{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:51:53Z","timestamp":1774453913002,"version":"3.50.1"},"reference-count":102,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T00:00:00Z","timestamp":1708387200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T00:00:00Z","timestamp":1708387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006752","name":"Universidade do Porto","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006752","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the defense sector, artificial intelligence (AI) and machine learning (ML) have been used to analyse and decipher massive volumes of data, namely for target recognition, surveillance, threat detection and cybersecurity, autonomous vehicles and drones guidance, and language translation. However, there are key points that have been identified as barriers or challenges, especially related to data curation. For this reason, and also due to the need for quick response, the defense sector is looking for AI technologies capable of successfully processing and extracting results from huge amounts of unlabelled or very poorly labelled data. This paper presents an in-depth review of AI\/ML algorithms for unsupervised or poorly supervised data, and machine learning operations (MLOps) techniques that are suitable for the defense industry. The algorithms are divided according to their nature, meaning that they either focus on techniques, or on applications. Techniques can belong to the supervision spectrum, or focus on explainability. Applications are either focused on text processing or computer vision. MLOps techniques, tools and practices are then discussed, revealing approaches and reporting experiences with the objective of declaring how to make the operationalization of ML integrated systems more efficient. Despite many contributions from several researchers and industry, further efforts are required to construct substantially robust and reliable models and supporting infrastructures for AI systems, which are reliable and suitable for the defense sector. This review brings up-to-date information regarding AI algorithms and MLOps that will be helpful for future research in the field.<\/jats:p>","DOI":"10.1007\/s10462-023-10692-0","type":"journal-article","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T08:02:26Z","timestamp":1708416146000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Unlabeled learning algorithms and operations: overview and future trends in defense sector"],"prefix":"10.1007","volume":"57","author":[{"given":"Eduardo","family":"e Oliveira","sequence":"first","affiliation":[]},{"given":"Marco","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Paulo","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Ant\u00f3nio M.","family":"Lopes","sequence":"additional","affiliation":[]},{"given":"Ivana Ilic","family":"Mestric","sequence":"additional","affiliation":[]},{"given":"Sandro","family":"Bjelogrlic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,20]]},"reference":[{"issue":"8","key":"10692_CR1","doi-asserted-by":"publisher","first-page":"5789","DOI":"10.1007\/s10462-021-09958-2","volume":"54","author":"FA Acheampong","year":"2021","unstructured":"Acheampong FA, Nunoo-Mensah H, Chen W (2021) Transformer models for text-based emotion detection: a review of bert-based approaches. Artif Intell Rev 54(8):5789\u20135829. https:\/\/doi.org\/10.1007\/s10462-021-09958-2","journal-title":"Artif Intell Rev"},{"key":"10692_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad M, Batcha MS, Jahina SR (2021) Testing Lotka\u2019s law and pattern of author productivity in the scholarly publications of artificial intelligence. arXiv preprint arXiv:2102.09182, https:\/\/doi.org\/10.48550\/ARXIV.2102.09182","DOI":"10.48550\/ARXIV.2102.09182"},{"key":"10692_CR3","unstructured":"Awan AA (2022) Top 7 diffusion-based applications with demos. https:\/\/www.kdnuggets.com\/2022\/10\/top-7-diffusionbased-applications-demos.html. Accessed 15 Dec 2022"},{"key":"10692_CR4","doi-asserted-by":"publisher","unstructured":"Azad N (2022) Understanding devops critical success factors and organizational practices, pp 83\u201390. https:\/\/doi.org\/10.1145\/3524614.3528627,","DOI":"10.1145\/3524614.3528627"},{"key":"10692_CR5","doi-asserted-by":"publisher","unstructured":"Baesens B, H\u00f6ppner S, Verdonck T (2021). Data