{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:28:08Z","timestamp":1754486888357,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T00:00:00Z","timestamp":1681171200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T00:00:00Z","timestamp":1681171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100006502","name":"Defense Sciences Office, DARPA","doi-asserted-by":"publisher","award":["HR001119S0030"],"award-info":[{"award-number":["HR001119S0030"]}],"id":[{"id":"10.13039\/100006502","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-01747-8","type":"journal-article","created":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T13:02:41Z","timestamp":1681218161000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Uncovering Strategies and Commitment Through Machine Learning System Introspection"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2580-7017","authenticated-orcid":false,"given":"Julia Filiberti","family":"Allen","sequence":"first","affiliation":[]},{"given":"Steve","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Steven A.","family":"Gabriel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,11]]},"reference":[{"key":"1747_CR1","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"A Barredo Arrieta","year":"2020","unstructured":"Barredo Arrieta A, et al. Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf Fusion. 2020;58:82\u2013115.","journal-title":"Inf. Fusion"},{"issue":"44","key":"1747_CR2","doi-asserted-by":"publisher","first-page":"22071","DOI":"10.1073\/pnas.1900654116","volume":"116","author":"WJ Murdoch","year":"2019","unstructured":"Murdoch WJ, Singh C, Kumbier K, Abbasi-Asl R, Yu B. Definitions, methods, and applications in interpretable machine learning. Proc Natl Acad Sci U S A. 2019;116(44):22071\u201380. https:\/\/doi.org\/10.1073\/pnas.1900654116.","journal-title":"Proc Natl Acad Sci U S A"},{"key":"1747_CR3","unstructured":"E. Schmidt et al., \u201cFinal Report, Chapter 7: Establishing Justified Confidence in AI Systems,\u201d 2021."},{"key":"1747_CR4","unstructured":"Google, \u201cExplainable AI,\u201d 2021. https:\/\/cloud.google.com\/explainable-ai."},{"key":"1747_CR5","unstructured":"I.B.M., \u201cExplainable AI,\u201d 2021. https:\/\/www.ibm.com\/watson\/explainable-ai."},{"issue":"2","key":"1747_CR6","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1109\/TNSM.2021.3075656","volume":"18","author":"P Krishnamurthy","year":"2021","unstructured":"Krishnamurthy P, Khorrami F, Schmidt S, Wright K. Machine learning for NetFlow anomaly detection with human-readable annotations. IEEE Trans Netw Serv Manag. 2021;18(2):1885\u201398. https:\/\/doi.org\/10.1109\/TNSM.2021.3075656.","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"1747_CR7","doi-asserted-by":"crossref","unstructured":"Schmidt S, Stankowicz J, Carmack J, Kuzdeba S. RiftNeXt(TM): Explainable Deepn Neural RF Scene Classification. 2021.","DOI":"10.1145\/3468218.3469045"},{"key":"1747_CR8","first-page":"9210","volume":"16814","author":"M Sundararajan","year":"2020","unstructured":"Sundararajan M, Najmi A. The many shapley values for model explanation. 37th Int Conf Mach Learn ICML. 2020;16814:9210\u201320.","journal-title":"37th Int Conf. Mach. Learn. ICML"},{"key":"1747_CR9","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00029","author":"J Hilton","year":"2020","unstructured":"Hilton J, Cammarata N, Carter S, Goh G, Olah C. Understanding RL vision. Distill. 2020. https:\/\/doi.org\/10.23915\/distill.00029.","journal-title":"Distill"},{"key":"1747_CR10","unstructured":"Schubert L, Petrov M, Carter S, Cammarata N, Goh G, Olah C. \u201cOpenAI Microscope,\u201d openai.com, 2020. https:\/\/microscope.openai.com\/about?models.technique=deep_dream."},{"key":"1747_CR11","unstructured":"Booth S, Zhou Y, Shah A, Shah J. Bayes-TrEx: a Bayesian Sampling Approach to Model Transparency by Example. 2020, [Online]. Available: http:\/\/arxiv.org\/abs\/2002.10248."},{"key":"1747_CR12","unstructured":"Vilone G, Longo L. Explainable Artificial Intelligence: a Systematic Review. Prepr. ArXiv, 2020, [Online]. Available: http:\/\/arxiv.org\/abs\/2006.00093."},{"key":"1747_CR13","unstructured":"B\u00e4uerle A, J\u00f6nsson D, Ropinski T. Neural Activation Patterns (NAPs): Visual Explainability of Learned Concepts,\u201d 2022, [Online]. Available: http:\/\/arxiv.org\/abs\/2206.10611."},{"key":"1747_CR14","unstructured":"Zahavy T, Ben Zrihem N, Mannor S. Graying the black box: Understanding DQNs. in 33rd International Conference on Machine Learning, ICML 2016; 4: 2809\u20132822."},{"issue":"1","key":"1747_CR15","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TVCG.2016.2598838","volume":"23","author":"PE Rauber","year":"2017","unstructured":"Rauber PE, Fadel SG, Falc\u00e3o AX, Telea AC. Visualizing the hidden activity of artificial neural networks. IEEE Trans Vis Comput Graph. 2017;23(1):101\u201310. https:\/\/doi.org\/10.1109\/TVCG.2016.2598838.","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1747_CR16","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1126\/science.aau6249","volume":"364","author":"M Jaderberg","year":"2019","unstructured":"Jaderberg M, et al. Human-level performance in 3D multiplayer games with population-based reinforcement learning. Science. 