{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:49:21Z","timestamp":1743018561648,"version":"3.40.3"},"publisher-location":"Cham","reference-count":89,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030945824"},{"type":"electronic","value":"9783030945831"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94583-1_3","type":"book-chapter","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T22:02:34Z","timestamp":1642111354000},"page":"43-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fanoos: Multi-resolution, Multi-strength, Interactive Explanations for Learned Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5811-6792","authenticated-orcid":false,"given":"David","family":"Bayani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3194-9759","authenticated-orcid":false,"given":"Stefan","family":"Mitsch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,14]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi, A., Berrada, M.: Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6, 52138\u201352160 (2018)","journal-title":"IEEE Access"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Adam, S.P., Karras, D.A., Magoulas, G.D., Vrahatis, M.N.: Reliable estimation of a neural network\u2019s domain of validity through interval analysis based inversion. In: 2015 International Joint Conference on Neural Networks, IJCNN 2015, Killarney, Ireland, 12\u201317 July 2015, pp. 1\u20138 (2015). https:\/\/doi.org\/10.1109\/IJCNN.2015.7280794","DOI":"10.1109\/IJCNN.2015.7280794"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imieli\u0144ski, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, DC, USA, 26\u201328 May 1993, vol. 22, pp. 207\u2013216. ACM (1993)","DOI":"10.1145\/170036.170072"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/0950-7051(96)81920-4","volume":"6","author":"R Andrews","year":"1995","unstructured":"Andrews, R., Diederich, J., Tickle, A.: Survey and critique of techniques for extracting rules from trained artificial neural networks. Knowl.-Based Syst. 6, 373\u2013389 (1995). https:\/\/doi.org\/10.1016\/0950-7051(96)81920-4","journal-title":"Knowl.-Based Syst."},{"key":"3_CR5","unstructured":"Anjomshoae, S., Najjar, A., Calvaresi, D., Fr\u00e4mling, K.: Explainable agents and robots: results from a systematic literature review. In: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, pp. 1078\u20131088. International Foundation for Autonomous Agents and Multiagent Systems (2019)"},{"key":"3_CR6","unstructured":"Arya, V., et al.: One explanation does not fit all: a toolkit and taxonomy of AI explainability techniques. CoRR abs\/1909.03012 (2019)"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Bayani, D.: Code for Fanoos: multi-resolution, multi-strength, interactive explanations for learned systems (2021). https:\/\/doi.org\/10.5281\/zenodo.5513079. Method of distribution is Zenodo, distributed in October, 2021","DOI":"10.5281\/zenodo.5513079"},{"key":"3_CR8","unstructured":"Bayani, D., Mitsch, S.: Fanoos: multi-resolution, multi-strength, interactive explanations for learned systems. CoRR abs\/2006.12453 (2020)"},{"key":"3_CR9","doi-asserted-by":"publisher","DOI":"10.1057\/9780230285897","volume-title":"Game Theory and Pragmatics","author":"A Benz","year":"2005","unstructured":"Benz, A., J\u00e4ger, G., Van Rooij, R.: Game Theory and Pragmatics. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1057\/9780230285897"},{"issue":"11","key":"3_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S0065-2458(03)58003-2","volume":"58","author":"A Biere","year":"2003","unstructured":"Biere, A., Cimatti, A., Clarke, E.M., Strichman, O., Zhu, Y., et al.: Bounded model checking. Adv. Comput. 58(11), 117\u2013148 (2003)","journal-title":"Adv. Comput."