<?xml version="1.0"?>
<!DOCTYPE article SYSTEM "C:\nlm\converter\journal-publishing-dtd-2.0\journalpublishing.dtd">
<article>
<front>
<journal-meta>
<journal-id journal-id-type="publisher">IJDSBDA</journal-id>
<journal-title>International Journal of Data Science and Big Data Analytics</journal-title>
<issn pub-type="epub">2710-2599</issn>
<publisher>
<publisher-name>SvedbergOpen</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="other">ijdsbda-1-1-001</article-id>
<doi-group>
<article-doi><ext-link ext-link-type="uri" xmlns:xlink="https://doi.org/" xlink:href="/10.51483/IJDSBDA.1.1.2021.1-19">/10.51483/IJDSBDA.1.1.2021.1-19</ext-link></article-doi>
</doi-group>
<article-categories>
<subj-group>
<subject>Review Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Algorithms in future insurance markets</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>&#x015A;mietanka</surname><given-names>Ma&#x0142;gorzata</given-names></name>
<xref ref-type="aff" rid="aff001"><sup>1</sup></xref>
<xref ref-type="corresp" rid="cor001"><sup>*</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Koshiyama</surname><given-names>Adriano</given-names></name>
<xref ref-type="aff" rid="aff002"><sup>2</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Treleaven</surname><given-names>Philip</given-names></name>
<xref ref-type="aff" rid="aff003"><sup>3</sup></xref>
</contrib>
</contrib-group>
<aff id="aff001"><sup>1</sup><instname>University College London</instname>, <instaddress>Gower St, Bloomsbury, London WC1E 6BT</instaddress>, <instcountry>United Kingdom</instcountry>. E-mail: <email>malgorzata.wasiewicz.17@ucl.ac.uk</email></aff>
<aff id="aff002"><sup>2</sup><instname>University College London</instname>, <instaddress>Gower St, Bloomsbury, London WC1E 6BT</instaddress>, <instcountry>United Kingdom</instcountry>. E-mail: <email>adriano.koshiyama.15@ucl.ac.uk</email></aff>
<aff id="aff003"><sup>3</sup><instname>University College London</instname>, <instaddress>Gower St, Bloomsbury, London WC1E 6BT</instaddress>, <instcountry>United Kingdom</instcountry>. E-mail: <email>p.treleaven@ucl.ac.uk</email></aff>
<author-notes>
<corresp id="cor001"><sup>*</sup>Corresponding author: Ma&#x0142;gorzata &#x015A;mietanka, <instname>University College London</instname>, <instaddress>Gower St, Bloomsbury, London WC&#x0134;E 6BT</instaddress>, <instcountry>United Kingdom</instcountry>. E-mail: <email>malgorzata.wasiewicz.17@ucl.ac.uk</email></corresp>
</author-notes>
<pub-date pub-type="ppub">
<month>02</month>
<year>2021</year>
</pub-date>
<volume>1</volume>
<issue>1</issue>
<fpage>1</fpage>
<lpage>19</lpage>
<abstract>
<title>Abstract</title>
<p>This paper reviews the impact of data science and artificial intelligence (AI) on future &#x2018;data- driven&#x2019; insurance markets. The impact of insurance automation (driven by so-called Black Swan<sup>1</sup> events such as Covid-19) mirrors the impact of algorithmic trading that changed radically the capital markets (Koshiyama <italic>et al</italic>., 2020). The data science technologies driving change include: Big data, AI analytics, Internet of Things, and Blockchain technologies. These technologies are important since they underpin the automation of the insurance markets and risk analysis, and provide the context for the algorithms, such as AI machine learning and computational statistics, which provide powerful analytics capabilities. New AI algorithms are constantly emerging, with each &#x2018;strain&#x2019; mimicking a new form of human learning, reasoning, knowledge, and decision-making. The current main disrupting forms of learning include deep learning, adversarial learning, federated learning, transfer and meta learning. Albeit these modes of learning have been in the AI/ML field more than a decade, they are now more applicable due to the availability of data, computing power and infrastructure. These forms of learning have produced new models (e.g., long short-term memory, generative adversarial networks) and leverage important applications (e.g., Natural Language Processing, Adversarial Examples, Deep Fakes, etc.). These new models and applications will drive changes in future insurance markets, so it is important to understand their computational strengths and weaknesses. The contribution of this paper is to review the data science technologies and specifically AI algorithms, their computational strengths and weaknesses, and discuss their future impact on the insurance markets.</p>
</abstract>
<kwd-group>
<title>Keywords</title>
<kwd>Insurance</kwd>
<kwd>AI</kwd>
<kwd>Machine Learning</kwd>
<kwd>Algorithms review</kwd>
</kwd-group>
<counts>
<ref-count count="88"/>
<page-count count="19"/>
</counts>
</article-meta>
</front>
<back>
<ref-list>
<title>References</title>
<ref id="bib001"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Adewumi</surname><given-names>A.O.</given-names></name><name><surname>Akinyelu</surname><given-names>A.A.</given-names></name></person-group> (<year>2017</year>). <article-title>A survey of machine-learning and nature-inspired based credit card fraud detection techniques</article-title>. <source>International Journal of System Assurance Engineering and Management</source>. <volume>8</volume>, <fpage>937</fpage>&#x2013;<lpage>953</lpage>.</citation></ref>
<ref id="bib002"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Allan</surname><given-names>N.</given-names></name><name><surname>Cantle</surname><given-names>N.</given-names></name><name><surname>Godfrey</surname><given-names>P.</given-names></name><name><surname>Yin</surname><given-names>Y.</given-names></name></person-group> (<year>2012</year>). <article-title>A review of the use of complex systems applied to risk appetite and emerging risks in ERM practice: Recommendations for practical tools to help risk professionals tackle the problems of risk appetite and emerging risk</article-title>.. <source>British Actuarial Journal</source>, <volume>18</volume>(<issue>1</issue>), <fpage>163</fpage>&#x2013;<lpage>234</lpage>.</citation></ref>
