{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T09:29:07Z","timestamp":1744363747965,"version":"3.37.3"},"reference-count":270,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3204051","type":"journal-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:05:37Z","timestamp":1662408337000},"page":"93104-93139","source":"Crossref","is-referenced-by-count":150,"title":["Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1186-4990","authenticated-orcid":false,"given":"Zhibo","family":"Zhang","sequence":"first","affiliation":[{"name":"Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1353-4138","authenticated-orcid":false,"given":"Hussam Al","family":"Hamadi","sequence":"additional","affiliation":[{"name":"Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9557-6496","authenticated-orcid":false,"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[{"name":"Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1398-952X","authenticated-orcid":false,"given":"Chan Yeob","family":"Yeun","sequence":"additional","affiliation":[{"name":"Center for Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8358-9081","authenticated-orcid":false,"given":"Fatma","family":"Taher","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Dubai, United Arab Emirates"}]}],"member":"263","reference":[{"volume-title":"What is Cybersecurity? | CISA","year":"2022","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122"},{"volume-title":"Number of Internet Users Worldwide 2021","year":"2022","key":"ref3"},{"volume-title":"2021 Cyber Attack Trends Mid-Year Report | Check Point Software","year":"2022","key":"ref4"},{"volume-title":"Cyberattack Disrupts Unemployment Benefits in Some States","year":"2022","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-9478-9_2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2020.2992966"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2968045"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22868-2_90"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3116481"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v38i3.2741"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3127881"},{"key":"ref13","article-title":"SoK: Applying machine learning in security\u2014A survey","author":"Jiang","year":"2016","journal-title":"arXiv:1611.03186"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"ref16","article-title":"Applications of artificial intelligence to network security","author":"Veiga","year":"2018","journal-title":"arXiv:1803.09992"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2847722"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2994747"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/iecon.2018.8591773"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3178582"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3178582"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1800573"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3146552"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2021.3117075"},{"key":"ref27","article-title":"Explaining network intrusion detection system using explainable AI framework","author":"Mane","year":"2021","journal-title":"arXiv:2103.07110"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TEMSCON.2019.8813605"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.02.056"},{"key":"ref30","article-title":"XAI for cybersecurity: State of the art, challenges, open issues and future directions","author":"Srivastava","year":"2022","journal-title":"arXiv:2206.03585"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00557-0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04319-2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3041951"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09942-2"},{"key":"ref35","article-title":"Explainable artificial intelligence (XAI) for Internet of Things: A survey","author":"Kok","year":"2022","journal-title":"arXiv:2206.04800"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109032"},{"volume-title":"14:00-17:00","year":"2012","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4950-5_4"},{"volume-title":"Cybersecurity Market Worth $345.4 Billion by 2026","year":"2022","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w19-8403"},{"key":"ref41","first-page":"8","article-title":"Explanation and justification in machine learning: A survey","volume-title":"Proc. IJCAI","author":"Biran"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534639"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2013.2257594"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14350-3_6"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/icit52682.2021.9491638"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206780"},{"issue":"3","key":"ref47","first-page":"61","article-title":"Deep learning models for cyber security in IoT networks: A review","volume":"5","author":"Ahmed","year":"2021","journal-title":"Int. J. Sci. Bus."},{"key":"ref48","article-title":"Reviewing the need for explainable artificial intelligence (xAI)","author":"Gerlings","year":"2020","journal-title":"arXiv:2012.01007"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/icirca48905.2020.9183184"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1201\/9781003003489"},{"volume-title":"What is GDPR, the EU\u2019s New Data Protection Law?","year":"2018","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3302317"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080832"},{"key":"ref55","article-title":"One explanation does not fit all: A toolkit and taxonomy of AI explainability techniques","author":"Arya","year":"2019","journal-title":"arXiv:1909.03012"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btq134"},{"key":"ref58","article-title":"GNNExplainer: Generating explanations for graph neural networks","author":"Ying","year":"2019","journal-title":"arXiv:1903.03894"},{"key":"ref59","first-page":"1","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Lundberg"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278776"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01228-7"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3063289"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314230"},{"key":"ref64","article-title":"Towards explainable NLP: A generative explanation framework for text classification","author":"Liu","year":"2018","journal-title":"arXiv:1811.00196"},{"key":"ref65","article-title":"A survey of the state of explainable AI for natural language processing","author":"Danilevsky","year":"2020","journal-title":"arXiv:2010.00711"},{"key":"ref66","first-page":"4211","article-title":"How can i explain this to you? An empirical study of deep neural network explanation methods","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Jeyakumar"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i11.21452"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3503603"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2008.11.006"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11501"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314229"},{"key":"ref72","article-title":"When explainability meets adversarial learning: Detecting adversarial examples using SHAP signatures","author":"Fidel","year":"2019","journal-title":"arXiv:1909.03418"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2000050"},{"key":"ref74","article-title":"Explainable artificial intelligence (XAI): An engineering perspective","author":"Hussain","year":"2021","journal-title":"arXiv:2101.03613"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375830"},{"key":"ref76","article-title":"Technical report on the CleverHans v2.1.0 adversarial examples library","volume-title":"arXiv:1610.00768","author":"Papernot","year":"2016"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aay7120"},{"key":"ref78","article-title":"The three stages of explainable AI: How explainability facilitates real world deployment of