{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:02:23Z","timestamp":1776182543731,"version":"3.50.1"},"reference-count":249,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Artificial Intelligence (AI) algorithms are increasingly providing decision making and operational support across multiple domains. AI includes a wide (and growing)\u00a0library of algorithms that could be applied\u00a0for different problems. One important notion for the adoption of AI algorithms into operational decision processes is the concept of assurance. The literature on assurance, unfortunately, conceals its outcomes within a tangled landscape of conflicting approaches, driven by contradicting motivations, assumptions, and intuitions. Accordingly, albeit a rising and novel area, this manuscript provides a systematic review of research works that are relevant to AI assurance, between years 1985 and 2021, and aims to provide a structured alternative to the landscape. A new AI assurance definition is adopted and presented, and assurance methods are contrasted and tabulated. Additionally, a ten-metric scoring system is developed and introduced to evaluate and compare existing methods. Lastly, in this manuscript, we provide foundational insights, discussions, future directions, a roadmap, and applicable recommendations for the development and deployment of AI assurance.<\/jats:p>","DOI":"10.1186\/s40537-021-00445-7","type":"journal-article","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T08:03:33Z","timestamp":1619424213000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":96,"title":["A survey on artificial intelligence assurance"],"prefix":"10.1186","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6062-2747","authenticated-orcid":false,"given":"Feras A.","family":"Batarseh","sequence":"first","affiliation":[]},{"given":"Laura","family":"Freeman","sequence":"additional","affiliation":[]},{"given":"Chih-Hao","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"445_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90403-0_2","volume-title":"Human and machine learning: visible, explainable, trustworthy and transparent","author":"B Abdollahi","year":"2018","unstructured":"Abdollahi B, Nasraoui O. Transparency in fair machine learning: the case of explainable recommender systems. In: Zhou J, Chen F, editors. Human and machine learning: visible, explainable, trustworthy and transparent. Berlin: Springer; 2018 https:\/\/doi.org\/10.1007\/978-3-319-90403-0_2."},{"key":"445_CR2","unstructured":"Abel T, Gonzalez A (1997). Utilizing Criteria to Reduce a Set of Test Cases for Expert System Validation."},{"key":"445_CR3","unstructured":"Abel T, Knauf R, Gonzalez A. (1996). Generation of a minimal set of test cases that is functionally equivalent to an exhaustive set, for use in knowledge-based system validation."},{"key":"445_CR4","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi A, Berrada M. Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access. 2018;6:23.","journal-title":"IEEE Access"},{"key":"445_CR5","unstructured":"Agarwal A., Lohia P, Nagar, S, Dey K, Saha D. (2018). Automated Test Generation to Detect Individual Discrimination in AI Models ArXiv:1809.03260 [Cs]."},{"key":"445_CR6","volume-title":"Assured human-autonomy interaction through machine self-confidence","author":"M Aitken","year":"2016","unstructured":"Aitken M. Assured human-autonomy interaction through machine self-confidence. Colorado: University of Colorado; 2016."},{"key":"445_CR7","unstructured":"Algorithmic Accountability Policy Tooklit. (2018). AI NOW."},{"key":"445_CR8","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-319-11593-1_9","volume-title":"Geographic information science","author":"AL Ali","year":"2014","unstructured":"Ali AL, Schmid F. Data quality assurance for volunteered geographic information. In: Duckham M, Pebesma E, Stewart K, Frank AU, editors. Geographic information science. Berlin: Springer; 2014. p. 126\u201341."},{"key":"445_CR9","unstructured":"Alves E, Bhatt D, Hall B, Driscoll K, Murugesan A (2018). Considerations in Assuring Safety of Increasingly Autonomous Systems (NASA Contractor Report NASA\/CR\u20132018\u201322008; Issue NASA\/CR\u20132018\u201322008). NASA."},{"key":"445_CR10","unstructured":"Amodei D, Olah C, Steinhardt J, Christiano P, Schulman J, Man\u00e9 D. Concrete Problems in AI Safety. ArXiv:1606.06565[Cs].; 2016."},{"issue":"2","key":"445_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3366485","volume":"10","author":"A Anderson","year":"2020","unstructured":"Anderson A, Dodge J, Sadarangani A, Juozapaitis Z, Newman E, Irvine J, Chattopadhyay S, Olson M, Fern A, Burnett M. Mental models of mere mortals with explanations of reinforcement learning. ACM Trans Interact Intell Syst. 2020;10(2):1\u201337. https:\/\/doi.org\/10.1145\/3366485.","journal-title":"ACM Trans Interact Intell Syst"},{"issue":"2","key":"445_CR12","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/0020-7373(92)90023-E","volume":"36","author":"EP Andert","year":"1992","unstructured":"Andert EP. Integrated knowledge-based system design and validation for solving problems in uncertain environments. Int J Man Mach Stud. 1992;36(2):357\u201373. https:\/\/doi.org\/10.1016\/0020-7373(92)90023-E.","journal-title":"Int J Man Mach Stud"},{"key":"445_CR13","first-page":"123","volume":"19","author":"G Antoniou","year":"1998","unstructured":"Antoniou G, Harmelen F, Plant R, Vanthienen J. Verification and validation of knowledge-based systems: report on two 1997 events. AI Mag. 1998;19:123\u20136.","journal-title":"AI Mag"},{"key":"445_CR14","doi-asserted-by":"publisher","unstructured":"Antunes N, Balby L, Figueiredo F, Lourenco N, Meira W, Santos W (2018). Fairness and Transparency of Machine Learning for Trustworthy Cloud Services. 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 188\u2013193. https:\/\/doi.org\/10.1109\/DSN-W.2018.00063","DOI":"10.1109\/DSN-W.2018.00063"},{"key":"445_CR15","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-319-15096-3_10","volume-title":"Concepts and methodologies for modeling and simulation: a tribute to Tuncer \u00d6ren","author":"SMN Arifin","year":"2015","unstructured":"Arifin SMN, Madey GR. Verification, validation, and replication methods for agent-based modeling and simulation: lessons learned the hard way! In: Yilmaz L, editor. Concepts and methodologies for modeling and simulation: a tribute to Tuncer \u00d6ren. Berlin: Springer; 2015. p. 217\u201342."},{"key":"445_CR16","unstructured":"Arrieta AB, D\u00edaz-Rodr\u00edguez N, Del Ser J, Bennetot A, Tabik S, Barbado A, Garc\u00eda S, Gil-L\u00f3pez S, Molina D, Benjamins R, Chatila R, Herrera F. (2019). Explainable Artificial Intelligence (XAI): Concepts, Taxonomies, Opportunities and Challenges toward Responsible AI.ArXiv:1910.10045 [Cs]."},{"key":"445_CR17","unstructured":"Assurance in the age of AI. (2018). EY."},{"key":"445_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3115\/1118053.1118058","volume":"9","author":"VB Barr","year":"2001","unstructured":"Barr VB, Klavans JL. Verification and validation of language processing systems: is it evaluation? Proc Workshop Eval Lang Dialogue Syst. 2001;9:1\u20137. https:\/\/doi.org\/10.3115\/1118053.1118058.","journal-title":"Proc Workshop Eval Lang Dialogue Syst"},{"key":"445_CR19","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1109\/ITSC.2019.8916985","volume":"2019","author":"A Barredo-Arrieta","year":"2019","unstructured":"Barredo-Arrieta A, Lana I, Del Ser J. What lies beneath: a note on the explainability of black-box machine learning models for road traffic forecasting. IEEE Intell Transp Syst Conf (ITSC). 2019;2019:2232\u20137. https:\/\/doi.org\/10.1109\/ITSC.2019.8916985.","journal-title":"IEEE Intell Transp Syst Conf (ITSC)"},{"issue":"3","key":"445_CR20","first-page":"12","volume":"43","author":"FA Batarseh","year":"2013","unstructured":"Batarseh FA, Gonzalez AJ. Incremental lifecycle validation of knowledge-based systems through commonKADS. EEE Trans Syst Man Cybern. 2013;43(3):12.","journal-title":"EEE Trans Syst Man Cybern"},{"issue":"4","key":"445_CR21","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s10462-013-9396-9","volume":"43","author":"FA Batarseh","year":"2015","unstructured":"Batarseh FA, Gonzalez AJ. Validation of knowledge-based systems: a reassessment of the field. Artif Intell Rev. 2015;43(4):485\u2013500. https:\/\/doi.org\/10.1007\/s10462-013-9396-9.","journal-title":"Artif Intell Rev"},{"key":"445_CR22","unstructured":"Batarseh AF, Yang R. Transforming Government and Agricultural Policy Using Artificial Intelligence: Federal Data Science; 2017."},{"key":"445_CR23","unstructured":"Batarseh A, Feras, Mohod R, Kumar, A, and Bui J. Chapter 10: the Application of Artificial Intelligence in Software Engineering: a Review Challenging Conventional Wisdom. (2020). In Data Democracy, Elsevier Academic Press. pp. 179\u2013232"},{"key":"445_CR24","unstructured":"Batarseh F. A, Kulkarni A. (2019). Context-Driven Data Mining through Bias Removal and Incompleteness Mitigation. 7."},{"key":"445_CR25","unstructured":"Becker L. A, Green P. G, Bhatnagar J. (1989). Evidence Flow Graph Methods for Validation and Verification of Expert Systems (NASA Contractor Report No. 181810; p. 46). Worcester Polytechnic Institute."},{"issue":"4","key":"445_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1147\/JRD.2019.2942287","volume":"63","author":"RKE Bellamy","year":"2019","unstructured":"Bellamy RKE, Mojsilovic A, Nagar S, Ramamurthy KN, Richards J, Saha D, Sattigeri P, Singh M, Varshney KR, Zhang Y, Dey K, Hind M, Hoffman SC, Houde S, Kannan K, Lohia P, Martino J, Mehta S. AI Fairness 360: An extensible toolkit for detecting and mitigating algorithmic bias. IBM J Res Dev. 2019;63(4):1\u20134. https:\/\/doi.org\/10.1147\/JRD.2019.2942287.","journal-title":"IBM J Res Dev"},{"issue":"12","key":"445_CR27","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/2.970578","volume":"34","author":"DJ Berndt","year":"2001","unstructured":"Berndt DJ, Fisher JW, Hevner AR, Studnicki J. Healthcare data warehousing and quality assurance. Computer. 2001;34(12):56\u201365. https:\/\/doi.org\/10.1109\/2.970578.","journal-title":"Computer"},{"key":"445_CR28","doi-asserted-by":"publisher","first-page":"5014","DOI":"10.1109\/IROS40897.2019.8968488","volume":"2019","author":"B Beyret","year":"2019","unstructured":"Beyret B, Shafti A, Faisal AA. Dot-to-Dot: explainable hierarchical reinforcement learning for robotic manipulation. IEEE\/RSJ Int Conf Intell Robots Syst (IROS). 