{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:19:32Z","timestamp":1776082772146,"version":"3.50.1"},"reference-count":166,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,3,18]],"date-time":"2023-03-18T00:00:00Z","timestamp":1679097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Artificial intelligence systems are increasingly being used in industrial applications, security and military contexts, disaster response complexes, policing and justice practices, finance, and healthcare systems. However, disruptions to these systems can have negative impacts on health, mortality, human rights, and asset values. The protection of such systems from various types of destructive influences is thus a relevant area of research. The vast majority of previously published works are aimed at reducing vulnerability to certain types of disturbances or implementing certain resilience properties. At the same time, the authors either do not consider the concept of resilience as such, or their understanding varies greatly. The aim of this study is to present a systematic approach to analyzing the resilience of artificial intelligence systems, along with an analysis of relevant scientific publications. Our methodology involves the formation of a set of resilience factors, organizing and defining taxonomic and ontological relationships for resilience factors of artificial intelligence systems, and analyzing relevant resilience solutions and challenges. This study analyzes the sources of threats and methods to ensure each resilience properties for artificial intelligence systems. As a result, the potential to create a resilient artificial intelligence system by configuring the architecture and learning scenarios is confirmed. The results can serve as a roadmap for establishing technical requirements for forthcoming artificial intelligence systems, as well as a framework for assessing the resilience of already developed artificial intelligence systems.<\/jats:p>","DOI":"10.3390\/a16030165","type":"journal-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T03:09:37Z","timestamp":1679281777000},"page":"165","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Resilience and Resilient Systems of Artificial Intelligence: Taxonomy, Models and Methods"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6275-9803","authenticated-orcid":false,"given":"Viacheslav","family":"Moskalenko","sequence":"first","affiliation":[{"name":"Department of Computer Science, Sumy State University, 2, Mykola Sumtsova St., 40007 Sumy, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5352-077X","authenticated-orcid":false,"given":"Vyacheslav","family":"Kharchenko","sequence":"additional","affiliation":[{"name":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \u201cKhAI\u201d, 17, Chkalov Str., 61070 Kharkiv, Ukraine"}]},{"given":"Alona","family":"Moskalenko","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sumy State University, 2, Mykola Sumtsova St., 40007 Sumy, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9511-5665","authenticated-orcid":false,"given":"Borys","family":"Kuzikov","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sumy State University, 2, Mykola Sumtsova St., 40007 Sumy, Ukraine"}]}],"member":"1968","published-online":{"date-parts":[[2023,3,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Xu, J., Kovatsch, M., Mattern, D., Mazza, F., Harasic, M., Paschke, A., and Lucia, S. (2022). A Review on AI for Smart Manufacturing: Deep Learning Challenges and Solutions. Appl. Sci., 12.","DOI":"10.3390\/app12168239"},{"key":"ref_2","unstructured":"Khalid, F., Hanif, M.A., and Shafique, M. (2021). Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks. arXiv."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gongye, C., Li, H., Zhang, X., Sabbagh, M., Yuan, G., Lin, X., Wahl, T., and Fei, Y. (2020, January 2\u20135). New passive and active attacks on deep neural networks in medical applications. Proceedings of the ICCAD \u201820: IEEE\/ACM International Conference on Computer-Aided Design, Virtual Event USA.","DOI":"10.1145\/3400302.3418782"},{"key":"ref_4","unstructured":"Caccia, M., Rodr\u00edguez, P., Ostapenko, O., Normandin, F., Lin, M., Caccia, L., Laradji, I., Rish, I., Lacoste, A., and Vazquez, D. (2020, January 6\u201312). Online fast adaptation and knowledge accumulation (OSAKA): A new approach to continual learning. Proceedings of the 34th International Conference on Neural Information Processing Systems, Vancouver, BC, Canada."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Margatina, K., Vernikos, G., Barrault, L., and Aletras, N. (2021). Active Learning by Acquiring Contrastive Examples. arXiv.","DOI":"10.18653\/v1\/2021.emnlp-main.51"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.neunet.2019.01.012","article-title":"Continual Lifelong Learning with Neural Networks: A Review","volume":"113","author":"Parisi","year":"2019","journal-title":"Neural Netw."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ruf, P., Madan, M., Reich, C., and Ould-Abdeslam, D. (2021). Demystifying Mlops and Presenting a Recipe for the Selection of Open-Source Tools. Appl. Sci., 11.","DOI":"10.3390\/app11198861"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ghavami, B., Sadati, M., Fang, Z., and Shannon, L. (2022, January 14\u201323). FitAct: Error Resilient Deep Neural Networks via Fine-Grained Post-Trainable Activation Functions. Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), Virtual.","DOI":"10.23919\/DATE54114.2022.9774635"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yin, Y., Zheng, X., Du, P., Liu, L., and Ma, H. (2021, January 4\u20137). Scaling Resilient Adversarial Patch. Proceedings of the 2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Denver, CO, USA.","DOI":"10.1109\/MASS52906.2021.00034"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.neunet.2021.06.027","article-title":"Selective Ensemble-Based Online Adaptive Deep Neural Networks for Streaming Data with Concept Drift","volume":"142","author":"Guo","year":"2021","journal-title":"Neural Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3421529","DOI":"10.1155\/2018\/3421529","article-title":"Resilience of Complex Systems: State of the Art and Directions for Future Research","volume":"2018","author":"Fraccascia","year":"2018","journal-title":"Complexity"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/MC.2022.3217841","article-title":"A Survey on Deep Learning Resilience Assessment Methodologies","volume":"56","author":"Ruospo","year":"2022","journal-title":"Computer"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"He, Y., Balaprakash, P., and Li, Y. (2020, January 17\u201321). FIdelity: Efficient Resilience Analysis Framework for Deep Learning Accelerators. Proceedings of the 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO), Athens, Greece.","DOI":"10.1109\/MICRO50266.2020.00033"},{"key":"ref_14","unstructured":"Santos, S.G.T.d.C., Gon\u00e7alves J\u00fanior, P.M., Silva, G.D.d.S., and de Barros, R.S.M. (2014). Machine Learning and Knowledge Discovery in Databases, Springer."},{"key":"ref_15","first-page":"17","article-title":"Computer systems resilience in the presence of cyber threats: Taxonomy and ontology","volume":"1","author":"Lusenko","year":"2020","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Drozd, O., Kharchenko, V., Rucinski, A., Kochanski, T., Garbos, R., and Maevsky, D. (2019, January 5\u20137). Development of Models in Resilient Computing. Proceedings of the 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT), Leeds, UK.","DOI":"10.1109\/DESSERT.2019.8770035"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1126\/science.1111534","article-title":"Toward Inherently Secure and Resilient Societies","volume":"309","author":"Allenby","year":"2005","journal-title":"Science"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1111\/j.1539-6924.2009.01216.x","article-title":"On the Definition of Resilience in Systems","volume":"29","author":"Haimes","year":"2009","journal-title":"Risk Anal."},{"key":"ref_19","unstructured":"Vugrin, E.D., Warren, D.E., Ehlen, M.A., and Camphouse, R.C. (2010). Sustainable and Resilient Critical Infrastructure Systems, Springer."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3639","DOI":"10.1016\/j.engstruct.2010.08.008","article-title":"Framework for Analytical Quantification of Disaster Resilience","volume":"32","author":"Cimellaro","year":"2010","journal-title":"Eng. Struct."},{"key":"ref_21","first-page":"376","article-title":"Resilience and Resilience Engineering in Health Care","volume":"40","author":"Fairbanks","year":"2014","journal-title":"Jt. Comm. J. Qual. Patient Saf."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"111408","DOI":"10.1115\/1.4034223","article-title":"Engineering Resilience Quantification and System Design Implications: A Literature Survey","volume":"138","author":"Yodo","year":"2016","journal-title":"J. Mech. Des."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1002\/j.2334-5837.2021.00855.x","article-title":"Resilience Requirements Patterns","volume":"31","author":"Brtis","year":"2021","journal-title":"INCOSE Int. Symp."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1080\/23789689.2017.1294859","article-title":"Defining resilience analytics for interdependent cyber-physical-social networks","volume":"2","author":"Barker","year":"2017","journal-title":"Sustain. Resilient Infrastruct."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1080\/00139157.2013.768076","article-title":"Disaster Resilience: A National Imperative","volume":"55","author":"Cutter","year":"2013","journal-title":"Environ. Sci. Policy Sustain. Dev."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wheaton, M., and Madni, A.M. (September, January 31). Resiliency and Affordability Attributes in a System Tradespace. Proceedings of the AIAA SPACE 2015 Conference and Exposition, Pasadena, CA, USA.","DOI":"10.2514\/6.2015-4434"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"e99","DOI":"10.1017\/S0140525X14001502","article-title":"Cognitive trade-offs and the costs of resilience","volume":"38","author":"Crespi","year":"2015","journal-title":"Behav. Brain Sci."},{"key":"ref_28","unstructured":"Dyer, J.S. (2016). Multiple Criteria Decision Analysis, Springer."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Kulakowski, K. (2020). Understanding Analytic Hierarchy Process, Taylor & Francis Group.","DOI":"10.1201\/b21817"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"86","DOI":"10.15588\/1607-3274-2022-3-9","article-title":"Image Classifier Resilient to Adversarial Attacks, Fault Injections and Concept Drift\u2014Model Architecture and Training Algorithm","volume":"3","author":"Moskalenko","year":"2022","journal-title":"Radio Electron. Comput. Sci. Control."