{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T17:49:51Z","timestamp":1773942591695,"version":"3.50.1"},"reference-count":159,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"vor","delay-in-days":5,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computational Intelligence"],"published-print":{"date-parts":[[2025,8]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Machine learning techniques are increasingly used for high\u2010stakes decision\u2010making, such as college admissions, loan attribution, or recidivism prediction. Thus, it is crucial to ensure that the models learnt can be audited or understood by human users, do not create or reproduce discrimination or bias and do not leak sensitive information regarding their training data. Indeed, interpretability, fairness, and privacy are key requirements for the development of responsible machine learning, and all three have been studied extensively during the last decade. However, they were mainly considered in isolation, while in practice they interplay with each other, either positively or negatively. In this survey paper, we review the literature on the interactions between these three desiderata. More precisely, for each pairwise interaction, we summarize the identified synergies and tensions. These findings highlight several fundamental theoretical and empirical conflicts, while also demonstrating that jointly considering these different requirements is challenging when one aims at preserving a high level of utility. To solve this issue, we also discuss possible conciliation mechanisms, showing that a careful design can enable to successfully handle these different concerns in practice.<\/jats:p>","DOI":"10.1111\/coin.70113","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T09:53:48Z","timestamp":1754474028000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Taming the Triangle: On the Interplays Between Fairness, Interpretability, and Privacy in Machine Learning"],"prefix":"10.1111","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8764-0080","authenticated-orcid":false,"given":"Julien","family":"Ferry","sequence":"first","affiliation":[{"name":"CIRRELT &amp; SCALE\u2010AI Chair in Data\u2010Driven Supply Chains, Department of Mathematics and Industrial Engineering Polytechnique Montr\u00e9al  Montr\u00e9al Canada"}]},{"given":"Ulrich","family":"A\u00efvodji","sequence":"additional","affiliation":[{"name":"\u00c9cole de Technologie Sup\u00e9rieure  Montr\u00e9al Canada"}]},{"given":"S\u00e9bastien","family":"Gambs","sequence":"additional","affiliation":[{"name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al  Montr\u00e9al Canada"}]},{"given":"Marie\u2010Jos\u00e9","family":"Huguet","sequence":"additional","affiliation":[{"name":"LAAS\u2010CNRS Universit\u00e9 de Toulouse, CNRS, INSA  Toulouse France"}]},{"given":"Mohamed","family":"Siala","sequence":"additional","affiliation":[{"name":"LAAS\u2010CNRS Universit\u00e9 de Toulouse, CNRS, INSA  Toulouse France"}]}],"member":"311","published-online":{"date-parts":[[2025,8,6]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457607"},{"key":"e_1_2_10_4_1","unstructured":"L.Deck J. L.M\u00fcller C.Braun D.Zipperling andN.K\u00fchl \u201cImplications of the AI Act for Non\u2010Discrimination Law and Algorithmic Fairness \u201d(2024) arXiv preprint arXiv:240320089."},{"key":"e_1_2_10_5_1","unstructured":"E.De Cristofaro \u201cAn Overview of Privacy in Machine Learning \u201d(2020) arXiv preprint arXiv:200508679."},{"key":"e_1_2_10_6_1","unstructured":"S.Barocas M.Hardt andA.Narayanan \u201cFairness and Machine Learning \u201d(2019) fairmlbook.org."},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML54575.2023.00049"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268949"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2021.105567"},{"key":"e_1_2_10_11_1","unstructured":"K.Meding \u201cIt's Complicated. The Relationship of Algorithmic Fairness and Non\u2010Discrimination Regulations in the EU AI Act \u201d(2025) arXiv preprint arXiv:250112962."