{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:15:24Z","timestamp":1728177324437},"reference-count":107,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["Discovery Horizons","Discovery grant"],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/tnsm.2023.3282740","type":"journal-article","created":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T17:53:08Z","timestamp":1685987588000},"page":"5115-5140","source":"Crossref","is-referenced-by-count":15,"title":["A Survey on Explainable Artificial Intelligence for Cybersecurity"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7282-0687","authenticated-orcid":false,"given":"Gaith","family":"Rjoub","sequence":"first","affiliation":[{"name":"King Hussein School of Computing Sciences, Princess Sumaya University for Technology, Amman, Jordan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3136-4849","authenticated-orcid":false,"given":"Jamal","family":"Bentahar","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3991-4673","authenticated-orcid":false,"given":"Omar","family":"Abdel Wahab","sequence":"additional","affiliation":[{"name":"Department of Computer and Software Engineering, Polytechnique Montréal, Montreal, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6915-3759","authenticated-orcid":false,"given":"Rabeb","family":"Mizouni","sequence":"additional","affiliation":[{"name":"Department of EECS, Center of Cyber-Physical Systems, Khalifa University, Abu Dhabi, UAE"}]},{"given":"Alyssa","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Waterloo, Waterloo, Canada"}]},{"given":"Robin","family":"Cohen","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Waterloo, Waterloo, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9574-5384","authenticated-orcid":false,"given":"Hadi","family":"Otrok","sequence":"additional","affiliation":[{"name":"Department of EECS, Center of Cyber-Physical Systems, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9434-5322","authenticated-orcid":false,"given":"Azzam","family":"Mourad","sequence":"additional","affiliation":[{"name":"Department of CSM, Cyber Security Systems and Applied AI Research Center, Lebanese American University, New York, NY, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jag.2022.102869"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/services55459.2022.00032"},{"issue":"4","key":"ref3","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1007\/s13347-020-00435-2","article-title":"What is interpretability?","volume":"34","author":"Erasmus","year":"2021","journal-title":"Philosophy Technol."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105730"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462799"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2975227"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.04.027"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16035-6_10"},{"key":"ref12","first-page":"100","article-title":"Quantitative group trust: A two-stage verification approach","volume-title":"Proc. 21st Int. Conf. Auton. Agents Multiagent Syst. (AAMAS)","author":"Bentahar"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111383"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114592"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s13218-020-00637-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2964537"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102791"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3015316"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2022.3216539"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2021.09.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027314"},{"key":"ref22","article-title":"XAI for cybersecurity: State of the art, challenges, open issues and future directions","author":"Srivastava","year":"2022","journal-title":"arXiv:2206.03585"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204171"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00926-7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204051"},{"key":"ref26","article-title":"Opportunities and challenges in explainable artificial intelligence (XAI): A survey","author":"Das","year":"2020","journal-title":"arXiv:2006.11371"},{"key":"ref27","article-title":"A survey of the state of explainable AI for natural language processing","author":"Danilevsky","year":"2020","journal-title":"arXiv:2010.00711"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2020.2983930"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1391"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3387166"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/e23010018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1424"},{"key":"ref33","volume-title":"VOSviewer Manual","author":"Van Eck","year":"2013"},{"key":"ref34","first-page":"3","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Lundberg"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114104"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103502"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10614-020-10042-0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97546-3_7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3527174"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3171613"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolind.2021.108200"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.010"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14302"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.07.008"},{"key":"ref46","article-title":"Model explainability in deep learning based natural language processing","author":"Gholizadeh","year":"2021","journal-title":"arXiv:2106.07410"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86517-7_16"},{"key":"ref48","article-title":"From \u2018where\u2019 to \u2018what\u2019: Towards human-understandable explanations through concept relevance propagation","author":"Achtibat","year":"2022","journal-title":"arXiv:2206.03208"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16535"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95116-0_1"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3084846"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3098157"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.12.007"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3122019"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115736"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3096824"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744938"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.14778\/3476311.3476345"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-021-01736-5"},{"key":"ref60","article-title":"xAI-GAN: Enhancing generative adversarial networks via explainable AI systems","author":"Nagisetty","year":"2020","journal-title":"arXiv:2002.10438"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3107056"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113941"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3397481.3450639"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-021-01758-3"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/make3030037"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.12.111"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462562"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2022.04.025"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE52308.2021.9635199"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2020.104041"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-03198-8"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2019.2934629"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"ref74","article-title":"Privacy meets explainability: A comprehensive impact benchmark","author":"Saifullah","year":"2022","journal-title":"arXiv:2211.04110"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3135933"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3058573"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-022-01078-1"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3173288"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/fuzz-ieee55066.2022.9882881"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87132-1_13"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287562"},{"key":"ref82","first-page":"601","article-title":"Stealing machine learning models via prediction {APIs}","volume-title":"Proc. 25th USENIX Security Symp. (USENIX Security)","author":"Tram\u00e8r"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462533"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5827"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074676"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65310-1_23"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-021-09542-6"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3126111"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206780"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC55113.2022.9824617"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16035-6_4"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14391-5_4"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CCCI52664.2021.9583190"},{"key":"ref94","article-title":"Internet of behavior (IoB) and explainable AI systems for influencing IoT behavior","author":"Elayan","year":"2021","journal-title":"arXiv:2109.07239"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3167005"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3029088"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.059"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3148331"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102198"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102641"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW52041.2021.00014"},{"key":"ref104","article-title":"Explainable black-box attacks against model-based authentication","author":"Garcia","year":"2018","journal-title":"arXiv:1810.00024"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.02.122"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16564-1_12"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00441-2"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10355751\/10143992.pdf?arnumber=10143992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T01:18:04Z","timestamp":1703035084000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10143992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":107,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2023.3282740","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}