{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:34:43Z","timestamp":1774539283767,"version":"3.50.1"},"reference-count":243,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100021856","name":"Ministero dell'Universit? e della Ricerca","doi-asserted-by":"publisher","award":["PRIN 2022 XInternet"],"award-info":[{"award-number":["PRIN 2022 XInternet"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021856","name":"Ministero dell'Universit? e della Ricerca","doi-asserted-by":"publisher","award":["PNRR ICSC Nat. Res. Centre for HPC, BD, and Quantu"],"award-info":[{"award-number":["PNRR ICSC Nat. Res. Centre for HPC, BD, and Quantu"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021856","name":"Ministero dell'Universit? e della Ricerca","doi-asserted-by":"publisher","award":["PON R&I REACT-EU ? Asse IV ? Azione IV.4"],"award-info":[{"award-number":["PON R&I REACT-EU ? Asse IV ? Azione IV.4"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021856","name":"Ministero dell'Universit? e della Ricerca","doi-asserted-by":"publisher","award":["RESTART"],"award-info":[{"award-number":["RESTART"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/comst.2024.3504955","type":"journal-article","created":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T14:17:03Z","timestamp":1732285023000},"page":"3165-3198","source":"Crossref","is-referenced-by-count":31,"title":["A Survey on Explainable Artificial Intelligence for Internet Traffic Classification and Prediction, and Intrusion Detection"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7395-4222","authenticated-orcid":false,"given":"Alfredo","family":"Nascita","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4445-6259","authenticated-orcid":false,"given":"Giuseppe","family":"Aceto","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6230-2958","authenticated-orcid":false,"given":"Domenico","family":"Ciuonzo","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4340-442X","authenticated-orcid":false,"given":"Antonio","family":"Montieri","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7477-1452","authenticated-orcid":false,"given":"Valerio","family":"Persico","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0221-7444","authenticated-orcid":false,"given":"Antonio","family":"Pescap\u00e9","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3169988"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300361"},{"key":"ref3","article-title":"Comparing explanation methods for traditional machine learning models part 1: An overview of current methods and quantifying their disagreement","author":"Flora","year":"2022","journal-title":"arXiv:2211.08943"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3583558"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref6","volume-title":"Ethics guidelines for trustworthy AI","year":"2019"},{"key":"ref7","volume-title":"AI security white paper","year":"2018"},{"key":"ref8","volume-title":"Telef\u00f3nica\u2019s Approach to the Responsible Use of AI","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3308446"},{"key":"ref10","volume-title":"Trustworthy AI: Explainability, Safety and Verifiability","author":"Mujumdar","year":"2020"},{"key":"ref11","volume-title":"EU AI act","year":"2024"},{"key":"ref12","volume-title":"NEC AI guide book","year":"2021"},{"key":"ref13","volume-title":"AI innovation principles","year":"2022"},{"key":"ref14","volume-title":"Responsible AI for telecom\u2014The next step","author":"Lee","year":"2023"},{"key":"ref15","volume-title":"Executive order on the safe, secure, and trustworthy development and use of artificial intelligence","year":"2023"},{"key":"ref16","volume-title":"Cisco principles for responsible artificial intelligence","year":"2024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISEA-ISAP54304.2021.9689765"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3215676"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204051"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2100736"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204171"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3216617"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020943"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.06.036"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3282740"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3287678"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3280465"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3386872"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3437248"},{"key":"ref30","first-page":"447","article-title":"A survey of the state of explainable AI for natural language processing","volume-title":"Proc. Conf. Asia\u2013Pacific Chapter Assoc. Comput. Linguist. 10th Int. Joint Conf. Nat. Lang. Process.","author":"Danilevsky"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027314"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyai.2022.100169"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3457904"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.09.129"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103457"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09606-8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/sci6010003"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080832"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1002"},{"key":"ref42","first-page":"1","article-title":"Boolean decision rules via column generation","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"31","author":"Dash"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1214\/07-AOAS148"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"issue":"11","key":"ref45","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90403-0_9"},{"issue":"177","key":"ref47","first-page":"1","article-title":"All models are wrong, but many are useful: Learning a variable\u2019s importance by studying an entire class of prediction models simultaneously","volume":"20","author":"Fisher","year":"2019","journal-title":"J. Mach. Learn. Res."