{"id":"https://openalex.org/W3162609778","doi":"https://doi.org/10.1109/aipr50011.2020.9425292","title":"Autonomous Navigation Assurance with Explainable AI and Security Monitoring","display_name":"Autonomous Navigation Assurance with Explainable AI and Security Monitoring","publication_year":2020,"publication_date":"2020-10-13","ids":{"openalex":"https://openalex.org/W3162609778","doi":"https://doi.org/10.1109/aipr50011.2020.9425292","mag":"3162609778"},"language":"en","primary_location":{"id":"doi:10.1109/aipr50011.2020.9425292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aipr50011.2020.9425292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014090606","display_name":"Denzel Hamilton","orcid":null},"institutions":[{"id":"https://openalex.org/I83909951","display_name":"Morgan State University","ror":"https://ror.org/017d8gk22","country_code":"US","type":"education","lineage":["https://openalex.org/I83909951"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Denzel Hamilton","raw_affiliation_strings":["Morgan State University, Baltimore, MD"],"affiliations":[{"raw_affiliation_string":"Morgan State University, Baltimore, MD","institution_ids":["https://openalex.org/I83909951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063608429","display_name":"Kevin Kornegay","orcid":"https://orcid.org/0000-0002-5233-0154"},"institutions":[{"id":"https://openalex.org/I83909951","display_name":"Morgan State University","ror":"https://ror.org/017d8gk22","country_code":"US","type":"education","lineage":["https://openalex.org/I83909951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Kornegay","raw_affiliation_strings":["Morgan State University, Baltimore, MD"],"affiliations":[{"raw_affiliation_string":"Morgan State University, Baltimore, MD","institution_ids":["https://openalex.org/I83909951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035321347","display_name":"Lanier Watkins","orcid":"https://orcid.org/0000-0002-3322-1833"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lanier Watkins","raw_affiliation_strings":["Johns Hopkins University, Baltimore, MD"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University, Baltimore, MD","institution_ids":["https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014090606"],"corresponding_institution_ids":["https://openalex.org/I83909951"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.65989191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autonomy","display_name":"Autonomy","score":0.7382292151451111},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6752091646194458},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6451511383056641},{"id":"https://openalex.org/keywords/autonomous-system","display_name":"Autonomous system (mathematics)","score":0.4654316306114197},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4568120241165161},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4044601321220398},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09434455633163452}],"concepts":[{"id":"https://openalex.org/C65414064","wikidata":"https://www.wikidata.org/wiki/Q484105","display_name":"Autonomy","level":2,"score":0.7382292151451111},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6752091646194458},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6451511383056641},{"id":"https://openalex.org/C9628104","wikidata":"https://www.wikidata.org/wiki/Q788009","display_name":"Autonomous system (mathematics)","level":2,"score":0.4654316306114197},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4568120241165161},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4044601321220398},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09434455633163452},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aipr50011.2020.9425292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aipr50011.2020.9425292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1976331960","https://openalex.org/W2170898289","https://openalex.org/W2899430165","https://openalex.org/W2900151775","https://openalex.org/W2910021210","https://openalex.org/W2929352350","https://openalex.org/W2932437802","https://openalex.org/W2969749685","https://openalex.org/W2970501769","https://openalex.org/W2979752479","https://openalex.org/W2980210295"],"related_works":["https://openalex.org/W2505675537","https://openalex.org/W3120435769","https://openalex.org/W4399042091","https://openalex.org/W3209220495","https://openalex.org/W2913706598","https://openalex.org/W1967684283","https://openalex.org/W2919172900","https://openalex.org/W2087011440","https://openalex.org/W2122867552","https://openalex.org/W1568872483"],"abstract_inverted_index":{"With":[0],"the":[1,14,28,44,52,60,63,83,95,106,110,119,131,141,148,154,161,164,168,184,196,212],"rise":[2],"of":[3,13,46,55,62,86,94,109,130,137,156,163,190],"disruptive":[4],"artificial":[5],"intelligence":[6],"(AI)":[7],"technology,":[8],"assuring":[9],"autonomous":[10,21,33,88,149],"systems":[11],"is":[12,31,134,144],"utmost":[15],"importance.":[16],"The":[17,128],"drive":[18],"to":[19,23,50,81,116,170,178,181,198,202,222],"spread":[20],"vehicles":[22],"all":[24],"whether":[25],"military":[26],"or":[27,207],"commercial":[29],"space":[30],"makes":[32],"navigation":[34,120,150,224],"a":[35,56,71,171,188],"must":[36],"for":[37,146],"assurance.":[38],"In":[39],"this":[40,138],"paper,":[41],"we":[42,103,159],"introduce":[43],"concept":[45],"using":[47,74],"explainable":[48],"AI":[49,75,111],"assure":[51,82],"operational":[53],"autonomy":[54,85,121,214],"vehicle":[57],"while":[58],"monitoring":[59],"security":[61,92,132,142,191],"system.":[64],"We":[65],"demonstrate":[66,160,199],"our":[67,126],"paradigm":[68],"by":[69,125,166,183,211],"developing":[70],"system":[72,98],"monitor":[73,91,133,143,165],"(i.e.,":[76],"Random":[77],"Forest":[78],"Tree":[79],"algorithm)":[80],"native":[84,185,213],"an":[87],"Turtlebot3":[89,96,169],"and":[90,99,113,122,187,204,215],"status":[93],"computer":[97],"sensor":[100],"data.":[101],"Then":[102],"dig":[104],"into":[105],"decision":[107],"trees":[108],"algorithm":[112],"extract":[114],"information":[115],"help":[117],"explain":[118,205],"decisions":[123,152,209],"made":[124,210],"monitor.":[127],"explainability":[129],"not":[135],"part":[136],"experiment":[139],"but":[140],"useful":[145],"helping":[147],"make":[151],"in":[153,220],"instance":[155],"attack.":[157],"Further,":[158],"efficacy":[162],"subjecting":[167],"\"Sharp":[172],"Turn":[173],"Maze\",":[174],"which":[175],"was":[176],"designed":[177],"be":[179],"hard":[180],"solve":[182],"autonomy,":[186],"barrage":[189],"attacks.":[192],"These":[193],"experiments":[194],"allow":[195],"AI-Monitor":[197],"its":[200],"ability":[201],"identify":[203,216],"unproductive":[206],"wrong":[208],"cyber-security":[217],"related":[218],"faults":[219],"order":[221],"trigger":[223],"contingencies.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