engineering for fraud detection. https:\/\/doi.org\/10.1016\/j.dss.2021.113492","DOI":"10.1016\/j.dss.2021.113492"},{"key":"10692_CR6","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"A Barredo Arrieta","year":"2020","unstructured":"Barredo Arrieta A, D\u00edaz-Rodr\u00edguez N, Del Ser J et al (2020) Explainable artificial intelligence (xai): concepts, taxonomies, opportunities and challenges toward responsible ai. Inf Fusion 58:82\u2013115","journal-title":"Inf Fusion"},{"key":"10692_CR7","doi-asserted-by":"publisher","unstructured":"Bhalgat Y, Liu Z, Gundecha P et\u00a0al (2019) Teacher-student learning paradigm for tri-training: an efficient method for unlabeled data exploitation. https:\/\/doi.org\/10.48550\/ARXIV.1909.11233, arXiv: 1909.11233","DOI":"10.48550\/ARXIV.1909.11233"},{"key":"10692_CR8","unstructured":"Brownlee J (2019) A gentle introduction to generative adversarial networks (gans). https:\/\/machinelearningmastery.com\/what-are-generative-adversarial-networks-gans\/. Accessed 12 Dec 2022"},{"key":"10692_CR9","doi-asserted-by":"publisher","unstructured":"Caron M, Misra I, Mairal J et\u00a0al (2020) Unsupervised learning of visual features by contrasting cluster assignments. https:\/\/doi.org\/10.48550\/ARXIV.2006.09882, arXiv: 2006.09882","DOI":"10.48550\/ARXIV.2006.09882"},{"key":"10692_CR10","doi-asserted-by":"publisher","unstructured":"Chattopadhay A, Sarkar A, Howlader P et\u00a0al (2018) Grad-cam++: generalized gradient-based visual explanations for deep convolutional networks. In: 2018 IEEE winter conference on applications of computer vision (WACV), pp 839\u2013847, https:\/\/doi.org\/10.1109\/WACV.2018.00097","DOI":"10.1109\/WACV.2018.00097"},{"key":"10692_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2023.113959","author":"S Chen","year":"2023","unstructured":"Chen S, Ngai E, Ku Y et al (2023) Prediction of hotel booking cancellations: integration of machine learning and probability model based on interpretable feature interaction. Decis Supp Syst. https:\/\/doi.org\/10.1016\/j.dss.2023.113959","journal-title":"Decis Supp Syst"},{"key":"10692_CR12","doi-asserted-by":"publisher","unstructured":"Chen T, Kornblith S, Norouzi M et\u00a0al (2020) A simple framework for contrastive learning of visual representations. https:\/\/doi.org\/10.48550\/ARXIV.2002.05709, arXiv: 2002.05709","DOI":"10.48550\/ARXIV.2002.05709"},{"key":"10692_CR13","doi-asserted-by":"publisher","unstructured":"Conneau A, Khandelwal K, Goyal N et\u00a0al (2019) Unsupervised cross-lingual representation learning at scale. https:\/\/doi.org\/10.48550\/ARXIV.1911.02116, arXiv: 1911.02116","DOI":"10.48550\/ARXIV.1911.02116"},{"key":"10692_CR14","doi-asserted-by":"publisher","unstructured":"Croitoru FA, Hondru V, Ionescu RT et\u00a0al (2022) Diffusion models in vision: a survey. https:\/\/doi.org\/10.48550\/ARXIV.2209.04747, arXiv: 2209.04747","DOI":"10.48550\/ARXIV.2209.04747"},{"key":"10692_CR15","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.eswa.2016.09.020","volume":"67","author":"Silva J de Andrade","year":"2017","unstructured":"de Andrade Silva J, Hruschka ER, Gama J (2017) An evolutionary algorithm for clustering data streams with a variable number of clusters. Expert Syst Appl 67:228\u2013238. https:\/\/doi.org\/10.1016\/j.eswa.2016.09.020","journal-title":"Expert Syst Appl"},{"issue":"1","key":"10692_CR16","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/MSP.2017.2762725","volume":"35","author":"L Deng","year":"2018","unstructured":"Deng L (2018) Artificial intelligence in the rising wave of deep learning: the historical path and future outlook [perspectives]. IEEE Signal Process Mag 35(1):177\u2013180. https:\/\/doi.org\/10.1109\/MSP.2017.2762725","journal-title":"IEEE Signal Process Mag"},{"key":"10692_CR17","doi-asserted-by":"publisher","unstructured":"Devlin J, Chang MW, Lee K et\u00a0al (2018) Bert: pre-training of deep bidirectional transformers for language understanding. https:\/\/doi.org\/10.48550\/ARXIV.1810.04805, arXiv: 1810.04805","DOI":"10.48550\/ARXIV.1810.04805"},{"key":"10692_CR18","doi-asserted-by":"publisher","unstructured":"Dhariwal P, Nichol A (2021) Diffusion models beat gans on image synthesis. https:\/\/doi.org\/10.48550\/ARXIV.2105.05233, arXiv: 2105.05233","DOI":"10.48550\/ARXIV.2105.05233"},{"key":"10692_CR19","doi-asserted-by":"publisher","unstructured":"Dhurandhar