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"95","DOI":"10.32620\/reks.2022.3.07","article-title":"Neural network based image classifier resilient to destructive perturbation influences\u2014Architecture and training method","volume":"3","author":"Moskalenko","year":"2022","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Eggers, S., and Sample, C. (2020). Vulnerabilities in Artificial Intelligence and Machine Learning Applications and Data, Office of Scientific and Technical Information (OSTI).","DOI":"10.2172\/1846969"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Tabassi, E. (2023). A Taxonomy and Terminology of Adversarial Machine Learning, National Institute of Standards and Technology.","DOI":"10.6028\/NIST.AI.100-2e2023.ipd"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"17322","DOI":"10.1109\/ACCESS.2017.2742698","article-title":"Fault and Error Tolerance in Neural Networks: A Review","volume":"5","author":"Girau","year":"2017","journal-title":"IEEE Access"},{"key":"ref_35","first-page":"9523","article-title":"Concept Drift Detection in Data Stream Mining: A literature review","volume":"34","author":"Agrahari","year":"2021","journal-title":"J. King Saud Univ.\u2013Comput. Inf. Sci."},{"key":"ref_36","first-page":"5549300","article-title":"ADES: A New Ensemble Diversity-Based Approach for Handling Concept Drift","volume":"2021","author":"Museba","year":"2021","journal-title":"Mob. Inf. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Malekzadeh, E., Rohbani, N., Lu, Z., and Ebrahimi, M. (2021, January 6\u20138). The Impact of Faults on DNNs: A Case Study. Proceedings of the 2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Athens, Greece.","DOI":"10.1109\/DFT52944.2021.9568340"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Benevenuti, F., Libano, F., Pouget, V., Kastensmidt, F.L., and Rech, P. (2018, January 27\u201331). Comparative Analysis of Inference Errors in a Neural Network Implemented in SRAM-Based FPGA Induced by Neutron Irradiation and Fault Injection Methods. Proceedings of the 2018 31st Symposium on Integrated Circuits and Systems Design (SBCCI), Bento Goncalves, Brazil.","DOI":"10.1109\/SBCCI.2018.8533235"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Li, J., Rakin, A.S., Xiong, Y., Chang, L., He, Z., Fan, D., and Chakrabarti, C. (2020, January 20\u201324). Defending Bit-Flip Attack through DNN Weight Reconstruction. Proceedings of the 2020 57th ACM\/IEEE Design Automation Conference (DAC), San Francisco, CA, USA.","DOI":"10.1109\/DAC18072.2020.9218665"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","article-title":"Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey","volume":"6","author":"Akhtar","year":"2018","journal-title":"IEEE Access"},{"key":"ref_41","first-page":"346","article-title":"Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity","volume":"6","author":"Zhou","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Khalid, F., Ali, H., Abdullah Hanif, M., Rehman, S., Ahmed, R., and Shafique, M. (2020, January 19\u201324). FaDec: A Fast Decision-based Attack for Adversarial Machine Learning. Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK.","DOI":"10.1109\/IJCNN48605.2020.9207635"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Altoub, M., AlQurashi, F., Yigitcanlar, T., Corchado, J.M., and Mehmood, R. (2022). An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks. Appl. Sci., 12.","DOI":"10.20944\/preprints202208.0197.v1"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1049\/cit2.12028","article-title":"A survey on adversarial attacks and defences","volume":"6","author":"Chakraborty","year":"2021","journal-title":"CAAI Trans. Intell. Technol."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"101509","DOI":"10.1016\/j.ijdrr.2020.101509","article-title":"Resourcefulness quantification approach for resilient communities and countries","volume":"46","author":"Zona","year":"2020","journal-title":"Int. J. Disaster Risk Reduct."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Eigner, O., Eresheim, S., Kieseberg, P., Klausner, L.D., Pirker, M., Priebe, T., Tjoa, S., Marulli, F., and Mercaldo, F. (2021, January 26\u201328). Towards Resilient Artificial Intelligence: Survey and Research Issues. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece.","DOI":"10.1109\/CSR51186.2021.9527986"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/COMST.2020.3036778","article-title":"Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS","volume":"23","author":"Olowononi","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_48","unstructured":"(2023, February 11). Graceful Degradation and Related Fields-ePrints Soton. Welcome to ePrints Soton-ePrints Soton. Available online: https:\/\/eprints.soton.ac.uk\/455349\/."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Cavagnero, N., Santos, F.D., Ciccone, M., Averta, G., Tommasi, T., and Rech, P. (2022, January 12\u201314). Transient-Fault-Aware Design and Training to Enhance DNNs Reliability with Zero-Overhead. Proceedings of the 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS), Torino, Italy.","DOI":"10.1109\/IOLTS56730.2022.9897813"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"En\u00e9riz, D., Medrano, N., and Calvo, B. (2021). An FPGA-Based Machine Learning Tool for In-Situ Food Quality Tracking Using Sensor Fusion. Biosensors, 11.","DOI":"10.3390\/bios11100366"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Wang, J., Li, M., Jiang, W., Huang, Y., and Lin, R. (2022). A Design of FPGA-Based Neural Network PID Controller for Motion Control System. Sensors, 22.","DOI":"10.3390\/s22030889"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Barbero, F., Pendlebury, F., Pierazzi, F., and Cavallaro, L. (2022, January 22\u201326). Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift. Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP46214.2022.9833659"},{"key":"ref_53","first-page":"102","article-title":"Adaptive Biometric Systems","volume":"52","author":"Pisani","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"103103","DOI":"10.1016\/j.cviu.2020.103103","article-title":"Detection of Face Recognition Adversarial Attacks","volume":"202","author":"Massoli","year":"2021","journal-title":"Comput. Vis. Image Underst."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"89","DOI":"10.9734\/jerr\/2022\/v22i817557","article-title":"FPGA Based Facial Recognition System","volume":"22","author":"Izuddeen","year":"2022","journal-title":"J. Eng. Res. Rep."},{"key":"ref_56","unstructured":"Hickling, T., Aouf, N., and Spencer, P. (2022). Robust Adversarial Attacks Detection based on Explainable Deep Reinforcement Learning for UAV Guidance and Planning. arXiv."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Bistron, M., and Piotrowski, Z. (2021). Artificial Intelligence Applications in Military Systems and Their Influence on Sense of Security of Citizens. Electronics, 10.","DOI":"10.3390\/electronics10070871"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Jurn, Y.N., Mahmood, S.A., and Aldhaibani, J.A. (2021, January 27\u201328). Anti-Drone System Based Different Technologies: Architecture, Threats and Challenges. Proceedings of the 2021 11th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), Penang, Malaysia.","DOI":"10.1109\/ICCSCE52189.2021.9530992"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Travaini, G.V., Pacchioni, F., Bellumore, S., Bosia, M., and De Micco, F. (2022). Machine Learning and Criminal Justice: A Systematic Review of Advanced Methodology for Recidivism Risk Prediction. Int. J. Environ. Res. Public Health, 19.","DOI":"10.3390\/ijerph191710594"},{"key":"ref_60","unstructured":"Shen, M.W. (2021). Trust in AI: Interpretability is not necessary or sufficient, while black-box interaction is necessary and sufficient. arXiv."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"102933","DOI":"10.1016\/j.cose.2022.102933","article-title":"Investigating Machine Learning Attacks on Financial Time Series Models","volume":"123","author":"Gallagher","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Kumar, N., Vimal, S., Kayathwal, K., and Dhama, G. (2021, January 13\u201316). Evolutionary Adversarial Attacks on Payment Systems. Proceedings of the 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Pasadena, CA, USA.","DOI":"10.1109\/ICMLA52953.2021.00134"},{"key":"ref_63","unstructured":"Vo, N.H., Phan, K.D., Tran, A.-D., and Dang-Nguyen, D.-T. (2022). MultiMedia Modeling, Springer International Publishing."},{"key":"ref_64","unstructured":"Gaglio, S., Giammanco, A., Lo Re, G., and Morana, M. (2022). AIxIA 2021\u2013Advances in Artificial Intelligence, Springer International Publishing."},{"key":"ref_65","unstructured":"Xie, C., Wang, J., Zhang, Z., Ren, Z., and Yuille, A. (2017, January 24\u201326). Mitigating Adversarial Effects through Randomization. Proceedings of the International Conference on Learning Representations, Toulon, France."},{"key":"ref_66","unstructured":"Athalye, A., Carlini, N., and Wagner, D. (2018, January 10\u201315). Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. Proceedings of the International Conference on Machine Learning, Stockholm, Sweden."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., and Swami, A. (2016, January 22\u201326). Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2016.41"},{"key":"ref_68","unstructured":"Srisakaokul, S., Zhong, Z., Zhang, Y., Ti, B., Xie, T., and Yang, W. (2018). Multi-Model-Based Defense Against Adversarial Examples for Neural Networks. arXiv."},{"key":"ref_69","unstructured":"Song, Y., Kim, T., Nowozin, S., Ermon, S., and Kushman, N. (May, January 30). PixelDefend: Leveraging Generative Models to Understand and Defend against Advers arial Examples. Proceedings of the International Conference on Learning Representations, Vancouver, QC, Canada."},{"key":"ref_70","unstructured":"Samangouei, P., Kabkab, M., and Chellappa, R. (2018). Protecting Classifiers Against Adversarial Attacks Using Generative Models. arXiv."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Makarichev, V., Lukin, V., Illiashenko, O., and Kharchenko, V. (2022). Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems. Sensors, 22.","DOI":"10.3390\/s22103751"},{"key":"ref_72","unstructured":"Laermann, J., Samek, W., and Strodthoff, N. (2019). Lecture Notes in Computer Science, Springer International Publishing."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Jakubovitz, D., and Giryes, R. (2018, January 8\u201314). Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization. Proceedings of the European Conference on Computer Vision, Munich, Germany.","DOI":"10.1007\/978-3-030-01258-8_32"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"37","DOI":"10.17352\/tcsit.000017","article-title":"A useful taxonomy for adversarial robustness of Neural Networks","volume":"5","author":"Leslie","year":"2020","journal-title":"Trends Comput. Sci. Inf. Technol."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1109\/TCSVT.2016.2607345","article-title":"Image Classification with Tailored Fine-Grained Dictionaries","volume":"28","author":"Shu","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Deng, Z., Yang, X., Xu, S., Su, H., and Zhu, J. (2021, January 20\u201325). LiBRe: A Practical Bayesian Approach to Adversarial Detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00103"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Abusnaina, A., Wu, Y., Arora, S., Wang, Y., Wang, F., Yang, H., and Mohaisen, D. (2021, January 10\u201317). Adversarial Example Detection Using Latent Neighborhood Graph. Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), Montreal, QC, Canada.","DOI":"10.1109\/ICCV48922.2021.00759"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Sikka, H., Izmailov, R., Chadha, R., Oprea, A., and de Lucia, M.J. (December, January 29). Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems. Proceedings of the MILCOM 2021\u20132021 IEEE Military Communications Conference (MILCOM), San Diego, CA, USA.","DOI":"10.1109\/MILCOM52596.2021.9652916"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2017, January 3). Adversarial Examples Are Not Easily Detected. Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, Dallas, TX, USA.","DOI":"10.1145\/3128572.3140444"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Zhao, W., Alwidian, S., and Mahmoud, Q.H. (2022). Adversarial Training Methods for Deep Learning: A Systematic Review. Algorithms, 15.","DOI":"10.3390\/a15080283"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Xu, J., Li, Z., Du, B., Zhang, M., and Liu, J. (2020, January 7\u201310). Reluplex made more practical: Leaky ReLU. Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Rennes, France.","DOI":"10.1109\/ISCC50000.2020.9219587"},{"key":"ref_82","unstructured":"Carrara, F., Becarelli, R., Caldelli, R., Falchi, F., and Amato, G. (2019). Physics of Solid Surfaces, Springer."},{"key":"ref_83","first-page":"22","article-title":"MATE: Memory- and Retraining- Free Error Correction for Convolutional Neural Network Weights","volume":"19","author":"Jang","year":"2021","journal-title":"J. Lnf. Commun. Converg. Eng."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Li, W., Ning, X., Ge, G., Chen, X., Wang, Y., and Yang, H. (2020, January 13\u201316). FTT-NAS: Discovering Fault-Tolerant Neural Architecture. Proceedings of the 25th Asia and South Pacific Design Automation Conference (ASP-DAC), Beijing, China.","DOI":"10.1109\/ASP-DAC47756.2020.9045324"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Hoang, L.-H., Hanif, M.A., and Shafique, M. (2021, January 1\u20133). TRe-Map: Towards Reducing the Overheads of Fault-Aware Retraining of Deep Neural Networks by Merging Fault Maps. Proceedings of the 24th Euromicro Conference on Digital System Design (DSD), Palermo, Italy.","DOI":"10.1109\/DSD53832.2021.00072"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Baek, I., Chen, W., Zhu, Z., Samii, S., and Rajkumar, R.R. (2022, January 3\u20138). FT-DeepNets: Fault-Tolerant Convolutional Neural Networks with Kernel-based Duplication. Proceedings of the 2022 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), Waikoloa, HI, USA.","DOI":"10.1109\/WACV51458.2022.00194"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Xu, H., Chen, Z., Wu, W., Jin, Z., Kuo, S.-y., and Lyu, M. (2019, January 24\u201327). NV-DNN: Towards Fault-Tolerant DNN Systems with N-Version Programming. Proceedings of the 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Portland, OR, USA.","DOI":"10.1109\/DSN-W.2019.00016"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Liu, T., Wen, W., Jiang, L., Wang, Y., Yang, C., and Quan, G. (2019, January 2\u20136). A Fault-Tolerant Neural Network Architecture. Proceedings of the DAC \u201819: The 56th Annual Design Automation Conference 2019, Las Vegas, NV, USA.","DOI":"10.1145\/3316781.3317742"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/JSAIT.2020.2991430","article-title":"Functional Error Correction for Robust Neural Networks","volume":"1","author":"Huang","year":"2020","journal-title":"IEEE J. Sel. Areas Inf. Theory"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Li, J., Rakin, A.S., He, Z., Fan, D., and Chakrabarti, C. (2021, January 1\u20135). RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery. Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France.","DOI":"10.23919\/DATE51398.2021.9474113"},{"key":"ref_91","unstructured":"Wang, C., Zhao, P., Wang, S., and Lin, X. (2021, January 14). Detection and recovery against deep neural network fault injection attacks based on contrastive learning. Proceedings of the 3rd Workshop on Adversarial Learning Methods for Machine Learning and Data Mining at KDD, Singapore."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Javaheripi, M., and Koushanfar, F. (2021, January 1\u20134). HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks. Proceedings of the IEEE\/ACM International Conference on Computer Aided Design (ICCAD), Munich, Germany.","DOI":"10.1109\/ICCAD51958.2021.9643556"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1186\/s40537-021-00455-5","article-title":"Domain randomization for neural network classification","volume":"8","author":"Valtchev","year":"2021","journal-title":"J. Big Data"},{"key":"ref_94","unstructured":"Volpi, R., Namkoong, H., Sener, O., Duchi, J., Murino, V., and Savarese, S. (2018, January 2\u20138). Generalizing to unseen domains via adversarial data augmentation. Proceedings of the 32nd International Conference on Neural Information Processing Systems, Montr\u00e9al, QC, Canada."},{"key":"ref_95","unstructured":"Xu, Q., Yao, L., Jiang, Z., Jiang, G., Chu, W., Han, W., Zhang, W., Wang, C., and Tai, Y. (March, January 22). DIRL: Domain-Invariant Representation Learning for Generalizable Semantic Segmentation. Proceedings of the AAAI Conference on Artificial Intelligence, Palo Alto, CA, USA."},{"key":"ref_96","first-page":"68","article-title":"Generalized Deep Transfer Networks for Knowledge Propagation in Heterogeneous Domains. ACM Trans","volume":"12","author":"Tang","year":"2016","journal-title":"Multimedia Comput. Commun. Appl."