{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T11:14:20Z","timestamp":1773918860851,"version":"3.50.1"},"reference-count":55,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T00:00:00Z","timestamp":1771891200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.compeleceng.2026.111080","type":"journal-article","created":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T21:09:30Z","timestamp":1772226570000},"page":"111080","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["XAI-Enhanced adversarial resilient deep learning framework for transparent and secure edge deployment in consumer Internet of Things\/Industrial Internet of Things environments"],"prefix":"10.1016","volume":"133","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0804-0707","authenticated-orcid":false,"given":"Yakub Kayode","family":"Saheed","sequence":"first","affiliation":[]},{"given":"Joshua Ebere","family":"Chukwuere","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0001","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/JIOT.2021.3079916","article-title":"Consumer, commercial, and industrial IoT (In)security: attack taxonomy and case studies","volume":"9","author":"Xenofontos","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111080_bib0002","doi-asserted-by":"crossref","first-page":"4187","DOI":"10.1109\/TII.2019.2936869","article-title":"BeCome: blockchain-enabled computation offloading for IoT in mobile edge computing","volume":"16","author":"Xu","year":"2020","journal-title":"IEEE Trans Ind Inform"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0003","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2025.3648649","article-title":"Autonomous LLM agent: a memory-augmented, edge-optimized SHAP explanations with zero-day attack resilience in IoT\/industrial IoT networks","volume":"PP","author":"Saheed","year":"2025","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111080_bib0004","doi-asserted-by":"crossref","first-page":"2622","DOI":"10.1109\/JIOT.2019.2944007","article-title":"Joint optimization of offloading utility and privacy for edge computing enabled IoT","volume":"7","author":"Xu","year":"2020","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111080_bib0005","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.1109\/COMST.2023.3329472","article-title":"Navigating Industry 5.0: a survey of key enabling technologies, trends, challenges, and opportunities","volume":"26","author":"Tallat","year":"2024","journal-title":"IEEE Commun Surv Tut"},{"issue":"April","key":"10.1016\/j.compeleceng.2026.111080_bib0006","article-title":"ResNet50-1D-CNN: a new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems","volume":"45","author":"Saheed","year":"2024","journal-title":"Int J Crit Infrastruct Prot"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0007","doi-asserted-by":"crossref","first-page":"1610","DOI":"10.1109\/TCE.2023.3347170","article-title":"Federated deep learning for intrusion detection in consumer-centric Internet of Things","volume":"70","author":"Popoola","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111080_bib0008","doi-asserted-by":"crossref","first-page":"5804","DOI":"10.1109\/TCE.2024.3443328","article-title":"Causal effects of adversarial attacks on AI models in 6G consumer electronics","volume":"70","author":"Guo","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"issue":"X","key":"10.1016\/j.compeleceng.2026.111080_bib0009","first-page":"1","article-title":"Efficient resource allocation using service function chain in agricultural consumer electronics","volume":"PP","author":"Yao","year":"2025","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0010","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1109\/TII.2022.3190352","article-title":"Trustworthy and reliable deep-learning-based cyberattack detection in industrial IoT","volume":"19","author":"Khan","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"issue":"47","key":"10.1016\/j.compeleceng.2026.111080_bib0011","doi-asserted-by":"crossref","first-page":"26652","DOI":"10.1007\/s11356-025-37137-1","article-title":"Explainable attention based few shot LSTM for intrusion detection in imbalanced cyber physical system networks","volume":"32","author":"Mustapha","year":"2025","journal-title":"Environ Sci Pollut Res"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0012","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.future.2021.09.010","article-title":"XSRU-IoMT: explainable simple recurrent units for threat detection in Internet of Medical Things