{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T13:14:18Z","timestamp":1776431658530,"version":"3.51.2"},"reference-count":177,"publisher":"Association for Computing Machinery (ACM)","issue":"4","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62572421, 62002309, 62202414"],"award-info":[{"award-number":["62572421, 62002309, 62202414"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"crossref","award":["2025T180438"],"award-info":[{"award-number":["2025T180438"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Jiangsu \u201c333\u201d Project; the Open Project of Industry-Education Integration Innovation Center of Specialized Cybersecurity","award":["YZUCSC2025KF02"],"award-info":[{"award-number":["YZUCSC2025KF02"]}]},{"name":"Open Foundation of Yunnan Key Laboratory of Software Engineering","award":["2023SE201"],"award-info":[{"award-number":["2023SE201"]}]},{"name":"National Research Foundation, under its Investigatorship Grant","award":["NRF-NRFI08-2022-0002"],"award-info":[{"award-number":["NRF-NRFI08-2022-0002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,3,31]]},"abstract":"<jats:p>The remarkable achievements of Artificial Intelligence (AI) algorithms, particularly in Machine Learning (ML) and Deep Learning (DL), have fueled their extensive deployment across multiple sectors, including Software Engineering (SE). However, due to their black-box nature, these promising AI-driven SE models are still far from being deployed in practice. This lack of explainability poses unwanted risks for their applications in critical tasks, such as vulnerability detection, where decision-making transparency is of paramount importance. This article endeavors to elucidate this interdisciplinary domain by presenting a systematic literature review of approaches that aim to improve the explainability of AI models within the context of SE. The review canvasses work appearing in the most prominent SE and AI conferences and journals, and spans 108 articles across 23 unique SE tasks. Based on three key Research Questions (RQs), we aim to (1) summarize the SE tasks where XAI techniques have shown success to date; (2) classify and analyze different XAI techniques; and (3) investigate existing evaluation approaches. Based on our findings, we identified a set of challenges remaining to be addressed in existing studies, together with a set of guidelines highlighting potential opportunities we deemed appropriate and important for future work.<\/jats:p>","DOI":"10.1145\/3763230","type":"journal-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T03:22:13Z","timestamp":1756178533000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Systematic Literature Review on Explainability for ML\/DL-based Software Engineering"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3688-4437","authenticated-orcid":false,"given":"Sicong","family":"Cao","sequence":"first","affiliation":[{"name":"Yangzhou University","place":["Yangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5165-5080","authenticated-orcid":false,"given":"Xiaobing","family":"Sun","sequence":"additional","affiliation":[{"name":"Yangzhou University","place":["Yangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8190-5458","authenticated-orcid":false,"given":"Ratnadira","family":"Widyasari","sequence":"additional","affiliation":[{"name":"Singapore Management University","place":["Singapore, Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University","place":["Singapore, Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5432-651X","authenticated-orcid":false,"given":"Xiaoxue","family":"Wu","sequence":"additional","affiliation":[{"name":"Yangzhou University","place":["Yangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7267-4923","authenticated-orcid":false,"given":"Lili","family":"Bo","sequence":"additional","affiliation":[{"name":"Yangzhou University","place":["Yangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2143-5666","authenticated-orcid":false,"given":"Jiale","family":"Zhang","sequence":"additional","affiliation":[{"name":"Yangzhou University","place":["Yangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8500-9917","authenticated-orcid":false,"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"Yangzhou University","place":["Yangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8503-4063","authenticated-orcid":false,"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"Yangzhou University","place":["Yangzhou, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4753-8161","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Southern Queensland","place":["Toowoomba, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3704-4432","authenticated-orcid":false,"given":"Yixin","family":"Chen","sequence":"additional","affiliation":[{"name":"Washington University in St Louis","place":["St Louis, United