{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T20:07:49Z","timestamp":1775074069081,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Portuguese Foundation for Science and Technology","award":["POCI-01-0247-FEDER-045915)"],"award-info":[{"award-number":["POCI-01-0247-FEDER-045915)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467166","type":"proceedings-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T06:13:10Z","timestamp":1628748790000},"page":"2565-2573","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":82,"title":["TimeSHAP: Explaining Recurrent Models through Sequence Perturbations"],"prefix":"10.1145","author":[{"given":"Jo\u00e3o","family":"Bento","sequence":"first","affiliation":[{"name":"Feedzai, Lisboa, Portugal"}]},{"given":"Pedro","family":"Saleiro","sequence":"additional","affiliation":[{"name":"Feedzai, Lisboa, Portugal"}]},{"given":"Andr\u00e9 F.","family":"Cruz","sequence":"additional","affiliation":[{"name":"Feedzai, Lisboa, Portugal"}]},{"given":"M\u00e1rio A.T.","family":"Figueiredo","sequence":"additional","affiliation":[{"name":"Instituto Superior T\u00e9cnico, University of Lisbon, Lisboa, Portugal"}]},{"given":"Pedro","family":"Bizarro","sequence":"additional","affiliation":[{"name":"Feedzai, Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps. CoRR, abs\/1312.6034","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan , Andrea Vedaldi , and Andrew Zisserman . Deep inside convolutional networks: Visualising image classification models and saliency maps. CoRR, abs\/1312.6034 , 2014 . Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. Deep inside convolutional networks: Visualising image classification models and saliency maps. CoRR, abs\/1312.6034, 2014."},{"key":"e_1_3_2_2_2_1","volume-title":"Extraction of salient sentences from labelled documents. arXiv preprint arXiv:1412.6815","author":"Denil Misha","year":"2014","unstructured":"Misha Denil , Alban Demiraj , and Nando De Freitas . Extraction of salient sentences from labelled documents. arXiv preprint arXiv:1412.6815 , 2014 . Misha Denil, Alban Demiraj, and Nando De Freitas. Extraction of salient sentences from labelled documents. arXiv preprint arXiv:1412.6815, 2014."},{"key":"e_1_3_2_2_3_1","volume-title":"Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220","author":"Li Jiwei","year":"2016","unstructured":"Jiwei Li , Will Monroe , and Dan Jurafsky . Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220 , 2016 . Jiwei Li, Will Monroe, and Dan Jurafsky. Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220, 2016."},{"issue":"211","key":"e_1_3_2_2_4_1","first-page":"222","article-title":"Explaining nonlinear classification decisions with deep Taylor decomposition","volume":"65","author":"Montavon Gr\u00e9goire","year":"2017","unstructured":"Gr\u00e9goire Montavon , Sebastian Lapuschkin , Alexander Binder , Wojciech Samek , and Klaus-Robert M\u00fcller . Explaining nonlinear classification decisions with deep Taylor decomposition . Pattern Recognition , 65 : 211 -- 222 , 2017 . Gr\u00e9goire Montavon, Sebastian Lapuschkin, Alexander Binder, Wojciech Samek, and Klaus-Robert M\u00fcller. Explaining nonlinear classification decisions with deep Taylor decomposition. Pattern Recognition, 65:211 -- 222, 2017.","journal-title":"Pattern Recognition"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"e_1_3_2_2_6_1","first-page":"3145","volume-title":"Proc. of the 34th Int. Conf. on Machine Learning, volume 70 of Proc. of Machine Learning Research","author":"Shrikumar Avanti","year":"2017","unstructured":"Avanti Shrikumar , Peyton Greenside , and Anshul Kundaje . Learning important features through propagating activation differences. In Doina Precup and Yee Whye Teh, editors , Proc. of the 34th Int. Conf. on Machine Learning, volume 70 of Proc. of Machine Learning Research , pages 3145 -- 3153 , Sydney, Australia , 2017 . Avanti Shrikumar, Peyton Greenside, and Anshul Kundaje. Learning important features through propagating activation differences. In Doina Precup and Yee Whye Teh, editors, Proc. of the 34th Int. Conf. on Machine Learning, volume 70 of Proc. of Machine Learning Research, pages 3145--3153, Sydney, Australia, 2017."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744158"},{"key":"e_1_3_2_2_8_1","volume-title":"5th Int. Conf. on Learning Representations, (ICLR)","author":"James Murdoch W.","year":"2017","unstructured":"W. James Murdoch and Arthur Szlam . Automatic rule extraction from long short term memory networks . 