{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:34:03Z","timestamp":1777952043816,"version":"3.51.4"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:00:00Z","timestamp":1769731200000},"content-version":"vor","delay-in-days":29,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.016","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"124-131","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Explainability Evaluation Benchmarks for Neural NLP Models Applied in Healthcare Applications"],"prefix":"10.1016","volume":"275","author":[{"given":"Sanjay","family":"Kumar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sapna","family":"Bawankar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.01.016_bib1","doi-asserted-by":"crossref","first-page":"70791","DOI":"10.1109\/ACCESS.2025.3560567","article-title":"The Effect of AI Gamification on Students\u2019 Engagement and Academic Achievement in Malaysia: SEM Analysis Perspectives.","volume":"13","author":"Ahmed Dahri","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.01.016_bib2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.59277\/ROMJIST.2024.1.06","article-title":"An Effective Doctor Recommendation Algorithm for Online Healthcare Platforms.","volume":"27","author":"Shambour","year":"2024","journal-title":"Romanian Journal of Information Science and Technology"},{"key":"10.1016\/j.procs.2026.01.016_bib3","doi-asserted-by":"crossref","unstructured":"Nimma D, Rao PL, Ramesh JVN, et al. Reinforcement Learning-Based Integrated Risk Aware Dynamic Treatment Strategy for Consumer-Centric Next-Gen Healthcare. IEEE Transactions on Consumer Electronics 2025. https:\/\/doi.org\/10.1109\/TCE.2025.3565900.","DOI":"10.1109\/TCE.2025.3565900"},{"key":"10.1016\/j.procs.2026.01.016_bib4","doi-asserted-by":"crossref","unstructured":"Babes B, Latr\u00e8che S, Bouafassa A, et al. A dSPACE-based implementation of ANFIS and predictive current control for a single phase boost power factor corrector. Scientific Reports 2024;14. https:\/\/doi.org\/10.1038\/s41598-024-63740-2.","DOI":"10.1038\/s41598-024-63740-2"},{"issue":"2","key":"10.1016\/j.procs.2026.01.016_bib5","doi-asserted-by":"crossref","first-page":"797","DOI":"10.5267\/j.ijdns.2023.12.024","article-title":"Can companies in digital marketing benefit from artificial intelligence in content creation?","volume":"8","author":"Ahmad","year":"2024","journal-title":"International Journal of Data and Network Science"},{"issue":"2","key":"10.1016\/j.procs.2026.01.016_bib6","first-page":"2273","article-title":"Tuning the K value in K-nearest neighbors for malware detection.","volume":"13","author":"Abualhaj","year":"2024","journal-title":"IAES International Journal of Artificial Intelligence"},{"issue":"1","key":"10.1016\/j.procs.2026.01.016_bib7","doi-asserted-by":"crossref","first-page":"118","DOI":"10.15849\/IJASCA.240330.07","article-title":"Innovative Malware Detection: Practical Swarm Optimization and fuzzyKNN Model in Honeypot Environment.","volume":"16","author":"Othman","year":"2024","journal-title":"International Journal of Advances in Soft Computing and its Applications"},{"issue":"12","key":"10.1016\/j.procs.2026.01.016_bib8","doi-asserted-by":"crossref","first-page":"34351","DOI":"10.1007\/s11042-023-16971-w","article-title":"An optimal task scheduling method in IoT-Fog-Cloud network using multi-objective moth-flame algorithm.","volume":"83","author":"Salehnia","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.procs.2026.01.016_bib9","doi-asserted-by":"crossref","unstructured":"Salah Z, Abu Owida HA, Abu Elsoud E, Alhenawi E, Abuowaida S, Alshdaifat NFF. An Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Form. Future Internet 2024;16(11). https:\/\/doi.org\/10.3390\/fi16110414.","DOI":"10.3390\/fi16110414"},{"key":"10.1016\/j.procs.2026.01.016_bib10","doi-asserted-by":"crossref","unstructured":"Abd Elaziz M, et al. Evolution toward intelligent communications: Impact of deep learning applications on the future of 6G technology. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 2024;14(1). https:\/\/doi.org\/10.1002\/widm.1521.","DOI":"10.1002\/widm.1521"},{"issue":"2","key":"10.1016\/j.procs.2026.01.016_bib11","doi-asserted-by":"crossref","first-page":"733","DOI":"10.5267\/j.ijdns.2024.1.005","article-title":"A fine-tuning of decision tree classifier for ransomware detection based on memory data.","volume":"8","author":"Abualhaj","year":"2024","journal-title":"International Journal of Data and Network Science"},{"key":"10.1016\/j.procs.2026.01.016_bib12","doi-asserted-by":"crossref","unstructured":"Maz YA, Anbar M, Manickam S, Abualhaj MM. Transfer Learning Approach for Detecting Keylogging Attack on the Internet of Things. In: 2024 4th International Conference