{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:19:12Z","timestamp":1776331152459,"version":"3.50.1"},"reference-count":232,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T00:00:00Z","timestamp":1693958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Dutch Research Council","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2024,1,31]]},"abstract":"<jats:p>In the past two decades, most research on anomaly detection has focused on improving the accuracy of the detection, while largely ignoring the explainability of the corresponding methods and thus leaving the explanation of outcomes to practitioners. As anomaly detection algorithms are increasingly used in safety-critical domains, providing explanations for the high-stakes decisions made in those domains has become an ethical and regulatory requirement. Therefore, this work provides a comprehensive and structured survey on state-of-the-art explainable anomaly detection techniques. We propose a taxonomy based on the main aspects that characterise each explainable anomaly detection technique, aiming to help practitioners and researchers find the explainable anomaly detection method that best suits their needs.<\/jats:p><jats:p\/>","DOI":"10.1145\/3609333","type":"journal-article","created":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T09:43:13Z","timestamp":1689414193000},"page":"1-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["A Survey on Explainable Anomaly Detection"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1124-5778","authenticated-orcid":false,"given":"Zhong","family":"Li","sequence":"first","affiliation":[{"name":"Leiden Institute of Advanced Computer Science (LIACS), Leiden University, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5373-4452","authenticated-orcid":false,"given":"Yuxuan","family":"Zhu","sequence":"additional","affiliation":[{"name":"Leiden Institute of Advanced Computer Science (LIACS), Leiden University, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0510-3549","authenticated-orcid":false,"given":"Matthijs","family":"Van Leeuwen","sequence":"additional","affiliation":[{"name":"Leiden Institute of Advanced Computer Science (LIACS), Leiden University, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,9,6]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8_8"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.5555\/645920.672836"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.220"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3148331"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.5555\/1609942.1609946"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114928"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2018.8430788"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-016-0458-x"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1508857.1508864"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.58"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Liat Antwarg Ronnie Mindlin Miller Bracha Shapira and Lior Rokach. 2021. Explaining anomalies detected by autoencoders using Shapley Additive Explanations. Expert Systems with Applications 186 (2021) 115736.","DOI":"10.1016\/j.eswa.2021.115736"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"e_1_3_1_15_2","first-page":"5228","volume-title":"Proceedings of the 29th International Conference on International Joint Conferences on Artificial Intelligence","author":"Assaf Roy","year":"2021","unstructured":"Roy Assaf, Ioana Giurgiu, Jonas Pfefferle, Serge Monney, Haris Pozidis, and Anika Schumann. 2021. An anomaly detection and explainability framework using convolutional autoencoders for data storage systems. In Proceedings of the 29th International Conference on International Joint Conferences on Artificial Intelligence. 5228\u20135230."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572300"},{"key":"e_1_3_1_17_2","unstructured":"Dor Bank Noam Koenigstein and Raja Giryes. 2020. Autoencoders. CoRR abs\/2003.05991 (2020). arXiv:2003.05991"},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Alberto Barbado and \u00d3scar Corcho. 