{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:23:17Z","timestamp":1760080997341,"version":"3.40.3"},"publisher-location":"Cham","reference-count":74,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031753862"},{"type":"electronic","value":"9783031753879"}],"license":[{"start":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T00:00:00Z","timestamp":1729900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T00:00:00Z","timestamp":1729900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75387-9_16","type":"book-chapter","created":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T08:02:14Z","timestamp":1729843334000},"page":"258-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Traceability and Accountability by Construction"],"prefix":"10.1007","author":[{"given":"Julius","family":"Wenzel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2551-2814","authenticated-orcid":false,"given":"Maximilian A.","family":"K\u00f6hl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5365-2198","authenticated-orcid":false,"given":"Sarah","family":"Sterz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9690-6952","authenticated-orcid":false,"given":"Hanwei","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7113-7376","authenticated-orcid":false,"given":"Andreas","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Fetzer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2766-9615","authenticated-orcid":false,"given":"Holger","family":"Hermanns","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,26]]},"reference":[{"key":"16_CR1","unstructured":"Achiam, J., Adler, S., Agarwal, S., Ahmad, L., Akkaya, I., Aleman, F.L., Almeida, D., Altenschmidt, J., Altman, S., Anadkat, S., et\u00a0al.: Gpt-4 technical report. arXiv preprint arXiv:2303.08774 (2023)"},{"key":"16_CR2","unstructured":"Adebayo, J., Gilmer, J., Goodfellow, I.J., Kim, B.: Local explanation methods for deep neural networks lack sensitivity to parameter values. ICLR Workshop (2018)"},{"key":"16_CR3","doi-asserted-by":"publisher","unstructured":"Alrabbaa, C., Baader, F., Borgwardt, S., Dachselt, R., Koopmann, P., M\u00e9ndez, J.: Evonne: Interactive proof visualization for description logics (system description). In: Blanchette, J., Kov\u00e1cs, L., Pattinson, D. (eds.) Automated Reasoning - 11th International Joint Conference, IJCAR 2022, Haifa, Israel, August 8-10, 2022, Proceedings. Lecture Notes in Computer Science, vol. 13385, pp. 271\u2013280. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-10769-6_16, https:\/\/doi.org\/10.1007\/978-3-031-10769-6_16","DOI":"10.1007\/978-3-031-10769-6_16"},{"key":"16_CR4","doi-asserted-by":"publisher","unstructured":"Alur, R., Fisman, D., Raghothaman, M.: Regular programming for quantitative properties of data streams. In: Thiemann, P. (ed.) Programming Languages and Systems - 25th European Symposium on Programming, ESOP 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings. Lecture Notes in Computer Science, vol.\u00a09632, pp. 15\u201340. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-49498-1_2, https:\/\/doi.org\/10.1007\/978-3-662-49498-1_2","DOI":"10.1007\/978-3-662-49498-1_2"},{"issue":"6","key":"16_CR5","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/0950-7051(96)81920-4","volume":"8","author":"R Andrews","year":"1995","unstructured":"Andrews, R., Diederich, J., Tickle, A.B.: Survey and critique of techniques for extracting rules from trained artificial neural networks. Knowl.-Based Syst. 8(6), 373\u2013389 (1995)","journal-title":"Knowl.-Based Syst."