{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T15:27:24Z","timestamp":1775575644640,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T00:00:00Z","timestamp":1743206400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T00:00:00Z","timestamp":1743206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72401232"],"award-info":[{"award-number":["72401232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10489-025-06488-0","type":"journal-article","created":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T22:40:55Z","timestamp":1744065655000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["COFA: counterfactual attention framework for trustworthy wafer map failure classification"],"prefix":"10.1007","volume":"55","author":[{"given":"Kaiyue","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3165-7051","authenticated-orcid":false,"given":"Jia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chenke","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Andong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,29]]},"reference":[{"issue":"1","key":"6488_CR1","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.eswa.2006.04.014","volume":"33","author":"C-F Chien","year":"2007","unstructured":"Chien C-F, Wang W-C, Cheng J-C (2007) Data mining for yield enhancement in semiconductor manufacturing and an empirical study. Expert Syst Appl 33(1):192\u2013198","journal-title":"Expert Syst Appl"},{"issue":"15","key":"6488_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/app10155340","volume":"10","author":"J-C Chien","year":"2020","unstructured":"Chien J-C, Wu M-T, Lee J-D (2020) Inspection and classification of semiconductor wafer surface defects using cnn deep learning networks. Appl Sci 10(15):40\u201353","journal-title":"Appl Sci"},{"key":"6488_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.ins.2019.11.040","volume":"513","author":"S Pei","year":"2020","unstructured":"Pei S, Shen T, Wang X, Gu C, Ning Z, Ye X, Xiong N (2020) 3dacn: 3d augmented convolutional network for time series data. Inf Sci 513:17\u201329","journal-title":"Inf Sci"},{"key":"6488_CR4","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.ins.2022.03.082","volume":"600","author":"M Zhao","year":"2022","unstructured":"Zhao M, Yang J, Zhang J, Wang S (2022) Aggregated graph convolutional networks for aspect-based sentiment classification. Inf Sci 600:73\u201393","journal-title":"Inf Sci"},{"key":"6488_CR5","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.engfailanal.2021.105756","volume":"130","author":"S Chen","year":"2021","unstructured":"Chen S, Zhang Y, Yi M, Shang Y, Yang P (2021) Ai classification of wafer map defect patterns by using dual-channel convolutional neural network. Eng Fail Anal 130:105\u2013756","journal-title":"Eng Fail Anal"},{"key":"6488_CR6","first-page":"3","volume":"27","author":"V Mnih","year":"2014","unstructured":"Mnih V, Heess N, Graves A et al (2014) Recurrent models of visual attention. Adv Neural Inf Process Syst 27:3\u201319","journal-title":"Adv Neural Inf Process Syst"},{"key":"6488_CR7","doi-asserted-by":"publisher","first-page":"144352","DOI":"10.1109\/ACCESS.2021.3119110","volume":"9","author":"D Fryer","year":"2021","unstructured":"Fryer D, Str\u00fcmke I, Nguyen H (2021) Shapley values for feature selection: the good, the bad, and the axioms. IEEE Access 9:144352\u2013144360","journal-title":"IEEE Access"},{"key":"6488_CR8","doi-asserted-by":"publisher","first-page":"109966","DOI":"10.1016\/j.ress.2024.109966","volume":"244","author":"Z Zhao","year":"2024","unstructured":"Zhao Z, Wang J, Tao Q, Li A, Chen Y (2024) An unknown wafer surface defect detection approach based on incremental learning for reliability analysis. Reliab Eng Syst Saf 244:109966","journal-title":"Reliab Eng Syst Saf"},{"key":"6488_CR9","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"6488_CR10","first-page":"5","volume":"31","author":"J Hu","year":"2018","unstructured":"Hu J, Shen L, Albanie S, Sun G, Vedaldi A (2018) Gather-excite: Exploiting feature context in convolutional neural networks. Adv Neural Inf Process Syst 31:5\u201325","journal-title":"Adv Neural Inf Process Syst"},{"key":"6488_CR11","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, Dehghani M, Minderer M, Heigold G, Gelly S, et al (2020) An image is worth 16x16 words: transformers for image recognition at scale. pp 3\u201319. arXiv:2010.11929"},{"key":"6488_CR12","doi-asserted-by":"publisher","first-page":"11974","DOI":"10.1109\/ACCESS.2021.3051315","volume":"9","author":"I