{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T16:52:57Z","timestamp":1770915177610,"version":"3.50.1"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s00146-022-01591-z","type":"journal-article","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T14:24:51Z","timestamp":1669299891000},"page":"685-696","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Toward safe AI"],"prefix":"10.1007","volume":"38","author":[{"given":"Andres","family":"Morales-Forero","sequence":"first","affiliation":[]},{"given":"Samuel","family":"Bassetto","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Coatanea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,23]]},"reference":[{"key":"1591_CR1","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.ajo.2020.02.022","volume":"214","author":"MD Abr\u00e0moff","year":"2020","unstructured":"Abr\u00e0moff MD, Tobey D, Char DS (2020) Lessons learned about autonomous ai: finding a safe, efficacious, and ethical path through the development process. Am J Ophthalmol 214:134\u2013142","journal-title":"Am J Ophthalmol"},{"key":"1591_CR2","unstructured":"Agarwal A, Beygelzimer A, Dud\u00edk M, Langford J, Wallach H (2018) A reductions approach to fair classification. In International conference on machine learning, pp 60\u201369"},{"key":"1591_CR3","unstructured":"Agarwal S, Farid H, Gu Y, He M, Nagano K, Li H (2019) Protecting world leaders against deep fakes. In Cvpr workshops, pp 38\u201345"},{"issue":"11","key":"1591_CR4","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3390\/biom9110673","volume":"9","author":"J Akatsuka","year":"2019","unstructured":"Akatsuka J, Yamamoto Y, Sekine T, Numata Y, Morikawa H, Tsutsumi K (2019) Illuminating clues of cancer buried in prostate mr image: deep learning and expert approaches. Biomolecules 9(11):673","journal-title":"Biomolecules"},{"key":"1591_CR5","unstructured":"Alvarez-Melis D, Jaakkola TS (2018) Towards robust interpretability with self- explaining neural networks. http:\/\/arxiv.org\/abs\/1806.07538. Accessed 29 Jan 2021"},{"key":"1591_CR6","unstructured":"Amodei D,  Clark J (2016) Faulty reward functions in the wild. https:\/\/openai.com\/blog\/faulty-reward-functions. Accessed 1 Jul 2021"},{"key":"1591_CR7","unstructured":"Amodei D, Olah C, Steinhardt J, Christiano P, Schulman J, Man\u00b4e D (2016) Concrete problems in ai safety. Retrieved 14 Mar 2020, from http:\/\/arxiv.org\/abs\/1606.06565"},{"key":"1591_CR8","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/978-3-642-77281-8_26","volume-title":"Structured document image analysis","author":"HS Baird","year":"1992","unstructured":"Baird HS (1992) Document image defect models. Structured document image analysis. Springer, New York, pp 546\u2013556"},{"key":"1591_CR9","first-page":"17","volume":"2","author":"J Baker-Brunnbauer","year":"2021","unstructured":"Baker-Brunnbauer J (2021) Taii framework for trustworthy ai systems. ROBONOMICS J Autom Econ 2:17","journal-title":"ROBONOMICS J Autom Econ"},{"issue":"7","key":"1591_CR10","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.200462","volume":"7","author":"N Beale","year":"2020","unstructured":"Beale N, Battey H, Davison AC, MacKay RS (2020) An unethical optimization principle. R Soc Open Sci 7(7):200462","journal-title":"R Soc Open Sci"},{"key":"1591_CR11","unstructured":"Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines. Retrieved 20 Feb 2021. https:\/\/arxiv.org\/abs\/1206.6389"},{"key":"1591_CR12","unstructured":"Bolukbasi T, Chang K.-W, Zou JY, Saligrama V, Kalai AT (2016) Man is to computer programmer as woman is to homemaker? debiasing word embeddings. In Advances in neural information processing systems. MIT Press, pp 4349\u20134357"},{"key":"1591_CR13","volume-title":"Time series analysis: forecasting and control","author":"GE Box","year":"2015","unstructured":"Box GE, Jenkins GM, Reinsel GC, Ljung GM (2015) Time series analysis: forecasting and control. Wiley, New York"},{"key":"1591_CR14","unstructured":"Buolamwini JA (2017) Gender shades: intersectional phenotypic and demographic evaluation of face datasets and gender classifiers (Unpublished doctoral dissertation). Massachusetts Institute of Technology."