li>L. Didaci, S. M. Pani, C. Frongia, and M. Fraschini. How Time Window Influences Biometrics Performance: An EEG-Based Fingerprint Connectivity Study. Signals 2024; 5, 597-604.&nbsp;<\/li>\n\n\n\n<li>Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, A risk estimation study of native code vulnerabilities in Android applications, <em>Journal of Cybersecurity<\/em>, Volume 10, Issue 1, 2024, tyae015.<\/li>\n<\/ol>\n\n\n\n<p><strong>Preprints (under review)<\/strong><\/p>\n\n\n\n<ol start=\"16\" class=\"wp-block-list\">\n<li>D. Gibert, L. Demetrio, G. Zizzo, Q. Le, J. Planes, and B. Biggio. Certified adversarial robustness of machine learning-based malware detectors via (de)randomized smoothing. arXiv e-prints, 2024.<\/li>\n\n\n\n<li>L. Demetrio and B. Biggio. secml-malware: Pentesting Windows malware classifiers with adversarial EXEmples in Python. arXiv e-prints, 2024.<\/li>\n\n\n\n<li>A. E. Cin\u00e0, F. Villani, M. Pintor, L. Sch\u00f6nherr, B. Biggio, and M. Pelillo. \u03c3-zero: Gradient-based optimization of L0-norm adversarial examples. ArXiv e-prints, 2024.<\/li>\n\n\n\n<li>G. Piras, M. Pintor, A. Demontis, B. Biggio, G. Giacinto, and F. Roli. Adversarial pruning: A survey and benchmark of pruning methods for adversarial robustness. arXiv e-prints, 2024.<\/li>\n\n\n\n<li>E. Ledda, G. Scodeller, D. Angioni, G. Piras, A. E. Cin\u00e0, G. Fumera, B. Biggio, F. Roli. On the Robustness of Adversarial Training Against Uncertainty Attacks. arXiv e-prints, 2024.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n<\/div><\/details><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-coblocks-accordion\">\n<div class=\"wp-block-coblocks-accordion-item\"><details><summary class=\"wp-block-coblocks-accordion-item__title\">Open source software &amp; Prototypes<\/summary><div class=\"wp-block-coblocks-accordion-item__content\">\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/github.com\/pralab\/secml-torch\" data-type=\"link\" data-id=\"https:\/\/github.com\/pralab\/secml-torch\" target=\"_blank\" rel=\"noreferrer noopener\">SecML-Torch<\/a><\/strong> is an open-source Python library designed to facilitate research in the area of Adversarial Machine Learning and robustness evaluation. The library provides a simple yet powerful interface for generating various types of adversarial examples, as well as tools for evaluating the robustness of machine learning models against such attacks.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/github.com\/pralab\/secml_malware\" data-type=\"link\" data-id=\"https:\/\/github.com\/pralab\/secml_malware\" target=\"_blank\" rel=\"noreferrer noopener\">SecML-malware<\/a><\/strong> is a Python library for creating adversarial attacks against Windows Malware detectors. Built on top of SecML, SecML Malware includes most of the attacks proposed in the state of the art. We include a pre-trained MalConv model trained by EndGame, used for testing.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/github.com\/pralab\/AdversarialPruningBenchmark\" data-type=\"link\" data-id=\"https:\/\/github.com\/pralab\/AdversarialPruningBenchmark\" target=\"_blank\" rel=\"noreferrer noopener\">Adversarial Pruning Benchmark<\/a><\/strong> is a framework to categorize adversarial pruning methods and evaluate them under a novel, fair evaluation protocol. It contains an empirical re-evaluation of current adversarial pruning methods and is open to new submissions as a public benchmark. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/github.com\/pralab\/HO-FMN\" data-type=\"link\" data-id=\"https:\/\/github.com\/pralab\/HO-FMN\" target=\"_blank\" rel=\"noreferrer noopener\">HO-FMN<\/a><\/strong> is the implementation of the method for optimizing the hyperparameters of the Fast Minimum-Norm (FMN) attack FMN. The FMN version used here is implemented in PyTorch and is modular, meaning that one can select the loss, the optimizer, and the scheduler for the optimization. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/github.com\/Cinofix\/sigma-zero-adversarial-attack\" data-type=\"link\" data-id=\"https:\/\/github.com\/Cinofix\/sigma-zero-adversarial-attack\" target=\"_blank\" rel=\"noreferrer noopener\">Sigma-zero<\/a><\/strong> is the official PyTorch implementation of the \u03c3-zero: Gradient-based Optimization of \u21130-norm Adversarial Examples. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/github.com\/advmlphish\/raze_to_the_ground_aisec23\" data-type=\"link\" data-id=\"https:\/\/github.com\/advmlphish\/raze_to_the_ground_aisec23\" target=\"_blank\" rel=\"noreferrer noopener\">Raze to the Ground<\/a><\/strong> is the source code of the paper &#8220;Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors&#8221; accepted at the 16th ACM Workshop on Artificial Intelligence and Security (AISec &#8217;23), co-located with ACM CCS 2023. <\/li>\n<\/ul>\n<\/div><\/details><\/div>\n<\/div>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TrustML project Project coordinatorProf. Battista BiggioPRA Lab &#8211; University of Cagliari Duration25 MonthsSeptember 2022 &#8211; October 2024 BudgetTotal budget: 52777.78 \u20acFDS funded budget: 52777.78 \u20ac People involved Prof. Giorgio GiacintoProf. Giorgio FumeraProf. Luca DidaciProf. Matteo Fraschini Funding Project context and challenges Machine learning (ML) and Artificial intelligence (AI) have recorded unprecedented success in different applications,&hellip;&nbsp;<a href=\"https:\/\/sites.unica.it\/pralab\/trustml\/\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">TrustML Project<\/span><\/a><\/p>\n","protected":false},"author":9863,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-8838","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/pages\/8838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/users\/9863"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/comments?post=8838"}],"version-history":[{"count":40,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/pages\/8838\/revisions"}],"predecessor-version":[{"id":8925,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/pages\/8838\/revisions\/8925"}],"wp:attachment":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/media?parent=8838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}