{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:33:45Z","timestamp":1769718825567,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,16]]},"DOI":"10.1109\/qrs65678.2025.00032","type":"proceedings-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T17:51:28Z","timestamp":1759168288000},"page":"223-234","source":"Crossref","is-referenced-by-count":1,"title":["An Empirical Study on Machine Learning-Based Risk Prediction for Petroleum Pipelines"],"prefix":"10.1109","author":[{"given":"Haikang","family":"Gao","sequence":"first","affiliation":[{"name":"PipeChina Institute of Science and Technology,Tianjin,China"}]},{"given":"Ye","family":"Shang","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Gaolei","family":"Yi","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Yuan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing,China"}]},{"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Shenzhen Research Institute of Nanjing University,Shenzhen,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpvp.2009.01.009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.347-350.2168"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2023.118177"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"102047","DOI":"10.1016\/j.strusafe.2020.102047","article-title":"Failure risk analysis of pipelines using data-driven machine learning algorithms","volume":"89","author":"Mazumder","year":"2021","journal-title":"Structural Safety"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1061\/JPSEA2.PSENG-1464"},{"key":"ref6","article-title":"Utilizing machine learning to prevent water main breaks by understanding pipeline failure drivers","author":"Weeraddana","year":"2020","journal-title":"arXiv preprint"},{"key":"ref7","article-title":"Risk analysis of flowlines in the oil and gas sector: A gis and machine learning approach","author":"Chittumuri","year":"2025","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.24.02.p2.6880"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.24.02.p7.120130"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1115\/IPC2022-87258"},{"key":"ref11","volume-title":"Predicting corrosion on protected buried steel natural gas distribution pipelines","author":"Meyer","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1115\/IPC2020-9373"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1115\/IPC2018-78364"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1115\/IPC2020-9624"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1115\/ipc2020-9331"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.28999\/2514-541X-2019-3-2-92-104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s43065-022-00066-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2991\/jracr.2012.2.1.7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)PS.1949-1204.0000601"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2017.10.334"},{"issue":"8","key":"ref21","first-page":"1","article-title":"Risk acceptability criterion and index model for oil and gas pipelines","volume":"28","author":"Dai","year":"2009","journal-title":"Oil & Gas Storage and Transportation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(01)00065-2"},{"key":"ref24","article-title":"Boosting algorithms as gradient descent","volume":"12","author":"Mason","year":"1999","journal-title":"Advances in neural information processing systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2656.2008.01390.x"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"key":"ref29","article-title":"C4.5: programs for machine learning","author":"Quinlan","year":"2014","journal-title":"Elsevier"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref33","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","volume-title":"Proceedings of the thirteenth international conference on artificial intelligence and statistics. JMLR Workshop and Conference Proceedings","author":"Glorot","year":"2010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref35","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint"}],"event":{"name":"2025 25th International Conference on Software Quality, Reliability and Security (QRS)","location":"Hangzhou, China","start":{"date-parts":[[2025,7,16]]},"end":{"date-parts":[[2025,7,20]]}},"container-title":["2025 25th International Conference on Software Quality, Reliability and Security (QRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11173421\/11173424\/11173499.pdf?arnumber=11173499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T13:50:33Z","timestamp":1759240233000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11173499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,16]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/qrs65678.2025.00032","relation":{},"subject":[],"published":{"date-parts":[[2025,7,16]]}}}