{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T18:40:48Z","timestamp":1774377648556,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07040-0","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T18:22:28Z","timestamp":1740075748000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An efficient mechanism for time series forecasting and anomaly detection using explainable artificial intelligence"],"prefix":"10.1007","volume":"81","author":[{"given":"Amjad","family":"Iqbal","sequence":"first","affiliation":[]},{"given":"Rashid","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,20]]},"reference":[{"key":"7040_CR1","doi-asserted-by":"publisher","first-page":"6835","DOI":"10.1109\/TMC.2023.3325826","volume":"23","author":"J Hu","year":"2023","unstructured":"Hu J et al (2023) Combining IMU with acoustics for head motion tracking leveraging wireless earphone. IEEE Trans Mob Comput 23:6835\u20136847","journal-title":"IEEE Trans Mob Comput"},{"key":"7040_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124690","volume":"255","author":"Z Zhou","year":"2024","unstructured":"Zhou Z et al (2024) Near miss prediction in commercial aviation through a combined model of grey neural network. Expert Syst Appl 255:124690","journal-title":"Expert Syst Appl"},{"key":"7040_CR3","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1109\/TIT.2023.3340147","volume":"70","author":"M Zhang","year":"2023","unstructured":"Zhang M et al (2023) Age-dependent differential privacy. IEEE Trans Inf Theory 70:1300\u20131319","journal-title":"IEEE Trans Inf Theory"},{"key":"7040_CR4","first-page":"1","volume":"18","author":"T Li","year":"2024","unstructured":"Li T et al (2024) Mobile user traffic generation via multi-scale hierarchical GAN. ACM Trans Knowl Discov Data 18:1\u201319","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"7","key":"7040_CR5","doi-asserted-by":"publisher","first-page":"3194","DOI":"10.3390\/app11073194","volume":"11","author":"V Kozitsin","year":"2021","unstructured":"Kozitsin V, Katser I, Lakontsev D (2021) Online forecasting and anomaly detection based on the ARIMA model. Appl Sci 11(7):3194","journal-title":"Appl Sci"},{"issue":"3","key":"7040_CR6","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1109\/TNSM.2018.2861717","volume":"15","author":"G Sun","year":"2018","unstructured":"Sun G et al (2018) Service function chain orchestration across multiple domains: a full mesh aggregation approach. IEEE Trans Netw Serv Manag 15(3):1175\u20131191","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"7040_CR7","doi-asserted-by":"publisher","first-page":"5372","DOI":"10.1109\/TNET.2024.3462539","volume":"32","author":"H Luo","year":"2024","unstructured":"Luo H et al (2024) Symbiotic blockchain consensus: cognitive backscatter communications-enabled wireless blockchain consensus. IEEE\/ACM Trans Netw 32:5372\u20135387","journal-title":"IEEE\/ACM Trans Netw"},{"key":"7040_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ndteint.2024.103043","volume":"143","author":"J Lei","year":"2024","unstructured":"Lei J et al (2024) GPR detection localization of underground structures based on deep learning and reverse time migration. NDT E Int 143:103043","journal-title":"NDT E Int"},{"key":"7040_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2024.122130","volume":"368","author":"R Liu","year":"2024","unstructured":"Liu R et al (2024) Multifaceted anomaly detection framework for leachate monitoring in landfills. J Environ Manag 368:122130","journal-title":"J Environ Manag"},{"key":"7040_CR10","doi-asserted-by":"crossref","unstructured":"Lin W et al (2024) Input and output matter: malicious traffic detection with explainability. IEEE Netw","DOI":"10.1109\/MNET.2024.3481045"},{"key":"7040_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108904","volume":"136","author":"L Ni","year":"2024","unstructured":"Ni L et al (2024) An explainable neural network integrating Jiles-Atherton and nonlinear auto-regressive exogenous models for modeling universal hysteresis. Eng Appl Artif Intell 136:108904","journal-title":"Eng