<ref id="bib003"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Arlot</surname><given-names>S.</given-names></name><name><surname>Calisse</surname><given-names>A.</given-names></name></person-group> (<year>2009</year>). <article-title>A survey of cross-validation procedures for model selection</article-title>. <source>arXiv:0907.4728</source>.</citation></ref>
<ref id="bib004"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Arulkumaran</surname><given-names>K.</given-names></name><name><surname>Deisenroth</surname><given-names>M.P.</given-names></name><name><surname>Brundage</surname><given-names>M.</given-names></name><name><surname>Bharath</surname><given-names>A.A.</given-names></name></person-group> (<year>2017</year>). <article-title>Deep reinforcement learning: a brief survey</article-title>. <source>IEEE</source>, <volume>34</volume>(<issue>6</issue>), <fpage>26</fpage>&#x2013;<lpage>38</lpage>.</citation></ref>
<ref id="bib005"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Bach</surname><given-names>S.</given-names></name></person-group> <etal>et al.</etal> (<year>2015</year>). <article-title>On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation</article-title>. <source>PLOS ONE</source>.</citation></ref>
<ref id="bib006"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Batrinca</surname><given-names>B.</given-names></name><name><surname>Treleaven</surname><given-names>P.C.</given-names></name></person-group> (<year>2015</year>). <article-title>Social media analytics: a survey of techniques, tools and platforms</article-title>. <source>AI and Society</source>, <volume>30</volume>, <fpage>89</fpage>&#x2013;<lpage>116</lpage>.</citation></ref>
<ref id="bib007"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>B&#x00E4;umer</surname><given-names>H. P.</given-names></name></person-group> (<year>2000</year>). <article-title>Statistical analysis of extreme values - from insurance, finance, hydrology and other fields</article-title>. <source>Computational Statistics</source>, <volume>5</volume>, <fpage>307</fpage>&#x2013;<lpage>311</lpage>.</citation></ref>
<ref id="bib008"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Brock</surname><given-names>A.</given-names></name><name><surname>Donahue</surname><given-names>J.</given-names></name><name><surname>Simonyan</surname><given-names>K.</given-names></name></person-group> (<year>2018</year>). <article-title>Large scale gan training for high fidelity natural image synthesis</article-title>. <source>arXiv:1809.11096</source>.</citation></ref>
<ref id="bib009"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Brownlee</surname><given-names>J.</given-names></name></person-group> (<year>2011</year>). <source>Clever Algorithms: Nature-Inspired Programming Recipes</source>. s.l.:<publisher-name>Lulu.com</publisher-name></citation></ref>
<ref id="bib010"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cambria</surname><given-names>E.</given-names></name><name><surname>Schuller</surname><given-names>B.</given-names></name><name><surname>Liu</surname><given-names>B.</given-names></name></person-group> (<year>2013</year>). <article-title>Statistical approaches to concept-level sentiment analysis</article-title>. <source>Intelligent Systems, IEEE</source>, <volume>28</volume>(<issue>3</issue>), <fpage>6</fpage>&#x2013;<lpage>9</lpage>.</citation></ref>
<ref id="bib011"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Carlini</surname><given-names>N.</given-names></name><name><surname>Athalye</surname><given-names>A.</given-names></name><name><surname>Papernot</surname><given-names>N.</given-names></name><name><surname>Brendel</surname><given-names>W.</given-names></name><name><surname>Rauber</surname><given-names>J.</given-names></name><name><surname>Tsipras</surname><given-names>D.</given-names></name><name><surname>Goodfellow</surname><given-names>I.</given-names></name><name><surname>Madry</surname><given-names>A.</given-names></name><name><surname>Kurakin</surname><given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>On evaluating adversarial robustness</article-title>. <source>arXiv:1902.06705</source></citation></ref>
<ref id="bib012"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Caron</surname><given-names>M.</given-names></name><name><surname>Bojanowski</surname><given-names>P.</given-names></name><name><surname>Joulin</surname><given-names>A.</given-names></name><name><surname>Douze</surname><given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Deep clustering for unsupervised learning of visual features</article-title>.. <source>The European Conference on Computer Vision (ECCV)</source>, pp. <fpage>132</fpage>&#x2013;<lpage>149</lpage>.</citation></ref>
<ref id="bib013"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>S.</given-names></name><name><surname>Ma</surname><given-names>K.</given-names></name><name><surname>Zheng</surname><given-names>Y.</given-names></name></person-group> (<year>2019</year>). <article-title>Transfer learning for 3d medical image analysis</article-title>. <source>arXiv preprint arXiv:1904.00625</source></citation></ref>
