Machine learning in safety critical industry domains

[1]  Matías Toril,et al.  Automatic alarm prioritization by data mining for fault management in cellular networks , 2020, Expert Syst. Appl..

[2]  Douglas Alves Goulart,et al.  Autonomous pH control by reinforcement learning for electroplating industry wastewater , 2020, Comput. Chem. Eng..

[3]  L. Lagos,et al.  Predictive maintenance architecture development for nuclear infrastructure using machine learning , 2020, Nuclear Engineering and Technology.

[4]  Yong-kuo Liu,et al.  A new perspective towards the development of robust data-driven intrusion detection for industrial control systems , 2020, Nuclear Engineering and Technology.

[5]  Xiaopeng TIAN,et al.  A Distributed Vulnerability Scanning on Machine Learning , 2019, 2019 6th International Conference on Information Science and Control Engineering (ICISCE).

[6]  Andreas Vogelsang,et al.  Requirements Engineering for Machine Learning: Perspectives from Data Scientists , 2019, 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW).

[7]  Fuyuki Ishikawa,et al.  How Do Engineers Perceive Difficulties in Engineering of Machine-Learning Systems? - Questionnaire Survey , 2019, 2019 IEEE/ACM Joint 7th International Workshop on Conducting Empirical Studies in Industry (CESI) and 6th International Workshop on Software Engineering Research and Industrial Practice (SER&IP).

[8]  Úlfar Erlingsson,et al.  The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks , 2018, USENIX Security Symposium.

[9]  Frank Rudzicz,et al.  Towards international standards for evaluating machine learning , 2019, SafeAI@AAAI.

[10]  Yang Gao,et al.  Active learning with confidence-based answers for crowdsourcing labeling tasks , 2018, Knowl. Based Syst..

[11]  Isabel Praça,et al.  CyberFactory#1 — Securing the industry 4.0 with cyber-ranges and digital twins , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).

[12]  Markus Borg,et al.  Automotive Safety and Machine Learning: Initial Results from a Study on How to Adapt the ISO 26262 Safety Standard , 2018, 2018 IEEE/ACM 1st International Workshop on Software Engineering for AI in Autonomous Systems (SEFAIAS).

[13]  Jemal H. Abawajy,et al.  Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.

[14]  Wei Cai,et al.  A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.

[15]  J. Flaus,et al.  Review of machine learning based intrusion detection approaches for industrial control systems , 2018 .

[16]  Qiao Wu,et al.  Nuclear energy system’s behavior and decision making using machine learning , 2017 .

[17]  Rick Salay,et al.  An Analysis of ISO 26262: Using Machine Learning Safely in Automotive Software , 2017, ArXiv.

[18]  Brendan Dolan-Gavitt,et al.  BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.

[19]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[20]  M. Kubát An Introduction to Machine Learning , 2017, Springer International Publishing.

[21]  Michael P. Wellman,et al.  Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.

[22]  Max Mühlhäuser,et al.  Did you really hack a nuclear power plant? An industrial control mobile honeypot , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[23]  Valentin Moreno,et al.  A methodology for the classification of quality of requirements using machine learning techniques , 2015, Inf. Softw. Technol..

[24]  Thank You,et al.  Spurious Correlations , 2015, Science.

[25]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[26]  Wenbin Li,et al.  Weka meets TraceLab: Toward convenient classification: Machine learning for requirements engineering problems: A position paper , 2014, 2014 IEEE 1st International Workshop on Artificial Intelligence for Requirements Engineering (AIRE).

[27]  Fabio Roli,et al.  Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.

[28]  Jane Huffman Hayes,et al.  Application of reinforcement learning to requirements engineering: requirements tracing , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).

[29]  Belle R. Upadhyaya,et al.  Optimal sensor placement strategy for anomaly detection and isolation , 2011 .

[30]  Felix FX Lindner,et al.  Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning , 2011, WOOT.

[31]  M. Cribier,et al.  Nucifer: A small electron-antineutrino detector for fundamental and safeguard studies , 2011, 2011 2nd International Conference on Advancements in Nuclear Instrumentation, Measurement Methods and their Applications.

[32]  J.R. McDonald,et al.  The Use of Hidden Markov Models for Anomaly Detection in Nuclear Core Condition Monitoring , 2009, IEEE Transactions on Nuclear Science.

[33]  Blaine Nelson,et al.  Can machine learning be secure? , 2006, ASIACCS '06.

[34]  John McHugh,et al.  Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.

[35]  Catherine M. Burns,et al.  There Is More to Monitoring a Nuclear Power Plant than Meets the Eye , 2000, Hum. Factors.