{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T04:48:35Z","timestamp":1777783715533,"version":"3.51.4"},"reference-count":86,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Artif. Intell."],"abstract":"<jats:p>Since the advent of deep learning (DL), the field has witnessed a continuous stream of innovations. However, the translation of these advancements into practical applications has not kept pace, particularly in safety-critical domains where artificial intelligence (AI) must meet stringent regulatory and ethical standards. This is underscored by the ongoing research in eXplainable AI (XAI) and privacy-preserving machine learning (PPML), which seek to address some limitations associated with these opaque and data-intensive models. Despite brisk research activity in both fields, little attention has been paid to their interaction. This work is the first to thoroughly investigate the effects of privacy-preserving techniques on explanations generated by common XAI methods for DL models. A detailed experimental analysis is conducted to quantify the impact of private training on the explanations provided by DL models, applied to six image datasets and five time series datasets across various domains. The analysis comprises three privacy techniques, nine XAI methods, and seven model architectures. The findings suggest non-negligible changes in explanations through the implementation of privacy measures. Apart from reporting individual effects of PPML on XAI, the paper gives clear recommendations for the choice of techniques in real applications. By unveiling the interdependencies of these pivotal technologies, this research marks an initial step toward resolving the challenges that hinder the deployment of AI in safety-critical settings.<\/jats:p>","DOI":"10.3389\/frai.2024.1236947","type":"journal-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T11:46:14Z","timestamp":1720007174000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["The privacy-explainability trade-off: unraveling the impacts of differential privacy and federated learning on attribution methods"],"prefix":"10.3389","volume":"7","author":[{"given":"Saifullah","family":"Saifullah","sequence":"first","affiliation":[]},{"given":"Dominique","family":"Mercier","sequence":"additional","affiliation":[]},{"given":"Adriano","family":"Lucieri","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Dengel","sequence":"additional","affiliation":[]},{"given":"Sheraz","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"B1","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1145\/2976749.2978318","article-title":"\u201cDeep learning with differential privacy,\u201d","volume-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security","author":"Abadi","year":"2016"},{"key":"B2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","article-title":"Privacy-preserving machine learning: threats and solutions","volume":"17","author":"Al-Rubaie","year":"2019","journal-title":"IEEE Secur. Priv"},{"key":"B3","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Aono","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"B4","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/ICOCO59262.2023.10397836","article-title":"\u201cLeveraging federated learning and xai for privacy-aware and lightweight edge training in network traffic classification,\u201d","volume-title":"2023 IEEE International Conference on Computing (ICOCO)","author":"Ariffin","year":"2023"},{"key":"B5","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/s10618-016-0483-9","article-title":"The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances","volume":"31","author":"Bagnall","year":"2017","journal-title":"Data Min. Knowl. Discov"},{"key":"B6","first-page":"104","article-title":"\u201cFed-xai: federated learning of explainable artificial intelligence models,\u201d","volume-title":"XAI. it@ AI* IA","author":"B\u00e1rcena","year":"2022"},{"key":"B7","first-page":"152","article-title":"Should we really use post-hoc tests based on mean-ranks?","volume":"17","author":"Benavoli","year":"2016","journal-title":"J. Mach. Learn. Res"},{"key":"B8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3355610","article-title":"Document layout analysis: a comprehensive survey","volume":"52","author":"Binmakhashen","year":"2019","journal-title":"ACM Comput. Surv"},{"key":"B9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.neucom.2019.11.041","article-title":"A review of privacy-preserving techniques for deep learning","volume":"384","author":"Boulemtafes","year":"2020","journal-title":"Neurocomputing"},{"key":"B10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s13748-024-00315-2","article-title":"Explainable machine learning