{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T11:22:20Z","timestamp":1768908140600,"version":"3.49.0"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10489-021-02884-4","type":"journal-article","created":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T02:02:21Z","timestamp":1636423341000},"page":"8874-8894","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Generation and verification of learned stochastic automata using k-NN and statistical model checking"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-7501","authenticated-orcid":false,"given":"Abdelhakim","family":"Baouya","sequence":"first","affiliation":[]},{"given":"Salim","family":"Chehida","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Ouchani","sequence":"additional","affiliation":[]},{"given":"Saddek","family":"Bensalem","sequence":"additional","affiliation":[]},{"given":"Marius","family":"Bozga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,9]]},"reference":[{"issue":"1","key":"2884_CR1","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/3158668","volume":"28","author":"G Agha","year":"2018","unstructured":"Agha G, Palmskog K (2018) A survey of statistical model checking. ACM Trans Model Comput Simul 28(1):6:1\u20136:39. https:\/\/doi.org\/10.1145\/3158668","journal-title":"ACM Trans Model Comput Simul"},{"key":"2884_CR2","doi-asserted-by":"publisher","unstructured":"Aichernig B, Tappler M (2019) Probabilistic black-box reachability checking (extended version). Formal Methods Syst Des 54. https:\/\/doi.org\/10.1007\/s10703-019-00333-0","DOI":"10.1007\/s10703-019-00333-0"},{"key":"2884_CR3","doi-asserted-by":"crossref","unstructured":"Augasta G, Kathirvalavakumar T (2013) An empirical comparison of discretization methods for neural classifier. In: Prasath R, Kathirvalavakumar T (eds) Mining intelligence and knowledge exploration. Springer International Publishing, Cham, pp 38\u201349","DOI":"10.1007\/978-3-319-03844-5_5"},{"key":"2884_CR4","doi-asserted-by":"crossref","unstructured":"Azodi C B, Tang J, Shiu S H (2020) Opening the black box: Interpretable machine learning for geneticists. Trends Gen 36(6):442\u2013455","DOI":"10.1016\/j.tig.2020.03.005"},{"key":"2884_CR5","doi-asserted-by":"publisher","unstructured":"Baouya A, Chehida S, Bensalem S, Bozga M (2020a) Formal modeling and verification of blockchain consensus protocol for iot systems. In: Fujita H, Selamat A, Omatu S (eds) Knowledge Innovation Through Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 19th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2020. https:\/\/doi.org\/10.3233\/FAIA200578, vol 327. IOS Press, Frontiers in Artificial Intelligence and Applications, Kitakyushu, pp 330\u2013342","DOI":"10.3233\/FAIA200578"},{"key":"2884_CR6","doi-asserted-by":"publisher","unstructured":"Baouya A, Chehida S, Cantero M, Millet M, Bensalem S, Bozga M (2020b) Formal modeling and simulation of collaborative intelligent robots. In: Advances in Service-Oriented and Cloud Computing - International Workshops of ESOCC 2020, Revised Selected Papers, vol 1360. Springer, Communications in Computer and Information Science, Heraklion, pp 41\u201352. https:\/\/doi.org\/10.1007\/978-3-030-71906-7_4","DOI":"10.1007\/978-3-030-71906-7_4"},{"key":"2884_CR7","doi-asserted-by":"publisher","unstructured":"Baouya A, Mohamed OA, Ouchani S, Bennouar D (2021) Reliability-driven automotive software deployment based on a parametrizable probabilistic model checking. Expert Syst Appl 