{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:19:53Z","timestamp":1770754793529,"version":"3.50.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002081","name":"Irish Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002081","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/noms54207.2022.9789914","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:21:22Z","timestamp":1654809682000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["Towards Interpretable Anomaly Detection: Unsupervised Deep Neural Network Approach using Feedback Loop"],"prefix":"10.1109","author":[{"given":"Ashima","family":"Chawla","sequence":"first","affiliation":[{"name":"Ericsson, Network Management Lab,Athlone,Ireland"}]},{"given":"Paul","family":"Jacob","sequence":"additional","affiliation":[{"name":"Technological University of the Shannon; Midlands, Midwest,Software Research Institute,Athlone,Ireland"}]},{"given":"Paddy","family":"Farrell","sequence":"additional","affiliation":[{"name":"Ericsson, Network Management Lab,Athlone,Ireland"}]},{"given":"Erik","family":"Aumayr","sequence":"additional","affiliation":[{"name":"Ericsson, Network Management Lab,Athlone,Ireland"}]},{"given":"Sheila","family":"Fallon","sequence":"additional","affiliation":[{"name":"Technological University of the Shannon; Midlands, Midwest,Software Research Institute,Athlone,Ireland"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016909926"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref30","first-page":"402","article-title":"Overfitting in neural nets: back-propagation, conjugate gradient, and early stopping","author":"caruana","year":"2001","journal-title":"Adv Neural Inf Processing Syst"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.visinf.2020.04.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-018-0585-7"},{"key":"ref13","article-title":"Interpretable anomaly detection with diffi: Depth-based feature importance for the isolation forest","author":"carletti","year":"2020","journal-title":"arXiv preprint arXiv 2007 11147"},{"key":"ref14","article-title":"Explaining anomalies detected by autoencoders using SHAP","author":"antwarg","year":"2019","journal-title":"arXiv preprint arXiv 1903 02532"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269108"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2012.6377764"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5194\/gmd-7-1247-2014"},{"key":"ref19","first-page":"153","article-title":"Greedy layer-wise training of deep networks","author":"bengio","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref28","article-title":"Keras Home Page","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"ref27","article-title":"Learning important features through propagating activation differences","author":"shrikumar","year":"2017","journal-title":"arXiv preprint arXiv 1704 02685"},{"key":"ref3","article-title":"Using deep learning to predict customer churn in a mobile telecommunication network","author":"castanedo","year":"2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3071928"},{"key":"ref29","article-title":"Adam: A Method for Stochastic Optimization","volume":"abs 1412 6980","author":"kingma","year":"2014","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.328"},{"key":"ref8","article-title":"Local rule-based explanations of black box decision systems","author":"guidotti","year":"2018","journal-title":"arXiv preprint arXiv 1805 10820"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref2","author":"maino","year":"2018","journal-title":"A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3449726.3463166"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"132894","DOI":"10.1109\/ACCESS.2019.2941110","article-title":"The mammoth Internet: Are we ready&#x0192;","volume":"7","author":"al","year":"2019","journal-title":"IEEE Access"},{"key":"ref20","first-page":"201","article-title":"Why does unsupervised pre-training help deep learning&#x0192;","author":"erhan","year":"2010","journal-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007731"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45571-X_13"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.425"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_15"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref25","first-page":"4765","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"2017","journal-title":"Advances in neural information processing systems"}],"event":{"name":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","location":"Budapest, Hungary","start":{"date-parts":[[2022,4,25]]},"end":{"date-parts":[[2022,4,29]]}},"container-title":["NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9789703\/9789704\/09789914.pdf?arnumber=9789914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:10:03Z","timestamp":1656965403000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/noms54207.2022.9789914","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}