{"id":"https://openalex.org/W7129391619","doi":"https://doi.org/10.48550/arxiv.2602.13271","title":"Human-Centered Explainable AI for Security Enhancement: A Deep Intrusion Detection Framework","display_name":"Human-Centered Explainable AI for Security Enhancement: A Deep Intrusion Detection Framework","publication_year":2026,"publication_date":"2026-02-04","ids":{"openalex":"https://openalex.org/W7129391619","doi":"https://doi.org/10.48550/arxiv.2602.13271"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.13271","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.13271","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.13271","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5118175760","display_name":"Md. Muntasir Jahid Ayan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ayan, Md Muntasir Jahid","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112736804","display_name":"Md. Shahriar Rashid","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rashid, Md. Shahriar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126268622","display_name":"Tazzina Afroze Hassan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hassan, Tazzina Afroze","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103108449","display_name":"Hossain Md. Mubashshir Jamil","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jamil, Hossain Md. Mubashshir","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060683506","display_name":"M. Nazrul Islam","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Islam, Mahbubul","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102798133","display_name":"Al Amin","orcid":"https://orcid.org/0009-0007-4547-5025"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amin, Lisan Al","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075808263","display_name":"Rupak Kumar Das","orcid":"https://orcid.org/0000-0002-1470-5998"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Das, Rupak Kumar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102975713","display_name":"Farzana Akter","orcid":"https://orcid.org/0000-0003-3017-8742"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Akter, Farzana","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126191010","display_name":"Faisal Quader","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Quader, Faisal","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5118175760"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.60589998960495,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.60589998960495,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.09459999948740005,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.058800000697374344,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.713100016117096},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.6425999999046326},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6367999911308289},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6001999974250793},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5077000260353088},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.40299999713897705},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.38040000200271606},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.3797000050544739}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7910000085830688},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.713100016117096},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7035999894142151},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.6425999999046326},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6367999911308289},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6001999974250793},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.588699996471405},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5077000260353088},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.40299999713897705},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.38040000200271606},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3797000050544739},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.35679998993873596},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.302700012922287},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28119999170303345},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.2662999927997589},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2630999982357025},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2556999921798706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.13271","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.13271","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.13271","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.13271","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,40,62],"increasing":[1],"complexity":[2],"and":[3,57,70,91,106,114,139,150,170,184,194,199],"frequency":[4],"of":[5,191],"cyber-threats":[6],"demand":[7],"intrusion":[8],"detection":[9],"systems":[10],"(IDS)":[11],"that":[12,27,88],"are":[13],"not":[14],"only":[15],"accurate":[16],"but":[17],"also":[18,161],"interpretable.":[19],"This":[20,186],"paper":[21],"presented":[22],"a":[23,163],"novel":[24],"IDS":[25,56],"framework":[26,41],"integrated":[28],"Explainable":[29],"Artificial":[30],"Intelligence":[31],"(XAI)":[32],"to":[33,54,137,179],"enhance":[34],"transparency":[35,195],"in":[36,80,196],"deep":[37,59,84],"learning":[38,60,85,205],"models.":[39,61],"was":[42,132],"evaluated":[43],"experimentally":[44],"using":[45],"the":[46,125,181,189],"benchmark":[47],"dataset":[48],"NSL-KDD,":[49],"demonstrating":[50],"superior":[51],"performance":[52,193],"compared":[53],"traditional":[55],"black-box":[58],"proposed":[63],"approach":[64],"combined":[65],"Convolutional":[66],"Neural":[67],"Network":[68],"(CNN)":[69],"Long":[71],"Short-Term":[72],"Memory":[73],"(LSTM)":[74],"networks":[75],"for":[76,95,152,206],"capturing":[77],"temporal":[78],"dependencies":[79],"traffic":[81],"sequences.":[82],"Our":[83],"results":[86],"showed":[87],"both":[89,117,153],"CNN":[90,100],"LSTM":[92,98],"reached":[93],"0.99":[94],"accuracy,":[96],"whereas":[97],"outperformed":[99],"at":[101],"macro":[102],"average":[103,111],"precision,":[104,112],"recall,":[105,113],"F-1":[107,115],"score.":[108],"For":[109],"weighted":[110],"score,":[116],"models":[118],"scored":[119],"almost":[120],"similarly.":[121],"To":[122],"ensure":[123],"interpretability,":[124],"XAI":[126],"model":[127,141],"SHapley":[128],"Additive":[129],"exPlanations":[130],"(SHAP)":[131],"incorporated,":[133],"enabling":[134],"security":[135],"analysts":[136],"understand":[138],"validate":[140],"decisions.":[142],"Some":[143],"notable":[144],"influential":[145],"features":[146],"were":[147],"srv_serror_rate,":[148],"dst_host_srv_serror_rate,":[149],"serror_rate":[151],"models,":[154],"as":[155],"pointed":[156],"out":[157],"by":[158],"SHAP.":[159],"We":[160],"conducted":[162],"trust-focused":[164],"expert":[165],"survey":[166],"based":[167],"on":[168],"IPIP6":[169],"Big":[171],"Five":[172],"personality":[173],"traits":[174],"via":[175],"an":[176],"interactive":[177],"UI":[178],"evaluate":[180],"system's":[182],"reliability":[183],"usability.":[185],"work":[187],"highlighted":[188],"potential":[190],"combining":[192],"cybersecurity":[197],"solutions":[198],"recommends":[200],"future":[201],"enhancements":[202],"through":[203],"adaptive":[204],"real-time":[207],"threat":[208],"detection.":[209]},"counts_by_year":[],"updated_date":"2026-02-18T06:25:47.457606","created_date":"2026-02-18T00:00:00"}