2019;2019:5014\u20139. https:\/\/doi.org\/10.1109\/IROS40897.2019.8968488.","journal-title":"IEEE\/RSJ Int Conf Intell Robots Syst (IROS)"},{"issue":"3","key":"445_CR29","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s13167-020-00216-z","volume":"11","author":"C Birkenbihl","year":"2020","unstructured":"Birkenbihl C. Differences in cohort study data affect external validation of artificial intelligence models for predictive diagnostics of dementia\u2014Lessons for translation into clinical practice. EPMA J. 2020;11(3):367\u201376.","journal-title":"EPMA J"},{"issue":"2","key":"445_CR30","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.compenvurbsys.2009.10.001","volume":"34","author":"C Bone","year":"2010","unstructured":"Bone C, Dragi\u0107evi\u0107 S. Simulation and validation of a reinforcement learning agent-based model for multi-stakeholder forest management. Comput Environ Urban Syst. 2010;34(2):162\u201374. https:\/\/doi.org\/10.1016\/j.compenvurbsys.2009.10.001.","journal-title":"Comput Environ Urban Syst"},{"key":"445_CR31","doi-asserted-by":"publisher","unstructured":"Brancovici, G. (2007). Towards Trustworthy Intelligence on the Road: A Flexible Architecture for Safe, Adaptive, Autonomous Applications. 2007 IEEE Congress on Evolutionary Computation, Singapore. https:\/\/doi.org\/10.1109\/CEC.2007.4425023","DOI":"10.1109\/CEC.2007.4425023"},{"key":"445_CR32","unstructured":"Breck E, Zinkevich M, Polyzotis N, Whang S, Roy S. (2019). Data Validation for Machine Learning. Proceedings of SysML. https:\/\/mlsys.org\/Conferences\/2019\/doc\/2019\/167.pdf"},{"key":"445_CR33","doi-asserted-by":"publisher","unstructured":"Brennen, A. (2020). What Do People Really Want When They Say They Want \u201cExplainable AI?\u201d We Asked 60 Stakeholders. Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 1\u20137. https:\/\/doi.org\/10.1145\/3334480.3383047","DOI":"10.1145\/3334480.3383047"},{"key":"445_CR34","doi-asserted-by":"publisher","unstructured":"Bride H, Dong J. S, H\u00f3u Z, Mahony B, Oxenham M. (2018). Towards Trustworthy AI for Autonomous Systems. In J. Sun M. Sun (Eds.), Formal Methods and Software Engineering (pp. 407\u2013411). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-02450-5_24","DOI":"10.1007\/978-3-030-02450-5_24"},{"issue":"8","key":"445_CR35","doi-asserted-by":"publisher","first-page":"2929","DOI":"10.1007\/s12652-018-0714-6","volume":"10","author":"N Cao","year":"2019","unstructured":"Cao N, Li G, Zhu P, Sun Q, Wang Y, Li J, Yan M, Zhao Y. Handling the adversarial attacks. J Ambient Intell Humaniz Comput. 2019;10(8):2929\u201343. https:\/\/doi.org\/10.1007\/s12652-018-0714-6.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"445_CR36","unstructured":"Carley K. M. (1996). Validating Computational Models [Work Paper]. Carnegie Mellon University."},{"key":"445_CR37","unstructured":"Castore G. (1987). A Formal Approach to Validation and Verification for Knowledge-Based Control. Systems. 6."},{"key":"445_CR38","unstructured":"Celis L. E, Deshpande A, Kathuria T, Vishnoi N. K. (2016). How to be Fair and Diverse? ArXiv:1610.07183 [Cs]."},{"key":"445_CR39","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1613\/jair.1.11332","volume":"67","author":"A Checco","year":"2020","unstructured":"Checco A, Bates J, Demartini G. Adversarial attacks on crowdsourcing quality control. J Artif Intell Res. 2020;67:375\u2013408. https:\/\/doi.org\/10.1613\/jair.1.11332.","journal-title":"J Artif Intell Res"},{"key":"445_CR40","doi-asserted-by":"publisher","first-page":"134246","DOI":"10.1109\/ACCESS.2020.3006491","volume":"8","author":"H-Y Chen","year":"2020","unstructured":"Chen H-Y, Lee C-H. Vibration signals analysis by explainable artificial intelligence (XAI) approach: application on bearing faults diagnosis. IEEE Access. 2020;8:134246\u201356. https:\/\/doi.org\/10.1109\/ACCESS.2020.3006491.","journal-title":"IEEE Access"},{"issue":"1","key":"445_CR41","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/s42400-019-0027-x","volume":"2","author":"T Chen","year":"2019","unstructured":"Chen T, Liu J, Xiang Y, Niu W, Tong E, Han Z. Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecurity. 2019;2(1):11. https:\/\/doi.org\/10.1186\/s42400-019-0027-x.","journal-title":"Cybersecurity"},{"key":"445_CR42","doi-asserted-by":"publisher","unstructured":"Chittajallu, D. R, Dong B, Tunison P, Collins R, Wells K, Fleshman J, Sankaranarayanan G, Schwaitzberg S, Cavuoto L, Enquobahrie A. (2019). XAI-CBIR: Explainable AI System for Content based Retrieval of Video Frames from Minimally Invasive Surgery Videos. 2019 IEEE 16th International Symposium on Biomedical Imaging (ISBI 2019), 66\u201369. https:\/\/doi.org\/10.1109\/ISBI.2019.8759428","DOI":"10.1109\/ISBI.2019.8759428"},{"key":"445_CR43","unstructured":"Cluzeau J. M, Henriquel X, Rebender G, Soudain G, Dijk L. van, Gronskiy A, Haber D, Perret-Gentil C, Polak R. (2020). Concepts of Design Assurance for Neural Networks (CoDANN) [Public Report Extract]. European Union Aviation Safety Agency."},{"issue":"2","key":"445_CR44","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1017\/S0269888900002010","volume":"15","author":"F Coenen","year":"2000","unstructured":"Coenen F, Bench-Capon T, Boswell R, Dibie-Barth\u00e9lemy J, Eaglestone B, Gerrits R, Gr\u00e9goire E, Lige\u00b8za, A, Laita, L, Owoc, M, Sellini, F, Spreeuwenberg, S, Vanthienen, J, Vermesan, A, Wiratunga, N. . Validation and verification of knowledge-based systems: report on EUROVAV99. Knowl Eng Rev. 2000;15(2):187\u201396. https:\/\/doi.org\/10.1017\/S0269888900002010.","journal-title":"Knowl Eng Rev"},{"key":"445_CR45","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-45260-4_6","volume-title":"Trustworthy eternal systems via evolving software, data and knowledge","author":"KB Cohen","year":"2013","unstructured":"Cohen KB, Hunter LE, Palmer M. Assessment of software testing and quality assurance in natural language processing applications and a linguistically inspired approach to improving it. In: Moschitti A, Plank B, editors. Trustworthy eternal systems via evolving software, data and knowledge. Berlin: Springer; 2013. p. 77\u201390. https:\/\/doi.org\/10.1007\/978-3-642-45260-4_6"},{"key":"445_CR46","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-030-35288-2_6","volume-title":"AI 2019: advances in Artificial intelligence","author":"F Cruz","year":"2019","unstructured":"Cruz F, Dazeley R, Vamplew P. Memory-Based Explainable Reinforcement Learning. In: Liu J, Bailey J, editors. AI 2019: Advances in Artificial Intelligence, vol. 11919. Berlin: Springer; 2019. p. 66\u201377.https:\/\/doi.org\/10.1007\/978-3-030-35288-2_6"},{"key":"445_CR47","unstructured":"Cruz F, Dazeley R, Vamplew P. (2020). Explainable robotic systems: Understanding goal-driven actions in a reinforcement learning scenario. ArXiv:2006.13615[Cs].nn"},{"key":"445_CR48","unstructured":"Culbert, C, Riley G, Savely R. T. (1987). Approaches to the Verification of Rule-Based Expert Systems. SOAR\u201987L First Annual Workshop on Space Operation Automation and Robotics, 27\u201337."},{"key":"445_CR49","doi-asserted-by":"crossref","unstructured":"Da\u011flarli E. (2020). Explainable Artificial Intelligence (xAI) Approaches and Deep Meta-Learning Models. In Advances and Applications in Deep Learning. IntechOpen.","DOI":"10.5772\/intechopen.92172"},{"key":"445_CR50","doi-asserted-by":"publisher","unstructured":"D\u2019Alterio, P Garibaldi, J. M John, R. I. (2020). Constrained Interval Type-2 Fuzzy Classification Systems for Explainable AI (XAI). 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1\u20138. https:\/\/doi.org\/10.1109\/FUZZ48607.2020.9177671","DOI":"10.1109\/FUZZ48607.2020.9177671"},{"key":"445_CR51","unstructured":"Das A, Rad P. (2020). Opportunities and Challenges in Explainable Artificial Intelligence (XAI): A Survey. ArXiv:2006.11371[Cs].n"},{"key":"445_CR52","doi-asserted-by":"crossref","unstructured":"David, N. (2013). Validating Simulations. In Simulating Social Complexity (pp. 135\u2013171). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-93813-2_8"},{"key":"445_CR53","unstructured":"Davis P. K. (1992). Generalizing concepts and methods of verification, validation, and accreditation (VV&A) for military simulations. Rand."},{"issue":"4","key":"445_CR54","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s13347-017-0293-z","volume":"31","author":"PB de Laat","year":"2018","unstructured":"de Laat PB. Algorithmic decision-making based on machine learning from big data: can transparency restore accountability? Philos Technol. 2018;31(4):525\u201341. https:\/\/doi.org\/10.1007\/s13347-017-0293-z.","journal-title":"Philos Technol"},{"key":"445_CR55","first-page":"177","volume-title":"Validation, verification and test of knowledge-based systems","author":"L De Raedt","year":"1991","unstructured":"De Raedt L, Sablon G, Bruynooghe M. Using Interactive Concept Learning for Knowledge-base Validation and Verification. In: Validation, verification and test of knowledge-based systems. Hoboken: Wiley; 1991. p. 177\u201390."},{"key":"445_CR56","doi-asserted-by":"publisher","unstructured":"Dghaym D, Turnock S, Butler M, Downes J, Hoang T. S, Pritchard B. (2020). Developing a Framework for Trustworthy Autonomous Maritime Systems. In Proceedings of the International Seminar on Safety and Security of Autonomous Vessels (ISSAV) and European STAMP Workshop and Conference (ESWC) 2019 (pp. 73\u201382). Sciendo. https:\/\/doi.org\/10.2478\/9788395669606-007","DOI":"10.2478\/9788395669606-007"},{"key":"445_CR57","doi-asserted-by":"publisher","unstructured":"Diallo, A. B, Nakagawa H, Tsuchiya T. (2020). An Explainable Deep Learning Approach for Adaptation Space Reduction. 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), 230\u2013231. https:\/\/doi.org\/10.1109\/ACSOS-C51401.2020.00063","DOI":"10.1109\/ACSOS-C51401.2020.00063"},{"key":"445_CR58","doi-asserted-by":"crossref","unstructured":"Dibie-Barthelemy J, Haemmerle O, Salvat E. (2006). A semantic validation of conceptual graphs. 13.","DOI":"10.1016\/j.knosys.2005.04.002"},{"key":"445_CR59","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1353\/lit.2015.0037","volume":"42","author":"J Dobson","year":"2015","unstructured":"Dobson J. Can an algorithm be disturbed?: Machine learning, intrinsic criticism, and the digital humanities. Coll Lit. 2015;42:543\u201364. https:\/\/doi.org\/10.1353\/lit.2015.0037.","journal-title":"Coll Lit"},{"key":"445_CR60","unstructured":"US Department of Defense (DoD) Directive 5000.59. 1995."},{"key":"445_CR61","unstructured":"Dodge J, Burnett M. (2020). Position: We Can Measure XAI Explanations Better with Templates. ExSS-ATEC@IUI, 1\u201313."},{"key":"445_CR62","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/WI-IAT.2010.101","volume":"2010","author":"G Dong","year":"2010","unstructured":"Dong G, Wu S, Wang G, Guo T, Huang Y. Security assurance with metamorphic testing and genetic algorithm. IEEE\/WIC\/ACM Int Conf Web Intell Agent Technol. 2010;2010:397\u2013401. https:\/\/doi.org\/10.1109\/WI-IAT.2010.101.","journal-title":"IEEE\/WIC\/ACM Int Conf Web Intell Agent Technol"},{"key":"445_CR63","doi-asserted-by":"publisher","unstructured":"Do\u0161ilovi\u0107, F. K, Brcic M, Hlupic N. (2018). Explainable artificial intelligence: A survey. 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 0210\u20130215. https:\/\/doi.org\/10.23919\/MIPRO.2018.8400040","DOI":"10.23919\/MIPRO.2018.8400040"},{"key":"445_CR64","volume-title":"An analysis of decompositional rule extraction for explainable neural Networks","author":"NK Dupuis","year":"2019","unstructured":"Dupuis NK, Verheij DB. An analysis of decompositional rule extraction for explainable neural Networks. Groningen: University of Groningen; 2019."},{"key":"445_CR65","first-page":"70","volume-title":"Ecological data: design, management and processing","author":"D Edwards","year":"2000","unstructured":"Edwards D. Data Quality Assurance. In: Ecological data: design, management and processing. Hoboken: Blackwell; 2000. p. 70\u201391."},{"issue":"4","key":"445_CR66","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1002\/mp.13433","volume":"46","author":"I El Naqa","year":"2019","unstructured":"El Naqa I, Irrer J, Ritter TA, DeMarco J, Al-Hallaq H, Booth J, Kim G, Alkhatib A, Popple R, Perez M, Farrey K, Moran JM. Machine learning for automated quality assurance in radiotherapy: a proof of principle using EPID data description. Med Phys. 2019;46(4):1914\u201321. https:\/\/doi.org\/10.1002\/mp.13433.","journal-title":"Med Phys"},{"key":"445_CR67","unstructured":"Elsayed G, Shankar S, Cheung B, Papernot N, Kurakin A, Goodfellow I, Sohl-Dickstein J. (2018). Adversarial Examples that Fool both Computer Vision and Time-Limited Humans. 11."},{"key":"445_CR68","unstructured":"Everitt T, Lea G, Hutter M. (2018). AGI Safety Literature Review. ArXiv:1805.01109[Cs]."},{"key":"445_CR69","doi-asserted-by":"publisher","unstructured":"Ferreyra E, Hagras H, Kern M, Owusu G. (2019). Depicting Decision-Making: A Type-2 Fuzzy Logic Based Explainable Artificial Intelligence System for Goal-Driven Simulation in the Workforce Allocation Domain. 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1\u20136. https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2019.8858933","DOI":"10.1109\/FUZZ-IEEE.2019.8858933"},{"key":"445_CR70","unstructured":"Forster D. A. (2006). Validation of individual consciousness in Strong Artificial Intelligence: An African Theological contribution. University of South Africa."},{"key":"445_CR71","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/SOSE.2016.63","volume":"2016","author":"J Gao","year":"2016","unstructured":"Gao J, Xie C, Tao C. Big data validation and quality assurance\u2014issuses, challenges, and Needs. IEEE Symposium on Service-Oriented System Engineering (SOSE). 2016;2016:433\u201341. https:\/\/doi.org\/10.1109\/SOSE.2016.63.","journal-title":"IEEE Symposium on Service-Oriented System Engineering (SOSE)"},{"issue":"1","key":"445_CR72","doi-asserted-by":"publisher","first-page":"9522","DOI":"10.1038\/s41598-020-66481-0","volume":"10","author":"L-J Gardiner","year":"2020","unstructured":"Gardiner L-J, Carrieri AP, Wilshaw J, Checkley S, Pyzer-Knapp EO, Krishna R. Using human in vitro transcriptome analysis to build trustworthy machine learning models for prediction of animal drug toxicity. Sci Rep. 2020;10(1):9522. https:\/\/doi.org\/10.1038\/s41598-020-66481-0.","journal-title":"Sci Rep"},{"issue":"4","key":"445_CR73","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0736-5853(05)80064-4","volume":"8","author":"L Gilstrap","year":"1991","unstructured":"Gilstrap L. Validation and verification of expert systems. Telematics Inform. 1991;8(4):439\u201348. https:\/\/doi.org\/10.1016\/S0736-5853(05)80064-4.","journal-title":"Telematics Inform"},{"key":"445_CR74","unstructured":"Ginsberg A, Weiss S. (2001). SEEK2: A Generalized Approach to Automatic Knowledge Base Refinement. 9th International Joint Conference on Artificial Intelligence, 1, 8."},{"key":"445_CR75","doi-asserted-by":"publisher","unstructured":"Glomsrud J. A, \u00d8deg\u00e5rdstuen A, Clair A. L. S, Smogeli \u00d8. (2020). Trustworthy versus Explainable AI in Autonomous Vessels. In Proceedings of the International Seminar on Safety and Security of Autonomous Vessels (ISSAV) and European STAMP Workshop and Conference (ESWC) 2019 (pp. 37\u201347). Sciendo. https:\/\/doi.org\/10.2478\/9788395669606-004","DOI":"10.2478\/9788395669606-004"},{"key":"445_CR76","doi-asserted-by":"publisher","unstructured":"Go, W Lee D. (2018). Toward Trustworthy Deep Learning in Security. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2219\u20132221. https:\/\/doi.org\/10.1145\/3243734.3278526","DOI":"10.1145\/3243734.3278526"},{"issue":"4","key":"445_CR77","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1080\/095281300454793","volume":"12","author":"AJ Gonzalez","year":"2000","unstructured":"Gonzalez AJ, Barr V. Validation and verification of intelligent systems\u2014What are they and how are they different? J Exp Theor Artif Intell. 2000;12(4):407\u201320. https:\/\/doi.org\/10.1080\/095281300454793.","journal-title":"J Exp Theor Artif Intell"},{"issue":"3","key":"445_CR78","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/0952-1976(95)00018-6","volume":"9","author":"AJ Gonzalez","year":"1996","unstructured":"Gonzalez AJ, Gupta UG, Chianese RB. Performance evaluation of a large diagnostic expert system using a heuristic test case generator. Eng Appl Artif Intell. 1996;9(3):275\u201384. https:\/\/doi.org\/10.1016\/0952-1976(95)00018-6.","journal-title":"Eng Appl Artif Intell"},{"key":"445_CR79","unstructured":"Goodfellow I. J, Shlens J, Szegedy C. (2015). Explaining and Harnessing Adversarial Examples. ArXiv:1412.6572 [Cs, Stat].nn"},{"issue":"5","key":"445_CR80","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2019","unstructured":"Guidotti R, Monreale A, Ruggieri S, Turini F, Giannotti F, Pedreschi D. A survey of methods for explaining black box models. ACM Comput Surv. 2019;51(5):1\u201342. https:\/\/doi.org\/10.1145\/3236009.","journal-title":"ACM Comput Surv"},{"key":"445_CR81","doi-asserted-by":"crossref","unstructured":"Gulshan V, Peng L, Coram, M, Stumpe M. C, Wu D, Narayanaswamy A, Venugopalan S, Widner K, Madams T, Cuadros J, Kim R, Raman R, Nelson P. C, Mega J. L, Webster D. R. (2016). Development and Validation of a Deep Learning Algorithm for Detection of Diabetic Retinopathy in Retinal Fundus Photographs. 9.","DOI":"10.1001\/jama.2016.17216"},{"issue":"6","key":"445_CR82","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MCOM.001.2000050","volume":"58","author":"W Guo","year":"2020","unstructured":"Guo W. Explainable artificial intelligence for 6G: improving trust between human and machine. IEEE Commun Mag. 2020;58(6):39\u201345. https:\/\/doi.org\/10.1109\/MCOM.001.2000050.","journal-title":"IEEE Commun Mag"},{"issue":"9","key":"445_CR83","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2018.3620965","volume":"51","author":"H Hagras","year":"2018","unstructured":"Hagras H. Toward human-understandable, explainable AI. Computer. 2018;51(9):28\u201336. https:\/\/doi.org\/10.1109\/MC.2018.3620965.","journal-title":"Computer"},{"key":"445_CR84","doi-asserted-by":"publisher","unstructured":"Hailu G, Sommer G. (1999). On amount and quality of bias in reinforcement learning. IEEE SMC\u201999 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028), 2, 728\u2013733. https:\/\/doi.org\/10.1109\/ICSMC.1999.825352","DOI":"10.1109\/ICSMC.1999.825352"},{"issue":"2\/3","key":"445_CR85","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1023\/A:1012801612483","volume":"17","author":"M Halkidi","year":"2001","unstructured":"Halkidi M, Batistakis Y, Vazirgiannis M. On clustering validation techniques. J Intell Inf Syst. 2001;17(2\/3):107\u201345.","journal-title":"J Intell Inf Syst"},{"key":"445_CR86","unstructured":"Halliwell N, Lecue F. (2020). Trustworthy Convolutional Neural Networks: A Gradient Penalized-based Approach. ArXiv:2009.14260[Cs]."},{"issue":"13","key":"445_CR87","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1049\/joe.2019.1217","volume":"2020","author":"S-H Han","year":"2020","unstructured":"Han S-H, Kwon M-S, Choi H-J. EXplainable AI (XAI) approach to image captioning. J Eng. 2020;2020(13):589\u201394. https:\/\/doi.org\/10.1049\/joe.2019.1217.","journal-title":"J Eng"},{"key":"445_CR88","unstructured":"Harmelen F, Teije A. (1997). Validation and Verification of Conceptual Models of Diagnosis. Fourth European Symposium on the Validation and Verification of Knowledge-Based Systems, 117\u2013128."},{"key":"445_CR89","unstructured":"Haverinen T. (2020). Towards Explainable Artificial Intelligence (XAI) [Master\u2019s Thesis]. University of Jyv\u00e4skyl\u00e4."},{"key":"445_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/626342","volume":"2015","author":"C He","year":"2015","unstructured":"He C, Xing J, Li J, Yang Q, Wang R, Zhang X. A new optimal sensor placement strategy based on modified modal assurance criterion and improved adaptive genetic algorithm for structural health monitoring. Math Probl Eng. 2015;2015:1\u201310. https:\/\/doi.org\/10.1155\/2015\/626342.","journal-title":"Math Probl Eng"},{"key":"445_CR91","doi-asserted-by":"publisher","unstructured":"He H, Gray J, Cangelosi A, Meng Q, McGinnity T. M, Mehnen J. (2020). The Challenges and Opportunities of Artificial Intelligence for Trustworthy Robots and Autonomous Systems. 2020 3rd International Conference on Intelligent Robotic and Control Engineering (IRCE), 68\u201374. https:\/\/doi.org\/10.1109\/IRCE50905.2020.9199244","DOI":"10.1109\/IRCE50905.2020.9199244"},{"key":"445_CR92","unstructured":"He Y, Meng G, Chen K, Hu X, He J. (2020). Towards Security Threats of Deep Learning Systems: A Survey. ArXiv:1911.12562[Cs]."},{"issue":"10","key":"445_CR93","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1007\/s10236-016-0976-5","volume":"66","author":"KD Heaney","year":"2016","unstructured":"Heaney KD, Lermusiaux PFJ, Duda TF, Haley PJ. Validation of genetic algorithm-based optimal sampling for ocean data assimilation. Ocean Dyn. 2016;66(10):1209\u201329. https:\/\/doi.org\/10.1007\/s10236-016-0976-5.","journal-title":"Ocean Dyn"},{"key":"445_CR94","doi-asserted-by":"publisher","unstructured":"Heuer H, Breiter A. (2020). More Than Accuracy: Towards Trustworthy Machine Learning Interfaces for Object Recognition. Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization, 298\u2013302. https:\/\/doi.org\/10.1145\/3340631.3394873","DOI":"10.1145\/3340631.3394873"},{"key":"445_CR95","unstructured":"Heuillet A, Couthouis F, D\u00edaz-Rodr\u00edguez N. (2020). Explainability in Deep Reinforcement Learning. ArXiv:2008.06693 [Cs]."},{"issue":"1","key":"445_CR96","doi-asserted-by":"publisher","first-page":"54","DOI":"10.2478\/v10229-011-0004-6","volume":"1","author":"B Hibbard","year":"2009","unstructured":"Hibbard B. Bias and no free lunch in formal measures of intelligence. J Artif General Intell. 2009;1(1):54\u201361. https:\/\/doi.org\/10.2478\/v10229-011-0004-6.","journal-title":"J Artif General Intell"},{"key":"445_CR97","doi-asserted-by":"crossref","unstructured":"Huber T. (2019). Enhancing Explainability of Deep Reinforcement Learning Through Selective Layer-Wise Relevance Propagation. 15.","DOI":"10.1007\/978-3-030-30179-8_16"},{"key":"445_CR98","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2917124","author":"MA Islam","year":"2019","unstructured":"Islam MA, Anderson DT, Pinar A, Havens TC, Scott G, Keller JM. Enabling explainable fusion in deep learning with fuzzy integral neural Networks. IEEE Trans Fuzzy Syst. 2019. https:\/\/doi.org\/10.1109\/TFUZZ.2019.2917124.","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"445_CR99","doi-asserted-by":"publisher","unstructured":"Israelsen B. W, Ahmed N. R. (2019). \u201cDave...I can assure you ...that it\u2019s going to be all right ...\u201d A Definition, Case for, and Survey of Algorithmic Assurances in Human-Autonomy Trust Relationships. ACM Computing Surveys, 51(6), 1\u201337. https:\/\/doi.org\/10.1145\/3267338","DOI":"10.1145\/3267338"},{"issue":"3","key":"445_CR100","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.giq.2016.08.011","volume":"33","author":"M Janssen","year":"2016","unstructured":"Janssen M, Kuk G. The challenges and limits of big data algorithms in technocratic governance. Gov Inf Q. 2016;33(3):371\u20137. https:\/\/doi.org\/10.1016\/j.giq.2016.08.011.","journal-title":"Gov Inf Q"},{"key":"445_CR101","unstructured":"Jha S, Raj S, Fernandes S, Jha S. K, Jha S, Jalaian B, Verma G, Swami A. (2019). Attribution-Based Confidence Metric For Deep Neural Networks. https:\/\/openreview.net\/forum?id=rkeYFrHgIB"},{"key":"445_CR102","unstructured":"Jiang N, Li L. (2016). Doubly Robust Off-policy Value Evaluation for Reinforcement Learning. 33 Rd International Conference on Machine Learning, 48, 10."},{"key":"445_CR103","doi-asserted-by":"publisher","unstructured":"Jilk, D. J. (2018). Limits to Verification and Validation of Agentic Behavior. In Artificial Intelligence Safety and Security (pp. 225\u2013234). Taylor Francis Group. https:\/\/doi.org\/10.1201\/9781351251389-16","DOI":"10.1201\/9781351251389-16"},{"issue":"3","key":"445_CR104","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1006\/jmbi.1996.0897","volume":"267","author":"G Jones","year":"1997","unstructured":"Jones G, Willett P, Glen RC, Leach AR, Taylor R. Development and validation of a genetic algorithm for flexible docking11 Edited by F E Cohen. J Mol Biol. 1997;267(3):727\u201348. https:\/\/doi.org\/10.1006\/jmbi.1996.0897.","journal-title":"nJ Mol Biol"},{"key":"445_CR105","doi-asserted-by":"crossref","unstructured":"Jorge E, Brynte L, Cronrath C, Wigstrom O, Bengtsson K, Gustavsson E, Lennartson B, Jirstrand M. Reinforcement learning in real-time geometry assurance. In: 51st CIRP Proceedings of the Conference on Manufacturing Systems. 2018. p. 1073\u20138.","DOI":"10.1016\/j.procir.2018.03.168"},{"key":"445_CR106","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CIG.2019.8847950","volume":"2019","author":"H-T Joo","year":"2019","unstructured":"Joo H-T, Kim K-J. Visualization of deep reinforcement learning using Grad-CAM: how AI plays atari games? IEEE Conf Games (CoG). 2019;2019:1\u20132. https:\/\/doi.org\/10.1109\/CIG.2019.8847950.","journal-title":"IEEE Conf Games (CoG)"},{"key":"445_CR107","doi-asserted-by":"publisher","unstructured":"Katell M, Young M, Dailey D, Herman B, Guetler V, Tam A, Binz C, Raz D, Krafft P. M. (2020). Toward situated interventions for algorithmic equity: Lessons from the field. Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, 45\u201355. https:\/\/doi.org\/10.1145\/3351095.3372874","DOI":"10.1145\/3351095.3372874"},{"key":"445_CR108","doi-asserted-by":"publisher","unstructured":"Kaul S. (2018). Speed And Accuracy Are Not Enough! Trustworthy Machine Learning. Proceedings of the 2018 AAAI\/ACM Conference on AI, Ethics, and Society, 372\u2013373. https:\/\/doi.org\/10.1145\/3278721.3278796","DOI":"10.1145\/3278721.3278796"},{"key":"445_CR109","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/978-3-030-15035-8_62","volume-title":"Web, artificial intelligence and network applications","author":"D Kaur","year":"2019","unstructured":"Kaur D, Uslu S, Durresi A. Trust-based security mechanism for detecting clusters of fake users in social networks. In: Barolli L, Takizawa M, Xhafa F, Enokido T, editors. Web, artificial intelligence and network applications, vol. 927. Berlin: Springer; 2019. p. 641\u201350. https:\/\/doi.org\/10.1007\/978-3-030-15035-8_62."},{"key":"445_CR110","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-030-57811-4_11","volume-title":"Advances in Networked-Based Information Systems","author":"D Kaur","year":"2021","unstructured":"Kaur D, Uslu S, Durresi A. Requirements for Trustworthy Artificial Intelligence \u2013 A Review. In: Barolli L, Li KF, Enokido T, Takizawa M, editors. Advances in Networked-Based Information Systems, vol. 1264. Berlin: Springer; 2021. p. 105\u201315; https:\/\/doi.org\/10.1007\/978-3-030-57811-4_11."},{"key":"445_CR111","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-030-44041-1_54","volume-title":"Advanced information networking and applications","author":"D Kaur","year":"2020","unstructured":"Kaur D, Uslu S, Durresi A, Mohler G, Carter JG. Trust-based human-machine collaboration mechanism for predicting crimes. In: Barolli L, Amato F, Moscato F, Enokido T, Takizawa M, editors. Advanced information networking and applications, vol. 1151. Berlin: Springer; 2020. p. 603\u201316; https:\/\/doi.org\/10.1007\/978-3-030-44041-1_54."},{"key":"445_CR112","doi-asserted-by":"publisher","first-page":"17001","DOI":"10.1109\/ACCESS.2019.2893141","volume":"7","author":"BM Keneni","year":"2019","unstructured":"Keneni BM, Kaur D, Al Bataineh A, Devabhaktuni VK, Javaid AY, Zaientz JD, Marinier RP. Evolving rule-based explainable artificial intelligence for unmanned aerial vehicles. IEEE Access. 2019;7:17001\u201316. https:\/\/doi.org\/10.1109\/ACCESS.2019.2893141.","journal-title":"IEEE Access"},{"key":"445_CR113","doi-asserted-by":"publisher","first-page":"3023","DOI":"10.1007\/s00500-015-1929-5","volume":"20","author":"MR Kianifar","year":"2016","unstructured":"Kianifar MR. Application of permutation genetic algorithm for sequential model building\u2013model validation design of experiments. Soft Comput. 2016;20:3023\u201344. https:\/\/doi.org\/10.1007\/s00500-015-1929-5.","journal-title":"Soft Comput"},{"issue":"3","key":"445_CR114","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TSMCB.2002.999805","volume":"32","author":"R Knauf","year":"2002","unstructured":"Knauf R, Gonzalez AJ, Abel T. A framework for validation of rule-based systems. Cybern PART B. 2002;32(3):15.","journal-title":"Cybern PART B"},{"issue":"1","key":"445_CR115","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/TSMCA.2006.886365","volume":"37","author":"R Knauf","year":"2007","unstructured":"Knauf R, Tsuruta S, Gonzalez AJ. Toward reducing human involvement in validation of knowledge-based systems. IEEE Trans Syst Man Cybern Part A. 2007;37(1):120\u201331. https:\/\/doi.org\/10.1109\/TSMCA.2006.886365.","journal-title":"IEEE Trans Syst Man Cybern Part A"},{"key":"445_CR116","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/IJCNN48605.2020.9206975","volume":"2020","author":"M Kohlbrenner","year":"2020","unstructured":"Kohlbrenner M, Bauer A, Nakajima S, Binder A, Samek W, Lapuschkin S. Towards best practice in explaining neural network decisions with LRP. Int Joint Conf Neural Netw. 2020;2020:1\u20137. https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9206975.","journal-title":"Int Joint Conf Neural Netw"},{"key":"445_CR117","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/B978-0-12-818366-3.00005-8","volume-title":"data democracy","author":"A Kulkarni","year":"2020","unstructured":"Kulkarni A, Chong D, Batarseh FA. Foundations of data imbalance and solutions for a data democracy. In: data democracy. Cambridge: Academic Press; 2020. p. 83\u2013106."},{"key":"445_CR118","doi-asserted-by":"publisher","unstructured":"Kuppa A, Le-Khac N-A. Black box attacks on explainable artificial intelligence (XAI) methods in cyber security. Int Joint Confer Neural Netw. 2020;2020:1\u20138. https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9206780.","DOI":"10.1109\/IJCNN48605.2020.9206780"},{"key":"445_CR119","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-39878-3_7","volume-title":"Computer safety, reliability, and security","author":"Z Kurd","year":"2003","unstructured":"Kurd Z, Kelly T. Safety lifecycle for developing safety critical artificial neural networks. In: Anderson S, Felici M, Littlewood B, editors. Computer safety, reliability, and security. Berlin: Springer; 2003. p. 77\u201391."},{"key":"445_CR120","doi-asserted-by":"publisher","first-page":"187814","DOI":"10.1109\/ACCESS.2020.3031477","volume":"8","author":"M Kuzlu","year":"2020","unstructured":"Kuzlu M, Cali U, Sharma V, Guler O. Gaining insight into solar photovoltaic power generation forecasting utilizing explainable artificial intelligence tools. IEEE Access. 2020;8:187814\u201323. https:\/\/doi.org\/10.1109\/ACCESS.2020.3031477.","journal-title":"IEEE Access"},{"key":"445_CR121","doi-asserted-by":"publisher","unstructured":"Lee J, ha, Shin, I. hee, Jeong, S. gu, Lee, S.-I, Zaheer, M. Z, Seo, B.-S. . Improvement in deep networks for optimization using eXplainable artificial intelligence. 2019 2019 International Conference on Information and Communication Technology Convergence (ICTC), 525\u201330. https:\/\/doi.org\/10.1109\/ICTC46691.2019.8939943.","DOI":"10.1109\/ICTC46691.2019.8939943"},{"issue":"4","key":"445_CR122","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/21.286384","volume":"24","author":"S Lee","year":"1994","unstructured":"Lee S, O\u2019Keefe RM. Developing a strategy for expert system verification and validation. IEEE Trans Syst Man Cybern. 1994;24(4):643\u201355. https:\/\/doi.org\/10.1109\/21.286384.","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"445_CR123","doi-asserted-by":"crossref","unstructured":"Leibovici D. G, Rosser J. F, Hodges C, Evans B, Jackson M. J, Higgins C. I. (2017). On Data Quality Assurance and Conflation Entanglement in Crowdsourcing for Environmental Studies. 17.","DOI":"10.3390\/ijgi6030078"},{"issue":"4","key":"445_CR124","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s13347-017-0279-x","volume":"31","author":"B Lepri","year":"2018","unstructured":"Lepri B, Oliver N, Letouz\u00e9 E, Pentland A, Vinck P. Fair, transparent, and accountable algorithmic decision-making processes: the premise, the proposed solutions, and the open challenges. Philos Technol. 2018;31(4):611\u201327. https:\/\/doi.org\/10.1007\/s13347-017-0279-x.","journal-title":"Philos Technol"},{"key":"445_CR125","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2983930","author":"X-H Li","year":"2020","unstructured":"Li X-H, Cao CC, Shi Y, Bai W, Gao H, Qiu L, Wang C, Gao Y, Zhang S, Xue X, Chen L. A survey of data-driven and knowledge-aware eXplainable AI. IEEE Trans Knowl Data Eng. 2020. https:\/\/doi.org\/10.1109\/TKDE.2020.2983930.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"445_CR126","doi-asserted-by":"publisher","unstructured":"Liang X, Zhao J, Shetty S, Li D. (2017). Towards data assurance and resilience in IoT using blockchain. MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), 261\u2013266. https:\/\/doi.org\/10.1109\/MILCOM.2017.8170858","DOI":"10.1109\/MILCOM.2017.8170858"},{"key":"445_CR127","doi-asserted-by":"publisher","unstructured":"Liu F, Yang M. (2004). Verification and validation of al simulation systems. Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826), 3100\u20133105. https:\/\/doi.org\/10.1109\/ICMLC.2004.1378566","DOI":"10.1109\/ICMLC.2004.1378566"},{"key":"445_CR128","doi-asserted-by":"crossref","unstructured":"Liu F, Yang M. (2005). Verification and Validation of Artificial Neural Network Models AI 2005: Advances in Artificial Intelligence, 3809:1041\u20131046.","DOI":"10.1007\/11589990_137"},{"key":"445_CR129","doi-asserted-by":"publisher","unstructured":"Liu F, Yang M, Shi P. (2008). Verification and validation of fuzzy rules-based human behavior models. 2008 Asia Simulation Conference - 7th International Conference on System Simulation and Scientific Computing, 813\u2013819. https:\/\/doi.org\/10.1109\/ASC-ICSC.2008.4675474","DOI":"10.1109\/ASC-ICSC.2008.4675474"},{"issue":"2","key":"445_CR130","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/0965-9978(95)00018-R","volume":"23","author":"S Lockwood","year":"1995","unstructured":"Lockwood S, Chen Z. Knowledge validation of engineering expert systems. Adv Eng Softw. 1995;23(2):97\u2013104. https:\/\/doi.org\/10.1016\/0965-9978(95)00018-R.","journal-title":"Adv Eng Softw"},{"key":"445_CR131","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-63614-5_3","volume-title":"Foundations of Intelligent Systems","author":"M Lowry","year":"1997","unstructured":"Lowry M, Havelund K, Penix J. Verification and validation of AI systems that control deep-space spacecraft. In: Ra\u015b ZW, Skowron A, editors. Foundations of Intelligent Systems, vol. 1325. Berlin: Springer; 1997. p. 35\u201347; https:\/\/doi.org\/10.1007\/3-540-63614-5_3."},{"key":"445_CR132","unstructured":"Mackowiak R, Ardizzone L, K\u00f6the U, Rother, C. (2020). Generative Classifiers as a Basis for Trustworthy Computer Vision. ArXiv:2007.15036 [Cs].nn"},{"key":"445_CR133","unstructured":"Madumal P, Miller T, Sonenberg L, Vetere F. (2019). Explainable Reinforcement Learning Through a Causal Lens. ArXiv:1905.10958 [Cs, Stat]."},{"issue":"8","key":"445_CR134","doi-asserted-by":"publisher","first-page":"e0220063","DOI":"10.1371\/journal.pone.0220063","volume":"14","author":"PM Maloca","year":"2019","unstructured":"Maloca PM, Lee AY, de Carvalho ER, Okada M, Fasler K, Leung I, H\u00f6rmann B, Kaiser P, Suter S, Hasler PW, Zarranz-Ventura J, Egan C, Heeren TFC, Balaskas K, Tufail A, Scholl HPN. Validation of automated artificial intelligence segmentation of optical coherence tomography images. PLoS ONE. 2019;14(8):e0220063. https:\/\/doi.org\/10.1371\/journal.pone.0220063.","journal-title":"PLoS ONE"},{"issue":"9","key":"445_CR135","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2017.3571045","volume":"50","author":"D Magazzeni","year":"2017","unstructured":"Magazzeni D, McBurney P, Nash W. Validation and Verification of Smart Contracts: A Research Agenda. Computer. 2017;50(9):50\u201357. https:\/\/doi.org\/10.1109\/MC.2017.3571045","journal-title":"Computer"},{"key":"445_CR136","doi-asserted-by":"publisher","unstructured":"Malolan B, Parekh A, Kazi F. (2020). Explainable Deep-Fake Detection Using Visual Interpretability Methods. 2020 3rd International Conference on Information and Computer Technologies (ICICT), 289\u2013293. https:\/\/doi.org\/10.1109\/ICICT50521.2020.00051","DOI":"10.1109\/ICICT50521.2020.00051"},{"issue":"5","key":"445_CR137","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1049\/ip-sen:20000896","volume":"147","author":"M Marcos","year":"2000","unstructured":"Marcos M, del Pobil AP, Moisan S. Model-based verification of knowledge-based systems: a case study. IEE Proceedings - Software. 2000;147(5):163. https:\/\/doi.org\/10.1049\/ip-sen:20000896.","journal-title":"IEE Proceedings - Software"},{"key":"445_CR138","unstructured":"Martin M. O, Mullis I. V. S, Bruneforth M, Third International Mathematics and Science Study (Eds.). (1996). Quality assurance in data collection. Center for the Study of Testing, Evaluation, and Educational Policy, Boston College."},{"key":"445_CR139","doi-asserted-by":"publisher","unstructured":"Martinez-Balleste, A, Rashwan, H. A, Puig, D, Fullana, A. P. (2012). Towards a trustworthy privacy in pervasive video surveillance systems. 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 914\u2013919. https:\/\/doi.org\/10.1109\/PerComW.2012.6197644","DOI":"10.1109\/PerComW.2012.6197644"},{"key":"445_CR140","unstructured":"Mart\u00ednez-Fern\u00e1ndez S, Franch X, Jedlitschka A, Oriol M, Trendowicz A. (2020). Research Directions for Developing and Operating Artificial Intelligence Models in Trustworthy Autonomous Systems. ArXiv:2003.05434[Cs].n"},{"key":"445_CR141","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1007\/978-3-540-76928-6_84","volume-title":"AI 2007: Advances in artificial intelligence","author":"JD Mart\u00edn-Guerrero","year":"2007","unstructured":"Mart\u00edn-Guerrero JD, Soria-Olivas E, Mart\u00ednez-Sober M, Climente-Mart\u00ed M, De Diego-Santos T, Jim\u00e9nez-Torres NV. Validation of a reinforcement learning policy for dosage optimization of erythropoietin. In: Orgun MA, Thornton J, editors. AI 2007: Advances in artificial intelligence. Berlin: Springer; 2007. p. 732\u20138."},{"key":"445_CR142","unstructured":"Mason G, Calinescu R, Kudenko D, Banks A. (2017a). Assured Reinforcement Learning for Safety-Critical Applications."},{"key":"445_CR143","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-66790-4_5","volume-title":"Advances in hybridization of intelligent methods","author":"G Mason","year":"2018","unstructured":"Mason G, Calinescu R, Kudenko D, Banks A. Assurance in reinforcement learning using quantitative verification. In: Hatzilygeroudis I, Palade V, editors. Advances in hybridization of intelligent methods, vol. 85. Berlin: Springer; 2018. p. 71\u201396."},{"key":"445_CR144","doi-asserted-by":"publisher","unstructured":"Mason G, Calinescu R, Kudenko D, Banks A. (2017b). Assured Reinforcement Learning with Formally Verified Abstract Policies. Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 105\u2013117. https:\/\/doi.org\/10.5220\/0006156001050117","DOI":"10.5220\/0006156001050117"},{"key":"445_CR145","doi-asserted-by":"publisher","first-page":"103103","DOI":"10.1016\/j.cviu.2020.103103","volume":"11","author":"FV Massoli","year":"2021","unstructured":"Massoli FV, Carrara F, Amato G, Falchi F. Detection of face recognition adversarial attacks. Comput Vision Image Understand. 2021;11:103103.","journal-title":"Comput Vision Image Understand"},{"key":"445_CR146","unstructured":"Mehrabi N, Morstatter F, Saxena N, Lerman K, Galstyan A. (2019). A Survey on Bias and Fairness in Machine Learning. ArXiv:1908.09635 [Cs].n"},{"key":"445_CR147","doi-asserted-by":"publisher","unstructured":"Mehri V. A, Ilie D, Tutschku K. (2018). Privacy and DRM Requirements for Collaborative Development of AI Applications. Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 1\u20138. https:\/\/doi.org\/10.1145\/3230833.3233268","DOI":"10.1145\/3230833.3233268"},{"issue":"3","key":"445_CR148","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/64.215224","volume":"8","author":"OJ Mengshoel","year":"1993","unstructured":"Mengshoel OJ. Knowledge validation: principles and practice. IEEE Expert. 1993;8(3):62\u20138. https:\/\/doi.org\/10.1109\/64.215224.","journal-title":"IEEE Expert"},{"key":"445_CR149","first-page":"153","volume-title":"Advances in computers","author":"T Menzies","year":"2005","unstructured":"Menzies T, Pecheur C. Verification and validation and artificial intelligence. In: Advances in computers, vol. 65. Amsterdam: Elsevier; 2005. p. 153\u2013201."},{"key":"445_CR150","doi-asserted-by":"publisher","unstructured":"Meskauskas Z, Jasinevicius R, Kazanavicius E, Petrauskas, V. (2020). XAI-Based Fuzzy SWOT Maps for Analysis of Complex Systems. 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1\u20138. https:\/\/doi.org\/10.1109\/FUZZ48607.2020.9177792","DOI":"10.1109\/FUZZ48607.2020.9177792"},{"issue":"6","key":"445_CR151","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1287\/mnsc.44.6.820","volume":"44","author":"J Miller","year":"1998","unstructured":"Miller J. Active Nonlinear Test (ANTs) of Complex Simulation Models. Manag Sci. 1998;44(6):482.","journal-title":"Manag Sci"},{"key":"445_CR152","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1109\/WSC.2007.4419748","volume":"2007","author":"F Min","year":"2007","unstructured":"Min F, Ma P, Yang M. A knowledge-based method for the validation of military simulation. Winter Simulation Conf. 2007;2007:1395\u2013402. https:\/\/doi.org\/10.1109\/WSC.2007.4419748.","journal-title":"Winter Simulation Conf"},{"key":"445_CR153","doi-asserted-by":"publisher","unstructured":"Min Fei-yan, Yang, M, Wang, Z. (2006). An Intelligent Validation System of Simulation Model. 2006 International Conference on Machine Learning and Cybernetics, 1459\u20131464. https:\/\/doi.org\/10.1109\/ICMLC.2006.258759","DOI":"10.1109\/ICMLC.2006.258759"},{"key":"445_CR154","doi-asserted-by":"publisher","unstructured":"Morell L. J. (1988). Use of metaknowledge in the verification of knowledge-based systems. Proceedings of the 1st International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems - Volume 2, 847\u2013857. https:\/\/doi.org\/10.1145\/55674.55699","DOI":"10.1145\/55674.55699"},{"key":"445_CR155","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0957-4174(99)00045-7","volume":"16","author":"E Mosqueira-Rey","year":"2000","unstructured":"Mosqueira-Rey E, Moret-Bonillo V. Validation of intelligent systems: a critical study and a tool. Expert Syst Appl. 2000;16:1\u20136.","journal-title":"Expert Syst Appl"},{"key":"445_CR156","unstructured":"Mueller ST, Hoffman, RR, Clancey W, Emrey A, Klein G. (2019). Explanation in Human-AI Systems: A Literature Meta-Review, Synopsis of Key Ideas and Publications, and Bibliography for Explainable AI. ArXiv:1902.01876 [Cs].n"},{"key":"445_CR157","doi-asserted-by":"publisher","unstructured":"Murray B, Islam M. A, Pinar A. J, Havens, T. C, Anderson D. T, Scott G. (2018). Explainable AI for Understanding Decisions and Data-Driven Optimization of the Choquet Integral. 