<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Unraveling Anomalies: Explaining Outliers with DTOR ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Riccardo</forename><surname>Crupi</surname></persName>
							<email>riccardo.crupi@intesasanpaolo.com</email>
							<affiliation key="aff0">
								<orgName type="department">Data Science &amp; Artificial Intelligence</orgName>
								<orgName type="institution">Intesa Sanpaolo</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Daniele</forename><surname>Regoli</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Data Science &amp; Artificial Intelligence</orgName>
								<orgName type="institution">Intesa Sanpaolo</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alessandro</forename><surname>Damiano Sabatino</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Data Science &amp; Artificial Intelligence</orgName>
								<orgName type="institution">Intesa Sanpaolo</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Immacolata</forename><surname>Marano</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Audit Data &amp; Advanced Analytics</orgName>
								<orgName type="institution">Intesa Sanpaolo</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Massimiliano</forename><surname>Brinis</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Audit Data &amp; Advanced Analytics</orgName>
								<orgName type="institution">Intesa Sanpaolo</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Luca</forename><surname>Albertazzi</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Audit Data &amp; Advanced Analytics</orgName>
								<orgName type="institution">Intesa Sanpaolo</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Cirillo</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Audit Data &amp; Advanced Analytics</orgName>
								<orgName type="institution">Intesa Sanpaolo</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><forename type="middle">Claudio</forename><surname>Cosentini</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Data Science &amp; Artificial Intelligence</orgName>
								<orgName type="institution">Intesa Sanpaolo</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Unraveling Anomalies: Explaining Outliers with DTOR ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">B5CE62BB17365CE603914E4D8EF7298E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:36+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Outlier detection, Explainability, Decision Tree R. Crupi) 0009-0005-6714-5161 (R. Crupi)</term>
					<term>0000-0003-2711-8343 (D. Regoli)</term>
					<term>0000-0002-1336-2057 (A. D. Sabatino)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Explaining outliers' occurrence and mechanisms is crucial across various domains, as malfunctions, frauds, and threats require valid explanations for effective countermeasures. With the increasing use of sophisticated Machine Learning techniques to identify anomalies, explaining their presence becomes more challenging. Our proposed Decision Tree Outlier Regressor (DTOR) addresses this challenge by providing rule-based explanations for individual data points using anomaly scores from a detection model. By leveraging a Decision Tree Regressor to compute estimation scores and extracting relative paths, DTOR illustrates its effectiveness across different anomaly detectors and diverse datasets, including those with numerous features.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Internal audit in the banking sector is crucial for evaluating operational integrity and efficiency, assessing internal controls, risk management processes, and regulatory compliance. Anomaly detection techniques play a vital role in identifying atypical patterns and outliers within data populations analyzed for audit purposes, assisting in risk mitigation and fraud detection. However, ensuring the effective utilization of these techniques requires the ability to explain why certain records are considered anomalies, particularly for internal auditors with limited data analytics expertise <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>Among various anomaly detection techniques, Isolation Forest <ref type="bibr" target="#b2">[3]</ref>, One-Class SVM <ref type="bibr" target="#b3">[4]</ref>, and Gaussian Mixture Models <ref type="bibr" target="#b4">[5]</ref> are prominent anomaly detection techniques widely employed in practical applications <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>. These methods leverage diverse mathematical principles to detect anomalies efficiently. However, their interpretability may be limited, necessitating explainable artificial intelligence (XAI) techniques to elucidate model decisions, ensure transparency, and enhance trust in AI-driven decisions <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10]</ref>.</p><p>To meet this requirement, we introduce a novel model-agnostic XAI framework specifically designed for anomaly detection in the banking sector. Unlike conventional XAI methods that primarily focus on feature importance (e.g., SHAP and DIFFI <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>), our framework generates easily understandable rules to elucidate model predictions, thereby enhancing transparency and fostering trust in AI-driven decisions. Notable techniques such as LORE, RuleXAI, and Anchors <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b12">13]</ref> exemplify this approach.