{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T18:45:12Z","timestamp":1776192312303,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/hsi.2018.8430788","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T18:11:17Z","timestamp":1534183877000},"page":"311-317","source":"Crossref","is-referenced-by-count":102,"title":["Toward Explainable Deep Neural Network Based Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Kasun","family":"Amarasinghe","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Kenney","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Manic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821515"},{"key":"ref33","author":"lipton","year":"2016","journal-title":"The mythos of model interpretability"},{"key":"ref32","first-page":"1","article-title":"Explainable Artificial Intelligence (XAI) Explainable AI - What Are We Trying To Do ?","author":"gunning","year":"2017","journal-title":"Def Adv Res Proj Agency"},{"key":"ref31","author":"montavon","year":"2017","journal-title":"Methods for interpreting and understanding deep neural networks"},{"key":"ref30","author":"samek","year":"2017","journal-title":"Explainable Artificial Intelligence Understanding Visualizing and Interpreting Deep Learning Models"},{"key":"ref37","year":"0","journal-title":"KDD-CUP-99 Task Description"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref35","author":"baehrens","year":"2009","journal-title":"How to Explain Individual Classification Decisions"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2017.8397411"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00140-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2386305"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/ICDM.2006.165","article-title":"Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems","author":"perdisci","year":"2006","journal-title":"Sixth International Conference on Data Mining (ICDM'06)"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1109\/IAW.2004.1437839","article-title":"Anomaly intrusion detection using one class SVM","author":"wang","year":"2004","journal-title":"Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop"},{"key":"ref15","author":"guha","year":"2016","journal-title":"Robust Random Cut Forest Based Anomaly Detection On Streams"},{"key":"ref16","author":"wang","year":"2015","journal-title":"Learning natural language inference with lstm"},{"key":"ref17","article-title":"Simultaneous generation-classification using LSTM","author":"marino","year":"2017","journal-title":"2016 IEEE Symposium Series on Computational Intelligence SSCI 2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2013.6707742"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.06.007"},{"key":"ref4","author":"blanke","year":"2006","journal-title":"Diagnosis and Fault-Tolerant Control"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2202354"},{"key":"ref6","first-page":"1","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","author":"buczak","year":"2015","journal-title":"IEEE Commun Surv Tutorials"},{"key":"ref29","author":"medel","year":"2016","journal-title":"Anomaly detection in video using predictive convolutional long short-term memory networks"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2271979"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-017-9679-2"},{"key":"ref9","author":"ryan","year":"0","journal-title":"Intrusion detection with neural networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2301773"},{"key":"ref20","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref22","author":"zhou","year":"0","journal-title":"Anomaly Detection with Robust Deep Autoencoders"},{"key":"ref21","author":"zhai","year":"0","journal-title":"Deep Structured Energy Based Models for Anomaly Detection"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CFIS.2018.8336654"},{"key":"ref23","author":"malhotra","year":"2016","journal-title":"LSTM-based encoder-decoder for multi-sensor anomaly detection"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2015.7344872"}],"event":{"name":"2018 11th International Conference on Human System Interaction (HSI)","location":"Gdansk, Poland","start":{"date-parts":[[2018,7,4]]},"end":{"date-parts":[[2018,7,6]]}},"container-title":["2018 11th International Conference on Human System Interaction (HSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8417135\/8430754\/08430788.pdf?arnumber=8430788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:27:53Z","timestamp":1643182073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8430788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/hsi.2018.8430788","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}