},{"key":"16_CR6","unstructured":"Angwin, J., Larson, J., Mattu, S., Kirchner, L.: Machine Bias (2016), https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Antol, S., Agrawal, A., Lu, J., Mitchell, M., Batra, D., Zitnick, C.L., Parikh, D.: Vqa: Visual question answering. In: Proceedings of the IEEE international conference on computer vision. pp. 2425\u20132433 (2015)","DOI":"10.1109\/ICCV.2015.279"},{"key":"16_CR8","unstructured":"Baehrens, D., Schroeter, T., Harmeling, S., Kawanabe, M., Hansen, K., M\u00fcller, K.: How to explain individual classification decisions. J. MLR (2010)"},{"key":"16_CR9","unstructured":"Baier, C., Katoen, J.: Principles of model checking. MIT Press (2008)"},{"key":"16_CR10","doi-asserted-by":"publisher","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) Verification, Model Checking, and Abstract Interpretation, 5th International Conference, VMCAI 2004, Venice, Italy, January 11-13, 2004, Proceedings. Lecture Notes in Computer Science, vol.\u00a02937, pp. 44\u201357. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-24622-0_5, https:\/\/doi.org\/10.1007\/978-3-540-24622-0_5","DOI":"10.1007\/978-3-540-24622-0_5"},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Monitoring of real-time properties. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings. Lecture Notes in Computer Science, vol.\u00a04337, pp. 260\u2013272. Springer (2006). https:\/\/doi.org\/10.1007\/11944836_25, https:\/\/doi.org\/10.1007\/11944836_25","DOI":"10.1007\/11944836_25"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Bien, J., Tibshirani, R.: Prototype selection for interpretable classification. Ann. Appl. Statist (2011)","DOI":"10.1214\/11-AOAS495"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Biewer, S., Baum, K., Sterz, S., Hermanns, H., Hetmank, S., Langer, M., Lauber-R\u00f6nsberg, A., Lehr, F.: Software doping analysis for human oversight. Formal Methods in System Design pp. 1\u201350 (2024)","DOI":"10.1007\/s10703-024-00445-2"},{"key":"16_CR14","doi-asserted-by":"publisher","unstructured":"Bloem, R., K\u00f6nighofer, B., K\u00f6nighofer, R., Wang, C.: Shield synthesis: - runtime enforcement for reactive systems. In: Baier, C., Tinelli, C. (eds.) Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings. Lecture Notes in Computer Science, vol.\u00a09035, pp. 533\u2013548. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_51, https:\/\/doi.org\/10.1007\/978-3-662-46681-0_51","DOI":"10.1007\/978-3-662-46681-0_51"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Boz, O.: Extracting decision trees from trained neural networks. In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. pp. 456\u2013461 (2002)","DOI":"10.1145\/775047.775113"},{"key":"16_CR16","unstructured":"Burke, L.: The Death and Life of an Admissions Algorithm (2020), https:\/\/www.insidehighered.com\/admissions\/article\/2020\/12\/14\/u-texas-will-stop-using-controversial-algorithm-evaluate-phd"},{"key":"16_CR17","unstructured":"Chang, C., Creager, E., Goldenberg, A., Duvenaud, D.: Explaining image classifiers by counterfactual generation. ICLR (2019)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Chattopadhay, A., Sarkar, A., Howlader, P., Balasubramanian, V.N.: Grad-CAM++: Generalized gradient-based visual explanations for deep convolutional networks. In: WACV (2018)","DOI":"10.1109\/WACV.2018.00097"},{"key":"16_CR19","unstructured":"Chen, C., Li, O., Tao, D., Barnett, A., Rudin, C., Su, J.K.: This looks like that: deep learning for interpretable image recognition. Advances in neural information processing systems 32 (2019)"},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.inffus.2021.11.003","volume":"81","author":"YL Chou","year":"2022","unstructured":"Chou, Y.L., Moreira, C., Bruza, P., Ouyang, C., Jorge, J.: Counterfactuals and causability in explainable artificial intelligence: Theory, algorithms, and applications. Information Fusion 81, 59\u201383 (2022)","journal-title":"Information Fusion"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Chouldechova, A.: Fair prediction with disparate impact: A study of bias in recidivism prediction instruments. Big Data 5(2), 153\u2013163 (2017). https:\/\/doi.org\/10.1089\/big.2016.0047, https:\/\/doi.org\/10.1089\/big.2016.0047","DOI":"10.1089\/big.2016.0047"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Craven, M.W., Shavlik, J.W.: Using