174:114572. https:\/\/doi.org\/10.1016\/j.eswa.2021.114572, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417421000130","DOI":"10.1016\/j.eswa.2021.114572"},{"key":"2884_CR8","unstructured":"Abdelhakim B (2021a) Bip model for water flow estimation. https:\/\/github.com\/hakimuga\/classification-and-smc\/tree\/main\/BIPModel\/Models"},{"key":"2884_CR9","unstructured":"Abdelhakim B (2021b) Decision tree classifier implementation. https:\/\/github.com\/hakimuga\/classification-and-smc\/tree\/main\/decisiontreeclassifier"},{"key":"2884_CR10","unstructured":"Abdelhakim B (2021c) Discretizazed values. https:\/\/github.com\/hakimuga\/classification-and-smc\/tree\/main\/discritization"},{"key":"2884_CR11","unstructured":"Abdelhakim B (2021d) Logistic regression classifier implementation. https:\/\/github.com\/hakimuga\/classification-and-smc\/tree\/main\/logisticregression"},{"key":"2884_CR12","unstructured":"Abdelhakim B (2021e) Na\u00efve bayes classifier implementation. https:\/\/github.com\/hakimuga\/classification-and-smc\/tree\/main\/gaussiannb"},{"key":"2884_CR13","unstructured":"Abdelhakim B (2021f) Statistical model checking results. https:\/\/github.com\/hakimuga\/classification-and-smc\/tree\/main\/Results"},{"key":"2884_CR14","doi-asserted-by":"crossref","unstructured":"Bishop C (1995) Neural networks for pattern recognition. Oxford University Press, Inc., New York","DOI":"10.1201\/9781420050646.ptb6"},{"key":"2884_CR15","doi-asserted-by":"crossref","unstructured":"Bu F, Wang X (2019) A smart agriculture iot system based on deep reinforcement learning. Fut Gener Comput Syst 99:500\u2013507","DOI":"10.1016\/j.future.2019.04.041"},{"key":"2884_CR16","doi-asserted-by":"crossref","unstructured":"Calderoni L, Magnani A, Maio D (2019) Iot manager: an open-source iot framework for smart cities. J Syst Arch 98:413\u2013423","DOI":"10.1016\/j.sysarc.2019.04.003"},{"key":"2884_CR17","doi-asserted-by":"publisher","unstructured":"Calisi D, Censi A, Iocchi L, Nardi D (2008) Openrdk: A modular framework for robotic software development. pp 1872\u20131877. https:\/\/doi.org\/10.1109\/IROS.2008.4651213","DOI":"10.1109\/IROS.2008.4651213"},{"key":"2884_CR18","doi-asserted-by":"publisher","unstructured":"Cheon H, Ryu J, Ryou J, Park C, Han YS (2021) Ared: automata-based runtime estimation for distributed systems using deep learning. Clust Comput. 1\u201313. https:\/\/doi.org\/10.1007\/s10586-021-03272-w","DOI":"10.1007\/s10586-021-03272-w"},{"key":"2884_CR19","unstructured":"Simonds D (2017) PRISM statistical model checker. http:\/\/www.prismmodelchecker.org\/manual\/RunningPRISM\/StatisticalModelChecking"},{"issue":"4","key":"2884_CR20","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s10009-014-0361-y","volume":"17","author":"A David","year":"2015","unstructured":"David A, Larsen KG, Legay A, Miku\u010dionis M, Poulsen DB (2015) Uppaal smc tutorial. Int J Softw Tools Technol Transfer 17(4):397\u2013415","journal-title":"Int J Softw Tools Technol Transfer"},{"key":"2884_CR21","doi-asserted-by":"crossref","unstructured":"Doerr B, Doerr C, Ebel F (2015) From black-box complexity to designing new genetic algorithms. Theor Comput Sci 567:87\u2013104","DOI":"10.1016\/j.tcs.2014.11.028"},{"key":"2884_CR22","doi-asserted-by":"crossref","unstructured":"Erdogdu U, Tan M, Alhajj R, Polat F, Demetrick D, Rokne J (2011) Employing machine learning techniques for data enrichment: Increasing the number of samples for effective gene expression data analysis. In: 2011 IEEE International Conference on Bioinformatics and Biomedicine, pp 