{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T14:19:46Z","timestamp":1774621186376,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T00:00:00Z","timestamp":1771718400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"vor","delay-in-days":33,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-026-00983-0","type":"journal-article","created":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T07:03:03Z","timestamp":1771743783000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Explainable churn prediction in telecom with tabular ML five model benchmark and SHAP analysis"],"prefix":"10.1007","volume":"6","author":[{"given":"Ismoth","family":"Zerine","sequence":"first","affiliation":[]},{"given":"Md Mainul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Mohammad Aman Ullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Md \u0410sikur R\u0430hm\u0430n","family":"Chy","sequence":"additional","affiliation":[]},{"given":"Abu Saleh Muhammad","family":"Saimon","sequence":"additional","affiliation":[]},{"given":"Mia Md. Tofayel Gonee","family":"Manik","sequence":"additional","affiliation":[]},{"given":"Chala","family":"Wata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,22]]},"reference":[{"key":"983_CR1","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V. Support-vector networks. Mach Learn. 1995;20:273\u201397. https:\/\/doi.org\/10.1007\/BF00994018.","journal-title":"Mach Learn"},{"issue":"1","key":"983_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L. Random forests. Mach Learn. 2001;45(1):5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324.","journal-title":"Mach Learn"},{"issue":"5","key":"983_CR3","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman JH. Greedy function approximation: a gradient boosting machine. Ann Stat. 2001;29(5):1189\u2013232. https:\/\/doi.org\/10.1214\/aos\/1013203451.","journal-title":"Ann Stat"},{"key":"983_CR4","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C. XGBoost: A scalable tree boosting system, in Proc. 22nd ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, 2016, pp. 785\u2013794. https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"issue":"1","key":"983_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover T, Hart P. Nearest neighbor pattern classification. IEEE Trans Inf Theory. 1967;13(1):21\u20137. https:\/\/doi.org\/10.1109\/TIT.1967.1053964.","journal-title":"IEEE Trans Inf Theory"},{"key":"983_CR6","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP. SMOTE: synthetic minority over-sampling technique. J Artif Intell Res. 2002;16:321\u201357. https:\/\/doi.org\/10.1613\/jair.953.","journal-title":"J Artif Intell Res"},{"issue":"6","key":"983_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3390\/a17060231","volume":"17","author":"V Chang","year":"2024","unstructured":"Chang V, Hall K, Xu QA, Amao FO, Ganatra MA, Benson V. Prediction of customer churn behavior in the telecommunication industry using machine learning models. Algorithms. 2024;17(6):231. https:\/\/doi.org\/10.3390\/a17060231.","journal-title":"Algorithms"},{"key":"983_CR8","doi-asserted-by":"publisher","first-page":"100342","DOI":"10.1016\/j.rico.2023.100342","volume":"14","author":"SK Wagh","year":"2024","unstructured":"Wagh SK, Andhale AA, Wagh KS, Pansare JR, Ambadekar SP, Gawande SH. Customer churn prediction in Telecom sector using machine learning techniques. Results Control Optim. 2024;14:100342. https:\/\/doi.org\/10.1016\/j.rico.2023.100342.","journal-title":"Results Control Optim"},{"issue":"1","key":"983_CR9","doi-asserted-by":"publisher","first-page":"17294","DOI":"10.1038\/s41598-023-44396-w","volume":"13","author":"A Khattak","year":"2023","unstructured":"Khattak A, Mehak Z, Ahmad H, Asghar MU, Asghar MZ, Khan A. Customer churn prediction using composite deep learning technique. Sci Rep. 2023;13(1):17294. https:\/\/doi.org\/10.1038\/s41598-023-44396-w.","journal-title":"Sci Rep"},{"key":"983_CR10","doi-asserted-by":"publisher","unstructured":"Liu X, Xia G, Zhang X, Ma W, Yu C. Customer churn prediction model based on hybrid neural networks. Sci Rep. 2024;14(1):30707. https:\/\/doi.org\/10.1038\/s41598-024-79603-9","DOI":"10.1038\/s41598-024-79603-9"},{"key":"983_CR11","doi-asserted-by":"crossref","unstructured":"Hao M. Telecom customer churn prediction based on BiGRU-Attention-XGBoost model, in Proc. 5th Int. Seminar on artificial intelligence, networking and information technology (AINIT), 2024, pp. 1050\u20131054.","DOI":"10.1109\/AINIT61980.2024.10581856"},{"key":"983_CR12","doi-asserted-by":"publisher","unstructured":"Ribeiro MT, Singh S, Guestrin C. Why should I trust you?\u2019 Explaining the predictions of any classifier. Proc 22nd ACM SIGKDD Int Conf Knowl Discovery Data Min. 2016;1135\u201344. https:\/\/doi.org\/10.1145\/2939672.2939778.","DOI":"10.1145\/2939672.2939778"},{"key":"983_CR13","first-page":"4765","volume":"30","author":"SM Lundberg","year":"2017","unstructured":"Lundberg SM, Lee S-I. A unified approach to interpreting model predictions. Adv Neural Inf Process Syst NeurIPS. 