5th Int. Conf. on Learning Representations, (ICLR) , 2017 . W. James Murdoch and Arthur Szlam. Automatic rule extraction from long short term memory networks. 5th Int. Conf. on Learning Representations, (ICLR), 2017."},{"key":"e_1_3_2_2_9_1","first-page":"818","volume-title":"European Conf. on Computer Vision -- (ECCV) 2014","author":"Matthew","year":"2014","unstructured":"Matthew D. Zeiler and Rob Fergus. Visualizing and understanding convolutional networks. In David Fleet, Tomas Pajdla, Bernt Schiele, and Tinne Tuytelaars, editors , European Conf. on Computer Vision -- (ECCV) 2014 , pages 818 -- 833 , 2014 . Matthew D. Zeiler and Rob Fergus. Visualizing and understanding convolutional networks. In David Fleet, Tomas Pajdla, Bernt Schiele, and Tinne Tuytelaars, editors, European Conf. on Computer Vision -- (ECCV) 2014, pages 818--833, 2014."},{"key":"e_1_3_2_2_10_1","first-page":"4768","volume-title":"Proc. of the 31st Int. Conf. on Neural Information Processing Systems, NIPS'17","author":"Scott","year":"2017","unstructured":"Scott M. Lundberg and Su-In Lee. A unified approach to interpreting model predictions . In Proc. of the 31st Int. Conf. on Neural Information Processing Systems, NIPS'17 , page 4768 -- 4777 , 2017 . Scott M. Lundberg and Su-In Lee. A unified approach to interpreting model predictions. In Proc. of the 31st Int. Conf. on Neural Information Processing Systems, NIPS'17, page 4768--4777, 2017."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"e_1_3_2_2_12_1","volume-title":"Javelin Strategy & Report","author":"Tedder Krista","year":"2020","unstructured":"Krista Tedder and John Buzzar . Identity fraud study: Genesis of the identity fraud crisis . Javelin Strategy & Report , 2020 . Krista Tedder and John Buzzar. Identity fraud study: Genesis of the identity fraud crisis. Javelin Strategy & Report, 2020."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4012"},{"key":"e_1_3_2_2_15_1","volume-title":"ICML Workshop on Human Interpretability in Machine Learning (WHI 2016","author":"Ribeiro Marco Tulio","year":"2016","unstructured":"Marco Tulio Ribeiro , Sameer Singh , and Carlos Guestrin . Model-agnostic interpretability of machine learning . ICML Workshop on Human Interpretability in Machine Learning (WHI 2016 ), jun 2016 . Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. Model-agnostic interpretability of machine learning. ICML Workshop on Human Interpretability in Machine Learning (WHI 2016), jun 2016."},{"key":"e_1_3_2_2_16_1","first-page":"10814","volume-title":"H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc","author":"Ismail Aya Abdelsalam","year":"2019","unstructured":"Aya Abdelsalam Ismail , Mohamed Gunady , Luiz Pessoa , Hector Corrada Bravo, and Soheil Feizi. Input-cell attention reduces vanishing saliency of recurrent neural networks . In H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc , E. Fox, and R. Garnett, editors, Advances in Neural Information Processing Systems 32, pages 10814 -- 10824 . 2019 . Aya Abdelsalam Ismail, Mohamed Gunady, Luiz Pessoa, Hector Corrada Bravo, and Soheil Feizi. Input-cell attention reduces vanishing saliency of recurrent neural networks. In H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett, editors, Advances in Neural Information Processing Systems 32, pages 10814--10824. 2019."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875677"},{"key":"e_1_3_2_2_18_1","first-page":"3504","volume-title":"Jimeng Sun, Joshua Kulas, Andy Schuetz, and Walter Stewart. Retain: An interpretable predictive model for healthcare using reverse time attention mechanism","author":"Choi Edward","year":"2016","unstructured":"Edward Choi , Mohammad Taha Bahadori , Jimeng Sun, Joshua Kulas, Andy Schuetz, and Walter Stewart. Retain: An interpretable predictive model for healthcare using reverse time attention mechanism . In D. D. Lee, M. Sugiyama, U. Von. Luxburg, I. Guyon, and R. Garnett, editors, Advances in Neural Information Processing Systems 29, pages 3504 -- 3512 . 2016 . Edward Choi, Mohammad Taha Bahadori, Jimeng Sun, Joshua Kulas, Andy Schuetz, and Walter Stewart. Retain: An interpretable predictive model for healthcare using reverse time attention mechanism. In D. D. Lee, M. Sugiyama, U. Von. Luxburg, I. Guyon, and R. Garnett, editors, Advances in Neural Information Processing Systems 29, pages 3504--3512. 