{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T01:59:25Z","timestamp":1773021565096,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T00:00:00Z","timestamp":1660694400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T00:00:00Z","timestamp":1660694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100016999","name":"Western Norway University Of Applied Sciences","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100016999","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper introduces a novel and complete framework for solving different Internet of Things (IoT) applications, which explores eXplainable AI (XAI), deep learning, and evolutionary computation. The IoT data coming from different sensors is first converted into\u00a0an image database using the Gamian angular field. The images are trained using VGG16, where XAI technology and hyper-parameter optimization are introduced. Thus, analyzing the impact of the different input values in the output and understanding the different weights of a\u00a0deep learning model used in the learning process helps us to increase interpretation of the overall process of IoT systems. Extensive testing was conducted to demonstrate the performance of our developed model on two separate IoT datasets. Results show the efficiency of the proposed approach compared to the baseline approaches in terms of both runtime and accuracy.<\/jats:p>","DOI":"10.1007\/s10586-022-03659-3","type":"journal-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T20:02:35Z","timestamp":1660766555000},"page":"2313-2323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["When explainable AI meets IoT applications for supervised learning"],"prefix":"10.1007","volume":"26","author":[{"given":"Youcef","family":"Djenouri","sequence":"first","affiliation":[]},{"given":"Asma","family":"Belhadi","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8768-9709","authenticated-orcid":false,"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,17]]},"reference":[{"key":"3659_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107094","volume":"92","author":"JS Abbasi","year":"2021","unstructured":"Abbasi, J.S., Bashir, F., Qureshi, K.N., ul Islam, M.N., Jeon, G.: Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine. Comput. Electr. Eng. 92, 107094 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"3659_CR2","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: Ton_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020)","journal-title":"IEEE Access"},{"key":"3659_CR3","doi-asserted-by":"publisher","first-page":"8671","DOI":"10.1007\/s00521-021-06851-5","volume":"34","author":"HM Balaha","year":"2022","unstructured":"Balaha, H.M., Saif, M., Tamer, A., Abdelhay, E.H.: Hybrid deep learning and genetic algorithms approach (HMB-DLGAHA) for the early ultrasound diagnoses of breast cancer. Neural Comput. Appl. 34, 8671\u20138695 (2022)","journal-title":"Neural Comput. Appl."},{"key":"3659_CR4","doi-asserted-by":"publisher","first-page":"3252","DOI":"10.1007\/s10489-020-01716-1","volume":"50","author":"A Belhadi","year":"2020","unstructured":"Belhadi, A., Djenouri, Y., Djenouri, D., Lin, J.C.W.: A recurrent neural network for urban long-term traffic flow forecasting. Appl. Intell. 50, 3252\u20133265 (2020)","journal-title":"Appl. Intell."},{"key":"3659_CR5","doi-asserted-by":"publisher","first-page":"118708","DOI":"10.1109\/ACCESS.2021.3103897","volume":"9","author":"GS Bhat","year":"2021","unstructured":"Bhat, G.S., Shankar, N., Kim, D., Song, D.J., Seo, S., Panahi, I.M., Tamil, L.: Machine learning-based asthma risk prediction using IoT and smartphone applications. IEEE Access 9, 118708\u2013118715 (2021)","journal-title":"IEEE Access"},{"issue":"3","key":"3659_CR6","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21(3), 2671\u20132701 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3659_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2021.01.008","volume":"144","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Zheng, W., Li, W., Huang, Y.: Large group activity security risk assessment and risk early warning based on random forest algorithm. Pattern Recognit. Lett. 144, 1\u20135 (2021)","journal-title":"Pattern Recognit. Lett."