2019;364:859\u201365. https:\/\/doi.org\/10.1126\/science.aau6249.","journal-title":"Science"},{"key":"1747_CR17","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1007\/s00371-019-01673-y","volume":"35","author":"M Ali","year":"2019","unstructured":"Ali M, Jones ME, Xie X, Williams M. TimeCluster: dimension reduction applied to temporal data for visual analytics. Vis Comput. 2019;35:1013\u201326.","journal-title":"Vis Comput"},{"key":"1747_CR18","doi-asserted-by":"crossref","unstructured":"McInnes L, Healy J, Melville J. UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. Prepr. ArXiv, 2018, [Online]. Available: http:\/\/arxiv.org\/abs\/1802.03426.","DOI":"10.21105\/joss.00861"},{"key":"1747_CR19","unstructured":"Timothy L, Jonathan H, Alexander P, Nicolas H, Tom E, Yuval T, David S, Daan W (2015) Continuous control with deep reinforcement learning. CoRR"},{"key":"1747_CR20","first-page":"37","volume":"27","author":"J Allen","year":"2022","unstructured":"Allen J, Schmidt S, Gabriel SA. Reinforcement learning approach to speed-overmatched pursuit games with uncertain target information. Mil Oper Res Soc J. 2022;27:37\u201350.","journal-title":"Mil Oper Res Soc J"},{"key":"1747_CR21","unstructured":"\u201cDefense Advanced Research Projects Agency (DARPA),\u201d 2019. https:\/\/www.darpa.mil\/program\/competency-aware-machine-learning."},{"key":"1747_CR22","first-page":"744","volume-title":"Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)","author":"AS Klyubin","year":"2005","unstructured":"Klyubin AS, Polani D, Nehaniv CL. All else being equal be empowered. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). Berlin: Springer Berlin Heidelberg; 2005. p. 744\u201353."},{"issue":"1","key":"1747_CR23","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1177\/1059712310392389","volume":"19","author":"T Jung","year":"2011","unstructured":"Jung T, Polani D, Stone P. Empowerment for continuous agent-environment systems. Adapt Behav. 2011;19(1):16\u201339. https:\/\/doi.org\/10.1177\/1059712310392389.","journal-title":"Adapt Behav"},{"issue":"12","key":"1747_CR24","doi-asserted-by":"publisher","first-page":"4018","DOI":"10.1371\/journal.pone.0004018","volume":"3","author":"AS Klyubin","year":"2008","unstructured":"Klyubin AS, Polani D, Nehaniv CL. Keep your options open: an information-based driving principle for sensorimotor systems. PLoS ONE. 2008;3(12):4018. https:\/\/doi.org\/10.1371\/journal.pone.0004018.","journal-title":"PLoS ONE"},{"key":"1747_CR25","doi-asserted-by":"publisher","unstructured":"Pathak D, Agrawal P, Efros A, Darrell T (2017) Curiosity-driven Exploration by Self-supervised Prediction. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 2017, pp. 488\u2013489. https:\/\/doi.org\/10.1109\/CVPRW.2017.70","DOI":"10.1109\/CVPRW.2017.70"},{"key":"1747_CR26","doi-asserted-by":"publisher","unstructured":"Dey S, Huang KW, Beerel PA, Chugg KM (2018) Characterizing sparse connectivity patterns in neural networks. In: 2018 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 2018, pp. 1\u20139. https:\/\/doi.org\/10.1109\/ITA.2018.8502950.","DOI":"10.1109\/ITA.2018.8502950"},{"issue":"3","key":"1747_CR27","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE. A mathematical theory of communication. Bell Syst Tech J. 1948;27(3):379\u2013423. https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x.","journal-title":"Bell Syst Tech J"},{"key":"1747_CR28","volume-title":"Elements of information theory","author":"TM Book","year":"1991","unstructured":"Book TM, Thomas JA. Elements of information theory. Hoboken: Wiley; 1991."},{"issue":"279","key":"1747_CR29","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1080\/01621459.1957.10501395","volume":"52","author":"WH Kruskal","year":"1957","unstructured":"Kruskal WH. Historical notes on the wilcoxon unpaired two-sample test. J Am Stat Assoc. 1957;52(279):356\u201360. https:\/\/doi.org\/10.1080\/01621459.1957.10501395.","journal-title":"J Am Stat Assoc"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01747-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-01747-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01747-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T15:08:11Z","timestamp":1687014491000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-01747-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,11]]},"references-count":29,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,7]]}},"alternative-id":["1747"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-01747-8","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2023,4,11]]},"assertion":[{"value":"29 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"All principles of ethical and professional conduct have been followed. No human and\/or animal research was conducted as part of this submission.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"BAE Systems has approved this research for public release, unlimited distribution. Not export controlled per ES-FL-051121-0060.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"322"}}