A, Chen PY, Luss R et\u00a0al (2018) Explanations based on the missing: towards contrastive explanations with pertinent negatives. https:\/\/doi.org\/10.48550\/ARXIV.1802.07623, arXiv: 1802.07623","DOI":"10.48550\/ARXIV.1802.07623"},{"key":"10692_CR20","volume-title":"Large scale adversarial representation learning","author":"J Donahue","year":"2019","unstructured":"Donahue J, Simonyan K (2019) Large scale adversarial representation learning. Curran Associates Inc., Red Hook"},{"key":"10692_CR21","doi-asserted-by":"publisher","unstructured":"Donahue J, Kr\u00e4henb\u00fchl P, Darrell T (2016) Adversarial feature learning. https:\/\/doi.org\/10.48550\/ARXIV.1605.09782, arXiv: 1605.09782","DOI":"10.48550\/ARXIV.1605.09782"},{"issue":"100","key":"10692_CR22","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.cosrev.2021.100379","volume":"40","author":"S Dong","year":"2021","unstructured":"Dong S, Wang P, Abbas K (2021) A survey on deep learning and its applications. Comput Sci Rev 40(100):379. https:\/\/doi.org\/10.1016\/j.cosrev.2021.100379","journal-title":"Comput Sci Rev"},{"key":"10692_CR23","doi-asserted-by":"publisher","unstructured":"Dosovitskiy A, Brox T (2016) Generating images with perceptual similarity metrics based on deep networks. https:\/\/doi.org\/10.48550\/ARXIV.1602.02644, arXiv: 1602.02644","DOI":"10.48550\/ARXIV.1602.02644"},{"key":"10692_CR24","doi-asserted-by":"publisher","unstructured":"Goldstein A, Kapelner A, Bleich J et\u00a0al (2013) Peeking inside the black box: Visualizing statistical learning with plots of individual conditional expectation. https:\/\/doi.org\/10.48550\/ARXIV.1309.6392, arXiv: 1309.6392","DOI":"10.48550\/ARXIV.1309.6392"},{"issue":"02","key":"10692_CR25","doi-asserted-by":"publisher","first-page":"067","DOI":"10.1051\/epjconf\/202125102067","volume":"251","author":"D Golubovic","year":"2021","unstructured":"Golubovic D, Rocha R (2021) Training and serving ml workloads with Kubeflow at CERN. EPJ Web Conf 251(02):067. https:\/\/doi.org\/10.1051\/epjconf\/202125102067","journal-title":"EPJ Web Conf"},{"issue":"6","key":"10692_CR26","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1109\/TPAMI.2020.3044997","volume":"44","author":"C Gong","year":"2022","unstructured":"Gong C, Yang J, You J et al (2022) Centroid estimation with guaranteed efficiency: a general framework for weakly supervised learning. IEEE Trans Pattern Anal Mach Intell 44(6):2841\u20132855. https:\/\/doi.org\/10.1109\/TPAMI.2020.3044997","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10692_CR27","doi-asserted-by":"publisher","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M et\u00a0al (2014) Generative adversarial networks. https:\/\/doi.org\/10.48550\/ARXIV.1406.2661, arXiv: 1406.2661","DOI":"10.48550\/ARXIV.1406.2661"},{"key":"10692_CR28","doi-asserted-by":"publisher","unstructured":"Guo Q, Wu D, Qi Y, et\u00a0al (2022) FLMJR: Improving Robustness of Federated Learning via Model Stability. In: Atluri V, Di Pietro R, Jensen CD, Meng W (eds) Computer security - ESORICS 2022. ESORICS 2022. Lecture notes in computer science, vol 13556. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-17143-7_20,","DOI":"10.1007\/978-3-031-17143-7_20"},{"key":"10692_CR29","doi-asserted-by":"publisher","unstructured":"John MM, Olsson HH, Bosch J (2021) Towards mlops: a framework and maturity model, pp 1\u20138. https:\/\/doi.org\/10.1109\/SEAA53835.2021.00050","DOI":"10.1109\/SEAA53835.2021.00050"},{"key":"10692_CR30","doi-asserted-by":"publisher","unstructured":"Johnson MJ, Duvenaud D, Wiltschko AB et\u00a0al (2016) Composing graphical models with neural networks for structured representations and fast inference. https:\/\/doi.org\/10.48550\/ARXIV.1603.06277, arXiv: 1603.06277","DOI":"10.48550\/ARXIV.1603.06277"},{"key":"10692_CR31","unstructured":"Karhade M (2022) What is gpt-4 (and when?). https:\/\/pub.towardsai.net\/what-is-gpt-4-and-when-9f5073f25a6d. Accessed 12 Dec 2022"},{"key":"10692_CR32","doi-asserted-by":"publisher","unstructured":"Kingma DP, Welling M (2013) Auto-encoding variational bayes. https:\/\/doi.org\/10.48550\/ARXIV.1312.6114, arXiv: abs\/1312.6114","DOI":"10.48550\/ARXIV.1312.6114"},{"key":"10692_CR33","doi-asserted-by":"publisher","unstructured":"Konyushkova K, Sznitman R, Fua P (2017) Learning active learning from data. https:\/\/doi.org\/10.48550\/ARXIV.1703.03365, arXiv: 