</p><p>Our approach aims to bridge the divide between interpretability and effectiveness in anomaly detection by offering human-understandable rules that clarify the rationales behind anomalous predictions. Relevant works in this domain include <ref type="bibr" target="#b13">[14]</ref> and <ref type="bibr" target="#b14">[15]</ref>, focusing on online anomaly explanation and providing a survey of explainable anomaly detection methods, respectively. By harnessing rule-based explanations, our XAI framework ensures transparency and accessibility in the decision-making process of anomaly detection models for data scientists, domain experts, and colleagues in the banking industry.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Method</head><p>Our novel XAI method, inspired by the principles of the Isolation Forest algorithm, takes advantage of the concept of isolating anomalies with minimal cuts in the feature space. To provide clear explanations for anomaly detection decisions, we use decision tree regressors. In our approach, a decision tree regressor is trained to learn the anomaly scores assigned to each data point generated by the Anomaly Detector. Notably, during training, we introduce a weighted loss function that gives a significantly higher weight to the data point under consideration. This weighting scheme ensures that the decision tree regressor prioritizes accurate estimation of the anomaly score for the target data point, thereby improving the interpretability and reliability of the local explanation. After training the decision tree, extracting the path of the datapoint can provide an interpretable rule for the anomaly score (algorithm 1). The implementation of DTOR at the following link can be accessed online 1</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Experiments</head><p>This section delineates the configurations of three Anomaly Detector models trained on two public datasets and one private dataset from Intesa Sanpaolo (see Table <ref type="table" target="#tab_1">1</ref>), offering explanations using both Anchors and DTOR. The DTOR method and the experiments conducted on public datasets are available in the GitHub repository accessible via the following link: https://github. com/rcrupiISP/DTOR.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 1:</head><p>The DTOR approach generates explanations for a given instance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>def explain_instance:</head><p>input : (𝑥 e , 𝑦 ˆe): the sample to be explained along its corresponding score from the AD; </p><formula xml:id="formula_0">(</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Datasets and AD models</head><p>Utilizing the novel XAI technique across various datasets aims to assess its effectiveness in explaining different types of anomalies learned by unsupervised Machine Learning models. The chosen Anomaly Detector models include IF, One-class SVM, and GMM <ref type="bibr" target="#b16">[17]</ref>. Default parameters were opted for, as the primary objective of this study is to comprehend the explanation rather than optimize a performance metric specific to the dataset problem. Therefore, three distinct models were chosen to reason in different ways. The dataset was partitioned into training and testing sets. Specifically, the test set comprises 50 samples from each dataset, containing both anomalies and normal data points. The anomalies for GMM are defined to represent 5% of the training set, as well as for the isolation forest using the contamination hyperparameter set to 0.05. Default hyperparameters were retained for the SVM (kernel: radial basis function, 𝜈 = 0.5, representing the upper bound on the fraction of training errors), resulting in anomalies representing about 50% of the training set.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Rule-based XAI</head><p>We explore various explainability techniques, focusing on rule-based explanations due to challenges in interpreting feature importance methods like SHAP and DIFFI, especially with high-dimensional datasets. Initially, Anchors were used to explain the banking dataset, but we found limitations, such as the inability to reason on regression tasks and constraints in model implementation, leading to the development of DTOR. In addition to Anchors and DTOR, we considered LORE and RuleXAI. However, LORE requires extensive hyperparameter tuning, increasing implementation complexity. Additionally, RuleXAI is not actively maintained, with outdated Python library requirements. For future work, we plan to compare DTOR with other explainability techniques.</p><p>We adopt a perspective of providing rule-based explanations to Data Scientists, summarizing examples in Table <ref type="table" target="#tab_2">2</ref> with four key metrics: execution time, coverage, and rule length. For DTOR, we set specific hyperparameters tailored to the banking dataset, ensuring both quantity and quality of explanations. However, a dataset-specific approach is crucial to identifying the optimal anomaly detector and evaluating explanation quality effectively. The hyperparameters for DTOR are carefully chosen, with the max depth set to 8, the min impurity decrease to 10 −5 , and the weight 𝛽 for learning the rule to 0.1 * 𝑁 , suitable for unbalanced datasets with anomalies. DTOR estimates the anomaly score rather than a binary output, and the same threshold used in anomaly detection models is applied to determine anomalies. While not detailed here, each rule output by DTOR provides both precision and average anomaly score, enhancing informativeness. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Discussion and conclusion</head><p>The findings derived from the DTOR algorithm provide significant insights into both anomaly detection and explainability methodologies. Notably, we observed a consistent trend towards shorter explanations for anomalies across various anomaly detection (AD) models and datasets, as evidenced by examples in Table <ref type="table" target="#tab_2">2</ref>, particularly instances with IDs 1 and 2. Conversely, instance ID 3 presents a lengthier explanation. This observation may align with the strategy employed by the Isolation Forest, which aims to isolate anomalies through a minimal number of steps. DTOR, by design, follows a similar path, leveraging the locally trained decision tree to isolate the sample. If the sample is an outlier, it can be easily separated with fewer steps, whereas non-outliers may require more complex separation. It's worth noting that our comparison was conducted against a surrogate classifier model, while our contribution introduces a surrogate regressor model. This distinction allows us not only to provide the rule but also to estimate the anomaly detection (AD) score, offering nuanced insights beyond binary classification tasks. Instance ID 1 showcases three distinct explanations, underscoring the variability introduced by different AD models and potential feature correlations. This phenomenon illustrates the Rashomon effect in explainability <ref type="bibr" target="#b17">[18]</ref>, where multiple plausible explanations coexist.</p><p>Although the execution time for generating explanations typically falls within seconds, it slightly increases for the banking dataset due to its larger sample size, necessitating additional computational resources. Looking ahead, further analysis is warranted to delve into these explanations in depth and compare them with state-of-the-art rule-based explainability techniques. Key metrics such as precision, coverage, and stability will be evaluated to assess the effectiveness of DTOR and its potential advantages over existing methods. For a more detailed analysis on the state of the art, performance and comparison experiments with Anchors, please refer to <ref type="bibr" target="#b18">[19]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>𝑋 t , 𝑦 ˆt): a train set and its corresponding scores from the AD; 𝛽: training weight associated to 𝑥 e ; h: list of parameters of the decision tree; output : a list of rules explaining the instance (𝑥 e , 𝑦 ˆe) 𝑁 ← len(𝑋 t ); model ← DecisionTreeRegressor(h); /* append the sample 𝑒 in the train set */ 𝑋 ˆ← concat 𝑋 t with 𝑥 e ; 𝑦 ˆ← concat 𝑦 ˆt with 𝑦 ˆe; /* build the array of weights that gives more importance in the loss function to the sample 𝑥 e</figDesc><table /><note>*/ 𝜔 ← concat 1 𝑁 with 𝛽; /* train the DT to the weighted configuration */ model.fit((𝑋 ˆ, 𝑦 ˆ), sample_wights=𝜔); /* retrieve the path taken by 𝑥 e in the decision tree */ rule ← 𝑒𝑥𝑡𝑟𝑎𝑐𝑡_𝑝𝑎𝑡ℎ(model, 𝑥 e ); return rule</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc>Summary of Dataset Characteristics: Each item comprises information about a dataset, including its identifier (Dataset), dataset size (# instances), variables count (# columns), and a brief description (Description). The datasets were collected from the UCI Machine Learning Repository<ref type="bibr" target="#b15">[16]</ref>.</figDesc><table><row><cell>Dataset</cell><cell cols="3"># instances # columns Description</cell></row><row><cell>Banking (B)</cell><cell>100,000</cell><cell>26</cell><cell>Dataset obtained from Intesa</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Sanpaolo Bank was used for</cell></row><row><cell></cell><cell></cell><cell></cell><cell>anomaly identification and im-</cell></row><row><cell></cell><cell></cell><cell></cell><cell>proved client analysis to dis-</cell></row><row><cell></cell><cell></cell><cell></cell><cell>cover probable instances of</cell></row><row><cell></cell><cell></cell><cell></cell><cell>fraud or criminal conduct.</cell></row><row><cell>Glass Identification (GI)</cell><cell>214</cell><cell>9</cell><cell>This information comes from</cell></row><row><cell></cell><cell></cell><cell></cell><cell>the USA Forensic Science Ser-</cell></row><row><cell></cell><cell></cell><cell></cell><cell>vice and includes six different</cell></row><row><cell></cell><cell></cell><cell></cell><cell>glass kinds, each distinguished</cell></row><row><cell></cell><cell></cell><cell></cell><cell>by its oxide composition.</cell></row><row><cell>Lymphography (L)</cell><cell>148</cell><cell>19</cell><cell>The lymphography dataset was</cell></row><row><cell></cell><cell></cell><cell></cell><cell>obtained from the University</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Medical Center, Institute of On-</cell></row><row><cell></cell><cell></cell><cell></cell><cell>cology, in Ljubljana, Yugoslavia.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2</head><label>2</label><figDesc>Examples of anomaly detection exlpaination on different datasets. The table includes information such as dataset name, example ID, anomaly detection (AD) model used, AD score, whether the instance is predicted by the AD model as an anomaly, coverage percentage, length of the detection rule, the detection rule itself, and the execution time in seconds.