Hybrid reasoning in knowledge graphs: Combing symbolic reasoning and statistical reasoning

Semantic Web ◽  
2020 ◽  
Vol 11 (1) ◽  
pp. 53-62 ◽  
Author(s):  
Weizhuo Li ◽  
Guilin Qi ◽  
Qiu Ji
2018 ◽  
Vol 2 (3) ◽  
pp. 23 ◽  
Author(s):  
Roberta Calegari ◽  
Giovanni Ciatto ◽  
Stefano Mariani ◽  
Enrico Denti ◽  
Andrea Omicini

In the era of Big Data and IoT, successful systems have to be designed to discover, store, process, learn, analyse, and predict from a massive amount of data—in short, they have to behave intelligently. Despite the success of non-symbolic techniques such as deep learning, symbolic approaches to machine intelligence still have a role to play in order to achieve key properties such as observability, explainability, and accountability. In this paper we focus on logic programming (LP), and advocate its role as a provider of symbolic reasoning capabilities in IoT scenarios, suitably complementing non-symbolic ones. In particular, we show how its re-interpretation in terms of LPaaS (Logic Programming as a Service) can work as an enabling technology for distributed situated intelligence. A possible example of hybrid reasoning—where symbolic and non-symbolic techniques fruitfully combine to produce intelligent behaviour—is presented, demonstrating how LPaaS could work in a smart energy grid scenario.


AI Open ◽  
2021 ◽  
Vol 2 ◽  
pp. 14-35
Author(s):  
Jing Zhang ◽  
Bo Chen ◽  
Lingxi Zhang ◽  
Xirui Ke ◽  
Haipeng Ding

2002 ◽  
Author(s):  
Timothy J. Lawson ◽  
Michael Schwiers ◽  
Maureen Doellman ◽  
Greg Grady ◽  
Robert Kelnhofer

2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


Sign in / Sign up

Export Citation Format

Share Document