{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T21:50:54Z","timestamp":1775339454961,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springer.com\/tdm"}],"funder":[{"name":"Indiana University Kokomo"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s10922-021-09606-8","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T16:02:51Z","timestamp":1621872171000},"update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques"],"prefix":"10.1007","volume":"29","author":[{"given":"Hong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chen","family":"Zhong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-9513-3022","authenticated-orcid":false,"given":"Awny","family":"Alnusair","sequence":"additional","affiliation":[]},{"given":"Sheikh Rabiul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"key":"9606_CR1","doi-asserted-by":"crossref","unstructured":"D\u2019Amico, A., Whitley, K.: The real work of computer network defense analysts. In VizSEC 2007, pp 19\u201337. Springer, New York (2008)","DOI":"10.1007\/978-3-540-78243-8_2"},{"key":"9606_CR2","doi-asserted-by":"crossref","unstructured":"Zhong, C., Yen, J., Liu, P., Erbacher, R.F., Garneau, C., Chen, B.: Studying analysts\u2019 data triage operations in cyber defense situational analysis. In: Theory and models for cyber situation awareness, pp. 128\u2013169. Springer, (2017)","DOI":"10.1007\/978-3-319-61152-5_6"},{"key":"9606_CR3","unstructured":"Islam, S.R., Eberle, W., Ghafoor, S.K., Siraj, A., Rogers, M.: Domain knowledge aided explainable artificial intelligence for intrusion detection and response. arXiv preprint arXiv:1911.09853, (2019)"},{"key":"9606_CR4","doi-asserted-by":"crossref","unstructured":"Amarasinghe, K., Manic, M.: Improving user trust on deep neural networks based intrusion detection systems. In IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, pp. 3262\u20133268. IEEE, (2018)","DOI":"10.1109\/IECON.2018.8591322"},{"key":"9606_CR5","doi-asserted-by":"crossref","unstructured":"Chu, X., Ilyas, I.F., Krishnan, S., Wang, J.: Data cleaning: Overview and emerging challenges. In: Proceedings of the 2016 International Conference on Management of Data, pp. 2201\u20132206 (2016)","DOI":"10.1145\/2882903.2912574"},{"issue":"12","key":"9606_CR6","doi-asserted-by":"publisher","first-page":"1786","DOI":"10.14778\/3352063.3352066","volume":"12","author":"Xiaoou Ding","year":"2019","unstructured":"Ding, Xiaoou, Wang, Hongzhi, Su, Jiaxuan, Li, Zijue, Li, Jianzhong, Gao, Hong: Cleanits: a data cleaning system for industrial time series. Proc. VLDB Endow. 12(12), 1786\u20131789 (2019)","journal-title":"Proc. VLDB Endow."},{"issue":"12","key":"9606_CR7","doi-asserted-by":"publisher","first-page":"948","DOI":"10.14778\/2994509.2994514","volume":"9","author":"Sanjay Krishnan","year":"2016","unstructured":"Krishnan, Sanjay, Wang, Jiannan, Wu, Eugene, Franklin, Michael\u00a0J, Goldberg, Ken: Activeclean: interactive data cleaning for statistical modeling. Proc. VLDB Endow. 9(12), 948\u2013959 (2016)","journal-title":"Proc. VLDB Endow."},{"key":"9606_CR8","doi-asserted-by":"crossref","unstructured":"Yu, Z., Chu, X.: Piclean: a probabilistic and interactive data cleaning system. In: Proceedings of the 2019 International Conference on Management of Data, pp. 2021\u20132024 (2019)","DOI":"10.1145\/3299869.3320214"},{"key":"9606_CR9","unstructured":"Lipton, Z.C.: The mythos of model interpretability. arXiv preprint arXiv:1606.03490 (2016)"},{"key":"9606_CR10","doi-asserted-by":"crossref","unstructured":"Onwubiko, C.: Cocoa: An ontology for cybersecurity operations centre analysis process. In: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/CyberSA.2018.8551486"},{"issue":"1","key":"9606_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2882969","volume":"8","author":"Rajesh Ganesan","year":"2016","unstructured":"Ganesan, Rajesh, Jajodia, Sushil, Shah, Ankit, Cam, Hasan: Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning. ACM Trans. Intell. Syst. Technol. TIST 8(1), 1\u201321 (2016)","journal-title":"ACM Trans. Intell. Syst. Technol. TIST"},{"issue":"1","key":"9606_CR12","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/JSYST.2018.2828832","volume":"13","author":"Chen Zhong","year":"2018","unstructured":"Zhong, Chen, Yen, John, Liu, Peng, Erbacher, Robert\u00a0F: Learning from experts\u2019 experience: toward automated cyber security data triage. IEEE Syst. J. 13(1), 603\u2013614 (2018)","journal-title":"IEEE Syst. J."