{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T05:03:39Z","timestamp":1750395819572,"version":"3.40.3"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031637995"},{"type":"electronic","value":"9783031638008"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63800-8_15","type":"book-chapter","created":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T23:03:55Z","timestamp":1720566235000},"page":"294-318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Differential Privacy for\u00a0Anomaly Detection: Analyzing the\u00a0Trade-Off Between Privacy and\u00a0Explainability"],"prefix":"10.1007","author":[{"given":"Fatima","family":"Ezzeddine","sequence":"first","affiliation":[]},{"given":"Mirna","family":"Saad","sequence":"additional","affiliation":[]},{"given":"Omran","family":"Ayoub","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Andreoletti","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Gjoreski","sequence":"additional","affiliation":[]},{"given":"Ihab","family":"Sbeity","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Langheinrich","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Giordano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Mahmood, A.N., Islam, Md.R.: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278\u2013288 (2016)","DOI":"10.1016\/j.future.2015.01.001"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Alabdulatif, A., Khalil, I., Kumarage, H., Zomaya, A.Y., Yi, X.: Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities. J. Parallel Distrib. Comput. 127, 209\u2013223 (2019)","DOI":"10.1016\/j.jpdc.2017.12.011"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Alharbi, B., Liang, Z., Aljindan, J.M., Agnia, A.K., Zhang, X.: Explainable and interpretable anomaly detection models for production data. SPE J. 27(01), 349\u2013363 (2022)","DOI":"10.2118\/208586-PA"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Angelini, F., Yan, J., Naqvi, S.M.: Privacy-preserving online human behaviour anomaly detection based on body movements and objects positions. In: ICASSP 2019 \u2013 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8444\u20138448. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683026"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: MVTec AD\u2013a comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9592\u20139600 (2019)","DOI":"10.1109\/CVPR.2019.00982"},{"issue":"6","key":"15_CR8","doi-asserted-by":"publisher","first-page":"125","DOI":"10.3390\/technologies10060125","volume":"10","author":"A Bozorgpanah","year":"2022","unstructured":"Bozorgpanah, A., Torra, V., Aliahmadipour, L.: Privacy and explainability: the effects of data protection on Shapley values. Technologies 10(6), 125 (2022)","journal-title":"Technologies"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: LoF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"issue":"3","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yeo, C.K., Lee, B.S., Lau, C.T.: Autoencoder-based network anomaly detection. In: 2018 Wireless Telecommunications Symposium (WTS), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/WTS.2018.8363930"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Chukkapalli, S.S.L., Ranade, P., Mittal, S., Joshi, A.: A privacy preserving anomaly detection framework for cooperative smart farming ecosystem. In: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 340\u2013347. IEEE (2021)","DOI":"10.1109\/TPSISA52974.2021.00037"},{"key":"15_CR13","unstructured":"de\u00a0Ara\u00fajo, F.M.N.: XAIPrivacy-XAI with Differential Privacy. Ph.D. thesis, Universidade do Porto (Portugal) (2023)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Degue, K.H., Gopalakrishnan, K., Li, M.Z., Balakrishnan, H.: Differentially private outlier detection in correlated data. In: 2021 60th IEEE Conference on Decision and Control (CDC), pp. 2735\u20132742. IEEE (2021)","DOI":"10.1109\/CDC45484.2021.9683118"},{"key":"15_CR15","unstructured":"Du, M., Jia, R., Song, D.: Robust anomaly detection and backdoor attack detection via differential privacy. arXiv preprint arXiv:1911.07116 (2019)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Ezzeddine, F., Ayoub, O., Andreoletti, D., Tornatore, M., Giordano, S.: Vertical split learning-based identification and explainable deep learning-based localization of failures in multi-domain NFV systems. In: 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 46\u201352. IEEE (2023)","DOI":"10.1109\/NFV-SDN59219.2023.10329604"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Giraldo, J., Cardenas, A., Kantarcioglu, M., Katz, J.: Adversarial classification under differential privacy. In: Network and Distributed Systems Security (NDSS) Symposium 2020 (2020)","DOI":"10.14722\/ndss.2020.23047"},{"issue":"5","key":"15_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2018","unstructured":"Guidotti, R., Monreale, A., Ruggieri, S., Turini, F., Giannotti, F., Pedreschi, D.: A survey of methods for explaining black box models. ACM Comput. Surv. (CSUR) 51(5), 1\u201342 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"9","key":"15_CR20","doi-asserted-by":"publisher","first-page":"3268","DOI":"10.1109\/TCSVT.2019.2929855","volume":"30","author":"J Guo","year":"2019","unstructured":"Guo, J., Zheng, P., Huang, J.: Efficient privacy-preserving anomaly detection and localization in bitstream video. IEEE Trans. Circuits Syst. Video Technol. 