{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T18:05:15Z","timestamp":1776189915590,"version":"3.50.1"},"reference-count":143,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"DoD Center of Excellence in AI and Machine Learning"},{"DOI":"10.13039\/100012365","name":"Howard University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012365","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-20-2-0277"],"award-info":[{"award-number":["W911NF-20-2-0277"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tai.2021.3133846","type":"journal-article","created":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T16:14:55Z","timestamp":1639066495000},"page":"852-866","source":"Crossref","is-referenced-by-count":177,"title":["Recent Advances in Trustworthy Explainable Artificial Intelligence: Status, Challenges, and Perspectives"],"prefix":"10.1109","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3443-693X","authenticated-orcid":false,"given":"Atul","family":"Rawal","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, USA"}]},{"given":"James","family":"McCoy","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3638-3464","authenticated-orcid":false,"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, USA"}]},{"given":"Brian M.","family":"Sadler","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory, Adelphi, MD, USA"}]},{"given":"Robert St.","family":"Amant","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory, Adelphi, MD, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.11.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1312"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1089\/big.2016.0047"},{"key":"ref32","article-title":"Improving understanding, trust, and control with intelligibility in context-aware applications","author":"lim","year":"2011","journal-title":"Hum -Comput Interact"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1900654116"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-006-0025-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0079-7421(08)60566-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.aje.a009864"},{"key":"ref34","article-title":"Towards explainable neural-symbolic visual reasoning","author":"bennetot","year":"2019"},{"key":"ref28","first-page":"105","article-title":"Working with beliefs: AI transparency in the enterprise","author":"chander","year":"0","journal-title":"Proc Int l Workshop Intelligent User Interfaces"},{"key":"ref27","article-title":"What does explainable AI really mean? A new conceptualization of perspectives","volume":"2071","author":"doran","year":"2018","journal-title":"Proc CEUR Workshop Proc"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3173386.3177057"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1089\/big.2016.0007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2881645"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2594473.2594475"},{"key":"ref24","first-page":"18","article-title":"Slave to the algorithm? Why a &#x2018;Right to an explanation&#x2019; is probably not the remedy you are looking for","volume":"16","author":"edwards","year":"2017","journal-title":"Duke Law Review"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"ref26","article-title":"Towards a rigorous science of interpretable machine learning","author":"doshi-velez","year":"2017"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111475"},{"key":"ref25","first-page":"163","article-title":"Making machine learning models interpretable","volume":"12","author":"vellido","year":"0","journal-title":"Proc Eur Symp Artif Neural Netw"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5284"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3063289"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893141"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.08.040"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1080\/00220670209598786"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1097\/00001888-199805000-00024"},{"key":"ref55","first-page":"2457","article-title":"TREPAN reloaded: A knowledge-driven approach to explaining artificial neural networks","author":"confalonieri","year":"0","journal-title":"Proc 24th Eur Conf Artif Intell"},{"key":"ref54","first-page":"24","article-title":"Extracting tree-structured representations of trained networks","author":"craven","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/0950-7051(96)81920-4"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1391"},{"key":"ref40","first-page":"657","article-title":"Avoiding discrimination through causal reasoning","author":"kilbertus","year":"0","journal-title":"Proc 31st Annu Conf Neural Inf Process Syst"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1117\/12.2583970"},{"key":"ref6","article-title":"Amazon scraps secret AI recruiting tool that showed bias against women","author":"dastin","year":"2018","journal-title":"Reuters"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v38i3.2741"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-019-03228-6"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375850"},{"key":"ref7","article-title":"Facebook&#x2019;s ad-serving algorithm discriminates by gender and race","author":"hao","year":"2019","journal-title":"MIT Technol Rev"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339556"},{"key":"ref45","article-title":"Evaluating XAI: A comparison of rule-based and example-based explanations","volume":"291","author":"waa","year":"2021","journal-title":"Artif Intell"},{"key":"ref48","first-page":"586","article-title":"Deep learning without poor local minima","author":"kawaguchi","year":"0","journal-title":"Proc 30th Int Conf Neural Inf Process Syst"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.42"},{"key":"ref42","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"0","journal-title":"Proc 2nd Int Conf Learn Representations"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s13218-020-00636-z"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6849-3"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7138-7"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"ref125","article-title":"Zero-shot learning approach to adaptive cybersecurity using explainable AI","author":"rao","year":"2021"},{"key":"ref124","article-title":"Domain knowledge aided explainable artificial intelligence for intrusion detection and response","author":"islam","year":"2019"},{"key":"ref73","first-page":"371","article-title":"Interpretable deep models for ICU outcome prediction","author":"che","year":"0","journal-title":"Proc AMIA Annu Symp Proc"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46307-0_29"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.118"},{"key":"ref129","article-title":"Explainable black-box attacks against model-based authentication","author":"garcia","year":"2018"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.10.039"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"ref76","first-page":"169","article-title":"Are explanations always important? A study of deployed, low-cost intelligent interactive systems","author":"bunt","year":"0","journal-title":"Proc ACM Int'l Conf Intelligent User Interfaces"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620576"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"ref74","first-page":"3145","article-title":"Not just a black box: Learning important features through propagating activation differences","volume":"70","author":"shrikumar","year":"0","journal-title":"Proc 34th Int Conf Mach Learning Ser Proc Mach Learn Res"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.12.007"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1089\/big.2016.0048"},{"key":"ref134","first-page":"3315","article-title":"Equality of opportunity in supervised learning","author":"hardt","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519023"},{"key":"ref131","article-title":"Metrics for explainable AI: Challenges and