Skip to main content

Showing 1–6 of 6 results for author: Zych, M

Searching in archive cs. Search in all archives.
.
  1. Dataset resulting from the user study on comprehensibility of explainable AI algorithms

    Authors: Szymon Bobek, Paloma Korycińska, Monika Krakowska, Maciej Mozolewski, Dorota Rak, Magdalena Zych, Magdalena Wójcik, Grzegorz J. Nalepa

    Abstract: This paper introduces a dataset that is the result of a user study on the comprehensibility of explainable artificial intelligence (XAI) algorithms. The study participants were recruited from 149 candidates to form three groups representing experts in the domain of mycology (DE), students with a data science and visualization background (IT) and students from social sciences and humanities (SSH).… ▽ More

    Submitted 17 July, 2025; v1 submitted 21 October, 2024; originally announced November 2024.

    Journal ref: Sci Data 12, 1000 (2025)

  2. arXiv:2410.15952  [pdf, other

    cs.AI cs.LG

    User-centric evaluation of explainability of AI with and for humans: a comprehensive empirical study

    Authors: Szymon Bobek, Paloma Korycińska, Monika Krakowska, Maciej Mozolewski, Dorota Rak, Magdalena Zych, Magdalena Wójcik, Grzegorz J. Nalepa

    Abstract: This study is located in the Human-Centered Artificial Intelligence (HCAI) and focuses on the results of a user-centered assessment of commonly used eXplainable Artificial Intelligence (XAI) algorithms, specifically investigating how humans understand and interact with the explanations provided by these algorithms. To achieve this, we employed a multi-disciplinary approach that included state-of-t… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

  3. Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks

    Authors: Mateusz Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos

    Abstract: As cyber systems become increasingly complex and cybersecurity threats become more prominent, defenders must prepare, coordinate, automate, document, and share their response methodologies to the extent possible. The CACAO standard was developed to satisfy the above requirements, providing a common machine-readable framework and schema for documenting cybersecurity operations processes, including… ▽ More

    Submitted 10 September, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

  4. arXiv:2204.11368  [pdf

    cs.CR

    Enhancing the STIX Representation of MITRE ATT&CK for Group Filtering and Technique Prioritization

    Authors: Mateusz Zych, Vasileios Mavroeidis

    Abstract: In this paper, we enhance the machine-readable representation of the ATT&CK Groups knowledge base provided by MITRE in STIX 2.1 format to make available and queryable additional types of contextual information. Such information includes the motivations of activity groups, the countries they have originated from, and the sectors and countries they have targeted. We demonstrate how to utilize the en… ▽ More

    Submitted 26 April, 2022; v1 submitted 24 April, 2022; originally announced April 2022.

  5. arXiv:2203.04136  [pdf

    cs.CR

    Cybersecurity Playbook Sharing with STIX 2.1

    Authors: Vasileios Mavroeidis, Mateusz Zych

    Abstract: Understanding that interoperable security playbooks will become a fundamental component of defenders' arsenal to decrease attack detection and response times, it is time to consider their position in structured sharing efforts. This report documents the process of extending Structured Threat Information eXpression (STIX) version 2.1, using the available extension definition mechanism, to enable sh… ▽ More

    Submitted 26 August, 2022; v1 submitted 22 January, 2022; originally announced March 2022.

  6. The Impact of Quantum Computing on Present Cryptography

    Authors: Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych, Audun Jøsang

    Abstract: The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and… ▽ More

    Submitted 31 March, 2018; originally announced April 2018.

    Comments: 10 pages, 1 figure, 3 tables, journal article - IJACSA

    MSC Class: 81P94; 11T71; 94A60; 14G50

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), 9(3), 405-414, March 2018