networks","volume":"127","author":"Khan","year":"2022","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111080_bib0013","article-title":"Modified variational autoencoder and attention mechanism-based long short-term memory for detecting intrusions in imbalanced network traffic","volume":"8","author":"Abdulganiyu","year":"2025","journal-title":"Secur Priv"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111080_bib0014","doi-asserted-by":"crossref","first-page":"4976","DOI":"10.1109\/TCE.2024.3373126","article-title":"Resource-constraint deep forest-based intrusion detection method in Internet of Things for consumer electronic","volume":"70","author":"Chen","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"issue":"22","key":"10.1016\/j.compeleceng.2026.111080_bib0015","doi-asserted-by":"crossref","first-page":"22133","DOI":"10.1109\/JIOT.2021.3106898","article-title":"Deep learning in security of Internet of Things","volume":"9","author":"Li","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"13","key":"10.1016\/j.compeleceng.2026.111080_bib0016","doi-asserted-by":"crossref","first-page":"10327","DOI":"10.1109\/JIOT.2020.3048038","article-title":"Adversarial attacks against network intrusion detection in IoT systems","volume":"8","author":"Qiu","year":"2021","journal-title":"IEEE Internet Things J"},{"issue":"22","key":"10.1016\/j.compeleceng.2026.111080_bib0017","doi-asserted-by":"crossref","first-page":"37032","DOI":"10.1109\/JIOT.2024.3439440","article-title":"Projected natural gradient method: unveiling low-power perturbation vulnerabilities in deep learning-based automatic modulation classification","volume":"11","author":"Ben Nasr","year":"2024","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111080_bib0018","article-title":"Robust attacks detection model for internet of flying things based on generative adversarial network (GAN) and adversarial training","volume":"14","author":"Gaber","year":"2025","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111080_bib0019","doi-asserted-by":"crossref","first-page":"6390","DOI":"10.1109\/TNNLS.2021.3136503","article-title":"DeepSMOTE: fusing deep learning and SMOTE for imbalanced data","volume":"34","author":"Dablain","year":"2023","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"March","key":"10.1016\/j.compeleceng.2026.111080_bib0020","doi-asserted-by":"crossref","first-page":"50437","DOI":"10.1109\/ACCESS.2025.3552529","article-title":"Addressing adversarial attacks in IoT using deep learning AI models","volume":"13","author":"Bommana","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0021","series-title":"Proceeding - IEEE global communications conference GLOBECOM","article-title":"Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks","author":"Ibitoye","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0022","doi-asserted-by":"crossref","first-page":"183678","DOI":"10.1109\/ACCESS.2020.3029191","article-title":"Rpl attack detection and prevention in the internet of things networks using a GRU based deep learning","volume":"8","author":"Cakir","year":"2020","journal-title":"IEEE Access"},{"issue":"April","key":"10.1016\/j.compeleceng.2026.111080_bib0023","article-title":"Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things","volume":"123","author":"Nayak","year":"2021","journal-title":"Ad Hoc Netw"},{"issue":"5\u20136","key":"10.1016\/j.compeleceng.2026.111080_bib0024","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s12243-021-00854-y","article-title":"The robust deep learning\u2013based schemes for intrusion detection in Internet of Things environments","volume":"76","author":"Fu","year":"2021","journal-title":"Ann des Telecommun Telecommun"},{"issue":"19","key":"10.1016\/j.compeleceng.2026.111080_bib0025","doi-asserted-by":"crossref","first-page":"19147","DOI":"10.1109\/JIOT.2022.3163894","article-title":"Toward generative adversarial networks for the industrial Internet of Things","volume":"9","author":"Qian","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111080_bib0026","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s23177342","article-title":"Approach for detecting attacks on IoT networks based on ensemble feature selection and deep learning models","volume":"23","author":"Rihan","year":"2023","journal-title":"Sensors"},{"issue":"April 2025","key":"10.1016\/j.compeleceng.2026.111080_bib0027","first-page":"53","article-title":"An adversarial attack on artificial intelligence malware detection in consumer Internet of Things","author":"Yang","year":"2024","journal-title":"IEEE