DataNinja sAIOnARA Conference https://biecoll.ub.uni-bielefeld.de/index.php/dataninja <p>In June 2024, artificial intelligence (AI) researchers, industry experts, and enthusiasts gathered at Bielefeld University to commemorate the final year of the Data-NInJA research training group: <a href="https://dataninja.nrw/">https://dataninja.nrw</a></p> <p>Embracing the theme of "Shaping Trustworthy AI: Opportunities, Innovation, and Achievements for Reliable Approaches", junior researchers in particular were invited to present their work. The resulting collection contains all accepted extended abstracts, covering a broad range of topics in AI and machine learning, including applications in healthcare, industry, and robotics. They explore cutting-edge techniques such as reinforcement learning, active learning with large language models, and interpretable machine learning. Additionally, the submissions address important issues like trustworthiness, fairness, privacy, and explainability of AI systems in various contexts.</p> Data-NInJA research training group en-US DataNinja sAIOnARA Conference Shaping Trustworthy AI: An Introduction to This Issue https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1156 Ulrike Kuhl Copyright (c) 2024 https://creativecommons.org/licenses/by/4.0 2024-07-18 2024-07-18 10.11576/dataninja-1156 Is it Possible to Characterize Group Fairness in Rankings in Terms of Individual Fairness and Diversity? https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1157 <p>Rankings are ever-present in everyday life. Examples are the results of personalized recommendations and web search queries. Rankings can result from an algorithm, importance scores and human-based rankings of items. Till we are not concerned with societal applications, the “fairness“ of the ranking is often irrelevant; however, problems appear when switching from depersonalized items to individuals. Then, suddenly, fairness becomes an issue. We investigate the relationships among group fairness, individual fairness, diversity, and Shapley values. Far from being a comprehensive survey of fairness-related papers or proposing a new method, we want to raise awareness of the chaos we are trying to navigate and propose some new research direction we are trying to follow.</p> Chiara Balestra Copyright (c) 2024 Chiara Balestra https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1157 Comparing Shapley Value Approximation Methods for Unsupervised Feature Importance https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1158 <p>Assigning importance scores to features is a common approach to gain insights about a prediction model’s behavior or even the data itself. Beyond explainability, such scores can also be of utility to conduct feature selection and make unlabeled high-dimensional data manageable. One way to derive scores is by adopting a game-theoretical view in which features are understood as agents that can form groups and cooperate for which they obtain a reward. Splitting the reward among the features appropriately yields the desired scores. The Shapley value is the most popular reward sharing solution. However, its exponential complexity renders it inapplicable for high-dimensional data unless an efficient approximation is available. We empirically compare selected approximation algorithms for quantifying feature importance on unlabeled data.</p> Patrick Kolpaczki Copyright (c) 2024 Patrick Kolpaczki https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1158 Question Answering from Healthcare Fora https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1159 <p>Assessing the quality of life of cancer patients is an important aspect of patient-focused drug development and real-world evidence generation. Specialized quality of life questionnaires exist for this purpose, and different types of cancer, such as breast cancer or lung cancer, can be assessed. However, conducting these surveys is a time-consuming process for both patients and clinical staff. At the same time, many patients discuss their experiences with and symptoms of their specific diseases in online healthcare fora. These forum posts may contain information that could be used to answer quality of life questions. Our objective is to determine whether forum posts can be used to answer quality of life questionnaires and, if so, whether this process can be automated successfully.</p> David M. Schmidt Philipp Cimiano Copyright (c) 2024 David M. Schmidt, Philipp Cimiano https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1159 Linguistic-Based Reflection on Trust Calibration in Conversations with LLM-Based Chatbots https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1160 <p>This paper presents a linguistic approach to trust in human conversations with LLM-based chatbots. Using the concept of trust calibration as a starting point, we aim to address the question of how to increase user AI literacy and prevent misuse of as well as overtrust in the information provided by LLM-based chatbots in educational contexts. We propose a linguistic-based model of trust calibration that supports users in adopting a critical perspective on trust calibration and controlling their trust level. The method combines previous studies on trust in human interaction, specifically linguistic trust cues displayed by human trustors to indicate their level of trustworthiness in naturally occurring contexts with studies on proactive human-computer interaction and the social influence of conversational agent's embodiment in educational contexts.