Stepin","year":"2021","unstructured":"Stepin I, Alonso JM, Catala A, Pereira-Fari\u00f1a M (2021) A survey of contrastive and counterfactual explanation generation methods for explainable artificial intelligence. IEEE Access 9:11974\u201312001","journal-title":"IEEE Access"},{"key":"6488_CR13","unstructured":"Chen Z, Silvestri F, Tolomei G, Wang J, Zhu H, Ahn H (2022) Explain the explainer: Interpreting model-agnostic counterfactual explanations of a deep reinforcement learning agent. IEEE Trans Artif Intell 530\u2013564"},{"key":"6488_CR14","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1155\/2015\/707358","volume":"2015","author":"C-Y Hsu","year":"2015","unstructured":"Hsu C-Y et al (2015) Clustering ensemble for identifying defective wafer bin map in semiconductor manufacturing. Math Probl Eng 2015:530\u2013564","journal-title":"Math Probl Eng"},{"key":"6488_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.06.056","volume":"465","author":"G Douzas","year":"2018","unstructured":"Douzas G, Bacao F, Last F (2018) Improving imbalanced learning through a heuristic oversampling method based on k-means and smote. Inf Sci 465:1\u201320","journal-title":"Inf Sci"},{"key":"6488_CR16","doi-asserted-by":"crossref","unstructured":"Ikotun AM, Ezugwu AE, Abualigah L, Abuhaija B, Heming J (2022) K-means clustering algorithms: a comprehensive review, variants analysis, and advances in the era of big data. Inform Sci","DOI":"10.1016\/j.ins.2022.11.139"},{"issue":"4","key":"6488_CR17","first-page":"530","volume":"26","author":"X Lu-Ning","year":"2009","unstructured":"Lu-Ning X, Ji-Wu J (2009) Sa-dbscan: a self-adaptive density-based clustering algorithm. J Univ Chinese Acad Sci 26(4):530\u2013564","journal-title":"J Univ Chinese Acad Sci"},{"issue":"2","key":"6488_CR18","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TSM.2018.2806931","volume":"31","author":"M Piao","year":"2018","unstructured":"Piao M, Jin CH, Lee JY, Byun J-Y (2018) Decision tree ensemble-based wafer map failure pattern recognition based on radon transform-based features. IEEE Trans Semicond Manuf 31(2):250\u2013257","journal-title":"IEEE Trans Semicond Manuf"},{"issue":"3","key":"6488_CR19","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1109\/TASE.2013.2277603","volume":"11","author":"C-S Liao","year":"2013","unstructured":"Liao C-S, Hsieh T-J, Huang Y-S, Chien C-F (2013) Similarity searching for defective wafer bin maps in semiconductor manufacturing. IEEE Trans Autom Sci Eng 11(3):953\u2013960","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"6488_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.cie.2022.107977","volume":"166","author":"S Yoon","year":"2022","unstructured":"Yoon S, Kang S (2022) Semi-automatic wafer map pattern classification with convolutional neural networks. Comput Ind Eng 166:107\u2013977","journal-title":"Comput Ind Eng"},{"key":"6488_CR21","doi-asserted-by":"crossref","unstructured":"Piao M et al (2023) Analysis of image hashing in wafer map failure pattern recognition. IEEE Trans Semicond Manuf 15\u201336","DOI":"10.1109\/TSM.2023.3273810"},{"key":"6488_CR22","doi-asserted-by":"crossref","unstructured":"Pandey C, Bhat KG (2023) An efficient ai-based classification of semiconductor wafer defects using an optimized cnn model. In: 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET). IEEE, pp 1\u20139","DOI":"10.1109\/GlobConET56651.2023.10150199"},{"key":"6488_CR23","doi-asserted-by":"crossref","unstructured":"Maksim K, Kirill B, Eduard Z, Nikita G, Aleksandr B, Arina L, Vladislav S, Daniil M, Nikolay K (2019) Classification of wafer maps defect based on deep learning methods with small amount of data. In: 2019 International conference on engineering and telecommunication (EnT). IEEE, pp 1\u20135","DOI":"10.1109\/EnT47717.2019.9030550"},{"key":"6488_CR24","doi-asserted-by":"crossref","unstructured":"Batool U, Shapiai MI, Fauzi H, Fong JX (2020) Convolutional neural network for imbalanced data classification of silicon wafer defects. In: 2020 16th IEEE international Colloquium on Signal Processing & Its Applications (CSPA). IEEE, pp 230\u2013235","DOI":"10.1109\/CSPA48992.2020.9068669"},{"issue":"4","key":"6488_CR25","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TSM.2019.2937793","volume":"32","author":"N Yu","year":"2019","unstructured":"Yu N, Xu Q, Wang H (2019) Wafer defect pattern recognition