{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:49:58Z","timestamp":1743112198100,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031504846"},{"type":"electronic","value":"9783031504853"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50485-3_31","type":"book-chapter","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:02:28Z","timestamp":1706076148000},"page":"291-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Do Datapoints Argue?: Argumentation for\u00a0Hierarchical Agreement in\u00a0Datasets"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2076-3246","authenticated-orcid":false,"given":"Ayush","family":"Bahuguna","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6781-8981","authenticated-orcid":false,"given":"Sajjad","family":"Haydar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9379-4281","authenticated-orcid":false,"given":"Andreas","family":"Br\u00e4nnstr\u00f6m","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4072-8795","authenticated-orcid":false,"given":"Juan Carlos","family":"Nieves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,25]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Arvapally, R.S., Liu, X.F., Nah, F.F.H., Jiang, W.: Identifying outlier opinions in an online intelligent argumentation system. Concurrency and Comput. Pract. Exp. 33(8), e4107 (2021). https:\/\/doi.org\/10.1002\/cpe.4107, https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/cpe.4107, e4107 CPE-16-0123.R3","key":"31_CR1","DOI":"10.1002\/cpe.4107"},{"doi-asserted-by":"publisher","unstructured":"Baroni, P., Rago, A., Toni, F.: From fine-grained properties to broad principles for gradual argumentation: A principled spectrum. Int. J. Approximate Reasoning 105, 252\u2013286 (2019). https:\/\/doi.org\/10.1016\/j.ijar.2018.11.019, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0888613X18304651","key":"31_CR2","DOI":"10.1016\/j.ijar.2018.11.019"},{"doi-asserted-by":"publisher","unstructured":"Bhuyan, M., Nieves, J.: Argumentation-based adversarial regression with multiple learners. In: 2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 96\u2013104 (10 2022). https:\/\/doi.org\/10.1109\/ICTAI56018.2022.00023","key":"31_CR3","DOI":"10.1109\/ICTAI56018.2022.00023"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-030-85896-4_14","volume-title":"Web and Big Data","author":"P Chen","year":"2021","unstructured":"Chen, P., Sun, H., Chen, Z.: Data poisoning attacks on crowdsourcing learning. In: U, L.H., Spaniol, M., Sakurai, Y., Chen, J. (eds.) APWeb-WAIM 2021. LNCS, vol. 12858, pp. 164\u2013179. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85896-4_14"},{"issue":"13","key":"31_CR5","first-page":"1","volume":"19","author":"R Chen","year":"2018","unstructured":"Chen, R., Paschalidis, I.C.: A robust learning approach for regression models based on distributionally robust optimization. J. Mach. Learn. Res. 19(13), 1\u201348 (2018)","journal-title":"J. Mach. Learn. Res."},{"key":"31_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-030-29765-7_3","volume-title":"Symbolic and Quantitative Approaches to Reasoning with Uncertainty","author":"J Delobelle","year":"2019","unstructured":"Delobelle, J., Villata, S.: Interpretability of gradual semantics in abstract argumentation. In: Kern-Isberner, G., Ognjanovi\u0107, Z. (eds.) ECSQARU 2019. LNCS (LNAI), vol. 11726, pp. 27\u201338. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29765-7_3"},{"doi-asserted-by":"crossref","unstructured":"Desmond, M., et al.: Increasing the speed and accuracy of data labeling through an ai assisted interface. In: 26th International Conference on Intelligent User Interfaces, pp. 392\u2013401 (2021)","key":"31_CR7","DOI":"10.1145\/3397481.3450698"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1007\/978-3-030-41579-2_40","volume-title":"Information and Communications Security","author":"Y Dong","year":"2020","unstructured":"Dong, Y., Chen, X., Shen, L., Wang, D.: Privacy-preserving distributed machine learning based on secret sharing. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) ICICS 2019. LNCS, vol. 11999, pp. 684\u2013702. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41579-2_40"},{"doi-asserted-by":"publisher","unstructured":"Doshi, P., Qu, X., Goodie, A.: Chapter 8 - decision-theoretic planning in multiagent settings with application to behavioral modeling. In: Sukthankar, G., Geib, C., Bui, H.H., Pynadath, D.V., Goldman, R.P. (eds.) Plan, Activity, and Intent Recognition, pp. 205\u2013224. Morgan Kaufmann, Boston (2014). https:\/\/doi.org\/10.1016\/B978-0-12-398532-3.00008-7, https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780123985323000087","key":"31_CR9","DOI":"10.1016\/B978-0-12-398532-3.00008-7"},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-030-64148-1_13","volume-title":"Product-Focused Software Process Improvement","author":"T Fredriksson","year":"2020","unstructured":"Fredriksson, T., Mattos, D.I., Bosch, J., Olsson, H.H.: Data labeling: an empirical investigation into industrial challenges and mitigation strategies. In: Morisio, M., Torchiano, M., Jedlitschka, A. (eds.) PROFES 2020. LNCS, vol. 12562, pp. 202\u2013216. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64148-1_13"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1134\/S0361768818060142","volume":"44","author":"RA Gilyazev","year":"2018","unstructured":"Gilyazev, R.A., Turdakov, D.Y.: Active learning and crowdsourcing: a survey of optimization methods for data labeling. Program. Comput. Softw. 44, 476\u2013491 (2018)","journal-title":"Program. Comput. Softw."},{"doi-asserted-by":"publisher","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep learning: The MIT Press, 2016, 800 pp, ISBN: 0262035618. Genetic Programming and Evolvable Machines 19 (10 2017). https:\/\/doi.org\/10.1007\/s10710-017-9314-z","key":"31_CR12","DOI":"10.1007\/s10710-017-9314-z"},{"unstructured":"Hoffer, E., Hubara, I., Soudry, D.: Train longer, generalize better: closing the generalization gap in large batch training of neural networks (2018)","key":"31_CR13"},{"doi-asserted-by":"publisher","unstructured":"Hossain, A., Naik, D.N.: A comparative study on detection of influential observations in linear regression. Stat. Papers 32(1), 55\u201369 (1991). https:\/\/doi.org\/10.1007\/BF02925479","key":"31_CR14","DOI":"10.1007\/BF02925479"},{"doi-asserted-by":"crossref","unstructured":"Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., Li, B.: Manipulating machine learning: poisoning attacks and countermeasures for regression learning. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 19\u201335. IEEE (2018)","key":"31_CR15","DOI":"10.1109\/SP.2018.00057"},{"key":"31_CR16","first-page":"4211","volume":"33","author":"JV Jeyakumar","year":"2020","unstructured":"Jeyakumar, J.V., Noor, J., Cheng, Y.H., Garcia, L., Srivastava, M.: How can i explain this to you? an empirical study of deep neural network explanation methods. Adv. Neural. Inf. Process. Syst. 33, 4211\u20134222 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"35","key":"31_CR17","first-page":"1","volume":"1","author":"P Lison","year":"2015","unstructured":"Lison, P.: An introduction to machine learning. Lang. Technol. Group (LTG) 1(35), 1\u201335 (2015)","journal-title":"Lang. Technol. Group (LTG)"},{"doi-asserted-by":"publisher","unstructured":"Littman, M.: Markov decision processes. In: Smelser, N.J., Baltes, P.B. (eds.) International Encyclopedia of the Social & Behavioral Sciences, pp. 9240\u20139242. Pergamon, Oxford (2001). https:\/\/doi.org\/10.1016\/B0-08-043076-7\/00614-8, https:\/\/www.sciencedirect.com\/science\/article\/pii\/B0080430767006148","key":"31_CR18","DOI":"10.1016\/B0-08-043076-7\/00614-8"},{"unstructured":"Molnar, C.: Interpretable machine learning - a guide for making black box models explainable. https:\/\/christophm.github.io\/interpretable-ml-book\/, Accessed 01 Jun 2023","key":"31_CR19"},{"doi-asserted-by":"publisher","unstructured":"Ning, J., Chen, L., Chen, J.: Relative density-based outlier detection algorithm. In: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, CSAI 2018, pp. 227\u2013231. Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3297156.3297236","key":"31_CR20","DOI":"10.1145\/3297156.3297236"},{"doi-asserted-by":"publisher","unstructured":"Pe\u00f1a, D.: Detecting Outliers and Influential and Sensitive Observations in Linear Regression, pp. 605\u2013619. Springer, London (2023). https:\/\/doi.org\/10.1007\/978-1-4471-7503-2_31","key":"31_CR21","DOI":"10.1007\/978-1-4471-7503-2_31"},{"unstructured":"Potyka, N.: Interpreting neural networks as gradual argumentation frameworks (including proof appendix). CoRR abs\/2012.05738 (2020), https:\/\/arxiv.org\/abs\/2012.05738","key":"31_CR22"},{"doi-asserted-by":"publisher","unstructured":"Riveret, R., Gao, Y., Governatori, G., Rotolo, A., Pitt, J., Sartor, G.: A probabilistic argumentation framework for reinforcement learning agents. Auton. Agents Multi-Agent Syst. 33(1), 216\u2013274 (2019). https:\/\/doi.org\/10.1007\/s10458-019-09404-2","key":"31_CR23","DOI":"10.1007\/s10458-019-09404-2"},{"unstructured":"Sakama, C.: A formal account of deception. In: 2015 AAAI Fall Symposium Series (2015)","key":"31_CR24"},{"unstructured":"Sarkadi, S., McBurney, P.J., Parsons, S.D.: Deceptive storytelling in artificial dialogue games. In: Proceedings of the AAAI 2019 Spring Symposium: Story-Enabled Intelligence (2019)","key":"31_CR25"},{"doi-asserted-by":"publisher","unstructured":"Sayed-Mouchaweh, M., Lughofer, E.: Learning in Non-Stationary Environments: Methods and Applications. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4419-8020-5","key":"31_CR26","DOI":"10.1007\/978-1-4419-8020-5"},{"unstructured":"Smith, S.L., Kindermans, P., Le, Q.V.: Don\u2019t decay the learning rate, increase the batch size. CoRR abs\/1711.00489 (2017). http:\/\/arxiv.org\/abs\/1711.00489","key":"31_CR27"},{"unstructured":"Spieler, J., Potyka, N., Staab, S.: Learning gradual argumentation frameworks using genetic algorithms. CoRR abs\/2106.13585 (2021). https:\/\/arxiv.org\/abs\/2106.13585","key":"31_CR28"},{"key":"31_CR29","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-319-59294-7_33","volume-title":"Multi-Agent Systems and Agreement Technologies","author":"K Takahashi","year":"2017","unstructured":"Takahashi, K., Yokohama, S.: On a formal treatment of deception in argumentative dialogues. In: Criado Pacheco, N., Carrascosa, C., Osman, N., Juli\u00e1n Inglada, V. (eds.) EUMAS\/AT -2016. LNCS (LNAI), vol. 10207, pp. 390\u2013404. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59294-7_33"},{"doi-asserted-by":"publisher","unstructured":"Toni, F.: A tutorial on assumption-based argumentation. Argument Comput. 5(1), 89\u2013117 (2014). https:\/\/doi.org\/10.1080\/19462166.2013.869878","key":"31_CR30","DOI":"10.1080\/19462166.2013.869878"},{"doi-asserted-by":"publisher","unstructured":"Vaidya, N.H.: Security and privacy for distributed optimization & distributed machine learning. In: Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, PODC 2021, p.\u00a0573. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3465084.3467485","key":"31_CR31","DOI":"10.1145\/3465084.3467485"},{"issue":"14","key":"31_CR32","doi-asserted-by":"publisher","first-page":"5386","DOI":"10.3390\/s22145386","volume":"22","author":"SO Westworth","year":"2022","unstructured":"Westworth, S.O., Chalmers, C., Fergus, P., Longmore, S.N., Piel, A.K., Wich, S.A.: Understanding external influences on target detection and classification using camera trap images and machine learning. Sensors 22(14), 5386 (2022)","journal-title":"Sensors"},{"doi-asserted-by":"publisher","unstructured":"Xu, J., Yao, L., Li, L., Ji, M., Tang, G.: Argumentation based reinforcement learning for meta-knowledge extraction. Inf. Sci. 506, 258\u2013272 (2020). https:\/\/doi.org\/10.1016\/j.ins.2019.07.094, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025519307170","key":"31_CR33","DOI":"10.1016\/j.ins.2019.07.094"},{"key":"31_CR34","doi-asserted-by":"publisher","first-page":"215","DOI":"10.5194\/isprs-archives-XLIII-B4-2021-215-2021","volume":"43","author":"G Yu","year":"2021","unstructured":"Yu, G., Zhou, X., Hou, D., Wei, D.: Abnormal crowdsourced data detection using remote sensing image features. Int. Arch. Photogramm. Remote. Sens. Spat. Inf. Sci. 43, 215\u2013221 (2021)","journal-title":"Int. Arch. Photogramm. Remote. Sens. Spat. Inf. Sci."},{"doi-asserted-by":"crossref","unstructured":"Zhang, J., Li, C., Ye, J., Qu, G.: Privacy threats and protection in machine learning. In: Proceedings of the 2020 on Great Lakes Symposium on VLSI, pp. 531\u2013536 (2020)","key":"31_CR35","DOI":"10.1145\/3386263.3407599"}],"container-title":["Communications in Computer and Information Science","Artificial Intelligence. ECAI 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50485-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:08:21Z","timestamp":1706076501000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50485-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031504846","9783031504853"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50485-3_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krak\u00f3w","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecai2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecai2023.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair and SMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"134","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"69","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.86","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.15","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Presented figures are relevant for the ECAI 2023 workshops","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}