2016."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3107411.3107445"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1282"},{"key":"e_1_3_2_2_21_1","volume-title":"Proc. of the 2019 Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","volume":"1","author":"Jain Sarthak","year":"2019","unstructured":"Sarthak Jain and Byron C. Wallace . Attention is not explanation . In Proc. of the 2019 Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies , Volume 1 (Long and Short Papers), pages 3543- -3556, June 2019 . Sarthak Jain and Byron C. Wallace. Attention is not explanation. In Proc. of the 2019 Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), pages 3543--3556, June 2019."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1002"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305890.3306024"},{"key":"e_1_3_2_2_24_1","volume-title":"Technische Universit\"at M\u00fcnchen, 91(1)","author":"Hochreiter Sepp","year":"1991","unstructured":"Sepp Hochreiter . Untersuchungen zu dynamischen neuronalen netzen. Diploma , Technische Universit\"at M\u00fcnchen, 91(1) , 1991 . Sepp Hochreiter. Untersuchungen zu dynamischen neuronalen netzen. Diploma, Technische Universit\"at M\u00fcnchen, 91(1), 1991."},{"key":"e_1_3_2_2_25_1","volume-title":"August","author":"Guidotti Riccardo","year":"2018","unstructured":"Riccardo Guidotti , Anna Monreale , Salvatore Ruggieri , Franco Turini , Fosca Giannotti , and Dino Pedreschi . A survey of methods for explaining black box models. ACM Comput. Surv., 51(5) , August 2018 . Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, and Dino Pedreschi. A survey of methods for explaining black box models. ACM Comput. Surv., 51(5), August 2018."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01769885"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0679-x"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2021.103672"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.35"},{"key":"e_1_3_2_2_31_1","volume-title":"A value for n-person games. Contributions to the Theory of Games, 2(28):307--317","author":"Shapley Lloyd S","year":"1953","unstructured":"Lloyd S Shapley . A value for n-person games. Contributions to the Theory of Games, 2(28):307--317 , 1953 . Lloyd S Shapley. A value for n-person games. Contributions to the Theory of Games, 2(28):307--317, 1953."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298725"},{"issue":"90","key":"e_1_3_2_2_33_1","first-page":"113","article-title":"Fraud detection system: A survey","volume":"68","author":"Abdallah Aisha","year":"2016","unstructured":"Aisha Abdallah , Mohd Aizaini Maarof , and Anazida Zainal . Fraud detection system: A survey . Journal of Network and Computer Applications , 68 : 90 -- 113 , 2016 . Aisha Abdallah, Mohd Aizaini Maarof, and Anazida Zainal. Fraud detection system: A survey. Journal of Network and Computer Applications, 68:90 -- 113, 2016.","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_3_2_2_34_1","volume-title":"Jun","author":"Federal Bureau of Investigation.","year":"2016","unstructured":"Federal Bureau of Investigation. Credit card fraud. https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/credit-card-fraud , Jun 2016 . Accessed : 2021-01-09. Federal Bureau of Investigation. Credit card fraud. https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/credit-card-fraud, Jun 2016. Accessed: 2021-01-09."},{"key":"e_1_3_2_2_35_1","first-page":"155","volume-title":"Coefficient of Variation","author":"Brown Charles E.","year":"1998","unstructured":"Charles E. Brown . Coefficient of Variation , pages 155 -- 157 . 1998 . Charles E. Brown. Coefficient of Variation, pages 155--157. 1998."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.1997.tb00827.x"}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event Singapore","acronym":"KDD '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467166","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:27Z","timestamp":1750191507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":36,"alternative-id":["10.1145\/3447548.3467166","10.1145\/3447548"],"URL":"https:\/\/doi.org\/10.1145\/3447548.3467166","relation":{},"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"2021-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}