{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T17:07:30Z","timestamp":1717002450037},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF","award":["IIS1910794"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tetci.2021.3084290","type":"journal-article","created":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T19:55:27Z","timestamp":1623786927000},"page":"450-461","source":"Crossref","is-referenced-by-count":6,"title":["TDM: Trustworthy Decision-Making Via Interpretability Enhancement"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2625-9865","authenticated-orcid":false,"given":"Daoming","family":"Lyu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Software Engineering, Auburn University, Auburn, AL, USA"}]},{"given":"Fangkai","family":"Yang","sequence":"additional","affiliation":[{"name":"NVIDIA Corporation, Bellevue, WA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8331-5037","authenticated-orcid":false,"given":"Hugh","family":"Kwon","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Auburn University, Auburn, AL, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8923-2227","authenticated-orcid":false,"given":"Wen","family":"Dong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5082-3908","authenticated-orcid":false,"given":"Levent","family":"Yilmaz","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Auburn University, Auburn, AL, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2519-6196","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Auburn University, Auburn, AL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2018.2829985"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58266-5_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1040830.1040870"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2928344"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/0018720814547570"},{"key":"ref8","article-title":"Black box data from doomed ethiopian airlines jet show clear similarities between both boeing 737 max crashes","volume-title":"CNBC","author":"Josephs","year":"2019"},{"key":"ref9","article-title":"Fatal flights: What we know about boeing max 8 crashes in ethiopia and indonesia","volume-title":"USA Today","author":"Ortiz","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/860575.860590"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3359616"},{"key":"ref13","article-title":"Increasing trust in ai services through suppliers declarations of conformity","author":"Hind","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/202"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2015.08.008"},{"key":"ref17","first-page":"812","article-title":"Planning with task-oriented knowledge acquisition for a service robot","volume-title":"Proc. IJCAI","author":"Chen","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0278364916688949"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2016.2645720"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33012970"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2016.07.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/675"},{"key":"ref23","article-title":"Formalising trust as a computational concept","author":"Marsh","year":"1994"},{"key":"ref24","first-page":"1073","article-title":"A block coordinate ascent algorithm for mean-variance optimization","author":"Liu","year":"2018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2013.6483596"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"ref27","article-title":"Towards a rigorous science of interpretable machine learning","author":"Doshi-Velez","year":"2017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2018.00018"},{"key":"ref29","first-page":"28","article-title":"An MDP approach for explanation generation","volume-title":"Proc. ExaCt","author":"Elizalde","year":"2007"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/icaps.v19i1.13365"},{"key":"ref31","first-page":"5045","article-title":"Programmatically interpretable reinforcement learning","volume-title":"ICML","author":"Verma","year":"2018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2006.11.002"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-6825-4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023648"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577971"},{"key":"ref36","article-title":"Trust evaluation based security solution in ad hoc networks","volume-title":"Proc. 7th Nordic Workshop Secure IT Syst.","volume":"14","author":"Yan","year":"2003"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/00140139208967392"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28872-7_7"},{"key":"ref40","first-page":"221","article-title":"Optimo: Online probabilistic trust inference model for asymmetric human-robot collaborations","volume-title":"Proc. 10th Annu. ACM\/IEEE Int. Conf. Human-Robot Interaction","author":"Xu","year":"2015"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.49.1.95"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1177\/002224299305700106"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3389\/neuro.12.006.2007"},{"key":"ref44","first-page":"1281","article-title":"Intrinsically motivated reinforcement learning","volume-title":"Proc. NIPS","author":"Chentanez","year":"2005"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2016.7451741"},{"key":"ref46","first-page":"408","article-title":"Evaluating effects of user experience and system transparency on trust in automation","volume-title":"Proc. 2017 ACM\/IEEE Int. Conf. Human-Robot Interaction","author":"Yang","year":"2017"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2018.2829980"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"ref49","first-page":"18872","article-title":"R-learning in actor-critic model offers a biologically relevant mechanism for sequential decision-making","volume":"33","author":"Shuvaev","year":"2020","journal-title":"in Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/SERIES1345"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/BF00114727"},{"issue":"94-30-1","key":"ref52","article-title":"H-learning: A reinforcement learning method to optimize undiscounted average reward","author":"Tadepalli","year":"1994"},{"key":"ref53","first-page":"1540","article-title":"Basis construction from power series expansions of value functions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"23","author":"Mahadevan","year":"2010"},{"key":"ref54","volume-title":"PDDL-The Planning Domain Definition Language","author":"McDermott","year":"1998"},{"key":"ref55","first-page":"195","article-title":"Action languages","volume":"3","author":"Gelfond","year":"1998"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24658-7"},{"key":"ref57","first-page":"983","article-title":"Action language $\\mathcal {BC}$: A preliminary report","volume-title":"Proc. IJCAI","author":"Lee","year":"2013"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.04.001"},{"key":"ref59","first-page":"377","article-title":"Actions as special cases","volume-title":"Proc. KR","author":"Erdoan","year":"2006"},{"key":"ref60","article-title":"A library of general-purpose action descriptions","author":"Erdoan","year":"2008"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068415000095"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/BF00114727"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022140919877"},{"key":"ref64","first-page":"3675","article-title":"Hierarchical deep reinforcement learning: Integrating temporal abstraction and intrinsic motivation","volume-title":"Proc. NIPS","author":"Kulkarni","year":"2016"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref66","article-title":"Prioritized experience replay","volume-title":"ICLR","author":"Schaul","year":"2016"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1613\/jair.3912"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.26804\/ager.2018.02.04"},{"key":"ref69","article-title":"The promise and peril of human evaluation for model interpretability","author":"Herman","year":"2017"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/7433297\/9778849\/9455355-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/9778849\/09455355.pdf?arnumber=9455355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:00:54Z","timestamp":1705014054000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9455355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":69,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2021.3084290","relation":{},"ISSN":["2471-285X"],"issn-type":[{"value":"2471-285X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}