Results 121 to 130 of about 23,034 (235)

Artificial Intelligence‐assisted Endoscopy and Examiner Confidence: A Study on Human–Artificial Intelligence Interaction in Barrett's Esophagus (With Video)

open access: yesDEN Open, Volume 6, Issue 1, April 2026.
ABSTRACT Objective Despite high stand‐alone performance, studies demonstrate that artificial intelligence (AI)‐supported endoscopic diagnostics often fall short in clinical applications due to human‐AI interaction factors. This video‐based trial on Barrett's esophagus aimed to investigate how examiner behavior, their levels of confidence, and system ...
David Roser   +13 more
wiley   +1 more source

SXAD: Shapely eXplainable AI-Based Anomaly Detection Using Log Data

open access: yesIEEE Access
Artificial Intelligence (AI) has made tremendous progress in anomaly detection. However, AI models work as a black-box, making it challenging to provide reasoning behind their judgments in a Log Anomaly Detection (LAD).
Kashif Alam   +4 more
doaj   +1 more source

Validating Explainer Methods: A Functionally Grounded Approach for Numerical Forecasting

open access: yesJournal of Forecasting, Volume 45, Issue 2, Page 819-836, March 2026.
ABSTRACT Forecasting systems have a long tradition in providing outputs accompanied by explanations. While the vast majority of such explanations relies on inherently interpretable linear statistical models, research has put forth eXplainable Artificial Intelligence (XAI) methods to improve the comprehensibility of nonlinear machine learning models. As
Felix Haag   +2 more
wiley   +1 more source

Human centred explainable AI decision-making in healthcare

open access: yesJournal of Responsible Technology
Human-centred AI (HCAI11 HCAI – Human-centred artificial intelligence) implies building AI systems in a manner that comprehends human aims, needs, and expectations by assisting, interacting, and collaborating with humans.
Catharina M. van Leersum, Clara Maathuis
doaj   +1 more source

Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior   +3 more
wiley   +1 more source

Counterfactual Explanations in Education: A Systematic Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Main challenges on counterfactual explanations in education. ABSTRACT Counterfactuals are a type of explanations based on hypothetical scenarios used in Explainable Artificial Intelligence (XAI), showing what changes in input variables could have led to different outcomes in predictive problems.
Pamela Buñay‐Guisñan   +2 more
wiley   +1 more source

Explainable artificial intelligence (XAI) in radiology and nuclear medicine: a literature review. [PDF]

open access: yesFront Med (Lausanne), 2023
de Vries BM   +5 more
europepmc   +1 more source

An AI Tutorial for Speech and Language Therapists: Translating Concepts From the AI Literature Into Accessible Knowledge and Clinically Relevant Applications

open access: yesInternational Journal of Language &Communication Disorders, Volume 61, Issue 2, March/April 2026.
ABSTRACT Background Artificial Intelligence (AI) is increasingly discussed as a tool that can support speech and language therapy (SLT). However, clinical adoption of AI requires improved AI literacy among clinicians. AI is a rapidly evolving and often inconsistently defined field that can be difficult to navigate.
Ana Oliveira‐Buckley   +3 more
wiley   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy