Machine learning in safety critical industry domains
暂无分享,去创建一个
Nikolaos Papakonstantinou | Jani Suomalainen | Joonas Linnosmaa | Petri Tikka | Jani Suomalainen | N. Papakonstantinou | Joonas Linnosmaa | P. Tikka
[1] Matías Toril,et al. Automatic alarm prioritization by data mining for fault management in cellular networks , 2020, Expert Syst. Appl..
[2] Douglas Alves Goulart,et al. Autonomous pH control by reinforcement learning for electroplating industry wastewater , 2020, Comput. Chem. Eng..
[3] L. Lagos,et al. Predictive maintenance architecture development for nuclear infrastructure using machine learning , 2020, Nuclear Engineering and Technology.
[4] Yong-kuo Liu,et al. A new perspective towards the development of robust data-driven intrusion detection for industrial control systems , 2020, Nuclear Engineering and Technology.
[5] Xiaopeng TIAN,et al. A Distributed Vulnerability Scanning on Machine Learning , 2019, 2019 6th International Conference on Information Science and Control Engineering (ICISCE).
[6] Andreas Vogelsang,et al. Requirements Engineering for Machine Learning: Perspectives from Data Scientists , 2019, 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW).
[7] Fuyuki Ishikawa,et al. How Do Engineers Perceive Difficulties in Engineering of Machine-Learning Systems? - Questionnaire Survey , 2019, 2019 IEEE/ACM Joint 7th International Workshop on Conducting Empirical Studies in Industry (CESI) and 6th International Workshop on Software Engineering Research and Industrial Practice (SER&IP).
[8] Úlfar Erlingsson,et al. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks , 2018, USENIX Security Symposium.
[9] Frank Rudzicz,et al. Towards international standards for evaluating machine learning , 2019, SafeAI@AAAI.
[10] Yang Gao,et al. Active learning with confidence-based answers for crowdsourcing labeling tasks , 2018, Knowl. Based Syst..
[11] Isabel Praça,et al. CyberFactory#1 — Securing the industry 4.0 with cyber-ranges and digital twins , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).
[12] Markus Borg,et al. Automotive Safety and Machine Learning: Initial Results from a Study on How to Adapt the ISO 26262 Safety Standard , 2018, 2018 IEEE/ACM 1st International Workshop on Software Engineering for AI in Autonomous Systems (SEFAIAS).
[13] Jemal H. Abawajy,et al. Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.
[14] Wei Cai,et al. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.
[15] J. Flaus,et al. Review of machine learning based intrusion detection approaches for industrial control systems , 2018 .
[16] Qiao Wu,et al. Nuclear energy system’s behavior and decision making using machine learning , 2017 .
[17] Rick Salay,et al. An Analysis of ISO 26262: Using Machine Learning Safely in Automotive Software , 2017, ArXiv.
[18] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[19] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[20] M. Kubát. An Introduction to Machine Learning , 2017, Springer International Publishing.
[21] Michael P. Wellman,et al. Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.
[22] Max Mühlhäuser,et al. Did you really hack a nuclear power plant? An industrial control mobile honeypot , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[23] Valentin Moreno,et al. A methodology for the classification of quality of requirements using machine learning techniques , 2015, Inf. Softw. Technol..
[24] Thank You,et al. Spurious Correlations , 2015, Science.
[25] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[26] Wenbin Li,et al. Weka meets TraceLab: Toward convenient classification: Machine learning for requirements engineering problems: A position paper , 2014, 2014 IEEE 1st International Workshop on Artificial Intelligence for Requirements Engineering (AIRE).
[27] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[28] Jane Huffman Hayes,et al. Application of reinforcement learning to requirements engineering: requirements tracing , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).
[29] Belle R. Upadhyaya,et al. Optimal sensor placement strategy for anomaly detection and isolation , 2011 .
[30] Felix FX Lindner,et al. Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning , 2011, WOOT.
[31] M. Cribier,et al. Nucifer: A small electron-antineutrino detector for fundamental and safeguard studies , 2011, 2011 2nd International Conference on Advancements in Nuclear Instrumentation, Measurement Methods and their Applications.
[32] J.R. McDonald,et al. The Use of Hidden Markov Models for Anomaly Detection in Nuclear Core Condition Monitoring , 2009, IEEE Transactions on Nuclear Science.
[33] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[34] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[35] Catherine M. Burns,et al. There Is More to Monitoring a Nuclear Power Plant than Meets the Eye , 2000, Hum. Factors.