and analysis based on convolutional neural network. IEEE Trans Semicond Manuf 32(4):566\u2013573","journal-title":"IEEE Trans Semicond Manuf"},{"key":"6488_CR26","doi-asserted-by":"crossref","unstructured":"Chen S, Liu M, Hou X, Zhu Z, Huang Z, Wang T (2023) Wafer map defect pattern detection method based on improved attention mechanism. Expert Syst Appl 120\u2013544","DOI":"10.2139\/ssrn.4341589"},{"key":"6488_CR27","doi-asserted-by":"crossref","unstructured":"Wang Y, Ni D (2023) A deep learning analysis framework for complex wafer bin map classification. IEEE Trans Semicond Manuf 53\u201364","DOI":"10.1109\/TSM.2023.3269230"},{"key":"6488_CR28","first-page":"530","volume":"28","author":"M Jaderberg","year":"2015","unstructured":"Jaderberg M, Simonyan K, Zisserman A et al (2015) Spatial transformer networks. Adv Neural Inf Process Syst 28:530\u2013564","journal-title":"Adv Neural Inf Process Syst"},{"key":"6488_CR29","doi-asserted-by":"crossref","unstructured":"Wang Q, Wu B, Zhu P, Li P, Zuo W, Hu Q (2020) Eca-net: Efficient channel attention for deep convolutional neural networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp 11534\u201311542","DOI":"10.1109\/CVPR42600.2020.01155"},{"key":"6488_CR30","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee J-Y, Kweon IS (2018) Cbam: Convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV). pp 3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"issue":"5","key":"6488_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2018","unstructured":"Guidotti R, Monreale A, Ruggieri S, Turini F, Giannotti F, Pedreschi D (2018) A survey of methods for explaining black box models. ACM Comput Surv 51(5):1\u201342","journal-title":"ACM Comput Surv"},{"issue":"6","key":"6488_CR32","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/0950-7051(96)81920-4","volume":"8","author":"R Andrews","year":"1995","unstructured":"Andrews R, Diederich J, Tickle AB (1995) Survey and critique of techniques for extracting rules from trained artificial neural networks. Knowl-Based Syst 8(6):373\u2013389","journal-title":"Knowl-Based Syst"},{"key":"6488_CR33","first-page":"530","volume":"8","author":"M Craven","year":"1995","unstructured":"Craven M, Shavlik J (1995) Extracting tree-structured representations of trained networks. Adv Neural Inf Process Syst 8:530\u2013564","journal-title":"Adv Neural Inf Process Syst"},{"key":"6488_CR34","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \" why should i trust you?\" explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. pp 1135\u20131144","DOI":"10.1145\/2939672.2939778"},{"key":"6488_CR35","first-page":"556","volume":"30","author":"SM Lundberg","year":"2017","unstructured":"Lundberg SM, Lee S-I (2017) A unified approach to interpreting model predictions. Adv Neural Inf Process Syst 30:556\u2013564","journal-title":"Adv Neural Inf Process Syst"},{"key":"6488_CR36","first-page":"841","volume":"31","author":"S Wachter","year":"2017","unstructured":"Wachter S, Mittelstadt B, Russell C (2017) Counterfactual explanations without opening the black box: automated decisions and the gdpr. Harv JL Tech 31:841","journal-title":"Harv JL Tech"},{"key":"6488_CR37","first-page":"3","volume":"31","author":"A Dhurandhar","year":"2018","unstructured":"Dhurandhar A, Chen P-Y, Luss R, Tu C-C, Ting P, Shanmugam K, Das P (2018) Explanations based on the missing: Towards contrastive explanations with pertinent negatives. Adv Neural Inf Process Syst 31:3\u201319","journal-title":"Adv Neural Inf Process Syst"},{"key":"6488_CR38","doi-asserted-by":"crossref","unstructured":"Van Looveren A, Klaise J (2021) Interpretable counterfactual explanations guided by prototypes. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 650\u2013665","DOI":"10.1007\/978-3-030-86520-7_40"},{"key":"6488_CR39","unstructured":"Mahajan D, Tan C, Sharma A (2019) Preserving causal constraints in counterfactual explanations for machine learning classifiers. pp 530\u2013564. arXiv:1912.03277"},{"key":"6488_CR40","unstructured":"Samoilescu R-F, Van Looveren A, Klaise J (2021) Model-agnostic and scalable counterfactual explanations via reinforcement learning. Age 40\u201345"},{"key":"6488_CR41","unstructured":"Sharma S, Henderson J, Ghosh J (2019) Certifai: Counterfactual explanations for robustness, transparency, interpretability, and fairness of artificial intelligence models. pp 