{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T21:11:57Z","timestamp":1774473117673,"version":"3.50.1"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Office of the Vice Chancellor for Research at Indiana University-Purdue University Indianapolis through the Lilly Endowment (AnalytixIN) Grant"},{"name":"Enhanced Mentoring Program with Opportunities for Ways to Excel in Research (EMPOWER) Grant"},{"name":"1st Year Research Immersion Program (1RIP) Grant"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3383431","type":"journal-article","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T18:54:45Z","timestamp":1712084085000},"page":"48583-48607","source":"Crossref","is-referenced-by-count":52,"title":["XAI-ADS: An Explainable Artificial Intelligence Framework for Enhancing Anomaly Detection in Autonomous Driving Systems"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1163-6448","authenticated-orcid":false,"given":"Sazid","family":"Nazat","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Department, Purdue School of Engineering and Technology, Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5192-492X","authenticated-orcid":false,"given":"Lingxi","family":"Li","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Purdue School of Engineering and Technology, Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9554-9260","authenticated-orcid":false,"given":"Mustafa","family":"Abdallah","sequence":"additional","affiliation":[{"name":"Computer and Information Technology Department, Purdue School of Engineering and Technology, Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s40534-016-0117-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037705"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00495"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2016.416004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3136706"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12754"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IV51971.2022.9827078"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308404"},{"key":"ref10","article-title":"Explainable artificial intelligence for autonomous driving: A comprehensive overview and field guide for future research directions","author":"Atakishiyev","year":"2021","journal-title":"arXiv:2112.11561"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3291674"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2018.02.012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-023-10179-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/app13031252"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2023.104358"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3592538.3594274"},{"key":"ref20","volume-title":"Ml 101: Feature Selection With Selectkbest Using Scikit-Learn (Python)","author":"Kaplan","year":"2023"},{"key":"ref21","volume-title":"A Step-by-Step Explanation of Principal Component Analysis (PCA)","author":"Jaadi","year":"2023"},{"key":"ref22","volume-title":"Feature Selection for a Machine Learning Model","author":"Jordan","year":"2023"},{"key":"ref23","volume-title":"Feature Selection for Machine Learning in Python","author":"Brownlee","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"issue":"2","key":"ref25","doi-asserted-by":"crossref","first-page":"859","DOI":"10.32604\/iasc.2022.020936","article-title":"Sensor data based anomaly detection in autonomous vehicles using modified convolutional neural network","volume":"32","author":"Rajendar","year":"2022","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9449086"},{"issue":"7","key":"ref27","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.3390\/sym14071450","article-title":"Symmetrical simulation scheme for anomaly detection in autonomous vehicles based on LSTM model","volume":"14","author":"Alsulami","year":"2022","journal-title":"Symmetry"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3188304"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2906038"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025875"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485883"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-44064-9_9"},{"key":"ref33","article-title":"An XAI-based masking approach to improve classification system","volume-title":"Proc. CEUR Workshop","author":"Apicella"},{"key":"ref34","article-title":"Toward the application of XAI methods in EEG-based systems","author":"Apicella","year":"2022","journal-title":"arXiv:2210.06554"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCCI52664.2021.9583190"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119573"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208573"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/B978-0-12-821777-1.00024-0","article-title":"An entropy-based hybrid feature selection approach for medical datasets","volume-title":"Machine Learning, Big Data, and IoT for Medical Informatics","author":"Raja","year":"2021"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/eIT53891.2022.9813985"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2018.1440260"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567977"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900463"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.044650"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1440"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3188671"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208573"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3130054"},{"key":"ref48","first-page":"2","article-title":"Deep learning in intrusion detection system: An overview","volume-title":"Proc. Int. Res. Conf. Eng. Technol.","author":"Aminanto"},{"key":"ref49","article-title":"MIT advanced vehicle technology study: Large-scale naturalistic driving study of driver behavior and interaction with automation","author":"Fridman","year":"2017","journal-title":"arXiv:1711.06976"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3233231"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.177\/0278364920917446"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref54","volume-title":"Explainable AI (XAI) in 2023: Guide to Enterprise-Ready AI","author":"Dilmegani","year":"2023"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19775-8_27"},{"key":"ref56","article-title":"Why model why? Assessing the strengths and limitations of LIME","author":"Dieber","year":"2020","journal-title":"arXiv:2012.00093"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2856767.2856811"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3267338"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3122865"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1080\/01441647.2020.1862355"},{"key":"ref61","article-title":"Denial-of-service attacks on C-V2X networks","author":"Trkulja","year":"2020","journal-title":"arXiv:2010.13725"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218490"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100515"},{"key":"ref65","author":"Brownle","year":"2023","journal-title":"Random Oversampling and Undersampling for Imbalanced Classification"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2914722"},{"key":"ref67","volume-title":"Keras","author":"Chollet","year":"2015"},{"key":"ref68","volume-title":"Understand the Workings of Shap and Shapley Values Used in Explainable AI","author":"Bhattacharya","year":"2023"},{"key":"ref69","volume-title":"Explainable AI With Lime","year":"2023"},{"key":"ref70","first-page":"3146","article-title":"LightGBM: A highly efficient gradient boosting decision tree","volume-title":"Proc. Int. Conf. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Ke"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref72","volume-title":"Impact of Hyperparameters on a Deep Learning Model","year":"2023"},{"key":"ref73","volume-title":"Position falsification detection in VANET with consecutive BSM approach using machine learning algorithm","author":"Sharma","year":"2021"},{"key":"ref74","article-title":"A2D2: Audi autonomous driving dataset","author":"Geyer","year":"2020","journal-title":"arXiv:2004.06320"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2022.23018"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00252"},{"key":"ref77","volume-title":"Udacity Self-Driving Car Driving Data","year":"2016"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10486915.pdf?arnumber=10486915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T21:10:02Z","timestamp":1712610602000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10486915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3383431","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}