</p> Milena Belosevic Hendrik Buschmeier Copyright (c) 2024 Milena Belosevic, Hendrik Buschmeier https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1160 COMETH - An Active Learning Approach Enhanced with Large Language Models https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1161 <p>We present a system for supervision of technical processes, called COMETH, which involves an active learning approach. The system is able to identify anomalies with very little training data, through an efficient feedback process. COMETH has been successfully applied in the context of heating ventilation and air conditioning systems and in industrial machinery. Here, we describe the idea of combining the time series analysis COMETH with large language models to integrate further context information and thus provide the user with specific recommendations.</p> Franziska Zelba Stefanie Hittmeyer Gesa Benndorf Copyright (c) 2024 Franziska Zelba, Stefanie Hittmeyer, Gesa Benndorf https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1161 Finding Commonalities in Dynamical Systems with Gaussian Processes https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1162 <p>Gaussian processes can be utilized in the area of equation discovery to identify differential equations describing the physical processes present in time series data.<br />Furthermore, automatically constructed models can be split into components that facilitate comparisons between time series on a structural level. We consider the potential combination of these two methods and describe how they could be used to detect shared physical properties in multiple recordings of dynamical systems as time series. This approach provides insights into the underlying dynamics of the observed systems, facilitating a deeper understanding of complex processes.</p> Andreas Besginow Jan David Hüwel Markus Lange-Hegermann Christian Beecks Copyright (c) 2024 Andreas Besginow, Jan David Hüwel, Markus Lange-Hegermann, Christian Beecks https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1162 Dueling Bandits with Delayed Feedback https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1163 <p>Dueling Bandits is a well-studied extension of the Multi-Armed Bandits problem, in which the learner must select two arms in each time step and receives a binary feedback as an outcome of the chosen duel. However, all of the existing best arm identification algorithms for the Dueling Bandits setting assume that the feedback can be observed immediately after selecting the two arms. If this is not the case, the algorithms simply do nothing and wait until the feedback of the recent duel can be observed, which is a waste of runtime. We propose an algorithm that can already start a new duel even if the previous one is not finished and thus is much more time efficient. Our arm selection strategy balances the expected information gain of the chosen duel and the expected delay until we observe the feedback. By theoretically grounded confidence bounds we can ensure that the arms we discard are not the best arms with high probability.</p> Jasmin Brandt Björn Haddenhorst Viktor Bengs Eyke Hüllermeier Copyright (c) 2024 Jasmin Brandt, Björn Haddenhorst, Viktor Bengs, Eyke Hüllermeier https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1163 Leveraging Desirable and Undesirable Event Logs in Process Mining Tasks https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1164 <p>Traditional process mining techniques utilize one event log as input to offer organizational insights. In many applications, information regarding undesirable process aspects may exist. However, the literature lacks a comprehensive overview of their integration into process mining tasks. In our paper, we explore leveraging data from both desirable and undesirable event logs to augment existing process mining tasks and develop innovative applications. Our aim is to systematically outline the potential for enhancements in this realm.</p> Ali Norouzifar Wil van der Aalst Copyright (c) 2024 Ali Norouzifar, Wil van der Aalst https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1164 Feeling Socially Excluded When Working With Robots https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1165 <p>Work is not just about money, but also about satisfying social needs. We examine processes of social inclusion and exclusion among human employees and robot employees. For our current study, we chose the restaurant industry as a contemporary use case where humans and robots work together as waiters. We assume that social exclusion from either human or robot colleagues will threaten people’s needs (i.e., belonging, control, meaningful existence, self-esteem) but will be interpreted differently depending on the excluding agent (i.e., human colleague or robot colleague). Assuming different attribution processes challenges the “Computers Are Social Actors” theory and could lead the rethinking human-robot interactions or even humans interacting with technology in general.