{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:54:23Z","timestamp":1762253663882,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,2]]},"DOI":"10.1145\/3430984.3431015","type":"proceedings-article","created":{"date-parts":[[2020,12,28]],"date-time":"2020-12-28T05:34:44Z","timestamp":1609133684000},"page":"83-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Reliable Counterfactual Explanations for Autoencoder based Anomalies"],"prefix":"10.1145","author":[{"given":"Swastik","family":"Haldar","sequence":"first","affiliation":[{"name":"IBM Research AI"}]},{"given":"Philips George","family":"John","sequence":"additional","affiliation":[{"name":"IBM Research AI"}]},{"given":"Diptikalyan","family":"Saha","sequence":"additional","affiliation":[{"name":"IBM Research AI"}]}],"member":"320","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Liat Antwarg Bracha Shapira and Lior Rokach. 2019. Explaining Anomalies Detected by Autoencoders Using SHAP. CoRR abs\/1903.02407(2019) 5. arxiv:1903.02407http:\/\/arxiv.org\/abs\/1903.02407  Liat Antwarg Bracha Shapira and Lior Rokach. 2019. Explaining Anomalies Detected by Autoencoders Using SHAP. CoRR abs\/1903.02407(2019) 5. arxiv:1903.02407http:\/\/arxiv.org\/abs\/1903.02407"},{"key":"e_1_3_2_1_2_1","unstructured":"Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial Attacks and Defences: A Survey. CoRR abs\/1810.00069(2018) 31. arxiv:1810.00069http:\/\/arxiv.org\/abs\/1810.00069  Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial Attacks and Defences: A Survey. CoRR abs\/1810.00069(2018) 31. arxiv:1810.00069http:\/\/arxiv.org\/abs\/1810.00069"},{"key":"e_1_3_2_1_3_1","volume-title":"RBFOpt: an open-source library for black-box optimization with costly function evaluations. Mathematical Programming Computation 10 (08","author":"Costa Alberto","year":"2018","unstructured":"Alberto Costa and Giacomo Nannicini . 2018. RBFOpt: an open-source library for black-box optimization with costly function evaluations. Mathematical Programming Computation 10 (08 2018 ), 33. https:\/\/doi.org\/10.1007\/s12532-018-0144-7 10.1007\/s12532-018-0144-7 Alberto Costa and Giacomo Nannicini. 2018. RBFOpt: an open-source library for black-box optimization with costly function evaluations. Mathematical Programming Computation 10 (08 2018), 33. https:\/\/doi.org\/10.1007\/s12532-018-0144-7"},{"key":"e_1_3_2_1_5_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml. University of California Irvine School of Information and Computer Sciences.  Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml. University of California Irvine School of Information and Computer Sciences."},{"volume-title":"Deep Learning","author":"Goodfellow Ian","key":"e_1_3_2_1_6_1","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep Learning . MIT Press , USA. http:\/\/www.deeplearningbook.org. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press, USA. http:\/\/www.deeplearningbook.org."},{"key":"e_1_3_2_1_7_1","unstructured":"Amir-Hossein Karimi Gilles Barthe Borja Balle and Isabel Valera. 2019. Model-Agnostic Counterfactual Explanations for Consequential Decisions. CoRR abs\/1905.11190(2019) 14. arxiv:1905.11190http:\/\/arxiv.org\/abs\/1905.11190  Amir-Hossein Karimi Gilles Barthe Borja Balle and Isabel Valera. 2019. Model-Agnostic Counterfactual Explanations for Consequential Decisions. CoRR abs\/1905.11190(2019) 14. arxiv:1905.11190http:\/\/arxiv.org\/abs\/1905.11190"},{"key":"e_1_3_2_1_8_1","first-page":"I","article-title":"A Unified Approach to Interpreting Model Predictions","volume":"30","author":"Lundberg M","year":"2017","unstructured":"Scott\u00a0 M Lundberg and Su-In Lee . 2017 . A Unified Approach to Interpreting Model Predictions . In Advances in Neural Information Processing Systems 30 , I .\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett(Eds.). Curran Associates, Inc., USA, 4765\u20134774. http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf Scott\u00a0M Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Advances in Neural Information Processing Systems 30, I.