{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:57:35Z","timestamp":1775199455241,"version":"3.50.1"},"reference-count":128,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"NSF","award":["2416992"],"award-info":[{"award-number":["2416992"]}]},{"name":"NSF","award":["2230610"],"award-info":[{"award-number":["2230610"]}]},{"name":"NSF","award":["2113945"],"award-info":[{"award-number":["2113945"]}]},{"name":"NSF","award":["2329705"],"award-info":[{"award-number":["2329705"]}]},{"name":"NSF","award":["2200538"],"award-info":[{"award-number":["2200538"]}]},{"DOI":"10.13039\/100008521","name":"North Carolina Agricultural and Technical State University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008521","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100020190","name":"Tennessee Tech University","doi-asserted-by":"publisher","award":["2416990"],"award-info":[{"award-number":["2416990"]}],"id":[{"id":"10.13039\/100020190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100020190","name":"Tennessee Tech University","doi-asserted-by":"publisher","award":["2230609"],"award-info":[{"award-number":["2230609"]}],"id":[{"id":"10.13039\/100020190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3555926","type":"journal-article","created":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T03:54:54Z","timestamp":1743220494000},"page":"61611-61640","source":"Crossref","is-referenced-by-count":20,"title":["Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5976-537X","authenticated-orcid":false,"given":"Harikha","family":"Manthena","sequence":"first","affiliation":[{"name":"Computer Science Department, North Carolina Agricultural and Technical State University, Greensboro, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7334-3864","authenticated-orcid":false,"given":"Shaghayegh","family":"Shajarian","sequence":"additional","affiliation":[{"name":"Computer Science Department, North Carolina Agricultural and Technical State University, Greensboro, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6926-2832","authenticated-orcid":false,"given":"Jeffrey C.","family":"Kimmell","sequence":"additional","affiliation":[{"name":"Computer Science Department, Tennessee Tech University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5627-5239","authenticated-orcid":false,"given":"Mahmoud","family":"Abdelsalam","sequence":"additional","affiliation":[{"name":"Computer Science Department, North Carolina Agricultural and Technical State University, Greensboro, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0649-9247","authenticated-orcid":false,"given":"Sajad","family":"Khorsandroo","sequence":"additional","affiliation":[{"name":"Computer Science Department, North Carolina Agricultural and Technical State University, Greensboro, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9189-2478","authenticated-orcid":false,"given":"Maanak","family":"Gupta","sequence":"additional","affiliation":[{"name":"Computer Science Department, Tennessee Tech University, Cookeville, TN, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976199"},{"key":"ref2","article-title":"A systematic review of explainable artificial intelligence models and applications: Recent developments and future trends","volume":"7","author":"Saranya","year":"2023","journal-title":"Decis. Anal. J."},{"key":"ref3","article-title":"Opportunities and challenges in explainable artificial intelligence (XAI): A survey","author":"Das","year":"2020","journal-title":"arXiv:2006.11371"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32236-6_51"},{"key":"ref5","article-title":"Explainable artificial intelligence approaches: A survey","author":"Islam","year":"2021","journal-title":"arXiv:2101.09429"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.11.013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294569"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.aacl-main.46"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3387166"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2983930"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1391"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534639"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110273"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3616864"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3335187"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00926-7"},{"key":"ref17","article-title":"Towards interpreting ML-based automated malware detection models: A survey","author":"Lin","year":"2021","journal-title":"arXiv:2101.06232"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"key":"ref19","first-page":"803","article-title":"Deep neural networks for automatic Android malware detection","volume-title":"Proc. IEEE\/ACM Int. Conf. Adv. Social Netw. Anal. Mining (ASONAM)","author":"Hou"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SNPDWinter52325.2021.00057"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-010-0141-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12942-2_19"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.33"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CYBERSEC.2016.008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2015.7166115"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972555"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TALE48000.2019.9225899"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3067658"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.10.012"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080608"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2007183.2007189"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.90"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59635-4_5"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62582-5_10"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP52413.2021.00046"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3077498"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00028"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/e23010018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-023-10179-8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3561048"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29726-8_2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2021.688969"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.11.003"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.2999776"},{"key":"ref48","article-title":"Explainable AI for trees: From local explanations to global