models with privacy","volume":"13","author":"Bozorgpanah","year":"2024","journal-title":"Prog. Artif. Intell"},{"key":"B11","first-page":"1059","article-title":"\u201cHigh-performance large-scale image recognition without normalization,\u201d","volume-title":"International Conference on Machine Learning","author":"Brock","year":"2021"},{"key":"B12","doi-asserted-by":"publisher","first-page":"102305","DOI":"10.1016\/j.media.2021.102305","article-title":"Analysis of the isic image datasets: usage, benchmarks and recommendations","volume":"75","author":"Cassidy","year":"2022","journal-title":"Med. Image Anal"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.485550\/arXiv.2111.10178","article-title":"Understanding training-data leakage from gradients in neural networks for image classification","author":"Chen","year":"2021","journal-title":"arXiv"},{"key":"B14","first-page":"1870","article-title":"\u201cDeep learning shape priors for object segmentation,\u201d","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Chen","year":"2013"},{"key":"B15","article-title":"\u201cThis looks like that: deep learning for interpretable image recognition,\u201d","author":"Chen","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2006.11371","article-title":"Opportunities and challenges in explainable artificial intelligence (XAI): a survey","author":"Das","year":"2020","journal-title":"arXiv"},{"key":"B17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5555\/1248547.1248548","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"Dem\u0161ar","year":"2006","journal-title":"J. Mach. Learn. Rese"},{"key":"B18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","article-title":"\u201cDifferential privacy,\u201d","author":"Dwork","year":"2006","journal-title":"Automata, Languages and Programming"},{"key":"B19","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TRPMS.2021.3066428","article-title":"On interpretability of artificial neural networks: a survey","volume":"5","author":"Fan","year":"2021","journal-title":"IEEE Trans. Radiat. Plasma Med. Sci"},{"key":"B20","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.3390\/e23081047","article-title":"Toward learning trustworthily from data combining privacy, fairness, and explainability: an application to face recognition","volume":"23","author":"Franco","year":"2021","journal-title":"Entropy"},{"key":"B21","doi-asserted-by":"crossref","first-page":"1322","DOI":"10.1145\/2810103.2813677","article-title":"\u201cModel inversion attacks that exploit confidence information and basic countermeasures,\u201d","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security","author":"Fredrikson","year":"2015"},{"key":"B22","first-page":"771","article-title":"\u201cTable detection using deep learning,\u201d","volume-title":"2017 14th IAPR international conference on document analysis and recognition (ICDAR), Vol. 1","author":"Gilani","year":"2017"},{"key":"B23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3608482","article-title":"The privacy issue of counterfactual explanations: explanation linkage attacks","volume":"14","author":"Goethals","year":"2023","journal-title":"ACM Trans. Intell. Syst. Technol"},{"key":"B24","doi-asserted-by":"publisher","first-page":"e215","DOI":"10.1161\/01.CIR.101.23.e215","article-title":"Physiobank, physiotoolkit, and physionet: components of a new research resource for complex physiologic signals","volume":"101","author":"Goldberger","year":"2000","journal-title":"Circulation"},{"key":"B25","article-title":"\u201cCaltech-256 object category dataset,\u201d","volume-title":"CNS-TR-2007-001","author":"Griffin","year":"2007"},{"key":"B26","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1109\/ICDAR.2015.7333910","article-title":"\u201cEvaluation of deep convolutional nets for document image classification and retrieval,\u201d","volume-title":"2015 13th International Conference on Document Analysis and Recognition (ICDAR)","author":"Harley","year":"2015"},{"key":"B27","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s12559-023-10179-8","article-title":"Interpreting black-box models: a review on explainable artificial intelligence","volume":"16","author":"Hassija","year":"2024","journal-title":"Cognit. Comput"},{"key":"B28","first-page":"770","article-title":"\u201cDeep residual learning for image recognition,\u201d","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","author":"He","year":"2016"},{"key":"B29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ARCSE.2015.7338148","article-title":"\u201cTowards internal privacy and flexible k-anonymity,\u201d","volume-title":"2015 International Conference on Applied Research in Computer Science and Engineering (ICAR)","author":"Hellani","year":"2015"},{"key":"B30","volume-title":"Deep Learning for Image Processing Applications, Vol. 31","author":"Hemanth","year":"2017"},{"key":"B31","author":"Ilyas","year":"2019"},{"key":"B32","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10618-019-00619-1","article-title":"Deep learning for time series classification: a review","volume":"33","author":"Ismail Fawaz","year":"2019","journal-title":"Data Min. Knowl. Discov"},{"key":"B33","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1007\/s10618-020-00710-y","article-title":"Inceptiontime: finding alexnet for time series classification","volume":"34","author":"Ismail Fawaz","year":"2020","journal-title":"Data Min. Knowl. Discov"},{"key":"B34","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/JBHI.2018.2824327","article-title":"Seven-point checklist and skin lesion classification using multitask multimodal neural nets","volume":"23","author":"Kawahara","year":"2019","journal-title":"IEEE J. Biomed. Health Inform"},{"key":"B35","doi-asserted-by":"publisher","first-page":"106848","DOI":"10.1016\/j.compbiomed.2023.106848","article-title":"Privacy-preserving artificial intelligence in healthcare: techniques and applications","volume":"158","author":"Khalid","year":"2023","journal-title":"Comput. Biol. Med"},{"key":"B36","first-page":"2668","article-title":"\u201cInterpretability beyond feature attribution: quantitative testing with concept activation vectors (TCAV),\u201d","volume-title":"International conference on machine learning","author":"Kim","year":"2018"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1412.6980","article-title":"Adam: a method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv"},{"key":"B38","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1610.05492","article-title":"Federated learning: strategies for improving communication efficiency","author":"Kone\u010dn\u1ef3","year":"2016","journal-title":"arXiv"},{"key":"B39","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","article-title":"Imagenet classification with deep convolutional neural networks","volume":"60","author":"Krizhevsky","year":"2017","journal-title":"Commun. ACM"},{"key":"B40","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"B41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1609\/aaai.v32i1.11771","article-title":"Deep learning for case-based reasoning through prototypes: a neural network that explains its predictions","volume":"32","author":"Li","year":"2018","journal-title":"Proc. AAAI Conf. Artif. Intell"},{"key":"B42","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TIP.2018.2868382","article-title":"Reliable crowdsourcing and deep locality-preserving learning for unconstrained facial expression recognition","volume":"28","author":"Li","year":"2019","journal-title":"IEEE Trans. Image Process"},{"key":"B43","doi-asserted-by":"publisher","first-page":"20200209","DOI":"10.1098\/rsta.2020.0209","article-title":"Time-series forecasting with deep learning: a survey","volume":"379","author":"Lim","year":"2021","journal-title":"Philos. Trans. R. Soc. A"},{"key":"B44","doi-asserted-by":"publisher","first-page":"e271","DOI":"10.1016\/S2589-7500(19)30123-2","article-title":"A comparison of deep learning performance against health-care professionals in detecting diseases from medical imaging: a systematic review and meta-analysis","volume":"1","author":"Liu","year":"2019","journal-title":"Lancet Digital Health"},{"key":"B45","doi-asserted-by":"publisher","first-page":"4566","DOI":"10.1109\/ACCESS.2020.3045078","article-title":"Privacy and security issues in deep learning: a survey","volume":"9","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"B46","first-page":"11976","article-title":"\u201cA convnet for the 2020s,\u201d","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Liu","year":"2022"},{"key":"B47","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-3-030-63820-7_21","article-title":"\u201cExplaining AI-based decision support systems using concept localization maps,\u201d","volume-title":"International Conference on Neural Information Processing","author":"Lucieri","year":"2020"},{"key":"B48","doi-asserted-by":"publisher","first-page":"1194993","DOI":"10.3389\/fbinf.2023.1194993","article-title":"Translating theory into practice: assessing the privacy implications of concept-based explanations for biomedical AI","volume":"3","author":"Lucieri","year":"2023","journal-title":"Front. Bioinform"},{"key":"B49","article-title":"\u201cA unified approach to interpreting model predictions,\u201d","author":"Lundberg","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"B50","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2308.16538","article-title":"The AI revolution: opportunities and challenges for the finance sector","author":"Maple","year":"2023","journal-title":"arXiv"},{"key":"B51","doi-asserted-by":"publisher","first-page":"7834","DOI":"10.1109\/TII.2021.3124476","article-title":"Evaluating privacy-preserving machine learning in critical infrastructures: a case study on time-series classification","volume":"18","author":"Mercier","year":"2021","journal-title":"IEEE Trans. Ind. Inform"},{"key":"B52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2018.07.007","article-title":"Explanation in artificial intelligence: insights from the social sciences","volume":"267","author":"Miller","year":"2019","journal-title":"Artif. Intell"},{"key":"B53","doi-asserted-by":"publisher","first-page":"148037","DOI":"10.1109\/ACCESS.2021.3124844","article-title":"Privacy-preserving generative adversarial network for case-based explainability in medical image analysis","volume":"9","author":"Montenegro","year":"2021","journal-title":"IEEE Access"},{"key":"B54","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2106.13203","article-title":"When differential privacy meets interpretability: a case study","author":"Naidu","year":"2021","journal-title":"arXiv"},{"key":"B55","doi-asserted-by":"publisher","first-page":"11873","DOI":"10.1609\/aaai.v37i10.26401","article-title":"Xrand: differentially private defense against explanation-guided attacks","volume":"37","author":"Nguyen","year":"2023","journal-title":"Proc. AAAI Conf. Artif. Intell"},{"key":"B56","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2107.11400","article-title":"Robust explainability: a tutorial on gradient-based attribution methods for deep neural networks","author":"Nielsen","year":"2021","journal-title":"arXiv"},{"key":"B57","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2001.09762","article-title":"Bias in data-driven AI systems an introductory survey","author":"Ntoutsi","year":"2020","journal-title":"arXiv"},{"key":"B58","volume-title":"Generalized feature extraction for structural pattern recognition in time-series data","author":"Olszewski","year":"2001"},{"key":"B59","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.1145\/3531146.3533235","article-title":"\u201cModel explanations with differential privacy,\u201d","volume-title":"Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency","author":"Patel","year":"2022"},{"key":"B60","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2311.14137","article-title":"Privacy-preserving algorithmic recourse","author":"Pentyala","year":"2023","journal-title":"arXiv"},{"key":"B61","doi-asserted-by":"publisher","first-page":"103083","DOI":"10.1016\/j.scs.2021.103083","article-title":"A secure, private, and explainable ioht framework to support sustainable health monitoring in a smart city","volume":"72","author":"Rahman","year":"2021","journal-title":"Sustain. Cities Soc"},{"key":"B62","first-page":"61","article-title":"Membership inference attack against differentially private deep learning model","volume":"11","author":"Rahman","year":"2018","journal-title":"Trans. Data Priv"},{"key":"B63","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.18653\/v1\/N16-3020","author":"Ribeiro","year":"2016"},{"key":"B64","doi-asserted-by":"publisher","first-page":"2660","DOI":"10.1109\/TNNLS.2016.2599820","article-title":"Evaluating the visualization of what a deep neural network has learned","volume":"28","author":"Samek","year":"2016","journal-title":"IEEE Trans. Neural Netw. Learn. Syst"},{"key":"B65","doi-asserted-by":"publisher","first-page":"e1485","DOI":"10.1002\/widm.1485","article-title":"Remote patient monitoring using artificial intelligence: current state, applications, and challenges","volume":"13","author":"Shaik","year":"2023","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov"},{"key":"B66","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1145\/3461702.3462533","article-title":"\u201cOn the privacy risks of model explanations,\u201d","volume-title":"Proceedings of the 2021 AAAI\/ACM Conference on AI, Ethics, and Society","author":"Shokri","year":"2021"},{"key":"B67","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/SP.2017.41","article-title":"\u201cMembership inference attacks against machine learning models,\u201d","volume-title":"2017 IEEE Symposium on Security and Privacy (SP)","author":"Shokri","year":"2017"},{"key":"B68","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1605.01713","article-title":"Not just a black box: learning important features through propagating activation differences","author":"Shrikumar","year":"2016","journal-title":"arXiv"},{"key":"B69","first-page":"3145","article-title":"\u201cLearning important features through propagating activation