\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett(Eds.). Curran Associates, Inc., USA, 4765\u20134774. http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Moro P. Cortez and P. Rita. 2014. A Data-Driven Approach to Predict the Success of Bank Telemarketing. Decision Support Systems 62 (Jun 2014) 22\u201331.  S. Moro P. Cortez and P. Rita. 2014. A Data-Driven Approach to Predict the Success of Bank Telemarketing. Decision Support Systems 62 (Jun 2014) 22\u201331.","DOI":"10.1016\/j.dss.2014.03.001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372850"},{"volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","key":"e_1_3_2_1_11_1","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019. PyTorch: An Imperative Style , High-Performance Deep Learning Library . In Advances in Neural Information Processing Systems 32. Curran Associates, Inc., USA, 8024\u20138035. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32. Curran Associates, Inc., USA, 8024\u20138035."},{"volume-title":"Outlier Detection Datasets","author":"Rayana Shebuti","key":"e_1_3_2_1_12_1","unstructured":"Shebuti Rayana . 2016. Outlier Detection Datasets (ODDS) Library. http:\/\/odds.cs.stonybrook.edu\/. Stony Brook University, Department of Computer Science . Shebuti Rayana. 2016. Outlier Detection Datasets (ODDS) Library. http:\/\/odds.cs.stonybrook.edu\/. Stony Brook University, Department of Computer Science."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"volume-title":"Learning Internal Representations by Error Propagation","author":"Rumelhart E.","key":"e_1_3_2_1_14_1","unstructured":"D.\u00a0 E. Rumelhart , G.\u00a0 E. Hinton , and R.\u00a0 J. Williams . 1986. Learning Internal Representations by Error Propagation . MIT Press , Cambridge, MA, USA , 318\u2013362. D.\u00a0E. Rumelhart, G.\u00a0E. Hinton, and R.\u00a0J. Williams. 1986. Learning Internal Representations by Error Propagation. MIT Press, Cambridge, MA, USA, 318\u2013362."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287569"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230666"},{"key":"e_1_3_2_1_18_1","volume-title":"Shapley Values of Reconstruction Errors of PCA for Explaining Anomaly Detection. In 2019 International Conference on Data Mining Workshops (ICDMW). IEEE, USA, 793\u2013798","author":"Takeishi N.","year":"2019","unstructured":"N. Takeishi . 2019 . Shapley Values of Reconstruction Errors of PCA for Explaining Anomaly Detection. In 2019 International Conference on Data Mining Workshops (ICDMW). IEEE, USA, 793\u2013798 . N. Takeishi. 2019. Shapley Values of Reconstruction Errors of PCA for Explaining Anomaly Detection. In 2019 International Conference on Data Mining Workshops (ICDMW). IEEE, USA, 793\u2013798."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287566"},{"key":"e_1_3_2_1_20_1","unstructured":"Sandra Wachter Brent\u00a0D. Mittelstadt and Chris Russell. 2017. Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GDPR. CoRR abs\/1711.00399(2017) 52. arxiv:1711.00399http:\/\/arxiv.org\/abs\/1711.00399  Sandra Wachter Brent\u00a0D. Mittelstadt and Chris Russell. 2017. Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GDPR. CoRR abs\/1711.00399(2017) 52. arxiv:1711.00399http:\/\/arxiv.org\/abs\/1711.00399"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"}],"event":{"name":"CODS COMAD 2021: 8th ACM IKDD CODS and 26th COMAD","acronym":"CODS COMAD 2021","location":"Bangalore India"},"container-title":["Proceedings of the 3rd ACM India Joint International Conference on Data Science &amp; Management of Data (8th ACM IKDD CODS &amp; 26th COMAD)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430984.3431015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3430984.3431015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:44Z","timestamp":1750195484000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430984.3431015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":20,"alternative-id":["10.1145\/3430984.3431015","10.1145\/3430984"],"URL":"https:\/\/doi.org\/10.1145\/3430984.3431015","relation":{},"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"2021-01-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}