{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:35:42Z","timestamp":1747809342854,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Umea University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2023,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A Deep Neural Network (DNN)\u2019s prediction may be unreliable outside of its training distribution despite high levels of accuracy obtained during model training. The DNN may experience different degrees of accuracy degradation for different levels of distribution shifts, hence it is important to predict its performance (accuracy) under distribution shifts. In this paper, we consider the end-to-end approach to autonomous driving of using a DNN to map from an input image to the control action such as the steering angle. For each input image with possible perturbations that cause distribution shifts, we design a Performance Prediction Module to compute its anomaly score, and use it to predict the DNN\u2019s expected prediction error, i.e., its expected deviation from the ground truth (optimal) control action, which is not available after deployment. If the expected prediction error is too large, then the DNN\u2019s prediction may no longer be trusted, and remedial actions should be taken to ensure safety. We consider different methods for computing the anomaly score for the input image, including using the reconstruction error of an Autoencoder, or applying an Anomaly Detection algorithm to a hidden layer of the DNN. We present performance evaluation of the different methods in terms of both prediction accuracy and execution time on different hardware platforms, in order to provide a useful reference for the designer to choose among the different methods.<\/jats:p>","DOI":"10.1007\/s11265-023-01893-5","type":"journal-article","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T03:02:11Z","timestamp":1700449331000},"page":"1455-1468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Performance Prediction of End-to-End Autonomous Driving Under Continuous Distribution Shifts Based on Anomaly Detection"],"prefix":"10.1007","volume":"95","author":[{"given":"Siyu","family":"Luan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4228-2774","authenticated-orcid":false,"given":"Zonghua","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"Wan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,20]]},"reference":[{"issue":"9","key":"1893_CR1","doi-asserted-by":"publisher","first-page":"6163","DOI":"10.1109\/TII.2019.2950667","volume":"16","author":"Y Song","year":"2019","unstructured":"Song, Y., Li, Y., Jia, L., & Qiu, M. (2019). Retraining strategy-based domain adaption network for intelligent fault diagnosis. IEEE Transactions on Industrial Informatics, 16(9), 6163\u20136171.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"7","key":"1893_CR2","first-page":"3366","volume":"44","author":"M De Lange","year":"2021","unstructured":"De Lange, M., et al. (2021). A continual learning survey: Defying forgetting in classification tasks. IEEE transactions on pattern analysis and machine intelligence, 44(7), 3366\u20133385.","journal-title":"IEEE transactions on pattern analysis and machine intelligence"},{"key":"1893_CR3","unstructured":"Zhai, R., Schroedl, S., Galstyan, A., Kumar, A., Ver Steeg, G., & Natarajan, P. (2022). Online Continual Learning for Progressive Distribution Shift (OCL-PDS): A Practitioner's Perspective."},{"issue":"4","key":"1893_CR4","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1109\/TNNLS.2020.3043505","volume":"33","author":"A Tampuu","year":"2020","unstructured":"Tampuu, A., Matiisen, T., Semikin, M., Fishman, D., & Muhammad, N. (2020). A survey of end-to-end driving: Architectures and training methods. IEEE Transactions on Neural Networks and Learning Systems, 33(4), 1364\u20131384.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"1893_CR5","unstructured":"Bojarski, M., et al.\u00a0(2016). End to end learning for self-driving cars. arXiv preprint\u00a0arXiv:1604.07316"},{"key":"1893_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.neucom.2021.08.155","volume":"489","author":"LH Wen","year":"2022","unstructured":"Wen, L. H., & Jo, K. H. (2022). Deep learning-based perception systems for autonomous driving: A comprehensive survey. Neurocomputing, 489, 255\u2013270.","journal-title":"Neurocomputing"},{"key":"1893_CR7","unstructured":"Yang, J., et al. (2022).