on Emerging Smart Technologies and Applications (eSmarTA); 2024. https:\/\/doi.org\/10.1109\/eSmarTA62850.2024.10638915.","DOI":"10.1109\/eSmarTA62850.2024.10638915"},{"key":"10.1016\/j.procs.2026.01.016_bib13","doi-asserted-by":"crossref","first-page":"41829","DOI":"10.1109\/ACCESS.2024.3377232","article-title":"Transformer-Based Named Entity Recognition in Construction Supply Chain Risk Management in Australia.","volume":"12","author":"Shishehgarkhaneh","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.01.016_bib14","doi-asserted-by":"crossref","unstructured":"Tassnim R, Tawfic Ja\u2019far RA, Al-Tarawneh AMA. Analyzing the Challenges Facing Digital Mental Health (DMH) Between Aspiration and Reality. In: 2024 2nd International Conference on Cyber Resilience (ICCR); 2024. https:\/\/doi.org\/10.1109\/ICCR61006.2024.10533151.","DOI":"10.1109\/ICCR61006.2024.10533151"},{"key":"10.1016\/j.procs.2026.01.016_bib15","doi-asserted-by":"crossref","unstructured":"Abu-Shareha AA, Abualhaj MM, AL-ALLAWEE A, Munther A, Anbar M. Enhancing Malware Detection with Firefly and Grey Wolf Optimization Algorithms. In: 2024 11th International Conference on Electrical and Electronics Engineering (ICEEE); 2024. https:\/\/doi.org\/10.1109\/ICEEE62185.2024.10779310.","DOI":"10.1109\/ICEEE62185.2024.10779310"},{"issue":"3","key":"10.1016\/j.procs.2026.01.016_bib16","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.14569\/IJACSA.2024.01503126","article-title":"The Effect of Pre-processing on a Convolutional Neural Network Model for Dorsal Hand Vein Recognition.","volume":"15","author":"Tarawneh","year":"2024","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"10.1016\/j.procs.2026.01.016_bib17","doi-asserted-by":"crossref","unstructured":"Fakhouri HN, et al. Critical Evaluation of the Role of Cloud Systems and Networking in the Security and Growth of the Business Market. In: 2024 2nd International Conference on Cyber Resilience (ICCR); 2024.","DOI":"10.1109\/ICCR61006.2024.10533145"},{"issue":"2","key":"10.1016\/j.procs.2026.01.016_bib18","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.32604\/cmc.2024.057673","article-title":"Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.","volume":"81","author":"Almaiah","year":"2024","journal-title":"Computers, Materials and Continua"},{"issue":"21","key":"10.1016\/j.procs.2026.01.016_bib19","doi-asserted-by":"crossref","first-page":"59887","DOI":"10.1007\/s11042-023-17886-2","article-title":"Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection System.","volume":"83","author":"Abualigah","year":"2024","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"10.1016\/j.procs.2026.01.016_bib20","doi-asserted-by":"crossref","first-page":"5259","DOI":"10.1109\/TCE.2025.3573033","article-title":"Federated Learning With Small and Large Models With Privacy-Preserving Data Space for Holographic Internet of Things in Consumer Electronics.","volume":"71","author":"Ghazal","year":"2025","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10.1016\/j.procs.2026.01.016_bib21","doi-asserted-by":"crossref","unstructured":"Sridevi T, et al. An opportunistic energy-efficient dynamic self-configuration clustering algorithm in WSN-based IoT networks. International Journal of Communication Systems 2024;37(1). https:\/\/doi.org\/10.1002\/dac.5633.","DOI":"10.1002\/dac.5633"},{"key":"10.1016\/j.procs.2026.01.016_bib22","doi-asserted-by":"crossref","unstructured":"Fakhouri HN, AlSharaiah MA, Al hwaitat AK, Alkalaileh M, Dweikat FF. Overview of Challenges Faced by Digital Forensic. In: 2024 2nd International Conference on Cyber Resilience (ICCR); 2024. https:\/\/doi.org\/10.1109\/ICCR61006.2024.10532850.","DOI":"10.1109\/ICCR61006.2024.10532850"},{"issue":"2","key":"10.1016\/j.procs.2026.01.016_bib23","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.5267\/j.ijdns.2023.11.007","article-title":"Exploring the role of digital citizenship and digital empowerment to enhance academic performance of business students.","volume":"8","author":"Al-Ali","year":"2024","journal-title":"International Journal of Data and Network Science"},{"issue":"3","key":"10.1016\/j.procs.2026.01.016_bib24","doi-asserted-by":"crossref","first-page":"2557","DOI":"10.32604\/cmes.2023.045170","article-title":"Synergistic Swarm Optimization Algorithm.","volume":"139","author":"Alzoubi","year":"2024","journal-title":"CMES\u2013Computer Modeling in Engineering and Sciences"},{"issue":"3","key":"10.1016\/j.procs.2026.01.016_bib25","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.11591\/ijeecs.v35.i3.pp1773-1785","article-title":"Optimizing blockchain for healthcare IoT: a practical guide to navigating scalability, privacy, and efficiency