{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:56:15Z","timestamp":1774468575784,"version":"3.50.1"},"reference-count":66,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100007219","name":"Shanghai Municipal Natural Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human-Computer Studies"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.ijhcs.2026.103781","type":"journal-article","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:34:15Z","timestamp":1772728455000},"page":"103781","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Enhancing trust through a human-center evaluation framework from an accessibility perspective: The case of graph anomaly detection"],"prefix":"10.1016","volume":"211","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4615-4123","authenticated-orcid":false,"given":"Chen","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yiding","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Juntong","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5289-5761","authenticated-orcid":false,"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chenhui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Changbo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ijhcs.2026.103781_bib0005","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/TDSC.2022.3148331","article-title":"Towards an interpretable autoencoder: a decision-tree-based autoencoder and its application in anomaly detection","volume":"20","author":"Aguilar","year":"2023","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0010","first-page":"1","article-title":"Graph-based anomaly detection and description: a survey","volume":"29","author":"Akoglu","year":"2014","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0015","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","article-title":"Graph-based anomaly detection and description: a survey","volume":"29","author":"Akoglu","year":"2014","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115736","article-title":"Explaining anomalies detected by autoencoders using shapley additive explanations","volume":"186","author":"Antwarg","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0025","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","article-title":"Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI","volume":"58","author":"Arrieta","year":"2019","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0030","series-title":"2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)","first-page":"450","article-title":"Harnessing prior knowledge for explainable machine learning: an overview","author":"Beckh","year":"2023"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0035","first-page":"313","article-title":"Statistical fraud detection: a review","volume":"49","author":"Bolton","year":"2002","journal-title":"Qual. Eng."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0040","series-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD \u201900","first-page":"93","article-title":"LoF: identifying density-based local outliers","author":"Breunig","year":"2000"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0045","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: a survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0050","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1057\/palgrave.ivs.9500172","article-title":"Scalable and interactive visual analysis of financial wire transactions for fraud detection","volume":"7","author":"Chang","year":"2008","journal-title":"Info Vis"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2022.102792","article-title":"The effects of domain knowledge on trust in explainable AI and task performance: a case of peer-to-peer lending","volume":"162","author":"Dikmen","year":"2022","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0060","series-title":"Proceedings of the 2019 SIAM International Conference on Data Mining (SDM)","first-page":"594","article-title":"Deep anomaly detection on attributed networks","author":"Ding","year":"2019"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0065","series-title":"Proceedings of the Web Conference 2021, WWW\u201921","first-page":"2448","article-title":"Few-shot network anomaly detection via cross-network meta-learning","author":"Ding","year":"2021"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0070","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-020-69795-1","article-title":"Exploiting graphlet decomposition to explain the structure of complex networks: the ghust framework","volume":"10","author":"Espejo","year":"2020","journal-title":"Sci. Rep."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0075","series-title":"2025 International Conference on Emerging Systems and Intelligent Computing (ESIC)","first-page":"325","article-title":"Enhancing educational outcomes with explainable AI: bridging transparency and trust in learning systems","author":"Geethanjali","year":"2025"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0080","doi-asserted-by":"crossref","first-page":"8919","DOI":"10.1109\/TITS.2023.3275741","article-title":"Edge intelligence in intelligent transportation systems: a survey","volume":"24","author":"Gong","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0085","doi-asserted-by":"crossref","first-page":"4531","DOI":"10.1109\/TVCG.2021.3093585","article-title":"Interpretable anomaly detection in event sequences via sequence matching and visual comparison","volume":"28","author":"Guo","year":"2022","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0090","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2023.103162","article-title":"Innovation tactics for implementing an ML application in healthcare: a long and winding road","volume":"181","author":"Gyldenk\u00e6rne","year":"2024","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0095","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2022.102839","article-title":"Who needs explanation and when? Juggling explainable AI and user epistemic uncertainty","volume":"165","author":"Jiang","year":"2022","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0100","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2025.113278","article-title":"Integrating large language models with cross-modal data fusion for advanced intelligent transportation systems in sustainable cities development","volume":"177","author":"Jiang","year":"2025","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0105","doi-asserted-by":"crossref","first-page":"103459","DOI":"10.1016\/j.artint.2021.103459","article-title":"Explaining black-box classifiers using post-hoc explanations-by-example: the effect of explanations and error-rates in XAI user studies","volume":"294","author":"Kenny","year":"2021","journal-title":"Artif. Intell."