1703.03365","DOI":"10.48550\/ARXIV.1703.03365"},{"key":"10692_CR34","doi-asserted-by":"publisher","unstructured":"Kreuzberger D, K\u00fchl N, Hirschl S (2022) Machine learning operations (mlops): overview, definition, and architecture. https:\/\/doi.org\/10.48550\/ARXIV.2205.02302, arXiv: 2205.02302","DOI":"10.48550\/ARXIV.2205.02302"},{"issue":"4","key":"10692_CR35","doi-asserted-by":"publisher","first-page":"2733","DOI":"10.1007\/s10462-021-10061-9","volume":"55","author":"N Le","year":"2022","unstructured":"Le N, Rathour VS, Yamazaki K et al (2022) Deep reinforcement learning in computer vision: a comprehensive survey. Artif Intell Rev 55(4):2733\u20132819. https:\/\/doi.org\/10.1007\/s10462-021-10061-9","journal-title":"Artif Intell Rev"},{"issue":"107","key":"10692_CR36","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1016\/j.compbiolchem.2022.107732","volume":"99","author":"NQK Le","year":"2022","unstructured":"Le NQK, Ho QT, Nguyen VN et al (2022) Bert-promoter: an improved sequence-based predictor of dna promoter using bert pre-trained model and shape feature selection. Comput Biol Chem 99(107):732. https:\/\/doi.org\/10.1016\/j.compbiolchem.2022.107732","journal-title":"Comput Biol Chem"},{"issue":"4","key":"10692_CR37","first-page":"303","volume":"6","author":"YS Lee","year":"2018","unstructured":"Lee YS (2018) Analysis on trends of machine learning-as-a-service. Int J Adv Cult Technol 6(4):303\u2013308","journal-title":"Int J Adv Cult Technol"},{"key":"10692_CR38","doi-asserted-by":"publisher","unstructured":"Lee, Y., Jun, S., Cho, Y., et\u00a0al (2022) Precise extraction of deep learning models via side-channel attacks on edge\/endpoint devices. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds) Computer Security - ESORICS 2022. ESORICS 2022. Lecture Notes in Computer Science, vol 13556. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-17143-7_18,","DOI":"10.1007\/978-3-031-17143-7_18"},{"key":"10692_CR39","doi-asserted-by":"publisher","DOI":"10.3390\/e23010018","author":"P Linardatos","year":"2021","unstructured":"Linardatos P, Papastefanopoulos V, Kotsiantis S (2021) Explainable ai: a review of machine learning interpretability methods. Entropy. https:\/\/doi.org\/10.3390\/e23010018","journal-title":"Entropy"},{"key":"10692_CR40","doi-asserted-by":"publisher","unstructured":"Liu Y, Ott M, Goyal N et\u00a0al (2019) Roberta: a robustly optimized bert pretraining approach. https:\/\/doi.org\/10.48550\/ARXIV.1907.11692, arXiv: 1907.11692","DOI":"10.48550\/ARXIV.1907.11692"},{"issue":"18","key":"10692_CR41","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/ACCESS.2020.2964386","volume":"8","author":"A L\u00f3pez Garc\u00eda","year":"2020","unstructured":"L\u00f3pez Garc\u00eda A, De Lucas JM, Antonacci M et al (2020) A cloud-based framework for machine learning workloads and applications. IEEE Access 8(18):681\u2013692. https:\/\/doi.org\/10.1109\/ACCESS.2020.2964386","journal-title":"IEEE Access"},{"key":"10692_CR42","doi-asserted-by":"publisher","unstructured":"Lundberg S, Lee SI (2017) A unified approach to interpreting model predictions. https:\/\/doi.org\/10.48550\/ARXIV.1705.07874, arXiv: 1705.07874","DOI":"10.48550\/ARXIV.1705.07874"},{"key":"10692_CR43","doi-asserted-by":"publisher","unstructured":"M\u00e4kinen S, Skogstr\u00f6m H, Laaksonen E et\u00a0al (2021) Who needs mlops: what data scientists seek to accomplish and how can mlops help? https:\/\/doi.org\/10.48550\/ARXIV.2103.08942, arXiv: 2103.08942","DOI":"10.48550\/ARXIV.2103.08942"},{"issue":"102","key":"10692_CR44","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1016\/j.jnca.2020.102740","volume":"167","author":"Y Mansouri","year":"2020","unstructured":"Mansouri Y, Prokhorenko V, Babar MA (2020) An automated implementation of hybrid cloud for performance evaluation of distributed databases. J Netw Comput Appl 167(102):740. https:\/\/doi.org\/10.1016\/j.jnca.2020.102740","journal-title":"J Netw Comput Appl"},{"key":"10692_CR45","doi-asserted-by":"publisher","unstructured":"Mboweni T, Masombuka T, Dongmo C (2022) A systematic review of machine learning devops. In: 2022 international conference on electrical, computer and energy technologies (ICECET), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICECET55527.2022.9872968","DOI":"10.1109\/ICECET55527.2022.9872968"},{"key":"10692_CR46","unstructured":"Meta