sampling and queries to extract rules from trained neural networks. In: Machine learning proceedings 1994, pp. 37\u201345. Elsevier (1994)","DOI":"10.1016\/B978-1-55860-335-6.50013-1"},{"key":"16_CR23","unstructured":"CycloneDX: Machine learning bill of materials (ml-bom), https:\/\/web.archive.org\/web\/20240303083218\/https:\/\/cyclonedx.org\/capabilities\/mlbom\/"},{"key":"16_CR24","unstructured":"Dabkowski, P., Gal, Y.: Real time image saliency for black box classifiers. NIPS (2017)"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"D\u2019Angelo, B., Sankaranarayanan, S., S\u00e1nchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: LOLA: runtime monitoring of synchronous systems. In: 12th International Symposium on Temporal Representation and Reasoning (TIME 2005), 23-25 June 2005, Burlington, Vermont, USA. pp. 166\u2013174. IEEE Computer Society (2005). https:\/\/doi.org\/10.1109\/TIME.2005.26, https:\/\/doi.org\/10.1109\/TIME.2005.26","DOI":"10.1109\/TIME.2005.26"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Dressel, J., Farid, H.: The accuracy, fairness, and limits of predicting recidivism. Science advances 4(1), eaao5580 (2018)","DOI":"10.1126\/sciadv.aao5580"},{"key":"16_CR27","unstructured":"European Parliament and Council of the EU: Regulation of the european parliament and of the council laying down harmonised rules on artificial intelligence and amending regulations (ec) no 300\/2008, (eu) no 167\/2013, (eu) no 168\/2013, (eu) 2018\/858, (eu) 2018\/1139 and (eu) 2019\/2144 and directives 2014\/90\/eu, (eu) 2016\/797 and (eu) 2020\/1828 (artificial intelligence act) (2024), https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L_202401689"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Falcone, Y., Mounier, L., Fernandez, J., Richier, J.: Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods Syst. Des. 38(3), 223\u2013262 (2011). https:\/\/doi.org\/10.1007\/S10703-011-0114-4, https:\/\/doi.org\/10.1007\/s10703-011-0114-4","DOI":"10.1007\/s10703-011-0114-4"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Fong, R.C., Vedaldi, A.: Interpretable explanations of black boxes by meaningful perturbation. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.371"},{"key":"16_CR30","unstructured":"Foundation, T.L.: Spdx ai, https:\/\/web.archive.org\/web\/20240405072139\/https:\/\/spdx.dev\/learn\/areas-of-interest\/ai\/"},{"issue":"2","key":"16_CR31","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/356924.356929","volume":"16","author":"H Gallaire","year":"1984","unstructured":"Gallaire, H., Minker, J., Nicolas, J.M.: Logic and databases: A deductive approach. ACM Computing Surveys (CSUR) 16(2), 153\u2013185 (1984)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"16_CR32","doi-asserted-by":"publisher","unstructured":"Gros, T.P., Hermanns, H., Hoffmann, J., Klauck, M., Steinmetz, M.: Deep statistical model checking. In: Gotsman, A., Sokolova, A. (eds.) Formal Techniques for Distributed Objects, Components, and Systems - 40th IFIP WG 6.1 International Conference, FORTE 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15-19, 2020, Proceedings. Lecture Notes in Computer Science, vol. 12136, pp. 96\u2013114. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-50086-3_6, https:\/\/doi.org\/10.1007\/978-3-030-50086-3_6","DOI":"10.1007\/978-3-030-50086-3_6"},{"key":"16_CR33","unstructured":"Heaven, W.D.: Predictive policing algorithms are racist. They need to be dismantled. (2020), https:\/\/www.technologyreview.com\/2020\/07\/17\/1005396\/predictive-policing-algorithms-racist-dismantled-machine-learning-bias-criminal-justice\/"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Jacovi, A., Marasovi\u0107, A., Miller, T., Goldberg, Y.: Formalizing trust in artificial intelligence: Prerequisites, causes and goals of human trust in ai. In: Proceedings of the 2021 ACM conference on fairness, accountability, and transparency. pp. 624\u2013635 (2021)","DOI":"10.1145\/3442188.3445923"},{"key":"16_CR35","doi-asserted-by":"publisher","unstructured":"Jansen, N., K\u00f6nighofer, B., Junges, S., Serban, A., Bloem, R.: Safe reinforcement learning using probabilistic shields (invited paper). In: Konnov, I., Kov\u00e1cs, L. (eds.) 31st International Conference on Concurrency Theory, CONCUR 2020, September 1-4, 2020, Vienna, Austria (Virtual Conference). LIPIcs, vol.