238\u2013242","DOI":"10.1109\/BIBM.2011.105"},{"key":"2884_CR23","doi-asserted-by":"publisher","unstructured":"Fitzpatrick P, Metta G, Natale L (2008) Towards long-lived robot genes. Robot Auton Syst 56(1):29\u201345. https:\/\/doi.org\/10.1016\/j.robot.2007.09.014, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0921889007001364, human Technologies: \u201dKnow-how\u201d","DOI":"10.1016\/j.robot.2007.09.014"},{"key":"2884_CR24","doi-asserted-by":"crossref","unstructured":"Franco JM, Correia F, Barbosa R, Zenha-Rela M, Schmerl B, Garlan D (2016) Improving self-adaptation planning through software architecture-based stochastic modeling. J Syst Softw 115:42\u201360","DOI":"10.1016\/j.jss.2016.01.026"},{"issue":"4","key":"2884_CR25","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2012.35","volume":"25","author":"S Garc\u00eda","year":"2013","unstructured":"Garc\u00eda S, Luengo J, S\u00e1ez JA, L\u00f3pez V, Herrera F (2013) A survey of discretization techniques: Taxonomy and empirical analysis in supervised learning. IEEE Trans Knowl Data Eng 25(4):734\u2013750","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2884_CR26","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1023\/A:1010884214864","volume":"44","author":"C Giles","year":"2001","unstructured":"Giles C, Lawrence S (2001) Noisy time series prediction using recurrent neural networks and grammatical inference. Mach Learn 44:161\u2013183","journal-title":"Mach Learn"},{"key":"2884_CR27","doi-asserted-by":"publisher","unstructured":"Gudla S, Kuda NR (2021) Learning automata based energy efficient and reliable data delivery routing mechanism in wireless sensor networks. J King Saud Univ - Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2021.04.006, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1319157821000926","DOI":"10.1016\/j.jksuci.2021.04.006"},{"key":"2884_CR28","doi-asserted-by":"publisher","unstructured":"Hasan M, Islam MM, Zarif MII, Hashem M (2019) Attack and anomaly detection in iot sensors in iot sites using machine learning approaches. Internet Things 7:100059. https:\/\/doi.org\/10.1016\/j.iot.2019.100059, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660519300241","DOI":"10.1016\/j.iot.2019.100059"},{"key":"2884_CR29","unstructured":"Hastie T, Tibshirani R, Friedman J (2013) The elements of statistical learning: Data mining, inference and prediction, Springer Series in Statistics. Springer, New York"},{"key":"2884_CR30","doi-asserted-by":"crossref","unstructured":"H\u00e9rault T, Lassaigne R, Magniette F, Peyronnet S (2004) Approximate probabilistic model checking. In: Verification, model checking, and abstract interpretation. Springer, Berlin, pp 73\u201384","DOI":"10.1007\/978-3-540-24622-0_8"},{"issue":"8","key":"2884_CR31","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput"},{"key":"2884_CR32","unstructured":"Holzmann G (2003) Spin Model Checker, the: Primer and Reference Manual, 1st edn. Addison-Wesley Professional"},{"key":"2884_CR33","doi-asserted-by":"crossref","unstructured":"Jin D, Shi S, Zhang Y, Abbas H, Goh T T (2019) A complex event processing framework for an adaptive language learning system. Fut Gener Comput Syst 92:857\u2013867","DOI":"10.1016\/j.future.2017.12.032"},{"key":"2884_CR34","doi-asserted-by":"crossref","unstructured":"Kang W, Kim D (2018) Poster abstract: Deeprt: A predictable deep learning inference framework for iot devices. In: 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), pp 279\u2013280","DOI":"10.1109\/IoTDI.2018.00039"},{"key":"2884_CR35","doi-asserted-by":"publisher","unstructured":"Khalili