AI (2019) Xlm-r: state-of-the-art cross-lingual understanding through self-supervision. https:\/\/ai.facebook.com\/blog\/-xlm-r-state-of-the-art-cross-lingual-understanding-through-self-supervision\/. Accessed 12 Dec 2022"},{"key":"10692_CR47","unstructured":"MLOpsOrg (2022) Mlopsorg. https:\/\/ml-ops.org\/"},{"issue":"7540","key":"10692_CR48","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih V, Kavukcuoglu K, Silver D et al (2015) Human-level control through deep reinforcement learning. Nature 518(7540):529\u2013533. https:\/\/doi.org\/10.1038\/nature14236","journal-title":"Nature"},{"key":"10692_CR49","unstructured":"Molnar C (2022) Interpretable machine learning, 2nd edn. https:\/\/christophm.github.io\/interpretable-ml-book"},{"key":"10692_CR50","doi-asserted-by":"publisher","unstructured":"Mosca E, Demirt\u00fcrk D, M\u00fclln L et\u00a0al (2022) GrammarSHAP: an efficient model-agnostic and structure-aware NLP explainer. In: Proceedings of the first workshop on learning with natural language supervision. association for computational linguistics, Dublin, Ireland, pp 10\u201316. https:\/\/doi.org\/10.18653\/v1\/2022.lnls-1.2, https:\/\/aclanthology.org\/2022.lnls-1.2","DOI":"10.18653\/v1\/2022.lnls-1.2"},{"key":"10692_CR51","volume-title":"Machine learning: a probabilistic perspective","author":"KP Murphy","year":"2012","unstructured":"Murphy KP (2012) Machine learning: a probabilistic perspective. The MIT Press, New York"},{"key":"10692_CR52","doi-asserted-by":"publisher","unstructured":"Neicu A, Radu A, Zaman G, Stoica I, Rapan F (2020) Cloud computing usage in SMEs. An empirical study based on SMEs employees perceptions. https:\/\/doi.org\/10.3390\/su12124960","DOI":"10.3390\/su12124960"},{"key":"10692_CR53","unstructured":"Nelson FF, Ernst R, Akesson B et\u00a0al (2022) Deep machine learning for cyber defence. Report of STO Research Task IST-163 (IWA) - The NATO Science and Technology Organization"},{"key":"10692_CR54","unstructured":"Neptunes AI (2022) Neptunes.ai. https:\/\/neptune.ai\/blog\/best-machine-learning-as-a-service-platforms-mlaas"},{"key":"10692_CR55","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6276","author":"X Ning","year":"2021","unstructured":"Ning X, Wang X, Xu S et al (2021) A review of research on co-training. Concurr Comput. https:\/\/doi.org\/10.1002\/cpe.6276","journal-title":"Concurr Comput"},{"issue":"107","key":"10692_CR56","doi-asserted-by":"publisher","first-page":"090","DOI":"10.1016\/j.knosys.2021.107090","volume":"224","author":"K Ohri","year":"2021","unstructured":"Ohri K, Kumar M (2021) Review on self-supervised image recognition using deep neural networks. Knowl-Based Syst 224(107):090. https:\/\/doi.org\/10.1016\/j.knosys.2021.107090","journal-title":"Knowl-Based Syst"},{"key":"10692_CR57","unstructured":"Open AI (2022) Dall-e 2. https:\/\/openai.com\/dall-e-2\/. Accessed 15 Dec 2022"},{"key":"10692_CR58","unstructured":"OpenAI (2022) Chatgpt: optimizing language models for dialogue. https:\/\/openai.com\/blog\/chatgpt\/. Accessed 14 Dec 2022"},{"key":"10692_CR59","doi-asserted-by":"publisher","unstructured":"Philipp R, Mladenow A, Strauss C et\u00a0al (2021) Machine learning as a service: challenges in research and applications. In: Proceedings of the 22nd international conference on information integration and web-based applications & services. Association for Computing Machinery, New York, NY, USA, iiWAS \u201920, p 396-406, https:\/\/doi.org\/10.1145\/3428757.3429152,","DOI":"10.1145\/3428757.3429152"},{"key":"10692_CR60","doi-asserted-by":"publisher","unstructured":"Poyiadzi R, Bacaicoa-Barber D, Cid-Sueiro J et\u00a0al (2022) The weak supervision landscape. https:\/\/doi.org\/10.48550\/ARXIV.2203.16282, arXiv: 2203.16282","DOI":"10.48550\/ARXIV.2203.16282"},{"key":"10692_CR61","doi-asserted-by":"publisher","first-page":"45280","DOI":"10.1109\/ACCESS.2022.3169580","volume":"10","author":"P Radanliev","year":"2022","unstructured":"Radanliev P, De Roure D, Maple C et al (2022) Forecasts on future evolution of artificial intelligence and intelligent systems. IEEE Access. 10:45280\u201345288. https:\/\/doi.org\/10.1109\/ACCESS.2022.3169580","journal-title":"IEEE Access."