\u00a0171, pp. 3:1\u20133:16. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2020). https:\/\/doi.org\/10.4230\/LIPICS.CONCUR.2020.3, https:\/\/doi.org\/10.4230\/LIPIcs.CONCUR.2020.3","DOI":"10.4230\/LIPICS.CONCUR.2020.3"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"K\u00e4stner, L., Langer, M., Lazar, V., Schom\u00e4cker, A., Speith, T., Sterz, S.: On the relation of trust and explainability: Why to engineer for trustworthiness. In: 2021 IEEE 29th international requirements engineering conference workshops (REW). pp. 169\u2013175. IEEE (2021)","DOI":"10.1109\/REW53955.2021.00031"},{"issue":"2","key":"16_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3491209","volume":"55","author":"D Kaur","year":"2022","unstructured":"Kaur, D., Uslu, S., Rittichier, K.J., Durresi, A.: Trustworthy artificial intelligence: a review. ACM computing surveys (CSUR) 55(2), 1\u201338 (2022)","journal-title":"ACM computing surveys (CSUR)"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Langer, M., Oster, D., Speith, T., Hermanns, H., K\u00e4stner, L., Schmidt, E., Sesing, A., Baum, K.: What do we want from explainable artificial intelligence (xai)? - a stakeholder perspective on xai and a conceptual model guiding interdisciplinary xai research. Artificial Intelligence 296, 103473 (2021). https:\/\/doi.org\/10.1016\/j.artint.2021.103473, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0004370221000242","DOI":"10.1016\/j.artint.2021.103473"},{"key":"16_CR39","unstructured":"Larson, J., Mattu, S., Kirchner, L., Angwin, J.: How We Analyzed the COMPAS Recidivism Algorithm (2016), https:\/\/www.propublica.org\/article\/how-we-analyzed-the-compas-recidivism-algorithm"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebraic Methods Program. 78(5), 293\u2013303 (2009). https:\/\/doi.org\/10.1016\/j.jlap.2008.08.004","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"16_CR41","doi-asserted-by":"crossref","unstructured":"Li, O., Liu, H., Chen, C., Rudin, C.: Deep learning for case-based reasoning through prototypes: A neural network that explains its predictions. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a032 (2018)","DOI":"10.1609\/aaai.v32i1.11771"},{"issue":"8","key":"16_CR42","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1038\/s42256-022-00516-1","volume":"4","author":"W Liang","year":"2022","unstructured":"Liang, W., Tadesse, G.A., Ho, D., Fei-Fei, L., Zaharia, M., Zhang, C., Zou, J.: Advances, challenges and opportunities in creating data for trustworthy ai. Nature Machine Intelligence 4(8), 669\u2013677 (2022)","journal-title":"Nature Machine Intelligence"},{"key":"16_CR43","doi-asserted-by":"publisher","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 19:1\u201319:41 (2009). https:\/\/doi.org\/10.1145\/1455526.1455532, https:\/\/doi.org\/10.1145\/1455526.1455532","DOI":"10.1145\/1455526.1455532"},{"key":"16_CR44","unstructured":"Lu, J., Yang, J., Batra, D., Parikh, D.: Hierarchical question-image co-attention for visual question answering. Advances in neural information processing systems 29 (2016)"},{"key":"16_CR45","doi-asserted-by":"publisher","unstructured":"Maier, D., Tekle, K.T., Kifer, M., Warren, D.S.: Datalog: concepts, history, and outlook, p. 3-100. ACM (Sep 2018). https:\/\/doi.org\/10.1145\/3191315.3191317, http:\/\/dx.doi.org\/10.1145\/3191315.3191317","DOI":"10.1145\/3191315.3191317"},{"key":"16_CR46","unstructured":"Meurrens, S.: The Increasing Role of AI in Visa Processing (2021), https:\/\/canadianimmigrant.ca\/immigrate\/immigration-law\/the-increasing-role-of-ai-in-visa-processing"},{"key":"16_CR47","unstructured":"O\u2019Neil, C.: How algorithms rule our working lives (2016), https:\/\/www.theguardian.com\/science\/2016\/sep\/01\/how-algorithms-rule-our-working-lives, Online; accessed: 2023-06-23"},{"key":"16_CR48","unstructured":"Orcale: AI in human resources: The time is now (2019), https:\/\/www.oracle.com\/a\/ocom\/docs\/applications\/hcm\/oracle-ai-in-hr-wp.pdf"},{"key":"16_CR49","unstructured":"Organisation for Economic Co-operation and Development (OECD): Artificial intelligence, machine learning and big data in finance: Opportunities, challenges and implications for policy makers. Tech. rep., OECD, [Paris] : (2021), https:\/\/www.oecd.org\/finance\/financial-markets\/Artificial-intelligence-machine-learning-big-data-in-finance.pdf"},{"key":"16_CR50","unstructured":"Petsiuk, V., Das, A., Saenko, K.: Rise: Randomized input sampling for explanation of black-box models. BMVC (2018)"},{"key":"16_CR51","unstructured":"Phang, J., Park, J., Geras, K.J.: Investigating and simplifying masking-based saliency methods for model interpretability. arXiv preprint arXiv:2010.09750 (2020)"},{"key":"16_CR52","doi-asserted-by":"publisher","unstructured":"Pinisetty, S., Preoteasa, V., Tripakis, S., J\u00e9ron, T., Falcone, Y., Marchand, H.: Predictive runtime enforcement. In: Ossowski, S. (ed.) Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016. pp. 1628\u20131633. ACM (2016). https:\/\/doi.org\/10.1145\/2851613.2851827, https:\/\/doi.org\/10.1145\/2851613.2851827","DOI":"10.1145\/2851613.2851827"},{"key":"16_CR53","doi-asserted-by":"publisher","unstructured":"Pinisetty, S., Roop, P.S., Smyth, S., Allen, N., Tripakis, S., von Hanxleden, R.: Runtime enforcement of cyber-physical systems. ACM Trans. Embed. Comput. Syst. 16(5s), 178:1\u2013178:25 (2017). https:\/\/doi.org\/10.1145\/3126500, https:\/\/doi.org\/10.1145\/3126500","DOI":"10.1145\/3126500"},{"key":"16_CR54","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cwhy should i trust you?\u201d: Explaining the predictions of any classifier. In: SIGKDD. KDD \u201916 (2016)","DOI":"10.18653\/v1\/N16-3020"},{"key":"16_CR55","doi-asserted-by":"crossref","unstructured":"Schlicker, N., Langer, M.: Towards warranted trust: A model on the relation between actual and perceived system trustworthiness. In: Proceedings of Mensch und Computer 2021. pp. 325\u2013329 (2021)","DOI":"10.1145\/3473856.3474018"},{"key":"16_CR56","doi-asserted-by":"publisher","unstructured":"Scholz, B., Jordan, H., Suboti\u0107, P., Westmann, T.: On fast large-scale program analysis in datalog. In: Proceedings of the 25th International Conference on Compiler Construction. CGO \u201916, ACM (Mar 2016). https:\/\/doi.org\/10.1145\/2892208.2892226, http:\/\/dx.doi.org\/10.1145\/2892208.2892226","DOI":"10.1145\/2892208.2892226"},{"key":"16_CR57","unstructured":"Schulz, K., Sixt, L., Tombari, F., Landgraf, T.: Restricting the flow: Information bottlenecks for attribution. arXiv preprint arXiv:2001.00396 (2020)"},{"key":"16_CR58","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: Visual explanations from deep networks via gradient-based localization. In: CVPR (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"16_CR59","doi-asserted-by":"crossref","unstructured":"Sicre, R., Zhang, H., Dejasmin, J., Daaloul, C., Ayache, S., Arti\u00e8res, T.: Dp-net: Learning discriminative parts for image recognition. In: 2023 IEEE International Conference on Image Processing (ICIP). pp. 1230\u20131234. IEEE (2023)","DOI":"10.1109\/ICIP49359.2023.10222053"},{"key":"16_CR60","unstructured":"Smith, E., Vogell, H.: How Your Shadow Credit Score Could Decide Whether You Get an Apartment (2021), https:\/\/www.propublica.org\/article\/how-your-shadow-credit-score-could-decide-whether-you-get-an-apartment, Online; accessed: 2023-06-23"},{"key":"16_CR61","unstructured":"Springenberg, J.T., Dosovitskiy, A., Brox, T., Riedmiller, M.A.: Striving for simplicity: The all convolutional