\u00a0OpenOOD: Benchmarking generalized out-of-distribution detection. arXiv preprint arXiv:2210.07242"},{"key":"1893_CR8","doi-asserted-by":"publisher","first-page":"132980","DOI":"10.1109\/ACCESS.2021.3108451","volume":"9","author":"S Luan","year":"2021","unstructured":"Luan, S., Gu, Z., Freidovich, L. B., Jiang, L., & Zhao, Q. (2021). Out-of-distribution detection for deep neural networks with isolation forest and local outlier factor. IEEE Access, 9, 132980\u2013132989.","journal-title":"IEEE Access"},{"key":"1893_CR9","doi-asserted-by":"crossref","unstructured":"Luan, S., Gu, Z., Saremi, A., Freidovich, L., Jiang, L., & Wan, S. (2023). Timing performance benchmarking of out-of-distribution detection algorithms. Journal of Signal Processing Systems.","DOI":"10.1007\/s11265-023-01852-0"},{"key":"1893_CR10","doi-asserted-by":"crossref","unstructured":"Stocco, A., Weiss, M., Calzana, M., & Tonella, P. (2020). Misbehaviour prediction for autonomous driving systems. In Proceedings of the ACM\/IEEE 42nd international conference on software engineering (pp. 359-371).","DOI":"10.1145\/3377811.3380353"},{"key":"1893_CR11","doi-asserted-by":"crossref","unstructured":"Cai, F., & Koutsoukos, X. (2020). Real-time out-of-distribution detection in learning-enabled cyber-physical systems. In 2020 ACM\/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS) (pp. 174-183). IEEE.","DOI":"10.1109\/ICCPS48487.2020.00024"},{"key":"1893_CR12","unstructured":"Ruff, L., et al. (2018). Deep one-class classification. In International conference on machine learning (pp. 4393-4402). PMLR."},{"key":"1893_CR13","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10472-013-9381-7","volume":"74","author":"R Laxhammar","year":"2015","unstructured":"Laxhammar, R., & Falkman, G. (2015). Inductive conformal anomaly detection for sequential detection of anomalous sub-trajectories. Annals of Mathematics and Artificial Intelligence, 74, 67\u201394.","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"1893_CR14","unstructured":"Henne, M., Schwaiger, A., Roscher, K., & Weiss, G. (2020). Benchmarking Uncertainty Estimation Methods for Deep Learning With Safety-Related Metrics. In SafeAI@ AAAI (pp. 83-90)."},{"key":"1893_CR15","doi-asserted-by":"crossref","unstructured":"Lohdefink, J., Fehrling, J., Klingner, M., Huger, F., Schlicht, P., Schmidt, N. M., & Fingscheidt, T. (2020). Self-supervised domain mismatch estimation for autonomous perception. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (pp. 334-335).","DOI":"10.1109\/CVPRW50498.2020.00175"},{"key":"1893_CR16","doi-asserted-by":"crossref","unstructured":"Rottmann, M., Colling, P., Hack, T. P., Chan, R., H\u00fcger, F., Schlicht, P., & Gottschalk, H. (2020, July). Prediction error meta classification in semantic segmentation: Detection via aggregated dispersion measures of softmax probabilities. In 2020 International Joint Conference on Neural Networks (IJCNN) (pp. 1-9). IEEE.","DOI":"10.1109\/IJCNN48605.2020.9206659"},{"key":"1893_CR17","doi-asserted-by":"crossref","unstructured":"Klingner, M., Bar, A., Mross, M., & Fingscheidt, T. (2021). Improving online performance prediction for semantic segmentation. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp. 1\u201311).","DOI":"10.1109\/CVPRW53098.2021.00009"},{"issue":"7","key":"1893_CR18","doi-asserted-by":"publisher","first-page":"4670","DOI":"10.1109\/TITS.2021.3054437","volume":"22","author":"M Klingner","year":"2021","unstructured":"Klingner, M., & Fingscheidt, T. (2021). Online performance prediction of perception DNNs by multi-task learning with depth estimation. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4670\u20134683.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"1893_CR19","doi-asserted-by":"crossref","unstructured":"B\u00e4r, A., Klingner, M., L\u00f6hdefink, J., H\u00fcger, F., Schlicht, P., & Fingscheidt, T. (2022). Performance Prediction for Semantic Segmentation by a Self-Supervised Image Reconstruction Decoder. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp. 4399-4408).","DOI":"10.1109\/CVPRW56347.2022.00486"},{"key":"1893_CR20","doi-asserted-by":"crossref","unstructured":"Lee Rodgers, J., & Nicewander, W. A. (1988). Thirteen ways to look at the correlation coefficient. The American Statistician, 42(1), 59\u201366.","DOI":"10.1080\/00031305.1988.10475524"},{"key":"1893_CR21","unstructured":"Zhao, Y., Nasrullah, Z., & Li, Z. (2019). Pyod: A python toolbox for scalable outlier detection. arXiv preprint\u00a0arXiv:1901.01588"},{"key":"1893_CR22","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770\u2013778).","DOI":"10.1109\/CVPR.2016.90"},{"key":"1893_CR23","unstructured":"Shyu, M. L., Chen, S. C., Sarinnapakorn, K., & Chang, L. (2003). A novel Anomaly Detection scheme based on principal component classifier. Miami Univ Coral Gables Fl Dept of Electrical and Computer Engineering."