</p> Clarissa Sabrina Arlinghaus Günter W. Maier Copyright (c) 2024 Clarissa Sabrina Arlinghaus, Günter W. Maier https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1165 Trade-offs Between Privacy and Performance in Encrypted Dataset using Machine Learning Models https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1166 <p>In recent years, with the increasing importance of dataset privacy in machine learning (ML) applications, there has been an increased demand for secure and privacy-preserving solutions. Consequently, encryption techniques have become known as a critical tool for protecting data privacy in an era of massive data use, exchange, and analysis. Encryption protects data against illegal access and disclosure by changing it into unreadable ciphertext that can only be decrypted by authorized parties. In the field of ML, where sensitive data is often utilized, in such a process the use of encryption techniques has significant potential for providing privacy-preserving model training and inference. Therefore, this article analyzes, investigates, and compares three widely used encryption techniques. Each encryption method offers unique advantages and trade-offs. Thus, we evaluate the performance of Convolutional Neural Network (CNN) models trained on encrypted datasets using these encryption techniques to provide detailed information on the effectiveness, practical concerns, and applicability of various methods for real-world applications by completely analyzing them within the context of computer vision. We test the performance of CNN models trained on encrypted data with several encryption approaches using neural models based-architecture. Parameters such as training time, memory usage, and classification accuracy are analyzed and compared between encryption methods. We also look into the effect of encryption on model interpretability and robustness against adversarial attacks. Furthermore, to support our study we demonstrate our approach by using practical implementation—to showcase the performance and efficiency of each encryption strategy in protecting data privacy while keeping model accuracy and testing in a real-time recognition application using an edge device such as NVIDIA Jetson. Through this comparative analysis, researchers and developers can achieve a more in-depth understanding of the importance and issues involved with the integration of encryption techniques into ML especially in computer vision application workflows.</p> Sanaullah Hasina Attaullah Thorsten Jungeblut Copyright (c) 2024 Sanaullah, Hasina Attaullah, Thorsten Jungeblut https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1166 Advancements in Neural Network Generations https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1167 <p>Innovations in Neural Network Generation demonstrate the continual evolution, optimization, and development of artificial neural networks (ANNs) over periods. These improvements include a combination of methodologies, approaches, and technical breakthroughs aimed at increasing the efficiency and abilities of neural network models. Researchers and engineers have repeatedly attempted to push the boundaries of neural network performance, scalability, and applicability across multiple fields. These improvements usually involve changes to network designs, training algorithms, optimization methodologies, and hardware acceleration methods. Moreover, the neural network generations are closely related to key achievements in the machine learning (ML) research domain, such as the development of deep learning (DL) designs like convolutional neural network (CNN) or spiking neural network (SNN) and using both neural generations to introduce natural language processing and advances in computer vision applications. Thus, in the field of neural network study, researchers have categorized ANN models into generations based on their computational design and capabilities. Therefore, this research study explores the continual evolution and optimization of ANNs, highlighting advancements in methodologies and technical innovation. We discuss the different generations of ANN, based on computational design and capabilities, emphasizing their role in shaping achievements in ML research. The study underscores the significance of these generational milestones in enhancing the adaptability and efficacy of neural network models for computational tasks, such as image classification.</p> Sanaullah Shamini Koravuna Ulrich Rückert Thorsten Jungeblut Copyright (c) 2024 Sanaullah, Shamini Koravuna, Ulrich Rückert, Thorsten Jungeblut https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1167 Nonlinear Prediction in a Smart Shoe Insole https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1169 <p>In our previous work, we have investigated different methods to compute the ideal placement of pressure sensors in a smart shoe insole. There, we used a linear model to predict the weight put on the foot/leg. In this work, we investigate how using a quadratic model instead changes the sensor placement and improves prediction performance.</p> Markus Vieth Copyright (c) 2024 Markus Vieth https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1169 Prediction of Intermuscular Co-contraction Based on the sEMG of Only One Muscle With the Same Biomechanical Direction of Action https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1168 <p> </p> <p>Research aims to enhance physical abilities using exoskeletons and limb movement prediction. SEMG signals are used for intuitive control, but their measurement is limited to shallowly under-the-skin muscles, making deep muscle signals less frequently used.<br />Here we extended a previously proposed method to train a virtual sensor for the difficult to access muscles (deep muscles e.g. <em>brachialis</em>).<br />The method is extended from signals from the same muscle to intermuscular signals and the results confirm simple biomechanical assumptions. The trained virtual sensors are ready for further investigations by being used in a biomechanical model.</p> Nils Grimmelsmann Malte Mechtenberg Markus Vieth Barbara Hammer Axel Schneider Copyright (c) 2024 Nils Grimmelsmann, Malte Mechtenberg, Markus Vieth, Barbara Hammer, Axel Schneider https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1168 Bioinspired Decentralized Hexapod Control with a Graph Neural Network https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1170 <p>Legged locomotion enables animals to navigate challenging terrains. However, it demands intricate coordination between the legs, with varying levels of information exchange depending on the task. For instance, in more demanding scenarios such as an insect climbing on a twig, greater coordination between the legs is necessary to achieve adaptive behavior. To address this challenge for legged robots, we present a concept and preliminary results of a decentralized biologically inspired controller for a hexapod robot: Based on insights of coordination influences between legs in stick insects, our approach models inter-leg information flow as message passing through a Graph Neural Network.</p> Luca Hermes Barbara Hammer Malte Schilling Copyright (c) 2024 Luca Hermes, Barbara Hammer, Malte Schilling https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1170 Improving Trust in AI Through Sustainable and Trustworthy Reporting https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1171 <p>This extended abstract outlines STREP, our (S)ustainable and (T)rustworthy (REP)orting framework. It communicates performance indicators of systems that build on artificial intelligence and thus makes them more trustworthy.</p> Raphael Fischer Mirko Bunse Copyright (c) 2024 Raphael Fischer, Mirko Bunse https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1171 Beyond Trial and Error in Reinforcement Learning https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1172 <p>In this work, we address the trial-and-error nature of modern reinforcement learning (RL) methods by investigating approaches inspired by human cognition. By enhancing state representations and advancing causal reasoning and planning, we aim to improve RL performance, robustness, and explainability. Through diverse examples, we showcase the potential of these approaches to improve RL agents.</p> Moritz Lange Raphael C. Engelhardt Wolfgang Konen Laurenz Wiskott Copyright (c) 2024 Moritz Lange, Raphael C. Engelhardt, Wolfgang Konen, Laurenz Wiskott https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1172 Closing the Loop with Concept Regularization https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1173 <p>Convolutional Neural Networks (CNNs) are widely adopted in industrial settings, but are prone to biases and lack transparency. Explainable Artificial Intelligence (XAI), particularly through concept extraction (CE), allows for global explanations and bias detection, yet fails to offer corrective measures for identified biases. To bridge this gap, we introduce Concept Regularization (CoRe), which uses CE capabilities alongside human feedback to embed a regularization term during retraining. CoRe allows for the adjustments in model sensitivities based on identified biases, aligning model prediction process with expert human assessments. Our evaluations on a modified metal casting dataset demonstrate CoRe's efficacy in bias mitigation, highlighting its potential to refine models in practical applications.</p> Andres Felipe Posada-Moreno Sebastian Trimpe Copyright (c) 2024 Andres Felipe Posada-Moreno, Sebastian Trimpe https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1173 Provable Guarantees for Deep Learning-Based Anomaly Detection through Logical Constraints https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1174 <p>Incorporating constraints expressed as logical formulas and based on foundational prior knowledge into deep learning models can provide formal guarantees for the fulfillment of critical model properties, improve model performance, and ensure that relevant structures can be inferred from less data. We propose to thoroughly explore such logical constraints over input-output relations in the context of deep learning-based anomaly detection, specifically by extending the capabilities of the MultiplexNet framework.