},{"key":"9606_CR13","doi-asserted-by":"crossref","unstructured":"Feng, C., Wu, S., Liu, N.: A user-centric machine learning framework for cyber security operations center. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 173\u2013175. IEEE (2017)","DOI":"10.1109\/ISI.2017.8004902"},{"key":"9606_CR14","doi-asserted-by":"crossref","unstructured":"Zhong, C., Yen, J., Liu, P.: Can cyber operations be made autonomous? an answer from the situational awareness viewpoint. In: Adaptive Autonomous Secure Cyber Systems, pp. 63\u201388. Springer (2020)","DOI":"10.1007\/978-3-030-33432-1_4"},{"key":"9606_CR15","doi-asserted-by":"publisher","first-page":"11897","DOI":"10.1109\/ACCESS.2018.2810267","volume":"6","author":"K Peng","year":"2018","unstructured":"Peng, K., Leung, V.C.M., Huang, Q.: Clustering approach based on mini batch kmeans for intrusion detection system over big data. IEEE Access 6, 11897\u201311906 (2018)","journal-title":"IEEE Access"},{"key":"9606_CR16","doi-asserted-by":"crossref","unstructured":"Otoum, S., Kantarci, B., Mouftah, H.: Empowering reinforcement learning on big sensed data for intrusion detection. In: IEEE International Conference on Communications (ICC), pp. 1\u20137 (2019)","DOI":"10.1109\/ICC.2019.8761575"},{"key":"9606_CR17","doi-asserted-by":"crossref","unstructured":"Uwagbole, S.O., Buchanan, W.J., Fan, L.: Applied machine learning predictive analytics to sql injection attack detection and prevention. In: IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 1087\u20131090, Lisbon (2017)","DOI":"10.23919\/INM.2017.7987433"},{"key":"9606_CR18","doi-asserted-by":"crossref","unstructured":"Aloqaily, M., Otoum, S., Ridhawi, I.A., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842. Recent advances on security and privacy in Intelligent Transportation Systems. (2019)","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"9606_CR19","doi-asserted-by":"crossref","unstructured":"Goeschel, K.: Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive bayes for off-line analysis. In: SoutheastCon 2016, pp. 1\u20136, Norfolk, VA (2016)","DOI":"10.1109\/SECON.2016.7506774"},{"key":"9606_CR20","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10922-018-9459-y","volume":"27","author":"Fatma Hachmi","year":"2019","unstructured":"Hachmi, Fatma, Boujenfa, Khadouja, Limam, Mohamed: Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization. J. Netw. Syst. Manag. 27, 93\u2013120 (2019)","journal-title":"J. Netw. Syst. Manag."},{"key":"9606_CR21","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s10922-012-9230-8","volume":"21","author":"Manuel Gil P\u00e9rez","year":"2013","unstructured":"Gil P\u00e9rez, Manuel, FM\u00e1rmol, \u00e9lix\u00a0G\u00f3mez, P\u00e9rez, Gregorio\u00a0Mart\u00ednez, Skarmeta G\u00f3mez, Antonio F.: Repcidn: a reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms. J. Netw. Syst. Manag. 21, 128\u2013167 (2013)","journal-title":"J. Netw. Syst. Manag."},{"key":"9606_CR22","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1007\/s10922-020-09558-5","volume":"28","author":"Masoud Khosravi-Farmad","year":"2020","unstructured":"Khosravi-Farmad, Masoud, Ghaemi-Bafghi, Abbas: Bayesian decision network-based security risk management framework. J. Netw. Syst. Manag. 28, 1794\u20131819 (2020)","journal-title":"J. Netw. Syst. Manag."},{"key":"9606_CR23","doi-asserted-by":"crossref","unstructured":"Otoum, S., Kantarci, B., Mouftah, H.T.: Mitigating false negative intruder decisions in wsn-based smart grid monitoring. In: 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 153\u2013158 (2017)","DOI":"10.1109\/IWCMC.2017.7986278"},{"key":"9606_CR24","unstructured":"Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., Liu, M.: Cloudy with a chance of breach: Forecasting cyber security incidents. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 1009\u20131024, Washington, D.C., (August 2015). USENIX Association"},{"key":"9606_CR25","unstructured":"Soska, K., Christin, N.: Automatically detecting vulnerable websites before they turn malicious. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 625\u2013640, San Diego, CA, (August 2014). USENIX Association"},{"key":"9606_CR26","doi-asserted-by":"crossref","unstructured":"Ritter, A., Wright, E., Casey, W.A., Michael, T.: Weakly supervised extraction of computer security events from twitter. In: Proceedings of the 24th International Conference on World Wide Web WWW, pp. 896\u2013905 (2015)","DOI":"10.1145\/2736277.2741083"},{"key":"9606_CR27","doi-asserted-by":"crossref","unstructured":"Yang, H., Ma, X., Du, K., Li, Z., Duan, H., Su, X., Liu, G., Geng, Z., Wu, J.: How to learn klingon without a dictionary: Detection and measurement of black keywords used by the underground economy. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 751\u2013769 (2017)","DOI":"10.1109\/SP.2017.11"},{"key":"9606_CR28","unstructured":"Sabottke, Carl., Suciu, Octavian., Dumitras, Tudor.: Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits. In 24th USENIX Security Symposium (USENIX Security 15), pages 1041\u20131056, Washington, D.C., USENIX Association. (2015)"},{"key":"9606_CR29","doi-asserted-by":"crossref","unstructured":"Borgolte, K., Kruegel, C., Vigna, G.: Delta: automatic identification of unknown web-based infection campaigns. In: The ACM SIGSAC Conference on Computer and Communications Security, pp. 109\u2013120 (2013)","DOI":"10.1145\/2508859.2516725"},{"key":"9606_CR30","doi-asserted-by":"publisher","first-page":"73127","DOI":"10.1109\/ACCESS.2020.2988359","volume":"8","author":"M Wang","year":"2020","unstructured":"Wang, M., Zheng, K., Yang, Y., Wang, X.: An explainable machine learning framework for intrusion detection systems. IEEE Access 8, 73127\u201373141 (2020)","journal-title":"IEEE Access"},{"key":"9606_CR31","doi-asserted-by":"crossref","unstructured":"Chandrasekaran, B., Tanner, M.C., Josephson, J.R.: Explaining control strategies in problem solving. IEEE Intell. Syst. (1), 9\u201315 (1989)","DOI":"10.1109\/64.21896"},{"key":"9606_CR32","doi-asserted-by":"crossref","unstructured":"Swartout, W.R., Moore, J.D.: Explanation in second generation expert systems. In: Second Generation Expert Systems, pp. 543\u2013585. Springer (1993)","DOI":"10.1007\/978-3-642-77927-5_24"},{"key":"9606_CR33","doi-asserted-by":"crossref","unstructured":"Swartout, W.R.: Rule-based expert systems: The mycin experiments of the stanford heuristic programming project: Bg buchanan and eh shortliffe,(Addison-Wesley, Reading, MA, 1984), p. 702 (1985)","DOI":"10.1016\/0004-3702(85)90067-0"},{"key":"9606_CR34","unstructured":"Esper, M.T.: Ai ethical principles. https:\/\/linproxy.fan.workers.dev:443\/https\/www.defense.gov\/Newsroom\/Releases\/Release\/Article\/2091996\/dod-adopts-ethical-principles-for-artificial-intelligence\/, (February 2020). Accessed 03 July 2020"},{"key":"9606_CR35","unstructured":"Yang, S.C.-H., Shafto, P.: Explainable artificial intelligence via bayesian teaching. In: NIPS 2017 Workshop on Teaching Machines, Robots, and Humans (2017)"},{"key":"9606_CR36","doi-asserted-by":"crossref","unstructured":"Lei, T., Barzilay, R., Jaakkola, T.: Rationalizing neural predictions. arXiv preprint arXiv:1606.04155 (2016)","DOI":"10.18653\/v1\/D16-1011"},{"key":"9606_CR37","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Why should i trust you?: Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144. ACM (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"9606_CR38","unstructured":"Kim, B., Wattenberg, M., Gilmer, J., Cai, C., Wexler, J., Viegas, F., Sayres, R.: Interpretability beyond feature attribution: Quantitative testing with concept activation vectors (tcav). arXiv preprint arXiv:1711.11279 (2017)"},{"key":"9606_CR39","doi-asserted-by":"crossref","unstructured":"Horel, E., Giesecke, K.: Towards explainable ai: Significance tests for neural networks. arXiv preprint arXiv:1902.06021 (2019)","DOI":"10.2139\/ssrn.3335592"},{"key":"9606_CR40","doi-asserted-by":"crossref","unstructured":"Marino, D.L., Wickramasinghe, C.S., Manic, M.: An adversarial approach for explainable ai in intrusion detection systems. In: IECON 2018\u201444th Annual Conference of the IEEE Industrial Electronics Society, pp. 3237\u20133243 (2018)","DOI":"10.1109\/IECON.2018.8591457"},{"key":"9606_CR41","doi-asserted-by":"crossref","unstructured":"Hartl, A., Bachl, M., Fabini, J., Zseby, T.: Explainability and adversarial robustness for rnns. In: 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService), pp. 148\u2013156 (2020)","DOI":"10.1109\/BigDataService49289.2020.00030"},{"key":"9606_CR42","doi-asserted-by":"crossref","unstructured":"Kasun Amarasinghe, K., Kenney, K., Manic, M.: Toward explainable deep neural network based anomaly detection. In: 2018 11th International Conference on Human System Interaction (HSI), pp. 311\u2013317 (2018)","DOI":"10.1109\/HSI.2018.8430788"},{"issue":"14","key":"9606_CR43","doi-asserted-by":"publisher","first-page":"3817","DOI":"10.3390\/s20143817","volume":"20","author":"Zhidong Wang","year":"2020","unstructured":"Wang, Zhidong, Lai, Yingxu, Liu, Zenghui, Liu, Jing: Explaining the attributes of a deep learning based intrusion detection system for industrial control networks. Sensors 20(14), 3817 (2020)","journal-title":"Sensors"},{"issue":"1","key":"9606_CR44","first-page":"372","volume":"35","author":"Ismaeel Al\u00a0Ridhawi","year":"2020","unstructured":"Al\u00a0Ridhawi, Ismaeel, Otoum, Safa, Aloqaily, Moayad, Boukerche, Azzedine: Generalizing AI: challenges and opportunities for plug and play AI solutions. IEEE Netw. 35(1), 372\u2013379 (2020)","journal-title":"IEEE Netw."},{"key":"9606_CR45","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Advances in Neural Information Processing Systems, pp. 4765\u20134774 (2017)"},{"key":"9606_CR46","unstructured":"Shrikumar, A., Greenside, P., Kundaje, A.: Learning important features through propagating activation differences. In: Proceedings of the 34th International Conference on Machine Learning, Vol. 70, pp. 3145\u20133153. JMLR.org (2017)"},{"key":"9606_CR47","unstructured":"Ando, S.: Interpreting random forests. https:\/\/linproxy.fan.workers.dev:443\/http\/blog.datadive.net\/interpreting-random-forests\/ (2019)"},{"key":"9606_CR48","doi-asserted-by":"crossref","unstructured":"Datta, A., Sen, S., Zick, Y.: Algorithmic transparency via quantitative input influence: Theory and experiments with learning systems. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 598\u2013617. IEEE (2016)","DOI":"10.1109\/SP.2016.42"},{"issue":"3","key":"9606_CR49","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/s10115-013-0679-x","volume":"41","author":"Erik \u0160trumbelj","year":"2014","unstructured":"\u0160trumbelj, Erik, Kononenko, Igor: Explaining prediction models and individual predictions with feature contributions. Knowl. Inf. Syst. 41(3), 647\u2013665 (2014)","journal-title":"Knowl. Inf. Syst."},{"issue":"4","key":"9606_CR50","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/asmb.446","volume":"17","author":"Stan Lipovetsky","year":"2001","unstructured":"Lipovetsky, Stan, Conklin, Michael: Analysis of regression in game theory approach. Appl. Stoch. Models Bus. Ind. 17(4), 319\u2013330 (2001)","journal-title":"Appl. Stoch. Models Bus. Ind."},{"issue":"7","key":"9606_CR51","doi-asserted-by":"publisher","first-page":"e0130140","DOI":"10.1371\/journal.pone.0130140","volume":"10","author":"Sebastian Bach","year":"2015","unstructured":"Bach, Sebastian, Binder, Alexander, Montavon, Gr\u00e9goire, Klauschen, Frederick, M\u00fcller, Klaus-Robert, Samek, Wojciech: On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PLoS ONE 10(7), e0130140 (2015)","journal-title":"PLoS ONE"},{"key":"9606_CR52","unstructured":"Lundberg, Scott.: Shap vs lime"},{"key":"9606_CR53","doi-asserted-by":"crossref","unstructured":"Arrieta, A.B., D\u00edaz-Rodr\u00edguez, N., Del\u00a0Ser, J., Bennetot, A., Tabik, S., Barbado, A., Garc\u00eda, S., Gil-L\u00f3pez, S., Molina, D., Benjamins, R., et\u00a0al.: Explainable artificial intelligence (xai): Concepts, taxonomies, opportunities and challenges toward responsible ai. Inf. Fusion 58, 82\u2013115 (2020)","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"9606_CR54","unstructured":"Liu, H., Kim, J.: Data quality assessment and problem severity assessment for data cleaning. In: The 15th International Conference on Data Science, pp. 207\u2013210 (2019)"},{"key":"9606_CR55","unstructured":"Dash, S., Gunluk, O., Wei, D.: Boolean decision rules via column generation. In: Advances in Neural Information Processing Systems, pp. 4655\u20134665 (2018)"},{"key":"9606_CR56","unstructured":"Islam, S.R., Eberle, W., Bundy, S., Ghafoor, S.K.: Infusing domain knowledge in ai-based\u201d black box\u201d models for better explainability with application in bankruptcy prediction. arXiv preprint arXiv:1905.11474 (2019)"},{"key":"9606_CR57","unstructured":"Dhurandhar, A., Chen, P.