Consum Electron Mag"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0028","doi-asserted-by":"crossref","first-page":"2058","DOI":"10.1109\/TCE.2023.3341696","article-title":"Adversarial ML-based secured cloud architecture for consumer Internet of Things of smart healthcare","volume":"70","author":"Samriya","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0029","doi-asserted-by":"crossref","first-page":"4258","DOI":"10.1109\/TCE.2024.3349490","article-title":"Two-level privacy-preserving framework: federated learning for attack detection in the consumer Internet of Things","volume":"70","author":"Rabieinejad","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111080_bib0030","first-page":"1","article-title":"Reliable secured consumer IIoT framework with multi layer attack interpretation and prevention","volume":"PP","author":"Nallakaruppan","year":"2025","journal-title":"IEEE Trans Consum Electron"},{"issue":"PB","key":"10.1016\/j.compeleceng.2026.111080_bib0031","article-title":"Satin bird optimization and sliced Bi-directional gated recurrent unit based network intrusion detection system","volume":"128","author":"Valavan","year":"2025","journal-title":"Comput Electr Eng"},{"issue":"July 2025","key":"10.1016\/j.compeleceng.2026.111080_bib0032","article-title":"A hybrid lightweight feature extraction assisted ensemble approach for intrusion detection with ESMOTE-based class imbalance handling in IoT networks","volume":"130","author":"Ammannamma","year":"2026","journal-title":"Comput Electr Eng"},{"issue":"October 2025","key":"10.1016\/j.compeleceng.2026.111080_bib0033","article-title":"A hybrid deep learning model for adversarially resilient Internet traffic prediction","volume":"130","author":"Saha","year":"2026","journal-title":"Comput Electr Eng"},{"issue":"13","key":"10.1016\/j.compeleceng.2026.111080_bib0034","doi-asserted-by":"crossref","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","article-title":"A new explainable deep learning framework for cyber threat discovery in industrial IoT networks","volume":"9","author":"Khan","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"October","key":"10.1016\/j.compeleceng.2026.111080_bib0035","doi-asserted-by":"crossref","first-page":"115047","DOI":"10.1109\/ACCESS.2023.3323573","article-title":"An explainable ensemble deep learning approach for intrusion detection in industrial Internet of Things","volume":"11","author":"Shtayat","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0036","doi-asserted-by":"crossref","first-page":"1342","DOI":"10.1109\/TCE.2023.3283704","article-title":"An explainable and resilient intrusion detection system for Industry 5.0","volume":"70","author":"Javeed","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0037","doi-asserted-by":"crossref","first-page":"1889","DOI":"10.1109\/TCE.2024.3424189","article-title":"An adaptive explainable AI framework for securing consumer electronics-based IoT applications in fog-cloud infrastructure","volume":"71","author":"Tripathy","year":"2025","journal-title":"IEEE Trans Consum Electron"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111080_bib0038","article-title":"A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures","volume":"35","author":"Saheed","year":"2023","journal-title":"J King Saud Univ"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111080_bib0039","doi-asserted-by":"crossref","first-page":"12622","DOI":"10.1007\/s11227-023-05153-y","article-title":"Stacked deep learning framework for edge-based intelligent threat detection in IoT network","volume":"79","author":"Santhadevi","year":"2023","journal-title":"J Supercomput"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-025-94500-5","article-title":"A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning","volume":"15","author":"Sinha","year":"2025","journal-title":"Sci Rep"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0041","series-title":"Proceeding 2024 IEEE international conference on cyber security and resilience, CSR 2024","first-page":"22","article-title":"Explainable federated learning for botnet detection in IoT networks","author":"Kalakoti","year":"2024"},{"issue":"18","key":"10.1016\/j.compeleceng.2026.111080_bib0042","doi-asserted-by":"crossref","first-page":"37670","DOI":"10.1109\/JIOT.2025.3584653","article-title":"TrustAware-GNN: graph neural network-based trust management for IoT anomaly detection","volume":"12","author":"Awan","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0043","series-title":"Model-agnostic interpretability