{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T13:25:42Z","timestamp":1776086742052,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"DOI":"10.1007\/s44196-025-01011-2","type":"journal-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T14:06:49Z","timestamp":1764338809000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Game-Theoretic Explainable AI for Ensemble-Boosting Models in Early Malware Prediction for Computer Systems"],"prefix":"10.1007","volume":"18","author":[{"given":"Shagufta","family":"Henna","sequence":"first","affiliation":[]},{"given":"Mallikharjuna Rao","family":"Sakhamuri","sequence":"additional","affiliation":[]},{"given":"Lakshya Gourav","family":"Moitra","sequence":"additional","affiliation":[]},{"given":"Upaka","family":"Rathnayake","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"1011_CR1","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.1109\/TIFS.2020.3025436","volume":"16","author":"R Feng","year":"2021","unstructured":"Feng, R., Chen, S., Xie, X., Meng, G., Lin, S.-W., Liu, Y.: A performance-sensitive malware detection system using deep learning on mobile devices. IEEE Trans. Inf. Forensics Secur. 16, 1563\u20131578 (2021). https:\/\/doi.org\/10.1109\/TIFS.2020.3025436","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1011_CR2","doi-asserted-by":"publisher","first-page":"6377","DOI":"10.1109\/TIFS.2024.3414339","volume":"19","author":"Y Zhou","year":"2024","unstructured":"Zhou, Y., Cheng, G., Yu, S., Chen, Z., Hu, Y.: MTDroid: a moving target defense-based android malware detector against evasion attacks. IEEE Trans. Inf. Forensics Secur. 19, 6377\u20136392 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3414339","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1011_CR3","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1109\/TIFS.2024.3350379","volume":"19","author":"J Jeon","year":"2024","unstructured":"Jeon, J., Jeong, B., Baek, S., Jeong, Y.-S.: Static multi feature-based malware detection using multi SPP-net in smart IoT environments. IEEE Trans. Inf. Forensics Secur. 19, 2487\u20132500 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3350379","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"1011_CR4","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1109\/TDSC.2022.3144697","volume":"20","author":"X Zhang","year":"2023","unstructured":"Zhang, X., et al.: Slowing down the aging of learning-based malware detectors with API knowledge. IEEE Trans. Dependable Secure Comput. 20(2), 902\u2013916 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3144697","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"1011_CR5","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TDSC.2023.3265665","volume":"21","author":"D Li","year":"2024","unstructured":"Li, D., Cui, S., Li, Y., Xu, J., Xiao, F., Xu, S.: PAD: towards principled adversarial malware detection against evasion attacks. IEEE Trans. Dependable Secure Comput. 21(2), 920\u2013936 (2024). https:\/\/doi.org\/10.1109\/TDSC.2023.3265665","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1011_CR6","doi-asserted-by":"crossref","unstructured":"Jia, J., Salem, A., Backes, M.: MemGuard: defending against black-box membership inference attacks via adversarial examples. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 259\u2013274. ACM, London (2019)","DOI":"10.1145\/3319535.3363201"},{"key":"1011_CR7","doi-asserted-by":"crossref","unstructured":"Naderi-Afooshteh, A., Kwon, Y., Nguyen-Tuong, A.: MalMax: multi-aspect execution for automated dynamic web server malware analysis. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1849\u20131866. ACM, London (2019)","DOI":"10.1145\/3319535.3363199"},{"key":"1011_CR8","unstructured":"Xie, W., Chen, N., Chen, B.: Incorporating malware detection into the flash translation layer. In: 2020 IEEE Symposium on Security and Privacy Poster Session. IEEE, San Francisco (online), CA (2020)"},{"key":"1011_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122778","volume":"244","author":"AA Khan","year":"2024","unstructured":"Khan, A.A., Chaudhari, O., Chandra, R.: A review of ensemble learning and data augmentation models for class imbalanced problems: combination, implementation and evaluation. Expert Syst. Appl. 244, 122778 (2024)","journal-title":"Expert Syst. Appl."},{"key":"1011_CR10","doi-asserted-by":"publisher","first-page":"149890","DOI":"10.1109\/ACCESS.2019.2947359","volume":"7","author":"F Wang","year":"2019","unstructured":"Wang, F., Li, Z., He, F., Wang, R., Yu, W., Nie, F.: Feature learning viewpoint of AdaBoost and a new algorithm. IEEE Access 7, 149890\u2013149899 (2019)","journal-title":"IEEE Access"},{"key":"1011_CR11","doi-asserted-by":"publisher","unstructured":"Zhai, Y., Hao, Y., Zhang, Z.: Progressive scrutiny: incremental detection of ubi bugs in the Linux kernel. In: Proceedings of the Network and Distributed Systems Security (NDSS) Symposium 2022. Internet Society, Reston, VA (2022). https:\/\/doi.org\/10.14722\/ndss.2022.24380","DOI":"10.14722\/ndss.2022.24380"},{"key":"1011_CR12","unstructured":"Hou, B., O\u2019Connor, J., Andreas, J., Chang, S., Zhang, Y.: PromptBoosting: black-box text classification with ten forward passes. In: Proceedings of the 40th International Conference on Machine Learning (ICML 2023). PMLR, pp. 13309\u201313324 (2023)"},{"issue":"6","key":"1011_CR13","doi-asserted-by":"publisher","first-page":"109","DOI":"10.5121\/ijcnc.2021.13607","volume":"13","author":"K Roshan","year":"2021","unstructured":"Roshan, K., Zafar, A.: Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with Shapley additive explanation (SHAP). Int. J. Comput. Netw. Commun. 13(6), 109\u2013128 (2021)","journal-title":"Int. J. Comput. Netw. Commun."},{"issue":"5","key":"1011_CR14","first-page":"1164","volume":"60","author":"ZA Houda","year":"2022","unstructured":"Houda, Z.A., Brik, B., Khoukhi, L.: \u201cWhy should i trust your ids?\": an explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Commun. Mag. 60(5), 1164\u20131176 (2022)","journal-title":"IEEE Commun. Mag."},{"issue":"214","key":"1011_CR15","first-page":"1","volume":"22","author":"H Baniecki","year":"2021","unstructured":"Baniecki, H., Kretowicz, W., Piatyzsek, P., Wisniewski, J., Biecek, P.: Dalex: responsible machine learning with interactive explainability and fairness in Python. J. Mach. Learn. Res. 22(214), 1\u20137 (2021)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"1011_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s40708-024-00222-1","volume":"11","author":"V Vimbi","year":"2024","unstructured":"Vimbi, V., Shaffi, N., Mahmud, M.: Interpreting artificial intelligence models: a systematic review on the application of lime and SHAP in Alzheimer\u2019s disease detection. Brain Inform. 11(1), 10 (2024)","journal-title":"Brain Inform."},{"key":"1011_CR17","doi-asserted-by":"crossref","unstructured":"Nambiar, A., H, S., S, S.: Model-agnostic explainable artificial intelligence tools for severity prediction and symptom analysis on Indian COVID-19 data. Front. Artif. Intell. 6, 1272506 (2023)","DOI":"10.3389\/frai.2023.1272506"},{"key":"1011_CR18","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.future.2024.02.023","volume":"155","author":"R Gonz\u00e1lez-Sendino","year":"2024","unstructured":"Gonz\u00e1lez-Sendino, R., Serrano, E., Bajo, J.: Mitigating bias in artificial intelligence: fair data generation via causal models for transparent and explainable decision-making. Future Gener. Comput. Syst. 155, 384\u2013401 (2024)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"1011_CR19","doi-asserted-by":"publisher","DOI":"10.1136\/bmjhci-2023-100954","volume":"31","author":"DK Gurmessa","year":"2024","unstructured":"Gurmessa, D.K., Jimma, W.: Explainable machine learning for breast cancer diagnosis from mammography and ultrasound images: a systematic review. BMJ Health Care Inform. 31(1), e100954 (2024)","journal-title":"BMJ Health Care Inform."},{"key":"1011_CR20","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.1007\/s13042-023-02083-2","volume":"15","author":"TD Jui","year":"2024","unstructured":"Jui, T.D., Rivas, P.: Fairness issues, current approaches, and challenges in machine learning models. Int. J. Mach. Learn. Cybern. 15, 3095\u20133125 (2024)","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"1011_CR21","doi-asserted-by":"publisher","first-page":"7848","DOI":"10.1038\/s41598-024-58427-7","volume":"14","author":"VN Dang","year":"2024","unstructured":"Dang, V.N., Cascarano, A., Mulder, R.H., et al.: Fairness and bias correction in machine learning for depression prediction across four study populations. Sci. Rep. 14, 7848 (2024)","journal-title":"Sci. Rep."},{"key":"1011_CR22","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Anchors: high-precision model-agnostic explanations. In: Proceedings of the AAAI Conference on Artificial Intelligence, AAAI Press, Palo Alto, CA, pp. 1527\u20131535 (2018).","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"1011_CR23","unstructured":"Weerts, H., Dud\u00edk, M., Edgar, R., Jalali, A., Lutz, R., Madaio, M.: Fairlearn: assessing and improving fairness of AI systems. J. Mach. Learn. Res. 24, 1\u20138 (2023). Submitted 3\/23; Published 7\/23"},{"key":"1011_CR24","unstructured":"Howard, A., Hope, B., Saltaformaggio, B., Avena, E., Ahmadi, M., Duncan, M., n_30, McCann, R., Cukierski, W.: Microsoft Malware Prediction. Kaggle (2018). https:\/\/kaggle.com\/competitions\/microsoft-malware-prediction"},{"key":"1011_CR25","unstructured":"Cybersecurity, C.I.: CICIDS 2017 Dataset (2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html. Accessed 04 May 2025"},{"key":"1011_CR26","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.procs.2023.12.067","volume":"230","author":"K Omari","year":"2023","unstructured":"Omari, K.: Phishing detection using gradient boosting classifier. Procedia Comput. Sci. 230, 120\u2013127 (2023)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"1011_CR27","volume":"1846","author":"G Ping","year":"2021","unstructured":"Ping, G.: Detection of power data tampering attack based on gradient boosting decision tree. J. Phys: Conf. Ser. 1846(1), 012057 (2021)","journal-title":"J. Phys: Conf. Ser."},{"key":"1011_CR28","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.ins.2021.12.111","volume":"589","author":"A Delgado-Panadero","year":"2022","unstructured":"Delgado-Panadero, A., Hernandez-Lorca, B., Garcia, M.T., Benitez-Andrades, J.A.: Implementing local-explainability in gradient boosting trees: feature contribution. Inf. Sci. 589, 199\u2013212 (2022)","journal-title":"Inf. Sci."},{"issue":"1","key":"1011_CR29","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1186\/s12911-020-01201-2","volume":"20","author":"J Hatwell","year":"2020","unstructured":"Hatwell, J., Gaber, M.M., Azad, R.M.A.: Ada-WHIPS: explaining AdaBoost classification with applications in the health sciences. BMC Med. Inform. Decis. Mak. 20(1), 250 (2020)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"1011_CR30","doi-asserted-by":"crossref","unstructured":"Okolie, C., Mills, J., Adeleke, A., Smit, J., Maduako, I.: The explainability of gradient-boosted decision trees for Digital Elevation Model (DEM) error prediction. Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. XLVIII-M-3-2023, 161\u2013168 (2023)","DOI":"10.5194\/isprs-archives-XLVIII-M-3-2023-161-2023"},{"key":"1011_CR31","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s44196-023-00355-x","volume":"16","author":"M Saied","year":"2023","unstructured":"Saied, M., Guirguis, S., Madbouly, M.A.: A comparative study of using boosting-based machine learning algorithms for IoT network intrusion detection. Int. J. Comput. Intell. Syst. 16, 177 (2023)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"1011_CR32","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1038\/s42256-019-0138-9","volume":"2","author":"SM Lundberg","year":"2020","unstructured":"Lundberg, S.M., Erion, G., Chen, H., DeGrave, P., Prutkin, J., Nair, B., Katz, R., Himmelfarb, J., Bansal, N., Lee, S.: From local explanations to global understanding with explainable AI for trees. Nat. Mach. Intell. 2, 56\u201367 (2020). https:\/\/doi.org\/10.1038\/s42256-019-0138-9","journal-title":"Nat. Mach. Intell."},{"issue":"1","key":"1011_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-01011-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-025-01011-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-01011-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T14:06:52Z","timestamp":1764338812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-025-01011-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1011"],"URL":"https:\/\/doi.org\/10.1007\/s44196-025-01011-2","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,28]]},"assertion":[{"value":"5 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"318"}}