{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T07:47:58Z","timestamp":1771573678864,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319997391","type":"print"},{"value":"9783319997407","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99740-7_25","type":"book-chapter","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T09:44:08Z","timestamp":1535017448000},"page":"350-369","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Regular Inference on Artificial Neural\u00a0Networks"],"prefix":"10.1007","author":[{"given":"Franz","family":"Mayr","sequence":"first","affiliation":[]},{"given":"Sergio","family":"Yovine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,24]]},"reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75(2), 87\u2013106 (1987)","journal-title":"Inf. Comput."},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Angluin, D.: Computational learning theory: survey and selected bibliography. In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, STOC 1992, pp. 351\u2013369. ACM, New York (1992)","DOI":"10.1145\/129712.129746"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1515\/jaiscr-2017-0019","volume":"7","author":"G Bologna","year":"2017","unstructured":"Bologna, G., Hayashi, Y.: Characterization of symbolic rules embedded in deep DIMLP networks: a challenge to transparency of deep learning. J. Artif. Intell. Soft Comput. Res. 7(4), 265\u2013286 (2017)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"issue":"4","key":"25_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/S1467-0895(02)00068-4","volume":"3","author":"TG Calderon","year":"2002","unstructured":"Calderon, T.G., Cheh, J.J.: A roadmap for future neural networks research in auditing and risk assessment. Int. J. Account. Inf. Syst. 3(4), 203\u2013236 (2002). Second International Research Symposium on Accounting Information Systems","journal-title":"Int. J. Account. Inf. Syst."},{"key":"25_CR5","volume-title":"Model Checking","author":"EM Clarke Jr","year":"1999","unstructured":"Clarke Jr., E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Deng, L., Chen, J.: Sequence classification using the high-level features extracted from deep neural networks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6844\u20136848, May 2014","DOI":"10.1109\/ICASSP.2014.6854926"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45014-9_1","volume-title":"Multiple Classifier Systems","author":"TG Dietterich","year":"2000","unstructured":"Dietterich, T.G.: Ensemble methods in machine learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol. 1857, pp. 1\u201315. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45014-9_1"},{"issue":"6","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/72.963769","volume":"12","author":"FA Gers","year":"2001","unstructured":"Gers, F.A., Schmidhuber, E.: LSTM recurrent networks learn simple context-free and context-sensitive languages. IEEE Trans. Neural Netw. 12(6), 1333\u20131340 (2001)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"3","key":"25_CR9","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1162\/neco.1992.4.3.393","volume":"4","author":"CL Giles","year":"1992","unstructured":"Giles, C.L., Miller, C.B., Chen, D., Chen, H.H., Sun, G.Z., Lee, Y.C.: Learning and extracting finite state automata with second-order recurrent neural networks. Neural Comput. 4(3), 393\u2013405 (1992)","journal-title":"Neural Comput."},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Gilpin, L.H., Bau, D., Yuan, B.Z., Bajwa, A., Specter, M., Kagal, L.: Explaining explanations: an approach to evaluating interpretability of machine learning. CoRR abs\/1806.00069 (2018)","DOI":"10.1109\/DSAA.2018.00018"},{"issue":"3","key":"25_CR11","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/S0019-9958(78)90562-4","volume":"37","author":"EM Gold","year":"1978","unstructured":"Gold, E.M.: Complexity of automaton identification from given data. Inf. Control 37(3), 302\u2013320 (1978)","journal-title":"Inf. Control"},{"key":"25_CR12","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1162\/tacl_a_00114","volume":"4","author":"K Gorman","year":"2016","unstructured":"Gorman, K., Sproat, R.: Minimally supervised number normalization. TACL 4, 507\u2013519 (2016)","journal-title":"TACL"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Grzes, M., Taylor, M. (eds.): Proceedings of the Adaptive and Learning Agents Workshop (2010)","DOI":"10.1007\/978-3-642-11814-2"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Guidotti, R., Monreale, A., Turini, F., Pedreschi, D., Giannotti, F.: A survey of methods for explaining black box models. CoRR abs\/1802.01933 (2018)","DOI":"10.1145\/3236009"},{"key":"25_CR15","unstructured":"Heinz, J., de la Higuera, C., van Zaanen, M.: Formal and empirical grammatical inference. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Tutorial Abstracts of ACL 2011, HLT 2011, pp. 2:1\u20132:83. Association for Computational Linguistics, Stroudsburg (2011)"},{"key":"25_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139194655","volume-title":"Grammatical Inference: Learning Automata and Grammars","author":"C de la Higuera","year":"2010","unstructured":"de la Higuera, C.: Grammatical Inference: Learning Automata and Grammars. Cambridge University Press, New York (2010)"},{"issue":"8","key":"25_CR17","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"25_CR18","unstructured":"Holzinger, A., Biemann, C., Pattichis, C.S., Kell, D.B.: What do we need to build explainable AI systems for the medical domain? arXiv:1712.09923 (2017)"},{"key":"25_CR19","unstructured":"Holzinger, A., Plass, M., Holzinger, K., Crisan, G.C., Pintea, C.M., Palade, V.: A glass-box interactive machine learning approach for solving NP-hard problems with the human-in-the-loop. arXiv:1708.01104 (2017)"},{"key":"25_CR20","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436\u2013444 (2015)","journal-title":"Nature"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Lei, T., Barzilay, R., Jaakkola, T.: Rationalizing neural predictions. In: Empirical Methods in Natural Language Processing (EMNLP) (2016)","DOI":"10.18653\/v1\/D16-1011"},{"key":"25_CR22","unstructured":"Malhotra, P., Vig, L., Shroff, G., Agarwal, P.: Long short term memory networks for anomaly detection in time series. In: Proceedings of 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (2015)"},{"issue":"4","key":"25_CR23","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF02478259","volume":"5","author":"WS McCulloch","year":"1943","unstructured":"McCulloch, W.S., Pitts, W.: A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5(4), 115\u2013133 (1943)","journal-title":"Bull. Math. Biophys."},{"key":"25_CR24","unstructured":"Merten, M.: Active automata learning for real life applications (2013)"},{"key":"25_CR25","unstructured":"Murphy, K.: Passively learning finite automata. Technical report, 96-04-017, Santa Fe Institute (1996)"},{"issue":"6","key":"25_CR26","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1145\/235809.235811","volume":"43","author":"CW Omlin","year":"1996","unstructured":"Omlin, C.W., Giles, C.L.: Constructing deterministic finite-state automata in recurrent neural networks. J. ACM 43(6), 937\u2013972 (1996)","journal-title":"J. ACM"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Pascanu, R., Stokes, J.W., Sanossian, H., Marinescu, M., Thomas, A.: Malware classification with recurrent networks. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2015, South Brisbane, 19\u201324 April 2015, pp. 1916\u20131920 (2015)","DOI":"10.1109\/ICASSP.2015.7178304"},{"issue":"4","key":"25_CR28","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/TASLP.2014.2303296","volume":"22","author":"R Sarikaya","year":"2014","unstructured":"Sarikaya, R., Hinton, G.E., Deoras, A.: Application of deep belief networks for natural language understanding. IEEE\/ACM Trans. Audio Speech Lang. Process. 22(4), 778\u2013784 (2014)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"11","key":"25_CR29","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"LG Valiant","year":"1984","unstructured":"Valiant, L.G.: A theory of the learnable. Commun. ACM 27(11), 1134\u20131142 (1984)","journal-title":"Commun. ACM"},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Wang, Y., Tian, F.: Recurrent residual learning for sequence classification. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, EMNLP 2016, Austin, 1\u20134 November 2016, pp. 938\u2013943 (2016)","DOI":"10.18653\/v1\/D16-1093"},{"key":"25_CR31","unstructured":"Weiss, G., Goldberg, Y., Yahav, E.: Extracting automata from recurrent neural networks using queries and counterexamples. In: Dy, J., Krause, A. (eds.) Proceedings of the 35th International Conference on Machine Learning, PMLR, vol. 80. Stockholmsm\u00e4ssan, Stockholm, 10\u201315 July 2018"},{"issue":"1","key":"25_CR32","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1882471.1882478","volume":"12","author":"Z Xing","year":"2010","unstructured":"Xing, Z., Pei, J., Keogh, E.: A brief survey on sequence classification. SIGKDD Explor. Newsl. 12(1), 40\u201348 (2010)","journal-title":"SIGKDD Explor. Newsl."},{"issue":"6","key":"25_CR33","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.patrec.2004.09.045","volume":"26","author":"C Zhang","year":"2005","unstructured":"Zhang, C., Jiang, J., Kamel, M.: Intrusion detection using hierarchical neural networks. Pattern Recognit. Lett. 26(6), 779\u2013791 (2005)","journal-title":"Pattern Recognit. Lett."},{"issue":"5","key":"25_CR34","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TKDE.2015.2510010","volume":"28","author":"C Zhou","year":"2016","unstructured":"Zhou, C., Cule, B., Goethals, B.: Pattern based sequence classification. IEEE Trans. Knowl. Data Eng. 28(5), 1285\u20131298 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR35","unstructured":"Zhou, C., Sun, C., Liu, Z., Lau, F.C.M.: A C-LSTM neural network for text classification. CoRR abs\/1511.08630 (2015)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Extraction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99740-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T12:02:35Z","timestamp":1710331355000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99740-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319997391","9783319997407"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99740-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"24 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-MAKE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Cross-Domain Conference for Machine Learning and Knowledge Extraction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cd-make2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cd-make.net\/about\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}