30(9), 3268\u20133281 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Harder, F., Bauer, M., Park, M.: Interpretable and differentially private predictions. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 4083\u20134090 (2020)","DOI":"10.1609\/aaai.v34i04.5827"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Ul Hassan, M., Rehmani, M.H., Chen, J.: Differential privacy in blockchain technology: a futuristic approach. J. Parallel Distrib. Comput. 145, 50\u201374 (2020)","DOI":"10.1016\/j.jpdc.2020.06.003"},{"key":"15_CR23","unstructured":"Jetchev, D., Vuille, M.: Xorshap: privacy-preserving explainable AI for decision tree models. Cryptology ePrint Archive (2023)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Jia, W., Shukla, R.M., Sengupta, S.: Anomaly detection using supervised learning and multiple statistical methods. In: 2019 18th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1291\u20131297. IEEE (2019)","DOI":"10.1109\/ICMLA.2019.00211"},{"issue":"1","key":"15_CR25","first-page":"108","volume":"35","author":"H Jiang","year":"2021","unstructured":"Jiang, H., Pei, J., Dongxiao, Yu., Jiguo, Yu., Gong, B., Cheng, X.: Applications of differential privacy in social network analysis: a survey. IEEE Trans. Knowl. Data Eng. 35(1), 108\u2013127 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"15_CR26","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TSUSC.2019.2906657","volume":"6","author":"M Keshk","year":"2019","unstructured":"Keshk, M., Sitnikova, E., Moustafa, N., Jiankun, H., Khalil, I.: An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans. Sustain. Comput. 6(1), 66\u201379 (2019)","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"15_CR27","unstructured":"Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-Eighth Australasian Conference on Computer Science, vol. 38, pp. 333\u2013342 (2005)"},{"issue":"1","key":"15_CR28","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/e23010018","volume":"23","author":"P Linardatos","year":"2020","unstructured":"Linardatos, P., Papastefanopoulos, V., Kotsiantis, S.: Explainable AI: a review of machine learning interpretability methods. Entropy 23(1), 18 (2020)","journal-title":"Entropy"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"15_CR30","unstructured":"Lundberg, S.M., Lee, S.-I.: A unified approach to interpreting model predictions. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Lyu, L., Law, Y.W., Erfani, S.M., Leckie, C., Palaniswami, M.: An improved scheme for privacy-preserving collaborative anomaly detection. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/PERCOMW.2016.7457159"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Ma, S., et al.: Privacy-preserving anomaly detection in cloud manufacturing via federated transformer. IEEE Trans. Ind. Inform. 18(12), 8977\u20138987 (2022)","DOI":"10.1109\/TII.2022.3167478"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Mariotti, E., Alonso-Moral, J.M., Gatt, A.: Measuring model understandability by means of Shapley additive explanations. In: 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1\u20138. IEEE (2022)","DOI":"10.1109\/FUZZ-IEEE55066.2022.9882773"},{"key":"15_CR34","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-031-44064-9_10","volume-title":"Explainable Artificial Intelligence - xAI 2023","author":"E Mariotti","year":"2023","unstructured":"Mariotti, E., Sivaprasad, A., Moral, J.M.A.: Beyond prediction similarity: Shapgap for evaluating faithful surrogate models in XAI. In: Longo, L. (ed.) xAI 2023. CCIS, vol. 1901, pp. 160\u2013173. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-44064-9_10"},{"key":"15_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-030-49669-2_11","volume-title":"Data and Applications Security and Privacy XXXIV","author":"R Mayer","year":"2020","unstructured":"Mayer, R., Hittmeir, M., Ekelhart, A.: Privacy-preserving anomaly detection using synthetic data. In: Singhal, A., Vaidya, J. (eds.) DBSec 2020. LNCS, vol. 12122, pp. 195\u2013207. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49669-2_11"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Mehnaz, S., Bertino, E.: Privacy-preserving real-time anomaly detection using edge computing. In: 2020 IEEE 36th International Conference on Data Engineering (ICDE), pp. 469\u2013480. IEEE (2020)","DOI":"10.1109\/ICDE48307.2020.00047"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Montenegro, H., Silva, W., Cardoso, J.S.: Privacy-preserving generative adversarial network for case-based explainability in medical image analysis. IEEE Access 9, 148037\u2013148047 (2021)","DOI":"10.1109\/ACCESS.2021.3124844"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Munir, M., Siddiqui, S.A., Dengel, A., Ahmed, S.: Deepant: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7, 1991\u20132005 (2018)","DOI":"10.1109\/ACCESS.2018.2886457"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Muruti, G., Rahim, F.A., bin Ibrahim, Z.