trade-offs.","volume":"35","author":"AlHija","year":"2024","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"key":"10.1016\/j.procs.2026.01.016_bib26","doi-asserted-by":"crossref","unstructured":"Baniata LH, Kang S, Alsharaiah MA, Baniata M. Advanced Deep Learning Model for Predicting the Academic Performances of Students in Educational Institutions. Applied Sciences 2024;14(5). https:\/\/doi.org\/10.3390\/app14051963.","DOI":"10.3390\/app14051963"},{"key":"10.1016\/j.procs.2026.01.016_bib27","doi-asserted-by":"crossref","unstructured":"Alsokkar AAM, Otair MA, Alfar HE, Nasereddin AY, Aldiabat K, Abualigah LMQ. Sentiment analysis for Arabic call center notes using machine learning techniques. Journal of Autonomous Intelligence 2024;7(3). https:\/\/doi.org\/10.32629\/jai.v7i3.940.","DOI":"10.32629\/jai.v7i3.940"},{"key":"10.1016\/j.procs.2026.01.016_bib28","doi-asserted-by":"crossref","unstructured":"Maaz M, Ahmed GN, Al-Shamayleh AS, Akhundzada A, Siddiqui S, Al-Ghushami AH. Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security. IEEE Access 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3482005.","DOI":"10.1109\/ACCESS.2024.3482005"},{"key":"10.1016\/j.procs.2026.01.016_bib29","doi-asserted-by":"crossref","unstructured":"Kiran Kumar G, et al. An optimized meta-heuristic clustering-based routing scheme for secured wireless sensor networks. International Journal of Communication Systems 2024;37(11). https:\/\/doi.org\/10.1002\/dac.5791.","DOI":"10.1002\/dac.5791"},{"issue":"4","key":"10.1016\/j.procs.2026.01.016_bib30","first-page":"924","article-title":"Enhancing Threat Detection in Financial Cyber Security Through Auto Encoder-MLP Hybrid Models.","volume":"15","author":"Al-Mahadeen","year":"2024","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"5","key":"10.1016\/j.procs.2026.01.016_bib31","doi-asserted-by":"crossref","first-page":"6036","DOI":"10.11591\/ijece.v14i5.pp6036-6046","article-title":"Enhancing internet of things security: evaluating machine learning classifiers for attack prediction.","volume":"14","author":"Arabiat","year":"2024","journal-title":"International Journal of Electrical and Computer Engineering"},{"issue":"6","key":"10.1016\/j.procs.2026.01.016_bib32","doi-asserted-by":"crossref","first-page":"17093","DOI":"10.1007\/s11042-023-16068-4","article-title":"Mobile money fraud detection using data analysis and visualization techniques.","volume":"83","author":"Al-Sayyed","year":"2024","journal-title":"Multimedia Tools and Applications"},{"issue":"13","key":"10.1016\/j.procs.2026.01.016_bib33","doi-asserted-by":"crossref","first-page":"37295","DOI":"10.1007\/s11042-023-16889-3","article-title":"A novel secure cryptography model for data transmission based on Rotor64 technique.","volume":"83","author":"Obeidat","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.procs.2026.01.016_bib34","doi-asserted-by":"crossref","unstructured":"Akhundzada A, Al-Shamayleh AS, Zeadally S, Almogren AS, Abu-Shareha AA. Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles. Computers and Electrical Engineering 2024;119. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109609.","DOI":"10.1016\/j.compeleceng.2024.109609"},{"issue":"1","key":"10.1016\/j.procs.2026.01.016_bib35","doi-asserted-by":"crossref","first-page":"263","DOI":"10.14569\/IJACSA.2024.0150125","article-title":"Performance Evaluation of Machine Learning Classifiers for Predicting Denial-of-Service Attack in Internet of Things.","volume":"15","author":"Almomani","year":"2024","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"10.1016\/j.procs.2026.01.016_bib36","doi-asserted-by":"crossref","unstructured":"Saeed NMSE, et al. Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review. 2024. https:\/\/doi.org\/10.1109\/ICCR61006.2024.10533066.","DOI":"10.1109\/ICCR61006.2024.10533066"},{"key":"10.1016\/j.procs.2026.01.016_bib37","doi-asserted-by":"crossref","unstructured":"Fauzi MA, et al. The Present and Future Trends of Leadership Styles and Knowledge Hiding Through Science Mapping Analysis. Journal of Information and Knowledge Management 2025;24(5). https:\/\/doi.org\/10.1142\/S0219649225500406.","DOI":"10.1142\/S0219649225500406"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000165?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000165?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:19:36Z","timestamp":1777893576000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":37,"alternative-id":["S1877050926000165"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.016","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Explainability Evaluation Benchmarks for Neural NLP Models Applied in Healthcare Applications","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.016","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}