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1\u20138. https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2018.8491501","DOI":"10.1109\/FUZZ-IEEE.2018.8491501"},{"key":"445_CR158","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3005682","author":"BJ Murray","year":"2020","unstructured":"Murray BJ, Islam MA, Pinar AJ, Anderson DT, Scott GJ, Havens TC, Keller JM. Explainable AI for the Choquet Integral. IEEE Trans Emerg Topics in Comput Intell. 2020. https:\/\/doi.org\/10.1109\/TETCI.2020.3005682.","journal-title":"IEEE Trans Emerg Topics in Comput Intell"},{"issue":"4","key":"445_CR159","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/S0167-9236(97)00047-X","volume":"21","author":"S Murrell","year":"1997","unstructured":"Murrell S, Plant TR. A survey of tools for the validation and verification of knowledge-based systems: 1985\u20131995. Decis Support Syst. 1997;21(4):307\u201323. https:\/\/doi.org\/10.1016\/S0167-9236(97)00047-X.","journal-title":"Decis Support Syst"},{"issue":"5","key":"445_CR160","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1049\/iet-its.2019.0404","volume":"14","author":"M Mynuddin","year":"2020","unstructured":"Mynuddin M, Gao W. Distributed predictive cruise control based on reinforcement learning and validation on microscopic traffic simulation. IET Intel Transport Syst. 2020;14(5):270\u20137. https:\/\/doi.org\/10.1049\/iet-its.2019.0404.","journal-title":"IET Intel Transport Syst"},{"issue":"1","key":"445_CR161","doi-asserted-by":"publisher","first-page":"e1340","DOI":"10.1002\/widm.1340","volume":"10","author":"M Nassar","year":"2020","unstructured":"Nassar M, Salah K, Rehman MH, Svetinovic D. Blockchain for explainable and trustworthy artificial intelligence. WIREs Data Mining Knowl Disc. 2020;10(1):e1340. https:\/\/doi.org\/10.1002\/widm.1340.","journal-title":"WIREs Data Mining Knowl Disc"},{"key":"445_CR162","doi-asserted-by":"publisher","unstructured":"Niazi M. A, Siddique Q, Hussain A, Kolberg M. (2010). Verification & validation of an agent-based forest fire simulation model. Proceedings of the 2010 Spring Simulation Multiconference, 1\u20138. https:\/\/doi.org\/10.1145\/1878537.1878539","DOI":"10.1145\/1878537.1878539"},{"issue":"1","key":"445_CR163","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/381790.381802","volume":"21","author":"CF Nourani","year":"1996","unstructured":"Nourani CF. Multi-agent object level AI validation and verification. ACM SIGSOFT Softw Eng Notes. 1996;21(1):70\u20132. https:\/\/doi.org\/10.1145\/381790.381802.","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"issue":"4","key":"445_CR164","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MEX.1987.5006538","volume":"2","author":"RM O\u2019Keefe","year":"1987","unstructured":"O\u2019Keefe RM, Balci O, Smith EP. Validating expert system performance. IEEE Expert. 1987;2(4):81\u201390. https:\/\/doi.org\/10.1109\/MEX.1987.5006538.","journal-title":"IEEE Expert"},{"key":"445_CR165","unstructured":"On Artificial Intelligence\u2014A European approach to excellence and trust. (2020). European Commision."},{"issue":"4","key":"445_CR166","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1080\/095281300454838","volume":"12","author":"T Onoyama","year":"2000","unstructured":"Onoyama T, Tsuruta S. Validation method for intelligent systems. J Exp Theor Artif Intell. 2000;12(4):461\u201372. https:\/\/doi.org\/10.1080\/095281300454838.","journal-title":"J Exp Theor Artif Intell"},{"key":"445_CR167","doi-asserted-by":"publisher","unstructured":"Pawar U, O\u2019Shea D, Rea S, O\u2019Reilly R. (2020). Explainable AI in Healthcare. 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 1\u20132. https:\/\/doi.org\/10.1109\/CyberSA49311.2020.9139655","DOI":"10.1109\/CyberSA49311.2020.9139655"},{"issue":"7","key":"445_CR168","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1093\/jamia\/ocaa053","volume":"27","author":"SN Payrovnaziri","year":"2020","unstructured":"Payrovnaziri SN, Chen Z, Rengifo-Moreno P, Miller T, Bian J, Chen JH, Liu X, He Z. Explainable artificial intelligence models using real-world electronic health record data: a systematic scoping review. J Am Med Inform Assoc. 2020;27(7):1173\u201385. https:\/\/doi.org\/10.1093\/jamia\/ocaa053.","journal-title":"J Am Med Inform Assoc"},{"issue":"13","key":"445_CR169","doi-asserted-by":"publisher","first-page":"3498","DOI":"10.1016\/j.jcrysgro.2009.04.002","volume":"311","author":"G P\u00e8pe","year":"2009","unstructured":"P\u00e8pe G, Perbost R, Courcambeck J, Jouanna P. Prediction of molecular crystal structures using a genetic algorithm: validation by GenMolTM on energetic compounds. J Cryst Growth. 2009;311(13):3498\u2013510. https:\/\/doi.org\/10.1016\/j.jcrysgro.2009.04.002.","journal-title":"J Cryst Growth"},{"issue":"1","key":"445_CR170","doi-asserted-by":"publisher","first-page":"192","DOI":"10.2174\/1874282300802010192","volume":"2","author":"RA Peppler","year":"2008","unstructured":"Peppler RA, Long CN, Sisterson DL, Turner DD, Bahrmann CP, Christensen SW, Doty KJ, Eagan RC, Halter TD, Iveyh MD, Keck NN, Kehoe KE, Liljegren JC, Macduff MC, Mather JH, McCord RA, Monroe JW, Moore ST, Nitschke KL, Wagener R. An overview of ARM program climate research facility data quality assurance. Open Atmos Sci J. 2008;2(1):192\u2013216. https:\/\/doi.org\/10.2174\/1874282300802010192.","journal-title":"Open Atmos Sci J"},{"key":"445_CR171","doi-asserted-by":"crossref","unstructured":"Pitchforth, J. (2013). A proposed validation framework for expert elicited Bayesian Networks. Expert Systems with Applications, 6.","DOI":"10.1016\/j.eswa.2012.07.026"},{"key":"445_CR172","doi-asserted-by":"publisher","first-page":"10007","DOI":"10.1609\/aaai.v33i01.330110007","volume":"33","author":"R Pocius","year":"2019","unstructured":"Pocius R, Neal L, Fern A. Strategic tasks for explainable reinforcement learning. Proc AAAI Conf Artif Intell. 2019;33:10007\u20138. https:\/\/doi.org\/10.1609\/aaai.v33i01.330110007.","journal-title":"Proc AAAI Conf Artif Intell"},{"issue":"3\u20134","key":"445_CR173","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/0957-4174(92)90026-O","volume":"5","author":"AD Preece","year":"1992","unstructured":"Preece AD, Shinghal R, Batarekh A. Verifying expert systems: a logical framework and a practical tool. Expert Syst Appl. 1992;5(3\u20134):421\u201336. https:\/\/doi.org\/10.1016\/0957-4174(92)90026-O.","journal-title":"Expert Syst Appl"},{"key":"445_CR174","doi-asserted-by":"publisher","unstructured":"Prentzas, N, Nicolaides, A, Kyriacou, E, Kakas, A, Pattichis, C. (2019). Integrating Machine Learning with Symbolic Reasoning to Build an Explainable AI Model for Stroke Prediction. 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), 817\u2013821. https:\/\/doi.org\/10.1109\/BIBE.2019.00152","DOI":"10.1109\/BIBE.2019.00152"},{"key":"445_CR175","doi-asserted-by":"crossref","unstructured":"Puiutta E, Veith E. M. (2020). Explainable Reinforcement Learning: A Survey. ArXiv:2005.06247 [Cs, Stat].n","DOI":"10.1007\/978-3-030-57321-8_5"},{"key":"445_CR176","unstructured":"Putzer, H. J, Wozniak E. (2020). A Structured Approach to Trustworthy Autonomous\/Cognitive Systems. ArXiv:2002.08210 [Cs].n"},{"key":"445_CR177","volume-title":"Transparency communication for machine learning. In human-automation interaction human and machine learning","author":"DV Pynadath","year":"2018","unstructured":"Pynadath DV. Transparency communication for machine learning. In human-automation interaction human and machine learning. Berlin: Springer International Publishing; 2018."},{"issue":"5","key":"445_CR178","doi-asserted-by":"publisher","first-page":"909","DOI":"10.3390\/app9050909","volume":"9","author":"S Qiu","year":"2019","unstructured":"Qiu S, Liu Q, Zhou S, Wu C. Review of artificial intelligence adversarial attack and defense technologies. Appl Sci. 2019;9(5):909. https:\/\/doi.org\/10.3390\/app9050909.","journal-title":"Appl Sci"},{"key":"445_CR179","doi-asserted-by":"publisher","unstructured":"Ragot M, Martin N, Cojean S. (2020). AI-generated vs. Human Artworks. A Perception Bias Towards Artificial Intelligence? Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 1\u201310. https:\/\/doi.org\/10.1145\/3334480.3382892","DOI":"10.1145\/3334480.3382892"},{"key":"445_CR180","doi-asserted-by":"crossref","unstructured":"Raji ID, Smart A, White RN, Mitchell M, Gebru T, Hutchinson, B, Smith-Loud, J, Theron D, Barnes P. (2020). Closing the AI Accountability Gap: Defining an End-to-End Framework for Internal Algorithmic Auditing. ArXiv:2001.00973 [Cs].n","DOI":"10.1145\/3351095.3372873"},{"key":"445_CR181","unstructured":"Raymond P, Yoav S, Erik B, Jack C, John E, Barbara G, Terah L, James M, Juan C N, Saurabh M. (2020). Artificial Intelligence Index 2019 Annual report [Artificial Intelligence Index Annual Report]. Stanford University Human AI. Available at: https:\/\/hai.stanford.edu\/sites\/default\/files\/ai_index_2019_report.pdf"},{"key":"445_CR182","doi-asserted-by":"crossref","unstructured":"Ren H, Chandrasekar S. K, Murugesan A. (2019). Using Quantifier Elimination to Enhance the Safety Assurance of Deep Neural Networks. ArXiv:1909.09142 [Cs, Stat].n","DOI":"10.1109\/DASC43569.2019.9081635"},{"key":"445_CR183","unstructured":"Rossi F. (2018). Building Trust in Artificial Intelligence. Undefined. \/paper\/Building-Trust-in-Artificial-Intelligence-Rossi\/e7a84026ac8806bd377b5b491c57096083bbbb18"},{"key":"445_CR184","unstructured":"Rotman, N. H, Schapira M, Tamar, A. (2020). Online Safety Assurance for Deep Reinforcement Learning. ArXiv:2010.03625 [Cs]."},{"issue":"3","key":"445_CR185","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1007\/s11276-014-0817-8","volume":"21","author":"M Rovcanin","year":"2015","unstructured":"Rovcanin M, De Poorter E, van den Akker D, Moerman I, Demeester P, Blondia C. Experimental validation of a reinforcement learning based approach for a service-wise optimisation of heterogeneous wireless sensor networks. Wireless Netw. 2015;21(3):931\u201348. https:\/\/doi.org\/10.1007\/s11276-014-0817-8.","journal-title":"Wireless Netw"},{"issue":"2","key":"445_CR186","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3015771","volume":"17","author":"Y Ruan","year":"2017","unstructured":"Ruan Y, Zhang P, Alfantoukh L, Durresi A. Measurement Theory-Based Trust Management Framework for Online Social Communities. ACM Transactions on Internet Technology. 