-Y., Luss, R., Tu, C.-C., Ting, P., Shanmugam, K., Das, P.: Explanations based on the missing: towards contrastive explanations with pertinent negatives. In: Advances in Neural Information Processing Systems, pp. 592\u2013603 (2018)"},{"key":"9606_CR58","unstructured":"Zhang, C., Bengio, S., Hardt, M., Recht, B., Vinyals, O.: Understanding deep learning requires rethinking generalization. arXiv preprint arXiv:1611.03530 (2016)"},{"key":"9606_CR59","unstructured":"Doshi-Velez, F., Kim, B.: Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017)"},{"key":"9606_CR60","unstructured":"Melis, D.A., Jaakkola, T.: Towards robust interpretability with self-explaining neural networks. In: Advances in Neural Information Processing Systems, pp. 7775\u20137784 (2018)"},{"key":"9606_CR61","unstructured":"Luss, R., Chen, P.-Y., Dhurandhar, A., Sattigeri, P., Zhang, Y., Shanmugam, K., Tu, C.-C.: Generating contrastive explanations with monotonic attribute functions. arXiv preprint arXiv:1905.12698 (2019)"},{"key":"9606_CR62","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.cose.2017.11.004","volume":"73","author":"Gabriel Maci\u00e1-Fern\u00e1ndez","year":"2018","unstructured":"Maci\u00e1-Fern\u00e1ndez, Gabriel, Camacho, Jos\u00e9, Mag\u00e1n-Carri\u00f3n, Roberto, Garc\u00eda-Teodoro, Pedro, Ther\u00f3n, Roberto: Ugr\u201816: a new dataset for the evaluation of cyclostationarity-based network idss. Comput. Secur. 73, 411\u2013424 (2018)","journal-title":"Comput. Secur."},{"key":"9606_CR63","unstructured":"Arya, V., Bellamy, R.\u00a0K.E., Chen, P.-Y., Dhurandhar, A., Hind, M., Hoffman, S.C., Houde, S., Liao, Q.V., Luss, R., Mojsilovi\u0107, A. et\u00a0al.: One explanation does not fit all: A toolkit and taxonomy of ai explainability techniques. arXiv preprint arXiv:1909.03012 (2019)"},{"key":"9606_CR64","unstructured":"Wei, D., Dash, S., Gao, T., G\u00fcnl\u00fck, O.: Generalized linear rule models. arXiv preprint arXiv:1906.01761 (2019)"},{"key":"9606_CR65","doi-asserted-by":"crossref","unstructured":"Gurumoorthy, K.S., Dhurandhar, A., Cecchi, G., Aggarwal, C.: Efficient data representation by selecting prototypes with importance weights. In: 2019 IEEE International Conference on Data Mining (ICDM), pp. 260\u2013269. IEEE (2019)","DOI":"10.1109\/ICDM.2019.00036"},{"key":"9606_CR66","unstructured":"Islam, S.R., Eberle, W., Ghafoor, S.K.: Towards quantification of explainability in explainable artificial intelligence methods. AAAI Publications, The Thirty-Third International Flairs Conference (2020)"},{"issue":"2","key":"9606_CR67","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"George\u00a0A Miller","year":"1956","unstructured":"Miller, George\u00a0A: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 63(2), 81 (1956)","journal-title":"Psychol. Rev."},{"key":"9606_CR68","doi-asserted-by":"crossref","unstructured":"Wolf, C.T., Ringland, K.E.: Designing accessible, explainable ai (xai) experiences. In: ACM SIGACCESS Accessibility and Computing (125):1\u20131 (2020)","DOI":"10.1145\/3386296.3386302"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s10922-021-09606-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/article\/10.1007\/s10922-021-09606-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s10922-021-09606-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T17:13:04Z","timestamp":1631207584000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/10.1007\/s10922-021-09606-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":68,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["9606"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s10922-021-09606-8","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"16 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"40"}}