},{"key":"3659_CR8","doi-asserted-by":"crossref","unstructured":"Choi, H., Yang, H., Lee, S., Seong, W.: Type\/position classification of inter-floor noise in residential buildings with a single microphone via supervised learning. In: 2020 28th European signal processing conference (EUSIPCO), pp. 86\u201390. IEEE (2021)","DOI":"10.23919\/Eusipco47968.2020.9287868"},{"key":"3659_CR9","doi-asserted-by":"publisher","first-page":"7979","DOI":"10.1007\/s00521-020-05542-x","volume":"33","author":"S Dami","year":"2021","unstructured":"Dami, S., Yahaghizadeh, M.: Predicting cardiovascular events with deep learning approach in the context of the internet of things. Neural Comput. Appl. 33, 7979\u20137996 (2021)","journal-title":"Neural Comput. Appl."},{"key":"3659_CR10","doi-asserted-by":"publisher","first-page":"7243","DOI":"10.1109\/JIOT.2021.3097379","volume":"9","author":"G Delnevo","year":"2021","unstructured":"Delnevo, G., Girau, R., Ceccarini, C., Prandi, C.: A deep learning and social IoT approach for plants disease prediction toward a sustainable agriculture. IEEE Internet Things J. 9, 7243\u20137250 (2021)","journal-title":"IEEE Internet Things J."},{"key":"3659_CR11","doi-asserted-by":"publisher","first-page":"10015","DOI":"10.1109\/ACCESS.2019.2891933","volume":"7","author":"Y Djenouri","year":"2019","unstructured":"Djenouri, Y., Belhadi, A., Lin, J.C.W., Cano, A.: Adapted k-nearest neighbors for detecting anomalies on spatio-temporal traffic flow. IEEE Access 7, 10015\u201310027 (2019)","journal-title":"IEEE Access"},{"key":"3659_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.08.043","volume":"420","author":"Y Djenouri","year":"2017","unstructured":"Djenouri, Y., Comuzzi, M.: Combining apriori heuristic and bio-inspired algorithms for solving the frequent itemsets mining problem. Inf. Sci. 420, 1\u201315 (2017)","journal-title":"Inf. Sci."},{"issue":"4","key":"3659_CR13","doi-asserted-by":"publisher","first-page":"2947","DOI":"10.1109\/TII.2020.3001493","volume":"17","author":"Y Djenouri","year":"2020","unstructured":"Djenouri, Y., Srivastava, G., Lin, J.C.W.: Fast and accurate convolution neural network for detecting manufacturing data. IEEE Trans. Ind. Inform. 17(4), 2947\u20132955 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"3659_CR14","doi-asserted-by":"crossref","unstructured":"Djenouri, Y., Zimek, A., Chiarandini, M.: Outlier detection in urban traffic flow distributions. In: 2018 IEEE international conference on data mining (ICDM), pp. 935\u2013940. IEEE (2018)","DOI":"10.1109\/ICDM.2018.00114"},{"key":"3659_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107784","volume":"186","author":"M Ge","year":"2021","unstructured":"Ge, M., Syed, N.F., Fu, X., Baig, Z., Robles-Kelly, A.: Towards a deep learning-driven intrusion detection approach for internet of things. Comput. Netw. 186, 107784 (2021)","journal-title":"Comput. Netw."},{"key":"3659_CR16","doi-asserted-by":"crossref","unstructured":"Harbi, Y., Aliouat, Z., Refoufi, A., Harous, S.: Recent security trends in internet of things: A comprehensive survey. IEEE Access (2021)","DOI":"10.1109\/ACCESS.2021.3103725"},{"key":"3659_CR17","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.patrec.2021.06.030","volume":"150","author":"M Ivanovs","year":"2021","unstructured":"Ivanovs, M., Kadikis, R., Ozols, K.: Perturbation-based methods for explaining deep neural networks: a survey. Pattern Recognit. Lett. 150, 228\u2013234 (2021)","journal-title":"Pattern Recognit. Lett."},{"key":"3659_CR18","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.compeleceng.2017.12.009","volume":"75","author":"B Jan","year":"2019","unstructured":"Jan, B., Farman, H., Khan, M., Imran, M., Islam, I.U., Ahmad, A., Ali, S., Jeon, G.: Deep learning in big data analytics: a comparative study. Comput. Electr. Eng. 75, 275\u2013287 (2019)","journal-title":"Comput. Electr. Eng."