States"]}]}],"member":"320","published-online":{"date-parts":[[2025,10,25]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC60848.2023.00033"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00017"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112159"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS62785.2024.00026"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12228"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639168"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695057"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236050"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3660814"},{"issue":"5","key":"e_1_3_2_14_2","first-page":"127:1\u2013127:33","article-title":"Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors","volume":"33","author":"Cheng Baijun","year":"2024","unstructured":"Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, and Haoyu Wang. 2024. Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors. ACMTransactions on Software Engineering and Methodology 33, 5 (2024), 127:1\u2013127:33.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Shyam R. Chidamber and Chris F. Kemerer. 1994. A metrics suite for object oriented design. IEEETransactions on Software Engineering 20 6 (1994) 476\u2013493.","DOI":"10.1109\/32.295895"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3652136"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468614"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510457.3513081"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.114.3.494"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2019.00025"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183399.3183424"},{"key":"e_1_3_2_22_2","volume-title":"Proceedings of the 34th Annual Conference on Neural Information Processing Systems (NeurIPS)","author":"Dang-Nhu Rapha\u00ebl","year":"2020","unstructured":"Rapha\u00ebl Dang-Nhu. 2020. PLANS: Neuro-symbolic program learning from videos. In Proceedings of the 34th Annual Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_23_2","first-page":"4171","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT)","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT). Association for Computational Linguistics, 4171\u20134186."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00056"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613864"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468603"},{"issue":"3","key":"e_1_3_2_27_2","first-page":"369","article-title":"Understanding machine learning software defect predictions","volume":"27","author":"Santos Geanderson Esteves dos","year":"2020","unstructured":"Geanderson Esteves dos Santos, Eduardo Figueiredo, Adriano Veloso, Markos Viggiato, and Nivio Ziviani. 2020. Understanding machine learning software defect predictions. Automated Software Engineering 27, 3 (2020), 369\u2013392.","journal-title":"Automated Software Engineering"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98131-4_1"},{"key":"e_1_3_2_29_2","unstructured":"Finale Doshi-Velez and Been Kim. 2018. Towards A Rigorous Science of Interpretable Machine Learning. 1\u201313. arXiv:1702.08608. Retrieved from https:\/\/arxiv.org\/abs\/1702.08608"},{"issue":"9","key":"e_1_3_2_30_2","first-page":"194:1\u2013194:33","article-title":"Explainable AI (XAI): Core ideas, techniques, and solutions","volume":"55","author":"Dwivedi Rudresh","year":"2023","unstructured":"Rudresh Dwivedi, Devam Dave, Het Naik, Smiti Singhal, Omer F. Rana, Pankesh Patel, Bin Qian, Zhenyu Wen, Tejal Shah, Graham Morgan, et\u00a0al. 2023. Explainable AI (XAI): Core ideas, techniques, and solutions. ACMComputing Surveys 55, 9 (2023), 194:1\u2013194:33.","journal-title":"ACMComputing Surveys"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454080"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1609\/aies.v7i1.31648"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1214\/07-AOAS148"},{"key":"e_1_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Michael Fu Van Nguyen Chakkrit Tantithamthavorn Trung Le and Dinh Phung. 2023. VulExplainer: A transformer-based hierarchical distillation for explaining vulnerability types. IEEETransactions on Software Engineering 49 10 (2023) 4550\u20134565.","DOI":"10.1109\/TSE.2023.3305244"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3158252"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528472"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107016"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC58990.2023.00026"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00135"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v38i3.2741"},{"issue":"5","key":"e_1_3_2_43_2","first-page":"93:1\u201393:42","article-title":"A survey of methods for explaining black box models","volume":"51","author":"Guidotti Riccardo","year":"2019","unstructured":"Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, and Dino Pedreschi. 