2022. Interpretable machine learning models for predicting and explaining vehicle fuel consumption anomalies. Engineering Applications of Artificial Intelligence 115 (2022) 105222.","DOI":"10.1016\/j.engappai.2022.105222"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116100"},{"key":"e_1_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Katharina Beckh Sebastian M\u00fcller Matthias Jakobs Vanessa Toborek Hanxiao Tan Raphael Fischer Pascal Welke Sebastian Houben and Laura von Rueden. 2023. Harnessing Prior Knowledge for Explainable Machine Learning: An Overview. In 2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) . IEEE 450\u2013463.","DOI":"10.1109\/SaTML54575.2023.00038"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2021.688969"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.5220\/0010130300870092"},{"key":"e_1_3_1_23_2","unstructured":"Xingyan Bin Ying Zhao and Bilong Shen. 2016. Abnormal subspace sparse PCA for anomaly detection and interpretation. In ODDx3\u201915:ACM SIGKDD 2015 Workshop . Association for Computing Machinery."},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00495"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101438"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3381028"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_1_28_2","doi-asserted-by":"crossref","unstructured":"David Broniatowski. 2021. Psychological foundations of explainability and interpretability in artificial intelligence. (2021).","DOI":"10.6028\/NIST.IR.8367"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3217871.3217872"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1080\/23744731.2019.1565550"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12228"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/WSC48552.2020.9384026"},{"key":"e_1_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Mattia Carletti Matteo Terzi and Gian Antonio Susto. 2023. Interpretable anomaly detection with diffi: Depth-based feature importance of isolation forest. Engineering Applications of Artificial Intelligence 119 (2023) 105730.","DOI":"10.1016\/j.engappai.2022.105730"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-4115(08)60911-5"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080832"},{"key":"e_1_3_1_36_2","first-page":"1","volume-title":"Proceedings of the Non-Volatile Memory Workshop","author":"Chakraborttii Chandranil","year":"2020","unstructured":"Chandranil Chakraborttii and Heiner Litz. 2020. Explaining SSD failures using anomaly detection. In Proceedings of the Non-Volatile Memory Workshop. 1."},{"key":"e_1_3_1_37_2","unstructured":"Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. CoRR abs\/1901.03407 (2019). arXiv:1901.03407"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Chun-Hao Chang Jinsung Yoon Sercan Arik Madeleine Udell and Tomas Pfister. 2022. Data-efficient and interpretable tabular anomaly detection. CoRR abs\/2203.02034 (2022). arXiv:2203.02034","DOI":"10.1145\/3580305.3599294"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMITCon.2019.8862186"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269108"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/GrC.2012.6468672"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2004.1301345"},{"key":"e_1_3_1_44_2","volume-title":"Proceedings of the Conference on Neural Information Processing Systems Workshop on Visually Grounded Interaction and Language","author":"Chen N. F.","year":"2018","unstructured":"N. F. Chen, Zhiyuan Du, and Khin Hua Ng. 2018. Scene graphs for interpretable video anomaly classification. In Proceedings of the Conference on Neural Information Processing Systems Workshop on Visually Grounded Interaction and Language."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00228"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2021.101627"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3077067"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3127847"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1979.10481038"},{"key":"e_1_3_1_51_2","unstructured":"European Commission. 2020. On Artificial Intelligence\u2013A European Approach to Excellence and Trust. Available online at: https:\/\/commission.europa.eu\/publications\/white-paper-artificial-intelligence-european-approach-excellence-and-trust_en (accessed on 19 May 2022)."},{"key":"e_1_3_1_52_2","doi-asserted-by":"crossref","unstructured":"David Cortes. 