},{"key":"3659_CR19","doi-asserted-by":"crossref","unstructured":"Kan, C.N.E., Povinelli, R.J., Ye, D.H.: Enhancing multi-channel eeg classification with gramian temporal generative adversarial networks. In: ICASSP 2021-2021 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 1260\u20131264. IEEE (2021)","DOI":"10.1109\/ICASSP39728.2021.9414078"},{"issue":"1","key":"3659_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat, A., Alazab, A.: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4(1), 1\u201327 (2021)","journal-title":"Cybersecurity"},{"key":"3659_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2020.102231","volume":"63","author":"S Kilicarslan","year":"2021","unstructured":"Kilicarslan, S., Celik, M., Sahin, \u015e: Hybrid models based on genetic algorithm and deep learning algorithms for nutritional anemia disease classification. Biomed. Signal Process. Control 63, 102231 (2021)","journal-title":"Biomed. Signal Process. Control"},{"issue":"1","key":"3659_CR22","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s12065-019-00291-w","volume":"14","author":"V Kumar","year":"2021","unstructured":"Kumar, V., Das, A.K., Sinha, D.: Uids: a unified intrusion detection system for IoT environment. Evolut. Intell. 14(1), 47\u201359 (2021)","journal-title":"Evolut. Intell."},{"issue":"11","key":"3659_CR23","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1007\/s13042-020-01248-7","volume":"12","author":"DN Le","year":"2021","unstructured":"Le, D.N., Parvathy, V.S., Gupta, D., Khanna, A., Rodrigues, J.J., Shankar, K.: IoT enabled depthwise separable convolution neural network with deep support vector machine for covid-19 diagnosis and classification. Int. J. Mach. Learn. Cybern. 12(11), 3235\u20133248 (2021)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"2","key":"3659_CR24","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li, S., Da Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243\u2013259 (2015)","journal-title":"Inf. Syst. Front."},{"key":"3659_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106548","volume":"212","author":"JCW Lin","year":"2021","unstructured":"Lin, J.C.W., Shao, Y., Djenouri, Y., Yun, U.: ASRNN: a recurrent neural network with an attention model for sequence labeling. Knowl.-Based Syst. 212, 106548 (2021)","journal-title":"Knowl.-Based Syst."},{"issue":"7","key":"3659_CR26","doi-asserted-by":"publisher","first-page":"5340","DOI":"10.1109\/JIOT.2020.3032896","volume":"8","author":"JCW Lin","year":"2020","unstructured":"Lin, J.C.W., Srivastava, G., Zhang, Y., Djenouri, Y., Aloqaily, M.: Privacy-preserving multiobjective sanitization model in 6g IoT environments. IEEE Internet Things J. 8(7), 5340\u20135349 (2020)","journal-title":"IEEE Internet Things J."},{"key":"3659_CR27","unstructured":"Ma, S., Tourani, R.: Predictive and causal implications of using shapley value for model interpretation. In: Proceedings of the 2020 KDD workshop on causal discovery, pp. 23\u201338. PMLR (2020)"},{"issue":"3","key":"3659_CR28","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., Elovici, Y.: N-baiot: network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"issue":"3\u20134","key":"3659_CR29","first-page":"1","volume":"11","author":"S Mohseni","year":"2021","unstructured":"Mohseni, S., Zarei, N., Ragan, E.D.: A multidisciplinary survey and framework for design and evaluation of explainable AI systems. ACM Trans. Interact. Intell. Syst. (TiiS) 11(3\u20134), 1\u201345 (2021)","journal-title":"ACM Trans. Interact. Intell. Syst. (TiiS)"},{"key":"3659_CR30","doi-asserted-by":"publisher","first-page":"8202","DOI":"10.1109\/ACCESS.2020.2964280","volume":"8","author":"A Nauman","year":"2020","unstructured":"Nauman, A., Qadri, Y.A., Amjad, M., Zikria, Y.B., Afzal, M.K., Kim, S.W.: Multimedia internet of things: a comprehensive survey. IEEE Access 8, 8202\u20138250 (2020)","journal-title":"IEEE Access"},{"key":"3659_CR31","doi-asserted-by":"publisher","first-page":"7994","DOI":"10.1109\/ACCESS.2021.3049892","volume":"9","author":"Y Pan","year":"2021","unstructured":"Pan, Y., Yang, Y., Li, W.: A deep learning trained by genetic algorithm to improve the efficiency of path planning for data collection with multi-uav. IEEE Access 9, 7994\u20138005 (2021)","journal-title":"IEEE Access"},{"key":"3659_CR32","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.compeleceng.2019.08.001","volume":"78","author":"RM Prates","year":"2019","unstructured":"Prates, R.M., Cruz, R., Marotta, A.P., Ramos, R.P., Simas Filho, E.F., Cardoso, J.S.: Insulator visual non-conformity detection in overhead power distribution lines using deep learning. Comput. Electr. Eng. 78, 343\u2013355 (2019)","journal-title":"Comput. Electr. Eng."