{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T19:29:33Z","timestamp":1771788573950,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["ARC DP230101176"],"award-info":[{"award-number":["ARC DP230101176"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"name":"US Airforce","award":["A2386-21-1-404"],"award-info":[{"award-number":["A2386-21-1-404"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599343","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:10:58Z","timestamp":1691172658000},"page":"2211-2222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Feature-based Learning for Diverse and Privacy-Preserving Counterfactual Explanations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8679-0091","authenticated-orcid":false,"given":"Vy","family":"Vo","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0414-9067","authenticated-orcid":false,"given":"Trung","family":"Le","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5838-3409","authenticated-orcid":false,"given":"Van","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0894-2265","authenticated-orcid":false,"given":"He","family":"Zhao","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9904-2408","authenticated-orcid":false,"given":"Edwin V.","family":"Bonilla","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7326-8380","authenticated-orcid":false,"given":"Gholamreza","family":"Haffari","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9977-8247","authenticated-orcid":false,"given":"Dinh","family":"Phung","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, VIC, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIDS.2019.8862140"},{"key":"e_1_3_2_2_2_1","volume-title":"Model extraction from counterfactual explanations. arXiv preprint arXiv:2009.01884","author":"A\u00efvodji Ulrich","year":"2020","unstructured":"Ulrich A\u00efvodji , Alexandre Bolot , and S\u00e9bastien Gambs . 2020. Model extraction from counterfactual explanations. arXiv preprint arXiv:2009.01884 ( 2020 ). Ulrich A\u00efvodji, Alexandre Bolot, and S\u00e9bastien Gambs. 2020. Model extraction from counterfactual explanations. arXiv preprint arXiv:2009.01884 (2020)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2746078"},{"key":"e_1_3_2_2_4_1","volume-title":"Classification and regression trees","author":"Breiman Leo","unstructured":"Leo Breiman , Jerome H Friedman , Richard A Olshen , and Charles J Stone . 2017. Classification and regression trees . Routledge . Leo Breiman, Jerome H Friedman, Richard A Olshen, and Charles J Stone. 2017. Classification and regression trees. Routledge."},{"key":"e_1_3_2_2_5_1","volume-title":"Counterfactual Plans under Distributional Ambiguity. arXiv preprint arXiv:2201.12487","author":"Bui Ngoc","year":"2022","unstructured":"Ngoc Bui , Duy Nguyen , and Viet Anh Nguyen . 2022. Counterfactual Plans under Distributional Ambiguity. arXiv preprint arXiv:2201.12487 ( 2022 ). Ngoc Bui, Duy Nguyen, and Viet Anh Nguyen. 2022. Counterfactual Plans under Distributional Ambiguity. arXiv preprint arXiv:2201.12487 (2022)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69115-4_74"},{"key":"e_1_3_2_2_7_1","unstructured":"Paulo Cortez and Alice Maria Gon\u00e7alves Silva. 2008. Using data mining to predict secondary school student performance. (2008).  Paulo Cortez and Alice Maria Gon\u00e7alves Silva. 2008. Using data mining to predict secondary school student performance. (2008)."},{"key":"e_1_3_2_2_8_1","volume-title":"International Conference on Parallel Problem Solving from Nature. Springer, 448--469","author":"Dandl Susanne","year":"2020","unstructured":"Susanne Dandl , Christoph Molnar , Martin Binder , and Bernd Bischl . 2020 . Multiobjective counterfactual explanations . In International Conference on Parallel Problem Solving from Nature. Springer, 448--469 . Susanne Dandl, Christoph Molnar, Martin Binder, and Bernd Bischl. 2020. Multiobjective counterfactual explanations. In International Conference on Parallel Problem Solving from Nature. Springer, 448--469."},{"key":"e_1_3_2_2_9_1","first-page":"1","article-title":"Cruds: Counterfactual recourse using disentangled subspaces","volume":"2020","author":"Downs Michael","year":"2020","unstructured":"Michael Downs , Jonathan L Chu , Yaniv Yacoby , Finale Doshi-Velez , and Weiwei Pan . 2020 . Cruds: Counterfactual recourse using disentangled subspaces . ICML WHI 2020 (2020), 1 -- 23 . Michael Downs, Jonathan L Chu, Yaniv Yacoby, Finale Doshi-Velez, and Weiwei Pan. 2020. Cruds: Counterfactual recourse using disentangled subspaces. ICML WHI 2020 (2020), 1--23.","journal-title":"ICML WHI"},{"key":"e_1_3_2_2_10_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http: \/\/archive.ics.uci.edu\/ml  Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http: \/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_2_11_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"key":"e_1_3_2_2_13_1","unstructured":"Usama Fayyad and Keki Irani. 1993. Multi-interval discretization of continuousvalued attributes for classification learning. (1993).  Usama Fayyad and Keki Irani. 1993. Multi-interval discretization of continuousvalued attributes for classification learning. (1993)."},{"key":"e_1_3_2_2_14_1","volume-title":"International Conference on Machine Learning. PMLR, 7470--7483","author":"Ghazi Badih","year":"2022","unstructured":"Badih Ghazi , Pritish Kamath , Ravi Kumar , and Pasin Manurangsi . 2022 . Faster Privacy Accounting via Evolving Discretization . In International Conference on Machine Learning. PMLR, 7470--7483 . Badih Ghazi, Pritish Kamath, Ravi Kumar, and Pasin Manurangsi. 2022. Faster Privacy Accounting via Evolving Discretization. In International Conference on Machine Learning. PMLR, 7470--7483."},{"key":"e_1_3_2_2_15_1","first-page":"32","article-title":"Legal technology: Criminal justice algorithms: Ai in the courtroom","volume":"38","author":"Gifford Richard","year":"2018","unstructured":"Richard Gifford . 2018 . Legal technology: Criminal justice algorithms: Ai in the courtroom . Proctor, The 38 , 1 (2018), 32 -- 33 . Richard Gifford. 2018. Legal technology: Criminal justice algorithms: Ai in the courtroom. Proctor, The 38, 1 (2018), 32--33.","journal-title":"Proctor, The"},{"key":"e_1_3_2_2_16_1","volume-title":"The privacy issue of counterfactual explanations: explanation linkage attacks. arXiv preprint arXiv:2210.12051","author":"Goethals Sofie","year":"2022","unstructured":"Sofie Goethals , Kenneth S\u00f6rensen , and David Martens . 2022. The privacy issue of counterfactual explanations: explanation linkage attacks. arXiv preprint arXiv:2210.12051 ( 2022 ). Sofie Goethals, Kenneth S\u00f6rensen, and David Martens. 2022. The privacy issue of counterfactual explanations: explanation linkage attacks. arXiv preprint arXiv:2210.12051 (2022)."},{"key":"e_1_3_2_2_17_1","first-page":"11631","article-title":"Numerical composition of differential privacy","volume":"34","author":"Gopi Sivakanth","year":"2021","unstructured":"Sivakanth Gopi , Yin Tat Lee , and Lukas Wutschitz . 2021 . Numerical composition of differential privacy . Advances in Neural Information Processing Systems 34 (2021), 11631 -- 11642 . Sivakanth Gopi, Yin Tat Lee, and Lukas Wutschitz. 2021. Numerical composition of differential privacy. Advances in Neural Information Processing Systems 34 (2021), 11631--11642.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_18_1","volume-title":"Counterfactual explanations and how to find them: literature review and benchmarking. Data Mining and Knowledge Discovery","author":"Guidotti Riccardo","year":"2022","unstructured":"Riccardo Guidotti . 2022. Counterfactual explanations and how to find them: literature review and benchmarking. Data Mining and Knowledge Discovery ( 2022 ), 1--55. Riccardo Guidotti. 2022. Counterfactual explanations and how to find them: literature review and benchmarking. Data Mining and Knowledge Discovery (2022), 1--55."},{"key":"e_1_3_2_2_19_1","volume-title":"Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144","author":"Jang Eric","year":"2016","unstructured":"Eric Jang , Shixiang Gu , and Ben Poole . 2016. Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144 ( 2016 ). Eric Jang, Shixiang Gu, and Ben Poole. 2016. Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144 (2016)."},{"key":"e_1_3_2_2_20_1","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR, 895--905","author":"Karimi Amir-Hossein","year":"2020","unstructured":"Amir-Hossein Karimi , Gilles Barthe , Borja Balle , and Isabel Valera . 2020 . Modelagnostic counterfactual explanations for consequential decisions . In International Conference on Artificial Intelligence and Statistics. PMLR, 895--905 . Amir-Hossein Karimi, Gilles Barthe, Borja Balle, and Isabel Valera. 2020. Modelagnostic counterfactual explanations for consequential decisions. In International Conference on Artificial Intelligence and Statistics. PMLR, 895--905."},{"key":"e_1_3_2_2_21_1","volume-title":"A survey of algorithmic recourse: definitions, formulations, solutions, and prospects. arXiv preprint arXiv:2010.04050","author":"Karimi Amir-Hossein","year":"2020","unstructured":"Amir-Hossein Karimi , Gilles Barthe , Bernhard Sch\u00f6lkopf , and Isabel Valera . 2020. A survey of algorithmic recourse: definitions, formulations, solutions, and prospects. arXiv preprint arXiv:2010.04050 ( 2020 ). Amir-Hossein Karimi, Gilles Barthe, Bernhard Sch\u00f6lkopf, and Isabel Valera. 