{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:04:57Z","timestamp":1751688297588,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3714301","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:45:58Z","timestamp":1745469958000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Explanations Help: Leveraging Human Capabilities to Detect Cyberattacks on Automated Vehicles"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6798-8313","authenticated-orcid":false,"given":"Yaohan","family":"Ding","sequence":"first","affiliation":[{"name":"School of Computing and Information, University of Pittsburgh, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4608-1883","authenticated-orcid":false,"given":"Jun","family":"Ying","sequence":"additional","affiliation":[{"name":"Lyles School of Civil and Construction Engineering, Purdue University, WEST LAFAYETTE, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5656-3222","authenticated-orcid":false,"given":"Yiheng","family":"Feng","sequence":"additional","affiliation":[{"name":"Lyles School of Civil and Construction Engineering, Purdue University, West Lafayette, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4383-2451","authenticated-orcid":false,"given":"Na","family":"Du","sequence":"additional","affiliation":[{"name":"School of Computing and Information, University of Pittsburgh, Pittsburgh, Pennsylvania, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"Accessed on 09\/12\/2024. Autopilot and Full Self-Driving Capability.https:\/\/www.tesla.com\/support\/autopilot"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"crossref","unstructured":"Somayeh Aliebrahimi and Erika\u00a0E Miller. 2023. Effects of cybersecurity knowledge and situation awareness during cyberattacks on autonomous vehicles. Transportation research part F: traffic psychology and behaviour 96 (2023) 82\u201391.","DOI":"10.1016\/j.trf.2023.06.010"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"crossref","unstructured":"Johannes Beller Matthias Heesen and Mark Vollrath. 2013. Improving the driver\u2013automation interaction: An approach using automation uncertainty. Human factors 55 6 (2013) 1130\u20131141.","DOI":"10.1177\/0018720813482327"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506613"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Kuan-Ting Chen and Huei-Yen\u00a0Winnie Chen. 2021. Manipulating music to communicate automation reliability in conditionally automated driving: A driving simulator study. International Journal of Human-Computer Studies 145 (2021) 102518.","DOI":"10.1016\/j.ijhcs.2020.102518"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"crossref","unstructured":"Kuan-Ting Chen Huei-Yen\u00a0Winnie Chen and Ann Bisantz. 2023. Adding visual contextual information to continuous sonification feedback about low-reliability situations in conditionally automated driving: A driving simulator study. Transportation research part F: traffic psychology and behaviour 94 (2023) 25\u201341.","DOI":"10.1016\/j.trf.2023.01.017"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"crossref","unstructured":"Qian Chen Paul Romanowich Jorge Castillo Krishna\u00a0Chandra Roy Gustavo Chavez and Shouhuai Xu. 2021. Exhpd: Exploiting human physical and driving behaviors to detect vehicle cyber attacks. IEEE Internet of Things Journal 8 18 (2021) 14355\u201314371.","DOI":"10.1109\/JIOT.2021.3069951"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213601848"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445351"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"crossref","unstructured":"Mark Colley Oliver Speidel Jan Strohbeck Jan\u00a0Ole Rixen Jan\u00a0Henry Belz and Enrico Rukzio. 2024. Effects of uncertain trajectory prediction visualization in highly automated vehicles on trust situation awareness and cognitive load. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 7 4 (2024) 1\u201323.","DOI":"10.1145\/3631408"},{"key":"e_1_3_3_3_14_2","unstructured":"Test\u00a0Pattern Creations. Accessed on 01\/01\/2024. Procedural Road And Highway Tool With Simple Vehicle Traffic.https:\/\/www.fab.com\/listings\/92cdf96e-177f-4f5a-bdff-12a473ccb16a"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"crossref","unstructured":"Fred\u00a0D Davis. 