-A., A survey on anomalies detection techniques and measurement methods. In: 2018 IEEE Conference on Application, Information and Network Security (AINS), pp. 81\u201386. IEEE (2018)","DOI":"10.1109\/AINS.2018.8631436"},{"key":"15_CR40","unstructured":"Naidu, R., Priyanshu, A., Kumar, A., Kotti, S., Wang, H., Mireshghallah, F.: When differential privacy meets interpretability: a case study. arXiv preprint arXiv:2106.13203 (2021)"},{"key":"15_CR41","unstructured":"Nori, H., Caruana, R., Bu, Z., Shen, J.H., Kulkarni, J.: Accuracy, interpretability, and differential privacy via explainable boosting. In: International Conference on Machine Learning, pp. 8227\u20138237. PMLR (2021)"},{"key":"15_CR42","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/978-3-319-23525-7_28","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"R Okada","year":"2015","unstructured":"Okada, R., Fukuchi, K., Sakuma, J.: Differentially private analysis of outliers. In: Appice, A., Rodrigues, P.P., Santos Costa, V., Gama, J., Jorge, A., Soares, C. (eds.) ECML PKDD 2015. LNCS (LNAI), vol. 9285, pp. 458\u2013473. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23525-7_28"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., van\u00a0den Hengel, A.: Deep anomaly detection with deviation networks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and data mining, pp. 353\u2013362 (2019)","DOI":"10.1145\/3292500.3330871"},{"issue":"5","key":"15_CR44","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1007\/s00778-021-00721-1","volume":"31","author":"E Panjei","year":"2022","unstructured":"Panjei, E., Gruenwald, L., Leal, E., Nguyen, C., Silvia, S.: A survey on outlier explanations. VLDB J. 31(5), 977\u20131008 (2022)","journal-title":"VLDB J."},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Ravi, A., Yu, X., Santelices, I., Karray, F., Fidan, B.: General frameworks for anomaly detection explainability: comparative study. In: 2021 IEEE International Conference on Autonomous Systems (ICAS), pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/ICAS49788.2021.9551129"},{"key":"15_CR46","doi-asserted-by":"crossref","unstructured":"Roshan, K., Zafar, A.: Utilizing xAI technique to improve autoencoder based model for computer network anomaly detection with Shapley additive explanation (Shap). arXiv preprint arXiv:2112.08442 (2021)","DOI":"10.5121\/ijcnc.2021.13607"},{"key":"15_CR47","doi-asserted-by":"crossref","unstructured":"Roshan, K., Zafar, A.: Using kernel Shap xAI method to optimize the network anomaly detection model. In: 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), pp. 74\u201380. IEEE (2022)","DOI":"10.23919\/INDIACom54597.2022.9763241"},{"key":"15_CR48","doi-asserted-by":"crossref","unstructured":"Sridharan, R., Maiti, R.R., Tippenhauer, N.O.: Wadac: privacy-preserving anomaly detection and attack classification on wireless traffic. In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 51\u201362 (2018)","DOI":"10.1145\/3212480.3212495"},{"key":"15_CR49","doi-asserted-by":"publisher","first-page":"1099521","DOI":"10.3389\/frai.2023.1099521","volume":"6","author":"J Tritscher","year":"2023","unstructured":"Tritscher, J., Krause, A., Hotho, A.: Feature relevance xAI in anomaly detection: Reviewing approaches and challenges. Front. Artif. Intell. 6, 1099521 (2023)","journal-title":"Front. Artif. Intell."},{"issue":"4","key":"15_CR50","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3390\/cryptography6040054","volume":"6","author":"T Veugen","year":"2022","unstructured":"Veugen, T., Kamphorst, B., Marcus, M.: Privacy-preserving contrastive explanations with local foil trees. Cryptography 6(4), 54 (2022)","journal-title":"Cryptography"},{"key":"15_CR51","doi-asserted-by":"crossref","unstructured":"Woods, K.S., Doss, C.C., Bowyer, K.W., Solka, J.L., Priebe, C.E., Kegelmeyer\u00a0Jr., W.P.: Comparative evaluation of pattern recognition techniques for detection of microcalcifications in mammography. Int. J. Pattern Recogn. Artif. Intell. 7(06), 1417\u20131436 (1993)","DOI":"10.1142\/S0218001493000698"},{"key":"15_CR52","unstructured":"Yang, M., Song, L., Xu, J., Li, C., Tan, G.: The tradeoff between privacy and accuracy in anomaly detection using federated XGBoost. arXiv preprint arXiv:1907.07157 (2019)"},{"key":"15_CR53","unstructured":"Yuan, S., Wu, X.: Trustworthy anomaly detection: a survey. arXiv preprint arXiv:2202.07787 (2022)"},{"key":"15_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, P., Huang, X., Sun, X., Wang, H., Ma, Y.: Privacy-preserving anomaly detection across multi-domain networks. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp. 1066\u20131070. IEEE (2012)","DOI":"10.1109\/FSKD.2012.6234272"},{"key":"15_CR55","unstructured":"Zhang, Z., et al.: $$\\{$$PrivSyn$$\\}$$: differentially private data synthesis. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 929\u2013946 (2021)"},{"key":"15_CR56","unstructured":"Zong, B., et al.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection, In: International Conference on Learning Representations (2018)"}],"container-title":["Communications in Computer and Information Science","Explainable Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63800-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T23:14:56Z","timestamp":1720566896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63800-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031637995","9783031638008"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63800-8_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"xAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Explainable Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"xai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/xaiworldconference.com\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}