2020. Explainable outlier detection through decision tree conditioning. CoRR abs\/2001.00636 (2020). arXiv:2001.00636","DOI":"10.32614\/CRAN.package.outliertree"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816642"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_20"},{"key":"e_1_3_1_55_2","unstructured":"Shubhomoy Das Md Rakibul Islam Nitthilan Kannappan Jayakodi and Janardhan Rao Doppa. 2019. Active anomaly detection via ensembles: Insights algorithms and interpretability. CoRR abs\/1901.08930 (2019). arXiv:1901.08930"},{"key":"e_1_3_1_56_2","article-title":"Anomaly detection, explanation and visualization","author":"Davidson Ian","year":"2007","unstructured":"Ian Davidson. 2007. Anomaly detection, explanation and visualization. SGI, Tokyo, Japan, Tech. Rep (2007).","journal-title":"SGI, Tokyo, Japan, Tech. Rep"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575599"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"issue":"2","key":"e_1_3_1_59_2","first-page":"57","article-title":"Credit card fraud and detection techniques: A review","volume":"4","author":"Delamaire Linda","year":"2009","unstructured":"Linda Delamaire, Hussein Abdou, and John Pointon. 2009. Credit card fraud and detection techniques: A review. Banks and Bank Systems 4, 2 (2009), 57\u201368.","journal-title":"Banks and Bank Systems"},{"key":"e_1_3_1_60_2","unstructured":"Charlie Dickens Eric Meissner Pablo G. Moreno and Tom Diethe. 2020. Interpretable anomaly detection with mondrian polya forests on data streams. CoRR abs\/2008.01505 (2020). arXiv:2008.01505"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.3027910"},{"key":"e_1_3_1_62_2","unstructured":"Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. CoRR abs\/1702.08608 (2017). arXiv:1702.08608"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400040"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0398-2"},{"key":"e_1_3_1_66_2","volume-title":"Proceedings of the American Control Conference","author":"Dunia Ricardo","year":"1997","unstructured":"Ricardo Dunia and S. Joe Qin. 1997. Multi-dimensional fault diagnosis using a subspace approach. In Proceedings of the American Control Conference."},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.2495\/DATA090181"},{"key":"e_1_3_1_68_2","first-page":"199","article-title":"Minds-minnesota intrusion detection system","author":"Ertoz Levent","year":"2004","unstructured":"Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, and Paul Dokas. 2004. Minds-minnesota intrusion detection system. Next Generation Data Mining (2004), 199\u2013218.","journal-title":"Next Generation Data Mining"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7367870"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2019.2949516"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.2514\/6.2016-2430"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2018.00018"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358121"},{"key":"e_1_3_1_74_2","unstructured":"Nico Gnoss Martin Schultz and Marina Tropmann-Frick. 2022. XAI in the audit domain-explaining an autoencoder model for anomaly detection. In 17th International Conference on Wirtschaftsinformatik . AISeL."},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68935-7_54"},{"key":"e_1_3_1_76_2","first-page":"1","article-title":"Towards intelligible robust anomaly detection by learning interpretable behavioural models","volume":"32","author":"Grov Gudmund","year":"2019","unstructured":"Gudmund Grov, Marc Sabate, Wei Chen, and David Aspinall. 2019. Towards intelligible robust anomaly detection by learning interpretable behavioural models. NISK J 32 (2019), 1\u201316.","journal-title":"NISK J"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3093585"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"e_1_3_1_80_2","first-page":"122","volume-title":"Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases","author":"Gupta Nikhil","year":"2018","unstructured":"Nikhil Gupta, Dhivya Eswaran, Neil Shah, Leman Akoglu, and Christos Faloutsos. 2018. Beyond outlier detection: Lookout for pictorial explanation. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 122\u2013138."},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671642"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.46"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS0501103H"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11052270"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.391"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119573"},{"key":"e_1_3_1_89_2","unstructured":"Yasuhiro Ikeda Keisuke Ishibashi Yuusuke Nakano Keishiro Watanabe and Ryoichi Kawahara. 