AI","author":"Mars","year":"2020","journal-title":"Res. Gate"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57321-8_1"},{"volume-title":"Evaluation of Post-Hoc XAI Approaches Through Synthetic Tabular Data | Foundations of Intelligent Systems","year":"2022","key":"ref80"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.11.008"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-019-00710-5"},{"volume-title":"Ethics Guidelines for Trustworthy AI","year":"2018","author":"LEMONNE","key":"ref83"},{"volume-title":"Directorate General for Parliamentary Research Services. The Impact of the General Data Protection Regulation on Artificial Intelligence","year":"2020","key":"ref84"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3901732"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01332-6"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2020-0024"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3547922"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1312"},{"key":"ref91","article-title":"What clinicianswant: Contextualizing explainable machine learning for clinical end use","author":"Tonekaboni","year":"2019","journal-title":"arXiv:1905.05134"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata.2017.8258167"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2836950"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/mprv.2018.03367731"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"volume-title":"IoT-23: A labeled dataset with malicious and benign IoT network traffic","year":"2020","author":"Garcia","key":"ref96"},{"key":"ref97","article-title":"EMBER: An open dataset for training static PE malware machine learning models","author":"Anderson","year":"2018","journal-title":"arXiv:1804.04637"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2012.16"},{"volume-title":"VirusShare.com","year":"2022","key":"ref99"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ccst.2018.8585560"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2034691.2034742"},{"key":"ref103","first-page":"28","article-title":"Spam filtering with naive Bayes","volume-title":"Proc. CEAS","author":"Metsis"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_30"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/cisda.2009.5356528"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2402161"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ccst.2019.8888419"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022862"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050800"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2013.6555301"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/milcis.2015.7348942"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/pst.2011.5971980"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101719"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1049\/pbpc035g_ch22"},{"journal-title":"HAI 1.0: HIL-Based Augmented ICS Security Dataset","year":"2020","author":"Shin","key":"ref119"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/isrcs.2014.6900095"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022633"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.pneurobio.2011.09.005"},{"key":"ref123","article-title":"CoAID: COVID-19 healthcare misinformation dataset","author":"Cui","year":"2020","journal-title":"arXiv:2006.00885"},{"key":"ref124","article-title":"Explainable AI meets healthcare: A study on heart disease dataset","author":"Dave","year":"2020","journal-title":"arXiv:2011.03195"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.35"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1097\/ccm.0b013e31820a92c6"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-020-0495-6"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2016.7727519"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2018.2442"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2018.158"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1093\/neuonc\/now247"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2013.27"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.02.009"},{"volume-title":"Fast Global Alignment Kernels | Semantic Scholar","year":"2022","key":"ref134"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.10.055"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3035596"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020462"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526816"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"ref140","article-title":"An open access repository of images on plant health to enable the development of mobile disease diagnostics","author":"Hughes","year":"2015","journal-title":"arXiv:1511.08060"},{"volume-title":"Photometric Stereo-Based 3D Imaging System Using Computer Vision and Deep Learning for Tracking Plant Growth | GigaScience | Oxford Academic","year":"2022","key":"ref141"},{"key":"ref142","article-title":"The plant pathology 2020 challenge dataset to classify foliar disease of apples","author":"Thapa","year":"2020","journal-title":"arXiv:2004.11958"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/btas.2014.6996259"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/wifs.2016.7823894"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.3386\/w23673"},{"volume-title":"UCI Machine Learning Repository: Statlog (German Credit Data) Data Set","year":"2022","key":"ref147"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664252"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2906934"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.09.082"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.23919\/eusipco.2018.8553598"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn48605.2020.9207322"},{"volume-title":"Malware Detection by Eating a Whole EXE","year":"2018","author":"Raff","key":"ref155"},{"key":"ref156","article-title":"EMBER: An open dataset for training static PE malware machine learning models","author":"Anderson","year":"2018","journal-title":"arXiv:1804.04637"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7671967"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.09.082"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102198"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/iwqos.2016.7590446"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3189645"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.118"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01802"},{"volume-title":"Daily Number of E-Mails Worldwide 2025","year":"2022","key":"ref164"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2954791"},{"key":"ref166","article-title":"Metrics for explainable AI: Challenges and prospects","author":"Hoffman","year":"2018","journal-title":"arXiv:1812.04608"},{"key":"ref167","article-title":"Explaining any ML model?\u2014On goals and capabilities of XAI","author":"Renftle","year":"2022","journal-title":"arXiv:2206.13888"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326027"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-020-09260-6"},{"issue":"1","key":"ref170","article-title":"Towards SMS spam filtering: Results under a new dataset","volume":"2","author":"Almeida","year":"2013","journal-title":"Int. J. Inf. Secur. Sci."