},{"key":"3_CR11","unstructured":"Biran, O., Cotton, C.: Explanation and justification in machine learning: a survey. In: IJCAI-17 Workshop on Explainable AI (XAI), vol. 8, p. 1 (2017)"},{"key":"3_CR12","unstructured":"Bunel, R., Turkaslan, I., Torr, P.H.S., Kohli, P., Mudigonda, P.K.: A unified view of piecewise linear neural network verification. In: Bengio, S., Wallach, H.M., Larochelle, H., Grauman, K., Cesa-Bianchi, N., Garnett, R. (eds.) Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, 3\u20138 December 2018, Montr\u00e9al, Canada, pp. 4795\u20134804 (2018)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Chakraborti, T., Kulkarni, A., Sreedharan, S., Smith, D.E., Kambhampati, S.: Explicability? Legibility? Predictability? Transparency? Privacy? Security? The emerging landscape of interpretable agent behavior. In: Proceedings of the International Conference on Automated Planning and Scheduling, vol. 29, pp. 86\u201396 (2019)","DOI":"10.1609\/icaps.v29i1.3463"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Chuang, J., Ramage, D., Manning, C., Heer, J.: Interpretation and trust: designing model-driven visualizations for text analysis. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 443\u2013452. ACM (2012)","DOI":"10.1145\/2207676.2207738"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/3-540-36577-X_14","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E Clarke","year":"2003","unstructured":"Clarke, E., Fehnker, A., Han, Z., Krogh, B., Stursberg, O., Theobald, M.: Verification of hybrid systems based on counterexample-guided abstraction refinement. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol. 2619, pp. 192\u2013207. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36577-X_14"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E Clarke","year":"2000","unstructured":"Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol. 1855, pp. 154\u2013169. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/10722167_15"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proceedings of the 4th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pp. 238\u2013252 (1977)","DOI":"10.1145\/512950.512973"},{"issue":"1","key":"3_CR18","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/9.360","volume":"33","author":"Q David","year":"1988","unstructured":"David, Q.: Design issues in adaptive control. IEEE Trans. Autom. Control 33(1), 50\u201358 (1988)","journal-title":"IEEE Trans. Autom. Control"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L de Moura","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78800-3_24"},{"issue":"6","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/S1474-6670(17)43495-1","volume":"30","author":"A Driescher","year":"1997","unstructured":"Driescher, A., Korn, U.: Checking stability of neural NARX models: an interval approach. IFAC Proc. Vol. 30(6), 1005\u20131010 (1997)","journal-title":"IFAC Proc. Vol."},{"key":"3_CR21","unstructured":"Dvijotham, K., Stanforth, R., Gowal, S., Mann, T.A., Kohli, P.: A dual approach to scalable verification of deep networks. In: Globerson, A., Silva, R. (eds.) Proceedings of the Thirty-Fourth Conference on Uncertainty in Artificial Intelligence, UAI 2018, Monterey, California, USA, 6\u201310 August 2018, pp. 550\u2013559. AUAI Press (2018)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-319-68167-2_19","volume-title":"Automated Technology for Verification and Analysis","author":"R Ehlers","year":"2017","unstructured":"Ehlers, R.: Formal verification of piece-wise linear feed-forward neural networks. In: D\u2019Souza, D., Narayan Kumar, K. (eds.) ATVA 2017. LNCS, vol. 10482, pp. 269\u2013286. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68167-2_19"},{"issue":"2","key":"3_CR23","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/TNN.2005.863472","volume":"17","author":"TA Etchells","year":"2006","unstructured":"Etchells, T.A., Lisboa, P.J.: Orthogonal search-based rule extraction (OSRE) for trained neural networks: a practical and efficient approach. IEEE Trans. Neural Netw. 17(2), 374\u2013384 (2006)","journal-title":"IEEE Trans. Neural Netw."