prospects","author":"hoffman","year":"2018"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174098"},{"key":"ref132","article-title":"Responsible AI by design in practice","author":"benjamins","year":"2019"},{"key":"ref136","first-page":"325","article-title":"Learning fair representations","author":"zemel","year":"0","journal-title":"Proc 30th Int Conf Mach Learn"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0463-8"},{"key":"ref138","first-page":"1086","article-title":"FairSight: Visual analytics for fairness in decision making","volume":"26","author":"ahn","year":"2020","journal-title":"IEEE Trans Visual Comput Graph"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278779"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24630-5_69"},{"key":"ref139","article-title":"Fair-by-design explainable models for prediction of recidivism","author":"soares","year":"2019"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-006-9007-8"},{"key":"ref61","first-page":"658","article-title":"The truth is in there-rule extraction from opaque models using genetic programming","author":"johansson","year":"0","journal-title":"Proc Int Florida Artif Intell Res Soc Conf"},{"key":"ref63","first-page":"1952","article-title":"The Bayesian case model: A generative approach for case-based reasoning and prototype classification","author":"kim","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref64","article-title":"Nothing else matters: Model-agnostic explanations by identifying prediction invariance","author":"ribeiro","year":"2016"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2008.117"},{"key":"ref140","article-title":"Neural-symbolic learning and reasoning: Contributions and challenges","author":"garcez","year":"0","journal-title":"Proc AAAI Spring Symp Ser"},{"key":"ref66","first-page":"295","article-title":"Accuracy vs. comprehensibility in data mining models","author":"johansson","year":"0","journal-title":"Proc 7th Int Conf Inf Fusion"},{"key":"ref141","first-page":"611","article-title":"Neural-symbolic computing: An effective methodology for principled integration of machine learning and reasoning","author":"garcez","year":"2019","journal-title":"Journal of Applied Logic"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278725"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2170180"},{"key":"ref68","first-page":"4768","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"0","journal-title":"Proc 31st Int Conf Neural Inf Process Syst"},{"key":"ref143","first-page":"1653","article-title":"A neural-symbolic cognitive agent for online learning and reasoning","author":"penning","year":"0","journal-title":"Proc 22nd Int Joint Conf Artif Intell"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2011.5949423"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2592860"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3036778"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2014.7042494"},{"key":"ref109","article-title":"Structured adversarial attack: Towards general implementation and better interpretability","author":"xu","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2678025.2701399"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206780"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2010.15"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00045"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.59"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207637"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744718"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2015.26"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5285"},{"key":"ref104","first-page":"287","article-title":"How to recommend? User trust factors in movie recommender systems","author":"berkovsky","year":"0","journal-title":"Proc 22nd Int Conf Intell User Interfaces"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312787"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4307"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287574"},{"key":"ref112","first-page":"2925","article-title":"Fooling neural network interpretations via adversarial model manipulation","author":"heo","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103471"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300509"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2598831"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.03.004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3615731"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3387166","article-title":"A multidisciplinary survey and framework for design and evaluation of explainable AI systems","volume":"11","author":"mohseni","year":"2018","journal-title":"ACM Transactions on Interactive Intelligent Systems"},{"key":"ref12","first-page":"210","article-title":"Explainable artificial intelligence: A survey","author":"do\u0161ilovi?","year":"0","journal-title":"Proc 41st Int Conv Inf Commun Technol Electron Microelectronics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6_2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53352-6_24"},{"key":"ref15","article-title":"Explainable artificial intelligence (XAI): An engineering perspective","author":"hussain","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3308446"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172946"},{"key":"ref118","first-page":"247","article-title":"On the design and quantification of privacy preserving data mining algorithms","author":"d","year":"0","journal-title":"Proc 20th ACM SIGMOD-SIGACT-SIGART Symp Principles of Database Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/puar.13293"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2008.10.007"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00028"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"ref84","article-title":"What should be in an XAI explanation? What IFT reveals","author":"dodge","year":"0","journal-title":"Proc Int l Workshop Intelligent User Interfaces"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.10.011"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702174"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_2"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462533"},{"key":"ref113","first-page":"13589","article-title":"Explanations can be manipulated and geometry is to blame","author":"dombrowski","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5280"},{"key":"ref116","article-title":"Trade-offs between privacy-preserving and explainable machine learning in healthcare","author":"budig","year":"2020"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3317586"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v6i1.13337"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.08.010"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5827"},{"key":"ref122","article-title":"A simple defense against adversarial attacks on heatmap explanations","author":"rieger","year":"0","journal-title":"Proc 5th Annu Workshop Hum Interpretability Mach Learn"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref85","first-page":"2668","article-title":"Interpretability beyond feature attribution: Quantitative testing with concept activation vectors (TCAV)","author":"kim","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2013.6645235"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939874"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11491"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9078688\/9960713\/9645355-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9078688\/9960713\/09645355.pdf?arnumber=9645355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:10:10Z","timestamp":1755911410000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9645355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":143,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tai.2021.3133846","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.17054396","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.17054396.v1","asserted-by":"object"}]},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}