2020. A survey of algorithmic recourse: definitions, formulations, solutions, and prospects. arXiv preprint arXiv:2010.04050 (2020)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445899"},{"key":"e_1_3_2_2_23_1","volume-title":"Learning latent subspaces in variational autoencoders. Advances in neural information processing systems 31","author":"Klys Jack","year":"2018","unstructured":"Jack Klys , Jake Snell , and Richard Zemel . 2018. Learning latent subspaces in variational autoencoders. Advances in neural information processing systems 31 ( 2018 ). Jack Klys, Jake Snell, and Richard Zemel. 2018. Learning latent subspaces in variational autoencoders. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_2_24_1","first-page":"202","article-title":"Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid","volume":"96","author":"Ron Kohavi","year":"1996","unstructured":"Ron Kohavi et al. 1996 . Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid .. In Kdd , Vol. 96. 202 -- 207 . Ron Kohavi et al. 1996. Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid.. In Kdd, Vol. 96. 202--207.","journal-title":"Kdd"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Alex Kulesza Ben Taskar etal 2012. Determinantal point processes for machine learning. Foundations and Trends\u00ae in Machine Learning 5 2--3 (2012) 123--286.  Alex Kulesza Ben Taskar et al. 2012. Determinantal point processes for machine learning. Foundations and Trends\u00ae in Machine Learning 5 2--3 (2012) 123--286.","DOI":"10.1561\/2200000044"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.05.030"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i5.20468"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_2_29_1","volume-title":"The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712","author":"Maddison Chris J","year":"2016","unstructured":"Chris J Maddison , Andriy Mnih , and Yee Whye Teh . 2016. The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712 ( 2016 ). Chris J Maddison, Andriy Mnih, and Yee Whye Teh. 2016. The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712 (2016)."},{"key":"e_1_3_2_2_30_1","volume-title":"Preserving causal constraints in counterfactual explanations for machine learning classifiers. arXiv preprint arXiv:1912.03277","author":"Mahajan Divyat","year":"2019","unstructured":"Divyat Mahajan , Chenhao Tan , and Amit Sharma . 2019. Preserving causal constraints in counterfactual explanations for machine learning classifiers. arXiv preprint arXiv:1912.03277 ( 2019 ). Divyat Mahajan, Chenhao Tan, and Amit Sharma. 2019. Preserving causal constraints in counterfactual explanations for machine learning classifiers. arXiv preprint arXiv:1912.03277 (2019)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287562"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372850"},{"key":"e_1_3_2_2_34_1","volume-title":"How to break anonymity of the netflix prize dataset. arXiv preprint cs\/0610105","author":"Narayanan Arvind","year":"2006","unstructured":"Arvind Narayanan and Vitaly Shmatikov . 2006. How to break anonymity of the netflix prize dataset. arXiv preprint cs\/0610105 ( 2006 ). Arvind Narayanan and Vitaly Shmatikov. 2006. How to break anonymity of the netflix prize dataset. arXiv preprint cs\/0610105 (2006)."},{"key":"e_1_3_2_2_35_1","volume-title":"Proc. of the Second Joint Annual Conference on Information Sciences","author":"Nguyen Son H","year":"1995","unstructured":"Son H Nguyen and Andrzej Skowron . 1995 . Quantization of real value attributes rough set and boolean reasoning approach . In Proc. of the Second Joint Annual Conference on Information Sciences , Wrightsville Beach, North Carolina, Sept 28-Oct 1. Citeseer. Son H Nguyen and Andrzej Skowron. 1995. Quantization of real value attributes rough set and boolean reasoning approach. In Proc. of the Second Joint Annual Conference on Information Sciences, Wrightsville Beach, North Carolina, Sept 28-Oct 1. Citeseer."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533907"},{"key":"e_1_3_2_2_37_1","volume-title":"An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability. arXiv preprint arXiv:2209.10414","author":"Nguyen Van","year":"2022","unstructured":"Van Nguyen , Trung Le , Chakkrit Tantithamthavorn , John Grundy , Hung Nguyen , Seyit Camtepe , Paul Quirk , and Dinh Phung . 2022. An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability. arXiv preprint arXiv:2209.10414 ( 2022 ). Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, and Dinh Phung. 2022. An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability. arXiv preprint arXiv:2209.10414 (2022)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380087"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1173"},{"key":"e_1_3_2_2_40_1","volume-title":"MCCE: Monte Carlo sampling of realistic counterfactual explanations. arXiv preprint arXiv:2111.09790","author":"Redelmeier Annabelle","year":"2021","unstructured":"Annabelle Redelmeier , Martin Jullum , Kjersti Aas , and Anders L\u00f8land . 