{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T08:44:50Z","timestamp":1774514690082,"version":"3.50.1"},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/mc.2023.3342602","type":"journal-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T17:20:58Z","timestamp":1714670458000},"page":"78-85","source":"Crossref","is-referenced-by-count":3,"title":["Using Explainable AI for Neural Network-Based Network Attack Detection"],"prefix":"10.1109","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1412-4800","authenticated-orcid":false,"given":"Qingtian","family":"Zou","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3964-8034","authenticated-orcid":false,"given":"Lan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Northern Arizona University, Flagstaff, AZ, USA"}]},{"given":"Xiaoyan","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2602-3927","authenticated-orcid":false,"given":"Anoop","family":"Singhal","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology, Gaithersburg, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5091-8464","authenticated-orcid":false,"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-210101"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0679-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.8312","volume-title":"Four principles of explainable artificial intelligence","author":"Phillips","year":"2021"},{"key":"ref5","article-title":"One explanation does not fit all: A toolkit and taxonomy of AI explainability techniques","author":"Arya","year":"2019"},{"key":"ref6","article-title":"Interpreting blackbox models via model extraction,","author":"Bastani","year":"2017"},{"key":"ref7","article-title":"Interpretable & explorable approximations of black box models","author":"Lakkaraju","year":"2017"},{"key":"ref8","first-page":"2499","article-title":"Verifiable reinforcement learning via policy extraction","volume-title":"Proc. 32nd Int. Conf. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Bastani","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560609"},{"key":"ref10","article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps,","author":"Simonyan","year":"2013"},{"key":"ref11","first-page":"3145","article-title":"Learning important features through propagating activation differences","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Shrikumar","year":"2017"},{"key":"ref12","first-page":"3938","article-title":"The LRP toolbox for artificial neural networks,","volume":"17","author":"Lapuschkin","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref13","first-page":"3319","article-title":"Axiomatic attribution for deep networks,","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sundararajan","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1176"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/10517679\/10517718.pdf?arnumber=10517718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T20:11:33Z","timestamp":1717531893000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10517718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":14,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mc.2023.3342602","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}