2019. A survey of methods for explaining black box models. ACMComputing Surveys 51, 5 (2019), 93:1\u201393:42.","journal-title":"ACMComputing Surveys"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00026"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3639477.3639712"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598145"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3346954"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.111968"},{"key":"e_1_3_2_50_2","unstructured":"Hamel Husain Ho-Hsiang Wu Tiferet Gazit Miltiadis Allamanis and Marc Brockschmidt. 2019. Codesearchnet challenge: Evaluating the state of semantic code search. 1\u20136. arXiv:1909.09436. Retrieved from https:\/\/arxiv.org\/abs\/1909.09436"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00107"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3214859"},{"key":"e_1_3_2_53_2","first-page":"432","volume-title":"Proceedings of the 18th IEEE\/ACM International Conference on Mining Software Repositories (MSR)","author":"Jiarpakdee Jirayus","year":"2021","unstructured":"Jirayus Jiarpakdee, Chakkrit Tantithamthavorn, and John C. Grundy. 2021. Practitioners\u2019 perceptions of the goals and visual explanations of defect prediction models. In Proceedings of the 18th IEEE\/ACM International Conference on Mining Software Repositories (MSR). IEEE, 432\u2013443."},{"key":"e_1_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Jirayus Jiarpakdee Chakkrit Kla Tantithamthavorn Hoa Khanh Dam and John C. Grundy. 2022. An empirical study of model-agnostic techniques for defect prediction models. IEEETransactions on Software Engineering 48 2 (2022) 166\u2013185.","DOI":"10.1109\/TSE.2020.2982385"},{"issue":"4","key":"e_1_3_2_55_2","first-page":"93:1\u201393:32","article-title":"Test generation strategies for building failure models and explaining spurious failures","volume":"33","author":"Jodat Baharin Aliashrafi","year":"2024","unstructured":"Baharin Aliashrafi Jodat, Abhishek Chandar, Shiva Nejati, and Mehrdad Sabetzadeh. 2024. Test generation strategies for building failure models and explaining spurious failures. ACMTransactions on Software Engineering and Methodology 33, 4 (2024), 93:1\u201393:32.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409687"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3660771"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS51102.2020.00068"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3660807"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-024-10502-3"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473931"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00026"},{"key":"e_1_3_2_63_2","volume-title":"Proceedings of the 1st Neural Information Processing Systems Track on Datasets and Benchmarks (NeurIPS Datasets and Benchmarks)","author":"Li Mingjie","year":"2021","unstructured":"Mingjie Li, Wenjia Cai, Rui Liu, Yuetian Weng, Xiaoyun Zhao, Cong Wang, Xin Chen, Zhong Liu, Caineng Pan, Mengke Li, et\u00a0al. 2021. FFA-IR: Towards an explainable and reliable medical report generation benchmark. In Proceedings of the 1st Neural Information Processing Systems Track on Datasets and Benchmarks (NeurIPS Datasets and Benchmarks)."},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00053"},{"issue":"2","key":"e_1_3_2_65_2","first-page":"13:1\u201313:24","article-title":"Predicting node failures in an ultra-large-scale cloud computing platform: An aiops solution","volume":"29","author":"Li Yangguang","year":"2020","unstructured":"Yangguang Li, Zhen Ming (Jack) Jiang, Heng Li, Ahmed E. Hassan, Cheng He, Ruirui Huang, Zhengda Zeng, Mian Wang, and Pinan Chen. 2020. Predicting node failures in an ultra-large-scale cloud computing platform: An aiops solution. ACMTransactions on Software Engineering and Methodology 29, 2 (2020), 13:1\u201313:24.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00164"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549092"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695024"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3073920"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3018481"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58846.2023.00023"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE55969.2022.00026"},{"issue":"5","key":"e_1_3_2_74_2","first-page":"126:1\u2013126:26","article-title":"On the reliability and explainability of language models for program generation","volume":"33","author":"Liu Yue","year":"2024","unstructured":"Yue Liu, Chakkrit Tantithamthavorn, Yonghui Liu, and Li Li. 2024. On the reliability and explainability of language models for program generation. ACMTransactions on Software Engineering and Methodology 33, 5 (2024), 126:1\u2013126:26.