},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372872"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/766"},{"key":"e_1_2_10_14_1","article-title":"Apple Card Algorithm Sparks Gender Bias Allegations Against Goldman Sachs","author":"Telford T.","year":"2019","journal-title":"Washington Post"},{"key":"e_1_2_10_15_1","first-page":"19","article-title":"The Apple Card Didn't'see'gender\u2014And That's the Problem","author":"Knight W.","year":"2019","journal-title":"Wired"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102198"},{"key":"e_1_2_10_17_1","volume-title":"PhD Thesis, Karlsruher Institut f\u00fcr Technologie (KIT)","author":"Sch\u00f6ffer J.","year":"2023"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194770.3194776"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090255"},{"key":"e_1_2_10_20_1","first-page":"656","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems, NeurIPS 2017","author":"Kilbertus N.","year":"2017"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2942287"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287589"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3616865"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12228"},{"key":"e_1_2_10_25_1","first-page":"1885","volume-title":"Proceedings of the 34th International Conference on Machine Learning, ICML 2017","author":"Koh P. W.","year":"2017"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-060116-054123"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3624010"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_2_10_31_1","first-page":"601","volume-title":"25th USENIX Security Symposium","author":"Tram\u00e8r F.","year":"2016"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"issue":"2","key":"e_1_2_10_33_1","first-page":"161","article-title":"On Syntactic Anonymity and Differential Privacy","volume":"6","author":"Clifton C.","year":"2013","journal-title":"Transactions on Data Privacy"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_2_10_36_1","first-page":"106","volume-title":"Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007","author":"Li N.","year":"2007"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"e_1_2_10_39_1","unstructured":"A.Aktay S.Bavadekar G.Cossoul et al. \u201cGoogle COVID\u201019 Community Mobility Reports: Anonymization Process Description (Version 1.0) \u201d(2020) arXiv preprint arXiv:200404145."},{"key":"e_1_2_10_40_1","unstructured":"A.Herdagdelen A.Dow B.State P.Mohassel andA.Pompe \u201cProtecting Privacy in Facebook Mobility Data During the COVID\u201019 Response \u201d(2020)."},{"key":"e_1_2_10_41_1","article-title":"Learning With Privacy at Scale","author":"Team ADP","year":"2017","journal-title":"Apple Machine Learning Journal"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350253"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_2_10_45_1","unstructured":"Z.Ji Z. C.Lipton andC.Elkan \u201cDifferential Privacy and Machine Learning: A Survey and Review \u201d(2014) arXiv preprint arXiv:14127584."},{"key":"e_1_2_10_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2020.2976185"},{"key":"e_1_2_10_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_10_48_1","volume-title":"5th International Conference on Learning Representations, ICLR 2017","author":"Papernot N.","year":"2017"},{"key":"e_1_2_10_49_1","volume-title":"6th International Conference on Learning Representations, ICLR 2018","author":"Papernot N.","year":"2018"},{"key":"e_1_2_10_50_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.14649"},{"key":"e_1_2_10_51_1","volume-title":"IJCAI 2021 Workshop on AI for Social Good","author":"Agarwal S.","year":"2021"},{"key":"e_1_2_10_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329621"},{"key":"e_1_2_10_53_1","unstructured":"G. K.Dziugaite S.Ben\u2010David andD. M.Roy \u201cEnforcing Interpretability and Its Statistical Impacts: Trade\u2010Offs Between Accuracy and Interpretability \u201d(2020) arXiv preprint arXiv:201013764."},{"key":"e_1_2_10_54_1","unstructured":"G.Dai P.Ravishankar R.Yuan D. B.Neill andE.Black \u201cBe Intentional About Fairness!: Fairness Size and Multiplicity in the Rashomon Set \u201d(2025) arXiv preprint arXiv:250115634."},{"key":"e_1_2_10_55_1","unstructured":"L.Langlade J.Ferry G.Laberge andT.Vidal \u201cFairness and Sparsity Within Rashomon Sets: Enumeration\u2010Free Exploration and Characterization \u201d(2025) arXiv preprint arXiv:250205286."},{"key":"e_1_2_10_56_1","volume-title":"ICML 2020 Workshop on Human Interpretability in Machine Learning","author":"Jabbari S.","year":"2020"},{"key":"e_1_2_10_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604664"},{"key":"e_1_2_10_58_1","doi-asserted-by":"publisher","DOI":"10.1214\/21-SS133"},{"key":"e_1_2_10_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08011-1_9"},{"key":"e_1_2_10_60_1","unstructured":"J.Dai S.Upadhyay S. H.Bach andH.Lakkaraju \u201cWhat Will It Take to Generate Fairness\u2010Preserving Explanations? \u201d(2021) arXiv preprint arXiv:210613346."