{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:07:35Z","timestamp":1745467655968,"version":"3.40.4"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11623-025-2074-7","type":"journal-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T06:22:27Z","timestamp":1745389347000},"page":"215-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On challenges and approaches to test AI systems"],"prefix":"10.1007","volume":"49","author":[{"given":"Antoine","family":"Gautier","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Bieringer","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Kl\u00f6\u00dfner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"2074_CR1","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/CVPR.2009.5206848","volume-title":"ImageNet: A large-scale hierarchical image database","author":"J Deng","year":"2009","unstructured":"J. Deng, W. Dong, R. Socher, L. -J. Li, Kai Li and Li Fei-Fei, \u201cImageNet: A large-scale hierarchical image database,\u201d 2009 IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, 2009, pp. 248-255, https:\/\/doi.org\/10.1109\/CVPR.2009.5206848."},{"key":"2074_CR2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.AI.100-1","volume-title":"Artificial intelligence risk management framework (AI RMF 1.0)","author":"E Tabassi","year":"2023","unstructured":"Tabassi, E. (2023), Artificial Intelligence Risk Management Framework (AI RMF 1.0), NIST Trustworthy and Responsible AI, National Institute of Standards and Technology, Gaithersburg, MD, [online], https:\/\/doi.org\/10.6028\/NIST.AI.100-1, https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=936225"},{"key":"2074_CR3","unstructured":"T\u00dcV AI.Lab (2024) T\u00dcV AI Assessment Matrix. A Systematic Approach to AI Assessment. Available online: https:\/\/www.tuev-lab.ai\/fileadmin\/user_upload\/AI_Lab\/TUEV_AI_Lab_AI_Assessment_Matrix_V01_EN.pdf."},{"key":"2074_CR4","unstructured":"DIN, DKE (2022): German Standardization Roadmap on Artificial Intelligence (2nd edition); www.din.de\/go\/roadmap-ai"},{"key":"2074_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/SaTML54575.2023.00031","volume-title":"\u201creal attackers don\u2019t compute gradients\u201d: bridging the gap between Adversarial ML research and practice","author":"G Apruzzese","year":"2023","unstructured":"G. Apruzzese et al., \u201c\u201cReal Attackers Don\u2019t Compute Gradients\u201d: Bridging the Gap Between Adversarial ML Research and Practice,\u201d in 2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), Raleigh, NC, USA, 2023, pp. 339-364, https:\/\/doi.org\/10.1109\/SaTML54575.2023.00031."},{"key":"2074_CR6","unstructured":"Regulation 2024\/1689 of the European parliament and of the council on harmonised rules on artificial intelligence. Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=OJ:L_202401689"},{"key":"2074_CR7","series-title":"Proceedings of the Conference on Fairness, Accountability, and Transparency (FAT* \u201819)","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1145\/3287560.3287596","volume-title":"Model cards for model reporting","author":"M Mitchell","year":"2019","unstructured":"Margaret Mitchell, Simone Wu, Andrew Zaldivar, Parker Barnes, Lucy Vasserman, Ben Hutchinson, Elena Spitzer, Inioluwa Deborah Raji, and Timnit Gebru. 2019. Model Cards for Model Reporting. In Proceedings of the Conference on Fairness, Accountability, and Transparency (FAT* \u201819). Association for Computing Machinery, New York, NY, USA, 220\u2013229. https:\/\/doi.org\/10.1145\/3287560.3287596"},{"issue":"6","key":"2074_CR8","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1016\/j.ress.2010.01.011","volume":"95","author":"T Aven","year":"2010","unstructured":"Aven, Terje. \u201cOn how to define, understand and describe risk.\u201d Reliability Engineering & System Safety 95.6 (2010): 623-631.","journal-title":"Reliability Engineering & System Safety"},{"key":"2074_CR9","unstructured":"Regulation 2022\/1426 of the European parliament and of the council as regards uniform procedures and technical specifications for the type-approval of the automated driving system (ADS) of fully automated vehicles. Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32022R1426"},{"key":"2074_CR10","unstructured":"Confiance.ai (2024) Towards the engineering of trustworthy AI applications for critical systems. Second edition. Available online: https:\/\/www.confiance.ai\/public-documents\/."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2074-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2074-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2074-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T06:22:35Z","timestamp":1745389355000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2074-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2074"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2074-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}