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643916.3644408"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/379"},{"key":"e_1_3_2_77_2","volume-title":"Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021","author":"Lu Shuai","year":"2021","unstructured":"Shuai Lu, Daya Guo, Shuo Ren, Junjie Huang, Alexey Svyatkovskiy, Ambrosio Blanco, Colin B. Clement, Dawn Drain, Daxin Jiang, Duyu Tang, et\u00a0al. 2021. CodeXGLUE: A machine learning benchmark dataset for code understanding and generation. In Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021."},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0138-9"},{"key":"e_1_3_2_79_2","first-page":"4765","volume-title":"Proceedings of the 31st Annual Conference on Neural Information Processing Systems (NeurIPS)","author":"Lundberg Scott M.","year":"2017","unstructured":"Scott M. Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. In Proceedings of the 31st Annual Conference on Neural Information Processing Systems (NeurIPS). 4765\u20134774."},{"issue":"1","key":"e_1_3_2_80_2","first-page":"16:1\u201316:38","article-title":"Towards a Consistent Interpretation of AIOps Models","volume":"31","author":"Lyu Yingzhe","year":"2022","unstructured":"Yingzhe Lyu, Gopi Krishnan Rajbahadur, Dayi Lin, Boyuan Chen, and Zhen Ming (Jack) Jiang. 2022. Towards a Consistent Interpretation of AIOps Models. ACMTransactions on Software Engineering and Methodology 31, 1 (2022), 16:1\u201316:38.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE55347.2025.00129"},{"key":"e_1_3_2_82_2","doi-asserted-by":"crossref","unstructured":"Wei Ma Shangqing Liu Mengjie Zhao Xiaofei Xie Wenhan Wang Qiang Hu Jie Zhang and Yang Liu. 2024. Unveiling code pre-trained models: Investigating syntax and semantics capacities. ACMTransactions on Software Engineering and Methodology 33 7 (2024) 169:1\u2013169:29.","DOI":"10.1145\/3664606"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00063"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00073"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.5555\/3600270.3601532"},{"key":"e_1_3_2_86_2","unstructured":"Ahmad Haji Mohammadkhani Nitin Sai Bommi Mariem Daboussi Onkar Sabnis Chakkrit Tantithamthavorn and Hadi Hemmati. 2023. A systematic literature review of explainable AI for software engineering. 1\u201323. arXiv:2302.06065. Retrieved from https:\/\/arxiv.org\/abs\/2302.06065"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.11.008"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9638-1"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1201\/b17511"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00022"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3379943"},{"issue":"13","key":"e_1_3_2_92_2","first-page":"295:1\u2013295:42","article-title":"From anecdotal evidence to quantitative evaluation methods: A systematic review on evaluating explainable AI","volume":"55","author":"Nauta Meike","year":"2023","unstructured":"Meike Nauta, Jan Trienes, Shreyasi Pathak, Elisa Nguyen, Michelle Peters, Yasmin Schmitt, J\u00f6rg Schl\u00f6tterer, Maurice van Keulen, and Christin Seifert. 2023. From anecdotal evidence to quantitative evaluation methods: A systematic review on evaluating explainable AI. ACMComputing Surveys 55, 13s (2023), 295:1\u2013295:42.","journal-title":"ACMComputing Surveys"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/3622874"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616358"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/RE59067.2024.00038"},{"key":"e_1_3_2_96_2","volume-title":"Proceedings of the SEI Educator\u2019s Workshop","author":"Ozkaya Ipek","year":"2019","unstructured":"Ipek Ozkaya and James Ivers. 2019. AI for software engineering. In Proceedings of the SEI Educator\u2019s Workshop."},{"key":"e_1_3_2_97_2","unstructured":"David N. Palacio Dipin Khati Daniel Rodr\u00edguez-C\u00e1rdenas Alejandro Velasco and Denys Poshyvanyk. 2025. On explaining (large) language models for code using global code-based explanations. 1\u201312. arXiv:2503.16771. Retrieved from https:\/\/arxiv.org\/abs\/2503.16771"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3445338"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678712"},{"issue":"4","key":"e_1_3_2_100_2","first-page":"85:1\u201385:41","article-title":"Explainable deep learning methods in medical image classification: A survey","volume":"56","author":"Patr\u00edcio Cristiano","year":"2023","unstructured":"Cristiano Patr\u00edcio, Jo\u00e3o C. Neve, and Lu\u00eds F. Teixeira. 2023. Explainable deep learning methods in medical image classification: A survey. ACMComputing Surveys 56, 4 (2023), 85:1\u201385:41.","journal-title":"ACMComputing Surveys"},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387457"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3062968"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678763"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468539"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3070559"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3694984"},{"issue":"3","key":"e_1_3_2_108_2","first-page":"15","article-title":"Neural network-based detection of self-admitted technical debt: From performance to explainability","volume":"28","author":"Ren Xiaoxue","year":"2019","unstructured":"Xiaoxue Ren, Zhenchang Xing, Xin Xia, David Lo, Xinyu Wang, and John Grundy. 