</figDesc><table><row><cell cols="2">Dataset Example</cell><cell>AD</cell><cell>AD</cell><cell cols="2">Anomaly Coverage</cell><cell>Rule</cell><cell>Rule</cell><cell>Execution</cell></row><row><cell></cell><cell>ID</cell><cell>model</cell><cell>score</cell><cell></cell><cell>(%)</cell><cell>length</cell><cell></cell><cell>time (s)</cell></row><row><cell>GI</cell><cell>1</cell><cell cols="2">SVM 0.32</cell><cell>True</cell><cell>19</cell><cell>2</cell><cell>Mg ≤ 3 AND K &gt; 0</cell><cell>2.1</cell></row><row><cell>GI</cell><cell>1</cell><cell>IF</cell><cell>-0.69</cell><cell>True</cell><cell>1.8</cell><cell>3</cell><cell>Si ≤ 71.3 AND Na ≤</cell><cell>3.9</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>13.4 AND Na &gt; 12</cell><cell></cell></row><row><cell>GI</cell><cell>1</cell><cell cols="2">GMM -650</cell><cell>True</cell><cell>0.6</cell><cell>2</cell><cell cols="2">K &gt; 7 AND Al &gt; 3.37 2.4</cell></row><row><cell>B</cell><cell>2</cell><cell>IF</cell><cell>-0.53</cell><cell>True</cell><cell>0.4</cell><cell>2</cell><cell>'Appraisal time' &gt; 47</cell><cell>16</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>AND 'Flag proposal'</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>= True</cell><cell></cell></row><row><cell>L</cell><cell>3</cell><cell>IF</cell><cell>-0.49</cell><cell>False</cell><cell>8.1</cell><cell>7</cell><cell>'bl. of lymph. s' ≤</cell><cell>3.5</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>1.5 AND 'lym.nodes</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>enlar' &gt; 2 AND 're-</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>generation of' ≤ 1.5</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>AND 'dislocation of'</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>&gt; 1.5 AND 'changes</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>in stru' &gt; 1.5 AND</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>'by pass' &gt; 1.5 AND</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>'special forms' &gt; 1.5</cell><cell></cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://github.com/rcrupiISP/DTOR.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Unsupervised anomaly detection for internal auditing: Literature review and research agenda</title>
		<author>
			<persName><forename type="first">J</forename><surname>Nonnenmacher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Gómez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Digital Accounting Research</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Disambiguation of company names via deep recurrent networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Basile</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Crupi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Grasso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mercanti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Regoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Scarsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Cosentini</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eswa.2023.122035</idno>
	</analytic>
	<monogr>
		<title level="j">Expert Systems with Applications</title>
		<imprint>
			<biblScope unit="volume">238</biblScope>
			<biblScope unit="page">122035</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Isolation forest</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">T</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Ting</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z.-H</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">in: 2008 eighth ieee international conference on data mining</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="413" to="422" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Support vector method for novelty detection</title>
		<author>
			<persName><forename type="first">B</forename><surname>Schölkopf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Williamson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Smola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Shawe-Taylor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Platt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Advances in neural information processing systems</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Gaussian mixture models</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Reynolds</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Encyclopedia of biometrics</title>
		<imprint>
			<biblScope unit="volume">741</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">PyOD: A python toolbox for scalable outlier detection</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Nasrullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<ptr target="http://jmlr.org/papers/v20/19-011.html" />
	</analytic>
	<monogr>
		<title level="j">Journal of Machine Learning Research</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="1" to="7" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Detecting anomalous online reviewers: An unsupervised approach using mixture models</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Venugopal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Qiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Management Information Systems</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="1313" to="1346" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">From local explanations to global understanding with explainable ai for trees</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Lundberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Erion</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Degrave</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Prutkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Katz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Himmelfarb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Bansal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-I</forename><surname>Lee</surname></persName>
		</author>
		<idno type="DOI">10.1038/s42256-019-0138-9</idno>
	</analytic>
	<monogr>
		<title level="j">Nature machine intelligence</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="56" to="67" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Interpretable anomaly detection with diffi: Depth-based feature importance of isolation forest</title>
		<author>
