{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:07:19Z","timestamp":1770462439737,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"H2020 programme","award":["823788"],"award-info":[{"award-number":["823788"]}]},{"DOI":"10.13039\/501100009888","name":"Regione Toscana","doi-asserted-by":"publisher","award":["POR FESR 2014-2020"],"award-info":[{"award-number":["POR FESR 2014-2020"]}],"id":[{"id":"10.13039\/501100009888","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004895","name":"European Social Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/tetc.2022.3178631","type":"journal-article","created":{"date-parts":[[2022,6,3]],"date-time":"2022-06-03T19:45:14Z","timestamp":1654285514000},"page":"1671-1686","source":"Crossref","is-referenced-by-count":11,"title":["On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2286-2819","authenticated-orcid":false,"given":"Mohamad","family":"Gharib","sequence":"first","affiliation":[{"name":"Informatic and Maths Department (DiMal), University of Florence, Firenze, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9820-6047","authenticated-orcid":false,"given":"Tommaso","family":"Zoppi","sequence":"additional","affiliation":[{"name":"Informatic and Maths Department (DiMal), University of Florence, Firenze, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7366-6530","authenticated-orcid":false,"given":"Andrea","family":"Bondavalli","sequence":"additional","affiliation":[{"name":"Informatic and Maths Department (DiMal), University of Florence, Firenze, Italy"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISR50024.2021.9419381"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-09954-8"},{"key":"ref33","article-title":"A systematic mapping study on testing of machine learning programs","author":"sherin","year":"2019"},{"key":"ref32","first-page":"5","author":"burton","year":"2017","journal-title":"Making the Case for Safety of Machine Learning in Highly Automated Driving"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/978-3-319-99229-7_39","article-title":"Uncertainty in machine learning: A safety perspective on autonomous driving","author":"shafaei","year":"2018","journal-title":"Lecture Notes in Computer Science"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3194085.3194090"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"hossin","year":"2015","journal-title":"International Journal of Data Mining &amp; Knowledge Management Process"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2019.2953253"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54549-9_13"},{"key":"ref34","first-page":"23","article-title":"Assurance argument patterns and processes for machine learning in safety-related systems","author":"picardi","year":"2020","journal-title":"Proc Workshop Artif Intell Saf"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3090957"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2020.3016583"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2991\/jase.d.190131.001"},{"key":"ref12","article-title":"Using machine learning safely in automotive software: An assessment and adaption of software process requirements in ISO 26262","author":"salay","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4271\/2016-01-0128"},{"key":"ref14","article-title":"Committee on national security systems (CNSS) glossary","author":"dukes","year":"2015"},{"key":"ref15","article-title":"Functional safety of electrical\/electronic\/programmable electronic safety-related systems","year":"2000"},{"key":"ref16","article-title":"EN 50129:2003 CLC\/TR 50404 railway applications - Communication, signalling and processing systems - Safety related electronic systems for signalling","year":"2003"},{"key":"ref17","article-title":"26262-6: 2018&#x2014;road vehicles&#x2014;functional safety&#x2014;part 6: Product development at the software level","year":"2018"},{"key":"ref18","first-page":"1","article-title":"The goal structuring notation-A safety argument notation","author":"kelly","year":"2004","journal-title":"Proc Dependable Syst Netw Workshop Assurance Cases"},{"key":"ref19","author":"bishop","year":"0","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1089\/big.2016.0051"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref27","first-page":"18","article-title":"Feature selection based on information gain","volume":"2","author":"azhagusundari","year":"2013","journal-title":"International Journal of Innovative Technology and Exploring Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00074"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3442074"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942153"},{"key":"ref5","first-page":"37","article-title":"Evaluation: From precision, recall and f-measure to ROC, informedness, markedness and correlation","volume":"2","author":"powers","year":"2011","journal-title":"J Mach Learn Technol"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982544"},{"key":"ref7","first-page":"1","author":"miller","year":"2015","journal-title":"Remote exploitation of an unaltered passenger vehicle"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/b10094"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref1","first-page":"1","article-title":"Applications of neural networks in high assurance systems","author":"schumann","year":"2010","journal-title":"Neural Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335437"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3467470"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-14-135"},{"key":"ref21","first-page":"77","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc 20th USENIX Secur Symp"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDS53782.2021.9626739"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00357-020-09362-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00051"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2019.00035"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3441140"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9970409\/09788529.pdf?arnumber=9788529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:13:49Z","timestamp":1672082029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9788529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2022.3178631","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}