2019. Neural network-based detection of self-admitted technical debt: From performance to explainability. ACMTransactions on Software Engineering and Methodology 28, 3 (2019), 15.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_109_2","first-page":"1135","volume-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)","author":"Ribeiro Marco T\u00falio","year":"2016","unstructured":"Marco T\u00falio Ribeiro, Sameer Singh, and Carlos Guestrin. 2016. \u201cWhy should i trust you?\u201d: Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). ACM, 1135\u20131144."},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58846.2023.00040"},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.5a8a3a3d"},{"key":"e_1_3_2_113_2","doi-asserted-by":"crossref","unstructured":"Nayan B. Ruparelia. 2010. Software development lifecycle models. ACMSIGSOFT Software Engineering Notes 35 3 (2010) 8\u201313.","DOI":"10.1145\/1764810.1764814"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM56168.2023.10304855"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-024-10469-1"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01228-7"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9228-6"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC60848.2023.00024"},{"key":"e_1_3_2_119_2","first-page":"3145","volume-title":"Proceedings of the 34th International Conference on Machine Learning (ICML)","author":"Shrikumar Avanti","year":"2017","unstructured":"Avanti Shrikumar, Peyton Greenside, and Anshul Kundaje. 2017. Learning important features through propagating activation differences. In Proceedings of the 34th International Conference on Machine Learning (ICML). PMLR, 3145\u20133153."},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534639"},{"issue":"1","key":"e_1_3_2_121_2","first-page":"1064","article-title":"explAIner: A visual analytics framework for interactive and explainable machine learning","volume":"26","author":"Spinner Thilo","year":"2020","unstructured":"Thilo Spinner, Udo Schlegel, Hanna Sch\u00e4fer, and Mennatallah El-Assady. 2020. explAIner: A visual analytics framework for interactive and explainable machine learning. IEEETransactions on Visualization and Computer Graphics 26, 1 (2020), 1064\u20131074.","journal-title":"IEEETransactions on Visualization and Computer Graphics"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/21.286385"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2018-072"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00089"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616309"},{"key":"e_1_3_2_126_2","article-title":"Interpretable failure localization for microservice systems based on graph autoencoder","author":"Sun Yongqian","year":"2024","unstructured":"Yongqian Sun, Zihan Lin, Binpeng Shi, Shenglin Zhang, Shiyu Ma, Pengxiang Jin, Zhenyu Zhong, Lemeng Pan, Yicheng Guo, and Dan Pei. 2024. Interpretable failure localization for microservice systems based on graph autoencoder. ACMTransactions on Software Engineering and Methodology 34, 2 (2025), 52:1\u201352:28.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_127_2","first-page":"3319","volume-title":"Proceedings of the 34th International Conference on Machine Learning (ICML)","author":"Sundararajan Mukund","year":"2017","unstructured":"Mukund Sundararajan, Ankur Taly, and Qiqi Yan. 2017. Axiomatic attribution for deep networks. In Proceedings of the 34th International Conference on Machine Learning (ICML). PMLR, 3319\u20133328."},{"issue":"6","key":"e_1_3_2_128_2","first-page":"145:1\u2013145:40","article-title":"Incorporating signal awareness in source code modeling: An application to vulnerability detection","volume":"32","author":"Suneja Sahil","year":"2023","unstructured":"Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, and Udayan Khurana. 2023. Incorporating signal awareness in source code modeling: An application to vulnerability detection. ACMTransactions on Software Engineering and Methodology 32, 6 (2023), 145:1\u2013145:40.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00091"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3422427"},{"key":"e_1_3_2_131_2","first-page":"900","volume-title":"Proceedings of the 19th National Conference on Artificial Intelligence, 16th Conference on Innovative Applications of Artificial Intelligence (AAAI\/IAAI)","author":"Lent Michael van","year":"2004","unstructured":"Michael van Lent, William Fisher, and Michael Mancuso. 