Appl Artif Intell"},{"key":"7040_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cma.2024.117170","volume":"429","author":"H Fan","year":"2024","unstructured":"Fan H, Wang C, Li S (2024) Novel method for reliability optimization design based on rough set theory and hybrid surrogate model. Comput Methods Appl Mech Eng 429:117170","journal-title":"Comput Methods Appl Mech Eng"},{"key":"7040_CR13","doi-asserted-by":"crossref","unstructured":"Tu B et al (2024) Anomaly detection in hyperspectral images using adaptive graph frequency location. IEEE Trans Neural Netw Learn Syst","DOI":"10.1109\/TNNLS.2024.3449573"},{"key":"7040_CR14","doi-asserted-by":"crossref","unstructured":"Wang Z et al (2024) MLP-Net: multi-layer perceptron fusion network for infrared small target detection. IEEE Trans Geosci Remote Sens","DOI":"10.1109\/TGRS.2024.3515648"},{"key":"7040_CR15","doi-asserted-by":"crossref","unstructured":"Barbariol T et al (2022) A review of tree-based approaches for anomaly detection. In: Control Charts and Machine Learning for Anomaly Detection in Manufacturing, pp 149\u2013185","DOI":"10.1007\/978-3-030-83819-5_7"},{"key":"7040_CR16","doi-asserted-by":"publisher","first-page":"7308","DOI":"10.1109\/TKDE.2024.3418098","volume":"36","author":"C-Q Huang","year":"2024","unstructured":"Huang C-Q et al (2024) XKT: towards explainable knowledge tracing model with cognitive learning theories for questions of multiple knowledge concepts. IEEE Trans Knowl Data Eng 36:7308\u20137325","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"7040_CR17","doi-asserted-by":"crossref","unstructured":"Huang Z et al (2024) Joining spatial deformable convolution and a dense feature pyramid for surface defect detection. IEEE Trans Instrum Meas","DOI":"10.1109\/TIM.2024.3370962"},{"key":"7040_CR18","doi-asserted-by":"publisher","first-page":"393","DOI":"10.3390\/aerospace11050393","volume":"11","author":"S Zhou","year":"2024","unstructured":"Zhou S et al (2024) An Anomaly detection method for uav based on wavelet decomposition and stacked denoising autoencoder. Aerospace 11:393","journal-title":"Aerospace"},{"issue":"2","key":"7040_CR19","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1109\/TII.2023.3280337","volume":"20","author":"Y Qiao","year":"2023","unstructured":"Qiao Y et al (2023) A multihead attention self-supervised representation model for industrial sensors anomaly detection. IEEE Trans Ind Inf 20(2):2190\u20132199","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"7040_CR20","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TIV.2023.3288810","volume":"9","author":"X Zhao","year":"2023","unstructured":"Zhao X et al (2023) Target-driven visual navigation by using causal intervention. IEEE Trans Intell Veh 9(1):1294\u20131304","journal-title":"IEEE Trans Intell Veh"},{"key":"7040_CR21","first-page":"1","volume":"57","author":"T Li","year":"2025","unstructured":"Li T et al (2025) Generative AI empowered network digital twins: architecture, technologies, and applications. ACM Comput Surv 57:1\u201343","journal-title":"ACM Comput Surv"},{"issue":"16","key":"7040_CR22","doi-asserted-by":"publisher","first-page":"12505","DOI":"10.1109\/JIOT.2020.3019398","volume":"8","author":"Y Ding","year":"2020","unstructured":"Ding Y et al (2020) FraudTrip: taxi fraudulent trip detection from corresponding trajectories. IEEE Internet Things J 8(16):12505\u201312517","journal-title":"IEEE Internet Things J"},{"key":"7040_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112445","volume":"167","author":"L Lin","year":"2024","unstructured":"Lin L et al (2024) Multiscale spatio-temporal feature fusion based non-intrusive appliance load monitoring for multiple industrial industries. Appl Soft Comput 167:112445","journal-title":"Appl Soft Comput"},{"key":"7040_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sna.2023.115003","volume":"366","author":"W Jiang","year":"2024","unstructured":"Jiang W et al (2024) A compensation approach for magnetic encoder error based on improved deep belief network algorithm. Sens Actuators