differences,\u201d","volume-title":"International conference on machine learning","author":"Shrikumar","year":"2017"},{"key":"B70","doi-asserted-by":"publisher","first-page":"67027","DOI":"10.1109\/ACCESS.2019.2912823","article-title":"Tsviz: demystification of deep learning models for time-series analysis","volume":"7","author":"Siddiqui","year":"2019","journal-title":"IEEE Access"},{"key":"B71","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6034","article-title":"Deep inside convolutional networks: visualising image classification models and saliency maps","author":"Simonyan","year":"2013","journal-title":"arXiv"},{"key":"B72","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1409.1556","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv"},{"key":"B73","first-page":"111","article-title":"\u201cBalancing xai with privacy and security considerations,\u201d","volume-title":"European Symposium on Research in Computer Security","author":"Spartalis","year":"2023"},{"key":"B74","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1412.6806","article-title":"Striving for simplicity: the all convolutional net","author":"Springenberg","year":"2014","journal-title":"arXiv"},{"key":"B75","doi-asserted-by":"publisher","first-page":"103615","DOI":"10.1016\/j.micpro.2020.103615","article-title":"Performance of deep learning vs machine learning in plant leaf disease detection","volume":"80","author":"Sujatha","year":"2021","journal-title":"Microprocess. Microsyst"},{"key":"B76","first-page":"3319","article-title":"\u201cAxiomatic attribution for deep networks,\u201d","volume-title":"International conference on machine learning","author":"Sundararajan","year":"2017"},{"key":"B77","first-page":"6105","article-title":"\u201cEfficientnet: rethinking model scaling for convolutional neural networks,\u201d","volume-title":"International conference on machine learning","author":"Tan","year":"2019"},{"key":"B78","doi-asserted-by":"publisher","first-page":"387","DOI":"10.5194\/isprs-archives-XLVIII-M-1-2023-387-2023","article-title":"Challenges of artificial intelligence application for disaster risk management","volume":"48","author":"Velev","year":"2023","journal-title":"Int. Arch. Photogramm. Remote sens. Spat. Inf. Sci"},{"key":"B79","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2006.00093","article-title":"Explainable artificial intelligence: a systematic review","author":"Vilone","year":"2020","journal-title":"arXiv"},{"key":"B80","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/11840930_66","article-title":"\u201cExtracting motion primitives from natural handwriting data,\u201d","volume-title":"Artificial Neural Networks-ICANN 2006: 16th International Conference, Athens, Greece, September 10-14, 2006. Proceedings, Part II 16","author":"Williams","year":"2006"},{"key":"B81","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.ins.2023.03.020","article-title":"Explanation leaks: explanation-guided model extraction attacks","volume":"632","author":"Yan","year":"2023","journal-title":"Inf. Sci"},{"key":"B82","article-title":"On the (in) fidelity and sensitivity of explanations","author":"Yeh","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"B83","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1311.2901","article-title":"Visualizing and understanding convolutional networks (2013)","author":"Zeiler","year":"2013","journal-title":"arXiv"},{"key":"B84","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1631\/FITEE.1700808","article-title":"Visual interpretability for deep learning: a survey","volume":"19","author":"Zhang","year":"2018","journal-title":"Front. Inf. Technol. Electron. Eng"},{"key":"B85","first-page":"682","article-title":"\u201cExploiting explanations for model inversion attacks,\u201d","volume-title":"Proceedings of the IEEE\/CVF international conference on computer vision","author":"Zhao","year":"2021"},{"key":"B86","doi-asserted-by":"publisher","first-page":"593","DOI":"10.3390\/electronics10050593","article-title":"Evaluating the quality of machine learning explanations: a survey on methods and metrics","volume":"10","author":"Zhou","year":"2021","journal-title":"Electronics"}],"container-title":["Frontiers in Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2024.1236947\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T11:46:47Z","timestamp":1720007207000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2024.1236947\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":86,"alternative-id":["10.3389\/frai.2024.1236947"],"URL":"https:\/\/doi.org\/10.3389\/frai.2024.1236947","relation":{},"ISSN":["2624-8212"],"issn-type":[{"value":"2624-8212","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,3]]},"article-number":"1236947"}}