},{"issue":"8","key":"1591_CR15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.21037\/atm.2019.04.07","volume":"7","author":"F Cabitza","year":"2019","unstructured":"Cabitza F, Zeitoun J-D (2019) The proof of the pudding: in praise of a culture of real-world validation for medical artificial intelligence. Ann Transl Med 7(8):161","journal-title":"Ann Transl Med"},{"key":"1591_CR16","unstructured":"Cabour G, Morales A, Ledoux E\u00b4, Bassetto S (2021) Towards an explanation space to align humans and explainable-ai teamwork. Retrieved 25 Jan 2021. https:\/\/arxiv.org\/abs\/2106.01503"},{"key":"1591_CR17","doi-asserted-by":"publisher","unstructured":"Card D, Zhang M, Smith NA (2019) Deep weighted averaging classifiers. proceedings of the conference on fairness, accountability and transparency, pp 369\u2013378.  Retrieved 28 Jan 2021. http:\/\/arxiv.org\/abs\/1811.02579. https:\/\/doi.org\/10.1145\/3287560.3287595","DOI":"10.1145\/3287560.3287595"},{"key":"1591_CR18","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Adversarial examples are not easily detected: Bypassing ten detection methods. In Proceedings of the 10th acm workshop on artificial intelligence and security, pp 3\u201314","DOI":"10.1145\/3128572.3140444"},{"key":"1591_CR19","unstructured":"CBC (2021) Whistleblower testifies facebook chooses profit over safety, calls for \u2019congressional action\u2019. CBC News. https:\/\/www.cbc.ca\/news\/world\/facebook-whistleblower-testifies-profit-safety-1.6199886. Accessed 18 Feb 2022"},{"issue":"12","key":"1591_CR20","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1038\/s42256-020-00265-z","volume":"2","author":"Z Chen","year":"2020","unstructured":"Chen Z, Bei Y, Rudin C (2020) Concept whitening for interpretable image recognition. Nat Mach Intell 2(12):772\u2013782","journal-title":"Nat Mach Intell"},{"key":"1591_CR21","unstructured":"Chen X, Liu C, Li B, Lu K, Song D (2017) Targeted backdoor attacks on deep learning systems using data poisoning. Retrieved 25 Jan 2021. http:\/\/arxiv.org\/abs\/1712.05526"},{"key":"1591_CR22","unstructured":"European Commission (2019) Ethics guidelines for trustworthy ai. Retrieved from https:\/\/ec.europa.eu\/futurium\/en\/ai-alliance-consultation.1.html"},{"issue":"12","key":"1591_CR23","doi-asserted-by":"publisher","first-page":"7448","DOI":"10.1109\/TII.2019.2958826","volume":"16","author":"H Dong","year":"2019","unstructured":"Dong H, Song K, He Y, Xu J, Yan Y, Meng Q (2019) Pga-net: Pyramid feature fusion and global context attention network for automated surface defect detection. IEEE Trans Industr Inf 16(12):7448\u20137458","journal-title":"IEEE Trans Industr Inf"},{"key":"1591_CR24","unstructured":"Eckersley P (2018) Impossibility and uncertainty theorems in ai value alignment (or why your agi should not have a utility function). Retrieved 20 Mar 2020. https:\/\/arxiv.org\/abs\/1901.00064"},{"key":"1591_CR25","unstructured":"Executive Office of the President of the United States (2019) The national artificial intelligence r&d strategic plan. Retrieved from https:\/\/trumpwhitehouse.archives.gov\/wp-content\/uploads\/2019\/06\/National-AI-Research-and-Development-Strategic-Plan-2019-Update-June-2019.pdf"},{"key":"1591_CR26","unstructured":"Facebook (2022). Facebook\u2019s five pillars of responsible ai. https:\/\/ai.facebook.com\/blog\/facebooks-five-pillars-of-responsible-ai\/. Accessed 18 Feb 2022"},{"issue":"4","key":"1591_CR27","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TPAMI.2006.79","volume":"28","author":"L Fei-Fei","year":"2006","unstructured":"Fei-Fei L, Fergus R, Perona P (2006) One-shot learning of object categories. IEEE Trans Pattern Anal Mach Intell 28(4):594\u2013611","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1591_CR28","doi-asserted-by":"crossref","unstructured":"Fidel G, Bitton R, Shabtai A (2019) When explainability meets adversarial learning: Detecting adversarial examples using SHAP Signatures. http:\/\/arxiv.org\/abs\/1909.03418. Accessed 17 Dec 2020","DOI":"10.1109\/IJCNN48605.2020.9207637"},{"key":"1591_CR29","unstructured":"Fink M (2005) Object classification from a single example utilizing class relevance metrics. In Advances in neural information processing systems, pp 449\u2013456"},{"key":"1591_CR30","doi-asserted-by":"crossref","unstructured":"Georgakis