A 366:115003","journal-title":"Sens Actuators A"},{"key":"7040_CR25","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi A, Berrada M (2018) Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6:52138\u201352160","journal-title":"IEEE Access"},{"issue":"8","key":"7040_CR26","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"issue":"1","key":"7040_CR27","first-page":"1","volume":"18","author":"Z Li","year":"2023","unstructured":"Li Z, Zhu Y, Van Leeuwen M (2023) A survey on explainable anomaly detection. ACM Trans Knowl Discov Data 18(1):1\u201354","journal-title":"ACM Trans Knowl Discov Data"},{"key":"7040_CR28","unstructured":"Vilone G, Longo L (2020) Explainable artificial intelligence: a systematic review. arXiv preprint arXiv:2006.00093"},{"key":"7040_CR29","first-page":"4699","volume":"34","author":"R Agarwal","year":"2021","unstructured":"Agarwal R et al (2021) Neural additive models: interpretable machine learning with neural nets. Adv Neural Inf Process Syst 34:4699\u20134711","journal-title":"Adv Neural Inf Process Syst"},{"key":"7040_CR30","first-page":"4765","volume":"30","author":"SM Lundberg","year":"2017","unstructured":"Lundberg SM, Lee S-I (2017) A unified approach to interpreting model predictions. Adv Neural Inf Process Syst 30:4765\u20134774","journal-title":"Adv Neural Inf Process Syst"},{"key":"7040_CR31","unstructured":"Ribeiro M (2016) Local interpretable model-agnostic explanations (lime). Revision 533368b7"},{"key":"7040_CR32","doi-asserted-by":"crossref","unstructured":"Asaduzzaman M, Rahman MM (2022) An adversarial approach for intrusion detection using hybrid deep learning model. In: 2022 International Conference on Information Technology Research and Innovation (ICITRI). IEEE","DOI":"10.1109\/ICITRI56423.2022.9970221"},{"key":"7040_CR33","doi-asserted-by":"publisher","first-page":"30","DOI":"10.58496\/MJCS\/2023\/006","volume":"2023","author":"V Abdullayev","year":"2023","unstructured":"Abdullayev V, Chauhan AS (2023) SQL injection attack: quick view. Mesopotamian J CyberSecur 2023:30\u201334","journal-title":"Mesopotamian J CyberSecur"},{"key":"7040_CR34","doi-asserted-by":"crossref","unstructured":"Schlegel U et al. (2019) Towards a rigorous evaluation of XAI methods on time series. In: 2019 IEEE\/CVF International Conference on Computer Vision Workshop (ICCVW). IEEE","DOI":"10.1109\/ICCVW.2019.00516"},{"key":"7040_CR35","doi-asserted-by":"crossref","unstructured":"Cheng H, Xu D, Yuan S (2023) Explainable sequential anomaly detection via prototypes. In: 2023 International Joint Conference on Neural Networks (IJCNN). IEEE","DOI":"10.1109\/IJCNN54540.2023.10191703"},{"issue":"1","key":"7040_CR36","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/00031305.2017.1380080","volume":"72","author":"SJ Taylor","year":"2018","unstructured":"Taylor SJ, Letham B (2018) Forecasting at scale. Am Stat 72(1):37\u201345","journal-title":"Am Stat"},{"key":"7040_CR37","doi-asserted-by":"crossref","unstructured":"Dix M et al (2021) Anomaly detection in the time-series data of industrial plants using neural network architectures. In: 2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService). IEEE","DOI":"10.1109\/BigDataService52369.2021.00035"},{"key":"7040_CR38","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1613\/jair.1.13200","volume":"73","author":"G Ras","year":"2022","unstructured":"Ras G et al (2022) Explainable deep learning: a field guide for the uninitiated. J Artif Intell Res 73:329\u2013396","journal-title":"J Artif Intell Res"},{"issue":"1","key":"7040_CR39","first-page":"37","volume":"7","author":"A Tiwari","year":"2023","unstructured":"Tiwari A, Maurya RK (2023) Anomaly detection in time series data: exploring algorithms and methods. Adv Comput Technol Appl 7(1):37\u201346","journal-title":"Adv Comput Technol Appl"},{"key":"7040_CR40","doi-asserted-by":"crossref","unstructured":"Tripathy SM et al (2022) Explaining anomalies in industrial multivariate time-series data with the help of eXplainable AI. In: 2022 IEEE International Conference on Big Data and Smart Computing (BigComp). IEEE","DOI":"10.1109\/BigComp54360.2022.00051"},{"issue":"11","key":"7040_CR41","doi-asserted-by":"publisher","first-page":"7834","DOI":"10.1109\/TII.2021.3124476","volume":"18","author":"D Mercier","year":"2021","unstructured":"Mercier D et al (2021) Evaluating privacy-preserving machine learning in critical infrastructures: a case study on time-series classification. IEEE Trans Ind Inf 18(11):7834\u20137842","journal-title":"IEEE Trans Ind Inf"},{"key":"7040_CR42","unstructured":"Lin C-Y, Song Y, Wen Z (2017) Sequential anomaly detection. Google Patents"},{"key":"7040_CR43","unstructured":"Credit card Fraud (2013)"},{"key":"7040_CR44","doi-asserted-by":"publisher","first-page":"10423","DOI":"10.1109\/TKDE.2023.3266755","volume":"35","author":"F Zhou","year":"2023","unstructured":"Zhou F et al (2023) Semi-supervised anomaly detection via neural process. IEEE Trans Knowl Data Eng 35:10423\u201310435","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"7040_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105964","volume":"120","author":"J Kim","year":"2023","unstructured":"Kim J, Kang H, Kang P (2023) Time-series anomaly detection with stacked transformer representations and 1D convolutional network. Eng Appl Artif Intell 120:105964","journal-title":"Eng Appl Artif Intell"},{"key":"7040_CR46","doi-asserted-by":"crossref","unstructured":"Li Z, Shi J, van Leeuwen M (2023) Graph neural network based log anomaly detection and explanation. arXiv preprint arXiv:2307.00527","DOI":"10.2139\/ssrn.4627217"},{"key":"7040_CR47","first-page":"757","volume":"35","author":"A Mohammed","year":"2023","unstructured":"Mohammed A, Kora R (2023) A comprehensive review on ensemble deep learning: opportunities and challenges. J King Saud Univ Comput Inf Sci 35:757\u2013774","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"7040_CR48","doi-asserted-by":"crossref","unstructured":"Wu T-Y, Wang Y-T (2021) Locally interpretable one-class anomaly detection for credit card fraud detection. In: 2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI). IEEE","DOI":"10.1109\/TAAI54685.2021.00014"},{"issue":"1","key":"7040_CR49","doi-asserted-by":"publisher","first-page":"34","DOI":"10.18178\/ijmlc.2021.11.1.1011","volume":"11","author":"C Li","year":"2021","unstructured":"Li C et al (2021) Application of credit card fraud detection based on CS-SVM. Int J Mach Learn Comput 11(1):34\u201339","journal-title":"Int J Mach Learn Comput"},{"issue":"3","key":"7040_CR50","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1148\/radiol.2433060372","volume":"243","author":"MJ Schell","year":"2007","unstructured":"Schell MJ et al (2007) Evidence-based target recall rates for screening mammography. Radiology 243(3):681\u2013689","journal-title":"Radiology"},{"key":"7040_CR51","doi-asserted-by":"crossref","unstructured":"Caruana R, Niculescu-Mizil A (2004) Data mining in metric space: an empirical analysis of supervised learning performance criteria. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","DOI":"10.1145\/1014052.1014063"},{"issue":"4","key":"7040_CR52","first-page":"1503","volume":"13","author":"F Itoo","year":"2021","unstructured":"Itoo F, Meenakshi A, Singh S (2021) Comparison and analysis of logistic regression, Na\u00efve Bayes and KNN machine learning algorithms for credit card fraud detection. Int J Inf Technol 13(4):1503\u20131511","journal-title":"Int J Inf Technol"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07040-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07040-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07040-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T18:22:39Z","timestamp":1740075759000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07040-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":52,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["7040"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07040-0","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,20]]},"assertion":[{"value":"10 February 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"523"}}