Learning Verifiable Ensembles for Classification Problems with High Safety Requirements

Machine learning methods are successfully applied in a wide range of applications – for instance – object recognition in computer vision, search engines, or stock market analysis. But in the field of safetyrelated applications such methods are regarded with suspicion by the domain experts because the learned models are often hard to verify, may tend to overfitting, and the exact interand extrapolation behavior is often unclear. In this chapter, a machine learning method is proposed that (1) is capable of ABSTRACT

[1]  Teuvo Kohonen,et al.  The self-organizing map , 1990 .

[2]  Yixin Chen,et al.  Support vector learning for fuzzy rule-based classification systems , 2003, IEEE Trans. Fuzzy Syst..

[3]  Jim Austin,et al.  Developing artificial neural networks for safety critical systems , 2006, Neural Computing and Applications.

[4]  David A. Cohn,et al.  Improving generalization with active learning , 1994, Machine Learning.

[5]  David H. Wolpert,et al.  Stacked generalization , 1992, Neural Networks.

[6]  Tim Kelly,et al.  Using fuzzy self-organising maps for safety critical systems , 2007, Reliab. Eng. Syst. Saf..

[7]  João Gama,et al.  Cascade Generalization , 2000, Machine Learning.

[8]  Ephrem Eyob Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions , 2008 .

[9]  Ron Kohavi,et al.  Wrappers for Feature Subset Selection , 1997, Artif. Intell..

[10]  Nancy G. Leveson,et al.  An investigation of the Therac-25 accidents , 1993, Computer.

[11]  Chih-Jen Lin,et al.  A comparison of methods for multiclass support vector machines , 2002, IEEE Trans. Neural Networks.

[12]  Jaime S. Cardoso,et al.  Modelling ordinal relations with SVMs: An application to objective aesthetic evaluation of breast cancer conservative treatment , 2005, Neural Networks.

[13]  Joachim Diederich,et al.  Survey and critique of techniques for extracting rules from trained artificial neural networks , 1995, Knowl. Based Syst..

[14]  Huirong Fu,et al.  Preserving Privacy in Time Series Data Mining , 2011, Int. J. Data Warehous. Min..

[15]  John W. Tukey,et al.  A Projection Pursuit Algorithm for Exploratory Data Analysis , 1974, IEEE Transactions on Computers.

[16]  Detlef D. Nauck Fuzzy data analysis with NEFCLASS , 2003, Int. J. Approx. Reason..

[17]  JOHANNES FÜRNKRANZ,et al.  Separate-and-Conquer Rule Learning , 1999, Artificial Intelligence Review.