<ref id="bib014"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>X.</given-names></name><name><surname>Duan</surname><given-names>Y.</given-names></name><name><surname>Houthooft</surname><given-names>R.</given-names></name><name><surname>Schulman</surname><given-names>J.</given-names></name><name><surname>Sutskever</surname><given-names>I.</given-names></name><name><surname>Abbeel</surname><given-names>P.</given-names></name></person-group> (<year>2016</year>). <article-title>InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets</article-title>.. <source>arXiv:1606.03657</source>.</citation></ref>
<ref id="bib015"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Chollet</surname><given-names>F.</given-names></name></person-group> (<year>2017</year>). <source>Deep Learning with Python</source>. s.l.:<publisher-name>Manning</publisher-name>.</citation></ref>
<ref id="bib016"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Creswell</surname><given-names>A.</given-names></name><name><surname>White</surname><given-names>T.</given-names></name><name><surname>Dumoulin</surname><given-names>V.</given-names></name><name><surname>Arulkumaran</surname><given-names>K.</given-names></name><name><surname>Biswa Sengupta</surname><given-names>B.</given-names></name><name><surname>Bharath</surname><given-names>A.A.</given-names></name></person-group> (<year>2018</year>). <article-title>Generative adversarial networks: An overview</article-title>. <source>IEEE Signal Processing Magazine</source>, <volume>35</volume>(<issue>1</issue>), <fpage>53</fpage>&#x2013;<lpage>65</lpage>.</citation></ref>
<ref id="bib017"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Dai</surname><given-names>W.</given-names></name><name><surname>Xue</surname><given-names>G. R.</given-names></name><name><surname>Yang</surname><given-names>Q.</given-names></name><name><surname>Yu</surname><given-names>Y.</given-names></name></person-group> (<year>2007</year>). <article-title>Co-clustering based classification for out-of-domain documents. KDD &#x2018;07</article-title>: <source>Proceedings of the 13 th ACM SIGKDD international conference on Knowledge discovery and data mining</source>, pp. <fpage>210</fpage> &#x2013; <lpage>219</lpage>.</citation></ref>
<ref id="bib018"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Denev</surname><given-names>A.</given-names></name><name><surname>Amen</surname><given-names>S.</given-names></name></person-group> (<year>2020</year>). <source>The Book of Alternative Data: A Guide for Investors, Traders and Risk</source>. s.l.:<publisher-name>Wiley</publisher-name>.</citation></ref>
<ref id="bib019"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Devlin</surname><given-names>J.</given-names></name><name><surname>Chang</surname><given-names>M.W.</given-names></name><name><surname>Lee</surname><given-names>K.</given-names></name><name><surname>Toutanova</surname><given-names>K.</given-names></name></person-group> (<year>2018</year>). <article-title>BERT: Pre-training of deep bidirectional transformers for language understanding</article-title>. <source>arXiv:1810.04805</source>.</citation></ref>
<ref id="bib020"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Diao</surname><given-names>L.</given-names></name><name><surname>Wang</surname><given-names>N.</given-names></name></person-group> (<year>2019</year>). <article-title>Research on premium income prediction based on LSTM neural network</article-title>. <source>Advances in Social Sciences Research Journal</source>, <volume>6</volume>(<issue>11</issue>), <fpage>256</fpage>&#x2013;<lpage>260</lpage>.</citation></ref>
<ref id="bib021"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>D&#x00ED;az</surname><given-names>Z.</given-names></name><name><surname>Segovia</surname><given-names>M.J.</given-names></name><name><surname>Fern&#x00E1;ndez</surname><given-names>J.</given-names></name><name><surname>del Pozo</surname><given-names>E.M.</given-names></name></person-group> (<year>2005</year>). <article-title>Machine learning and statistical techniques. An application to the prediction of insolvency in spanish non-life insurance companies.</article-title>. <source>The International Journal of Digital Accounting Research</source>, <volume>5</volume>(<issue>9</issue>), <fpage>1</fpage>&#x2013;<lpage>45</lpage>.</citation></ref>
<ref id="bib022"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Efron</surname><given-names>B.</given-names></name><name><surname>Hastie</surname><given-names>T.</given-names></name></person-group> (<year>2016</year>). <article-title>Computer Age Statistical Inference: Algorithms, Evidence and Data Science</article-title>. <publisher-name>Cambridge University Press</publisher-name>, <fpage>5</fpage>.</citation></ref>
<ref id="bib023"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Fei-Fei</surname><given-names>L.</given-names></name><name><surname>Fergus</surname><given-names>R.</given-names></name><name><surname>Perona</surname><given-names>P.</given-names></name></person-group> (<year>2003</year>). <article-title>A bayesian approach to unsupervised one-shot learning of object categories</article-title>. <source>In Proceedings Ninth IEEE International Conference on Computer Vision</source>, <fpage>1134</fpage>&#x2013;<lpage>1141</lpage>.</citation></ref>
<ref id="bib024"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Giarratano</surname><given-names>J.C.</given-names></name><name><surname>Riley</surname><given-names>G.</given-names></name></person-group> (<year>1998</year>). <source>Expert Systems</source>. s.l.:<publisher-name>PWS Publishig Co</publisher-name>..</citation></ref>