2018. Anomaly detection and interpretation using multimodal autoencoder and sparse optimization. CoRR abs\/1812.07136 (2018). arXiv:1812.07136"},{"key":"e_1_3_1_90_2","unstructured":"Yasuhiro Ikeda Kengo Tajiri Yuusuke Nakano Keishiro Watanabe and Keisuke Ishibashi. 2018. Estimation of dimensions contributing to detected anomalies with variational autoencoders. CoRR abs\/1811.04576 (2018). arXiv:1811.04576"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106250"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22010291"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA53316.2021.9564228"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.04.011"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1198\/1061860032148"},{"key":"e_1_3_1_96_2","unstructured":"Nirmal Sobha Kartha Cl\u00e9ment Gautrais and Vincent Vercruyssen. 2021. Why are you weird? Infusing interpretability in isolation forest for anomaly detection. In Proceedings of the Explainable Agency in AI Workshop (AAAI\u201921) . 51\u201357."},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107198"},{"key":"e_1_3_1_98_2","unstructured":"Jacob Kauffmann Lukas Ruff Gr\u00e9goire Montavon and Klaus-Robert M\u00fcller. 2020. The clever Hans effect in anomaly detection. CoRR abs\/2006.10609 (2020). arXiv:2006.10609"},{"key":"e_1_3_1_99_2","unstructured":"Guolin Ke Qi Meng Thomas Finley Taifeng Wang Wei Chen Weidong Ma Qiwei Ye and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. In Proceedings of the 31st International Conference on Neural Information Processing Systems (Long Beach California USA) (NIPS\u201917) . Curran Associates Inc. 3149\u20133157."},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.88"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505560"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.79"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87626-5_22"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21155200"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30493-5_41"},{"key":"e_1_3_1_106_2","first-page":"392","volume-title":"Proceedings of the VLDB","author":"Knorr Edwin M.","year":"1998","unstructured":"Edwin M. Knorr and Raymond T. Ng. 1998. Algorithms for mining distance-based outliers in large datasets. In Proceedings of the VLDB. Citeseer, 392\u2013403."},{"key":"e_1_3_1_107_2","first-page":"211","volume-title":"Proceedings of the VLDB","author":"Knorr Edwin M.","year":"1999","unstructured":"Edwin M. Knorr and Raymond T. Ng. 1999. Finding intensional knowledge of distance-based outliers. In Proceedings of the VLDB. Citeseer, 211\u2013222."},{"key":"e_1_3_1_108_2","first-page":"61","volume-title":"Proceedings of the European Conference on Information Technologies\u2013Applications and Theory.","author":"Kopp Martin","year":"2014","unstructured":"Martin Kopp, Tom\u00e1\u0161 Pevn\u1ef3, and Martin Holena. 2014. Interpreting and clustering outliers with sapling random forests. In Proceedings of the European Conference on Information Technologies\u2013Applications and Theory.61\u201367."},{"key":"e_1_3_1_109_2","first-page":"457","volume-title":"Proceedings of the International Conference on Extending Database Technology","author":"Kraiem Ines Ben","year":"2021","unstructured":"Ines Ben Kraiem, Faiza Ghozzi, Andr\u00e9 P\u00e9ninou, Geoffrey Roman-Jimenez, and Olivier Teste. 2021. Human-interpretable rules for anomaly detection in time-series. In Proceedings of the International Conference on Extending Database Technology. 457\u2013462."},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.21"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10174"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2020.101850"},{"key":"e_1_3_1_113_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-08987-4"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31759-0_5"},{"key":"e_1_3_1_115_2","unstructured":"Efrat Levy Nadav Maman Asaf Shabtai and Yuval Elovici. 