{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:16:39Z","timestamp":1776330999136,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T00:00:00Z","timestamp":1581033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#IIS-1756023"],"award-info":[{"award-number":["#IIS-1756023"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Allen Institute of Artificial Intelligence (AI2)"},{"name":"Google","award":["Research Award"],"award-info":[{"award-number":["Research Award"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,7]]},"DOI":"10.1145\/3375627.3375830","type":"proceedings-article","created":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T01:10:22Z","timestamp":1580865022000},"page":"180-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":625,"title":["Fooling LIME and SHAP"],"prefix":"10.1145","author":[{"given":"Dylan","family":"Slack","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Sophie","family":"Hilgard","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]},{"given":"Emily","family":"Jia","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]},{"given":"Sameer","family":"Singh","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Himabindu","family":"Lakkaraju","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Machine Learning . 161--170","author":"Aivodji Ulrich","year":"2019","unstructured":"Ulrich Aivodji, Hiromi Arai, Olivier Fortineau, S\u00e9bastien Gambs, Satoshi Hara, and Alain Tapp. 2019. Fairwashing: the risk of rationalization. In International Conference on Machine Learning . 161--170."},{"key":"e_1_3_2_1_2_1","volume-title":"Machine bias. ProPublica","author":"Angwin Julia","year":"2016","unstructured":"Julia Angwin, Jeff Larson, Surya Mattu, and Lauren Kirchner. 2016. Machine bias. ProPublica (2016)."},{"key":"e_1_3_2_1_3_1","volume-title":"UCI machine learning repository","author":"Asuncion Arthur","year":"2007","unstructured":"Arthur Asuncion and David Newman. 2007. UCI machine learning repository, 2007."},{"key":"e_1_3_2_1_4_1","volume-title":"Repository of Machine Learning","author":"Blake C","unstructured":"C Blake, E Koegh, and CJ Mertz. 1999. Repository of Machine Learning. University of California at Irvine (1999)."},{"key":"e_1_3_2_1_5_1","volume-title":"Explanations can be manipulated and geometry is to blame. arXiv preprint arXiv:1906.07983","author":"Dombrowski Ann-Kathrin","year":"2019","unstructured":"Ann-Kathrin Dombrowski, Maximilian Alber, Christopher J Anders, Marcel Ackermann, Klaus-Robert M\u00fcller, and Pan Kessel. 2019. Explanations can be manipulated and geometry is to blame. arXiv preprint arXiv:1906.07983 (2019)."},{"key":"e_1_3_2_1_6_1","volume-title":"Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608","author":"Doshi-Velez Finale","year":"2017","unstructured":"Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"On the interpretability of machine learning-based model for predicting hypertension. BMC medical informatics and decision making","author":"Elshawi Radwa","year":"2019","unstructured":"Radwa Elshawi, Mouaz H Al-Mallah, and Sherif Sakr. 2019. On the interpretability of machine learning-based model for predicting hypertension. BMC medical informatics and decision making , Vol. 19, 1 (2019), 146."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"e_1_3_2_1_9_1","unstructured":"Juyeon Heo Sunghwan Joo and Taesup Moon. 2019. Fooling Neural Network Interpretations via Adversarial Model Manipulation. In Advances in Neural Information Processing Systems 32. 2921--2932."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314230"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research), Jennifer Dy and Andreas Krause (Eds.)","volume":"80","author":"Kim Been","year":"2018","unstructured":"Been Kim, Martin Wattenberg, Justin Gilmer, Carrie Cai, James Wexler, Fernanda Viegas, and Rory S ayres. 2018. Interpretability Beyond Feature Attribution: Quantitative Testing with Concept Activation Vectors (TCAV). In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research), Jennifer Dy and Andreas Krause (Eds.), Vol. 80. PMLR, Stockholmsm\u00e4ssan, Stockholm Sweden, 2668--2677."},{"key":"e_1_3_2_1_12_1","first-page":"633","article-title":"Accountable algorithms","volume":"165","author":"Kroll Joshua A","year":"2016","unstructured":"Joshua A Kroll, Solon Barocas, Edward W Felten, Joel R Reidenberg, David G Robinson, and Harlan Yu. 2016. Accountable algorithms. U. Pa. L. Rev. , Vol. 165 (2016), 633.","journal-title":"U. Pa. L. Rev."},{"key":"e_1_3_2_1_13_1","volume-title":"How we analyzed the COMPAS recidivism algorithm. ProPublica (5 2016)","author":"Larson Jeff","year":"2016","unstructured":"Jeff Larson, Surya Mattu, Lauren Kirchner, and Julia Angwin. 2016. How we analyzed the COMPAS recidivism algorithm. ProPublica (5 2016) , Vol. 9 (2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233231"},{"key":"e_1_3_2_1_15_1","volume-title":"Neural Information Processing Systems (NIPS)","author":"Lundberg Scott M","unstructured":"Scott M Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Neural Information Processing Systems (NIPS), I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 4765--4774."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287574"},{"key":"e_1_3_2_1_17_1","unstructured":"M Redmond. 2011. Communities and crime unnormalized data set. UCI Machine Learning Repository. (2011)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00264-8"},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46","volume":"59","author":"Protection Regulation General Data","year":"2016","unstructured":"General Data Protection Regulation. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46. Official Journal of the European Union (OJ) , Vol. 59, 1--88 (2016), 294.","journal-title":"Official Journal of the European Union (OJ)"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Marco Tulio Ribeiro Sameer Singh and Carlos Guestrin. 2016. \"Why Should I Trust You?\": Explaining the Predictions of Any Classifier. In Knowledge Discovery and Data Mining (KDD) .","DOI":"10.18653\/v1\/N16-3020"},{"key":"e_1_3_2_1_21_1","volume-title":"Thirty-Second AAAI Conference on Artificial Intelligence .","author":"Ribeiro Marco Tulio","year":"2018","unstructured":"Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. 2018. Anchors: High-precision model-agnostic explanations. In Thirty-Second AAAI Conference on Artificial Intelligence ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_3_2_1_23_1","first-page":"1085","article-title":"The intuitive appeal of explainable machines","volume":"87","author":"Selbst Andrew D","year":"2018","unstructured":"Andrew D Selbst and Solon Barocas. 2018. The intuitive appeal of explainable machines. Fordham L. Rev. , Vol. 87 (2018), 1085.","journal-title":"Fordham L. Rev."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278725"},{"key":"e_1_3_2_1_25_1","volume-title":"Mapping chemical performance on molecular structures using locally interpretable explanations. arXiv preprint arXiv:1611.07443","author":"Whitmore Leanne S","year":"2016","unstructured":"Leanne S Whitmore, Anthe George, and Corey M Hudson. 2016. Mapping chemical performance on molecular structures using locally interpretable explanations. arXiv preprint arXiv:1611.07443 (2016)."}],"event":{"name":"AIES '20: AAAI\/ACM Conference on AI, Ethics, and Society","location":"New York NY USA","acronym":"AIES '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375627.3375830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375627.3375830","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375627.3375830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:14Z","timestamp":1750199894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375627.3375830"}},"subtitle":["Adversarial Attacks on Post hoc Explanation Methods"],"short-title":[],"issued":{"date-parts":[[2020,2,7]]},"references-count":25,"alternative-id":["10.1145\/3375627.3375830","10.1145\/3375627"],"URL":"https:\/\/doi.org\/10.1145\/3375627.3375830","relation":{},"subject":[],"published":{"date-parts":[[2020,2,7]]},"assertion":[{"value":"2020-02-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}