{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:53:40Z","timestamp":1774968820726,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Comission","award":["101021797"],"award-info":[{"award-number":["101021797"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,2]]},"DOI":"10.1145\/3665451.3665527","type":"proceedings-article","created":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T06:41:36Z","timestamp":1721716896000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Explainability versus Security: The Unintended Consequences of xAI in Cybersecurity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5881-6406","authenticated-orcid":false,"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4380-014X","authenticated-orcid":false,"given":"Aleksandra","family":"Pawlicka","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Pozna\u0144, Poland, University of Warsaw, Warsaw, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-3306","authenticated-orcid":false,"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1405-9911","authenticated-orcid":false,"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland"}]}],"member":"320","published-online":{"date-parts":[[2024,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Malik AL-Essa Giuseppina Andresini Annalisa Appice and Donato Malerba. 2022. XAI to Explore Robustness of Features in Adversarial Training for Cybersecurity. 117--126. https:\/\/doi.org\/10.1007\/978-3-031-16564-1_12","DOI":"10.1007\/978-3-031-16564-1_12"},{"key":"e_1_3_2_1_2_1","volume-title":"Adversarial Attacks and Defenses in Explainable Artificial Intelligence: A Survey. (jun","author":"Baniecki Hubert","year":"2023","unstructured":"Hubert Baniecki and Przemyslaw Biecek. 2023. Adversarial Attacks and Defenses in Explainable Artificial Intelligence: A Survey. (jun 2023). https:\/\/doi.org\/2306.06123v2 arXiv:2306.06123"},{"key":"e_1_3_2_1_3_1","volume-title":"Analysis of a Random Forests Model. J. Mach. Learn. Res. 13, null (apr","author":"Biau G\u00e9rard","year":"2012","unstructured":"G\u00e9rard Biau. 2012. Analysis of a Random Forests Model. J. Mach. Learn. Res. 13, null (apr 2012), 1063--1095."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_5_1","unstructured":"L. Breiman J. Friedman C.J. Stone and R.A. Olshen. 1984. Classification and Regression Trees. Taylor & Francis. https:\/\/books.google.pl\/books?id=JwQx-WOmSyQC"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204171"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00926-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33617-2_36"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50423-6_46"},{"key":"e_1_3_2_1_11_1","unstructured":"Sebastian Garcia Agustin Parmisano and Maria Jose Erquiaga. 2020. IoT-23: A labeled dataset with malicious and benign IoT network traffic. Stratosphere Lab. Praha Czech Republic Tech. Rep (2020)."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of 3rd international conference on document analysis and recognition","volume":"1","author":"Ho Tin Kam","year":"1995","unstructured":"Tin Kam Ho. 1995. Random decision forests. In Proceedings of 3rd international conference on document analysis and recognition, Vol. 1. IEEE, 278--282."},{"key":"e_1_3_2_1_13_1","first-page":"3","article-title":"Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data","volume":"12","author":"Komisarek Mikolaj","year":"2021","unstructured":"Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, and Michal Choras. 2021. Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12, 1 (2021), 3--19.","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544486"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103599"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.3003837"},{"key":"e_1_3_2_1_18_1","volume-title":"Explainable Artificial Intelligence and Cybersecurity: A Systematic Literature Review. (feb","author":"Mendes Carlos","year":"2023","unstructured":"Carlos Mendes and Tatiane Nogueira Rios. 2023. Explainable Artificial Intelligence and Cybersecurity: A Systematic Literature Review. (feb 2023). https:\/\/doi.org\/arXiv:2303.01259v1 arXiv:2303.01259"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372850"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of Machine Learning Research 206 (nov","author":"Pawelczyk Martin","year":"2023","unstructured":"Martin Pawelczyk, Himabindu Lakkaraju, and Seth Neel. 2023. On the Privacy Risks of Algorithmic Recourse. Proceedings of Machine Learning Research 206 (nov 2023), 9680--9696. arXiv:2211.05427 http:\/\/arxiv.org\/abs\/2211.05427"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01568-7"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453158"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1536867X20909688"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462533"},{"key":"e_1_3_2_1_25_1","volume-title":"(jun","author":"Slack Dylan","year":"2021","unstructured":"Dylan Slack, Sophie Hilgard, Himabindu Lakkaraju, and Sameer Singh. 2021. Counterfactual Explanations Can Be Manipulated. (jun 2021). https:\/\/doi.org\/2106.02666v2 arXiv:2106.02666"},{"key":"e_1_3_2_1_26_1","volume-title":"Gokul Yenduri, Jon G. Hall, Mamoun Alazab, and Thippa Reddy Gadekallu.","author":"Srivastava Gautam","year":"2022","unstructured":"Gautam Srivastava, Rutvij H Jhaveri, Sweta Bhattacharya, Sharnil Pandya, Rajeswari, Praveen Kumar Reddy Maddikunta, Gokul Yenduri, Jon G. Hall, Mamoun Alazab, and Thippa Reddy Gadekallu. 2022. XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions. (jun 2022). arXiv:2206.03585 http:\/\/arxiv.org\/abs\/2206.03585"},{"key":"e_1_3_2_1_27_1","unstructured":"Stefanie Stoppel. 2022. \"Wasn't Me\" or How to Hide Adversarial Attacks Using Explainable AI. Inovex (2022)."},{"key":"e_1_3_2_1_28_1","volume-title":"On the Robustness of Sparse Counterfactual Explanations to Adverse Perturbations. (jan","author":"Virgolin Marco","year":"2022","unstructured":"Marco Virgolin and Saverio Fracaros. 2022. On the Robustness of Sparse Counterfactual Explanations to Adverse Perturbations. (jan 2022). https:\/\/doi.org\/arXiv:2201.09051 arXiv:2201.09051"},{"key":"e_1_3_2_1_29_1","volume-title":"Danilo Vasconcellos Vargas, and Kouichi Sakurai","author":"Xu Yao","year":"2018","unstructured":"Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, and Kouichi Sakurai. 2018. Tracing MIRAI malware in networked system. In 2018 sixth international symposium on computing and networking workshops (CANDARW). IEEE, 534--538."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433000"}],"event":{"name":"ASIA CCS '24: ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665451.3665527","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3665451.3665527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:41:48Z","timestamp":1755974508000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665451.3665527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,2]]},"references-count":30,"alternative-id":["10.1145\/3665451.3665527","10.1145\/3665451"],"URL":"https:\/\/doi.org\/10.1145\/3665451.3665527","relation":{},"subject":[],"published":{"date-parts":[[2024,7,2]]},"assertion":[{"value":"2024-07-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}