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Jiao, B., Guo, Y., Gong, D., and Chen, Q. (2022). Dynamic Ensemble Selection for Imbalanced Data Streams with Concept Drift. IEEE Trans. Neural Netw. Learn. Syst., 1\u201314.","DOI":"10.1109\/TNNLS.2022.3183120"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.jss.2016.07.005","article-title":"A survey on feature drift adaptation: Definition, benchmark, challenges and future directions","volume":"127","author":"Barddal","year":"2017","journal-title":"J. Syst. Softw."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/s10115-018-1257-z","article-title":"Survey of distance measures for quantifying concept drift and shift in numeric data","volume":"60","author":"Goldenberg","year":"2018","journal-title":"Knowl. Inf. Syst."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Wang, P., Woo, W., Jin, N., and Davies, D. (2022, January 18\u201320). Concept Drift Detection by Tracking Weighted Prediction Confidence of Incremental Learning. Proceedings of the IVSP 2022: 2022 4th International Conference on Image, Video and Signal Processing, Singapore.","DOI":"10.1145\/3531232.3531264"},{"key":"ref_101","first-page":"2346","article-title":"Learning under Concept Drift: A Review","volume":"31","author":"Lu","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1016\/j.eswa.2017.10.003","article-title":"Detecting concept drift in data streams using model explanation","volume":"92","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_103","unstructured":"Huang, D.T.J., Koh, Y.S., Dobbie, G., and Bifet, A. (2015). Machine Learning and Knowledge Discovery in Databases, Springer International Publishing."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Wu, J., Zhang, T., Zha, Z.-J., Luo, J., Zhang, Y., and Wu, F. (2020, January 13\u201319). Self-Supervised Domain-Aware Generative Network for Generalized Zero-Shot Learning. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.01278"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.inffus.2021.05.008","article-title":"A review of uncertainty quantification in deep learning: Techniques, applications and challenges","volume":"76","author":"Abdar","year":"2021","journal-title":"Inf. Fusion"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Karimi, D., and Gholipour, A. (2022). Improving Calibration and out-of-Distribution Detection in Deep Models for Medical Image Segmentation. arXiv.","DOI":"10.1109\/TAI.2022.3159510"},{"key":"ref_107","unstructured":"Shao, Z., Yang, J., and Ren, S. (2020). Calibrating Deep Neural Network Classifiers on out-of-Distribution Datasets. arXiv."},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Achddou, R., Di Martino, J.M., and Sapiro, G. (2021, January 6\u201311). Nested Learning for Multi-Level Classification. Proceedings of the ICASSP 2021\u20132021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, ON, Canada.","DOI":"10.1109\/ICASSP39728.2021.9415076"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Huo, Y., Lu, Y., Niu, Y., Lu, Z., and Wen, J.-R. (2019, January 21\u201325). Coarse-to-Fine Grained Classification. Proceedings of the SIGIR \u201819: The 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, Paris, France.","DOI":"10.1145\/3331184.3331336"},{"key":"ref_110","first-page":"4051","article-title":"A Review of Generalized Zero-Shot Learning Methods","volume":"45","author":"Pourpanah","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Chen, K.-Y., and Yeh, M.-C. (2022, January 18\u201322). Generative and Adaptive Multi-Label Generalized Zero-Shot Learning. Proceedings of the 2022 IEEE International Conference on Multimedia and Expo (ICME), Taipei, Taiwan.","DOI":"10.1109\/ICME52920.2022.9859828"},{"key":"ref_112","unstructured":"Baier, L., K\u00fchl, N., Satzger, G., Hofmann, M., and Mohr, M. (2020). WI2020 Zentrale Tracks, GITO Verlag."},{"key":"ref_113","first-page":"4388","article-title":"Self-Distillation: Towards Efficient and Compact Neural Networks","volume":"44","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_114","unstructured":"Laskaridis, S., Kouris, A., and Lane, N.D. (July, January 24). Adaptive Inference through Early-Exit Networks. Proceedings of the MobiSys \u201821: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1613\/jair.1.14174","article-title":"A Survey of Zero-shot Generalisation in Deep Reinforcement Learning","volume":"76","author":"Kirk","year":"2023","journal-title":"J. Artif. Intell. Res."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.ins.2022.03.075","article-title":"Target inductive methods for zero-shot regression","volume":"599","author":"Quevedo","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Liu, S., Chen, J., Pan, L., Ngo, C.-W., Chua, T.-S., and Jiang, Y.-G. (2020, January 13\u201319). Hyperbolic Visual Embedding Learning for Zero-Shot Recognition. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00929"},{"key":"ref_118","first-page":"5652","article-title":"Online Active Learning of Reject Option Classifiers","volume":"34","author":"Shah","year":"2020","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1016\/j.patcog.2018.01.017","article-title":"A variance maximization criterion for active learning","volume":"78","author":"Yang","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.procir.2021.11.076","article-title":"Regularization-based Continual Learning for Anomaly Detection in Discrete Manufacturing","volume":"104","author":"Maschler","year":"2021","journal-title":"Procedia CIRP"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Cossu, A., Carta, A., and Bacciu, D. (2020, January 19\u201324). Continual Learning with Gated Incremental Memories for sequential data processing. Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK.","DOI":"10.1109\/IJCNN48605.2020.9207550"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2021.01.078","article-title":"SpaceNet: Make Free Space for Continual Learning","volume":"439","author":"Sokar","year":"2021","journal-title":"Neurocomputing"},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.neucom.2020.11.063","article-title":"Central moment discrepancy based domain adaptation for intelligent bearing fault diagnosis","volume":"429","author":"Li","year":"2021","journal-title":"Neurocomputing"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Li, S., Liu, C.H., Xie, B., Su, L., Ding, Z., and Huang, G. (2019, January 21\u201325). Joint Adversarial Domain Adaptation. Proceedings of the MM \u201819: The 27th ACM International Conference on Multimedia, Nice, France.","DOI":"10.1145\/3343031.3351070"},{"key":"ref_125","unstructured":"Yang, J., An, W., Wang, S., Zhu, X., Yan, C., and Huang, J. (2020). Computer Vision\u2013ECCV 2020, Springer International Publishing."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"156694","DOI":"10.1109\/ACCESS.2019.2949697","article-title":"Self-Supervised Domain Adaptation for Computer Vision Tasks","volume":"7","author":"Xu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1080\/09540091.2021.1996537","article-title":"Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation","volume":"34","author":"Li","year":"2021","journal-title":"Connect. Sci."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"110846","DOI":"10.1109\/ACCESS.2019.2933988","article-title":"Meta-Learning via Weighted Gradient Update","volume":"7","author":"Xu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"(2016). TPAMI Publication Information. IEEE Trans. Pattern Anal. Mach. Intell., 38, C2.","DOI":"10.1109\/TPAMI.2016.2572405"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Reagen, B., Gupta, U., Pentecost, L., Whatmough, P., Lee, S.K., Mulholland, N., Brooks, D., and Wei, G.-Y. (2018, January 24\u201329). Ares. Proceedings of the DAC \u203218: The 55th Annual Design Automation Conference 2018, San Francisco, CA, USA.","DOI":"10.1145\/3195970.3195997"},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Li, G., Pattabiraman, K., and DeBardeleben, N. (2018, January 15\u201318). TensorFI: A Configurable Fault Injector for TensorFlow Applications. Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Charlotte, NC, USA.","DOI":"10.1109\/ISSREW.2018.00024"},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Kotyan, S., and Vargas, D. (2022). Adversarial robustness assessment: Why in evaluation both L0 and L\u221e attacks are necessary. PLoS ONE, 17.","DOI":"10.1371\/journal.pone.0265723"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Moskalenko, V., Kharchenko, V., Moskalenko, A., and Petrov, S. (2022). Model and Training Method of the Resilient Image Classifier Considering Faults, Concept Drift, and Adversarial Attacks. Algorithms, 15.","DOI":"10.3390\/a15100384"},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Xie, X., Ma, L., Juefei-Xu, F., Xue, M., Chen, H., Liu, Y., Zhao, J., Li, B., Yin, J., and See, S. (2019, January 15\u201319). DeepHunter: A coverage-guided fuzz testing framework for deep neural networks. Proceedings of the ISSTA \u203219: 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, Beijing, China.","DOI":"10.1145\/3293882.3330579"},{"key":"ref_135","unstructured":"Ehlers, R. (2017). Automated Technology for Verification and Analysis, Springer International Publishing."},{"key":"ref_136","unstructured":"Katz, G., Barrett, C., Dill, D.L., Julian, K., and Kochenderfer, M.J. (2017). Computer Aided Verification, Springer International Publishing."},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Narodytska, N. (November, January 30). Formal Verification of Deep Neural Networks. Proceedings of the 2018 Formal Methods in Computer Aided Design (FMCAD), Austin, TX, USA.","DOI":"10.23919\/FMCAD.2018.8603017"},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Narodytska, N. (2018, January 13\u201319). Formal Analysis of Deep Binarized Neural Networks. Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}, Stockholm, Sweden.","DOI":"10.24963\/ijcai.2018\/811"},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"5777","DOI":"10.1109\/TNNLS.2018.2808470","article-title":"Output Reachable Set Estimation and Verification for Multilayer Neural Networks","volume":"29","author":"Xiang","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Gehr, T., Mirman, M., Drachsler-Cohen, D., Tsankov, P., Chaudhuri, S., and Vechev, M. (2018, January 20\u201324). AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2018.00058"},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.tcs.2019.05.046","article-title":"A Game-Based Approximate Verification of Deep Neural Networks With Provable Guarantees","volume":"807","author":"Wu","year":"2020","journal-title":"Theor. Comput. Sci."},{"key":"ref_142","unstructured":"Wicker, M., Huang, X., and Kwiatkowska, M. (2018). Tools and Algorithms for the Construction and Analysis of Systems, Springer International Publishing."},{"key":"ref_143","unstructured":"Weng, T.-W., Zhang, H., Chen, P.-Y., Yi, J., Daniel, L., Hsieh, C.-J., Gao, Y., and Su, D. (2018). Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach. arXiv."