G, Mousavian A, Berg AC, Kosecka J (2017) Synthesizing training data for object detection in indoor scenes. Retrieved 01 Dec 2020. https:\/\/arxiv.org\/abs\/1702.07836","DOI":"10.15607\/RSS.2017.XIII.043"},{"issue":"11","key":"1591_CR31","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1001\/jamainternmed.2018.3763","volume":"178","author":"MA Gianfrancesco","year":"2018","unstructured":"Gianfrancesco MA, Tamang S, Yazdany J, Schmajuk G (2018) Potential biases in machine learning algorithms using electronic health record data. JAMA Intern Med 178(11):1544\u20131547","journal-title":"JAMA Intern Med"},{"key":"1591_CR32","unstructured":"Government of Canada (2021) Responsible use of artificial intelligence (ai). Retrieved 04 Feb 2021. https:\/\/www.canada.ca\/en\/government\/system\/digital-government\/digital-government-innovations\/responsible-use-ai.html#toc1"},{"key":"1591_CR33","unstructured":"Grosse K, Manoharan P, Papernot N, Backes M, McDaniel P (2017) On the (statistical) detection of adversarial examples. Retrieved 21 Feb 2021. https:\/\/arxiv.org\/abs\/1702.06280"},{"key":"1591_CR34","unstructured":"Hadfield-Menell D, Russell SJ, Abbeel P, Dragan A (2016) Cooperative inverse reinforcement learning. In Advances in neural information processing systems. MIT Press, pp 3909\u20133917"},{"key":"1591_CR35","doi-asserted-by":"crossref","unstructured":"Hallows R, Glazier L, Katz M, Aznar M, Williams M (2021) Safe and ethical artificial intelligence in radiotherapy\u2013lessons learned from the aviation industry. Clinical Oncology, 34(2), 99-101","DOI":"10.1016\/j.clon.2021.11.019"},{"issue":"4","key":"1591_CR36","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1109\/TIM.2019.2915404","volume":"69","author":"Y He","year":"2019","unstructured":"He Y, Song K, Meng Q, Yan Y (2019) An end-to-end steel surface defect detection approach via fusing multiple hierarchical features. IEEE Trans Instrum Meas 69(4):1493\u20131504","journal-title":"IEEE Trans Instrum Meas"},{"key":"1591_CR37","unstructured":"He H, Bai Y, Garcia EA, Li S (2008) Adasyn: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp 1322\u20131328"},{"key":"1591_CR38","unstructured":"Hendrycks D, Gimpel K (2016) Early methods for detecting adversarial images. Retrieved 01 Dec 2020. https:\/\/arxiv.org\/abs\/1608.00530"},{"key":"1591_CR39","doi-asserted-by":"crossref","unstructured":"Hibbard B (2012) Decision support for safe ai design. In: International conference on artificial general intelligence, pp 117\u2013125","DOI":"10.1007\/978-3-642-35506-6_13"},{"key":"1591_CR40","unstructured":"IBM(2022). Explainable ai. https:\/\/www.ibm.com\/watson\/explainable-ai?utmcontent=SRCWW&p1=Search&p4=43700064515261160&p5=p&gclid=Cj0KCQiApL2QBhC8ARIsAGMm-KHAqR9Gb S91U33HXTEtZKshdCJbM4Qw7D7aVFO6fyOAEgMAkFrc8aAuNFEALwwcB&gclsrc=aw.ds. Accessed 18 Feb 2022"},{"key":"1591_CR41","unstructured":"International Organization for Standardization (2020a). Ergonomics of human-system interaction\u2014Part 110: Interaction principles. Retrieved 3 May 2021. https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:9241:-110:ed-2:v1:en"},{"key":"1591_CR42","unstructured":"International Organization for Standardization (2020b). Information technology\u2014Artificial intelligence\u2014Overview of trustworthiness in artificial intelligence. Retrieved 3 May 2021. https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:tr:24028:ed-1:v1:en"},{"key":"1591_CR43","unstructured":"Jiang H, Nachum O (2020) Identifying and correcting label bias in machine learning. In International Conference on Artificial Intelligence and Statistics 702\u2013712"},{"issue":"3","key":"1591_CR44","doi-asserted-by":"publisher","first-page":"405","DOI":"10.3348\/kjr.2019.0025","volume":"20","author":"DW Kim","year":"2019","unstructured":"Kim DW, Jang HY, Kim KW, Shin Y, Park SH (2019) Design characteristics of studies reporting the performance of artificial intelligence algorithms for diagnostic analysis of medical images: results from recently published papers. Korean J Radiol 20(3):405\u2013410","journal-title":"Korean J Radiol"},{"issue":"1","key":"1591_CR45","doi-asserted-by":"publisher","first-page":"i","DOI":"10.1002\/j.2333-8504.2011.tb02255.x","volume":"2011","author":"JL