},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i17.17745"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_48"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2016-1352"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"volume-title":"Botnet Detection Market Global Industry Historical Analysis, Size, Growth, Trends, Emerging Factors, Demands, Key Players, Emerging Technologies and Potential of Industry Till 2027\u2014 MarketWatch","year":"2022","key":"ref176"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3081751"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3162588"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2019.8761218"},{"volume-title":"MAWI Working Group Traffic Archive","year":"2022","key":"ref180"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326015"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/icarcv.2018.8581205"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3183361"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.06.039"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1080\/14616696.2020.1804973"},{"key":"ref186","first-page":"28","volume-title":"The financial cost of fraud 2019","author":"Gee","year":"2019"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2021.3081249"},{"volume-title":"IEEE-CIS Fraud Detection","year":"2022","key":"ref188"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00623-7"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.14778\/3494124.3494128"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380027"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272010"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2021.13607"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380172"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.126"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9941464"},{"key":"ref197","article-title":"Explainable deep behavioral sequence clustering for transaction fraud detection","author":"Min","year":"2021","journal-title":"arXiv:2101.04285"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2957750"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3119323"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/ssci50451.2021.9659981"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"ref202","first-page":"3793","article-title":"Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Lin"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3118931"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/lnet.2022.3186589"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117144"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2022.3188750"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/lnet.2022.3186589"},{"volume-title":"KHO-XAI: Krill Herd Optimization and Explainable Artificial Intelligence framework for Network Intrusion Detection Systems in Industry 4.0","year":"2022","key":"ref208"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i1.14106"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09606-8"},{"key":"ref211","article-title":"Explaining network intrusion detection system using explainable AI framework","author":"Mane","year":"2021","journal-title":"arXiv:2103.07110"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref213","article-title":"Explainable AI and random forest based reliable intrusion detection system","author":"Wali","year":"2021","journal-title":"TechRxiv"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v7i430185"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3183390"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/dasc-picom-cbdcom-cyberscitech49142.2020.00026"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2891588"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/vizsec51108.2020.00010"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465749"},{"key":"ref220","first-page":"263","article-title":"A comprehensive measurement study of domain generating malware","volume-title":"Proc. USENIX Secur. Symp.","author":"Plohmann"},{"volume-title":"Home\u2014Eduroam.org. Eduroam.org. Eduroam Global Site","year":"2022","key":"ref221"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407030"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/acct.2012.48"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.3390\/math10081267"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.23919\/icact53585.2022.9728897"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/isea-isap54304.2021.9689715"},{"volume-title":"KDD Cup 1999 Data","year":"2022","key":"ref227"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/hsi.2018.8430788"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmrp.2019.04.001"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"ref231","article-title":"Explainable AI meets healthcare: A study on heart disease dataset","author":"Dave","year":"2020","journal-title":"arXiv:2011.03195"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2021.102233"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01201-2"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/isbi.2019.8759428"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2017.1600267cm"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3122019"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.5194\/acp-21-3919-2021"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.5194\/angeo-23-253-2005"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.3390\/math10091428"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3134787"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-020-00173-0"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040536"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolind.2021.108200"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2021.106290"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3086230"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113100"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.541"},{"key":"ref248","article-title":"Towards explainable artificial intelligence in banking and financial services","author":"Hanif","year":"2021","journal-title":"arXiv:2112.08441"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2020.1819668"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1145\/3328485"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1145\/3527174"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1145\/3369396"},{"key":"ref253","article-title":"Human-centered explainable AI (XAI): From algorithms to user experiences","author":"Liao","year":"2021","journal-title":"arXiv:2110.10790"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.4271\/11-01-02-0004"},{"key":"ref255","article-title":"Edge computing in transportation: Security issues and challenges","author":"Soni","year":"2020","journal-title":"arXiv:2012.11206"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/ccci52664.2021.9583190"},{"volume-title":"VeReMi dataset","year":"2022","key":"ref257"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2021.101647"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103018"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn48605.2020.9206780"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3115764"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102791"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375830"},{"volume-title":"How We Analyzed the COMPAS Recidivism Algorithm","year":"2022","author":"Mattu Julia Angwin","key":"ref264"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.24"},{"key":"ref266","article-title":"A study of the effect of JPG compression on adversarial images","author":"Karolina Dziugaite","year":"2016","journal-title":"arXiv:1608.00853"},{"key":"ref267","article-title":"DeepCloak: Masking deep neural network models for robustness against adversarial samples","author":"Gao","year":"2017","journal-title":"arXiv:1702.06763"},{"key":"ref268","article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","author":"Samangouei","year":"2018","journal-title":"arXiv:1805.06605"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04083-2_14"},{"key":"ref270","first-page":"20669","article-title":"Adaptive wavelet distillation from neural networks through interpretations","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Ha"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09875264.pdf?arnumber=9875264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T06:23:32Z","timestamp":1709360612000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9875264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":270,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3204051","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}