},{"key":"e_1_2_10_61_1","first-page":"161","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019, Vol. 97 of Proceedings of Machine Learning Research","author":"A\u00efvodji U.","year":"2019"},{"key":"e_1_2_10_62_1","first-page":"468","volume-title":"Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society, AIES 2021","author":"Manerba M. M.","year":"2022"},{"key":"e_1_2_10_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3302310"},{"key":"e_1_2_10_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-022-09545-w"},{"key":"e_1_2_10_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0463-8"},{"key":"e_1_2_10_66_1","first-page":"325","volume-title":"Proceedings of the 30th International Conference on Machine Learning, ICML 2013","author":"Zemel R.","year":"2013"},{"key":"e_1_2_10_67_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, NeurIPS 2017","author":"Pleiss G.","year":"2017"},{"key":"e_1_2_10_68_1","volume-title":"The AAAI Workshop on Privacy\u2010Preserving Artificial Intelligence (PPAI)","author":"Shokri R.","year":"2020"},{"key":"e_1_2_10_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462533"},{"key":"e_1_2_10_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514094.3534159"},{"key":"e_1_2_10_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533179"},{"key":"e_1_2_10_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287566"},{"key":"e_1_2_10_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375812"},{"key":"e_1_2_10_74_1","unstructured":"V.Gupta P.Nokhiz C. D.Roy andS.Venkatasubramanian \u201cEqualizing Recourse Across Groups \u201d(2019) arXiv preprint arXiv:190903166."},{"key":"e_1_2_10_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527848"},{"key":"e_1_2_10_76_1","first-page":"79","volume-title":"Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society, AIES 2020. AIES 2020","author":"Lakkaraju H.","year":"2020"},{"key":"e_1_2_10_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314229"},{"key":"e_1_2_10_78_1","first-page":"14822","volume-title":"Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021","author":"A\u00efvodji U.","year":"2021"},{"key":"e_1_2_10_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375830"},{"key":"e_1_2_10_80_1","unstructured":"D.Slack S.Hilgard S.Singh andH.Lakkaraju \u201cFeature Attributions and Counterfactual Explanations Can be Manipulated \u201d(2021) arXiv preprint arXiv:210612563."},{"key":"e_1_2_10_81_1","first-page":"2921","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019","author":"Heo J.","year":"2019"},{"key":"e_1_2_10_82_1","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA200380"},{"key":"e_1_2_10_83_1","first-page":"4782","volume-title":"Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, ACL 2020 Association for Computational Linguistics","author":"Pruthi D.","year":"2020"},{"key":"e_1_2_10_84_1","first-page":"62","volume-title":"Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021","author":"Slack D.","year":"2021"},{"key":"e_1_2_10_85_1","first-page":"1659","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Zhang X.","year":"2020"},{"key":"e_1_2_10_86_1","volume-title":"11th International Conference on Learning Representations, ICLR 2023","author":"Laberge G.","year":"2023"},{"key":"e_1_2_10_87_1","unstructured":"E. L.MerrerandG.Tr\u00e9dan \u201cThe Bouncer Problem: Challenges to Remote Explainability \u201d(2019) arXiv preprint arXiv:191001432."},{"key":"e_1_2_10_88_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_2_10_89_1","unstructured":"F.Doshi\u2010VelezandB.Kim \u201cA Roadmap for a Rigorous Science of Interpretability \u201d(2017) arXiv preprint arXiv:170208608."},{"key":"e_1_2_10_90_1","unstructured":"T.Begley T.Schwedes C.Frye andI.Feige \u201cExplainability for Fair Machine Learning \u201d(2020) arXiv preprint arXiv:201007389."},{"key":"e_1_2_10_91_1","first-page":"2635","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Vol. 80 of Proceedings of Machine Learning Research","author":"Kilbertus N.","year":"2018"},{"key":"e_1_2_10_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314183.3323847"},{"key":"e_1_2_10_93_1","volume-title":"IJCAI 2021 Workshop on AI for Social Good","author":"Agarwal S.","year":"2021"},{"key":"e_1_2_10_94_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0023"},{"key":"e_1_2_10_95_1","first-page":"35","volume-title":"Proceedings of the 2018 Conference on Fairness, Accountability, and Transparency, FAT* 2018","author":"Ekstrand M. D.","year":"2018"},{"key":"e_1_2_10_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00028"},{"key":"e_1_2_10_97_1","volume-title":"The AAAI Workshop on Privacy\u2010Preserving Artificial Intelligence (PPAI)","author":"Hu H.","year":"2020"},{"key":"e_1_2_10_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML54575.2023.00012"},{"key":"e_1_2_10_99_1","first-page":"15453","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019","author":"Bagdasaryan E.","year":"2019"},{"key":"e_1_2_10_100_1","unstructured":"A.Uniyal R.Naidu S.Kotti et al. \u201cDP\u2010SGD vs PATE: Which Has Less Disparate Impact on Model Accuracy? \u201d(2021) arXiv preprint arXiv:210612576."