2017;17(2):1\u201324. https:\/\/doi.org\/10.1145\/3015771.","journal-title":"ACM Transactions on Internet Technology"},{"key":"445_CR187","doi-asserted-by":"publisher","unstructured":"Ruan W, Huang X, Kwiatkowska M (2018). Reachability Analysis of Deep Neural Networks with Provable Guarantees. Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2651\u20132659. https:\/\/doi.org\/10.24963\/ijcai.2018\/368","DOI":"10.24963\/ijcai.2018\/368"},{"key":"445_CR188","doi-asserted-by":"publisher","unstructured":"Sarathy N, Alsawwaf M, Chaczko Z. (2020). Investigation of an Innovative Approach for Identifying Human Face-Profile Using Explainable Artificial Intelligence. 2020 IEEE 18th International Symposium on Intelligent Systems and Informatics (SISY), 155\u2013160. https:\/\/doi.org\/10.1109\/SISY50555.2020.9217095","DOI":"10.1109\/SISY50555.2020.9217095"},{"issue":"1","key":"445_CR189","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1057\/jos.2012.20","volume":"7","author":"RG Sargent","year":"2013","unstructured":"Sargent RG. Verification and validation of simulation models. J Simul. 2013;7(1):12\u201324. https:\/\/doi.org\/10.1057\/jos.2012.20.","journal-title":"J Simul"},{"key":"445_CR190","unstructured":"Sargent RG (1984). A tutorial on verification and validation of simulation models. Proceedings of the 16th Conference on Winter Simulation, 114\u2013121."},{"key":"445_CR191","doi-asserted-by":"publisher","unstructured":"Sargent RG (2004). Validation and Verification of Simulation Models. Proceedings of the 2004 Winter Simulation Conference, 2004, 1, 13\u201324. https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/WSC.2004.1371298","DOI":"10.1109\/WSC.2004.1371298"},{"key":"445_CR192","doi-asserted-by":"publisher","unstructured":"Sargent RG. (2010). Verification and validation of simulation models. Proceedings of the 2010 Winter Simulation Conference, 166\u2013183. https:\/\/doi.org\/10.1109\/WSC.2010.5679166","DOI":"10.1109\/WSC.2010.5679166"},{"key":"445_CR193","unstructured":"Schlegel U, Arnout H, El-Assady M, Oelke D, Keim D. A. (2019). Towards a Rigorous Evaluation of XAI Methods on Time Series. ArXiv:1909.07082 [Cs]."},{"key":"445_CR194","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10690-3_1","volume-title":"Applications of neural networks in high assurance systems","author":"J Schumann","year":"2010","unstructured":"Schumann J, Gupta P, Liu Y. Application of neural networks in high assurance systems: a survey. In: Schumann J, Liu Y, editors. Applications of neural networks in high assurance systems, vol. 268. Berlin: Springer; 2010. p. 1\u201319; https:\/\/doi.org\/10.1007\/978-3-642-10690-3_1."},{"key":"445_CR195","doi-asserted-by":"crossref","unstructured":"Schumann J, Gupta, P, Nelson S. (2003). On verification validation of neural network based controllers.","DOI":"10.1145\/582128.582141"},{"key":"445_CR196","doi-asserted-by":"publisher","first-page":"103367","DOI":"10.1016\/j.artint.2020.103367","volume":"288","author":"P Sequeira","year":"2020","unstructured":"Sequeira P, Gervasio M. Interestingness elements for explainable reinforcement learning: understanding agents\u2019 capabilities and limitations. Artif Intell. 2020;288:103367. https:\/\/doi.org\/10.1016\/j.artint.2020.103367.","journal-title":"Artif Intell"},{"key":"445_CR197","unstructured":"Sileno G, Boer A, van Engers T. (2018). The Role of Normware in Trustworthy and Explainable AI.ArXiv:1812.02471 [Cs]."},{"issue":"1","key":"445_CR198","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1086\/269458","volume":"59","author":"E Singer","year":"1995","unstructured":"Singer E, Thurn DRV, Miller ER. Confidentiality assurances and response: a quantitative review of the experimental literature. Public Opin Q. 1995;59(1):66. https:\/\/doi.org\/10.1086\/269458.","journal-title":"Public Opin Q"},{"issue":"1","key":"445_CR199","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/LOCS.2020.2990897","volume":"3","author":"KS Sivamani","year":"2020","unstructured":"Sivamani KS, Sahay R, Gamal AE. Non-intrusive detection of adversarial deep learning attacks via observer networks. IEEE Lett Comput Soc. 2020;3(1):25\u20138. https:\/\/doi.org\/10.1109\/LOCS.2020.2990897.","journal-title":"IEEE Lett Comput Soc"},{"key":"445_CR200","doi-asserted-by":"publisher","unstructured":"Spada M. R, Vincentini A. (2019). Trustworthy AI for 5G: Telco Experience and Impact in the 5G ESSENCE. In J. MacIntyre, I. Maglogiannis, L. Iliadis, E. Pimenidis (Eds.), Artificial Intelligence Applications and Innovations (pp. 103\u2013110). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-19909-8_9","DOI":"10.1007\/978-3-030-19909-8_9"},{"key":"445_CR201","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2934629","author":"T Spinner","year":"2019","unstructured":"Spinner T, Schlegel U, Schafer H, El-Assady M. explAIner: a visual analytics framework for interactive and explainable machine learning. IEEE Trans Visual Comput Graph. 2019. https:\/\/doi.org\/10.1109\/TVCG.2019.2934629.","journal-title":"IEEE Trans Visual Comput Graph"},{"key":"445_CR202","unstructured":"Srivastava B, Rossi, F. (2019). Towards Composable Bias Rating of AI Services.ArXiv:1808.00089 [Cs]."},{"key":"445_CR203","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-030-01231-1_31","volume-title":"Computer Vision \u2013 ECCV 2018","author":"P Stock","year":"2018","unstructured":"Stock P, Cisse M. ConvNets and Imagenet beyond accuracy: understanding mistakes and uncovering biases. In: Ferrari V, Hebert M, Sminchisescu C, Weiss Y, editors. Computer Vision \u2013 ECCV 2018, vol. 11210. Berlin: Springer; 2018. p. 504\u201319."},{"issue":"2","key":"445_CR204","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/0957-4174(90)90019-Q","volume":"1","author":"CY Suen","year":"1990","unstructured":"Suen CY, Grogono PD, Shinghal R, Coallier F. Verifying, validating, and measuring the performance of expert systems. Expert Syst Appl. 1990;1(2):93\u2013102. https:\/\/doi.org\/10.1016\/0957-4174(90)90019-Q.","journal-title":"Expert Syst Appl"},{"key":"445_CR205","doi-asserted-by":"publisher","unstructured":"Sun SC, Guo, W. (2020). Approximate Symbolic Explanation for Neural Network Enabled Water-Filling Power Allocation. 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), 1\u20134. https:\/\/doi.org\/10.1109\/VTC2020-Spring48590.2020.9129447","DOI":"10.1109\/VTC2020-Spring48590.2020.9129447"},{"issue":"3","key":"445_CR206","first-page":"9","volume":"4","author":"C Tadj","year":"2005","unstructured":"Tadj C. Dynamic verification of an object-rule knowledge base using colored petri Nets. System Cybern Inf. 2005;4(3):9.","journal-title":"System Cybern Inf"},{"key":"445_CR207","doi-asserted-by":"publisher","unstructured":"Tan R, Khan N, Guan L. Locality guided neural networks for explainable artificial intelligence. International Joint Conference on Neural Networks. 2020;2020:1\u20138. https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9207559.","DOI":"10.1109\/IJCNN48605.2020.9207559"},{"key":"445_CR208","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/ACCESS.2018.2878276","volume":"7","author":"C Tao","year":"2019","unstructured":"Tao C, Gao J, Wang T. Testing and quality validation for AI software-perspectives issues, and practices. IEEE Access. 2019;7:12.","journal-title":"IEEE Access"},{"key":"445_CR209","doi-asserted-by":"publisher","unstructured":"Tao, J, Xiong, Y, Zhao, S, Xu, Y, Lin, J, Wu, R, Fan, C. (2020). XAI-Driven Explainable Multi-view Game Cheating Detection. 2020 IEEE Conference on Games (CoG), 144\u2013151. https:\/\/doi.org\/10.1109\/CoG47356.2020.9231843","DOI":"10.1109\/CoG47356.2020.9231843"},{"key":"445_CR210","doi-asserted-by":"publisher","unstructured":"Taylor BJ, Darrah MA (2005). Rule extraction as a formal method for the verification and validation of neural networks. Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005, 5, 2915\u20132920. https:\/\/doi.org\/10.1109\/IJCNN.2005.1556388","DOI":"10.1109\/IJCNN.2005.1556388"},{"key":"445_CR211","doi-asserted-by":"publisher","unstructured":"Taylor, Brian J. (Ed.). (2006). Methods and Procedures for the Verification and Validation of Artificial Neural Networks. Springer US. https:\/\/doi.org\/10.1007\/0-387-29485-6","DOI":"10.1007\/0-387-29485-6"},{"key":"445_CR212","doi-asserted-by":"publisher","unstructured":"Taylor BJ, Darrah MA, Moats CD (2003). Verification and validation of neural networks: A sampling of research in progress (K. L. Priddy P. J. Angeline, Eds.; p. 8). https:\/\/doi.org\/10.1117\/12.487527","DOI":"10.1117\/12.487527"},{"key":"445_CR213","doi-asserted-by":"publisher","unstructured":"Taylor, E, Shekhar, S, Taylor, G. W. (2020). Response Time Analysis for Explainability of Visual Processing in CNNs. 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 1555\u20131558. https:\/\/doi.org\/10.1109\/CVPRW50498.2020.00199","DOI":"10.1109\/CVPRW50498.2020.00199"},{"key":"445_CR214","unstructured":"Thomas JD, Sycara K. (1999). The Importance of Simplicity and Validation in Genetic Programming for Data Mining in Financial Data. AAAI Technical Report, 5."},{"key":"445_CR215","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027314","author":"E Tjoa","year":"2020","unstructured":"Tjoa E, Guan C. A survey on explainable artificial intelligence (XAI): towards medical XAI. IEEE Trans Neural Netw Learn Syst. 2020. https:\/\/doi.org\/10.1109\/TNNLS.2020.3027314.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"445_CR216","doi-asserted-by":"crossref","unstructured":"Toreini E, Aitken M, Coopamootoo K, Elliott K, Zelaya CG (2020). The relationship between trust in AI and trustworthy machine learning technologies. 12.","DOI":"10.1145\/3351095.3372834"},{"key":"445_CR217","unstructured":"Toreini E, Aitken M, Coopamootoo KPL, Elliott K, Zelaya VG, Missier P, Ng M, van Moorsel A (2020). Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context.ArXiv:2007.08911 [Cs, Stat]."},{"issue":"1","key":"445_CR218","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/69.755628","volume":"11","author":"W-T Tsai","year":"1999","unstructured":"Tsai W-T, Vishnuvajjala R, Zhang D. Verification and validation of knowledge-based systems. IEEE Trans Knowl Data Eng. 1999;11(1):11.