2022. AnoMili: Spoofing prevention and explainable anomaly detection for the 1553 military avionic bus. CoRR abs\/2202.06870 (2022). arXiv:2202.06870"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671744"},{"key":"e_1_3_1_117_2","doi-asserted-by":"crossref","unstructured":"Wenkai Li Wenbo Hu Ning Chen and Cheng Feng. 2022. Stacking VAE with graph neural networks for effective and interpretable time series anomaly detection. AI Open 3 (2022) 101\u2013110.","DOI":"10.1016\/j.aiopen.2022.07.001"},{"key":"e_1_3_1_118_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467075"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624168"},{"key":"e_1_3_1_120_2","doi-asserted-by":"crossref","unstructured":"Tianyang Lin Yuxin Wang Xiangyang Liu and Xipeng Qiu. 2022. A survey of transformers. AI Open 3 (2022) 111\u2013132.","DOI":"10.1016\/j.aiopen.2022.10.001"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.3390\/e23010018"},{"key":"e_1_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"e_1_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_1_124_2","doi-asserted-by":"crossref","unstructured":"Ninghao Liu Donghwa Shin and Xia Hu. 2018. Contextual outlier interpretation. In Proceedings of the 27th International Joint Conference on Artificial Intelligence (Stockholm Sweden) (IJCAI\u201918) . AAAI Press 2461\u20132467.","DOI":"10.24963\/ijcai.2018\/341"},{"key":"e_1_3_1_125_2","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020571"},{"key":"e_1_3_1_126_2","unstructured":"Yinxi Liu Kai Yang Shaoyu Dou and Pan Luo. 2022. Interpretable anomaly detection in variable-length co-evolving rhythmic sequences. In 1st Workshop on Artificial Intelligence for Anomalies and Novelties (AI4AN) ."},{"key":"e_1_3_1_127_2","unstructured":"Philipp Liznerski Lukas Ruff Robert A. Vandermeulen Billy Joe Franks Marius Kloft and Klaus-Robert M\u00fcller. 2020. Explainable deep one-class classification. In International Conference on Learning Representations ."},{"key":"e_1_3_1_128_2","unstructured":"S. Lundberg and S. I. Lee. 2021. A game theoretic approach to explain the output of any machine learning model. Available online at: https:\/\/github.com\/shap\/shap (accessed on 19 May 2022)."},{"key":"e_1_3_1_129_2","unstructured":"Scott M. Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. In Proceedings of the 31st International Conference on Neural Information Processing Systems (Long Beach California USA) (NIPS\u201917) . Curran Associates Inc. Red Hook NY USA 4768\u20134777."},{"key":"e_1_3_1_130_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-018-0585-7"},{"key":"e_1_3_1_131_2","unstructured":"Alireza Makhzani Jonathon Shlens Navdeep Jaitly Ian Goodfellow and Brendan Frey. 2016. Adversarial autoencoders. ICLR Workshop track ."},{"key":"e_1_3_1_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.48"},{"key":"e_1_3_1_133_2","unstructured":"Daniel L. Marino Chathurika S. Wickramasinghe Craig Rieger and Milos Manic. 2022. Self-supervised and interpretable anomaly detection using network transformers. CoRR abs\/2202.12997 (2022). arXiv:2202.12997"},{"key":"e_1_3_1_134_2","doi-asserted-by":"publisher","DOI":"10.3141\/2643-15"},{"key":"e_1_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.018"},{"key":"e_1_3_1_136_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.019"},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.3390\/forecast4010001"},{"key":"e_1_3_1_138_2","first-page":"1203","article-title":"Polya trees and random distributions","author":"Mauldin R. Daniel","year":"1992","unstructured":"R. Daniel Mauldin, William D. Sudderth, and Stanley C. Williams. 1992. Polya trees and random distributions. The Annals of Statistics (1992), 1203\u20131221.","journal-title":"The Annals of Statistics"},{"key":"e_1_3_1_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/3109729.3109752"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/CERMA.2010.12"},{"key":"e_1_3_1_141_2","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010959"},{"key":"e_1_3_1_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.132"},{"key":"e_1_3_1_143_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2018.07.007"},{"key":"e_1_3_1_144_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888921000102"},{"key":"e_1_3_1_145_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.11.008"},{"key":"e_1_3_1_146_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.10.011"},{"key":"e_1_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOTESTCON43700.2019.8961052"},{"key":"e_1_3_1_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/NoF50125.2020.9249194"},{"key":"e_1_3_1_149_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33486-3_57"},{"key":"e_1_3_1_150_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767916"},{"key":"e_1_3_1_151_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1900654116"},{"key":"e_1_3_1_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"e_1_3_1_153_2","doi-asserted-by":"publisher","DOI":"10.20944\/preprints202109.0034.v1"},{"key":"e_1_3_1_154_2","unstructured":"Harsha Nori Samuel Jenkins Paul Koch and Rich Caruana. 