2004. An explainable artificial intelligence system for small-unit tactical behavior. In Proceedings of the 19th National Conference on Artificial Intelligence, 16th Conference on Innovative Applications of Artificial Intelligence (AAAI\/IAAI). AAAI\/ The MIT, 900\u2013907."},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.1145\/3639476.3639768"},{"key":"e_1_3_2_133_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations (ICLR)","author":"Velickovic Petar","year":"2018","unstructured":"Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph attention networks. In Proceedings of the 6th International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00012"},{"key":"e_1_3_2_135_2","first-page":"2377","volume-title":"Proceedings of the 44th IEEE\/ACM International Conference on Software Engineering (ICSE)","author":"Wan Yao","year":"2022","unstructured":"Yao Wan, Wei Zhao, Hongyu Zhang, Yulei Sui, Guandong Xu, and Hai Jin. 2022. What do they capture? - A structural analysis of pre-trained language models for source code. In Proceedings of the 44th IEEE\/ACM International Conference on Software Engineering (ICSE). ACM, 2377\u20132388."},{"issue":"6","key":"e_1_3_2_136_2","first-page":"140:1\u2013140:28","article-title":"XCoS: Explainable code search based on query scoping and knowledge graph","volume":"32","author":"Wang Chong","year":"2023","unstructured":"Chong Wang, Xin Peng, Zhenchang Xing, Yue Zhang, Mingwei Liu, Rong Luo, and Xiujie Meng. 2023. XCoS: Explainable code search based on query scoping and knowledge graph. ACMTransactions on Software Engineering and Methodology 32, 6 (2023), 140:1\u2013140:28.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_137_2","doi-asserted-by":"crossref","unstructured":"Haoye Wang Zhipeng Gao Xing Hu David Lo John Grundy and Xinyu Wang. 2024. Just-in-time todo-missed commits detection. IEEETransactions on Software Engineering 50 11 (2024) 2732\u20132752.","DOI":"10.1109\/TSE.2024.3405005"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00018"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416583"},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1145\/3622826"},{"key":"e_1_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3023177"},{"issue":"4","key":"e_1_3_2_142_2","first-page":"20:1\u201320:38","article-title":"A similarity measure for indefinite rankings","volume":"28","author":"Webber William","year":"2010","unstructured":"William Webber, Alistair Moffat, and Justin Zobel. 2010. A similarity measure for indefinite rankings. ACMTransactions on Information Systems 28, 4 (2010), 20:1\u201320:38.","journal-title":"ACMTransactions on Information Systems"},{"key":"e_1_3_2_143_2","first-page":"7","volume-title":"Proceedings of the 19th ACM International Conference on Intelligent Virtual Agents (IVA)","author":"Weitz Katharina","year":"2019","unstructured":"Katharina Weitz, Dominik Schiller, Ruben Schlagowski, Tobias Huber, and Elisabeth Andr\u00e9. 2019. \u201cDo you trust me?\u201d: Increasing user-trust by integrating virtual agents in explainable AI interaction design. In Proceedings of the 19th ACM International Conference on Intelligent Virtual Agents (IVA). ACM, 7\u20139."},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER60148.2024.00064"},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527902"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-010-9190-2"},{"issue":"2","key":"e_1_3_2_148_2","first-page":"21:1\u201321:29","article-title":"Why an android app is classified as malware: Toward malware classification interpretation","volume":"30","author":"Wu Bozhi","year":"2021","unstructured":"Bozhi Wu, Sen Chen, Cuiyun Gao, Lingling Fan, Yang Liu, Weiping Wen, and Michael R. Lyu. 2021. Why an android app is classified as malware: Toward malware classification interpretation. ACMTransactions on Software Engineering and Methodology 30, 2 (2021), 21:1\u201321:29.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680323"},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616349"},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3117590"},{"key":"e_1_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112182"},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00114"},{"issue":"5","key":"e_1_3_2_154_2","first-page":"115:1\u2013115:40","article-title":"Toward interpretable graph tensor convolution neural network for code semantics embedding","volume":"32","author":"Yang Jia","year":"2023","unstructured":"Jia Yang, Cai Fu, Fengyang Deng, Ming Wen, Xiaowei Guo, and Chuanhao Wan. 2023. Toward interpretable graph tensor convolution neural network for code semantics embedding. ACMTransactions on Software Engineering and Methodology 32, 5 (2023), 115:1\u2013115:40.