},{"key":"10692_CR62","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s12530-022-09431-7","volume":"13","author":"P Radanliev","year":"2022","unstructured":"Radanliev P, De Roure D, Maple C et al (2022) Super-forecasting the \u2018technological singularity\u2019 risks from artificial intelligence. Evol Syst 13:747\u2013757. https:\/\/doi.org\/10.1007\/s12530-022-09431-7","journal-title":"Evol Syst"},{"key":"10692_CR63","unstructured":"Radford A, Narasimhan K (2018) Improving language understanding by generative pre-training"},{"key":"10692_CR64","doi-asserted-by":"publisher","unstructured":"Raffel C, Shazeer N, Roberts A et\u00a0al (2019) Exploring the limits of transfer learning with a unified text-to-text transformer. https:\/\/doi.org\/10.48550\/ARXIV.1910.10683, arXiv: 1910.10683","DOI":"10.48550\/ARXIV.1910.10683"},{"key":"10692_CR65","doi-asserted-by":"publisher","unstructured":"Rawat A, Levacher K, Sinn M et\u00a0al (2022) The devil is in the GAN: backdoor attacks and defenses in deep generative models. In: Atluri V, Di Pietro R, Jensen CD, Meng W (eds) Computer Security - ESORICS 2022. ESORICS 2022. Lecture notes in computer science, vol 13556. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-17143-7_41","DOI":"10.1007\/978-3-031-17143-7_41"},{"key":"10692_CR66","doi-asserted-by":"publisher","unstructured":"Recupito G, Pecorelli F, Catolino G et al (2022). A multivocal literature review of MLOps tools and features. https:\/\/doi.org\/10.1109\/SEAA56994.2022.00021","DOI":"10.1109\/SEAA56994.2022.00021"},{"key":"10692_CR67","doi-asserted-by":"publisher","unstructured":"Ren P, Xiao Y, Chang X et\u00a0al (2020) A survey of deep active learning. https:\/\/doi.org\/10.48550\/ARXIV.2009.00236, arXiv: 2009.00236","DOI":"10.48550\/ARXIV.2009.00236"},{"key":"10692_CR68","doi-asserted-by":"publisher","unstructured":"Ren Y, Pu J, Yang Z et\u00a0al (2022) Deep clustering: a comprehensive survey. https:\/\/doi.org\/10.48550\/ARXIV.2210.04142, arXiv: 2210.04142","DOI":"10.48550\/ARXIV.2210.04142"},{"key":"10692_CR69","unstructured":"Research G (2020) Exploring transfer learning with t5: the text-to-text transfer transformer. https:\/\/ai.googleblog.com\/2020\/02\/exploring-transfer-learning-with-t5.html. Accessed 12 Dec 2022"},{"key":"10692_CR70","doi-asserted-by":"publisher","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \"why should i trust you?\": explaining the predictions of any classifier. https:\/\/doi.org\/10.48550\/ARXIV.1602.04938, arXiv: 1602.04938","DOI":"10.48550\/ARXIV.1602.04938"},{"key":"10692_CR71","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C (2018) Anchors: High-precision model-agnostic explanations. In: Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence. AAAI Press, AAAI\u201918\/IAAI\u201918\/EAAI\u201918","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"10692_CR72","doi-asserted-by":"publisher","first-page":"97531","DOI":"10.1109\/ACCESS.2022.3202889","volume":"10","author":"M Rizinski","year":"2022","unstructured":"Rizinski M, Peshov H, Mishev K et al (2022) Ethically responsible machine learning in fintech. IEEE Access 10:97531\u201397554. https:\/\/doi.org\/10.1109\/ACCESS.2022.3202889","journal-title":"IEEE Access"},{"key":"10692_CR73","doi-asserted-by":"publisher","unstructured":"Ruf P, Madan M, Reich C et al (2021) Demystifying mlops and presenting a recipe for the selection of open-source tools. Appl Sci. https:\/\/doi.org\/10.3390\/app11198861, http:\/\/www.mdpi.com\/2076-3417\/11\/19\/8861","DOI":"10.3390\/app11198861"},{"key":"10692_CR74","doi-asserted-by":"publisher","unstructured":"Sanh V, Debut L, Chaumond J et\u00a0al (2019) Distilbert, a distilled version of Bert: smaller, faster, cheaper and lighter. https:\/\/doi.org\/10.48550\/ARXIV.1910.01108, arXiv: 1910.01108","DOI":"10.48550\/ARXIV.1910.01108"},{"issue":"7","key":"10692_CR75","doi-asserted-by":"publisher","first-page":"5283","DOI":"10.1007\/s10462-021-10021-3","volume":"54","author":"B Sayin","year":"2021","unstructured":"Sayin B, Krivosheev E, Yang J et al (2021) A review and experimental analysis of active learning over crowdsourced data. Artif Intell Rev 54(7):5283\u20135305. https:\/\/doi.org\/10.1007\/s10462-021-10021-3","journal-title":"Artif Intell Rev"},{"key":"10692_CR76","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.14778\/3229863.3229867","volume":"11","author":"S Schelter","year":"2018","unstructured":"Schelter S, Lange D, Schmidt P et al (2018) Automating large-scale data quality verification. Proc VLDB Endow 