{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:06:54Z","timestamp":1758265614354,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["HRD-1736209"],"award-info":[{"award-number":["HRD-1736209"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["CNS-1553696"],"award-info":[{"award-number":["CNS-1553696"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"DOI":"10.1007\/s10796-022-10330-0","type":"journal-article","created":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T09:03:27Z","timestamp":1663578207000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Visualizing Convolutional Neural Network Models\u2019 Sensitivity to Nonnatural Data Order"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6473-9061","authenticated-orcid":false,"given":"Randy","family":"Klepetko","sequence":"first","affiliation":[]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Abdelsalem, M., Krishnan, R., Huang, Y., & Sandu, R. (2018). Malware detection in cloud infrastructure using convolutional neural networks. In IEE 11th International conference on cloud computing.","key":"10330_CR1","DOI":"10.1109\/CLOUD.2018.00028"},{"doi-asserted-by":"publisher","unstructured":"Avula, S. B., Badri, S. J., & Reddy P. G. (2020). A novel forest fire detection system using fuzzy entropy optimized thresholding and stn-based cnn. In 2020 International Conference on COMmunication Systems NETworkS (COMSNETS). (pp. 750\u2013755).\u00a0https:\/\/doi.org\/10.1109\/COMSNETS48256.2020.9027347.","key":"10330_CR2","DOI":"10.1109\/COMSNETS48256.2020.9027347"},{"doi-asserted-by":"publisher","unstructured":"Chattopadhay, A., Sarkar, A., Howlader, P., & Balasubramanian, V. N. (2018). Grad-cam++: Generalized gradient-based visual explanations for deep convolutional networks. In 2018 IEEE Winter conference on applications of computer vision (WACV). https:\/\/doi.org\/10.1109\/wacv.2018.00097.","key":"10330_CR3","DOI":"10.1109\/wacv.2018.00097"},{"doi-asserted-by":"crossref","unstructured":"Chollet, F. (2017). Xception: Deep learning with depthwise separable convolutions.","key":"10330_CR4","DOI":"10.1109\/CVPR.2017.195"},{"doi-asserted-by":"publisher","unstructured":"Deng, L., Hinton, G., & Kingsbury, B. (2013). New types of deep neural network learning for speech recognition and related applications: an overview. In 2013 IEEE International conference on acoustics, speech and signal processing\u00a0(pp. 8599\u20138603).\u00a0https:\/\/doi.org\/10.1109\/ICASSP.2013.6639344.","key":"10330_CR5","DOI":"10.1109\/ICASSP.2013.6639344"},{"doi-asserted-by":"publisher","unstructured":"Elhassouny, A., & Smarandache, F. (2019). Trends in deep convolutional neural networks architectures: a review. In 2019 International conference of computer science and renewable energies (ICCSRE)\u00a0(pp. 1\u20138).\u00a0https:\/\/doi.org\/10.1109\/ICCSRE.2019.8807741.","key":"10330_CR6","DOI":"10.1109\/ICCSRE.2019.8807741"},{"issue":"3","key":"10330_CR7","first-page":"1","volume":"1341","author":"D Erhan","year":"2009","unstructured":"Erhan, D., Bengio, Y., Courville, A., & Vincent, P. (2009). Visualizing higher-layer features of a deep network. University of Montreal, 1341(3), 1.","journal-title":"University of Montreal"},{"doi-asserted-by":"publisher","unstructured":"Golinko, E., Sonderman, T., & Zhu, X. (2018). Learning convolutional neural networks from ordered features of generic data. In 2018 17th IEEE international conference on machine learning and applications (ICMLA) (pp. 897\u2013900). https:\/\/doi.org\/10.1109\/ICMLA.2018.00145","key":"10330_CR8","DOI":"10.1109\/ICMLA.2018.00145"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2015). Deep residual learning for image recognition. arXiv:1512.03385.","key":"10330_CR9","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2015). Deep residual learning for image recognition.","key":"10330_CR10","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2015). Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In The IEEE International conference on computer vision (ICCV).","key":"10330_CR11","DOI":"10.1109\/ICCV.2015.123"},{"unstructured":"Howard, A. G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., Weyand, T., Andreetto, M., & Adam, H. (2017). Mobilenets: Efficient convolutional neural networks for mobile vision applications.","key":"10330_CR12"},{"doi-asserted-by":"publisher","unstructured":"Hu, Y., Zhang, D., Cao, G., & Pan, Q. (2019). Network data analysis and anomaly detection using cnn technique for industrial control systems security. In 2019 IEEE International conference on systems, man and cybernetics (SMC).