<ref id="bib025"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Gleave</surname><given-names>A.</given-names></name><name><surname>Dennis</surname><given-names>M.</given-names></name><name><surname>Wild</surname><given-names>C.</given-names></name><name><surname>Kant</surname><given-names>N.</given-names></name><name><surname>Levine</surname><given-names>S.</given-names></name><name><surname>Russell</surname><given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>Adversarial policies: attacking deep reinforcement learning.</article-title>. <source>arXiv:1905.1 0615</source>.</citation></ref>
<ref id="bib026"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Goodfellow</surname><given-names>I.</given-names></name><name><surname>Bengio</surname><given-names>Y.</given-names></name><name><surname>Courville</surname><given-names>A.</given-names></name></person-group> (<year>2016</year>). <source>Deep Learning</source>. s.l.:<publisher-name>MIT Press book</publisher-name>.</citation></ref>
<ref id="bib027"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Goodfellow</surname><given-names>I.J.</given-names></name><name><surname>Pouget-Abadie</surname><given-names>J.</given-names></name><name><surname>Mirza</surname><given-names>M.</given-names></name><name><surname>Xu</surname><given-names>B.</given-names></name><name><surname>Warde-Farley</surname><given-names>D.</given-names></name><name><surname>Ozair</surname><given-names>S.</given-names></name><name><surname>Courville</surname><given-names>A.</given-names></name><name><surname>Bengio</surname><given-names>Y.</given-names></name></person-group> (<year>2014</year>). <article-title>Generative Adversarial Networks</article-title>. <source>arXiv:1406.2661</source>.</citation></ref>
<ref id="bib028"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Graves</surname><given-names>A.</given-names></name></person-group> (<year>2014</year>). <article-title>Generating sequences with recurrent neural networks</article-title>. <source>arXiv:1308.0850</source>.</citation></ref>
<ref id="bib029"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Graves</surname><given-names>A.</given-names></name><name><surname>Jaitly</surname><given-names>N.</given-names></name></person-group> (<year>2014</year>). <article-title>Towards end-to-end speech recognition with recurrent neural networks</article-title>. <source>Proceedings of the 31st International Conference on Machine Learning</source>, <volume>32</volume>(<issue>2</issue>), <fpage>1764</fpage>&#x2013;<lpage>1772</lpage>.</citation></ref>
<ref id="bib030"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Graves</surname><given-names>A.</given-names></name><name><surname>Liwicki</surname><given-names>M.</given-names></name><name><surname>Fern&#x00E1;ndez</surname><given-names>S.</given-names></name><name><surname>Bertolami</surname><given-names>R.</given-names></name><name><surname>Bunke</surname><given-names>H.</given-names></name><name><surname>Schmidhuber</surname><given-names>J.</given-names></name></person-group> (<year>2009</year>). <article-title>A novel connectionist system for unconstrained handwriting recognition</article-title>. <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>, <volume>31</volume>(<issue>5</issue>), <fpage>855</fpage>&#x2013;<lpage>868</lpage>.</citation></ref>
<ref id="bib031"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Graves</surname><given-names>A.</given-names></name><name><surname>Mohamed</surname><given-names>A.R.</given-names></name><name><surname>Hinton</surname><given-names>G.</given-names></name></person-group> (<year>2013</year>). <article-title>Speech recognition with deep recurrent neural networks</article-title>. <source>arXiv:1303.5778</source>.</citation></ref>
<ref id="bib032"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Hastie</surname><given-names>T.</given-names></name><name><surname>Tibshirani</surname><given-names>R.</given-names></name><name><surname>Friedman</surname><given-names>J.</given-names></name></person-group> (<year>2009</year>). <source>The elements of statistical learning: data mining, inference, and prediction</source>. <edition>Second</edition> ed. s.l.:<publisher-name>Springer</publisher-name>.</citation></ref>
<ref id="bib033"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Higgins</surname><given-names>I.</given-names></name><name><surname>Liwicki</surname><given-names>M.</given-names></name><name><surname>Fern&#x00E1;ndez</surname><given-names>S.</given-names></name><name><surname>Bertolami</surname><given-names>R.</given-names></name><name><surname>Bunke</surname><given-names>H.</given-names></name><name><surname>Schmidhuber</surname><given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>DARLA: Improving zero-shot transfer in reinforcement learning</article-title>. <source>arXiv:1707.08475</source>.</citation></ref>
<ref id="bib034"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hochreiter</surname><given-names>S.</given-names></name><name><surname>Schmidhuber</surname><given-names>J.</given-names></name></person-group> (<year>2006</year>). <article-title>Long short-term memory</article-title>. <source>Neural Computation</source>, <volume>9</volume>(<issue>8</issue>), <fpage>1735</fpage>&#x2013;<lpage>1780</lpage>.</citation></ref>
<ref id="bib035"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Huang</surname><given-names>L.</given-names></name><name><surname>Joseph</surname><given-names>A.D.</given-names></name><name><surname>Nelson</surname><given-names>B.</given-names></name><name><surname>Rubinstein</surname><given-names>B.I.P.</given-names></name><name><surname>Tygar</surname><given-names>J.D.</given-names></name></person-group> (<year>2011</year>). <article-title>Adversarial machine learning</article-title>. <source>AISec &#x2018;11: Proceedings of the 4th ACM workshop on Security and artificial intelligence</source>, pp. <fpage>43</fpage>&#x2013;<lpage>58</lpage>.</citation></ref>