of machine learning","author":"Ribeiro","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0044","series-title":"Gradient-weighted class activation mapping (Grad-CAM) based explanations for process monitoring results from deep neural networks","author":"Bhakte","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0045","first-page":"5109","article-title":"Axiomatic attribution for deep networks","volume":"7","author":"Sundararajan","year":"2017","journal-title":"34th Int Conf Mach Learn ICML 2017"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0046","unstructured":"M.T. Ribeiro and C. Guestrin, \u201cAnchors : high-precision model-agnostic explanations,\u201d pp. 1527\u20131535."},{"issue":"115939","key":"10.1016\/j.compeleceng.2026.111080_bib0047","article-title":"CPS-IoT-PPDNN: a new explainable privacy preserving DNN for resilient anomaly detection in Cyber-Physical Systems-enabled IoT networks","volume":"191","author":"Saheed","year":"2025","journal-title":"Chaos Solit Fract"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0048","series-title":"2023 IEEE\/ACM 4th international workshop on engineering and cybersecurity of critical systems (EnCyCriS), Melbourne, Australia","first-page":"9","article-title":"Autoencoder via DCNN and LSTM models for intrusion detection in industrial control systems of critical infrastructures","author":"Saheed","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111080_bib0049","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TGRS.2025.3636590","article-title":"DiffDual-AD: diffusion-based dual-stage adversarial defense framework in remote sensing with denoiser constraint","volume":"63","author":"Lu","year":"2025","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"47","key":"10.1016\/j.compeleceng.2026.111080_bib0050","doi-asserted-by":"crossref","first-page":"26652","DOI":"10.1007\/s11356-025-37137-1","article-title":"Towards efficient artificial intelligence techniques for the assessment of irrigation water quality: a systematic literature review","volume":"32","author":"Mustapha","year":"2025","journal-title":"Environ Sci Pollut Res"},{"issue":"July 2024","key":"10.1016\/j.compeleceng.2026.111080_bib0051","article-title":"Attention-driven multi-model architecture for unbalanced network traffic intrusion detection via extreme gradient boosting","volume":"26","author":"Abdulganiyu","year":"2025","journal-title":"Intell Syst Appl"},{"issue":"October","key":"10.1016\/j.compeleceng.2026.111080_bib0052","article-title":"XAIEnsembleTL-IoV: a new eXplainable Artificial Intelligence ensemble transfer learning for zero-day botnet attack detection in the Internet of Vehicles","volume":"24","author":"Saheed","year":"2024","journal-title":"Results Eng"},{"issue":"May","key":"10.1016\/j.compeleceng.2026.111080_bib0053","doi-asserted-by":"crossref","first-page":"81118","DOI":"10.1109\/ACCESS.2025.3566980","article-title":"CPS-IIoT-P2Attention: explainable privacy-preserving with scaled dot-product attention in cyber physical system-industrial IoT network","volume":"13","author":"Saheed","year":"2025","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111080_bib0054","doi-asserted-by":"crossref","first-page":"1889","DOI":"10.1109\/TCE.2024.3424189","article-title":"An adaptive explainable AI framework for securing consumer electronics-based IoT applications in fog-cloud infrastructure","volume":"71","author":"Tripathy","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111080_bib0055","doi-asserted-by":"crossref","first-page":"3575","DOI":"10.1109\/TCBB.2023.3305429","article-title":"Microarray gene expression data classification via Wilcoxon Sign Rank Sum and Novel Grey Wolf optimized ensemble learning models","volume":"20","author":"Saheed","year":"2023","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001527?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001527?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T06:19:52Z","timestamp":1773901192000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626001527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":55,"alternative-id":["S0045790626001527"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111080","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"XAI-Enhanced adversarial resilient deep learning framework for transparent and secure edge deployment in consumer Internet of Things\/Industrial Internet of Things environments","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111080","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"111080"}}