A, Narizzano M, Natale L, Tacchella A (2017) Learning middleware models for verification of distributed control programs. Robot Auton Syst 92:139\u2013151. https:\/\/doi.org\/10.1016\/j.robot.2017.01.016, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0921889016300380","DOI":"10.1016\/j.robot.2017.01.016"},{"key":"2884_CR36","doi-asserted-by":"publisher","unstructured":"K\u0131ra\u00e7 F, Aktemur B, S\u00f6zer H, \u015eahin Gebizli C (2019) Automatically learning usage behavior and generating event sequences for black-box testing of reactive systems. Softw Qual J 27. https:\/\/doi.org\/10.1007\/s11219-018-9439-1","DOI":"10.1007\/s11219-018-9439-1"},{"issue":"11","key":"2884_CR37","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1016\/j.conengprac.2006.07.003","volume":"15","author":"M Kwiatkowska","year":"2006","unstructured":"Kwiatkowska M, Norman G, Parker D (2006) Controller dependability analysis by probabilistic model checking. Control Eng Pract 15(11):1427\u20131434","journal-title":"Control Eng Pract"},{"key":"2884_CR38","doi-asserted-by":"crossref","unstructured":"Kwiatkowska M, Norman G, Parker D (2011) PRISM 4.0: Verification of probabilistic real-time systems. In: Proc. 23rd International Conference on Computer Aided Verification (CAV\u201911), vol 6806. Springer, LNCS, pp 585\u2013591","DOI":"10.1007\/978-3-642-22110-1_47"},{"key":"2884_CR39","doi-asserted-by":"publisher","unstructured":"Larsen K, Legay A (2016) Statistical model checking: Past, present, and future. vol 9952, pp 3\u201315. https:\/\/doi.org\/10.1007\/978-3-319-47166-2_1","DOI":"10.1007\/978-3-319-47166-2_1"},{"issue":"1\u20132","key":"2884_CR40","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s100090050010","volume":"1","author":"KG Larsen","year":"1997","unstructured":"Larsen KG, Pettersson P, Yi W (1997) Uppaal in a nutshell. Int J Softw Tools Technol Transf 1(1\u20132):134\u2013152","journal-title":"Int J Softw Tools Technol Transf"},{"key":"2884_CR41","doi-asserted-by":"publisher","first-page":"45062","DOI":"10.1109\/ACCESS.2018.2865135","volume":"6","author":"S Ledesma","year":"2018","unstructured":"Ledesma S, Ibarra-Manzano MA, Cabal-Yepez E, Almanza-Ojeda DL, Avina-Cervantes JG (2018) Analysis of data sets with learning conflicts for machine learning. IEEE Access 6:45062\u201345070","journal-title":"IEEE Access"},{"key":"2884_CR42","doi-asserted-by":"crossref","unstructured":"Lyu Y, Chen J, Song Z (2019) Image-based process monitoring using deep learning framework. Chem Intell Lab Syst 189:8\u201317","DOI":"10.1016\/j.chemolab.2019.03.008"},{"key":"2884_CR43","doi-asserted-by":"crossref","unstructured":"Mahdavinejad M S, Rezvan M, Barekatain M, Adibi P, Barnaghi P, Sheth A P (2018) Machine learning for internet of things data analysis: a survey. Digit Commun Netw 4(3):161\u2013175","DOI":"10.1016\/j.dcan.2017.10.002"},{"key":"2884_CR44","doi-asserted-by":"crossref","unstructured":"Maimon O, Rokach L (2010) Data mining and knowledge discovery handbook. Series in Solid-State Sciences. Springer, US","DOI":"10.1007\/978-0-387-09823-4"},{"key":"2884_CR45","doi-asserted-by":"publisher","unstructured":"Mao H, Chen Y, Jaeger M, Nielsen T, Larsen K, Nielsen B (2016) Learning deterministic probabilistic automata from a model checking perspective. Mach Learn 105. https:\/\/doi.org\/10.1007\/s10994-016-5565-9","DOI":"10.1007\/s10994-016-5565-9"},{"key":"2884_CR46","doi-asserted-by":"publisher","unstructured":"Meinke K, Sindhu MA (2013) Lbtest: A learning-based testing tool for reactive systems. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, pp 447\u2013454. https:\/\/doi.org\/10.1109\/ICST.2013.62","DOI":"10.1109\/ICST.2013.62"},{"key":"2884_CR47","doi-asserted-by":"crossref","unstructured":"Mercaldo F, Martinelli F, Santone A (2019) Real-time scada attack detection by means of formal methods. In: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp 231\u2013 236","DOI":"10.1109\/WETICE.2019.00057"},{"key":"2884_CR48","doi-asserted-by":"crossref","unstructured":"Narayanan U, Unnikrishnan A, Paul V, Joseph S (2017) A survey on various supervised classification algorithms. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp 2118\u20132124","DOI":"10.1109\/ICECDS.2017.8389824"},{"issue":"5","key":"2884_CR49","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCC.2016.108","volume":"3","author":"A Naskos","year":"2016","unstructured":"Naskos A, Gounaris A, Mouratidis H, Katsaros P (2016) Online Analysis of security risks in elastic cloud applications. IEEE Cloud Comput 3(5):26\u201333","journal-title":"IEEE Cloud Comput"},{"key":"2884_CR50","doi-asserted-by":"publisher","unstructured":"Neto A, Subramanyan R, Vieira M, Travassos G (2007) A survey on model-based testing approaches: a systematic review, pp 31\u201336. https:\/\/doi.org\/10.1145\/1353673.1353681","DOI":"10.1145\/1353673.1353681"},{"key":"2884_CR51","doi-asserted-by":"crossref","unstructured":"Nouri A, Mediouni BL, Bozga M, Combaz J, Bensalem S, Legay A (2018) Performance Evaluation of Stochastic Real-Time Systems with the SBIP Framework. Int J Crit Comput-Based Syst:1\u201333","DOI":"10.1504\/IJCCBS.2018.096439"},{"key":"2884_CR52","doi-asserted-by":"crossref","unstructured":"Onal AC, Berat Sezer O, Ozbayoglu M, Dogdu E (2017) Weather data analysis and sensor fault detection using an extended iot framework with semantics, big data, and machine learning. In: 2017 IEEE International Conference on Big Data (Big Data), pp 2037\u20132046","DOI":"10.1109\/BigData.2017.8258150"},{"key":"2884_CR53","doi-asserted-by":"crossref","unstructured":"Padilla F, Hernandez H, Juncosa R, Vellando P (2015) A numerical solution for the integrated analysis of water resources management: Application to the mero river watershed, la coru\u00f1a, spain, vol 7","DOI":"10.4236\/jwarp.2015.710066"},{"key":"2884_CR54","doi-asserted-by":"publisher","unstructured":"Peled D, Vardi MY, Yannakakis M (2002) Black box checking. J Autom Lang Comb 7:225\u2013246. https:\/\/doi.org\/10.1007\/978-0-387-35578-8_13","DOI":"10.1007\/978-0-387-35578-8_13"},{"key":"2884_CR55","unstructured":"Quigley M, Conley K, Gerkey B, Faust J, Foote T, Leibs J, Wheeler R, Ng A (2009) Ros: an open-source robot operating system. vol 3"},{"key":"2884_CR56","doi-asserted-by":"publisher","first-page":"101698","DOI":"10.1016\/j.cose.2019.101698","volume":"90","author":"Y Ren","year":"2020","unstructured":"Ren Y, Zhou Q, Wang Z, Wu T, Wu G, Choo KKR (2020) Query-efficient label-only attacks against black-box machine learning models. Comput Secur 90:101698","journal-title":"Comput Secur"},{"key":"2884_CR57","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-0-387-30164-8_205","volume-title":"Decision Trees For Regression","author":"C Sammut","year":"2010","unstructured":"Sammut C, Webb GI (2010a) Decision Trees For Regression. Springer, Boston, pp 267\u2013267. https:\/\/doi.org\/10.1007\/978-0-387-30164-8_205"},{"key":"2884_CR58","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-0-387-30164-8_493","volume-title":"Logistic Regression","author":"C