{"id":"https://openalex.org/W4400912545","doi":"https://doi.org/10.1145/3665451.3665527","title":"Explainability versus Security: The Unintended Consequences of xAI in Cybersecurity","display_name":"Explainability versus Security: The Unintended Consequences of xAI in Cybersecurity","publication_year":2024,"publication_date":"2024-07-02","ids":{"openalex":"https://openalex.org/W4400912545","doi":"https://doi.org/10.1145/3665451.3665527"},"language":"en","primary_location":{"id":"doi:10.1145/3665451.3665527","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3665451.3665527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088536972","display_name":"Marek Pawlicki","orcid":"https://orcid.org/0000-0001-5881-6406"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Marek Pawlicki","raw_affiliation_strings":["ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047739580","display_name":"Aleksandra Pawlicka","orcid":"https://orcid.org/0000-0003-4380-014X"},"institutions":[{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]},{"id":"https://openalex.org/I4654613","display_name":"University of Warsaw","ror":"https://ror.org/039bjqg32","country_code":"PL","type":"education","lineage":["https://openalex.org/I4654613"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Aleksandra Pawlicka","raw_affiliation_strings":["ITTI Sp. z o.o., Pozna\u0144, Poland, University of Warsaw, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Pozna\u0144, Poland, University of Warsaw, Warsaw, Poland","institution_ids":["https://openalex.org/I4210118437","https://openalex.org/I4654613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042632349","display_name":"Rafa\u0142 Kozik","orcid":"https://orcid.org/0000-0001-7122-3306"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Kozik","raw_affiliation_strings":["ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009283476","display_name":"Micha\u0142 Chora\u015b","orcid":"https://orcid.org/0000-0003-1405-9911"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Micha\u0142 Chora\u015b","raw_affiliation_strings":["ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Pozna\u0144, Poland, Bydgoszcz University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088536972"],"corresponding_institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"],"apc_list":null,"apc_paid":null,"fwci":2.7786,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91485416,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6936014890670776},{"id":"https://openalex.org/keywords/unintended-consequences","display_name":"Unintended consequences","score":0.4704686105251312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4694843888282776},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.15550968050956726},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.06815311312675476}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6936014890670776},{"id":"https://openalex.org/C2776889888","wikidata":"https://www.wikidata.org/wiki/Q1135789","display_name":"Unintended consequences","level":2,"score":0.4704686105251312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4694843888282776},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.15550968050956726},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.06815311312675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3665451.3665527","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3665451.3665527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2746600820","https://openalex.org/W2911964244","https://openalex.org/W2945295328","https://openalex.org/W2984300342","https://openalex.org/W3013330736","https://openalex.org/W3028571922","https://openalex.org/W3036196701","https://openalex.org/W3083021344","https://openalex.org/W3104149808","https://openalex.org/W3106412272","https://openalex.org/W3161898103","https://openalex.org/W3163963286","https://openalex.org/W3164793088","https://openalex.org/W3189843092","https://openalex.org/W3204683301","https://openalex.org/W4256300792","https://openalex.org/W4294691140","https://openalex.org/W4297200214","https://openalex.org/W4300786339","https://openalex.org/W4307571902","https://openalex.org/W4388816499"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4367679432","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4248277314","https://openalex.org/W4387098652"],"abstract_inverted_index":{"The":[0,21,66,136],"rapid":[1],"advancement":[2],"of":[3,9,29,60,128,138,161],"Artificial":[4],"Intelligence":[5],"in":[6,45,152],"the":[7,27,35,39,46,58,70,99,126,133,142,159],"field":[8],"cybersecurity":[10],"brings":[11],"about":[12],"both":[13],"opportunity":[14],"and":[15,43,55,164],"vulnerability,":[16],"like":[17],"a":[18,53,145],"dual-edged":[19],"sword.":[20],"research":[22],"community":[23],"expressed":[24],"concerns":[25],"over":[26],"robustness":[28],"AI":[30,47,75],"against":[31],"adversarial":[32],"attacks,":[33],"at":[34],"same":[36],"time":[37],"escalating":[38],"demand":[40],"for":[41,105,144],"transparency":[42,163],"accountability":[44],"decision-making":[48],"process.":[49],"This":[50,92,117],"paper":[51,93,140],"highlights":[52],"critical":[54],"under-discussed":[56],"paradox:":[57],"pursuit":[59],"explainability":[61],"may":[62],"inadvertently":[63],"compromise":[64],"security.":[65],"argument":[67],"is":[68,94,118],"that":[69],"very":[71],"mechanisms":[72],"which":[73,156],"make":[74],"decisions":[76],"interpretable,":[77],"such":[78],"as":[79],"counterexamples,":[80],"can":[81,109],"also":[82],"reveal":[83],"strategic":[84],"insights":[85],"on":[86],"how":[87,98],"to":[88,96,112,124,149],"manipulate":[89],"model":[90,114,162,165],"outcomes.":[91],"first":[95],"demonstrate":[97],"Diverse":[100],"Counterfactual":[101],"Explanations":[102],"algorithm,":[103],"designed":[104],"generating":[106],"counterfactual":[107],"explanations,":[108],"be":[110],"exploited":[111],"alter":[113],"predictions":[115],"effectively.":[116],"achieved":[119],"by":[120],"crafting":[121],"samples":[122],"tailored":[123],"flip":[125],"labels":[127],"an":[129],"ML-based":[130],"detector,":[131],"breaching":[132],"model's":[134],"integrity.":[135],"findings":[137],"this":[139],"highlight":[141],"need":[143],"more":[146],"nuanced":[147],"approach":[148],"xAI":[150],"implementation":[151],"security-critical":[153],"systems,":[154],"one":[155],"would":[157],"balance":[158],"benefits":[160],"robustness.":[166]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2024-07-24T00:00:00"}