Kobrin","year":"2011","unstructured":"Kobrin JL, Sinharay S, Haberman SJ, Chajewski M (2011) An investigation of the fit of linear regression models to data from an sat\u00ae validity study. ETS Res Rep Ser 2011(1):i\u201321","journal-title":"ETS Res Rep Ser"},{"key":"1591_CR46","unstructured":"Koh PW, Liang P (2017) Understanding black-box predictions via influence functions. In International Conference on Machine Learning, pp 1885\u20131894"},{"key":"1591_CR47","unstructured":"Koo J, Roth M, Bagchi S (2019) HAWKEYE: Adversarial Example Detector for Deep Neural Networks. http:\/\/arxiv.org\/abs\/1909.09938. Accessed 12 Feb 2021"},{"issue":"1","key":"1591_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-019-08987-4","volume":"10","author":"S Lapuschkin","year":"2019","unstructured":"Lapuschkin S, Waldchen S, Binder A, Montavon G, Samek W, Muller K-R (2019) Unmasking clever hans predictors and assessing what machines really learn. Nat Commun 10(1):1\u20138","journal-title":"Nat Commun"},{"key":"1591_CR49","doi-asserted-by":"crossref","unstructured":"Lapuschkin S, Binder A, Montavon G, Muller KR, Samek W (2016) Analyzing classifiers: Fisher vectors and deep neural networks. In\u00a0Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 2912\u20132920","DOI":"10.1109\/CVPR.2016.318"},{"key":"1591_CR50","doi-asserted-by":"crossref","unstructured":"Li Y, Chang M.-C, Lyu S (2018) In ictu oculi: Exposing ai generated fake face videos by detecting eye blinking. Retrieved 01 Dec 2020. https:\/\/arxiv.org\/abs\/1806.02877","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"1591_CR51","unstructured":"Lundberg SM, Lee S-I (2017) A unified approach to interpreting Model predictions. In: I. Guyon et al. (Eds) Advances in Neural Information Processing Systems 30. Curran Associates, Inc., pp 4765\u20134774. http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf. Accessed 8 Oct 2020"},{"key":"1591_CR52","doi-asserted-by":"crossref","unstructured":"Maimon OZ, Rokach L (2014) Data mining with decision trees: theory and applications. World scientific. 81","DOI":"10.1142\/9097"},{"key":"1591_CR53","unstructured":"Marcus G, Davis E (2019) Rebooting ai: Building artificial intelligence we can trust. Pantheon"},{"key":"1591_CR54","doi-asserted-by":"crossref","unstructured":"Mei S, Zhu X (2015) Using machine teaching to identify optimal training-set attacks on machine learners. In Proceedings of the aaai conference on artificial intelligence vol 29","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"1591_CR55","doi-asserted-by":"crossref","unstructured":"Meng D, Chen H (2017) Magnet: a two-pronged defense against adversarial examples. In Proceedings of the 2017 acm sigsac conference on computer and communications security, pp 135\u2013147","DOI":"10.1145\/3133956.3134057"},{"key":"1591_CR56","unstructured":"Ministry of Science and Technology (MOST) of China (2021) New generation artificial intelligence ethics specifications. Retrieved 4 Feb 2021. http:\/\/www.most.gov.cn\/kjbgz\/202109\/t20210926177063.html"},{"issue":"7540","key":"1591_CR57","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih V, Kavukcuoglu K, Silver D, Rusu AA, Veness J, Bellemare MG (2015) Human-level control through deep reinforcement learning. Nature 518(7540):529\u2013533","journal-title":"Nature"},{"key":"1591_CR58","doi-asserted-by":"publisher","unstructured":"Morales-Forero A, Bassetto S (2019) Case study: a semi-supervised methodology for anomaly detection and diagnosis. In 2019 ieee international conference on industrial engineering and engineering management (ieem). IEEE, pp 1031\u20131037. https:\/\/doi.org\/10.1109\/IEEM44572.2019.8978509","DOI":"10.1109\/IEEM44572.2019.8978509"},{"issue":"6","key":"1591_CR59","first-page":"944","volume":"75","author":"S Mor-Yosef","year":"1990","unstructured":"Mor-Yosef S, Samueloff A, Modan B, Navot D, Schenker JG (1990) Ranking the risk factors for cesarean: logistic regression analysis of a nationwide study. Obstet Gynecol 75(6):944\u2013947","journal-title":"Obstet Gynecol"},{"key":"1591_CR60","unstructured":"N\u00edFhaol\u00e1in L, Hines A, Nallur V (2020) Assessing the appetite for trustworthiness and the regulation\nof artificial intelligence in