},{"key":"e_1_2_10_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419419"},{"key":"e_1_2_10_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445934"},{"key":"e_1_2_10_103_1","unstructured":"C.Tran M. H.Dinh K.Beiter andF.Fioretto \u201cA Fairness Analysis on Private Aggregation of Teacher Ensembles \u201d(2021) arXiv preprint arXiv:210908630."},{"key":"e_1_2_10_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467268"},{"key":"e_1_2_10_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3129592"},{"key":"e_1_2_10_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML54575.2023.00047"},{"key":"e_1_2_10_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.42"},{"key":"e_1_2_10_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533235"},{"key":"e_1_2_10_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3317584"},{"key":"e_1_2_10_110_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5402"},{"key":"e_1_2_10_111_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17193"},{"key":"e_1_2_10_112_1","first-page":"3000","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019, Vol. 97 of Proceedings of Machine Learning Research","author":"Jagielski M.","year":"2019"},{"key":"e_1_2_10_113_1","volume-title":"Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, NeurIPS 2016","author":"Hardt M.","year":"2016"},{"key":"e_1_2_10_114_1","first-page":"60","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Vol. 80 of Proceedings of Machine Learning Research","author":"Agarwal A.","year":"2018"},{"key":"e_1_2_10_115_1","first-page":"7066","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020","author":"Mozannar H.","year":"2020"},{"key":"e_1_2_10_116_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37586-6_1"},{"key":"e_1_2_10_117_1","unstructured":"A. S.deOliveira C.Kaplan K.Mallat andT.Chakraborty \u201cAn Empirical Analysis of Fairness Notions Under Differential Privacy \u201d(2023) arXiv preprint arXiv:230202910."},{"key":"e_1_2_10_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML64287.2025.00058"},{"key":"e_1_2_10_119_1","first-page":"23681","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020, Vol. 202 of Proceedings of Machine Learning Research","author":"Mangold P.","year":"2023"},{"key":"e_1_2_10_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579610"},{"key":"e_1_2_10_121_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58475-7_49"},{"key":"e_1_2_10_122_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16986"},{"key":"e_1_2_10_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2013.56"},{"key":"e_1_2_10_124_1","first-page":"23","volume-title":"Algorithmic Fairness Through the Lens of Causality and Privacy Workshop, AFCP 2022, Vol. 214 of Proceedings of Machine Learning Research","author":"Friedberg R.","year":"2022"},{"key":"e_1_2_10_125_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0393-7"},{"key":"e_1_2_10_126_1","unstructured":"H. H.Arcolezi M.Alishahi A. A.Bendoukha andN.Kaaniche \u201cFair Play for Individuals Foul Play for Groups? Auditing Anonymization's Impact on ML Fairness \u201d(2025) arXiv preprint arXiv:250507985."},{"key":"e_1_2_10_127_1","doi-asserted-by":"publisher","DOI":"10.1596\/23022"},{"key":"e_1_2_10_128_1","first-page":"1487","volume-title":"30th USENIX Security Symposium, USENIX Security 2021 USENIX Association","author":"Severi G.","year":"2021"},{"key":"e_1_2_10_129_1","unstructured":"W.Garcia J. I.Choi S. K.Adari S.Jha andK. R. B.Butler \u201cExplainable Black\u2010Box Attacks Against Model\u2010Based Authentication \u201d(2018) arXiv preprint arXiv:181000024."},{"key":"e_1_2_10_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"e_1_2_10_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287562"},{"key":"e_1_2_10_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/3665451.3665533"},{"key":"e_1_2_10_133_1","unstructured":"U.A\u00efvodji A.Bolot andS.Gambs \u201cModel Extraction From Counterfactual Explanations \u201d(2020) arXiv preprint arXiv:200901884."