<ref id="bib036"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ilker</surname><given-names>K.</given-names></name><name><surname>Mehmet</surname><given-names>G.</given-names></name><name><surname>Kemal</surname><given-names>K.</given-names></name></person-group> (<year>2015</year>). <article-title>An interactive machine-learning-based electronic fraud and abuse detection system in healthcare insurance.</article-title>. <source>Applied Soft Computing</source>, <volume>36</volume>, <fpage>283</fpage>&#x2013;<lpage>299</lpage>.</citation></ref>
<ref id="bib037"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Juszczak</surname><given-names>P.</given-names></name><name><surname>Adams</surname><given-names>N.M.</given-names></name><name><surname>David</surname><given-names>J.</given-names></name><name><surname>Hand</surname><given-names>D.J.</given-names></name><name><surname>Whitrow</surname><given-names>C.</given-names></name><name><surname>Westona</surname><given-names>D.J.</given-names></name></person-group> (<year>2008</year>). <article-title>Off-the-peg and bespoke classifiers for fraud detection</article-title>. <source>Computational Statistics and Data Analysis</source>, <volume>52</volume>(<issue>9</issue>), <fpage>4521</fpage>&#x2013;<lpage>4532</lpage>.</citation></ref>
<ref id="bib038"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Karpathy</surname><given-names>A.</given-names></name><name><surname>Johnson</surname><given-names>J.</given-names></name><name><surname>Fei-Fei</surname><given-names>L.</given-names></name></person-group> (<year>2015</year>). <article-title>Visualizing and understanding recurrent networks</article-title>. <source>arXiv:1506.02078v2</source>.</citation></ref>
<ref id="bib039"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Keneshloo</surname><given-names>Y.</given-names></name><name><surname>Ramakrishnan</surname><given-names>N.</given-names></name><name><surname>Reddy</surname><given-names>C. K.</given-names></name></person-group> (<year>2019</year>). <article-title>Deep transfer reinforcement learning for text summarization</article-title>. <source>arXiv:1810.06667</source>.</citation></ref>
<ref id="bib040"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Kim</surname><given-names>B.</given-names></name><name><surname>Wattenberg</surname><given-names>M.</given-names></name><name><surname>Gilmer</surname><given-names>J.</given-names></name><name><surname>Cai</surname><given-names>C.</given-names></name><name><surname>Wexler</surname><given-names>J.</given-names></name><name><surname>Viegas</surname><given-names>F.</given-names></name><name><surname>Sayres</surname><given-names>R.</given-names></name></person-group> (<year>2018</year>). <article-title>Interpretability beyond feature attribution: quantitative testing with concept activation vectors (TCAV)</article-title>. <source>Proceedings of the 35th International Conference on Machine Learning</source>, pp. <fpage>2668</fpage>&#x2013;<lpage>2677</lpage>.</citation></ref>
<ref id="bib041"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Kiros</surname><given-names>R.</given-names></name><name><surname>Salakhutdinov</surname><given-names>R.</given-names></name><name><surname>Zemel</surname><given-names>R.S.</given-names></name></person-group> (<year>2014</year>). <article-title>Unifying visual-semantic embeddings with multimodal neural language models</article-title>. <source>arXiv:1411.2539</source>.</citation></ref>
<ref id="bib042"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Kolchyna</surname><given-names>O.</given-names></name><name><surname>Souza</surname><given-names>T.P.</given-names></name><name><surname>Treleaven</surname><given-names>P.</given-names></name></person-group> (<year>2015</year>). <article-title>Twitter sentiment analysis</article-title>. <source>arXiv:1507.00955</source>.</citation></ref>
<ref id="bib043"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Koshiyama</surname><given-names>A.</given-names></name><name><surname>Firoozye</surname><given-names>N.</given-names></name></person-group> (<year>2019</year>). <article-title>Avoiding backtesting overfitting by covariance-penalties</article-title>. <source>The Journal of Financial Data Science</source>.</citation></ref>
<ref id="bib044"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Koshiyama</surname><given-names>A.</given-names></name><name><surname>Firoozye</surname><given-names>N.</given-names></name><name><surname>Treleaven</surname><given-names>P.</given-names></name></person-group> (<year>2020</year>). <article-title>Algorithms in future capital markets. SSRN</article-title>: <comment><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" 
xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3527511">https://papers.ssrn.com/ sol3/papers.cfm?abstract_id=3527511</ext-link></comment></citation></ref>
<ref id="bib045"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Kuo</surname><given-names>K.</given-names></name></person-group> (<year>2019</year>). <article-title>Generative synthesis of insurance datasets</article-title>. <source>arXiv:1912.02423</source>.</citation></ref>
<ref id="bib046"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Kurakin</surname><given-names>A.</given-names></name><name><surname>Goodfellow</surname><given-names>I.</given-names></name><name><surname>Bengio</surname><given-names>S.</given-names></name></person-group> (<year>2016</year>). <article-title>Adversarial machine learning at scale</article-title>. <source>arXiv:1611.01236</source>.</citation></ref>