},{"key":"3_CR24","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (General Data Protection Regulation) (2016)"},{"key":"3_CR25","unstructured":"Fern, A.: Don\u2019t get fooled by explanations. Invited Talk, IJCAI-XAI (2020). Recording at: https:\/\/ijcai20.org\/w41\/. Schedule at: https:\/\/sites.google.com\/view\/xai2020\/home"},{"issue":"3","key":"3_CR26","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11023-008-9113-7","volume":"18","author":"L Floridi","year":"2008","unstructured":"Floridi, L.: The method of levels of abstraction. Mind. Mach. 18(3), 303\u2013329 (2008)","journal-title":"Mind. Mach."},{"issue":"3","key":"3_CR27","first-page":"90","volume":"32","author":"G Friedrich","year":"2011","unstructured":"Friedrich, G., Zanker, M.: A taxonomy for generating explanations in recommender systems. AI Mag. 32(3), 90\u201398 (2011)","journal-title":"AI Mag."},{"issue":"1","key":"3_CR28","first-page":"1437","volume":"16","author":"J Garc\u0131a","year":"2015","unstructured":"Garc\u0131a, J., Fern\u00e1ndez, F.: A comprehensive survey on safe reinforcement learning. J. Mach. Learn. Res. 16(1), 1437\u20131480 (2015)","journal-title":"J. Mach. Learn. Res."},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Gehr, T., Mirman, M., Drachsler-Cohen, D., Tsankov, P., Chaudhuri, S., Vechev, M.T.: AI2: safety and robustness certification of neural networks with abstract interpretation. In: 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21\u201323 May 2018, San Francisco, California, USA, pp. 3\u201318. IEEE Computer Society (2018). https:\/\/doi.org\/10.1109\/SP.2018.00058","DOI":"10.1109\/SP.2018.00058"},{"issue":"5","key":"3_CR30","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2019","unstructured":"Guidotti, R., Monreale, A., Ruggieri, S., Turini, F., Giannotti, F., Pedreschi, D.: A survey of methods for explaining black box models. ACM Comput. Surv. (CSUR) 51(5), 93 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"3_CR31","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1609\/aimag.v40i2.2850","volume":"40","author":"D Gunning","year":"2019","unstructured":"Gunning, D., Aha, D.: DARPA\u2019s explainable artificial intelligence (XAI) program. AI Mag. 40(2), 44\u201358 (2019). https:\/\/doi.org\/10.1609\/aimag.v40i2.2850","journal-title":"AI Mag."},{"key":"3_CR32","unstructured":"Hailesilassie, T.: Rule extraction algorithm for deep neural networks: a review. arXiv preprint arXiv:1610.05267 (2016)"},{"key":"3_CR33","unstructured":"Han, J., Fu, Y.: Discovery of multiple-level association rules from large databases. In: VLDB, vol. 95, pp. 420\u2013431. Citeseer (1995)"},{"issue":"5","key":"3_CR34","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1109\/69.806937","volume":"11","author":"J Han","year":"1999","unstructured":"Han, J., Fu, Y.: Mining multiple-level association rules in large databases. IEEE Trans. Knowl. Data Eng. 11(5), 798\u2013805 (1999)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Hayes, B., Scassellati, B.: Autonomously constructing hierarchical task networks for planning and human-robot collaboration. In: 2016 IEEE International Conference on Robotics and Automation (ICRA), pp. 5469\u20135476. IEEE (2016)","DOI":"10.1109\/ICRA.2016.7487760"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Hayes, B., Shah, J.A.: Improving robot controller transparency through autonomous policy explanation. In: 2017 12th ACM\/IEEE International Conference on Human-Robot Interaction (HRI), pp. 303\u2013312. IEEE (2017)","DOI":"10.1145\/2909824.3020233"},{"issue":"1","key":"3_CR37","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/360402.360421","volume":"2","author":"J Hipp","year":"2000","unstructured":"Hipp, J., G\u00fcntzer, U., Nakhaeizadeh, G.: Algorithms for association rule mining- a general survey and comparison. SIGKDD Explor. 