},{"key":"e_1_2_10_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533188"},{"key":"e_1_2_10_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_2_10_136_1","unstructured":"D.Smilkov N.Thorat B.Kim F. B.Vi\u00e9gas andM.Wattenberg \u201cSmoothGrad: Removing Noise by Adding Noise \u201d(2017) arXiv preprint arXiv:170603825."},{"key":"e_1_2_10_137_1","first-page":"5491","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020","author":"Kumar I. E.","year":"2020"},{"key":"e_1_2_10_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00072"},{"key":"e_1_2_10_139_1","volume-title":"2nd International Conference on Learning Representations, ICLR 2014","author":"Simonyan K.","year":"2014"},{"key":"e_1_2_10_140_1","first-page":"983","volume-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","author":"Ramaswamy H. G.","year":"2020"},{"key":"e_1_2_10_141_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"e_1_2_10_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560573"},{"key":"e_1_2_10_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557362"},{"key":"e_1_2_10_144_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_21"},{"key":"e_1_2_10_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML59370.2024.00009"},{"key":"e_1_2_10_146_1","first-page":"13545","volume-title":"Proceedings of the 41st International Conference on Machine Learning, ICML 2024, 235 of Proceedings of Machine Learning Research","author":"Ferry J.","year":"2024"},{"key":"e_1_2_10_147_1","unstructured":"A.Gorg\u00e9 J.Ferry S.Gambs andT.Vidal \u201cTraining Set Reconstruction From Differentially Private Forests: How Effective Is DP? \u201d(2025) arXiv preprint arXiv:250205307."},{"key":"e_1_2_10_148_1","unstructured":"G.Srivastava R. H.Jhaveri S.Bhattacharya et al. \u201cXAI for Cybersecurity: State of the Art Challenges Open Issues and Future Directions \u201d(2022) arXiv preprint arXiv:220603585."},{"key":"e_1_2_10_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835868"},{"issue":"4","key":"e_1_2_10_150_1","first-page":"83:1","article-title":"Decision Tree Classification With Differential Privacy: A Survey","volume":"52","author":"Fletcher S.","year":"2019","journal-title":"ACM Computing Surveys"},{"key":"e_1_2_10_151_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5827"},{"key":"e_1_2_10_152_1","unstructured":"R.Naidu A.Priyanshu A.Kumar S.Kotti H.Wang andF.Mireshghallah \u201cWhen Differential Privacy Meets Interpretability: A Case Study \u201d(2021) arXiv preprint arXiv:210613203."},{"key":"e_1_2_10_153_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i10.26401"},{"key":"e_1_2_10_154_1","volume-title":"International Conference on Machine Learning (ICML 2021), Workshop on Socially Responsible Machine Learning","author":"Mochaourab R.","year":"2021"},{"key":"e_1_2_10_155_1","unstructured":"Z.Li H.Chen Z.Ni andH.Shao \u201cBalancing Privacy Protection and Interpretability in Federated Learning \u201d(2023) arXiv preprint arXiv:230208044."},{"key":"e_1_2_10_156_1","unstructured":"F.Yang Q.Feng K.Zhou J.Chen andX.Hu \u201cDifferentially Private Counterfactuals via Functional Mechanism \u201d(2022) arXiv preprint arXiv: 220802878."},{"key":"e_1_2_10_157_1","unstructured":"S.Pentyala S.Sharma S.Kariyappa F.Lecue andD.Magazzeni \u201cPrivacy\u2010Preserving Algorithmic Recourse \u201d(2023) arXiv preprint arXiv:231114137."},{"key":"e_1_2_10_158_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-024-4123-4"},{"key":"e_1_2_10_159_1","first-page":"885","volume-title":"Uncertainty in Artificial Intelligence, Proceedings of the Thirty\u2010Eighth Conference on Uncertainty in Artificial Intelligence, UAI 2022, Vol. 180 of Proceedings of Machine Learning Research","author":"Imola J.","year":"2022"},{"key":"e_1_2_10_160_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13196"}],"container-title":["Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/coin.70113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:33:23Z","timestamp":1755912803000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/coin.70113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":159,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["10.1111\/coin.70113"],"URL":"https:\/\/doi.org\/10.1111\/coin.70113","archive":["Portico"],"relation":{},"ISSN":["0824-7935","1467-8640"],"issn-type":[{"value":"0824-7935","type":"print"},{"value":"1467-8640","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"2024-10-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70113"}}