{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:07:24Z","timestamp":1764785244584,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tcss.2023.3330738","type":"journal-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T19:21:59Z","timestamp":1701372119000},"page":"3407-3419","source":"Crossref","is-referenced-by-count":6,"title":["Explainable AI for Human-Centric Ethical IoT Systems"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6310-9378","authenticated-orcid":false,"given":"Nancy","family":"Ambritta P.","sequence":"first","affiliation":[{"name":"Department of Artificial Intelligence and Data Science, Vishwakarma Institute of Information Technology, Pune, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5474-6826","authenticated-orcid":false,"given":"Parikshit N.","family":"Mahalle","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Data Science, Vishwakarma Institute of Information Technology, Pune, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1073-4297","authenticated-orcid":false,"given":"Rajkumar V.","family":"Patil","sequence":"additional","affiliation":[{"name":"Department of Information Technology, MIT Art, Design and Technology University, Pune, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8437-498X","authenticated-orcid":false,"given":"Nilanjan","family":"Dey","sequence":"additional","affiliation":[{"name":"Techno International New Town, Kolkata, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5541-6319","authenticated-orcid":false,"given":"Rub\u00e9n Gonz\u00e1lez","family":"Crespo","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Universidad Internacional de La Rioja, Logro&#x00F1;o, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7899-4445","authenticated-orcid":false,"given":"R. Simon","family":"Sherratt","sequence":"additional","affiliation":[{"name":"Department of Biomedical Engineering, University of Reading, Whiteknights, Reading, RG6 6AH Berkshire, U.K."}]}],"member":"263","reference":[{"article-title":"Building Trust in Human-Centric Artificial Intelligence","volume-title":"Shaping Europe\u2019s Digital Future","year":"2023","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2022.12.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01478-w"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2022.112423"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.06.033"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3039411"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3247135"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3063102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126401"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3303113"},{"key":"ref11","first-page":"501","article-title":"Elevation of privilege: The cards","volume-title":"Threat Modeling: Designing for Security.","author":"Shostack","year":"2014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2906657"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3047675"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034096"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887095"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3140241.3140250"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.43"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1016\/j.compbiomed.2021.104393","article-title":"Interpretable heartbeat classification using local model-agnostic explanations on ECGs","volume":"133","author":"Neves","year":"2021","journal-title":"Comput. Biol. Med."},{"key":"ref20","first-page":"2668","article-title":"Interpretability beyond feature attribution: Quantitative testing with concept activation vectors (TCAV)","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kim","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32251-9_72"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i03.5631"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/iccp56966.2022.10053963"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100747","article-title":"XG-BoT: An explainable deep graph neural network for botnet detection and forensics","volume":"22","author":"Lo","year":"2023","journal-title":"Internet Things"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403085"},{"key":"ref28","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Lundberg","year":"2017"},{"article-title":"Evaluating the correctness of explainable AI algorithms for classification","year":"2021","author":"Yalcin","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2022.100359"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107198"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207199"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3470794"},{"article-title":"The Clever Hans effect in anomaly detection","year":"2020","author":"Kauffmann","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/a13010017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6634811"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3112397"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2022.3185396"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/ail2.61"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10557215\/10335691.pdf?arnumber=10335691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T20:50:25Z","timestamp":1719348625000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10335691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":39,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2023.3330738","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}