europe. In: Proceedings of the The 28th irish conference on artificial intelligence and cognitive\nscience, dublin, republic of ireland, 7-8 december 2020. CEUR Workshop Proceedings"},{"issue":"2","key":"1591_CR61","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0933-3657(98)00070-0","volume":"16","author":"D Nauck","year":"1999","unstructured":"Nauck D, Kruse R (1999) Obtaining interpretable fuzzy classification rules from medical data. Artif Intell Med 16(2):149\u2013169","journal-title":"Artif Intell Med"},{"key":"1591_CR62","unstructured":"Papernot N, McDaniel P (2018) Deep k-nearest neighbors: towards confident, interpretable and robust deep learning. http:\/\/arxiv.org\/abs\/1803.04765. Accessed 28 Jan 2021"},{"issue":"6429","key":"1591_CR63","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1126\/science.aaw0029","volume":"363","author":"RB Parikh","year":"2019","unstructured":"Parikh RB, Obermeyer Z, Navathe AS (2019) Regulation of predictive analytics in medicine. Science 363(6429):810\u2013812","journal-title":"Science"},{"issue":"3","key":"1591_CR64","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","volume":"6","author":"K Ren","year":"2020","unstructured":"Ren K, Zheng T, Qin Z, Liu X (2020) Adversarial attacks and defenses in deep learning. Engineering 6(3):346\u2013360","journal-title":"Engineering"},{"key":"1591_CR65","doi-asserted-by":"publisher","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \u201cWhy should i trust you?\u201d Explaining the predictions of any classifier. In: Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. Association for computing machinery, New York, NY, USA, pp 1135\u20131144. Retrieved\nfrom https:\/\/doi.org\/10.1145\/2939672.2939778","DOI":"10.1145\/2939672.2939778"},{"key":"1591_CR66","unstructured":"Rolls-Royce. (2021). The aletheia framework. https:\/\/www.rolls-royce.com\/sustainability\/ethics-and-compliance\/the-aletheia-framework.aspx. Accessed 1 July 2021"},{"issue":"5","key":"1591_CR67","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","volume":"1","author":"C Rudin","year":"2019","unstructured":"Rudin C (2019) Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nat Mach Intell 1(5):206\u2013215","journal-title":"Nat Mach Intell"},{"key":"1591_CR68","doi-asserted-by":"publisher","unstructured":"Selvaraju RR, Cogswell M, Das A, Vedantam R, Parikh D, Batra D (2019) Grad- CAM: visual explanations from deep networks via gradient-based localization. http:\/\/arxiv.org\/abs\/1610.02391. https:\/\/doi.org\/10.1007\/s11263-019-01228-7. Accessed 25 Jan 2021","DOI":"10.1007\/s11263-019-01228-7"},{"key":"1591_CR69","unstructured":"Shafahi A, Huang WR, Najibi M, Suciu O, Studer C, Dumitras T, Goldstein T (2018) Poison frogs! targeted clean-label poisoning attacks on neural networks. Retrieved 01 Dec 2020. https:\/\/arxiv.org\/abs\/1804.00792"},{"key":"1591_CR70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102551","volume":"146","author":"D Shin","year":"2021","unstructured":"Shin D (2021) The effects of explainability and causability on perception, trust, and acceptance: Implications for explainable ai. Int J Hum Comput Stud 146:102551","journal-title":"Int J Hum Comput Stud"},{"issue":"4","key":"1591_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3419764","volume":"10","author":"B Shneiderman","year":"2020","unstructured":"Shneiderman B (2020) Bridging the gap between ethics and practice: guidelines for reliable, safe, and trustworthy human-centered ai systems. ACM Trans Interact Intell Syst (TiiS) 10(4):1\u201331","journal-title":"ACM Trans Interact Intell Syst (TiiS)"},{"key":"1591_CR72","unstructured":"Shrikumar A, Greenside P, Kundaje A (2019) Learning important features through propagating activation differences. http:\/\/arxiv.org\/abs\/1704.02685. Accessed 21 Jan 2021"},{"key":"1591_CR73","unstructured":"Snell J, Swersky K, Zemel R (2017) Prototypical networks for few-shot learning. In Advances in neural information processing systems. MIT Press, pp 4077\u20134087"},{"key":"1591_CR74","unstructured":"Solans D, Biggio B, Castillo C (2020) Poisoning attacks on algorithmic fairness. Retrieved 20 Dec 2021. https:\/\/arxiv.org\/abs\/2004.07401"},{"key":"1591_CR75","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1016\/j.apsusc.2013.09.002","volume":"285","author":"K