2017;30:4765\u201374.","journal-title":"Adv Neural Inf Process Syst (NeurIPS"},{"issue":"1","key":"983_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1080\/10618600.2014.907095","volume":"24","author":"A Goldstein","year":"2015","unstructured":"Goldstein A, Kapelner A, Bleich J, Pitkin E. Peeking inside the black box: visualizing statistical learning with plots of individual conditional expectation. J Comput Graph Stat. 2015;24(1):44\u201365. https:\/\/doi.org\/10.1080\/10618600.2014.907095.","journal-title":"J Comput Graph Stat"},{"issue":"3","key":"983_CR15","doi-asserted-by":"publisher","first-page":"e0118432","DOI":"10.1371\/journal.pone.0118432","volume":"10","author":"T Saito","year":"2015","unstructured":"Saito T, Rehmsmeier M. The precision\u2013recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets. PLoS ONE. 2015;10(3):e0118432. https:\/\/doi.org\/10.1371\/journal.pone.0118432.","journal-title":"PLoS ONE"},{"key":"983_CR16","first-page":"2079","volume":"11","author":"GC Cawley","year":"2010","unstructured":"Cawley GC, Talbot NLC. On over-fitting in model selection and subsequent selection bias in performance evaluation. J Mach Learn Res. 2010;11:2079\u2013107.","journal-title":"J Mach Learn Res"},{"key":"983_CR17","doi-asserted-by":"publisher","unstructured":"Niculescu-Mizil A, Caruana R. Predicting good probabilities with supervised learning, in Proc. 22nd Int. Conf. Machine Learning (ICML), 2005, pp. 625\u2013632. https:\/\/doi.org\/10.1145\/1102351.1102430.","DOI":"10.1145\/1102351.1102430"},{"issue":"6","key":"983_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F Wilcoxon","year":"1945","unstructured":"Wilcoxon F. Individual comparisons by ranking methods. Biometrics Bull. 1945;1(6):80\u20133. https:\/\/doi.org\/10.2307\/3001968.","journal-title":"Biometrics Bull"},{"issue":"4","key":"983_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama J, \u017dliobait\u0117 I, Bifet A, Pechenizkiy M, Bouchachia A. A survey on concept drift adaptation. ACM-CSUR. 2014;46(4):1\u201344. https:\/\/doi.org\/10.1145\/2523813.","journal-title":"ACM-CSUR"},{"key":"983_CR20","unstructured":"Kaggle. Telco Customer Churn, dataset. Available: https:\/\/www.kaggle.com\/blastchar\/telco-customer-churn"},{"key":"983_CR21","doi-asserted-by":"publisher","first-page":"100567","DOI":"10.1016\/j.mlwa.2024.100567","volume":"17","author":"SS Poudel","year":"2024","unstructured":"Poudel SS, Pokharel S, Timilsina M. Explaining customer churn prediction in Telecom industry using tabular machine learning models. Mach Learn Appl. 2024;17:100567. https:\/\/doi.org\/10.1016\/j.mlwa.2024.100567.","journal-title":"Mach Learn Appl"},{"issue":"6","key":"983_CR22","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3390\/a17060231","volume":"17","author":"V Chang","year":"2024","unstructured":"Chang V, Hall K, Xu QA, Amao FO, Ganatra MA, Benson V. Prediction of customer churn behavior in the telecommunication industry using machine learning models. Algorithms. 2024;17(6):231. https:\/\/doi.org\/10.3390\/a17060231.","journal-title":"Algorithms"},{"key":"983_CR23","doi-asserted-by":"publisher","first-page":"100342","DOI":"10.1016\/j.rico.2023.100342","volume":"14","author":"SK Wagh","year":"2024","unstructured":"Wagh SK, Andhale AA, Wagh KS, Pansare JR, Ambadekar SP, Gawande SH. Customer churn prediction in Telecom sector using machine learning techniques. Results Control Optim. 2024;14:100342. https:\/\/doi.org\/10.1016\/j.rico.2023.100342.","journal-title":"Results Control Optim"},{"key":"983_CR24","doi-asserted-by":"publisher","first-page":"100567","DOI":"10.1016\/j.mlwa.2024.100567","volume":"17","author":"SS Poudel","year":"2024","unstructured":"Poudel SS, Pokharel S, Timilsina M. Explaining customer churn prediction in Telecom industry using tabular machine learning models. Mach Learn Appl. 2024;17:100567. https:\/\/doi.org\/10.1016\/j.mlwa.2024.100567.","journal-title":"Mach Learn Appl"},{"issue":"1","key":"983_CR25","doi-asserted-by":"publisher","first-page":"30707","DOI":"10.1038\/s41598-024-79603-9","volume":"14","author":"X Liu","year":"2024","unstructured":"Liu X, Xia G, Zhang X, Ma W, Yu C. Customer churn prediction model based on hybrid neural networks. Sci Rep. 2024;14(1):30707. https:\/\/doi.org\/10.1038\/s41598-024-79603-9.","journal-title":"Sci Rep"},{"key":"983_CR26","doi-asserted-by":"crossref","unstructured":"Hao M. Telecom customer churn prediction based on BiGRU-Attention-XGBoost model. In Proceedings of the 2024 5th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT 2024), Curran Associates, pp. 1050\u20131054, 2024.","DOI":"10.1109\/AINIT61980.2024.10581856"},{"key":"983_CR27","doi-asserted-by":"publisher","unstructured":"Khattak A, Mehak Z, Ahmad H, Asghar MU, Asghar MZ, Khan A. Customer churn prediction using composite deep learning technique. Sci Rep. 13(1), 17294, 2023. https:\/\/doi.org\/10.1038\/s41598-023-44396-w.","DOI":"10.1038\/s41598-023-44396-w"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-026-00983-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-026-00983-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-026-00983-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T13:18:54Z","timestamp":1774617534000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-026-00983-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,22]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["983"],"URL":"https:\/\/doi.org\/10.1007\/s44163-026-00983-0","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,22]]},"assertion":[{"value":"2 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study does not involve human participants, human biological material, or personal identifiable information. The research is based exclusively on a secondary analysis of a publicly available, anonymized dataset. Therefore, ethical approval was not required.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable. The study uses fully anonymized secondary data and does not involve direct interaction with human participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable. The manuscript does not contain any individual-level data, images, or information that could identify participants.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"263"}}