2021 . MCCE: Monte Carlo sampling of realistic counterfactual explanations. arXiv preprint arXiv:2111.09790 (2021). Annabelle Redelmeier, Martin Jullum, Kjersti Aas, and Anders L\u00f8land. 2021. MCCE: Monte Carlo sampling of realistic counterfactual explanations. arXiv preprint arXiv:2111.09790 (2021)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(78)90005-5"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287569"},{"key":"e_1_3_2_2_44_1","unstructured":"Pierangela Samarati and Latanya Sweeney. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. (1998).  Pierangela Samarati and Latanya Sweeney. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. (1998)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375812"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462533"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_48_1","volume-title":"Counterfactual explanations of machine learning predictions: opportunities and challenges for AI safety. SafeAI@ AAAI","author":"Sokol Kacper","year":"2019","unstructured":"Kacper Sokol and Peter A Flach . 2019. Counterfactual explanations of machine learning predictions: opportunities and challenges for AI safety. SafeAI@ AAAI ( 2019 ). Kacper Sokol and Peter A Flach. 2019. Counterfactual explanations of machine learning predictions: opportunities and challenges for AI safety. SafeAI@ AAAI (2019)."},{"key":"e_1_3_2_2_49_1","volume-title":"Policy gradient methods for reinforcement learning with function approximation. Advances in neural information processing systems 12","author":"Sutton Richard S","year":"1999","unstructured":"Richard S Sutton , David McAllester , Satinder Singh , and Yishay Mansour . 1999. Policy gradient methods for reinforcement learning with function approximation. Advances in neural information processing systems 12 ( 1999 ). Richard S Sutton, David McAllester, Satinder Singh, and Yishay Mansour. 1999. Policy gradient methods for reinforcement learning with function approximation. Advances in neural information processing systems 12 (1999)."},{"key":"e_1_3_2_2_50_1","first-page":"1","article-title":"Simple demographics often identify people uniquely","volume":"671","author":"Sweeney Latanya","year":"2000","unstructured":"Latanya Sweeney . 2000 . Simple demographics often identify people uniquely . Health (San Francisco) 671 , 2000 (2000), 1 -- 34 . Latanya Sweeney. 2000. Simple demographics often identify people uniquely. Health (San Francisco) 671, 2000 (2000), 1--34.","journal-title":"Health (San Francisco)"},{"key":"e_1_3_2_2_51_1","volume-title":"Counterfactual explanations for machine learning: A review. arXiv preprint arXiv:2010.10596","author":"Verma Sahil","year":"2020","unstructured":"Sahil Verma , John Dickerson , and Keegan Hines . 2020. Counterfactual explanations for machine learning: A review. arXiv preprint arXiv:2010.10596 ( 2020 ). Sahil Verma, John Dickerson, and Keegan Hines. 2020. Counterfactual explanations for machine learning: A review. arXiv preprint arXiv:2010.10596 (2020)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20828"},{"key":"e_1_3_2_2_53_1","volume-title":"The Eleventh International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=5OygDd-4Eeh","author":"Vo Vy","year":"2023","unstructured":"Vy Vo , Van Nguyen , Trung Le , Quan Hung Tran , Reza Haf , Seyit Camtepe , and Dinh Phung . 2023 . An Additive Instance-Wise Approach to Multi-class Model Interpretation . In The Eleventh International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=5OygDd-4Eeh Vy Vo, Van Nguyen, Trung Le, Quan Hung Tran, Reza Haf, Seyit Camtepe, and Dinh Phung. 2023. An Additive Instance-Wise Approach to Multi-class Model Interpretation. In The Eleventh International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=5OygDd-4Eeh"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v35i1.2504"},{"key":"e_1_3_2_2_55_1","volume-title":"ICML Workshop on Human Interpretability in Machine Learning.","author":"Yang Yongxin","year":"2018","unstructured":"Yongxin Yang , Irene Garcia Morillo , and Timothy M Hospedales . 2018 . Deep neural decision trees . ICML Workshop on Human Interpretability in Machine Learning. (2018). Yongxin Yang, Irene Garcia Morillo, and Timothy M Hospedales. 2018. Deep neural decision trees. ICML Workshop on Human Interpretability in Machine Learning. (2018)."}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Long Beach CA USA","acronym":"KDD '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599343","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:47Z","timestamp":1750178267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599343"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":55,"alternative-id":["10.1145\/3580305.3599343","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599343","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}