2(1), 58\u201364 (2000)","journal-title":"SIGKDD Explor."},{"key":"3_CR38","unstructured":"Hostetler, J., Fern, A., Dietterich, T.G.: Progressive abstraction refinement for sparse sampling. In: Meila, M., Heskes, T. (eds.) Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, UAI 2015, 12\u201316 July 2015, Amsterdam, The Netherlands, pp. 365\u2013374. AUAI Press (2015)"},{"issue":"2","key":"3_CR39","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10514-018-9771-0","volume":"43","author":"SH Huang","year":"2019","unstructured":"Huang, S.H., Held, D., Abbeel, P., Dragan, A.D.: Enabling robots to communicate their objectives. Auton. Robot. 43(2), 309\u2013326 (2019). https:\/\/doi.org\/10.1007\/s10514-018-9771-0","journal-title":"Auton. Robot."},{"key":"3_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-63387-9_1","volume-title":"Computer Aided Verification","author":"X Huang","year":"2017","unstructured":"Huang, X., Kwiatkowska, M., Wang, S., Wu, M.: Safety verification of deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 3\u201329. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_1"},{"key":"3_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-63387-9_5","volume-title":"Computer Aided Verification","author":"G Katz","year":"2017","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., Kochenderfer, M.J.: Reluplex: an efficient SMT solver for verifying deep neural networks. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017, Part I. LNCS, vol. 10426, pp. 97\u2013117. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63387-9_5"},{"issue":"1","key":"3_CR42","first-page":"95","volume":"2","author":"RB Kearfott","year":"1996","unstructured":"Kearfott, R.B.: Interval computations: introduction, uses, and resources. Euromath Bull. 2(1), 95\u2013112 (1996)","journal-title":"Euromath Bull."},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Kellert, S.H.: In the Wake of Chaos: Unpredictable Order in Dynamical Systems. University of Chicago Press (1993)","DOI":"10.7208\/chicago\/9780226429823.001.0001"},{"key":"3_CR44","doi-asserted-by":"publisher","unstructured":"Kim, J., Rohrbach, A., Darrell, T., Canny, J.F., Akata, Z.: Textual explanations for self-driving vehicles (2018). https:\/\/doi.org\/10.1007\/978-3-030-01216-8_35","DOI":"10.1007\/978-3-030-01216-8_35"},{"key":"3_CR45","unstructured":"Koul, A., Fern, A., Greydanus, S.: Learning finite state representations of recurrent policy networks. In: 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, 6\u20139 May 2019. OpenReview.net (2019)"},{"issue":"11","key":"3_CR46","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1119\/1.17335","volume":"61","author":"R Levien","year":"1993","unstructured":"Levien, R., Tan, S.: Double pendulum: an experiment in chaos. Am. J. Phys. 61(11), 1038\u20131044 (1993)","journal-title":"Am. J. Phys."},{"key":"3_CR47","unstructured":"Lipton, Z.C.: The mythos of model interpretability. arXiv preprint arXiv:1606.03490 (2016)"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Liskov, B.: Keynote address-data abstraction and hierarchy. In: Addendum to the Proceedings on Object-Oriented Programming Systems, Languages and Applications (Addendum), pp. 17\u201334 (1987)","DOI":"10.1145\/62138.62141"},{"issue":"6","key":"3_CR49","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.1145\/197320.197383","volume":"16","author":"BH Liskov","year":"1994","unstructured":"Liskov, B.H., Wing, J.M.: A behavioral notion of subtyping. ACM Trans. Program. Lang. Syst. (TOPLAS) 16(6), 1811\u20131841 (1994)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Liu, B., Hsu, W., Ma, Y.: Mining association rules with multiple minimum supports. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 337\u2013341 (1999)","DOI":"10.1145\/312129.312274"},{"key":"3_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2018.07.007","volume":"267","author":"T Miller","year":"2018","unstructured":"Miller, T.: Explanation in artificial intelligence: insights from the social sciences. Artif. Intell. 267, 1\u201338 (2018)","journal-title":"Artif. Intell."},{"key":"3_CR52","unstructured":"Miller, T., Howe, P., Sonenberg, L.: Explainable AI: beware of inmates running the asylum or: how I learnt to stop worrying and love the social and behavioural sciences. arXiv preprint arXiv:1712.00547 (2017)"},{"key":"3_CR53","unstructured":"Mirman, M., Gehr, T., Vechev, M.: Differentiable abstract interpretation for provably robust neural networks. In: International Conference on Machine Learning, pp. 3575\u20133583 (2018)"},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Mohseni-Kabir, A., Rich, C., Chernova, S., Sidner, C.L., Miller, D.: Interactive hierarchical task learning from a single demonstration. In: Proceedings of the Tenth Annual ACM\/IEEE International Conference on Human-Robot Interaction, pp. 205\u2013212. ACM (2015)","DOI":"10.1145\/2696454.2696474"},{"key":"3_CR55","volume-title":"Interval Analysis","author":"RE Moore","year":"1966","unstructured":"Moore, R.E.: Interval Analysis, vol. 4. Prentice-Hall, Englewood Cliffs (1966)"},{"issue":"1\u20132","key":"3_CR56","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0004-3702(99)00067-3","volume":"114","author":"S Muggleton","year":"1999","unstructured":"Muggleton, S.: Inductive logic programming: issues, results and the challenge of learning language in logic. Artif. Intell. 114(1\u20132), 283\u2013296 (1999)","journal-title":"Artif. Intell."},{"key":"3_CR57","unstructured":"Murdoch, W.J., Szlam, A.: Automatic rule extraction from long short term memory networks. arXiv preprint arXiv:1702.02540 (2017)"},{"key":"3_CR58","unstructured":"Neema, S.: Assured autonomy (2017). https:\/\/www.darpa.mil\/attachments\/AssuredAutonomyProposersDay_Program%20Brief.pdf"},{"issue":"3","key":"3_CR59","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s10618-011-0215-0","volume":"24","author":"A Papadimitriou","year":"2012","unstructured":"Papadimitriou, A., Symeonidis, P., Manolopoulos, Y.: A generalized taxonomy of explanations styles for traditional and social recommender systems. Data Min. Knowl. Disc. 24(3), 555\u2013583 (2012)","journal-title":"Data Min. Knowl. Disc."},{"key":"3_CR60","doi-asserted-by":"publisher","unstructured":"Perera, V., Selvaraj, S.P., Rosenthal, S., Veloso, M.M.: Dynamic generation and refinement of robot verbalization. In: 25th IEEE International Symposium on Robot and Human Interactive Communication, RO-MAN 2016, New York, NY, USA, 26\u201331 August 2016, pp. 212\u2013218. IEEE (2016). https:\/\/doi.org\/10.1109\/ROMAN.2016.7745133","DOI":"10.1109\/ROMAN.2016.7745133"},{"key":"3_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-14295-6_24","volume-title":"Computer Aided Verification","author":"L Pulina","year":"2010","unstructured":"Pulina, L., Tacchella, A.: An abstraction-refinement approach to verification of artificial neural networks. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 243\u2013257. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_24"},{"key":"3_CR62","unstructured":"Raffin, A.: RL baselines zoo (2018). https:\/\/web.archive.org\/web\/20190524144858\/https:\/\/github.com\/araffin\/rl-baselines-zoo"},{"key":"3_CR63","doi-asserted-by":"publisher","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cWhy should I trust you?\u201d: explaining the predictions of any classifier. In: Krishnapuram, B., Shah, M., Smola, A.J., Aggarwal, C.C., Shen, D., Rastogi, R. (eds.) Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13\u201317 August 2016, pp. 1135\u20131144. ACM (2016). https:\/\/doi.org\/10.1145\/2939672.2939778","DOI":"10.1145\/2939672.2939778"},{"key":"3_CR64","unstructured":"Richardson, A., Rosenfeld, A.: A survey of interpretability and explainability in human-agent systems. In: XAI Workshop on Explainable Artificial Intelligence, pp. 137\u2013143 (2018)"},{"key":"3_CR65","unstructured":"Roberts, M., et al.: What was I planning to do. In: ICAPS Workshop on Explainable Planning, pp. 58\u201366 (2018)"},{"key":"3_CR66","unstructured":"Rosenthal, S., Biswas, J., Veloso, M.: An effective personal mobile robot agent through symbiotic human-robot interaction. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 915\u2013922. International Foundation for Autonomous Agents and Multiagent Systems (2010)"},{"key":"3_CR67","unstructured":"Schulman, J., Wolski, F., Dhariwal, P., Radford, A., Klimov, O.: Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)"},{"key":"3_CR68","unstructured":"Setiono, R., Liu, H.: Understanding neural networks via rule extraction. In: IJCAI, vol. 1, pp. 480\u2013485 (1995)"},{"key":"3_CR69","unstructured":"Singh, G., Ganvir, R., P\u00fcschel, M., Vechev, M.T.: Beyond the single neuron convex barrier for neural network certification. In: Wallach, H.M., Larochelle, H., Beygelzimer, A., d\u2019Alch\u00e9-Buc, F., Fox, E.B., Garnett, R. (eds.) Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, 8\u201314 December 2019, Vancouver, BC, Canada, pp. 15072\u201315083 (2019)"},{"key":"3_CR70","unstructured":"Sreedharan, S., Madhusoodanan, M.P., Srivastava, S., Kambhampati, S.: Plan explanation through search in an abstract model space. In: International Conference on Automated Planning and Scheduling (ICAPS) Workshop on Explainable Planning, pp. 67\u201375 (2018)"},{"key":"3_CR71","unstructured":"Srikant, R., Agrawal, R.: Mining generalized association rules. In: Dayal, U., Gray, P.M.D., Nishio, S. (eds.) VLDB 1995, Proceedings of 21st International Conference on Very Large Data Bases, 11\u201315 September 1995, Zurich, Switzerland, pp. 407\u2013419. Morgan Kaufmann (1995)"},{"key":"3_CR72","unstructured":"International Standardization: ISO\/IEC 7498\u20131: 1994 information technology-open systems interconnection-basic reference model: the basic model. International Standard ISOIEC 74981, 59 (1996)"},{"key":"3_CR73","doi-asserted-by":"crossref","unstructured":"Taylor, B.J., Darrah, M.A.: Rule extraction as a formal method for the verification and validation of neural networks. In: 2005 Proceedings of 2005 IEEE International Joint Conference on Neural Networks, vol. 5, pp. 2915\u20132920. IEEE (2005)","DOI":"10.1109\/IJCNN.2005.1556388"},{"issue":"8","key":"3_CR74","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1145\/360303.360308","volume":"19","author":"RD Tennent","year":"1976","unstructured":"Tennent, R.D.: The denotational semantics of programming languages. Commun. ACM 19(8), 437\u2013453 (1976). https:\/\/doi.org\/10.1145\/360303.360308","journal-title":"Commun. ACM"},{"key":"3_CR75","unstructured":"Thrun, S.: Extracting rules from artificial neural networks with distributed representations. In: Tesauro, G., Touretzky, D.S., Leen, T.K. (eds.) 1994 Advances in Neural Information Processing Systems 7, NIPS Conference, Denver, Colorado, USA, pp. 505\u2013512. MIT Press (1994)"},{"key":"3_CR76","unstructured":"Tjeng, V., Xiao, K., Tedrake, R.: Verifying neural networks with mixed integer programming. CoRR abs\/1711.07356 (2017). http:\/\/arxiv.org\/abs\/1711.07356"},{"issue":"1","key":"3_CR77","first-page":"71","volume":"13","author":"GG Towell","year":"1993","unstructured":"Towell, G.G., Shavlik, J.W.: Extracting refined rules from knowledge-based neural networks. Mach. Learn. 13(1), 71\u2013101 (1993)","journal-title":"Mach. Learn."},{"issue":"2","key":"3_CR78","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/2641190.2641198","volume":"15","author":"J Vanschoren","year":"2013","unstructured":"Vanschoren, J., van Rijn, J.N., Bischl, B., Torgo, L.: OpenML: networked science in machine learning. SIGKDD Explor. 