1989. Perceived usefulness perceived ease of use and user acceptance of information technology. MIS quarterly (1989) 319\u2013340.","DOI":"10.2307\/249008"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom45495.2020.9127389"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1177\/21695067231192406"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642648"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"crossref","unstructured":"Jiqian Dong Sikai Chen Mohammad Miralinaghi Tiantian Chen Pei Li and Samuel Labi. 2023. Why did the AI make that decision? Towards an explainable artificial intelligence (XAI) for autonomous driving systems. Transportation research part C: emerging technologies 156 (2023) 104358.","DOI":"10.1016\/j.trc.2023.104358"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR59233.2023.00040"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"crossref","unstructured":"Na Du Jacob Haspiel Qiaoning Zhang Dawn Tilbury Anuj\u00a0K Pradhan X\u00a0Jessie Yang and Lionel\u00a0P Robert\u00a0Jr. 2019. Look who\u2019s talking now: Implications of AV\u2019s explanations on driver\u2019s trust AV preference anxiety and mental workload. Transportation research part C: emerging technologies 104 (2019) 428\u2013442.","DOI":"10.1016\/j.trc.2019.05.025"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3409118.3475155"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"crossref","unstructured":"Mica\u00a0R Endsley. 1995. Measurement of situation awareness in dynamic systems. Human factors 37 1 (1995) 65\u201384.","DOI":"10.1518\/001872095779049499"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"e_1_3_3_3_25_2","unstructured":"Dexsoft Games. Accessed on 01\/01\/2024. City Creator.https:\/\/www.fab.com\/listings\/2594de2d-531b-43f6-8b84-c3fbb7c360e7"},{"key":"e_1_3_3_3_26_2","unstructured":"Epic Games. Accessed on 01\/01\/2024. Automotive Configurator.https:\/\/www.fab.com\/listings\/211f69e6-e091-42cd-90ba-8f3b9ffa72a1"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"crossref","unstructured":"Patrick Gontar Hendrik Homans Michelle Rostalski Julia Behrend Fr\u00e9d\u00e9ric Dehais and Klaus Bengler. 2018. Are pilots prepared for a cyber-attack? A human factors approach to the experimental evaluation of pilots\u2019 behavior. Journal of Air Transport Management 69 (2018) 26\u201337.","DOI":"10.1016\/j.jairtraman.2018.01.004"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"crossref","unstructured":"Rachel Hartman Aaron\u00a0J Moss Shalom\u00a0Noach Jaffe Cheskie Rosenzweig Leib Litman and Jonathan Robinson. 2023. Introducing connect by CloudResearch: Advancing online participant recruitment in the digital age. (2023).","DOI":"10.31234\/osf.io\/ksgyr"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2516540.2516554"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Shihong\u00a0Ed Huang Yiheng Feng and Henry\u00a0X Liu. 2021. A data-driven method for falsified vehicle trajectory identification by anomaly detection. Transportation research part C: emerging technologies 128 (2021) 103196.","DOI":"10.1016\/j.trc.2021.103196"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Jeamin Koo Jungsuk Kwac Wendy Ju Martin Steinert Larry Leifer and Clifford Nass. 2015. Why did my car just do that? Explaining semi-autonomous driving actions to improve driver understanding trust and performance. International Journal on Interactive Design and Manufacturing (IJIDeM) 9 (2015) 269\u2013275.","DOI":"10.1007\/s12008-014-0227-2"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"crossref","unstructured":"Moritz K\u00f6rber Christian Gold David Lechner and Klaus Bengler. 2016. The influence of age on the take-over of vehicle control in highly automated driving. Transportation research part F: traffic psychology and behaviour 39 (2016) 19\u201332.","DOI":"10.1016\/j.trf.2016.03.002"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"crossref","unstructured":"Moritz K\u00f6rber Lorenz Prasch and Klaus Bengler. 2018. Why do I have to drive now? Post hoc explanations of takeover requests. Human factors 60 3 (2018) 305\u2013323.","DOI":"10.1177\/0018720817747730"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0W Kramer. 1999. Motivation to reduce uncertainty: A reconceptualization of uncertainty reduction theory. Management communication quarterly 13 2 (1999) 305\u2013316.","DOI":"10.1177\/0893318999132007"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Johannes Kraus David Scholz Dina Stiegemeier and Martin Baumann. 2020. The more you know: trust dynamics and calibration in highly automated driving and the effects of take-overs system malfunction and system transparency. Human factors 62 5 (2020) 718\u2013736.","DOI":"10.1177\/0018720819853686"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"crossref","unstructured":"Alexander Kunze Stephen\u00a0J Summerskill Russell Marshall and Ashleigh\u00a0J Filtness. 2019. Automation transparency: implications of uncertainty communication for human-automation interaction and interfaces. Ergonomics 62 3 (2019) 345\u2013360.","DOI":"10.1080\/00140139.2018.1547842"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3342197.3344537"},{"key":"e_1_3_3_3_39_2","first-page":"107118132412603","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting","author":"Lee Myeongkyu","year":"2024","unstructured":"Myeongkyu Lee and Brandon\u00a0J Pitts. 2024. The Impact of System Confidence and Reliability on Drivers\u2019 Decision-Making in Conditionally Automated Vehicles. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting. SAGE Publications Sage CA: Los Angeles, CA, 10711813241260388."},{"key":"e_1_3_3_3_40_2","unstructured":"Jinshan Liu and Jung-Min Park. 2021. \u201cSeeing is not always believing\u201d: detecting perception error attacks against autonomous vehicles. IEEE Transactions on Dependable and Secure Computing 18 5 (2021) 2209\u20132223."},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"crossref","unstructured":"Hampus Lundberg Nishat\u00a0I Mowla Sarder\u00a0Fakhrul Abedin Kyi Thar Aamir Mahmood Mikael Gidlund and Shahid Raza. 2022. Experimental analysis of trustworthy in-vehicle intrusion detection system using explainable artificial intelligence (XAI). IEEE Access 10 (2022) 102831\u2013102841.","DOI":"10.1109\/ACCESS.2022.3208573"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"crossref","unstructured":"Joseph\u00a0B Lyons Izz aldin Hamdan and Thy\u00a0Q Vo. 2023. Explanations and trust: What happens to trust when a robot partner does something unexpected? Computers in Human Behavior 138 (2023) 107473.","DOI":"10.1016\/j.chb.2022.107473"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Stephanie\u00a0M Merritt. 2011. Affective processes in human\u2013automation interactions. Human Factors 53 4 (2011) 356\u2013370.","DOI":"10.1177\/0018720811411912"},{"key":"e_1_3_3_3_44_2","unstructured":"Charlie Miller and Chris Valasek. 2013. Adventures in automotive networks and control units. Def Con 21 260-264 (2013) 15\u201331."},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"crossref","unstructured":"Steve Moyle Andrew Martin and Nicholas Allott. 2024. XAI Human-Machine collaboration applied to network security. Frontiers in Computer Science 6 (2024) 1321238.","DOI":"10.3389\/fcomp.2024.1321238"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0A Nees Benji Helbein and Anna Porter. 2016. Speech auditory alerts promote memory for alerted events in a video-simulated self-driving car ride. Human factors 58 3 (2016) 416\u2013426.","DOI":"10.1177\/0018720816629279"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1177\/154193129303700423"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Raja Parasuraman and Victor Riley. 1997. Humans and automation: Use misuse disuse abuse. Human factors 39 2 (1997) 230\u2013253.","DOI":"10.1518\/001872097778543886"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1177\/1071181322661506"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543174.3546976"},{"key":"e_1_3_3_3_51_2","unstructured":"Pedja Racan. Accessed on 01\/01\/2024. Modern City Bundle.https:\/\/www.fab.com\/sellers\/Pedja%20Racan"},{"key":"e_1_3_3_3_52_2","unstructured":"SAE. 2018. Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles. SAE international 4970 724 (2018) 1\u20135."},{"key":"e_1_3_3_3_53_2","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security 21)","author":"Sato Takami","year":"2021","unstructured":"Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jia, Xue Lin, and Qi\u00a0Alfred Chen. 2021. Dirty road can attack: Security of deep learning based automated lane centering under physical-world attack. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Walter Schneider and Richard\u00a0M Shiffrin. 1977. Controlled and automatic human information processing: I. Detection search and attention. Psychological review 84 1 (1977) 1.","DOI":"10.1037\/\/0033-295X.84.1.1"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Richard\u00a0M Shiffrin and Walter Schneider. 1977. Controlled and automatic human information processing: II. Perceptual learning automatic attending and a general theory. Psychological review 84 2 (1977) 127.","DOI":"10.1037\/\/0033-295X.84.2.127"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"e_1_3_3_3_57_2","unstructured":"Switchboard Studios. Accessed on 01\/01\/2024. Vehicle Variety Pack Volume 2.https:\/\/www.fab.com\/listings\/591e3b3f-9d49-4cd2-8e28-d471c1a10cab"},{"key":"e_1_3_3_3_58_2","first-page":"877","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Sun Jiachen","year":"2020","unstructured":"Jiachen Sun, Yulong Cao, Qi\u00a0Alfred Chen, and Z\u00a0Morley Mao. 2020. Towards robust { LiDAR-based} perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In 29th USENIX Security Symposium (USENIX Security 20). 877\u2013894."},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"crossref","unstructured":"Keisuke Suzuki Joohyeong Lee and Atsushi Kanbe. 2020. HMI Design when Using Level 2 Automated Driving Function-Effects of System Status Presentation Considering the Risk of Malfunction on Driver Behavior\u2013. Journal of Robotics and Mechatronics 32 3 (2020) 520\u2013529.","DOI":"10.20965\/jrm.2020.p0520"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258493"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"crossref","unstructured":"Louis Tijerina Mike Blommer Reates Curry Radhakrishnan Swaminathan Dev\u00a0S Kochhar and Walter Talamonti. 