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"236","key":"445_CR219","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","volume":"59","author":"A Turing","year":"1950","unstructured":"Turing A. Computing machinery and intelligence. Mind. 1950;59(236):433\u201360.","journal-title":"Mind"},{"key":"445_CR220","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-030-33506-9_12","volume-title":"Advances on broad-band wireless computing, communication and applications","author":"S Uslu","year":"2020","unstructured":"Uslu S, Kaur D, Rivera SJ, Durresi A, Babbar-Sebens M. Trust-Based game-theoretical decision making for food-energy-water management. In: Barolli L, Hellinckx P, Enokido T, editors. Advances on broad-band wireless computing, communication and applications, vol. 97. Berlin: Springer; 2020. p. 125\u201336; https:\/\/doi.org\/10.1007\/978-3-030-33506-9_12."},{"key":"445_CR221","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-030-44041-1_53","volume-title":"Advanced information networking and applications","author":"S Uslu","year":"2020","unstructured":"Uslu S, Kaur D, Rivera SJ, Durresi A, Babbar-Sebens M. Trust-based decision making for food-energy-water actors. In: Barolli L, Amato F, Moscato F, Enokido T, Takizawa M, editors. Advanced information networking and applications. Berlin: Springer International Publishing; 2020. p. 591\u2013602."},{"issue":"11","key":"445_CR222","doi-asserted-by":"publisher","first-page":"e0224365","DOI":"10.1371\/journal.pone.0224365","volume":"14","author":"A Vabalas","year":"2019","unstructured":"Vabalas A, Gowen E, Poliakoff E, Casson AJ. Machine learning algorithm validation with a limited sample size. PLoS ONE. 2019;14(11):e0224365. https:\/\/doi.org\/10.1371\/journal.pone.0224365.","journal-title":"PLoS ONE"},{"key":"445_CR223","unstructured":"Validation of Machine Learning Models: Challenges and Alternatives. (2017). protiviti."},{"issue":"3","key":"445_CR224","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/3313109","volume":"25","author":"KR Varshney","year":"2019","unstructured":"Varshney KR. Trustworthy machine learning and artificial intelligence. XRDS. 2019;25(3):26\u20139. https:\/\/doi.org\/10.1145\/3313109.","journal-title":"XRDS"},{"key":"445_CR225","doi-asserted-by":"publisher","unstructured":"Varshney KR (2020). On Mismatched Detection and Safe, Trustworthy Machine Learning. 2020 54th Annual Conference on Information Sciences and Systems (CISS), 1\u20134. https:\/\/doi.org\/10.1109\/CISS48834.2020.1570627767","DOI":"10.1109\/CISS48834.2020.1570627767"},{"key":"445_CR226","doi-asserted-by":"publisher","unstructured":"Veeramachaneni K, Arnaldo I, Korrapati V, Bassias C, Li K. (2016). AI2: Training a Big Data Machine to Defend. 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 49\u201354. https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS.2016.79","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"issue":"4","key":"445_CR227","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/0378-7206(91)90068-D","volume":"21","author":"AS Vinze","year":"1991","unstructured":"Vinze AS, Vogel DR, Nunamaker JF. Performance evaluation of a knowledge-based system. Inf Manag. 1991;21(4):225\u201335. https:\/\/doi.org\/10.1016\/0378-7206(91)90068-D.","journal-title":"Inf Manag"},{"key":"445_CR228","doi-asserted-by":"publisher","unstructured":"Volz V, Majchrzak K, Preuss M. (2018). A Social Science-based Approach to Explanations for (Game) AI. 2018 IEEE Conference on Computational Intelligence and Games (CIG), 1\u20132. https:\/\/doi.org\/10.1109\/CIG.2018.8490361","DOI":"10.1109\/CIG.2018.8490361"},{"key":"445_CR229","doi-asserted-by":"publisher","unstructured":"Wang D, Yang Q, Abdul A, Lim BY (2019). Designing Theory-Driven User-Centric Explainable AI. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI \u201919, 1\u201315. https:\/\/doi.org\/10.1145\/3290605.3300831","DOI":"10.1145\/3290605.3300831"},{"key":"445_CR230","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.3390\/app8071014","volume":"22","author":"S Wei","year":"2018","unstructured":"Wei S, Zou Y, Zhang T, Zhang X, Wang W. Design and experimental validation of a cooperative adaptive cruise control system based on supervised reinforcement learning. Appl Sci. 2018;22:1014.","journal-title":"Appl Sci."},{"issue":"3","key":"445_CR231","doi-asserted-by":"publisher","first-page":"035017","DOI":"10.1088\/1361-6560\/ab63ba","volume":"65","author":"ML Welch","year":"2020","unstructured":"Welch ML, McIntosh C, Traverso A, Wee L, Purdie TG, Dekker A, Haibe-Kains B, Jaffray DA. External validation and transfer learning of convolutional neural networks for computed tomography dental artifact classification. Phys Med Biol. 2020;65(3):035017. https:\/\/doi.org\/10.1088\/1361-6560\/ab63ba.","journal-title":"Phys Med Biol"},{"key":"445_CR232","unstructured":"Wells SA (1993). The VIVA Method: A Life-cycle Independent Approach to KBS Validation. AAAI Technical Report WS-93\u201305, 5."},{"key":"445_CR233","doi-asserted-by":"publisher","unstructured":"Wickramage N (2016). Quality assurance for data science: Making data science more scientific through engaging scientific method. 2016 Future Technologies Conference (FTC). https:\/\/doi.org\/10.1109\/FTC.2016.7821627","DOI":"10.1109\/FTC.2016.7821627"},{"key":"445_CR234","doi-asserted-by":"publisher","unstructured":"Wieringa M (2020). What to account for when accounting for algorithms: A systematic literature review on algorithmic accountability. Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, 1\u201318. https:\/\/doi.org\/10.1145\/3351095.3372833","DOI":"10.1145\/3351095.3372833"},{"key":"445_CR235","unstructured":"Wing JM (2020). Trustworthy AI. ArXiv:2002.06276[Cs]."},{"key":"445_CR236","doi-asserted-by":"publisher","first-page":"108918","DOI":"10.1016\/j.ejrad.2020.108918","volume":"7","author":"DJ Winkel","year":"2020","unstructured":"Winkel DJ. Validation of a fully automated liver segmentation algorithm using multi-scale deep reinforcement learning and comparison versus manual segmentation. Eur J Radiol. 2020;7:108918.","journal-title":"Eur J Radiol"},{"key":"445_CR237","doi-asserted-by":"publisher","unstructured":"Winkler T, Rinner B. (2010). User-Based Attestation for Trustworthy Visual Sensor Networks. 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 74\u201381. https:\/\/doi.org\/10.1109\/SUTC.2010.20","DOI":"10.1109\/SUTC.2010.20"},{"issue":"5","key":"445_CR238","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1006\/ijhc.2002.1007","volume":"56","author":"C-H Wu","year":"2002","unstructured":"Wu C-H, Lee S-J. KJ3\u2014A tool assisting formal validation of knowledge-based systems. Int J Hum Comput Stud. 2002;56(5):495\u2013524. https:\/\/doi.org\/10.1006\/ijhc.2002.1007.","journal-title":"Int J Hum Comput Stud"},{"key":"445_CR239","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.ins.2020.04.022","volume":"528","author":"Y Xiao","year":"2020","unstructured":"Xiao Y, Pun C-M, Liu B. Adversarial example generation with adaptive gradient search for single and ensemble deep neural network. Inf Sci. 2020;528:147\u201367. https:\/\/doi.org\/10.1016\/j.ins.2020.04.022.","journal-title":"Inf Sci"},{"key":"445_CR240","doi-asserted-by":"publisher","unstructured":"Xu W, Evans D, Qi Y. (2018). Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. Proceedings 2018 Network and Distributed System Security Symposium. https:\/\/doi.org\/10.14722\/ndss.2018.23198","DOI":"10.14722\/ndss.2018.23198"},{"issue":"4","key":"445_CR241","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10588-006-8873-y","volume":"12","author":"L Yilmaz","year":"2006","unstructured":"Yilmaz L. Validation and verification of social processes within agent-based computational organization models. Comput Math Organ Theory. 2006;12(4):283\u2013312. https:\/\/doi.org\/10.1007\/s10588-006-8873-y.","journal-title":"Comput Math Organ Theory"},{"key":"445_CR242","doi-asserted-by":"publisher","unstructured":"Yoon J, Kim K, Jang J. (2019). Propagated Perturbation of Adversarial Attack for well-known CNNs: Empirical Study and its Explanation. 2019 IEEE\/CVF International Conference on Computer Vision Workshop (ICCVW), 4226\u20134234. https:\/\/doi.org\/10.1109\/ICCVW.2019.00520","DOI":"10.1109\/ICCVW.2019.00520"},{"issue":"2","key":"445_CR243","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/S0005-1098(96)00165-3","volume":"33","author":"AK Zaidi","year":"1997","unstructured":"Zaidi AK, Levis AH. Validation and verification of decision making rules. Automatica. 1997;33(2):155\u201369. https:\/\/doi.org\/10.1016\/S0005-1098(96)00165-3.","journal-title":"Automatica"},{"issue":"1","key":"445_CR244","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1177\/1548512914568657","volume":"13","author":"BP Zeigler","year":"2016","unstructured":"Zeigler BP, Nutaro JJ. Towards a framework for more robust validation and verification of simulation models for systems of systems. J Def\u00a0Model Simul . 2016;13(1):3\u201316. https:\/\/doi.org\/10.1177\/1548512914568657.","journal-title":"J Def\u00a0Model Simuln"},{"key":"445_CR245","unstructured":"Zhou J, Chen F (2019). Towards Trustworthy Human-AI Teaming under Uncertainty. 5."},{"key":"445_CR246","doi-asserted-by":"publisher","unstructured":"Zhu, H, Xiong, Z, Magill, S, Jagannathan, S. (2019). An inductive synthesis framework for verifiable reinforcement learning. Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 686\u2013701. https:\/\/doi.org\/10.1145\/3314221.3314638","DOI":"10.1145\/3314221.3314638"},{"key":"445_CR247","doi-asserted-by":"publisher","unstructured":"Zhu J, Liapis A, Risi S, Bidarra R, Youngblood GM (2018). Explainable AI for Designers: A Human-Centered Perspective on Mixed-Initiative Co-Creation. 2018 IEEE Conference on Computational Intelligence and Games (CIG), 1\u20138. https:\/\/doi.org\/10.1109\/CIG.2018.8490433","DOI":"10.1109\/CIG.2018.8490433"},{"key":"445_CR248","unstructured":"Zlatareva NP (1998). Knowledge Refinement during Developmental and Field Validation of Expert Systems. 6."},{"issue":"2","key":"445_CR249","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/0957-4174(94)90034-5","volume":"7","author":"N Zlatareva","year":"1994","unstructured":"Zlatareva N, Preece A. State of the art in automated validation of knowledge-based systems. Expert Syst Appl. 1994;7(2):151\u201367. https:\/\/doi.org\/10.1016\/0957-4174(94)90034-5.","journal-title":"Expert Syst Appl"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-021-00445-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-021-00445-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-021-00445-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T18:54:55Z","timestamp":1698951295000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-021-00445-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":249,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["445"],"URL":"https:\/\/doi.org\/10.1186\/s40537-021-00445-7","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"13 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"60"}}