<ref id="bib047"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Lakkaraju</surname><given-names>H.</given-names></name><name><surname>Kamar</surname><given-names>E.</given-names></name><name><surname>Cauruna</surname><given-names>R.</given-names></name><name><surname>Leskovec</surname><given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>Interpretable and explorable approximations of black box models</article-title>. <source>arXiv:1707.01154</source>.</citation></ref>
<ref id="bib048"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Li</surname><given-names>Q.</given-names></name></person-group> <etal>et al.</etal> (<year>2019</year>). <article-title>A survey on federated learning systems: vision, hype and reality for data privacy and protection</article-title>. <source>arXiv:1907.09693</source>.</citation></ref>
<ref id="bib049"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Lundberg</surname><given-names>S.</given-names></name><name><surname>Su-In</surname><given-names>L.</given-names></name></person-group> (<year>2017</year>). <article-title>A unified approach to interpreting model predictions</article-title>. <source>arXiv:1705.07874</source>.</citation></ref>
<ref id="bib050"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Makhzani</surname><given-names>A.</given-names></name></person-group> <etal>et al.</etal> (<year>2016</year>). <article-title>Adversarial autoencoders</article-title>. <source>arXiv:1511.05644</source>.</citation></ref>
<ref id="bib051"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Marano</surname><given-names>P.</given-names></name><name><surname>Noussia</surname><given-names>K.</given-names></name></person-group> (<year>2019</year>). <article-title>Insurtech: a legal and regulatory view</article-title>. In: <source>Smart Contracts in Insurance: A Law and Futurology Perspective</source>. s.l.:<publisher-name>Springer</publisher-name>, pp. <fpage>101</fpage>&#x2013;<lpage>125</lpage>.</citation></ref>
<ref id="bib052"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>May</surname><given-names>R.M.</given-names></name><name><surname>Levin</surname><given-names>S.A.</given-names></name><name><surname>Sugihara</surname><given-names>G.</given-names></name></person-group> (<year>2008</year>). <article-title>Complex systems. ecology for bankers</article-title>. <source>Nature</source>. <volume>451</volume>, <fpage>893</fpage>&#x2013;<lpage>893</lpage>.</citation></ref>
<ref id="bib053"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meyer</surname><given-names>M.</given-names></name></person-group> (<year>2014</year>). <article-title>Continuous integration and its tools</article-title>. <source>IEEE Software</source>, <volume>31</volume>(<issue>3</issue>), <fpage>14</fpage>&#x2013;<lpage>16</lpage>.</citation></ref>
<ref id="bib054"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Miyato</surname><given-names>T.</given-names></name><name><surname>Dai</surname><given-names>A.M.</given-names></name><name><surname>Goodfellow</surname><given-names>I.</given-names></name></person-group> (<year>2017</year>). <article-title>Adversarial training methods for semi-supervised text classification.</article-title>. <source>arXiv:1605.07725</source>.</citation></ref>
<ref id="bib055"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Molnar</surname><given-names>C.</given-names></name></person-group> (<year>2020</year>). <source>Interpretable machine learning</source>. s.l.:<publisher-name>Lulu.com</publisher-name>.</citation></ref>
<ref id="bib056"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Montavon</surname><given-names>G.</given-names></name><name><surname>Samek</surname><given-names>W.</given-names></name>M&#x00FC;<name><surname>ller</surname><given-names>K.R.</given-names></name></person-group> (<year>2017</year>). <article-title>Methods for Interpreting and Understanding Deep Neural Networks</article-title>. <source>arXiv:1706.07979</source>.</citation></ref>
<ref id="bib057"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Nguyen</surname><given-names>A.</given-names></name></person-group> <etal>et al.</etal> (<year>2016</year>). <article-title>Synthesizing the preferred inputs for neurons in</article-title>. <source>Advances in Neural Information Processing Systems 29 (NIPS 2016)</source>.</citation></ref>
<ref id="bib058"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Nicolae</surname><given-names>M.I.</given-names></name></person-group> <etal>et al.</etal> (<year>2019</year>). <article-title>Adversarial robustness toolbox. v0.4.0</article-title>. <source>arXiv:1807.01069</source>.</citation></ref>
<ref id="bib059"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pinto</surname><given-names>L.</given-names></name><name><surname>Davidson</surname><given-names>J.</given-names></name><name><surname>Sukthankar</surname><given-names>R.</given-names></name><name><surname>Gupta</surname><given-names>A.</given-names></name></person-group> (<year>2017</year>). <article-title>Proceedings of the 34th International Conference on Machine Learning</article-title>. Volume <volume>70</volume>.</citation></ref>
<ref id="bib060"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Poli</surname><given-names>R.</given-names></name><name><surname>Langdon</surname><given-names>W.B.</given-names></name><name><surname>McPhee</surname><given-names>N.F.</given-names></name></person-group> (<year>2008</year>). <source>A field guide to genetic programming</source>.. s.l.:<publisher-name>Lulu.com</publisher-name>.</citation></ref>
<ref id="bib061"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Qin</surname><given-names>C.</given-names></name></person-group> <etal>et al.</etal> (<year>2019</year>). <article-title>Verification of non-linear specifications for neural networks</article-title>. <source>arXiv:1902.09592</source>.</citation></ref>