2019. Interpretml: A unified framework for machine learning interpretability. CoRR abs\/1909.09223 (2019). arXiv:1909.09223"},{"key":"e_1_3_1_155_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0234-x"},{"key":"e_1_3_1_156_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3470794"},{"key":"e_1_3_1_157_2","volume-title":"Proceedings of the IJCAI International Joint Conference on Artificial Intelligence","author":"Pang Guansong","year":"2016","unstructured":"Guansong Pang, Longbing Cao, and Ling Chen. 2016. Outlier detection in complex categorical data by modelling the feature value couplings. In Proceedings of the IJCAI International Joint Conference on Artificial Intelligence."},{"key":"e_1_3_1_158_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11692"},{"key":"e_1_3_1_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0052"},{"key":"e_1_3_1_160_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/360"},{"key":"e_1_3_1_161_2","unstructured":"Guansong Pang Choubo Ding Chunhua Shen and Anton van den Hengel. 2021. Explainable deep few-shot anomaly detection with deviation networks. CoRR abs\/2108.00462 (2021). arXiv:2108.00462"},{"key":"e_1_3_1_162_2","doi-asserted-by":"crossref","unstructured":"Guansong Pang Chunhua Shen Longbing Cao and Anton Van Den Hengel. 2021. Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR) 54 2 (2021) 1\u201338.","DOI":"10.1145\/3439950"},{"key":"e_1_3_1_163_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00721-1"},{"key":"e_1_3_1_164_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03384-x"},{"key":"e_1_3_1_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW51313.2020.00111"},{"key":"e_1_3_1_166_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"e_1_3_1_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/IBSSC47189.2019.8973044"},{"key":"e_1_3_1_168_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5507-y"},{"key":"e_1_3_1_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/CERMA.2011.14"},{"key":"e_1_3_1_170_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5521-0"},{"key":"e_1_3_1_171_2","volume-title":"Proceedings of the Information Technologies-Applications and Theory Workshops, Posters, and Tutorials (ITAT\u201914)","author":"Pevn\u1ef3 Tom\u00e1\u0161","year":"2014","unstructured":"Tom\u00e1\u0161 Pevn\u1ef3 and Martin Kopp. 2014. Explaining anomalies with sapling random forests. In Proceedings of the Information Technologies-Applications and Theory Workshops, Posters, and Tutorials (ITAT\u201914)."},{"key":"e_1_3_1_172_2","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2018.8610471"},{"key":"e_1_3_1_173_2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"},{"key":"e_1_3_1_174_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37446-4_11"},{"key":"e_1_3_1_175_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_1_176_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"e_1_3_1_177_2","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2009.12"},{"key":"e_1_3_1_178_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_1_179_2","doi-asserted-by":"crossref","unstructured":"Khushnaseeb Roshan and Aasim Zafar. 2021. Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation (SHAP). International Journal of Computer Networks & Communications 13 (2021) 1\u201320.","DOI":"10.5121\/ijcnc.2021.13607"},{"key":"e_1_3_1_180_2","volume-title":"Proceedings of the NIPS","volume":"21","year":"2008","unstructured":"Daniel M. Roy and Yee Whye Teh. 2008. The mondrian process. In Proceedings of the NIPS, Vol. 21."