ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1906.02108
  4. Cited By
Evaluating Explanation Methods for Deep Learning in Security
v1v2v3v4 (latest)

Evaluating Explanation Methods for Deep Learning in Security

European Symposium on Security and Privacy (EuroS&P), 2019
5 June 2019
Alexander Warnecke
Dan Arp
Christian Wressnegger
Konrad Rieck
    XAIAAMLFAtt
ArXiv (abs)PDFHTML

Papers citing "Evaluating Explanation Methods for Deep Learning in Security"

29 / 29 papers shown
Evaluating Line-level Localization Ability of Learning-based Code Vulnerability Detection Models
Marco Pintore
Giorgio Piras
Angelo Sotgiu
Maura Pintor
Battista Biggio
AAML
82
0
0
13 Oct 2025
Investigating Feature Attribution for 5G Network Intrusion Detection
Investigating Feature Attribution for 5G Network Intrusion Detection
Federica Uccello
Simin Nadjm-Tehrani
FAtt
210
1
0
12 Sep 2025
Explainable AI-Guided Efficient Approximate DNN Generation for Multi-Pod Systolic Arrays
Explainable AI-Guided Efficient Approximate DNN Generation for Multi-Pod Systolic ArraysIEEE International Symposium on Quality Electronic Design (ISQED), 2025
Ayesha Siddique
Khurram Khalil
K. A. Hoque
165
1
0
20 Mar 2025
XAI-based Feature Selection for Improved Network Intrusion Detection
  Systems
XAI-based Feature Selection for Improved Network Intrusion Detection Systems
Osvaldo Arreche
Tanish Guntur
Mustafa Abdallah
AAML
187
9
0
14 Oct 2024
Evaluating The Explainability of State-of-the-Art Deep Learning-based Network Intrusion Detection Systems
Evaluating The Explainability of State-of-the-Art Deep Learning-based Network Intrusion Detection Systems
Ayush Kumar
V. Thing
315
1
0
26 Aug 2024
Towards consistency of rule-based explainer and black box model --
  fusion of rule induction and XAI-based feature importance
Towards consistency of rule-based explainer and black box model -- fusion of rule induction and XAI-based feature importance
M. Kozielski
Marek Sikora
Lukasz Wawrowski
325
5
0
16 Jul 2024
Good-looking but Lacking Faithfulness: Understanding Local Explanation
  Methods through Trend-based Testing
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based TestingConference on Computer and Communications Security (CCS), 2023
Jinwen He
Kai Chen
Guozhu Meng
Jiangshan Zhang
Congyi Li
FAttAAML
263
4
0
09 Sep 2023
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution
  to Facilitate Security Analysis
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security AnalysisConference on Computer and Communications Security (CCS), 2023
Yiling He
Jian Lou
Zhan Qin
Kui Ren
FAttAAML
192
15
0
10 Aug 2023
False Sense of Security: Leveraging XAI to Analyze the Reasoning and
  True Performance of Context-less DGA Classifiers
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA ClassifiersInternational Symposium on Recent Advances in Intrusion Detection (RAID), 2023
Arthur Drichel
Ulrike Meyer
139
9
0
10 Jul 2023
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity
  Analysis
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity AnalysisEuropean Symposium on Security and Privacy (Euro S&P), 2022
Haoyu He
Yuede Ji
H. H. Huang
178
28
0
26 Mar 2023
SoK: Modeling Explainability in Security Analytics for Interpretability,
  Trustworthiness, and Usability
SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and UsabilityARES (ARES), 2022
Dipkamal Bhusal
Rosalyn Shin
Ajay Ashok Shewale
M. K. Veerabhadran
Michael Clifford
Sara Rampazzi
Nidhi Rastogi
FAttAAML
286
15
0
31 Oct 2022
I still know it's you! On Challenges in Anonymizing Source Code
I still know it's you! On Challenges in Anonymizing Source CodeProceedings on Privacy Enhancing Technologies (PoPETs), 2022
Micha Horlboge
Erwin Quiring
R. Meyer
Konrad Rieck
198
4
0
26 Aug 2022
SoK: Explainable Machine Learning for Computer Security Applications
SoK: Explainable Machine Learning for Computer Security ApplicationsEuropean Symposium on Security and Privacy (Euro S&P), 2022
A. Nadeem
D. Vos
Clinton Cao
Luca Pajola
Simon Dieck
Robert Baumgartner
S. Verwer
362
63
0
22 Aug 2022
Don't Get Me Wrong: How to Apply Deep Visual Interpretations to Time Series
Don't Get Me Wrong: How to Apply Deep Visual Interpretations to Time Series