</p> Tim Katzke Simon Lutz Emmanuel Müller Daniel Neider Copyright (c) 2024 Tim Katzke, Simon Lutz, Emmanuel Müller, Daniel Neider https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1174 Study on the Influence of Texture Variation on the Validation Performance of a Synthetically Trained Object Detector https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1175 <p>In recent years, the utilization of synthetic data for the training of Deep Learning (DL) approaches has emerged as a valid alternative to the costly process of real data acquisition. Yet, the influence of the sim-to-real gap on the model performance still poses an obstacle to the broader usage of synthetic data. To investigate the major contributing factors, this study focuses on the influence of texture variation as a first step. Examining different strategies for generating synthetic validation sets for the training process of an object detector, the results of this study indicate that the sole influence of textures is insufficient to cause the observable performance gap alone.</p> Alexander Moriz Dominik Wolfschläger Robert H. Schmitt Copyright (c) 2024 Alexander Moriz, Dominik Wolfschläger, Robert H. Schmitt https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1175 Interpretable Machine Learning via Linear Temporal Logic https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1176 <p>In recent years, deep neural networks have shown excellent performance, outperforming even human experts in various tasks. However, their inherent complexity and black-box nature often make it hard, if not impossible, to understand the decisions made by these models, hindering their practical application in high-stakes scenarios.</p> <p>We propose a framework for learning LTL formulas as inherently interpretable machine learning models. These models can be trained both in a supervised and unsupervised setting. Furthermore, they can easily be extended to handle noisy data and to incorporate expert knowledge.</p> Simon Lutz Daniel Neider Copyright (c) 2024 Simon Lutz, Daniel Neider https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1176 Distributive Justice of Resource Allocation Through Artificial Intelligence https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1177 <p>Artificial intelligence will take over leadership functions such as rewarding employee performance. It will therefore make decisions about employee outcomes and most likely allocate different resources to employees. Resource Theory of Social Exchange distinguishes six resource classes. The theory postulates that the value of some resources depend on the identity of the provider of the resource and on the relationship with the provider. This raises the question of whether certain resources, such as the resource affiliation, have a value when they are allocated by artificial intelligence. This contribution calls for studies that investigate the value of different resources allocated by artificial intelligence in leadership functions.</p> Paul Hellwig Günter W. Maier Copyright (c) 2024 Paul Hellwig, Günter W. Maier https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1177 Concept Extraction for Time Series With ECLAD https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1178 <p>Concept Extraction (CE) methods are being increasingly used in the image domain for explaining deep learning models, which are not inherently interpretable. However, there have not been transfer studies yet for their usage in the time series domain. The purpose of this work is to explore the use of CE methods in time series. We propose to modify the ECLAD algorithm for this domain by changing the latent space representation used to extract concepts. This method is then tested on an InceptionTime model trained on the Gunpoint dataset. Preliminary results show that we can successfully extract concepts from time series models on datasets with local features and provide conceptual explanations that effectively explain how the model works.</p> Antonia Holzapfel Andres Felipe Posada-Moreno Sebastian Trimpe Copyright (c) 2024 Antonia Holzapfel, Andres Felipe Posada-Moreno, Sebastian Trimpe https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1178 Trustworthy Virtual Measurements in Battery Manufacturing https://biecoll.ub.uni-bielefeld.de/index.php/dataninja/article/view/1179 <p>The growing demand for electric cars necessitates an increase in battery production efficiency and cost-effectiveness. Through a reduction of the joint testing efforts an increase of productivity can be accomplished. To achieve the reduction, remain on a high level of quality standards and increase the informational content about current production the use of virtual measurements is examined. Ensuring the trustworthiness of virtual measurements is crucial for informed decision making, necessitating validation. This paper explores the requirements and challenges in battery manufacturing for implementing trustworthy virtual measurements. Two central requirements are identified to enable virtual measurements. Firstly, a traceability system based on the production meta-model is needed to track process parameters and quality characteristics. Secondly, a framework is proposed to facilitate reliable virtual measurements. The primary challenge for virtual measurement in battery manufacturing systems from the complexity of the process chain and products. It is crucial to assess how virtual measurements perform across various processes and to evaluate their transferability to different process parameters and products.</p> Lukas Krebs Tobias Müller Robert H. Schmitt Copyright (c) 2024 Lukas Krebs, Tobias Müller, Robert H. Schmitt https://creativecommons.org/licenses/by/4.0 2024-10-11 2024-10-11 10.11576/dataninja-1179