},{"key":"e_1_3_1_181_2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_3_1_182_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3052449"},{"key":"e_1_3_1_183_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHM.2019.8819396"},{"key":"e_1_3_1_184_2","unstructured":"Hojjat Salehinejad Sharan Sankar Joseph Barfett Errol Colak and Shahrokh Valaee. 2017. Recent advances in recurrent neural networks. CoRR abs\/1801.01078 (2018). arXiv:1801.01078"},{"key":"e_1_3_1_185_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62008-0_32"},{"key":"e_1_3_1_186_2","unstructured":"Durgesh Samariya Jiangang Ma Sunil Aryal and Kai Ming Ting. 2020. A comprehensive survey on outlying aspect mining methods. CoRR abs\/2005.02637 (2020). arXiv:2005.02637"},{"key":"e_1_3_1_187_2","unstructured":"Cetin Savkli and Catherine Schwartz. 2021. Random subspace mixture models for interpretable anomaly detection. CoRR abs\/2108.06283 (2021). arXiv:2108.06283"},{"key":"e_1_3_1_188_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2021.11.261"},{"key":"e_1_3_1_189_2","unstructured":"Bernhard Sch\u00f6lkopf Robert C. Williamson Alex Smola John Shawe-Taylor and John Platt. 1999. Support vector method for novelty detection. In Proceedings of the 12th International Conference on Neural Information Processing Systems (Denver CO) (NIPS\u201999 Vol. 12) . MIT Press Cambridge MA USA 582\u2013588."},{"key":"e_1_3_1_190_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2021.100172"},{"key":"e_1_3_1_191_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_1_192_2","first-page":"481","volume-title":"Proceedings of the EDBT","author":"Senin Pavel","year":"2015","unstructured":"Pavel Senin, Jessica Lin, Xing Wang, Tim Oates, Sunil Gandhi, Arnold P. Boedihardjo, Crystal Chen, and Susan Frankenstein. 2015. Time series anomaly discovery with grammar-based compression. In Proceedings of the EDBT. 481\u2013492."},{"key":"e_1_3_1_193_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11167376"},{"key":"e_1_3_1_194_2","doi-asserted-by":"publisher","DOI":"10.1145\/3230666"},{"key":"e_1_3_1_195_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683212"},{"key":"e_1_3_1_196_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.35"},{"key":"e_1_3_1_197_2","first-page":"9016","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Sipple John","year":"2020","unstructured":"John Sipple. 2020. Interpretable, multidimensional, multimodal anomaly detection with negative sampling for detection of device failure. In Proceedings of the International Conference on Machine Learning. PMLR, 9016\u20139025."},{"key":"e_1_3_1_198_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16564-1_16"},{"key":"e_1_3_1_199_2","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375830"},{"key":"e_1_3_1_200_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS49788.2021.9551111"},{"key":"e_1_3_1_201_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.69"},{"key":"e_1_3_1_202_2","unstructured":"Daniel Smilkov Nikhil Thorat Been Kim Fernanda Vi\u00e9gas and Martin Wattenberg. 2017. Smoothgrad: Removing noise by adding noise. In ICML Workshop on Visualization for Deep Learning ICML ."},{"key":"e_1_3_1_203_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08974-9_57"},{"key":"e_1_3_1_204_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00204"},{"key":"e_1_3_1_205_2","unstructured":"Jost Tobias Springenberg Alexey Dosovitskiy Thomas Brox and Martin Riedmiller. 2014. Striving for simplicity: The all convolutional net. In ICLR workshop track ."},{"key":"e_1_3_1_206_2","first-page":"9269","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Sundararajan Mukund","year":"2020","unstructured":"Mukund Sundararajan and Amir Najmi. 2020. The many Shapley values for model explanation. In Proceedings of the International Conference on Machine Learning. PMLR, 9269\u20139278."},{"key":"e_1_3_1_207_2","first-page":"3319","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Sundararajan Mukund","year":"2017","unstructured":"Mukund Sundararajan, Ankur Taly, and Qiqi Yan. 2017. Axiomatic attribution for deep networks. In Proceedings of the International Conference on Machine Learning. PMLR, 3319\u20133328."},{"key":"e_1_3_1_208_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00360"},{"key":"e_1_3_1_209_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00157"},{"key":"e_1_3_1_210_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2019.00117"},{"key":"e_1_3_1_211_2","unstructured":"Jinying Zou and Ovanes L. Petrosian. 