2016. An exploratory study of driver response to reduced system confidence notifications in automated driving. IEEE Transactions on Intelligent Vehicles 1 4 (2016) 325\u2013334.","DOI":"10.1109\/TIV.2017.2691158"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"crossref","unstructured":"Meng Wang Fangda Zhang Shannon\u00a0C Roberts et\u00a0al. 2024. A simulator study assessing the effectiveness of training and warning systems on drivers\u2019 response performance to vehicle cyberattacks. Accident Analysis & Prevention 203 (2024) 107644.","DOI":"10.1016\/j.aap.2024.107644"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC49329.2020.9164239"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"crossref","unstructured":"Yiyang Wang Neda Masoud and Anahita Khojandi. 2020. Real-time sensor anomaly detection and recovery in connected automated vehicle sensors. IEEE transactions on intelligent transportation systems 22 3 (2020) 1411\u20131421.","DOI":"10.1109\/TITS.2020.2970295"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"crossref","unstructured":"Rebecca Wiczorek and Dietrich Manzey. 2014. Supporting attention allocation in multitask environments: Effects of likelihood alarm systems on trust behavior and performance. Human factors 56 7 (2014) 1209\u20131221.","DOI":"10.1177\/0018720814528534"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"crossref","unstructured":"Philipp Wintersberger Anna-Katharina Frison Andreas Riener and Tamara\u00a0von Sawitzky. 2018. Fostering user acceptance and trust in fully automated vehicles: Evaluating the potential of augmented reality. PRESENCE: Virtual and Augmented Reality 27 1 (2018) 46\u201362.","DOI":"10.1162\/pres_a_00320"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00954"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"crossref","unstructured":"Zhen Yang Jun Ying Junjie Shen Yiheng Feng Qi\u00a0Alfred Chen Z\u00a0Morley Mao and Henry\u00a0X Liu. 2023. Anomaly detection against GPS spoofing attacks on connected and autonomous vehicles using learning from demonstration. IEEE Transactions on Intelligent Transportation Systems 24 9 (2023) 9462\u20139475.","DOI":"10.1109\/TITS.2023.3269029"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"crossref","unstructured":"Hanna Yun and Ji\u00a0Hyun Yang. 2020. Multimodal warning design for take-over request in conditionally automated driving. European transport research review 12 (2020) 1\u201311.","DOI":"10.1186\/s12544-020-00427-5"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"crossref","unstructured":"Aydin Zaboli Junho Hong Jaerock Kwon and John Moore. 2023. A Survey on Cyber-Physical Security of Autonomous Vehicles Using a Context Awareness Method. IEEE Access 11 (2023) 136706\u2013136725.","DOI":"10.1109\/ACCESS.2023.3338156"},{"key":"e_1_3_3_3_71_2","first-page":"1498","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting","volume":"63","author":"Zhang Fangda","year":"2019","unstructured":"Fangda Zhang, Jonathan Petit, and Shannon\u00a0C Roberts. 2019. A simulator study on drivers\u2019 response and perception towards vehicle cyberattacks. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting , Vol.\u00a063. SAGE Publications Sage CA: Los Angeles, CA, 1498\u20131502."},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Jindi Zhang Yang Lou Jianping Wang Kui Wu Kejie Lu and Xiaohua Jia. 2021. Evaluating adversarial attacks on driving safety in vision-based autonomous vehicles. IEEE Internet of Things Journal 9 5 (2021) 3443\u20133456.","DOI":"10.1109\/JIOT.2021.3099164"},{"key":"e_1_3_3_3_73_2","unstructured":"Katherine\u00a0S Zhang Claire Chen and Aiping Xiong. 2023. Human drivers\u2019 situation awareness of autonomous driving under physical-world attacks. Proceedings Inaugural International Symposium on Vehicle Security & Privacy (2023)."},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382986"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Zhibo Zhang Hussam Al\u00a0Hamadi Ernesto Damiani Chan\u00a0Yeob Yeun and Fatma Taher. 2022. Explainable artificial intelligence applications in cyber security: State-of-the-art in research. IEEE Access 10 (2022) 93104\u201393139.","DOI":"10.1109\/ACCESS.2022.3204051"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380422"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91467-1_13"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485377"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '25"},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3714301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:41:27Z","timestamp":1751607687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":77,"alternative-id":["10.1145\/3706598.3714301","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3714301","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}