},{"key":"ref48","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"30","author":"Lundberg"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6_9"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref54","first-page":"3319","article-title":"Axiomatic attribution for deep networks","volume-title":"Proc. PMLR Int. Conf. Mach. Learn. (ICML)","author":"Sundararajan"},{"key":"ref55","first-page":"3145","article-title":"Learning important features through propagating activation differences","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Shrikumar"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3063289"},{"key":"ref57","first-page":"1","article-title":"Explanations based on the missing: Towards contrastive explanations with pertinent negatives","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"31","author":"Dhurandhar"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00036"},{"key":"ref59","first-page":"2327","article-title":"CADE: Detecting and explaining concept drift samples for security applications","volume-title":"Proc. USENIX Security Symp.","author":"Yang"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/341"},{"key":"ref61","first-page":"1","article-title":"Beyond temperature scaling: Obtaining well-calibrated multi-class probabilities with Dirichlet calibration","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"32","author":"Kull"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102430"},{"key":"ref63","first-page":"1","article-title":"Calibrating deep neural networks using focal loss","volume-title":"Proc. 34th Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Mukhoti"},{"key":"ref64","first-page":"1","article-title":"When does label smoothing help?","volume-title":"Proc. 32th Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"M\u00fcller"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836917"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1561\/2200000101"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962018"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162704"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4707909"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.05.036"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3098157"},{"key":"ref72","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-2107276\/v1","volume-title":"Trustworthy deep learning for encrypted traffic classification","author":"Li","year":"2022"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/MN55117.2022.9887744"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109452"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3245411"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103519"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3246794"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3244168"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599762"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3293105"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3359992.3366767"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78612-0_25"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109467"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.23919\/TMA58422.2023.10199052"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-024-09842-8"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.3390\/app14135466"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560609"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108770"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3149933"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604840"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-07949-9"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2018.8430788"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207199"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101695"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484589"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5564354"},{"key":"ref98","article-title":"Explaining network intrusion detection system using explainable AI framework","author":"Mane","year":"2021","journal-title":"arXiv:2103.07110"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.08.239"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.09.082"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-62746-4_9"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00244"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.3390\/s22031154"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3188750"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI51031.2022.10022255"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3186589"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.005.2200028"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2022.100359"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU56188.2022.9925451"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88942-5_30"},{"key":"ref112","article-title":"On generalisability of machine learning-based network intrusion detection systems","author":"Layeghy","year":"2022","journal-title":"arXiv:2205.04112"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96630-0_4"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838748"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00441-2"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119000"},{"issue":"1","key":"ref117","first-page":"26","article-title":"Explainable AI in intrusion detection systems: Enhancing transparency and interpretability","volume":"2","author":"Rehman","year":"2023","journal-title":"Int. J. Adv. Sci. Comput."},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108692"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29845-5_4"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3625343.3625356"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47448-4_15"},{"key":"ref122","volume-title":"Explainable AI and random forest based reliable intrusion detection system","author":"Wali","year":"2023"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300171"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-024-02242-z"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3309194.3309199"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS50059.2020.00016"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21311-3_8"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.23919\/INDIACom54597.2022.9763241"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.3390\/computers12020032"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96308-8_96"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2025.3534443"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.3390\/info14010016"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327818"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00193"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT57492.2022.10055236"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2022.200152"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3183361"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9797971"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-6661-3_28"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121751"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605162"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-44355-8_13"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/CSR61664.2024.10679348"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590446"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591322"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TASE49443.2020.00019"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59621-7_6"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117144"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF55975.2022.10013844"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.3390\/app12178669"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.290832"},{"key":"ref154","first-page":"1","article-title":"An XAI-based adversarial training approach for cyber-threat detection","volume-title":"Proc. IEEE Int. Conf. Dependable, Auton. Secure