11:1781\u20131794. https:\/\/doi.org\/10.14778\/3229863.3229867","journal-title":"Proc VLDB Endow"},{"key":"10692_CR77","doi-asserted-by":"publisher","unstructured":"Schlegel M, Sattler KU (2022) Management of machine learning lifecycle artifacts: a survey https:\/\/doi.org\/10.48550\/ARXIV.2210.11831, arXiv: 2210.11831","DOI":"10.48550\/ARXIV.2210.11831"},{"issue":"2","key":"10692_CR78","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s11263-019-01228-7","volume":"128","author":"RR Selvaraju","year":"2019","unstructured":"Selvaraju RR, Cogswell M, Das A et al (2019) Grad-CAM: Visual explanations from deep networks via gradient-based localization. Int J Comput Vision 128(2):336\u2013359. https:\/\/doi.org\/10.1007\/s11263-019-01228-7","journal-title":"Int J Comput Vision"},{"issue":"118","key":"10692_CR79","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.eswa.2022.118221","volume":"209","author":"Z Shao","year":"2022","unstructured":"Shao Z, Zhao R, Yuan S et al (2022) Tracing the evolution of ai in the past decade and forecasting the emerging trends. Expert Syst Appl 209(118):221. https:\/\/doi.org\/10.1016\/j.eswa.2022.118221","journal-title":"Expert Syst Appl"},{"key":"10692_CR80","doi-asserted-by":"publisher","unstructured":"Shrikumar A, Greenside P, Kundaje A (2017) Learning important features through propagating activation differences https:\/\/doi.org\/10.48550\/ARXIV.1704.02685, arXiv: 1704.02685","DOI":"10.48550\/ARXIV.1704.02685"},{"key":"10692_CR81","unstructured":"Siddiqui JR (2022) Diffusion models made easy. https:\/\/towardsdatascience.com\/diffusion-models-made-easy-8414298ce4da. Accessed 12 Dec 2022"},{"key":"10692_CR82","doi-asserted-by":"publisher","unstructured":"SliceTeller: a data slice-driven approach for machine learning model validation.https:\/\/doi.org\/10.1109\/TVCG.2022.3209465","DOI":"10.1109\/TVCG.2022.3209465"},{"key":"10692_CR83","doi-asserted-by":"publisher","unstructured":"Sohl-Dickstein J, Weiss EA, Maheswaranathan N et\u00a0al (2015) Deep unsupervised learning using nonequilibrium thermodynamics. https:\/\/doi.org\/10.48550\/ARXIV.1503.03585, arXiv: 1503.03585","DOI":"10.48550\/ARXIV.1503.03585"},{"key":"10692_CR84","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3390\/app12199851","volume":"12","author":"R Subramanya","year":"2022","unstructured":"Subramanya R, Sierla S, Vyatkin V (2022) From devops to mlops: overview and application to electricity market forecasting. Appl Sci 12:19. https:\/\/doi.org\/10.3390\/app12199851","journal-title":"Appl Sci"},{"key":"10692_CR85","doi-asserted-by":"publisher","unstructured":"Subramanya R, Sierla S, Vyatkin V (2022) From devops to mlops: overview and application to electricity market forecasting. Appl Sci. https:\/\/doi.org\/10.3390\/app12199851, http:\/\/www.mdpi.com\/2076-3417\/12\/19\/9851","DOI":"10.3390\/app12199851"},{"key":"10692_CR86","unstructured":"Sun-Hosoya L, Guyon I, Sebag M (2018) Activmetal: algorithm recommendation with active meta learning. In: IAL@PKDD\/ECML"},{"key":"10692_CR87","unstructured":"Svenmarck P, Luotsinen L, Nilsson M et\u00a0al (2018) Possibilities and challenges for artificial intelligence in military applications. In: NATO big data and artificial intelligence for military decision making specialists\u2019 meeting"},{"issue":"8","key":"10692_CR88","doi-asserted-by":"publisher","first-page":"9033","DOI":"10.1007\/s10489-021-02973-4","volume":"52","author":"I Ullah","year":"2022","unstructured":"Ullah I, Manzo M, Shah M et al (2022) Graph convolutional networks: analysis, improvements and results. Appl Intell 52(8):9033\u20139044. https:\/\/doi.org\/10.1007\/s10489-021-02973-4","journal-title":"Appl Intell"},{"issue":"2","key":"10692_CR89","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10994-019-05855-6","volume":"109","author":"JE van Engelen","year":"2020","unstructured":"van Engelen JE, Hoos HH (2020) A survey on semi-supervised learning. Mach Learn 109(2):373\u2013440. https:\/\/doi.org\/10.1007\/s10994-019-05855-6","journal-title":"Mach Learn"},{"key":"10692_CR90","doi-asserted-by":"publisher","DOI":"10.1145\/3293318","author":"W Wang","year":"2019","unstructured":"Wang W, Zheng VW, Yu H et al (2019) A survey of zero-shot learning: settings, methods, and applications. ACM Trans Intell Syst Technol. https:\/\/doi.org\/10.1145\/3293318","journal-title":"ACM Trans Intell Syst