{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:58:31Z","timestamp":1760785111912,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,25]]},"DOI":"10.1109\/indin51773.2022.9976075","type":"proceedings-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T20:05:02Z","timestamp":1671134702000},"page":"552-559","source":"Crossref","is-referenced-by-count":4,"title":["Using Counterfactuals to Proactively Solve Service Level Agreement Violations in 5G Networks"],"prefix":"10.1109","author":[{"given":"Ahmad","family":"Terra","sequence":"first","affiliation":[{"name":"Ericsson AB,Ericsson Research AI,Stockholm,Sweden"}]},{"given":"Rafia","family":"Inam","sequence":"additional","affiliation":[{"name":"Ericsson AB,Ericsson Research AI,Stockholm,Sweden"}]},{"given":"Pedro","family":"Batista","sequence":"additional","affiliation":[{"name":"Ericsson AB,Ericsson Research AI,Stockholm,Sweden"}]},{"given":"Elena","family":"Fersman","sequence":"additional","affiliation":[{"name":"Ericsson AB,Ericsson Research AI,Stockholm,Sweden"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"113559","DOI":"10.1016\/j.dss.2021.113559","article-title":"Telecom traffic pumping analytics via explainable data science","author":"irarrazaval","year":"2021","journal-title":"Decision Support Systems"},{"article-title":"Interpretable counterfactual explanations guided by prototypes","year":"2019","author":"looveren","key":"ref11"},{"key":"ref12","first-page":"1","article-title":"Alibi explain: Algorithms for explaining machine learning models","volume":"22","author":"klaise","year":"2021","journal-title":"Journal of Machine Learning Research"},{"key":"ref13","article-title":"Model-agnostic counterfactual explanations for consequential decisions","volume":"abs 1905 11190","author":"karimi","year":"2019","journal-title":"CoRR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375850"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445899"},{"key":"ref16","article-title":"Counterfactual explanations for machine learning: A review","volume":"abs 2010 10596","author":"verma","year":"2020","journal-title":"CoRR"},{"key":"ref17","article-title":"Explainable ai metrics and properties for evaluation and analysis of counterfactual explanations : Explainable ai metrics and properties for evaluation and analysis of counterfactual explanations","author":"singh","year":"2021","journal-title":"Master's thesis"},{"key":"ref18","article-title":"Towards unifying feature attribution and counterfactual explanations: Different means to the same end","volume":"abs 2011 4917","author":"mothilal","year":"2020","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/388"},{"key":"ref4","article-title":"Explainable ai - how humans can trust ai","author":"inam","year":"2021","journal-title":"Ericsson Tech Rep GFTL-21 000529Uen"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322496"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900664"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2993623"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000050"},{"key":"ref7","article-title":"Towards ubiquitous AI in 6G with federated learning","volume":"abs 2004 13563","author":"xiao","year":"2020","journal-title":"IEEE Communication Magazine"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.13052\/jicts2245-800X.925"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2020.3017181"},{"journal-title":"Assessment List for Trustworthy Artificial Intelligence (ALTAI) for Self-Assessment","year":"2020","key":"ref1"},{"key":"ref20","article-title":"Preserving causal constraints in counterfactual explanations for machine learning classifiers","volume":"abs 1912 3277","author":"mahajan","year":"2019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372850"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58112-1_31"},{"year":"0","key":"ref24","article-title":"iPerf - The ultimate speed test tool for TCP, UDP and SCTP"},{"key":"ref23","article-title":"Counterfactual explanations & adversarial examples - common grounds, essential differences, and potential transfers","volume":"abs 2009 5487","author":"freiesleben","year":"2020","journal-title":"CoRR"},{"year":"0","key":"ref25","article-title":"curl:\/\/ command line tool and library for transferring data with URLs (since 1998)"}],"event":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2022,7,25]]},"location":"Perth, Australia","end":{"date-parts":[[2022,7,28]]}},"container-title":["2022 IEEE 20th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9975846\/9976066\/09976075.pdf?arnumber=9976075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:31:58Z","timestamp":1673897518000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9976075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/indin51773.2022.9976075","relation":{},"subject":[],"published":{"date-parts":[[2022,7,25]]}}}