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0110","doi-asserted-by":"crossref","first-page":"111820","DOI":"10.1109\/ACCESS.2022.3211306","article-title":"Graph anomaly detection with graph neural networks: current status and challenges","volume":"10","author":"Kim","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0115","doi-asserted-by":"crossref","first-page":"122343","DOI":"10.1016\/j.techfore.2023.122343","article-title":"How should the results of artificial intelligence be explained to users? - research on consumer preferences in user-centered explainable artificial intelligence","volume":"188","author":"Kim","year":"2023","journal-title":"Technol. Forecast. Soc. Change"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0120","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2023.103160","article-title":"Do stakeholder needs differ? - designing stakeholder-tailored explainable artificial intelligence (XAI) interfaces","volume":"181","author":"Kim","year":"2024","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0125","series-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","first-page":"1269","article-title":"Predicting dynamic embedding trajectory in temporal interaction networks","author":"Kumar","year":"2019"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0130","first-page":"1","article-title":"A survey on explainable anomaly detection","volume":"18","author":"Li","year":"2023","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0135","series-title":"Discovering Spatio-Temporal Causal Interactions in Traffic Data Streams, KDD \u201911","first-page":"1010","author":"Liu","year":"2011"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0140","first-page":"1","article-title":"Anomaly detection in dynamic graphs via transformer","volume":"PP","author":"Liu","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0145","series-title":"Advances in Neural Information Processing Systems, NeurIPS\u201923","article-title":"Towards self-interpretable graph-level anomaly detection","volume":"vol. 36","author":"Liu","year":"2023"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0150","series-title":"Proceedings of 2021 International Conference on Learning Representations, ICLR 2021","first-page":"1","article-title":"Explainable deep one-class classification","author":"Liznerski","year":"2021"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0155","series-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS\u201917","first-page":"4768","article-title":"A unified approach to interpreting model predictions","author":"Lundberg","year":"2017"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0160","article-title":"AI-powered fraud detection in decentralized finance: a project life cycle perspective","volume":"57","author":"Luo","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0165","first-page":"1","article-title":"A comprehensive survey on graph anomaly detection with deep learning","volume":"35","author":"Ma","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0170","first-page":"1","article-title":"A comprehensive survey on graph anomaly detection with deep learning","volume":"PP","author":"Ma","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0175","series-title":"2024 IEEE 10th World Forum on Internet of Things (WF-IoT)","first-page":"1","article-title":"A generative AI-driven architecture for intelligent transportation systems","author":"Mangione","year":"2024"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0180","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2021.04.056","article-title":"Semi-supervised anomaly detection in dynamic communication networks","volume":"571","author":"Meng","year":"2021","journal-title":"Info. Sci."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0185","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijmedinf.2024.105780","article-title":"Towards secure and trusted AI in healthcare: a systematic review of emerging innovations and ethical challenges","volume":"195","author":"Mohsin Khan","year":"2025","journal-title":"Int. J. Med. Inform."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0190","series-title":"2019 IEEE AUTOTESTCON","first-page":"1","article-title":"Explainable anomaly and intrusion detection intelligence for platform information technology using dimensionality reduction and ensemble learning","author":"Morris","year":"2019"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0195","series-title":"2018 IEEE Pacific Visualization Symposium (PacificVis)","first-page":"160","article-title":"Visual analytics for networked-guarantee loans risk management","author":"Niu","year":"2018"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0200","series-title":"Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI\u201916","first-page":"1902","article-title":"Outlier detection in complex categorical data by modelling the feature value couplings","author":"Pang","year":"2016"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0205","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1007\/s00778-021-00721-1","article-title":"A survey on outlier explanations","volume":"31","author":"Panjei","year":"2022","journal-title":"VLDB J."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0210","doi-asserted-by":"crossref","first-page":"103277","DOI":"10.1016\/j.ijhcs.2024.103277","article-title":"Impact of example-based XAI for neural networks on trust, understanding, and performance","volume":"188","author":"Perlmutter","year":"2024","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0215","article-title":"Human-machine interactive streaming anomaly detection by online self-adaptive forest","volume":"17","author":"Qingyang","year":"2023","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0220","doi-asserted-by":"crossref","DOI":"10.1016\/j.cogsys.2024.101243","article-title":"Post-hoc vs ante-hoc explanations: XAI design guidelines for data scientists","volume":"86","author":"Retzlaff","year":"2024","journal-title":"Cogn. Syst. Res."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0225","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201916","first-page":"1135","article-title":"\u201cwhy should i trust you?\u201d: explaining the predictions of any classifier","author":"Ribeiro","year":"2016"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0230","series-title":"Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, AAAI\u201918","first-page":"187","article-title":"Anchors: high-precision model-agnostic explanations","author":"Ribeiro","year":"2018"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0235","doi-asserted-by":"crossref","first-page":"1492","DOI":"10.1126\/science.1242072","article-title":"Clustering by fast search and find of density peaks","volume":"344","author":"Rodriguez","year":"2014","journal-title":"Science"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0240","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijhcs.2021.102684","article-title":"Human-centered XAI: developing design patterns for explanations of clinical decision support systems","volume":"154","author":"Schoonderwoerd","year":"2021","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0245","doi-asserted-by":"crossref","first-page":"102684","DOI":"10.1016\/j.ijhcs.2021.102684","article-title":"Human-centered XAI: developing design patterns for explanations of clinical decision support systems","volume":"154","author":"Schoonderwoerd","year":"2021","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0250","series-title":"Proceedings of the 41st ACM International Conference on Design of Communication (SIGDOC\u201923)","first-page":"126","article-title":"The human side of XAI: bridging the gap between AI and non-expert audiences","author":"Severes","year":"2023"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0255","doi-asserted-by":"crossref","first-page":"102551","DOI":"10.1016\/j.ijhcs.2020.102551","article-title":"The effects of explainability and causability on perception, trust, and acceptance: implications for explainable AI","volume":"146","author":"Shin","year":"2021","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0260","series-title":"Foundations of Intelligent Systems","first-page":"162","article-title":"A general-purpose method for applying explainable AI for anomaly detection","author":"Sipple","year":"2022"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0265","series-title":"International Symposium on Methodologies for Intelligent Systems","first-page":"162","article-title":"A general-purpose method for applying explainable AI for anomaly detection","author":"Sipple","year":"2022"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0270","series-title":"Advances in Social Computing: Third International Conference on Social Computing, Behavioral Modeling, and Prediction, SBP 2010, Bethesda, MD, USA, March 30\u201331, 2010. Proceedings 3","first-page":"390","article-title":"A social network analysis approach to detecting suspicious online financial activities","author":"Tang","year":"2010"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0275","series-title":"2018 IEEE Pacific Visualization Symposium (PacificVis)","first-page":"150","article-title":"Visual analysis of collective anomalies through high-order correlation graph","author":"Tao","year":"2018"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0280","series-title":"Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence (IJCAI-23)","first-page":"2306","article-title":"SAD: semi-supervised anomaly detection on dynamic graphs","author":"Tian","year":"2023"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0285","series-title":"Advances in Intelligent Data Analysis XV: 15th International Symposium, IDA 2016, Stockholm, Sweden, October 13\u201315, 2016, Proceedings 15","first-page":"308","article-title":"DGRMiner: anomaly detection and explanation in dynamic graphs","author":"Vacul\u00edk","year":"2016"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0290","series-title":"2019 IEEE International Conference on Data Mining (ICDM)","first-page":"598","article-title":"A semi-supervised graph attentive network for financial fraud detection","author":"Wang","year":"2019"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0295","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1007\/s10586-021-03439-5","article-title":"An explainable and efficient deep learning framework for video anomaly detection","volume":"25","author":"Wu","year":"2022","journal-title":"Cluster Comput."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0300","unstructured":"Xu, D., Ruan, C., Korpeoglu, E., Kumar, S., Achan, K., 2020. Inductive representation learning on temporal graphs. arXiv. pp. 1\u201313. https:\/\/doi.org\/10.48550\/arXiv.2002.07962"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0305","doi-asserted-by":"crossref","first-page":"103376","DOI":"10.1016\/j.ijhcs.2024.103376","article-title":"Comprehension is a double-edged sword: over-interpreting unspecified information in intelligible machine learning explanations","volume":"193","author":"Xuan","year":"2025","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0310","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s11704-011-0080-4","article-title":"Human behavior clustering for anomaly detection","volume":"5","author":"Xudong","year":"2011","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0315","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-024-11077-7","article-title":"A comprehensive review on financial explainable AI","volume":"58","author":"Yeo","year":"2025","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.ijhcs.2026.103781_bib0320","series-title":"Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology","first-page":"192","article-title":"GADDI: distance index based subgraph matching in biological networks","author":"Zhang","year":"2009"},{"issue":"2","key":"10.1016\/j.ijhcs.2026.103781_bib0325","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/JPROC.2024.3369017","article-title":"Trustworthy graph neural networks: aspects, methods and trends","volume":"112","author":"Zhang","year":"2024","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.ijhcs.2026.103781_bib0330","series-title":"Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD\u201917","first-page":"665","article-title":"Anomaly detection with robust deep autoencoders","author":"Zhou","year":"2017"}],"container-title":["International Journal of Human-Computer Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S107158192600056X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S107158192600056X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T18:57:36Z","timestamp":1774465056000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S107158192600056X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":66,"alternative-id":["S107158192600056X"],"URL":"https:\/\/doi.org\/10.1016\/j.ijhcs.2026.103781","relation":{},"ISSN":["1071-5819"],"issn-type":[{"value":"1071-5819","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing trust through a human-center evaluation framework from an accessibility perspective: The case of graph anomaly detection","name":"articletitle","label":"Article Title"},{"value":"International Journal of Human-Computer Studies","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijhcs.2026.103781","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103781"}}