Song","year":"2013","unstructured":"Song K, Yan Y (2013) A noise robust method based on completed local binary patterns for hot-rolled steel strip surface defects. Appl Surf Sci 285:858\u2013864","journal-title":"Appl Surf Sci"},{"issue":"3","key":"1591_CR76","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1162\/artl_a_00294","volume":"25","author":"KO Stanley","year":"2019","unstructured":"Stanley KO (2019) Why open-endedness matters. Artif Life 25(3):232\u2013235","journal-title":"Artif Life"},{"issue":"6468","key":"1591_CR77","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1126\/science.aag3311","volume":"366","author":"PS Thomas","year":"2019","unstructured":"Thomas PS, da Silva BC, Barto AG, Giguere S, Brun Y, Brunskill E (2019) Preventing undesirable behavior of intelligent machines. Science 366(6468):999\u20131004","journal-title":"Science"},{"issue":"3","key":"1591_CR78","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1089\/big.2016.0051","volume":"5","author":"KR Varshney","year":"2017","unstructured":"Varshney KR, Alemzadeh H (2017) On the safety of machine learning: cyber-physical systems, decision sciences, and data products. Big Data 5(3):246\u2013255","journal-title":"Big Data"},{"key":"1591_CR79","unstructured":"Vasconcelos CN, Vasconcelos BN (2017) Increasing deep learning melanoma classification by classical and expert knowledge-based image transforms. CoRR. http:\/\/arxiv.org\/abs\/1702.07025, 1"},{"key":"1591_CR80","unstructured":"Vinyals O, Blundell C, Lillicrap T, Wierstra D, et al. (2016) Matching networks for one shot learning. In Advances in neural information processing systems. MIT Press, pp 3630\u20133638"},{"issue":"3","key":"1591_CR81","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s10994-011-5268-1","volume":"86","author":"H Xu","year":"2012","unstructured":"Xu H, Mannor S (2012) Robustness and generalization. Mach Learn 86(3):391\u2013423","journal-title":"Mach Learn"},{"key":"1591_CR82","doi-asserted-by":"crossref","unstructured":"Yang X, Li Y, Lyu S (2019) Exposing deep fakes using inconsistent head poses. In Icassp 2019\u20132019 ieee international conference on acoustics, speech and signal processing (icassp), pp 8261\u20138265","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"1591_CR83","unstructured":"Yao L, Chu Z, Li S, Li Y, Gao J, Zhang A (2020) A survey on causal inference. Retrieved 18 Feb 2021. https:\/\/arxiv.org\/abs\/2002.02770"},{"key":"1591_CR84","unstructured":"Zafar MB, Valera I, Rogriguez MG, Gummadi KP (2017) Fairness constraints: mechanisms for fair classification. In Artificial intelligence and statistics. PMLR, pp 962\u2013970"},{"issue":"2","key":"1591_CR85","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-0074-0","volume":"1","author":"W Zheng","year":"2020","unstructured":"Zheng W, Jin M (2020) The effects of class imbalance and training data size on classifier learning: an empirical study. SN Comput Sci 1(2):1\u201313","journal-title":"SN Comput Sci"},{"key":"1591_CR86","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2017) Two-stream neural networks for tampered face detection. In 2017 IEEE conference on computer vision and pattern recognition workshops (cvprw), pp 1831\u20131839","DOI":"10.1109\/CVPRW.2017.229"},{"key":"1591_CR87","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2018) Learning rich features for image manipulation detection. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1053\u20131061","DOI":"10.1109\/CVPR.2018.00116"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-022-01591-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00146-022-01591-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-022-01591-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T06:18:33Z","timestamp":1688105913000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00146-022-01591-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,23]]},"references-count":87,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1591"],"URL":"https:\/\/doi.org\/10.1007\/s00146-022-01591-z","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,23]]},"assertion":[{"value":"30 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}