{"id":"https://openalex.org/W4392981007","doi":"https://doi.org/10.1109/icaiic60209.2024.10463357","title":"Evaluation of XAI Algorithms in IoT Traffic Anomaly Detection","display_name":"Evaluation of XAI Algorithms in IoT Traffic Anomaly Detection","publication_year":2024,"publication_date":"2024-02-19","ids":{"openalex":"https://openalex.org/W4392981007","doi":"https://doi.org/10.1109/icaiic60209.2024.10463357"},"language":"en","primary_location":{"id":"doi:10.1109/icaiic60209.2024.10463357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic60209.2024.10463357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093472346","display_name":"Uyen Do","orcid":"https://orcid.org/0009-0008-9779-8819"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Uyen Do","raw_affiliation_strings":["VNUHCM-UIT,Ho Chi Minh,VietNam","VNUHCM-UIT, Ho Chi Minh, VietNam"],"affiliations":[{"raw_affiliation_string":"VNUHCM-UIT,Ho Chi Minh,VietNam","institution_ids":[]},{"raw_affiliation_string":"VNUHCM-UIT, Ho Chi Minh, VietNam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093472345","display_name":"Laura Lahesoo","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Laura Lahesoo","raw_affiliation_strings":["TUM,Munich,Germany","TUM, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"TUM,Munich,Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"TUM, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062774058","display_name":"Rodrigo Matos Carnier","orcid":"https://orcid.org/0000-0002-0843-3033"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rodrigo Matos Carnier","raw_affiliation_strings":["NII,Tokyo,Japan","NII, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NII,Tokyo,Japan","institution_ids":[]},{"raw_affiliation_string":"NII, Tokyo, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101814201","display_name":"Kensuke Fukuda","orcid":"https://orcid.org/0000-0001-8372-2807"},"institutions":[{"id":"https://openalex.org/I4210110163","display_name":"Nippon Soken (Japan)","ror":"https://ror.org/01yk36x23","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210110163"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kensuke Fukuda","raw_affiliation_strings":["NII/ Sokendai,Tokyo,Japan","NII/ Sokendai, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NII/ Sokendai,Tokyo,Japan","institution_ids":["https://openalex.org/I4210110163"]},{"raw_affiliation_string":"NII/ Sokendai, Tokyo, Japan","institution_ids":["https://openalex.org/I4210110163"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093472346"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.5453,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.8944221,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"669","last_page":"674"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9531999826431274,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7271219491958618},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6745470762252808},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5094605088233948},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.44916871190071106},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40330934524536133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21788570284843445}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7271219491958618},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6745470762252808},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5094605088233948},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.44916871190071106},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40330934524536133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21788570284843445},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaiic60209.2024.10463357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic60209.2024.10463357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W164607750","https://openalex.org/W2123045220","https://openalex.org/W2197538184","https://openalex.org/W2282821441","https://openalex.org/W2606462007","https://openalex.org/W2962858109","https://openalex.org/W2996764908","https://openalex.org/W3088957022","https://openalex.org/W3092118421","https://openalex.org/W3098620325","https://openalex.org/W3101609372","https://openalex.org/W3190219082","https://openalex.org/W3207886734","https://openalex.org/W4225322449","https://openalex.org/W4283170759","https://openalex.org/W4285248859","https://openalex.org/W4319080686","https://openalex.org/W4385688168","https://openalex.org/W4389613258","https://openalex.org/W6677995690","https://openalex.org/W6737947904"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W3030345572"],"abstract_inverted_index":{"Anomaly":[0],"detection":[1,37,151],"in":[2,6,12,22,45,105,139],"network":[3,25,78,123,170],"traffic,":[4],"both":[5],"general":[7],"computer":[8,24],"networks":[9],"and":[10,33,58,99,137],"specifically":[11],"Internet":[13],"of":[14,96,125,148,154,169],"Things":[15],"(IoT)":[16],"networks,":[17],"plays":[18],"a":[19,50,85],"crucial":[20],"role":[21],"ensuring":[23],"security.":[26],"Over":[27],"the":[28,74,94,120,134,140],"years,":[29],"numerous":[30],"machine":[31,56],"learning":[32,57,60],"deep":[34,59],"learning-based":[35],"anomaly":[36,97,108,150,171],"tools":[38],"have":[39],"been":[40],"proposed,":[41],"exhibiting":[42],"high":[43],"accuracy":[44],"identifying":[46],"anomalous":[47,83],"behavior.":[48],"However,":[49],"significant":[51],"challenge":[52],"arises":[53],"with":[54],"most":[55,121,135],"algorithms,":[61],"as":[62,82],"they":[63],"are":[64,164],"often":[65],"considered":[66],"black-box":[67],"models":[68],"that":[69,114],"lack":[70],"interpretability.":[71],"Consequently,":[72],"explaining":[73],"reasons":[75],"behind":[76],"certain":[77],"behaviors":[79],"being":[80],"labeled":[81],"becomes":[84],"difficult":[86],"task.":[87],"To":[88],"overcome":[89],"this":[90],"issue,":[91],"we":[92],"evaluate":[93],"combination":[95],"detectors":[98],"eXplainable":[100],"Artificial":[101],"Intelligence":[102],"(XAI)":[103],"algorithms":[104,116,144,163],"IoT":[106],"traffic":[107],"detection.":[109,172],"Our":[110],"research":[111],"results":[112],"demonstrate":[113],"XAI":[115,143,162],"can":[117],"consistently":[118],"identify":[119],"impactful":[122],"features":[124],"security":[126],"anomalies.":[127,159],"More":[128],"specifically,":[129],"(1)":[130],"SHAP":[131],"algorithm":[132],"is":[133],"robust":[136],"reliable":[138],"four":[141,146],"tested":[142],"for":[145,167],"types":[147],"supervised/unsupervised":[149],"models,":[152],"independent":[153],"two":[155],"datasets":[156],"including":[157],"different":[158],"(2)":[160],"Image-based":[161],"not":[165],"suitable":[166],"explainability":[168]},"counts_by_year":[{"year":2025,"cited_by_count":7}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