5\u201325. arXiv:1905.07857"},{"issue":"2","key":"6488_CR42","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1111\/j.1467-9868.2005.00503.x","volume":"67","author":"H Zou","year":"2005","unstructured":"Zou H, Hastie T (2005) Regularization and variable selection via the elastic net. J R Stat Soc Ser B Stat Methodol 67(2):301\u2013320","journal-title":"J R Stat Soc Ser B Stat Methodol"},{"issue":"1","key":"6488_CR43","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1137\/080716542","volume":"2","author":"A Beck","year":"2009","unstructured":"Beck A, Teboulle M (2009) A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIAM J Imag Sci 2(1):183\u2013202","journal-title":"SIAM J Imag Sci"},{"key":"6488_CR44","doi-asserted-by":"crossref","unstructured":"Wu M-J, Jang J-SR, Chen J-L (2014) Wafer map failure pattern recognition and similarity ranking for large-scale data sets. IEEE Trans Semicond Manuf 28(1):1\u201312","DOI":"10.1109\/TSM.2014.2364237"},{"issue":"4","key":"6488_CR45","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TSM.2020.3020985","volume":"33","author":"J Wang","year":"2020","unstructured":"Wang J, Xu C, Yang Z, Zhang J, Li X (2020) Deformable convolutional networks for efficient mixed-type wafer defect pattern recognition. IEEE Trans Semicond Manuf 33(4):587\u2013596","journal-title":"IEEE Trans Semicond Manuf"},{"issue":"3","key":"6488_CR46","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1049\/cit2.12126","volume":"8","author":"N Yu","year":"2023","unstructured":"Yu N, Chen H, Xu Q, Hasan MM, Sie O (2023) Wafer map defect patterns classification based on a lightweight network and data augmentation. CAAI Trans Intell Technol 8(3):1029\u20131042","journal-title":"CAAI Trans Intell Technol"},{"key":"6488_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2024.3374295","volume":"73","author":"Z Yi","year":"2024","unstructured":"Yi Z, Shang W, Wang D, Yin M, Chen C, Feng W, Wu X (2024) Large-margin extreme learning machines with hybrid features for wafer map defect recognition. IEEE Trans Instrum Meas 73:1\u201310. https:\/\/doi.org\/10.1109\/TIM.2024.3374295","journal-title":"IEEE Trans Instrum Meas"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06488-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06488-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06488-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T19:32:12Z","timestamp":1758310332000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06488-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,29]]},"references-count":47,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["6488"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06488-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,29]]},"assertion":[{"value":"18 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict\/Competing Interests"}},{"value":"We the undersigned declare that this manuscript entitled \u201cCOFA: Counterfactual Attention Framework for Trustworthy Wafer Map Failure Classification\u201d is original, has not been published before, and is not currently being considered for publication elsewhere. We confirm that the manuscript has been read and approved by all named authors and that there are no other persons who satisfied the criteria for authorship but are not listed. We further confirm that the order of authors listed in the manuscript has been approved by all of us. We understand that the Corresponding Author is the sole contact for the Editorial process. She is responsible for communicating with the other authors about progress, submissions of revisions, and final approval of proofs. Signed by all authors as follows: Kaiyue Feng, Jia Wang, Chenke Yin, and Andong Li. The corresponding author is Jia Wang and her email address is jia.wang02@xjtlu.edu.cn.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"We would like to be considered for publication in Applied Intelligence. No conflict of interest exists in the submission of this manuscript, and the manuscript is approved by all authors for publication. We declare the work described was original research that has not been published previously and is not under consideration for publication elsewhere, in whole or in part. All the authors listed have approved the manuscript that is enclosed. We hope this paper is suitable for Applied Intelligence. If have any queries, please don\u2019t hesitate to contact the corresponding author Jia Wang.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials Availability"}}],"article-number":"598"}}