net. ICLR (2015)"},{"key":"16_CR62","doi-asserted-by":"publisher","first-page":"11974","DOI":"10.1109\/ACCESS.2021.3051315","volume":"9","author":"I Stepin","year":"2021","unstructured":"Stepin, I., Alonso, J.M., Catala, A., Pereira-Fari\u00f1a, M.: A survey of contrastive and counterfactual explanation generation methods for explainable artificial intelligence. IEEE Access 9, 11974\u201312001 (2021)","journal-title":"IEEE Access"},{"key":"16_CR63","unstructured":"Sundararajan, M., Taly, A., Yan, Q.: Axiomatic attribution for deep networks. In: ICML (2017)"},{"issue":"6","key":"16_CR64","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/72.728352","volume":"9","author":"AB Tickle","year":"1998","unstructured":"Tickle, A.B., Andrews, R., Golea, M., Diederich, J.: The truth will come to light: Directions and challenges in extracting the knowledge embedded within trained artificial neural networks. IEEE Trans. Neural Networks 9(6), 1057\u20131068 (1998)","journal-title":"IEEE Trans. Neural Networks"},{"key":"16_CR65","unstructured":"Verma, S., Dickerson, J., Hines, K.: Counterfactual explanations for machine learning: A review. arXiv preprint arXiv:2010.105962, 1 (2020)"},{"key":"16_CR66","unstructured":"Wang, X., Wei, J., Schuurmans, D., Le, Q., Chi, E., Narang, S., Chowdhery, A., Zhou, D.: Self-consistency improves chain of thought reasoning in language models. arXiv preprint arXiv:2203.11171 (2022)"},{"key":"16_CR67","unstructured":"Warren, D.H.: Applied logic: its use and implementation as a programming tool (1978)"},{"key":"16_CR68","doi-asserted-by":"crossref","unstructured":"Waters, A., Miikkulainen, R.: Grade: Machine learning support for graduate admissions. AI Magazine 35(1), 64 (Mar 2014). https:\/\/doi.org\/10.1609\/aimag.v35i1.2504, https:\/\/ojs.aaai.org\/index.php\/aimagazine\/article\/view\/2504(2014)","DOI":"10.1609\/aimag.v35i1.2504"},{"key":"16_CR69","unstructured":"Wei, J., Wang, X., Schuurmans, D., Bosma, M., Xia, F., Chi, E., Le, Q.V., Zhou, D., et al.: Chain-of-thought prompting elicits reasoning in large language models. Advances in neural information processing systems 35, 24824\u201324837 (2022)"},{"key":"16_CR70","unstructured":"Wu, C., Liu, J., Wang, X., Dong, X.: Chain of reasoning for visual question answering. Advances in Neural Information Processing Systems 31 (2018)"},{"key":"16_CR71","doi-asserted-by":"crossref","unstructured":"Yang, M., Shkapsky, A., Zaniolo, C.: Scaling up the performance of more powerful datalog systems on multicore machines. The VLDB Journal 26(2), 229\u2013248 (Dec 2016). https:\/\/doi.org\/10.1007\/s00778-016-0448-z, http:\/\/dx.doi.org\/10.1007\/s00778-016-0448-z","DOI":"10.1007\/s00778-016-0448-z"},{"key":"16_CR72","unstructured":"Yu, Z., He, L., Wu, Z., Dai, X., Chen, J.: Towards better chain-of-thought prompting strategies: A survey. arXiv preprint arXiv:2310.04959 (2023)"},{"key":"16_CR73","doi-asserted-by":"crossref","unstructured":"Zhang, H., Torres, F., Sicre, R., Avrithis, Y., Ayache, S.: Opti-cam: Optimizing saliency maps for interpretability. arXiv preprint arXiv:2301.07002 (2023)","DOI":"10.2139\/ssrn.4476687"},{"key":"16_CR74","volume":"196","author":"K Zolna","year":"2020","unstructured":"Zolna, K., Geras, K.J., Cho, K.: Classifier-agnostic saliency map extraction. CVIU 196, 102969 (2020)","journal-title":"Classifier-agnostic saliency map extraction. CVIU"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75387-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T08:05:01Z","timestamp":1729843501000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75387-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,26]]},"ISBN":["9783031753862","9783031753879"],"references-count":74,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75387-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,26]]},"assertion":[{"value":"26 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isola-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}