15(2), 49\u201360 (2013). https:\/\/doi.org\/10.1145\/2641190.2641198","journal-title":"SIGKDD Explor."},{"key":"3_CR79","unstructured":"Veloso, M.M., Biswas, J., Coltin, B., Rosenthal, S.: CoBots: robust symbiotic autonomous mobile service robots. In: IJCAI, p. 4423 (2015)"},{"key":"3_CR80","unstructured":"Ventocilla, E., et al.: Towards a taxonomy for interpretable and interactive machine learning. In: XAI Workshop on Explainable Artificial Intelligence, pp. 151\u2013157 (2018)"},{"issue":"4","key":"3_CR81","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/9.286277","volume":"39","author":"E Walter","year":"1994","unstructured":"Walter, E., Jaulin, L.: Guaranteed characterization of stability domains via set inversion. IEEE Trans. Autom. Control 39(4), 886\u2013889 (1994). https:\/\/doi.org\/10.1109\/9.286277","journal-title":"IEEE Trans. Autom. Control"},{"key":"3_CR82","unstructured":"Wang, S., Pei, K., Whitehouse, J., Yang, J., Jana, S.: Formal security analysis of neural networks using symbolic intervals. In: 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, 15\u201317 August 2018, pp. 1599\u20131614 (2018)"},{"issue":"4","key":"3_CR83","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.cogdev.2004.09.003","volume":"19","author":"HM Wellman","year":"2004","unstructured":"Wellman, H.M., Lagattuta, K.H.: Theory of mind for learning and teaching: the nature and role of explanation. Cogn. Dev. 19(4), 479\u2013497 (2004)","journal-title":"Cogn. Dev."},{"key":"3_CR84","unstructured":"Wen, W., Callahan, J.: Neuralware engineering: develop verifiable ANN-based systems. In: Proceedings IEEE International Joint Symposia on Intelligence and Systems, pp. 60\u201366. IEEE (1996)"},{"key":"3_CR85","unstructured":"Wen, W., Callahan, J., Napolitano, M.: Towards developing verifiable neural network controller. Technical report (1996)"},{"key":"3_CR86","unstructured":"Wen, W., Callahan, J., Napolitano, M.: Verifying stability of dynamic soft-computing systems. Technical report NASA-IVV-97-002, WVU-CS-TR-97-005, NASA\/CR-97-207032, WVU-IVV-97-002 (1997)"},{"key":"3_CR87","unstructured":"Weng, L., et al.: Towards fast computation of certified robustness for ReLU networks. In: Dy, J., Krause, A. (eds.) Proceedings of the 35th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 80, pp. 5276\u20135285. PMLR, 10\u201315 July 2018"},{"key":"3_CR88","unstructured":"Xiang, W., Johnson, T.T.: Reachability analysis and safety verification for neural network control systems. CoRR abs\/1805.09944 (2018)"},{"issue":"1","key":"3_CR89","first-page":"85","volume":"22","author":"M Yasmin","year":"2013","unstructured":"Yasmin, M., Sharif, M., Mohsin, S.: Neural networks in medical imaging applications: a survey. World Appl. Sci. J. 22(1), 85\u201396 (2013)","journal-title":"World Appl. Sci. J."}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94583-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T07:26:27Z","timestamp":1726471587000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94583-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030945824","9783030945831"],"references-count":89,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94583-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VMCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Verification, Model Checking, and Abstract Interpretation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Philadelphia, PA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 January 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 January 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vmcai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/popl22.sigplan.org\/home\/VMCAI-2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}