{"id":"https://openalex.org/W4392910131","doi":"https://doi.org/10.1109/ccnc51664.2024.10454633","title":"Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection","display_name":"Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection","publication_year":2024,"publication_date":"2024-01-06","ids":{"openalex":"https://openalex.org/W4392910131","doi":"https://doi.org/10.1109/ccnc51664.2024.10454633"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51664.2024.10454633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51664.2024.10454633","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010303254","display_name":"Thulitha Senevirathna","orcid":null},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Thulitha Senevirathna","raw_affiliation_strings":["School of Computer Science, University College Dublin,Ireland","School of Computer Science, University College Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089463071","display_name":"Bartlomiej Siniarski","orcid":"https://orcid.org/0000-0001-8249-7652"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Bartlomiej Siniarski","raw_affiliation_strings":["School of Computer Science, University College Dublin,Ireland","School of Computer Science, University College Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068169019","display_name":"Madhusanka Liyanage","orcid":"https://orcid.org/0000-0003-4786-030X"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Madhusanka Liyanage","raw_affiliation_strings":["School of Computer Science, University College Dublin,Ireland","School of Computer Science, University College Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011845242","display_name":"Shen Wang","orcid":"https://orcid.org/0000-0003-3660-1206"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Shen Wang","raw_affiliation_strings":["School of Computer Science, University College Dublin,Ireland","School of Computer Science, University College Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5010303254"],"corresponding_institution_ids":["https://openalex.org/I100930933"],"apc_list":null,"apc_paid":null,"fwci":5.7422,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.96336326,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"107","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.724371075630188},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6458053588867188},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5541179776191711},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.4443869888782501},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3460939824581146},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3180258274078369},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06274759769439697}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.724371075630188},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6458053588867188},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5541179776191711},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.4443869888782501},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3460939824581146},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3180258274078369},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06274759769439697},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc51664.2024.10454633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51664.2024.10454633","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.4699999988079071,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2516809705","https://openalex.org/W2744536417","https://openalex.org/W3005086430","https://openalex.org/W3036081308","https://openalex.org/W4211050110","https://openalex.org/W4211226080","https://openalex.org/W4232902877","https://openalex.org/W4285248859","https://openalex.org/W4290996509","https://openalex.org/W4297538900","https://openalex.org/W4313116287","https://openalex.org/W4382239560","https://openalex.org/W6779613175"],"related_works":["https://openalex.org/W2163664197","https://openalex.org/W3035283282","https://openalex.org/W2364523259","https://openalex.org/W1975978427","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2061944504","https://openalex.org/W2025838880","https://openalex.org/W2123281165"],"abstract_inverted_index":{"Artificial":[0],"Intelligence":[1],"used":[2],"in":[3,18,27,31,63,94],"future":[4,64],"networks":[5],"is":[6,143],"vulnerable":[7],"to":[8,89,110],"biases,":[9],"misclassifications,":[10],"and":[11,61,78,120,145],"security":[12,57,92],"threats,":[13],"which":[14],"seeds":[15],"constant":[16],"scrutiny":[17],"accountability.":[19],"Explainable":[20],"AI":[21],"(XAI)":[22],"methods":[23,122],"bridge":[24],"this":[25],"gap":[26],"identifying":[28],"unaccounted":[29],"biases":[30,42],"black-box":[32],"AI/ML":[33],"models.":[34],"However,":[35],"scaffolding":[36],"attacks":[37],"can":[38,108,149],"hide":[39],"the":[40,44,72,91,112,118,124,129,139,146],"internal":[41],"of":[43],"model":[45,153],"from":[46],"XAI":[47],"methods,":[48],"jeopardizing":[49],"any":[50],"auditory":[51],"or":[52],"monitoring":[53],"processes,":[54],"service":[55],"provisions,":[56],"systems,":[58],"regulators,":[59],"auditors,":[60],"end-users":[62],"networking":[65],"paradigms,":[66],"including":[67],"Intent-Based":[68],"Networking":[69],"(IBN).":[70],"For":[71],"first":[73],"time":[74],"ever,":[75],"we":[76,101],"formalize":[77],"demonstrate":[79],"a":[80,103],"framework":[81],"on":[82,131],"how":[83],"an":[84,151],"attacker":[85],"would":[86],"adopt":[87],"scaffoldings":[88],"deceive":[90],"auditors":[93,107],"Network":[95],"Intrusion":[96],"Detection":[97],"Systems":[98],"(NIDS).":[99],"Furthermore,":[100],"propose":[102],"detection":[104,121,147],"method":[105,142,148],"that":[106,138],"use":[109],"detect":[111],"attack":[113,119,130,140],"efficiently.":[114],"We":[115,126],"rigorously":[116],"test":[117],"using":[123],"NSL-KDD.":[125],"then":[127],"simulate":[128],"5G":[132],"network":[133],"data.":[134],"Our":[135],"simulation":[136],"illustrates":[137],"adoption":[141],"successful,":[144],"identify":[150],"affected":[152],"with":[154],"extremely":[155],"high":[156],"confidence.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-22T08:38:42.863108","created_date":"2025-10-10T00:00:00"}
