{"id":"https://openalex.org/W4367059627","doi":"https://doi.org/10.1109/ms.2023.3246686","title":"Explainable AI for SE: Challenges and Future Directions","display_name":"Explainable AI for SE: Challenges and Future Directions","publication_year":2023,"publication_date":"2023-04-26","ids":{"openalex":"https://openalex.org/W4367059627","doi":"https://doi.org/10.1109/ms.2023.3246686"},"language":"en","primary_location":{"id":"doi:10.1109/ms.2023.3246686","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ms.2023.3246686","pdf_url":"https://ieeexplore.ieee.org/ielx7/52/10109325/10109341.pdf","source":{"id":"https://openalex.org/S6725529","display_name":"IEEE Software","issn_l":"0740-7459","issn":["0740-7459","1937-4194"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/52/10109325/10109341.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081449581","display_name":"Chakkrit Tantithamthavorn","orcid":"https://orcid.org/0000-0002-5516-9984"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Chakkrit Tantithamthavorn","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Clayton, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Clayton, Victoria, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033732305","display_name":"J\u00fcrgen Cito","orcid":"https://orcid.org/0000-0001-8619-1271"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"J\u00fcrgen Cito","raw_affiliation_strings":["Assistant Professor, TU Wien, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Assistant Professor, TU Wien, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091120726","display_name":"Hadi Hemmati","orcid":null},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hadi Hemmati","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, York University, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, York University, Toronto, ON, Canada","institution_ids":["https://openalex.org/I192455969"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101965118","display_name":"Satish Chandra","orcid":"https://orcid.org/0000-0003-2546-9000"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Satish Chandra","raw_affiliation_strings":["Research Scientist, Google, CA, USA"],"affiliations":[{"raw_affiliation_string":"Research Scientist, Google, CA, USA","institution_ids":["https://openalex.org/I1291425158"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081449581"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":null,"apc_paid":null,"fwci":10.01,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.98097606,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"40","issue":"3","first_page":"29","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7509136199951172},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.6560628414154053},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5991880893707275},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5784058570861816},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.502910315990448},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.4907110929489136},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4618801772594452},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.456306129693985},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4345543384552002},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.43085137009620667},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3908247649669647},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19448745250701904},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16505154967308044},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.1545962393283844},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13136756420135498}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7509136199951172},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.6560628414154053},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5991880893707275},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5784058570861816},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.502910315990448},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.4907110929489136},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4618801772594452},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.456306129693985},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4345543384552002},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.43085137009620667},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3908247649669647},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19448745250701904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16505154967308044},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.1545962393283844},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13136756420135498},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ms.2023.3246686","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ms.2023.3246686","pdf_url":"https://ieeexplore.ieee.org/ielx7/52/10109325/10109341.pdf","source":{"id":"https://openalex.org/S6725529","display_name":"IEEE Software","issn_l":"0740-7459","issn":["0740-7459","1937-4194"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Software","raw_type":"journal-article"},{"id":"pmh:oai:monash.edu:openaire/57de4d87-683d-447c-89c1-f643bc7f4836","is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/57de4d87-683d-447c-89c1-f643bc7f4836","pdf_url":"https://researchmgt.monash.edu/ws/files/470921037/470563218_oa.pdf","source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Tantithamthavorn, C, Cito, J, Hemmati, H & Chandra, S 2023, 'Explainable AI for SE : Challenges and future directions', IEEE Software, vol. 40, no. 3, pp. 29-33. https://doi.org/10.1109/MS.2023.3246686","raw_type":"article"},{"id":"pmh:oai:monash.edu:publications/57de4d87-683d-447c-89c1-f643bc7f4836","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85156104914&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Tantithamthavorn , C , Cito , J , Hemmati , H &amp; Chandra , S 2023 , ' Explainable AI for SE : Challenges and future directions ' , IEEE Software , vol. 40 , no. 3 , pp. 29-33 . https://doi.org/10.1109/MS.2023.3246686","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ms.2023.3246686","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ms.2023.3246686","pdf_url":"https://ieeexplore.ieee.org/ielx7/52/10109325/10109341.pdf","source":{"id":"https://openalex.org/S6725529","display_name":"IEEE Software","issn_l":"0740-7459","issn":["0740-7459","1937-4194"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Software","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1853486869","display_name":null,"funder_award_id":"DE200100941","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G4416570303","display_name":null,"funder_award_id":"DE200100941","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320325651","display_name":"Alberta Innovates","ror":null},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"},{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4367059627.pdf","grobid_xml":"https://content.openalex.org/works/W4367059627.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W2516809705","https://openalex.org/W2962862931","https://openalex.org/W2963998044","https://openalex.org/W3013745307","https://openalex.org/W3083954092","https://openalex.org/W3174750614","https://openalex.org/W4205601502","https://openalex.org/W4206241418","https://openalex.org/W4226169266","https://openalex.org/W4320854090","https://openalex.org/W4385245566","https://openalex.org/W6737947904","https://openalex.org/W6739901393","https://openalex.org/W6849885953"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W4210907385","https://openalex.org/W2212955619","https://openalex.org/W3124296310","https://openalex.org/W2161762274","https://openalex.org/W2070111972","https://openalex.org/W886427026","https://openalex.org/W4387411615","https://openalex.org/W2775582007"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"artificial":[3],"intelligence/machine":[4],"learning":[5],"(AI/ML)":[6],"have":[7],"been":[8],"widely":[9],"used":[10],"in":[11],"software":[12,19],"engineering":[13],"(SE)":[14],"to":[15],"improve":[16],"developer":[17,43],"productivity,":[18],"quality,":[20],"and":[21,50,52],"decision":[22],"making.":[23],"This":[24],"includes":[25],"well-known":[26],"tools":[27],"for":[28],"code":[29,37],"completion":[30],"(for":[31],"example,":[32],"GitHub\u2019s":[33],"Copilot)":[34],"but":[35],"also":[36],"search;":[38],"automated":[39,42,45],"task":[40],"recommendation;":[41,44],"defect/vulnerability/malware":[46],"prediction,":[47],"detection,":[48],"localization,":[49],"repair;":[51],"many":[53],"other":[54],"purposes.":[55]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
