{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:29:31Z","timestamp":1775665771814,"version":"3.50.1"},"reference-count":207,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100012481","name":"University of New South Wales Canberra","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012481","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006751","name":"U.S. Department of the Army\/ARO Broad Agency Announcement (BAA) for Fundamental Research","doi-asserted-by":"publisher","award":["FA520924C0006"],"award-info":[{"award-number":["FA520924C0006"]}],"id":[{"id":"10.13039\/100006751","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2024.3413790","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T18:25:59Z","timestamp":1718303159000},"page":"2877-2906","source":"Crossref","is-referenced-by-count":28,"title":["Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4951-3205","authenticated-orcid":false,"given":"Mohammed Tanvir","family":"Masud","sequence":"first","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5749-0408","authenticated-orcid":false,"given":"Marwa","family":"Keshk","sequence":"additional","affiliation":[{"name":"School of Professional Studies, University of New South Wales, Canberra, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6127-9349","authenticated-orcid":false,"given":"Nour","family":"Moustafa","sequence":"additional","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0823-8107","authenticated-orcid":false,"given":"Igor","family":"Linkov","sequence":"additional","affiliation":[{"name":"Environmental Laboratory, U.S. Army Engineer Research and Development Center, Vicksburg, MS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0038-9602","authenticated-orcid":false,"given":"Darren K.","family":"Emge","sequence":"additional","affiliation":[{"name":"U.S. Army Futures Command Indo-Pacific, Russell Offices, Canberra, Australia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Explainable Artificial Intelligence (XAI): Technical Report Defense Advanced Research Projects Agency DARPA-BAA-16-53","author":"Gunning","year":"2016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2993623"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2964534"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref6","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Lundberg"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2599820"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98131-4_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400040"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2018.00018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3146552"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3122019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/08850607.2013.780552"},{"key":"ref17","first-page":"1","volume-title":"Defense Use Case: Analysis of the Cyber Attack on the Ukrainian Power Grid","volume":"388","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2020.2983714"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204171"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00926-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204051"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3282740"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3216617"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3280465"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TEMSCON.2019.8813605"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SISY.2017.8080566"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ITQMIS53292.2021.9642782"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968045"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90869-4_6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18468-1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3123936"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3047833"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3050676"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2972855"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2594473.2594475"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.013"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-60750-754-3-11"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.003"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref43","author":"Molnar","year":"2020","journal-title":"Interpretable Machine Learning"},{"key":"ref44","first-page":"1","article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","volume-title":"Proc. 2nd Int. Conf. Learn. Represent.","author":"Simonyan"},{"key":"ref45","article-title":"Understanding neural networks through deep visualization","author":"Yosinski","year":"2015","journal-title":"arXiv:1506.06579"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.11.008"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2010.5539957"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2017.2744158"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3406601.3406643"},{"key":"ref52","first-page":"1","article-title":"InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Chen"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403186"},{"key":"ref54","first-page":"1341","article-title":"Visualizing higher-layer features of a deep network","author":"Erhan","year":"2009","journal-title":"D\u00e9partement d\u2019Informatique et Recherche Op\u00e9rationnelle, Univ. Montreal"},{"key":"ref55","first-page":"1","article-title":"e-SNLI: Natural language inference with natural language explanations","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Camburu"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i03.5631"},{"key":"ref57","first-page":"1","article-title":"Symmetry-based disentangled representation learning requires interaction with environments","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Caselles-Dupr\u00e9"},{"key":"ref58","first-page":"9497","article-title":"A Boolean task algebra for reinforcement learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Nangue Tasse"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_1"},{"key":"ref60","first-page":"1","article-title":"Explanation-based ranking in opinionated recommender systems","volume-title":"Proc. 24th Irish Conf. Artif. Intell. Cogn. Sci.","author":"Muhammad"},{"key":"ref61","first-page":"862","article-title":"Verbalization: Narration of autonomous robot experience","volume-title":"Proc. IJCAI","volume":"16","author":"Rosenthal"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11147"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00045"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593663"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9253-3"},{"key":"ref66","author":"Klahr","year":"2017","journal-title":"Cyber Security Breaches Survey: A Survey Detailing Business Action on Cyber Security and the Costs and Impacts of Cyber Breaches and Attacks"},{"key":"ref67","article-title":"Usability of security: A case study","author":"Whitten","year":"1998","journal-title":"School Comput. Sci., Carnegie Mellon Univ."},{"key":"ref68","first-page":"266","article-title":"The accountability gap","author":"Dreze","year":"2011","journal-title":"The Battle for Employment Guarantee"},{"issue":"8","key":"ref69","first-page":"26","article-title":"Rule based network intrusion detection using genetic algorithm","volume":"18","author":"Khan","year":"2011","journal-title":"Int. J. Comput. Appl."},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.01.003"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2854724"},{"key":"ref72","first-page":"307","article-title":"An adaptive rule-based intrusion detection architecture","volume-title":"Proc. RNSA Security Technol. Conf.","author":"Shafi"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.14355\/ijcsa.2014.0304.02"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.008"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5564354"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207199"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340497"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2016.7739579"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599759"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126018"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591322"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3309194.3309199"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119000"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121751"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.016"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2019.8899533"},{"issue":"3","key":"ref94","first-page":"270","article-title":"Assessment of supervised machine learning algorithms using dynamic API calls for malware detection","volume":"44","author":"Singh","year":"2020","journal-title":"Int. J. Comput. Appl."},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.002"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101685"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.31979\/etd.uzt8-w8qh"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5173"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/DSC50466.2020.00066"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553598"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101740"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101748"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103703"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840593"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3314119"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59041-7_8"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.163"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtrangeo.2015.09.001"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3002151.3002153"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/PACIFICVIS.2017.8031573"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2745139"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865021"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ48607.2020.9177768"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.01.007"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.3389\/fict.2016.00008"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270436"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368559"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1214\/15-AOAS848"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46279-0_20"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.11.015"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113100"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s00542-016-3237-0"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4367-2_81"},{"key":"ref127","first-page":"1","article-title":"Decoding the black box: Interpretable methods for post-incident counter-terrorism investigations","volume-title":"Proc. ACM Web Sci. Conf. (WebSci) ACM","author":"Tewari"},{"key":"ref128","author":"Vacca","year":"2012","journal-title":"Computer and Information Security Handbook"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00623-7"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.107"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.230"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304880"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW52041.2021.00015"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100240"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400437"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.7"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.475"},{"key":"ref140","volume-title":"Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets","author":"Angrishi","year":"2017"},{"issue":"12","key":"ref141","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobb\u2019s J."},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.372"},{"issue":"1","key":"ref145","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"Hutchins","year":"2011","journal-title":"Lead. Issues Inf. Warfare Security Res."},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.02.020"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310900"},{"key":"ref148","first-page":"54","article-title":"Modeling Internet attacks","volume-title":"Proc. IEEE Workshop Inf. Assurance Security","volume":"59","author":"Tidwell"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58618-0_72"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302434"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312764"},{"key":"ref154","volume-title":"Nessus: A security vulnerability scanning tool","author":"Wendlandt","year":"2024"},{"key":"ref155","author":"Calderon","year":"2021","journal-title":"Nmap Network Exploration and Security Auditing Cookbook: Network Discovery and Security Scanning at Your Fingertips"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102316"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02370-8"},{"key":"ref158","author":"Kott","year":"2015","journal-title":"Cyber Defense and Situational Awareness"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.016"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3122368"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3119323"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77492-3"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1145\/2822885"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1108\/tqm-10-2015-0133"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2016.01.003"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1115\/1.4029806"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1115\/1.4039429"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12891"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.049"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2909909"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/2994475.2994484"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1002\/acs.3001"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903629"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12729"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.001"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/888"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1021\/es403443n"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2570546"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2686394"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2021.3074288"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2006.296283"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2020687"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3283704"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.120057"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073286"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1038\/srep19540"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1002\/9781119660446.ch10"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3168672"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30045-5_10"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41488-6_12"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2022.103123"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1142\/S1793962313400059"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.466"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1145\/508448.508470"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.007"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.002"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1002\/isaf.1422"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2015.7404853"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipx005"},{"key":"ref201","author":"Hall","year":"2019","journal-title":"An Introduction to Machine Learning Interpretability"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1009213726"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6_14"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"ref205","first-page":"3319","article-title":"Axiomatic attribution for deep networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sundararajan"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912823"},{"key":"ref207","year":"2024","journal-title":"The U.S. military wants its autonomous machines to explain themselves"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/10556719.pdf?arnumber=10556719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T18:40:55Z","timestamp":1745520055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10556719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":207,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3413790","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}