{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:07:05Z","timestamp":1742962025315,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666230"},{"type":"electronic","value":"9789811666247"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6624-7_50","type":"book-chapter","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T04:26:48Z","timestamp":1646022408000},"page":"501-509","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SafeXAI: Explainable AI to\u00a0Detect Adversarial Attacks in\u00a0Electronic Medical Records"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8700-0983","authenticated-orcid":false,"given":"Shymalagowri","family":"Selvaganapathy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6845-1869","authenticated-orcid":false,"given":"Sudha","family":"Sadasivam","sequence":"additional","affiliation":[]},{"given":"Naveen","family":"Raj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,28]]},"reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (sp), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"50_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2019.100006","volume":"2","author":"U Kartoun","year":"2019","unstructured":"Kartoun, U.: Advancing informatics with electronic medical records bots (emrbots). Softw. Impacts 2, 100006 (2019)","journal-title":"Softw. Impacts"},{"issue":"1","key":"50_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12916-019-1426-2","volume":"17","author":"CJ Kelly","year":"2019","unstructured":"Kelly, C.J., Karthikesalingam, A., Suleyman, M., Corrado, G., King, D.: Key challenges for delivering clinical impact with artificial intelligence. BMC Med. 17(1), 1\u20139 (2019)","journal-title":"BMC Med."},{"key":"50_CR4","unstructured":"Lipton, Z.C., Kale, D.C., Elkan, C., Wetzel, R.: Learning to diagnose with lstm recurrent neural networks. ArXiv preprint arXiv:1511.03677 (2015)"},{"key":"50_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2021","unstructured":"Ma, X., Niu, Y., Gu, L., Wang, Y., Zhao, Y., Bailey, J., Lu, F.: Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn. 110, 107332 (2021)","journal-title":"Pattern Recogn."},{"key":"50_CR6","unstructured":"Molnar, C.: Interpretable machine learning. Lulu, Com (2020)"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (Euro S&P), pp. 372\u2013387. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Swami, A., Harang, R.: Crafting adversarial input sequences for recurrent neural networks. In: MILCOM 2016-2016 IEEE Military Communications Conference, pp. 49\u201354. IEEE (2016)","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Rahman, A., Hossain, M.S., Alrajeh, N.A., Alsolami, F.: Adversarial examples\u2013security threats to covid-19 deep learning systems in medical iot devices. IEEE Internet Things J. (2020)","DOI":"10.1109\/JIOT.2020.3013710"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Why should i trust you? Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Wu, D., Fang, W., Zhang, Y., Yang, L., Luo, H., Ding, L., Xu, X., Yu, X.: Adversarial attacks and defenses in physiological computing: a systematic review. arXiv preprint arXiv:2102.02729 (2021)","DOI":"10.1360\/nso\/20220023"}],"container-title":["Smart Innovation, Systems and Technologies","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6624-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T00:44:52Z","timestamp":1674866692000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6624-7_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666230","9789811666247"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6624-7_50","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}