understanding","author":"Lundberg","year":"2019","journal-title":"arXiv:1905.04610"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3301326.3301390"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040593"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108192"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2864475"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.5335\/rbca.v12i1.10247"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA49011.2020.00103"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2020.104041"},{"key":"ref57","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Lundberg"},{"key":"ref58","volume-title":"Interpretable Machine Learning","author":"Molnar","year":"2022"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2022.103822"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2014.907095"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1080\/10527001.2023.2170769"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE50027.2020.00146"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110336"},{"key":"ref64","article-title":"Iterative orthogonal feature projection for diagnosing bias in black-box models","author":"Adebayo","year":"2016","journal-title":"arXiv:1611.04967"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1214\/07-AOAS148"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534115"},{"key":"ref67","first-page":"3145","article-title":"Learning important features through propagating activation differences","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Shrikumar"},{"key":"ref68","first-page":"1","article-title":"Malware detection by eating a whole EXE","volume-title":"Proc. Workshops 32nd AAAI Conf. Artif. Intell.","author":"Raff"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref70","article-title":"Text understanding from scratch","author":"Zhang","year":"2015","journal-title":"arXiv:1502.01710"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207322"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22868-2_90"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458719"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86261-9_5"},{"key":"ref76","article-title":"On the effectiveness of interpretable feedforward neural network","author":"Li","year":"2021","journal-title":"arXiv:2111.02303"},{"key":"ref77","first-page":"48","article-title":"To believe or not to believe: Validating explanation fidelity for dynamic malware analysis","volume-title":"Proc. CVPR Workshops","author":"Chen"},{"key":"ref78","article-title":"Towards interpretable ensemble learning for image-based malware detection","author":"Lin","year":"2021","journal-title":"arXiv:2101.04889"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103409"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00501-1"},{"key":"ref81","article-title":"Explainable malware detection with tailored logic explained networks","author":"Anthony","year":"2024","journal-title":"arXiv:2405.03009"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103703"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN61486.2024.10637577"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/IC-CGU58078.2024.10530706"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3194452.3194465"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553598"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533803"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.118"},{"key":"ref89","article-title":"How does it detect a malicious app?\u2019 explaining the predictions of AI-based Android malware detector","author":"Lu","year":"2021","journal-title":"arXiv:2111.05108"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3082173"},{"key":"ref91","article-title":"Malware analysis and detection with explainable machine learning","author":"Scalas","year":"2021"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.09.082"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590446"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102198"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3423096"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9659888"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.3390\/s22186766"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7671967"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3189645"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE55969.2022.00026"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s00542-024-05615-0"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103691"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5104-0"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2700270"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5249190"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2024.2438696"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-021-01393-7"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD50377.2020.00113"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3150573"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102371"},{"key":"ref113","article-title":"Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors","author":"Sun","year":"2021","journal-title":"arXiv:2111.10085"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2019.8899533"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206780"},{"key":"ref116","first-page":"1","article-title":"Explanation-guided backdoor poisoning attacks against malware classifiers","volume-title":"Proc. 30th USENIX Secur. Symp. USENIX Secur.","author":"Severi"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021924"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474050"},{"key":"ref120","first-page":"1","article-title":"PREEMPT: PReempting malware by examining embedded processor traces","volume-title":"Proc. 56th ACM\/IEEE Design Autom. Conf. (DAC)","author":"Basu"},{"key":"ref121","first-page":"2343","article-title":"On training robust $PDF$ malware classifiers","volume-title":"Proc. 29th USENIX Secur. Symp. USENIX Secur.","author":"Chen"},{"key":"ref122","article-title":"Deep transfer learning for static malware classification","author":"Chen","year":"2018","journal-title":"arXiv:1812.07606"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45371-8_6"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.5220\/0010518506170628"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207637"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.3390\/s22072798"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.3390\/app12136761"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103842"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/10820123\/10944807-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10944807.pdf?arnumber=10944807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T17:40:31Z","timestamp":1744652431000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10944807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":128,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3555926","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}