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"100270","DOI":"10.1016\/j.cosrev.2020.100270","article-title":"A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability","volume":"37","author":"Huang","year":"2020","journal-title":"Comput. Sci. Rev."},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Baluta, T., Chua, Z.L., Meel, K.S., and Saxena, P. (2021, January 22\u201330). Scalable Quantitative Verification For Deep Neural Networks. Proceedings of the 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, Spain.","DOI":"10.1109\/ICSE43902.2021.00039"},{"key":"ref_146","first-page":"7975","article-title":"CC-CERT: A Probabilistic Approach to Certify General Robustness of Neural Networks","volume":"36","author":"Pautov","year":"2022","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref_147","unstructured":"Feurer, M., and Hutter, F. (2019). Automated Machine Learning, Springer International Publishing."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/LSP.2019.2956367","article-title":"Batching Soft IoU for Training Semantic Segmentation Networks","volume":"27","author":"Huang","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_149","unstructured":"Steck, H. (2007). Machine Learning: ECML 2007, Springer."},{"key":"ref_150","doi-asserted-by":"crossref","unstructured":"Berman, M., Triki, A.R., and Blaschko, M.B. (2018, January 18\u201323). The Lovasz-Softmax Loss: A Tractable Surrogate for the Optimization of the Intersection-Over-Union Measure in Neural Networks. Proceedings of the 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00464"},{"key":"ref_151","first-page":"549","article-title":"Surrogate Regret Bounds for Generalized Classification Performance Metrics","volume":"106","year":"2016","journal-title":"Mach. Learn."},{"key":"ref_152","first-page":"4884","article-title":"Stochastic Loss Function","volume":"34","author":"Liu","year":"2020","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref_153","doi-asserted-by":"crossref","unstructured":"Li, Z., Ji, J., Ge, Y., and Zhang, Y. (2022, January 11\u201315). AutoLossGen: Automatic Loss Function Generation for Recommender Systems. Proceedings of the SIGIR \u203222: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain.","DOI":"10.1145\/3477495.3531941"},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1007\/s10994-018-5736-y","article-title":"Optimizing non-decomposable measures with deep networks","volume":"107","author":"Sanyal","year":"2018","journal-title":"Mach. Learn."},{"key":"ref_155","unstructured":"Wang, X., Li, L., Yan, B., and Koyejo, O.M. (2019). Consistent Classification with Generalized Metrics. arXiv."},{"key":"ref_156","unstructured":"Jiang, Q., Adigun, O., Narasimhan, H., Fard, M.M., and Gupta, M. (2018, January 10\u201315). Optimizing Black-Box Metrics with Adaptive Surrogates. Proceedings of the International Conference on Machine Learning, Stockholm, Sweden."},{"key":"ref_157","unstructured":"Liu, L., Wang, M., and Deng, J. (2020). Computer Vision\u2013ECCV 2020, Springer International Publishing."},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Huang, C., Zhai, S., Guo, P., and Susskind, J. (2021, January 19\u201325). MetricOpt: Learning to Optimize Black-Box Evaluation Metrics. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00024"},{"key":"ref_159","doi-asserted-by":"crossref","first-page":"5897","DOI":"10.3233\/JIFS-179677","article-title":"Fault tolerance of neural networks in adversarial settings","volume":"38","author":"Duddu","year":"2020","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_160","unstructured":"Zhang, L., Zhou, Y., and Zhang, L. (2021). On the Robustness of Domain Adaption to Adversarial Attacks. arXiv."},{"key":"ref_161","unstructured":"Olpadkar, K., and Gavas, E. (2021). Center Loss Regularization for Continual Learning. arxiv."},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Kharchenko, V., Fesenko, H., and Illiashenko, O. (2022). Quality Models for Artificial Intelligence Systems: Characteristic-Based Approach, Development and Application. Sensors, 22.","DOI":"10.3390\/s22134865"},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1093\/icb\/icab178","article-title":"Trade-offs Among Resilience, Robustness, Stability, and Performance and How We Might Study Them","volume":"61","author":"Inouye","year":"2021","journal-title":"Integr. Comp. Biol."},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"153","DOI":"10.32620\/reks.2022.4.12","article-title":"Method of QoS evaluation of FPGA as a service","volume":"4","author":"Perepelitsyn","year":"2022","journal-title":"Radioelectron. Comput. Syst."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Imanbayev, A., Tynymbayev, S., Odarchenko, R., Gnatyuk, S., Berdibayev, R., Baikenov, A., and Kaniyeva, N. (2022). Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond. Sensors, 22.","DOI":"10.3390\/s22249957"},{"key":"ref_166","doi-asserted-by":"crossref","first-page":"50","DOI":"10.32620\/reks.2022.1.04","article-title":"Heuristic Self-Organization of Knowledge Representation and Development: Analysis in the Context of Explainable Artificial Intelligence","volume":"1","author":"Dotsenko","year":"2022","journal-title":"Radioelectron. Comput. Syst."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/3\/165\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:58:23Z","timestamp":1760122703000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/3\/165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,18]]},"references-count":166,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["a16030165"],"URL":"https:\/\/doi.org\/10.3390\/a16030165","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,18]]}}}