Technol"},{"key":"10692_CR91","doi-asserted-by":"publisher","unstructured":"Yang Z, Dai Z, Yang Y et\u00a0al (2019) Xlnet: generalized autoregressive pretraining for language understanding. https:\/\/doi.org\/10.48550\/ARXIV.1906.08237, arXiv: 1906.08237","DOI":"10.48550\/ARXIV.1906.08237"},{"key":"10692_CR92","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.1081057","author":"M Yousif","year":"2017","unstructured":"Yousif M (2017) Intelligence in the cloud - we need a lot of it. IEEE Cloud Comput. https:\/\/doi.org\/10.1109\/MCC.2018.1081057","journal-title":"IEEE Cloud Comput"},{"key":"10692_CR93","doi-asserted-by":"publisher","unstructured":"Yuan DY, Wildish T (2020) Bioinformatics application with Kubeflow for batch processing in clouds. In: Lecture notes in computer science. Springer, Berlin. pp 355\u2013367. https:\/\/doi.org\/10.1007\/978-3-030-59851-8_24","DOI":"10.1007\/978-3-030-59851-8_24"},{"issue":"100","key":"10692_CR94","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.jii.2021.100224","volume":"23","author":"C Zhang","year":"2021","unstructured":"Zhang C, Lu Y (2021) Study on artificial intelligence: the state of the art and future prospects. J Ind Inf Integr 23(100):224. https:\/\/doi.org\/10.1016\/j.jii.2021.100224","journal-title":"J Ind Inf Integr"},{"key":"10692_CR95","doi-asserted-by":"publisher","unstructured":"Zhang Y, Tangwongsan K, Tirthapura S (2017) Streaming k-means clustering with fast queries. In: 2017 IEEE 33rd international conference on data engineering (ICDE), pp 449\u2013460. https:\/\/doi.org\/10.1109\/ICDE.2017.102","DOI":"10.1109\/ICDE.2017.102"},{"key":"10692_CR96","doi-asserted-by":"publisher","unstructured":"Zhang J, Zhang H, Xia C et\u00a0al (2020) Graph-bert: only attention is needed for learning graph representations. https:\/\/doi.org\/10.48550\/ARXIV.2001.05140, arXiv: 2001.05140","DOI":"10.48550\/ARXIV.2001.05140"},{"key":"10692_CR97","doi-asserted-by":"publisher","unstructured":"Zhao S, Song J, Ermon S (2017) Towards deeper understanding of variational autoencoding models. https:\/\/doi.org\/10.48550\/ARXIV.1702.08658, arXiv: 1702.08658","DOI":"10.48550\/ARXIV.1702.08658"},{"key":"10692_CR98","doi-asserted-by":"publisher","unstructured":"Zhao L, Wang Q, Wang C, Li Q, Shen C, Feng B (2021) VeriML: enabling integrity assurances and fair payments for machine learning as a service https:\/\/doi.org\/10.1109\/TPDS.2021.3068195","DOI":"10.1109\/TPDS.2021.3068195"},{"issue":"5","key":"10692_CR99","first-page":"138","volume":"16","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Belloum ASZ, da Costa GM et al (2022) Mlops scaling machine learning lifecycle in an industrial setting. Int J Ind Manuf Eng 16(5):138\u2013148","journal-title":"Int J Ind Manuf Eng"},{"key":"10692_CR100","doi-asserted-by":"publisher","unstructured":"Zhou B, Khosla A, Lapedriza A et\u00a0al (2015) Learning deep features for discriminative localization. https:\/\/doi.org\/10.48550\/ARXIV.1512.04150, arXiv: 1512.04150","DOI":"10.48550\/ARXIV.1512.04150"},{"key":"10692_CR101","doi-asserted-by":"publisher","unstructured":"Zhu L, Yang Y (2020) Actbert: learning global-local video-text representations. https:\/\/doi.org\/10.48550\/ARXIV.2011.07231, arXiv: 2011.07231","DOI":"10.48550\/ARXIV.2011.07231"},{"issue":"2","key":"10692_CR102","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/s10462-020-09874-x","volume":"54","author":"A Zubaro\u011flu","year":"2021","unstructured":"Zubaro\u011flu A, Atalay V (2021) Data stream clustering: a review. Artif Intell Rev 54(2):1201\u20131236. https:\/\/doi.org\/10.1007\/s10462-020-09874-x","journal-title":"Artif Intell Rev"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-023-10692-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-023-10692-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-023-10692-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T09:23:46Z","timestamp":1709630626000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-023-10692-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,20]]},"references-count":102,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["10692"],"URL":"https:\/\/doi.org\/10.1007\/s10462-023-10692-0","relation":{},"ISSN":["1573-7462"],"issn-type":[{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,20]]},"assertion":[{"value":"30 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"66"}}