{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T05:06:23Z","timestamp":1774933583645,"version":"3.50.1"},"reference-count":35,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062080","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:13:06Z","timestamp":1745208786000},"page":"5781-5809","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["A Study on the Inter-Pretability of Network Attack Prediction Models Based on\nLight Gradient Boosting Machine (LGBM) and SHapley Additive exPlanations (SHAP)"],"prefix":"10.32604","volume":"83","author":[{"given":"Shuqin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zihao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Su","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"6","article-title":"Building AI applications: yesterday, today, and tomorrow","volume":"38","author":"Smith","year":"2017","journal-title":"AI Mag"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1007\/s13347-021-00477-0","article-title":"Transparency and the black box problem: why we do not trust AI","volume":"34","author":"Von Eschenbach","year":"2021","journal-title":"Philos Technol"},{"key":"ref3","first-page":"168","article-title":"Enhancing transparency and understanding in AI decision-making processes","volume":"8","author":"Pillai","year":"2024","journal-title":"Iconic Res Eng J"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"10163","DOI":"10.1109\/ACCESS.2024.3431437","article-title":"Explainable artificial intelligence for autonomous driving: a comprehensive overview and field guide for future research directions","volume":"12","author":"Atakishiyev","year":"2024","journal-title":"IEEE Access"},{"key":"ref5","article-title":"Applications of Artificial Intelligence (AI) in healthcare: a review","author":"Shaheen","year":"2021","journal-title":"ScienceOpen Preprints"},{"key":"ref6","first-page":"361","author":"van Ettekoven","year":"2024","journal-title":"Research handbook in data science and law"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"101534","DOI":"10.1016\/j.segan.2024.101534","article-title":"Cluster partition-fuzzy broad learning-based fast detection and localization framework for false data injection attack in smart distribution networks","volume":"40","author":"An","year":"2024","journal-title":"Sustain Energy Grids Netw"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"81","DOI":"10.17148\/IJARCCE.2022.11912","article-title":"The impact and limitations of artificial intelligence in cybersecurity: a literature review","volume":"11","author":"Ansari","year":"2022","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1526221","DOI":"10.3389\/frai.2025.1526221","article-title":"A systematic review on the integration of explainable artificial intelligence in intrusion detection systems to enhancing transparency and interpretability in cybersecurity","volume":"8","author":"Mohale","year":"2025","journal-title":"Front Artif Intell"},{"key":"ref10","series-title":"Proceedings of the National Conference on Artificial Intelligence","article-title":"An explainable artificial intelligence system for small-unit tactical behavior","author":"Van Lent","year":"2004 Jul 25\u201329"},{"key":"ref11","first-page":"44","article-title":"DARPA\u2019s explainable artificial intelligence (XAI) program","volume":"40","author":"Gunning","year":"2019","journal-title":"AI Mag"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.jnca.2013.08.001","article-title":"Network attacks: Taxonomy, tools and systems","volume":"40","author":"Hoque","year":"2014","journal-title":"J Netw Comput Appl"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1007\/s11192-019-03222-9","article-title":"Investigating the applications of artificial intelligence in cyber security","volume":"121","author":"Abbas","year":"2019","journal-title":"Scientometrics"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1109\/COMST.2018.2871866","article-title":"Survey of attack projection, prediction, and forecasting in cyber security","volume":"21","author":"Hus\u00e1k","year":"2018","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1007\/s12243-022-00926-7","article-title":"Explainable artificial intelligence for cybersecurity: a literature survey","volume":"77","author":"Charmet","year":"2022","journal-title":"Ann Telecommun"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/s13347-022-00577-5","article-title":"AI, opacity, and personal autonomy","volume":"35","author":"Vaassen","year":"2022","journal-title":"Philos Technol"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"31","DOI":"10.4018\/978-1-6684-6361-1.ch002","author":"Sindiramutty","year":"2024","journal-title":"Advances in explainable AI applications