Christoffer Loeffler
Wei-Cheng Lai
Bjoern M. Eskofier
Dario Zanca
Lukas M. Schmidt
Christopher Mutschler
AI4TSFAtt
384
6
0
14 Mar 2022
Towards a consistent interpretation of AIOps models
Towards a consistent interpretation of AIOps modelsACM Transactions on Software Engineering and Methodology (TOSEM), 2022
Yingzhe Lyu
Gopi Krishnan Rajbahadur
Dayi Lin
Boyuan Chen
Zhen Ming
Z. Jiang
AI4CE
232
26
0
04 Feb 2022
A Survey on the Robustness of Feature Importance and Counterfactual
  Explanations
A Survey on the Robustness of Feature Importance and Counterfactual Explanations
Saumitra Mishra
Sanghamitra Dutta
Jason Long
Daniele Magazzeni
AAML
248
66
0
30 Oct 2021
DeepAID: Interpreting and Improving Deep Learning-based Anomaly
  Detection in Security Applications
DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security ApplicationsConference on Computer and Communications Security (CCS), 2021
Dongqi Han
Zhiliang Wang
Wenqi Chen
Ying Zhong
Su Wang
Han Zhang
Jiahai Yang
Xingang Shi
Xia Yin
AAML
164
104
0
23 Sep 2021
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
EG-Booster: Explanation-Guided Booster of ML Evasion AttacksConference on Data and Application Security and Privacy (CODASPY), 2021
Abderrahmen Amich
Birhanu Eshete
AAML
146
10
0
31 Aug 2021
A Survey on Data-driven Software Vulnerability Assessment and
  Prioritization
A Survey on Data-driven Software Vulnerability Assessment and PrioritizationACM Computing Surveys (CSUR), 2021
T. H. Le
Huaming Chen
Muhammad Ali Babar
436
109
0
18 Jul 2021
Productivity, Portability, Performance: Data-Centric Python
Productivity, Portability, Performance: Data-Centric Python
Yiheng Wang
Yao Zhang
Yanzhang Wang
Yan Wan
Jiao Wang
Zhongyuan Wu
Yuhao Yang
Bowen She
402
111
0
01 Jul 2021
Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Explanation-Guided Diagnosis of Machine Learning Evasion AttacksSecurity and Privacy in Communication Networks (SecureComm), 2021
Abderrahmen Amich
Birhanu Eshete
AAML
115
14
0
30 Jun 2021
Do not explain without context: addressing the blind spot of model
  explanations
Do not explain without context: addressing the blind spot of model explanations
Katarzyna Wo'znica
Katarzyna Pkekala
Hubert Baniecki
Wojciech Kretowicz
El.zbieta Sienkiewicz
P. Biecek
129
1
0
28 May 2021
Fooling Partial Dependence via Data Poisoning
Fooling Partial Dependence via Data Poisoning
Hubert Baniecki
Wojciech Kretowicz
P. Biecek
AAML
296
28
0
26 May 2021
Deep Learning for Android Malware Defenses: a Systematic Literature
  Review
Deep Learning for Android Malware Defenses: a Systematic Literature ReviewACM Computing Surveys (CSUR), 2021
Yue Liu
Chakkrit Tantithamthavorn
Li Li
Yepang Liu
AAML
267
104
0
09 Mar 2021
What Do You See? Evaluation of Explainable Artificial Intelligence (XAI)
  Interpretability through Neural Backdoors
What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural BackdoorsKnowledge Discovery and Data Mining (KDD), 2020
Yi-Shan Lin
Wen-Chuan Lee
Z. Berkay Celik
XAI
211
105
0
22 Sep 2020
Can We Trust Your Explanations? Sanity Checks for Interpreters in
  Android Malware Analysis
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis
Ming Fan
Wenying Wei
Xiaofei Xie
Yang Liu
X. Guan
Ting Liu
FAttAAML
288
44
0
13 Aug 2020
Do Gradient-based Explanations Tell Anything About Adversarial
  Robustness to Android Malware?
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?International Journal of Machine Learning and Cybernetics (IJMLC), 2020
Marco Melis
Michele Scalas
Ambra Demontis
Davide Maiorca
Battista Biggio
Giorgio Giacinto
Fabio Roli
AAMLFAtt
153
29
0
04 May 2020
Evaluating and Aggregating Feature-based Model Explanations
Evaluating and Aggregating Feature-based Model ExplanationsInternational Joint Conference on Artificial Intelligence (IJCAI), 2020
Umang Bhatt
Adrian Weller
J. M. F. Moura
XAI
337
269
0
01 May 2020
Quantification and Analysis of Layer-wise and Pixel-wise Information
  Discarding
Quantification and Analysis of Layer-wise and Pixel-wise Information DiscardingInternational Conference on Machine Learning (ICML), 2019
Haotian Ma
Hao Zhang
Fan Zhou
Yinqing Zhang
Quanshi Zhang
FAtt
116
1
0
10 Jun 2019
1