			<persName><forename type="first">M</forename><surname>Carletti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Terzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">A</forename><surname>Susto</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.engappai.2022.105730</idno>
	</analytic>
	<monogr>
		<title level="j">Engineering Applications of Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">119</biblScope>
			<biblScope unit="page">105730</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Counterfactual explanations as interventions in latent space</title>
		<author>
			<persName><forename type="first">R</forename><surname>Crupi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Castelnovo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Regoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>San</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Miguel</forename><surname>Gonzalez</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10618-022-00889-2</idno>
	</analytic>
	<monogr>
		<title level="j">Data Mining and Knowledge Discovery</title>
		<imprint>
			<biblScope unit="page" from="1" to="37" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Guidotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Monreale</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ruggieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Pedreschi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Turini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Giannotti</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1805.10820</idno>
		<ptr target="https://arxiv.org/abs/1805.10820" />
		<title level="m">Local rule-based explanations of black box decision systems</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Rulexai-a package for rule-based explanations of machine learning model</title>
		<author>
			<persName><forename type="first">D</forename><surname>Macha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kozielski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ł</forename><surname>Wróbel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sikora</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SoftwareX</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page">101209</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Anchors: High-precision model-agnostic explanations</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Guestrin</surname></persName>
		</author>
		<idno type="DOI">10.1609/aaai.v32i1.11491</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the AAAI Conference on Artificial Intelligence</title>
				<meeting>the AAAI Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">32</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Online anomaly explanation: a case study on predictive maintenance</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">P</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Mastelini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Davari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Aminian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Veloso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gama</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Joint European Conference on Machine Learning and Knowledge Discovery in Databases</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="383" to="399" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A survey on explainable anomaly detection</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Van Leeuwen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Knowledge Discovery from Data</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="1" to="54" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Frank</surname></persName>
		</author>
		<ptr target="http://archive.ics.uci.edu/ml" />
		<title level="m">Uci machine learning repository</title>
				<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Scikit-learn: Machine learning in python</title>
		<author>
			<persName><forename type="first">F</forename><surname>Pedregosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Varoquaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gramfort</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Michel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Thirion</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Grisel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Blondel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Prettenhofer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Weiss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dubourg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">the Journal of machine Learning research</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="2825" to="2830" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Mitigating the rashomon effect in counterfactual explanation: A game-theoretic approach</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G M M</forename><surname>Hasan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Talbert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The International FLAIRS Conference Proceedings</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">35</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Crupi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">D</forename><surname>Sabatino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Marano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Brinis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Albertazzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cirillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Cosentini</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2403.10903</idno>
		<title level="m">Dtor: Decision tree outlier regressor to explain anomalies</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
