{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:10:04Z","timestamp":1775880604609,"version":"3.50.1"},"reference-count":70,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,11]]},"DOI":"10.1109\/aipr57179.2022.10092226","type":"proceedings-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T19:01:19Z","timestamp":1681153279000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Increasing Trust in Artificial Intelligence with a Defensible AI Technique"],"prefix":"10.1109","author":[{"given":"Jeremy","family":"Straub","sequence":"first","affiliation":[{"name":"North Dakota State University,Department of Computer Science,Fargo,ND,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tcbb.2020.2994780"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/S0276-897620200000020004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/joitmc7010071"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-019-01099-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143865"},{"key":"ref6","first-page":"1","article-title":"Introduction to semi-supervised learning. Synth","volume":"6","author":"Goldberg","year":"2009","journal-title":"Lect. Artif. Intell. Mach. Learn."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.3.295"},{"key":"ref8","volume-title":"Weapons of Math Destruction; Broadway Books","author":"Neil","year":"2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11805.001.0001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1pwt9w5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-019-00931-w"},{"key":"ref12","article-title":"Tort Liability for Artificial Intelligence and Expert Systems","volume":"10","author":"Cole","year":"1990","journal-title":"Comput. Law. J."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47175-4_20"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32236-6_51"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107275"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.05.020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9328-0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1504\/ijsi.2013.055801"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1367-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2009.022775"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2942813"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1063\/1.1144830"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9330-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/ai3020024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref27","first-page":"127","article-title":"Constructing an expert system. Build","volume":"50","author":"Buchanan","year":"1983","journal-title":"Expert Syst."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(85)90063-3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.10.053"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2017.03.006"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2166\/wst.2010.442"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.11648\/j.ebm.20180402.12"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.15308\/Sinteza-2019-472-477"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769557"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-020-00228-y"},{"key":"ref36","author":"Eykholt","year":"2017","journal-title":"Robust Physical-World Attacks on Deep Learning Models"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref38","author":"Gong","year":"2017","journal-title":"Crafting Adversarial Examples For Speech Paralinguistics Applications"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/261618.261639"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/222092.222235"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2006.02.006"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref43","article-title":"The Criminal Liability of Artificial Intelligence Entities - From Science Fiction to Legal Social Control","volume":"4","author":"Hallevy","year":"2010","journal-title":"Akron Intellect. Prop. J."},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11572-007-9042-1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/69.368522"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejmp.2021.02.024"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2020.1741118"},{"key":"ref48","first-page":"26","article-title":"Bridging the Gap Between Ethics and Practice. ACM Trans. Interact","volume":"10","author":"Shneiderman","year":"2020","journal-title":"Intell. Syst."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aay7120"},{"key":"ref50","author":"Vilone","year":"2020","journal-title":"Explainable Artificial Intelligence: a Systematic Review"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491538"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114104"},{"key":"ref53","article-title":"Explainable Artificial Intelligence via Bayesian Teaching","volume-title":"Proceedings of the NIPS 2017 workshop on Teaching Machines, Robots, and Humans; Long Beach","author":"Cheng"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50788-6_14"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3332281"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref57","article-title":"An explainable artificial intelligence system for small-unit tactical behavior","volume-title":"Proceedings of the Proceedings of the 16th conference on Innovative applications of artificial intelligence","author":"Lent"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/vts50974.2021.9441050"},{"key":"ref59","first-page":"753","article-title":"Assessment of the reliability of AI programs. Proc. 2nd Int","volume-title":"IEEE Conf. Tools Artif. Intell.","author":"Bastani"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3101257"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3226"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2021.3128514"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.mex.2021.101477"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-021-00672-7"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2021.100121"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/computers10080103"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109465"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/s21217083"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10122440"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/systems10050160"}],"event":{"name":"2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","location":"DC, USA","start":{"date-parts":[[2022,10,11]]},"end":{"date-parts":[[2022,10,13]]}},"container-title":["2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10091955\/10092198\/10092226.pdf?arnumber=10092226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T04:34:24Z","timestamp":1710390864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10092226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,11]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/aipr57179.2022.10092226","relation":{},"subject":[],"published":{"date-parts":[[2022,10,11]]}}}