{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:43:25Z","timestamp":1743266605973,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030545482"},{"type":"electronic","value":"9783030545499"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-54549-9_15","type":"book-chapter","created":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T19:03:42Z","timestamp":1597863822000},"page":"228-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Model-Centered Assurance for Autonomous Systems"],"prefix":"10.1007","author":[{"given":"Susmit","family":"Jha","sequence":"first","affiliation":[]},{"given":"John","family":"Rushby","sequence":"additional","affiliation":[]},{"given":"Natarajan","family":"Shankar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,31]]},"reference":[{"key":"15_CR1","unstructured":"Thorn, E., Kimmel, S., Chaka, M.: A framework for automated driving system testable cases and scenarios. DOT HS 812 623, NHTSA, Washington DC (2018)"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.tra.2016.09.010","volume":"94","author":"N Kalra","year":"2016","unstructured":"Kalra, N., Paddock, S.M.: Driving to safety: How many miles of driving would it take to demonstrate autonomous vehicle reliability? Transp. Res. Part A Policy Pract. 94, 182\u2013193 (2016)","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"15_CR3","unstructured":"ASTM: Standard Practice for Methods to Safely Bound Flight Behavior of Unmanned Aircraft Systems Containing Complex Functions (2017). ASTM F3269\u201317"},{"key":"15_CR4","unstructured":"Shalev-Shwartz, S., Shammah, S., Shashua, A.: On a formal model of safe and scalable self-driving cars. arXiv preprint arXiv:1708.06374 (2017)"},{"key":"15_CR5","unstructured":"NHTSA: Automated driving systems 2.0: A vision for safety. DOT HS 812 442, Washington DC (2018)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1145\/3296957.3173191","volume":"53","author":"SC Lin","year":"2018","unstructured":"Lin, S.C., et al.: The architectural implications of autonomous driving: constraints and acceleration. ACM SIGPLAN Notices 53, 751\u2013766 (2018)","journal-title":"ACM SIGPLAN Notices"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/3-540-55426-2_49","volume-title":"Computer Vision \u2014 ECCV\u201992","author":"D Koller","year":"1992","unstructured":"Koller, D., Daniilidis, K., Th\u00f3rhallson, T., Nagel, H.-H.: Model-based object tracking in traffic scenes. In: Sandini, G. (ed.) ECCV 1992. LNCS, vol. 588, pp. 437\u2013452. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-55426-2_49"},{"key":"15_CR8","volume-title":"The Book of Why: The New Science of Cause and Effect","author":"J Pearl","year":"2018","unstructured":"Pearl, J., Mackenzie, D.: The Book of Why: The New Science of Cause and Effect. Basic Books, New York (2018)"},{"key":"15_CR9","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv:1312.6199 (2013)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1765\u20131773 (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"15_CR11","unstructured":"Brown, T.B., et al.: Adversarial patch. arXiv preprint arXiv:1712.09665 (2017)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Adversarial examples are not easily detected: bypassing ten detection methods. In: Proceedings of the 10th ACM W\u2019shop on AI & Security, pp. 3\u201314 (2017)","DOI":"10.1145\/3128572.3140444"},{"key":"15_CR13","unstructured":"Shamir, A., Safran, I., Ronen, E., Dunkelman, O.: A simple explanation for the existence of adversarial examples with small Hamming distance. arXiv preprint arXiv:1901.10861 (2019)"},{"key":"15_CR14","unstructured":"Kilbertus, N., Parascandolo, G., Sch\u00f6lkopf, B.: Generalization in anti-causal learning. arXiv preprint arXiv:1812.00524 (2018)"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","volume":"99","author":"MAF Pimentel","year":"2014","unstructured":"Pimentel, M.A.F., Clifton, D.A., Clifton, L., Tarassenko, L.: A review of novelty detection. Sig. Process. 99, 215\u2013249 (2014)","journal-title":"Sig. Process."