\u00a0(pp. 593\u2013597). https:\/\/doi.org\/10.1109\/SMC.2019.891389","key":"10330_CR13","DOI":"10.1109\/SMC.2019.891389"},{"doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., van der Maaten, L., & Weinberger, K. Q. (2018). Densely connected convolutional networks.","key":"10330_CR14","DOI":"10.1109\/CVPR.2017.243"},{"doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., & Weinberger, K. Q. (2016). Densely connected convolutional networks. arXiv:1608.06993.","key":"10330_CR15","DOI":"10.1109\/CVPR.2017.243"},{"doi-asserted-by":"crossref","unstructured":"Jiang, W., & Bruton, L. (1999). Lossless color image compression using chromatic correlation. In Proceedings DCC\u201999 data compression conference (Cat. No. PR00096) (pp. 533\u2013).","key":"10330_CR16","DOI":"10.1109\/DCC.1999.785690"},{"key":"10330_CR17","doi-asserted-by":"publisher","first-page":"68066","DOI":"10.1109\/ACCESS.2021.3077498","volume":"9","author":"JC Kimmel","year":"2021","unstructured":"Kimmel, J. C., Mcdole, A. D., Abdelsalam, M., Gupta, M., & Sandhu, R. (2021). Recurrent neural networks based online behavioural malware detection techniques for cloud infrastructure. IEEE Access, 9, 68066\u201368080. https:\/\/doi.org\/10.1109\/ACCESS.2021.3077498.","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Klepetko, R., & Krishnan, R. (2019). Analyzing cnn model performance sensitivity to the ordering of non-natural data. In 2019 4th International conference on computing, communications and security (ICCCS) (pp. 1\u20138). https:\/\/doi.org\/10.1109\/CCCS.2019.8888041.","key":"10330_CR18","DOI":"10.1109\/CCCS.2019.8888041"},{"doi-asserted-by":"crossref","unstructured":"Lee, J. Y., & Dernoncourt, F. (2016). Sequential short-text classification with recurrent and convolutional neural networks. arXiv:1603.03827.","key":"10330_CR19","DOI":"10.18653\/v1\/N16-1062"},{"doi-asserted-by":"publisher","unstructured":"Lihao, W., & Yanni, D. (2018). A fault diagnosis method of tread production line based on convolutional neural network. In 2018 IEEE 9th International conference on software engineering and service science (ICSESS)\u00a0(pp. 987\u2013990).\u00a0https:\/\/doi.org\/10.1109\/ICSESS.2018.8663824.","key":"10330_CR20","DOI":"10.1109\/ICSESS.2018.8663824"},{"doi-asserted-by":"publisher","unstructured":"Liu, C., Dai, L., Cui, W., & Lin, T. (2019). A byte-level cnn method to detect dns tunnels. In 2019 IEEE 38th International performance computing and communications conference (IPCCC) (pp. 1\u20138).\u00a0https:\/\/doi.org\/10.1109\/IPCCC47392.2019.8958714.","key":"10330_CR21","DOI":"10.1109\/IPCCC47392.2019.8958714"},{"doi-asserted-by":"publisher","unstructured":"Liu, G., & Zhao, F. (2007). An efficient compression algorithm for hyperspectral images based on correlation coefficients adaptive three dimensional wavelet zerotree coding. In 2007 IEEE International conference on image processing, (Vol. 2 pp. II\u2013341\u2013II\u2013344) https:\/\/doi.org\/10.1109\/ICIP.2007.4379162.","key":"10330_CR22","DOI":"10.1109\/ICIP.2007.4379162"},{"doi-asserted-by":"crossref","unstructured":"McDole, A., Abdelsalam, M., Gupta, M., & Mittal, S. (2020). Analyzing cnn based behavioural malware detection techniques on cloud iaas. In Q Zhang, Y Wang, & L-J Zhang (Eds.) Cloud Computing \u2013 CLOUD 2020 (pp. 64\u201379). Cham: Springer International Publishing.","key":"10330_CR23","DOI":"10.1007\/978-3-030-59635-4_5"},{"unstructured":"Milton-Barker, A. (2019). Inception v3 deep convolutional architecture for classifying acute. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/inception-v3-deep-convolutional-architecture-for-classifying-acute-myeloidlymphoblastic.html.","key":"10330_CR24"},{"issue":"13","key":"10330_CR25","doi-asserted-by":"publisher","first-page":"E2970","DOI":"10.1073\/pnas.1717139115","volume":"115","author":"P Mobadersany","year":"2018","unstructured":"Mobadersany, P., Yousefi, S., Amgad, M., Gutman, D. A., Barnholtz-Sloan, J. S., Vel\u00e1zquez Vega, J. E., Brat, D. J., & Cooper, L. A. D. (2018). Predicting cancer outcomes from histology and genomics using convolutional networks. Proceedings of the National Academy of Sciences, 115(13), E2970\u2013E2979. https:\/\/doi.org\/10.1073\/pnas.1717139115, https:\/\/www.pnas.org\/content\/115\/13\/E2970.full.pdf.","journal-title":"Proceedings of the National Academy of Sciences"},{"doi-asserted-by":"crossref","unstructured":"Ribeiro, M. T., Singh, S., & Guestrin, C. (2016). \u201dwhy should i trust you?