for smart cities"},{"key":"ref18","series-title":"Proceedings of the 54th Hawaii International Conference on System Sciences","doi-asserted-by":"crossref","DOI":"10.24251\/HICSS.2021.664","article-title":"A review of trust in artificial intelligence: challenges, vulnerabilities and future directions","author":"Lockey","year":"2021 Jan 5"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"100542","DOI":"10.1016\/j.ijcip.2022.100542","article-title":"Cyber-attacks detection in industrial systems using artificial intelligence-driven methods","volume":"38","author":"Wang","year":"2022","journal-title":"Int J Crit Infrastruct Prot"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"170","DOI":"10.3126\/nprcjmr.v1i9.74177","article-title":"Explainable AI for cyber security: interpretable models for malware analysis and network intrusion detection","volume":"1","author":"Adhikari","year":"2024","journal-title":"NPRC J Multidiscip Res"},{"key":"ref21","first-page":"143","article-title":"The role of ai in cybersecurity: addressing threats in the digital age","volume":"3","author":"Camacho","year":"2024","journal-title":"J Artif Intell Gen Sci"},{"key":"ref22","series-title":"Proceedings of the 27th ACM International Conference on Multimedia","article-title":"FAT\/MM\u201919: 1st international workshop on fairness, accountability, and transparency in multimedia","author":"Alameda-Pineda","year":"2019 Oct 21\u201325"},{"key":"ref23","series-title":"Proceedings of the NIPS 2016 Workshop on Imperfect Decision Makers","article-title":"NIPS Workshop on imperfect decision makers 2016: preface","author":"Guy","year":"2016 Dec 9"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","article-title":"Explainable Artificial Intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI","volume":"58","author":"Arrieta","year":"2020","journal-title":"Inf Fusion"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/3359786","article-title":"Techniques for interpretable machine learning","volume":"63","author":"Du","year":"2019","journal-title":"Commun ACM"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1021\/acsphotonics.1c01636","article-title":"Enhancing adjoint optimization-based photonic inverse design with explainable machine learning","volume":"9","author":"Yeung","year":"2022","journal-title":"Acs Photonics"},{"key":"ref27","series-title":"2017 International Joint Conference on Neural Networks (IJCNN)","article-title":"Design of an explainable machine learning challenge for video interviews","author":"Escalante","year":"2017 May 14\u201319"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"124710","DOI":"10.1016\/j.eswa.2024.124710","article-title":"Survey on explainable ai: techniques, challenges and open issues","volume":"255","author":"Abusitta","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"6634811","DOI":"10.1155\/2021\/6634811","article-title":"Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model","volume":"2021","author":"Mahbooba","year":"2021","journal-title":"Complexity"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"73127","DOI":"10.1109\/ACCESS.2020.2988359","article-title":"An explainable machine learning framework for intrusion detection systems","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/s10922-021-09606-8","article-title":"FAIXID: a framework for enhancing AI explainability of intrusion detection results using data cleaning techniques","volume":"29","author":"Liu","year":"2021","journal-title":"J Netw Syst Manag"},{"key":"ref32","first-page":"52","article-title":"LightGBM: a highly efficient gradient boosting decision tree","volume":"30","author":"GuolinKe","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref33","series-title":"2020 33rd SIBGRAPI conference on Graphics, Patterns and Images (SIBGRAPI)","article-title":"From explanations to feature selection: assessing SHAP values as feature selection mechanism","author":"Marc\u00edlio","year":"2020"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1007\/s10115-013-0679-x","article-title":"Explaining prediction models and individual predictions with feature contributions","volume":"41","author":"\u0160trumbelj","year":"2014","journal-title":"Knowl Inf Syst"},{"key":"ref35","series-title":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","article-title":"GIDS: GAN based intrusion detection system for in-vehicle network","author":"Seo","year":"2018 Aug 28\u201330"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_62080\/TSP_CMC_62080.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:29:12Z","timestamp":1763342952000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062080","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}