},{"key":"3659_CR33","doi-asserted-by":"publisher","first-page":"207426","DOI":"10.1109\/ACCESS.2020.3037971","volume":"8","author":"JS Rojas","year":"2020","unstructured":"Rojas, J.S., Pekar, A., Rend\u00f3n, \u00c1., Corrales, J.C.: Smart user consumption profiling: incremental learning-based ott service degradation. IEEE Access 8, 207426\u2013207442 (2020)","journal-title":"IEEE Access"},{"key":"3659_CR34","doi-asserted-by":"publisher","first-page":"12551","DOI":"10.1007\/s00500-021-06024-5","volume":"25","author":"SK Sharma","year":"2021","unstructured":"Sharma, S.K., Ahmed, S.S.: Iot-based analysis for controlling & spreading prediction of covid-19 in Saudi Arabia. Soft Comput. 25, 12551\u201312563 (2021)","journal-title":"Soft Comput."},{"issue":"3","key":"3659_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3190618","volume":"51","author":"K Sundararajan","year":"2018","unstructured":"Sundararajan, K., Woodard, D.L.: Deep learning for biometrics: a survey. ACM Comput. Surv. (CSUR) 51(3), 1\u201334 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"3659_CR36","doi-asserted-by":"publisher","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah, I., Mahmoud, Q.H.: Design and development of a deep learning-based model for anomaly detection in iot networks. IEEE Access 9, 103906\u2013103926 (2021)","journal-title":"IEEE Access"},{"key":"3659_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888921000011","author":"A Vassiliades","year":"2021","unstructured":"Vassiliades, A., Bassiliades, N., Patkos, T.: Argumentation and explainable artificial intelligence: a survey. Knowl. Eng. Rev. (2021). https:\/\/doi.org\/10.1017\/S0269888921000011","journal-title":"Knowl. Eng. Rev."},{"key":"3659_CR38","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/OJCS.2020.2993259","volume":"1","author":"Q Wu","year":"2020","unstructured":"Wu, Q., He, K., Chen, X.: Personalized federated learning for intelligent iot applications: a cloud-edge based framework. IEEE Open J. Comput. Soc. 1, 35\u201344 (2020)","journal-title":"IEEE Open J. Comput. Soc."},{"issue":"2","key":"3659_CR39","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1109\/TVT.2021.3051966","volume":"70","author":"L Xu","year":"2021","unstructured":"Xu, L., Yu, X., Gulliver, T.A.: Intelligent outage probability prediction for mobile iot networks based on an igwo-elman neural network. IEEE Trans. Veh. Technol. 70(2), 1365\u20131375 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"3659_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3401979","volume":"17","author":"X Xu","year":"2021","unstructured":"Xu, X., Fang, Z., Qi, L., Zhang, X., He, Q., Zhou, X.: Tripres: traffic flow prediction driven resource reservation for multimedia iov with edge computing. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 17(2), 1\u201321 (2021)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)"},{"issue":"6","key":"3659_CR41","doi-asserted-by":"publisher","first-page":"4259","DOI":"10.1007\/s10462-019-09792-7","volume":"53","author":"M Zhang","year":"2020","unstructured":"Zhang, M., Zhou, Y., Zhao, J., Man, Y., Liu, B., Yao, R.: A survey of semi-and weakly supervised semantic segmentation of images. Artif. Intell. Rev. 53(6), 4259\u20134288 (2020)","journal-title":"Artif. Intell. Rev."},{"key":"3659_CR42","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.future.2020.08.014","volume":"114","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Pan, J., Qi, L., He, Q.: Privacy-preserving quality prediction for edge-based iot services. Future Gener. Comput. Syst. 114, 336\u2013348 (2021)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03659-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03659-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03659-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T23:21:27Z","timestamp":1727824887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03659-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,17]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["3659"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03659-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,17]]},"assertion":[{"value":"11 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}