Comput. Int. Conf. Pervasive Intell. Comput. Int. Conf. Cloud Big Data Comput. Int. Conf. Cyber Sci. Technol. Congr. (DASC\/PiCom\/CBDCom\/CyberSciTech)","author":"Malik"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT53585.2022.9728897"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.3390\/app12136451"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00101"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.7494\/csci.2023.24.1.4551"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3283704"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10472-7"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3372808"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3051381"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108529"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278874"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/3359992.3366639"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342210"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322496"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405859"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref170","volume-title":"Deep Learning","volume":"1","author":"Bengio","year":"2017"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3368377"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3472753"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3236261"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621134"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048348"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607206"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.3390\/app11104697"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/3630050.3630178"},{"key":"ref179","first-page":"3543","article-title":"Attention is not explanation","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguist. Human Lang. Technol.","volume":"1","author":"Jain"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/3232565.3232569"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295163"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-3560063.2023.10555634"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref184","first-page":"1","article-title":"Web analysis traffic challenge: Description and results","volume-title":"Proc. Disc. Challenge ECML\/PKDD","author":"Dray"},{"issue":"12","key":"ref185","first-page":"1848","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection","volume":"2","author":"Revathi","year":"2013","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.11.006"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"ref197","volume-title":"An International View of Privacy Risks for Mobile Apps","author":"Ren","year":"2019"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2019.8888137"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1145\/3442520.3442521"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00012"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD52502.2021.9617789"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/3561954.3561958"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2023.108888"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3093905"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref210","article-title":"Anon17: Network traffic dataset of anonymity services","author":"Shahbar","year":"2017"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287000"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647128"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/3447382"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2021.3098455"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"ref218","volume-title":"ETF IoT botnet dataset","author":"Jovanovic","year":"2021"},{"key":"ref219","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","article-title":"Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications: Centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEE Access"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"},{"key":"ref221","article-title":"One explanation does not fit all: A toolkit and taxonomy of AI explainability techniques","author":"Arya","year":"2019","journal-title":"arXiv:1909.03012"},{"issue":"181","key":"ref222","first-page":"1","article-title":"Alibi explain: Algorithms for explaining machine learning models","volume":"22","author":"Klaise","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"ref224","article-title":"Captum: A unified and generic model interpretability library for PyTorch","author":"Kokhlikyan","year":"2020","journal-title":"arXiv:2009.07896"},{"issue":"1","key":"ref225","first-page":"9759","article-title":"Dalex: Responsible machine learning with interactive explainability and fairness in python","volume":"22","author":"Baniecki","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372850"},{"key":"ref227","article-title":"DoWhy: An end-to-end library for causal inference","author":"Sharma","year":"2020","journal-title":"arXiv:2011.04216"},{"key":"ref228","article-title":"InterpretML: A unified framework for machine learning interpretability","author":"Nori","year":"2019","journal-title":"arXiv:1909.09223"},{"issue":"93","key":"ref229","first-page":"1","article-title":"iNNvestigate neural networks!","volume":"20","author":"Alber","year":"2019","journal-title":"J. Mach. Learn. Res."},{"key":"ref230","article-title":"OmnixAI: A library for explainable AI","author":"Yang","year":"2022","journal-title":"arXiv:2206.01612"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912823"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2934619"},{"key":"ref233","article-title":"Xplique: A deep learning explainability toolbox","author":"Fel","year":"2022","journal-title":"arXiv:2206.04394"},{"key":"ref234","volume-title":"Weight watcher","year":"2018"},{"key":"ref235","article-title":"AI fairness 360: An extensible toolkit for detecting, understanding, and mitigating unwanted algorithmic bias","author":"Bellamy","year":"2018","journal-title":"arXiv:1810.01943"},{"key":"ref236","article-title":"Aequitas: A bias and fairness audit toolkit","author":"Saleiro","year":"2018","journal-title":"arXiv:1811.05577"},{"key":"ref237","volume-title":"Fairlearn","year":"2024"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01904"},{"key":"ref239","volume-title":"PyCaret: An open source, low-code machine learning library in Python, pyCaret Version 1.0","author":"Ali","year":"2020"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102301"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.3390\/computation11050092"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-51135-6_11"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11207096\/10763502.pdf?arnumber=10763502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:59:57Z","timestamp":1760983197000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10763502\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":243,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/comst.2024.3504955","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}