<ref id="bib062"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Radford</surname><given-names>A.</given-names></name></person-group> <etal>et al.</etal> (n.d.). <article-title>Language models are unsupervised multitask learners</article-title>. <source>OpenAIBlog</source>, <volume>1</volume>(<issue>8</issue>).</citation></ref>
<ref id="bib063"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Raina</surname><given-names>R.</given-names></name><name><surname>Ng</surname><given-names>A.Y.</given-names></name><name><surname>Koller</surname><given-names>D.</given-names></name></person-group> (<year>2006</year>). <article-title>Constructing informative priors using transfer learning</article-title>. <source>ICML &#x2018;06: Proceedings of the 23rd international conference on Machine learning</source>, pp. <fpage>713</fpage>&#x2013;<lpage>20</lpage>.</citation></ref>
<ref id="bib064"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Ribeiro</surname><given-names>M.T.</given-names></name><name><surname>Singh</surname><given-names>S.</given-names></name><name><surname>Guestrin</surname><given-names>C.</given-names></name></person-group> (<year>2016</year>). <article-title>Why should i trust you?: explaining the predictions of any classifier</article-title>. <source>arXiv:1602.04938</source>.</citation></ref>
<ref id="bib065"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Richman</surname><given-names>R.</given-names></name></person-group> (<year>2018</year>). <article-title>AI in actuarial science</article-title>. <comment><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" 
xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3218082">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3218082</ext-link></comment></citation></ref>
<ref id="bib066"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Russell</surname><given-names>S.</given-names></name><name><surname>Norvig</surname><given-names>P.</given-names></name></person-group> (<year>2020</year>). <source>Artificial intelligence: a modern approach</source>. <edition>4th</edition> ed. s.l. :<publisher-name>Pearson</publisher-name>.</citation></ref>
<ref id="bib067"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Saleh</surname><given-names>K.</given-names></name><name><surname>Hossny</surname><given-names>M.</given-names></name><name><surname>Nahavandi</surname><given-names>S.</given-names></name></person-group> (<year>2017</year>). <article-title>Driving behavior classification based on sensor data fusion using LSTM recurrent neural networks</article-title>. <source>2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC)</source>.</citation></ref>
<ref id="bib068"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Saleh</surname><given-names>K.</given-names></name><name><surname>Hossny</surname><given-names>M.</given-names></name><name><surname>Nahavandi</surname><given-names>S.</given-names></name></person-group> (<year>2017</year>). <article-title>Driving behavior classification based on sensor data fusion using LSTM recurrent neural networks</article-title>. <source>2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC)</source>.</citation></ref>
<ref id="bib069"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Siddhant</surname><given-names>A.</given-names></name><name><surname>Goyal</surname><given-names>A.</given-names></name><name><surname>Metallinou</surname><given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>Unsupervised transfer learning for spoken language understanding in intelligent agents</article-title>. <source>In Proceedings of the AAAI Conference on Artificial Intelligence</source>, Volume <volume>4959-4966</volume>.</citation></ref>
<ref id="bib070"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Sutskever</surname><given-names>I.</given-names></name><name><surname>Vinyals</surname><given-names>O.</given-names></name><name><surname>Le</surname><given-names>Q. V.</given-names></name></person-group> (<year>2014</year>). <article-title>Sequence to sequence learning with neural networks</article-title>. <source>arXiv:1409.3215</source>.</citation></ref>
<ref id="bib071"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Sutton</surname><given-names>R.S.</given-names></name><name><surname>Barto</surname><given-names>A.G.</given-names></name></person-group> (<year>2018</year>). <source>Reinforcement learning: An introduction</source>. s.l.:<publisher-name>MIT Press</publisher-name>.</citation></ref>
<ref id="bib072"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Szegedy</surname><given-names>C.</given-names></name></person-group> <etal>et al.</etal> (<year>2013</year>). <article-title>Intriguing properties of neural networks</article-title>. <source>arXiv:1312.6199</source>.</citation></ref>
<ref id="bib073"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Taylor</surname><given-names>S. J.</given-names></name></person-group> (<year>2014</year>). <source>Agent-Based Modeling and Simulation</source>. s.l.:<publisher-name>Springer</publisher-name>.</citation></ref>
<ref id="bib074"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Treleaven</surname><given-names>P.</given-names></name><name><surname>Barnett</surname><given-names>J.</given-names></name><name><surname>Koshiyama</surname><given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>Algorithms: Law and regulation</article-title>. <source>Computer</source>, <volume>52</volume>(<issue>2</issue>), <fpage>32</fpage>&#x2013;<lpage>40</lpage>.</citation></ref>