2020. Explainable AI: Using Shapley Value to Explain Complex Anomaly Detection ML-Based Systems. In Machine Learning and Artificial Intelligence - Proceedings of MLIS 2020 Virtual Event October 25-28 2020 (Frontiers in Artificial Intelligence and Applications) Vol. 332. IOS Press 152\u2013164."},{"key":"e_1_3_1_212_2","doi-asserted-by":"publisher","DOI":"10.1145\/3412815.3416893"},{"key":"e_1_3_1_213_2","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2016.158"},{"key":"e_1_3_1_214_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46349-0_27"},{"issue":"11","key":"e_1_3_1_215_2","article-title":"Visualizing data using t-SNE.","volume":"9","author":"Maaten Laurens Van der","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research 9, 11 (2008).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_1_216_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58520-4_29"},{"key":"e_1_3_1_217_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-016-0453-2"},{"issue":"3152676","key":"e_1_3_1_218_2","first-page":"10","article-title":"The eu general data protection regulation (gdpr)","volume":"10","author":"Voigt Paul","year":"2017","unstructured":"Paul Voigt and Axel Von dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10, 3152676 (2017), 10\u20135555.","journal-title":"A Practical Guide, 1st Ed., Cham: Springer International Publishing"},{"key":"e_1_3_1_219_2","doi-asserted-by":"crossref","unstructured":"Laura von Rueden Sebastian Mayer Katharina Beckh Bogdan Georgiev Sven Giesselbach Raoul Heese Birgit Kirsch Julius Pfrommer Annika Pick Rajkumar Ramamurthy Michal Walczak Jochen Garcke Christian Bauckhage and Jannis Schuecker. 2023. Informed machine learning \u2013 A taxonomy and survey of integrating prior knowledge into learning systems. IEEE Transactions on Knowledge and Data Engineering 35 1 (2023) 614\u2013633.","DOI":"10.1109\/TKDE.2021.3079836"},{"key":"e_1_3_1_220_2","doi-asserted-by":"crossref","unstructured":"Chongke Wu Sicong Shao Cihan Tunc Pratik Satam and Salim Hariri. 2022. An explainable and efficient deep learning framework for video anomaly detection. Cluster Computing 25 (2022) 2715\u20132737.","DOI":"10.1007\/s10586-021-03439-5"},{"key":"e_1_3_1_221_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAAI54685.2021.00014"},{"key":"e_1_3_1_222_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449868"},{"key":"e_1_3_1_223_2","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_1_224_2","doi-asserted-by":"publisher","DOI":"10.36001\/phmconf.2019.v11i1.824"},{"key":"e_1_3_1_225_2","doi-asserted-by":"publisher","DOI":"10.2307\/1269288"},{"key":"e_1_3_1_226_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2021.101946"},{"key":"e_1_3_1_227_2","unstructured":"Luca Zancato Alessandro Achille Giovanni Paolini Alessandro Chiuso and Stefano Soatto. 2021. STRIC: Stacked residuals of interpretable components for time series anomaly detection. CoRR abs\/2202.12457 (2021). arXiv:2202.12457"},{"key":"e_1_3_1_228_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"e_1_3_1_229_2","first-page":"1265","volume-title":"Proceedings of the 30th International Conference on Very Large Data Bases (VLDB\u201904)","author":"Zhang Ji","year":"2004","unstructured":"Ji Zhang, Meng Lou, Tok Wang Ling, and Hai Wang. 2004. HOS-miner: A system for detecting outlying subspaces of high-dimensional data. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB\u201904). Morgan Kaufmann Publishers Inc., 1265\u20131268."},{"key":"e_1_3_1_230_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10050593"},{"key":"e_1_3_1_231_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2012.2234722"},{"key":"e_1_3_1_232_2","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11161"},{"key":"e_1_3_1_233_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2005.00503.x"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:22Z","timestamp":1750178782000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,6]]},"references-count":232,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,31]]}},"alternative-id":["10.1145\/3609333"],"URL":"https:\/\/doi.org\/10.1145\/3609333","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,6]]},"assertion":[{"value":"2022-10-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}