},{"key":"15_CR16","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational Bayes. arXiv preprint arXiv:1312.6114 (2013)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Jha, S., Jang, U., Jha, S., Jalaian, B.: Detecting adversarial examples using data manifolds. In: MILCOM 2018, pp. 547\u2013552. IEEE (2018)","DOI":"10.1109\/MILCOM.2018.8599691"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"2800","DOI":"10.1080\/02664763.2018.1441383","volume":"45","author":"C Ju","year":"2018","unstructured":"Ju, C., Bibaut, A., van der Laan, M.: The relative performance of ensemble methods with deep convolutional neural networks for image classification. J. Appl. Stat. 45, 2800\u20132818 (2018)","journal-title":"J. Appl. Stat."},{"key":"15_CR19","unstructured":"National Transportation Safety Board: Vehicle Automation Report; Tempe, AZ (2019). HWY18MH010"},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/361237.361242","volume":"15","author":"RO Duda","year":"1972","unstructured":"Duda, R.O., Hart, P.E.: Use of the Hough transformation to detect lines and curves in pictures. Commun. ACM 15, 11\u201315 (1972)","journal-title":"Commun. ACM"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.bandc.2015.11.003","volume":"112","author":"MW Spratling","year":"2017","unstructured":"Spratling, M.W.: A review of predictive coding algorithms. Brain Cogn. 112, 92\u201397 (2017)","journal-title":"Brain Cogn."},{"key":"15_CR22","volume-title":"Handbuch der Physiologischen Optik III","author":"H von Helmholtz","year":"1867","unstructured":"von Helmholtz, H.: Handbuch der Physiologischen Optik III, vol. 9. Verlag von Leopold Voss, Leipzig, Germany (1867)"},{"key":"15_CR23","unstructured":"Wiese, W., Metzinger, T.K.: Vanilla PP for philosophers: a primer on Predictive Processing. MIND Group, Frankfurt am Main (2017). Many papers: https:\/\/predictive-mind.net\/papers"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1017\/S0140525X12000477","volume":"36","author":"A Clark","year":"2013","unstructured":"Clark, A.: Whatever next? Predictive brains, situated agents, and the future of cognitive science. Behav. Brain Sci. 36, 181\u2013204 (2013)","journal-title":"Behav. Brain Sci."},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Hohwy, J.: The Predictive Mind. Oxford University Press, Oxford (2013)","DOI":"10.1093\/acprof:oso\/9780199682737.001.0001"},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1038\/nrn2787","volume":"11","author":"K Friston","year":"2010","unstructured":"Friston, K.: The free-energy principle: A unified brain theory? Nat. Rev. Neurosci. 11, 127 (2010)","journal-title":"Nat. Rev. Neurosci."},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1111\/j.1747-9991.2010.00330.x","volume":"5","author":"K Frankish","year":"2010","unstructured":"Frankish, K.: Dual-process and dual-system theories of reasoning. Philos. Compass 5, 914\u2013926 (2010)","journal-title":"Philos. Compass"},{"key":"15_CR28","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1177\/1745691612460685","volume":"8","author":"JSBT Evans","year":"2013","unstructured":"Evans, J.S.B.T., Stanovich, K.E.: Dual-process theories of higher cognition: Advancing the debate. Perspect. Psychol. Sci. 8, 223\u2013241 (2013)","journal-title":"Perspect. Psychol. Sci."},{"key":"15_CR29","volume-title":"Thinking","author":"D Kahneman","year":"2011","unstructured":"Kahneman, D.: Thinking. Fast and Slow. Farrar, Straus and Giroux (2011)"},{"key":"15_CR30","unstructured":"Bloomfield, R., Rushby, J.: Assurance 2.0: A Manifesto. arXiv:2004.10474 (2020)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-54549-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T23:29:14Z","timestamp":1619220554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-54549-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030545482","9783030545499"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-54549-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/safecomp2020.di.fc.ul.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"116","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}