<ref id="bib075"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Treleaven</surname><given-names>P.</given-names></name><name><surname>Galas</surname><given-names>M.</given-names></name><name><surname>Lalchand</surname><given-names>V.</given-names></name></person-group> (<year>2013</year>). <article-title>Algorithmic trading review</article-title>. <source>Communications of the ACM</source>, <volume>56</volume>(<issue>11</issue>), <fpage>76</fpage>&#x2013;<lpage>85</lpage>.</citation></ref>
<ref id="bib076"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>van Liebergen</surname><given-names>B.</given-names></name></person-group> (<year>2017</year>). <article-title>Machine learning: A revolution in risk management and compliance?</article-title>. <source>Journal of Financial Transformation</source>, <volume>45</volume>, <fpage>60</fpage>&#x2013;<lpage>67</lpage>.</citation></ref>
<ref id="bib077"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Vinyals</surname><given-names>O.</given-names></name></person-group> <etal>et al.</etal> (<year>2015</year>). <article-title>Grammar as a foreign language</article-title>. <source>arXiv:1412.7449</source>.</citation></ref>
<ref id="bib078"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wachter</surname><given-names>S.</given-names></name><name><surname>Mittelstadt</surname><given-names>B.</given-names></name><name><surname>Russell</surname><given-names>C.</given-names></name></person-group> (<year>2018</year>). <article-title>Counterfactual explanations without opening the black box: Automated Decisions and the GDPR</article-title>. <source>Harvard Journal of Law and Technology</source>, <volume>31</volume>(<issue>2</issue>).</citation></ref>
<ref id="bib079"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Weishan</surname><given-names>D.</given-names></name></person-group> <etal>et al.</etal> (<year>2016</year>). <article-title>Characterizing driving styles with deep learning</article-title>. <source>arXiv:1607.03611</source>.</citation></ref>
<ref id="bib080"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Wood</surname><given-names>S. N.</given-names></name></person-group> (<year>2017</year>). <source>Generalized additive models</source>. s.l.:<publisher-name>Chapman and Hall/CRC</publisher-name>.</citation></ref>
<ref id="bib081"><citation citation-type="other"><person-group person-group-type="author"><name><surname>W&#x00FC;thrich</surname><given-names>M. V.</given-names></name></person-group> (<year>2018</year>). <article-title>Machine learning in individual claims reserving.</article-title>. <source>Scandinavian Actuarial Journal</source>, <fpage>465</fpage>&#x2013;<lpage>480</lpage>.</citation></ref>
<ref id="bib082"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xu</surname><given-names>J.</given-names></name><name><surname>Chen</surname><given-names>H.</given-names></name></person-group> (<year>2005</year>). <article-title>Criminal network analysis and visualization</article-title>. <source>Communications of the ACM</source>, <volume>48</volume>(<issue>6</issue>), <fpage>100</fpage>&#x2013;<lpage>107</lpage>.</citation></ref>
<ref id="bib083"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Xu</surname><given-names>K.</given-names></name></person-group> <etal>et al.</etal> (<year>2016</year>). <article-title>Show, Attend and Tell: Neural Image Caption Generation with Visual Attention</article-title>. <source>arXiv:1502.03044</source></citation></ref>
<ref id="bib084"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>Q.</given-names></name></person-group> <etal>et al.</etal> (<year>2019</year>). <source>Federated learning. synthesis lectures on artificial intelligence and machine learning</source>. s.l.:<publisher-name>Morgan and Claypool Publishers</publisher-name>.</citation></ref>
<ref id="bib085"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>W.</given-names></name><name><surname>Koshiyama</surname><given-names>A.S.</given-names></name></person-group> (<year>2019</year>). <article-title>Assessing qualitative similarities between financial reporting frameworks using visualization and rules: COREP vs. pillar 3.</article-title>. <source>Intelligent Systems in Accounting, Finance and Management</source>, <volume>26</volume>(<issue>1</issue>), <fpage>16</fpage> &#x2013; <lpage>31</lpage>.</citation></ref>
<ref id="bib086"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yaqi</surname><given-names>L.</given-names></name><name><surname>Chun</surname><given-names>Y.</given-names></name><name><surname>Wei</surname><given-names>L.</given-names></name><name><surname>Maozhen</surname><given-names>L.</given-names></name></person-group> (<year>2018</year>). <article-title>principle component analysis-based random forest with the potential nearest neighbor method for automobile insurance fraud identification</article-title>. <source>Applied Soft Computing</source>, <volume>70</volume>(<month>September</month> <year>2018</year>), <fpage>1000</fpage>&#x2013;<lpage>1009</lpage>.</citation></ref>
<ref id="bib087"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Yosinski</surname><given-names>J.</given-names></name></person-group> <etal>et al.</etal> (<year>2015</year>). <article-title>Understanding neural networks through deep visualization</article-title>. <source>arXiv:1506.06579</source>.</citation></ref>
<ref id="bib088"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Zintgraf</surname><given-names>L.M.</given-names></name><name><surname>Chohen</surname><given-names>T.S.</given-names></name><name><surname>Adel</surname><given-names>T.</given-names></name><name><surname>Welling</surname><given-names>M.</given-names></name></person-group> (<year>2017</year>). <article-title>Visualizing deep neural network decisions: prediction difference analysis</article-title>. <source>arXiv:1702.04595</source>.</citation></ref>
</ref-list>
</back>
</article>