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616245"},{"key":"e_1_3_2_156_2","unstructured":"Zhou Yang Zhensu Sun Terry Zhuo Yue Premkumar Devanbu and David Lo. 2024. Robustness security privacy explainability efficiency and usability of large language models for code. 1\u201335. arXiv:2403.07506. Retrieved from https:\/\/arxiv.org\/abs\/2403.07506"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663827"},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00075"},{"key":"e_1_3_2_159_2","doi-asserted-by":"crossref","unstructured":"Wei Jie Yeo Wihan van der Heever Rui Mao Erik Cambria Ranjan Satapathy and Gianmarco Mengaldo. 2023. A comprehensive review on financial explainable AI. Artificial Intelligence Review 58 6 (2025) 189.","DOI":"10.1007\/s10462-024-11077-7"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC51774.2021.00127"},{"key":"e_1_3_2_161_2","first-page":"9240","volume-title":"Proceedings of the 33rd Annual Conference on Neural Information Processing Systems (NeurIPS)","author":"Ying Zhitao","year":"2019","unstructured":"Zhitao Ying, Dylan Bourgeois, Jiaxuan You, Marinka Zitnik, and Jure Leskovec. 2019. GNNExplainer: Generating explanations for graph neural networks. In Proceedings of the 33rd Annual Conference on Neural Information Processing Systems (NeurIPS). 9240\u20139251."},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510149"},{"issue":"7","key":"e_1_3_2_163_2","first-page":"187:1\u2013187:31","article-title":"A formal explainer for just-in-time defect predictions","volume":"33","author":"Yu Jinqiang","year":"2024","unstructured":"Jinqiang Yu, Michael Fu, Alexey Ignatiev, Chakkrit Tantithamthavorn, and Peter Stuckey. 2024. A formal explainer for just-in-time defect predictions. ACMTransactions on Software Engineering and Methodology 33, 7 (2024), 187:1\u2013187:31.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_164_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP58684.2023.00029"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.010"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00045"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3354049"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3384846"},{"key":"e_1_3_2_170_2","article-title":"Revisiting sentiment analysis for software engineering in the era of large language models","author":"Zhang Ting","year":"2025","unstructured":"Ting Zhang, Ivana Clairine Irsan, Ferdian Thung, and David Lo. 2025. Revisiting sentiment analysis for software engineering in the era of large language models. ACMTransactions on Software Engineering and Methodology 34, 3 (2025), 60:1\u201360:30.","journal-title":"ACMTransactions on Software Engineering and Methodology"},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560428"},{"issue":"2","key":"e_1_3_2_172_2","first-page":"20:1\u201320:38","article-title":"Explainability for large language models: A survey","volume":"15","author":"Zhao Haiyan","year":"2024","unstructured":"Haiyan Zhao, Hanjie Chen, Fan Yang, Ninghao Liu, Huiqi Deng, Hengyi Cai, Shuaiqiang Wang, Dawei Yin, and Mengnan Du. 2024. Explainability for large language models: A survey. ACMTransactions on Intelligent Systems and Technology 15, 2 (2024), 20:1\u201320:38.","journal-title":"ACMTransactions on Intelligent Systems and Technology"},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409672"},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473933"},{"key":"e_1_3_2_175_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111245"},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00214"},{"key":"e_1_3_2_177_2","first-page":"10197","volume-title":"Proceedings of the 33rd Annual Conference on Neural Information Processing Systems (NeurIPS)","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou, Shangqing Liu, Jing Kai Siow, Xiaoning Du, and Yang Liu. 2019. Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In Proceedings of the 33rd Annual Conference on Neural Information Processing Systems (NeurIPS). 10197\u201310207."},{"issue":"2","key":"e_1_3_2_178_2","first-page":"23:1\u201323:31","article-title":"Interpreting deep learning-based vulnerability detector predictions based on heuristic searching","volume":"30","author":"Zou Deqing","year":"2021","unstructured":"Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, and Hengkai Ye. 2021. Interpreting deep learning-based vulnerability detector predictions based on heuristic searching. ACMTransactions on Software Engineering and Methodology 30, 2 (2021), 23:1\u201323:31.","journal-title":"ACMTransactions on Software Engineering and Methodology"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3763230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:15:21Z","timestamp":1761401721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3763230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,25]]},"references-count":177,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,3,31]]}},"alternative-id":["10.1145\/3763230"],"URL":"https:\/\/doi.org\/10.1145\/3763230","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,25]]},"assertion":[{"value":"2024-01-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}