\u201d explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 1135\u20131144).","key":"10330_CR26","DOI":"10.1145\/2939672.2939778"},{"issue":"2","key":"10330_CR27","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s11263-019-01228-7","volume":"128","author":"RR Selvaraju","year":"2019","unstructured":"Selvaraju, R. R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., & Batra, D. (2019). Grad-cam: Visual explanations from deep networks via gradient-based localization. International Journal of Computer Vision, 128(2), 336\u2013359. https:\/\/doi.org\/10.1007\/s11263-019-01228-7.","journal-title":"International Journal of Computer Vision"},{"unstructured":"Simonyan, K., Vedaldi, A., & Zisserman, A. (2014). Deep inside convolutional networks: Visualising image classification models and saliency maps.","key":"10330_CR28"},{"doi-asserted-by":"crossref","unstructured":"Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., & Rabinovich, A. (2014). Going deeper with convolutions.","key":"10330_CR29","DOI":"10.1109\/CVPR.2015.7298594"},{"issue":"3","key":"10330_CR30","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1109\/TITS.2019.2906038","volume":"21","author":"F van Wyk","year":"2020","unstructured":"van Wyk, F., Wang, Y., Khojandi, A., & Masoud, N. (2020). Real-time sensor anomaly detection and identification in automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 21(3), 1264\u20131276. https:\/\/doi.org\/10.1109\/TITS.2019.2906038.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, Z., Du, M., Yang, F., Zhang, Z., Ding, S., Mardziel, P., & Hu, X. (2020). Score-cam: Score-weighted visual explanations for convolutional neural networks.","key":"10330_CR31","DOI":"10.1109\/CVPRW50498.2020.00020"},{"doi-asserted-by":"publisher","unstructured":"Wang, Q., & Shen, Y. (2005). A jpeg2000 and nonlinear correlation measurement based method to enhance hyperspectral image compression. In 2005 IEEE Instrumentationand measurement technology conference proceedings, (Vol. 3 pp. 2009\u20132011).\u00a0https:\/\/doi.org\/10.1109\/IMTC.2005.1604524.","key":"10330_CR32","DOI":"10.1109\/IMTC.2005.1604524"},{"key":"10330_CR33","doi-asserted-by":"publisher","first-page":"37004","DOI":"10.1109\/ACCESS.2019.2905041","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Chen, X., Jin, L., Wang, X., & Guo, D. (2019). Network intrusion detection: based on deep hierarchical network and original flow data. IEEE Access, 7, 37004\u201337016. https:\/\/doi.org\/10.1109\/ACCESS.2019.2905041.","journal-title":"IEEE Access"},{"issue":"7","key":"10330_CR34","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/LGRS.2019.2890996","volume":"16","author":"X Zhao","year":"2019","unstructured":"Zhao, X., Gao, L., Chen, Z., Zhang, B., Liao, W., & Yang, X. (2019). An entropy and mrf model-based cnn for large-scale landsat image classification. IEEE Geoscience and Remote Sensing Letters, 16(7), 1145\u20131149. https:\/\/doi.org\/10.1109\/LGRS.2019.2890996.","journal-title":"IEEE Geoscience and Remote Sensing Letters"},{"doi-asserted-by":"crossref","unstructured":"Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., & Torralba, A. (2015). Learning deep features for discriminative localization.","key":"10330_CR35","DOI":"10.1109\/CVPR.2016.319"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10330-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10330-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10330-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T09:22:12Z","timestamp":1663579332000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10330-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":35,"alternative-id":["10330"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10330-0","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"type":"print","value":"1387-3326"},{"type":"electronic","value":"1572-9419"}],"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"12 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}}]}}