},{"issue":"3","key":"1893_CR24","first-page":"582","volume":"12","author":"B Sch\u00f6lkopf","year":"2000","unstructured":"Sch\u00f6lkopf, B., Williamson, R., Smola, A., Shawe-Taylor, J., & Platt, J. (2000). Support vector method for novelty detection. Advances in neural information processing systems, 12(3), 582\u2013588.","journal-title":"Advances in neural information processing systems"},{"key":"1893_CR25","doi-asserted-by":"crossref","unstructured":"Breunig, M. M., Kriegel, H. P., Ng, R. T., & Sander, J. (2000). LOF: identifying density-based local outliers. In Proceedings of the 2000 ACM SIGMOD international conference on Management of data (pp. 93\u2013104).","DOI":"10.1145\/342009.335388"},{"issue":"9\u201310","key":"1893_CR26","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He, Z., Xu, X., & Deng, S. (2003). Discovering cluster-based local outliers. Pattern recognition letters, 24(9\u201310), 1641\u20131650.","journal-title":"Pattern recognition letters"},{"key":"1893_CR27","doi-asserted-by":"crossref","unstructured":"Tang, J., Chen, Z., Fu, A. W. C., & Cheung, D. W. (2002). Enhancing effectiveness of outlier detections for low density patterns. In\u00a0Advances in Knowledge Discovery and Data Mining: 6th Pacific-Asia Conference, PAKDD 2002 Taipei, Taiwan, May 6\u20138, 2002 Proceedings 6 (pp. 535\u2013548). Springer.","DOI":"10.1007\/3-540-47887-6_53"},{"key":"1893_CR28","unstructured":"Goldstein, M., & Dengel, A. (2012). Histogram-based outlier score (hbos): A fast unsupervised anomaly detection algorithm. KI-2012: Poster and Demo Track, 1, 59\u201363."},{"key":"1893_CR29","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., & Shim, K. (2000). Efficient algorithms for mining outliers from large data sets. In Proceedings of the 2000 ACM SIGMOD international conference on management of data (pp. 427\u2013438).","DOI":"10.1145\/342009.335437"},{"key":"1893_CR30","doi-asserted-by":"crossref","unstructured":"Kriegel, H. P., Kr\u00f6ger, P., Schubert, E., & Zimek, A. (2009). Outlier detection in axis-parallel subspaces of high dimensional data. In\u00a0Advances in Knowledge Discovery and Data Mining: 13th Pacific-Asia Conference (PAKDD) (pp. 831\u2013838). Springer.","DOI":"10.1007\/978-3-642-01307-2_86"},{"key":"1893_CR31","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhao, Y., Botta, N., Ionescu, C., & Hu, X. (2020). COPOD: copula-based outlier detection. In 2020 IEEE international conference on data mining (ICDM) (pp. 1118-1123). IEEE.","DOI":"10.1109\/ICDM50108.2020.00135"},{"key":"1893_CR32","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhao, Y., Hu, X., Botta, N., Ionescu, C., & Chen, G. (2022). ECOD: Unsupervised outlier detection using empirical cumulative distribution functions. IEEE Transactions on Knowledge and Data Engineering.","DOI":"10.2139\/ssrn.4313179"},{"key":"1893_CR33","unstructured":"Zong, B., Song, Q., Min, M. R., Cheng, W., Lumezanu, C., Cho, D., & Chen, H. (2018). Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International conference on learning representations."},{"key":"1893_CR34","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10994-015-5521-0","volume":"102","author":"T Pevn\u00fd","year":"2016","unstructured":"Pevn\u00fd, T. (2016). Loda: Lightweight on-line detector of anomalies. Machine Learning, 102, 275\u2013304.","journal-title":"Machine Learning"},{"key":"1893_CR35","doi-asserted-by":"crossref","unstructured":"Liu, F. T., Ting, K. M., & Zhou, Z. H. (2008). Isolation forest. In 2008 eighth ieee international conference on data mining (pp. 413\u2013422). IEEE.","DOI":"10.1109\/ICDM.2008.17"},{"key":"1893_CR36","unstructured":"Geyer, J., et al. (2020). A2d2: Audi autonomous driving dataset. arXiv preprint\u00a0arXiv:2004.06320"},{"key":"1893_CR37","first-page":"26250","volume":"34","author":"Y Shen","year":"2021","unstructured":"Shen, Y., Zheng, L., Shu, M., Li, W., Goldstein, T., & Lin, M. (2021). Gradient-free adversarial training against image corruption for learning-based steering. Advances in Neural Information Processing Systems, 34, 26250\u201326263.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"1893_CR38","unstructured":"Hendrycks, D., & Dietterich, T. (2019). Benchmarking neural network robustness to common corruptions and perturbations, presented at the International Conference on Learning Representations (ICLR)."},{"issue":"2s","key":"1893_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2544375.2544390","volume":"13","author":"H Huang","year":"2014","unstructured":"Huang, H., Chaturvedi, V., Quan, G., Fan, J., & Qiu, M. (2014). Throughput maximization for periodic real-time systems under the maximal temperature constraint. ACM Transactions on Embedded Computing Systems (TECS), 13(2s), 1\u201322.","journal-title":"ACM Transactions on Embedded Computing Systems (TECS)"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-023-01893-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-023-01893-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-023-01893-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T10:12:21Z","timestamp":1705486341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-023-01893-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":39,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1893"],"URL":"https:\/\/doi.org\/10.1007\/s11265-023-01893-5","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"type":"print","value":"1939-8018"},{"type":"electronic","value":"1939-8115"}],"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"21 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research involves no human participants and\/or animals.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}