{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:54:16Z","timestamp":1774558456794,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Princess Nourah bint Abdulrahman University Researchers Supporting Project number","award":["PNURSP2026R761"],"award-info":[{"award-number":["PNURSP2026R761"]}]},{"name":"Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tce.2025.3644166","type":"journal-article","created":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T18:38:20Z","timestamp":1765823900000},"page":"2212-2222","source":"Crossref","is-referenced-by-count":0,"title":["TeleXAI-R: A Real-Time Explainable AI Model for Remote Patient Risk Stratification Using IoT-Integrated Consumer Devices"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0467-5984","authenticated-orcid":false,"given":"Jing","family":"Yang","sequence":"first","affiliation":[{"name":"Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3207-5261","authenticated-orcid":false,"given":"Jialin","family":"Dai","sequence":"additional","affiliation":[{"name":"Department of Pharmacy, Kunshan Hospital of Traditional Chinese Medicine, Kunshan, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5671-9091","authenticated-orcid":false,"given":"Xinyi","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Infrastructure Engineering, Nanchang University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5723-3858","authenticated-orcid":false,"given":"Muhammad Attique","family":"Khan","sequence":"additional","affiliation":[{"name":"Center of AI, Prince Mohammad Bin Fahd University, Al Khobar, Saudi Arabia"}]},{"given":"Manel","family":"Ayadi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0323-2061","authenticated-orcid":false,"given":"Zaffar Ahmed","family":"Shaikh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology, Benazir Bhutto Shaheed University Lyari, Karachi, Pakistan"}]},{"given":"Areej","family":"Alasiry","sequence":"additional","affiliation":[{"name":"College of Computer Science, King Khalid University, Abha, Saudi Arabia"}]},{"given":"Mehrez","family":"Marzougui","sequence":"additional","affiliation":[{"name":"College of Computer Science, King Khalid University, Abha, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0257-0900","authenticated-orcid":false,"given":"Pengxiang","family":"Su","sequence":"additional","affiliation":[{"name":"School of Software, Nanchang University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5865-1533","authenticated-orcid":false,"given":"Lip Yee","family":"Por","sequence":"additional","affiliation":[{"name":"Center of Research for Cyber Security and Network (CSNET), Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, Malaysia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3570188"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-09727-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1021\/acsami.4c22895"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2025.3578419"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pdig.0000793"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/int\/8884481"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2431"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.33411\/ijist\/202571336357"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2023.3333421"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3325155"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/widm.70018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2816"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3411552"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2024.3483301"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3350231"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3415626"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3508090"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2020.2981511"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3371928"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2024.3353791"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-51184-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-07781-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2024.108060"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-96520-7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3502913"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3522018"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11456295\/11300294.pdf?arnumber=11300294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:51:17Z","timestamp":1774554677000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11300294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":26,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3644166","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}