Sammut","year":"2010","unstructured":"Sammut C, Webb GI (2010b) Logistic Regression. Springer, Boston, pp 631\u2013631. https:\/\/doi.org\/10.1007\/978-0-387-30164-8_493"},{"key":"2884_CR59","doi-asserted-by":"crossref","unstructured":"Sen K, Viswanathan M, Agha G (2004) Learning continuous time markov chains from sample executions. In: First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings., pp 146\u2013155","DOI":"10.1109\/QEST.2004.1348029"},{"key":"2884_CR60","doi-asserted-by":"crossref","unstructured":"Sen PC, Hajra M, Ghosh M (2020) Supervised classification algorithms in machine learning: a survey and review. In: Mandal J K, Bhattacharya D (eds) Emerging technology in modelling and graphics. Springer Singapore, Singapore, pp 99\u2013111","DOI":"10.1007\/978-981-13-7403-6_11"},{"issue":"1","key":"2884_CR61","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/SURV.2013.103013.00206","volume":"16","author":"CW Tsai","year":"2014","unstructured":"Tsai CW, Lai CF, Chiang MC, Yang LT (2014) Data mining for internet of things: A survey. IEEE Commun Surv Tutorials 16(1):77\u201397","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2884_CR62","doi-asserted-by":"publisher","unstructured":"Webb GI (2010) Na\u00efve Bayes. Springer Boston, pp 713\u2013714. https:\/\/doi.org\/10.1007\/978-0-387-30164-8_576","DOI":"10.1007\/978-0-387-30164-8_576"},{"key":"2884_CR63","doi-asserted-by":"crossref","unstructured":"Wei W, Wang B, Towsley D (2002) Continuous-time hidden markov models for network performance evaluation. Perform Eval 49(1):129\u2013146. performance 2002","DOI":"10.1016\/S0166-5316(02)00122-0"},{"key":"2884_CR64","doi-asserted-by":"crossref","unstructured":"Younes HLS, Simmons RG (2002) Probabilistic verification of discrete event systems using acceptance sampling. In: Brinksma E, Larsen KG (eds) Computer Aided Verification. Springer, Heidelberg, pp 223\u2013235","DOI":"10.1007\/3-540-45657-0_17"},{"issue":"4","key":"2884_CR65","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/5326.897072","volume":"30","author":"PG Zhang","year":"2000","unstructured":"Zhang PG (2000) Neural networks for classification: a survey. IEEE Trans Syst Man Cybern Part C (Appl Rev) 30(4):451\u2013462","journal-title":"IEEE Trans Syst Man Cybern Part C (Appl Rev)"},{"key":"2884_CR66","doi-asserted-by":"publisher","unstructured":"Zhang X, Wang Y, Li Z (2021) Interpreting the black box of supervised learning models: Visualizing the impacts of features on prediction. Appl Intell:1573\u20137497. https:\/\/doi.org\/10.1007\/s10489-021-02255-z","DOI":"10.1007\/s10489-021-02255-z"},{"key":"2884_CR67","doi-asserted-by":"crossref","unstructured":"Zhang Y, Lin Q, Wang J, Verwer S (2017) Car-following behavior model learning using timed automata. IFAC-PapersOnLine 50(1):2353\u20132358. 20th IFAC World Congress","DOI":"10.1016\/j.ifacol.2017.08.423"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02884-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02884-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02884-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T09:16:12Z","timestamp":1653902172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02884-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,9]]},"references-count":67,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["2884"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02884-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,9]]},"assertion":[{"value":"30 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}