{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T21:56:36Z","timestamp":1778104596840,"version":"3.51.4"},"reference-count":87,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T00:00:00Z","timestamp":1744329600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000943","name":"Commonwealth Scientific and Industrial Research Organisation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000943","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008242","name":"CSIRO Data61 Business Unit","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1016\/j.eswa.2025.127318","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T22:01:18Z","timestamp":1744149678000},"page":"127318","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["A<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" altimg=\"si8.svg\" display=\"inline\" id=\"d1e3562\"><mml:msup><mml:mrow\/><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><\/mml:msup><\/mml:math>C: A modular multi-stage collaborative decision framework for human\u2013AI teams"],"prefix":"10.1016","volume":"282","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9090-0579","authenticated-orcid":false,"given":"Shahroz","family":"Tariq","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6138-7742","authenticated-orcid":false,"given":"Mohan","family":"Baruwal Chhetri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3816-0176","authenticated-orcid":false,"given":"Cecile","family":"Paris","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2025.127318_b1","doi-asserted-by":"crossref","unstructured":"Abdalla, H. B., Awlla, A. H., Kumar, Y., & Cheraghy, M. (2024). Big Data: Past, Present, and Future Insights. In Proceedings of the 2024 Asia Pacific conference on computing technologies, communications and networking (pp. 60\u201370).","DOI":"10.1145\/3685767.3685777"},{"key":"10.1016\/j.eswa.2025.127318_b2","series-title":"2021 IEEE\/ACM 1st workshop on AI engineering - software engineering for AI","first-page":"113","article-title":"Adaptive autonomy in human-on-the-loop vision-based robotics systems","author":"Abraham","year":"2021"},{"key":"10.1016\/j.eswa.2025.127318_b3","series-title":"Llm inference performance engineering: Best practices","author":"Agarwal","year":"2023"},{"key":"10.1016\/j.eswa.2025.127318_b4","first-page":"1","article-title":"Zero-day attack detection: a systematic literature review","author":"Ahmad","year":"2023","journal-title":"Artificial Intelligence Review"},{"key":"10.1016\/j.eswa.2025.127318_b5","series-title":"Concrete problems in AI safety","author":"Amodei","year":"2016"},{"key":"10.1016\/j.eswa.2025.127318_b6","series-title":"International conference on learning representations","article-title":"Uncertainty sets for image classifiers using conformal prediction","author":"Angelopoulos","year":"2021"},{"issue":"9","key":"10.1016\/j.eswa.2025.127318_b7","doi-asserted-by":"crossref","first-page":"442","DOI":"10.3390\/systems11090442","article-title":"A literature review of human\u2013AI synergy in decision making: From the perspective of affordance actualization theory","volume":"11","author":"Bao","year":"2023","journal-title":"Systems"},{"issue":"3","key":"10.1016\/j.eswa.2025.127318_b8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3670009","article-title":"Towards human-AI teaming to mitigate alert fatigue in security operations centres","volume":"24","author":"Baruwal Chhetri","year":"2024","journal-title":"ACM Transactions on Internet Technology"},{"key":"10.1016\/j.eswa.2025.127318_b9","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., & Steger, C. (2020). Uninformed students: Student-teacher anomaly detection with discriminative latent embeddings. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 4183\u20134192).","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"10.1016\/j.eswa.2025.127318_b10","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Machine Learning"},{"key":"10.1016\/j.eswa.2025.127318_b11","series-title":"A survey on mixture of experts","author":"Cai","year":"2024"},{"key":"10.1016\/j.eswa.2025.127318_b12","article-title":"Human-AI ensembles: When can they work?","author":"Choudhary","year":"2023","journal-title":"Journal of Management"},{"issue":"1","key":"10.1016\/j.eswa.2025.127318_b13","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TIT.1970.1054406","article-title":"On optimum recognition error and reject tradeoff","volume":"16","author":"Chow","year":"1970","journal-title":"Institute of Electrical and Electronics Engineers. Transactions on Information Theory"},{"key":"10.1016\/j.eswa.2025.127318_b14","series-title":"Algorithmic learning theory: 27th international conference, ALT 2016, bari, Italy, October 19-21, 2016, proceedings 27","first-page":"67","article-title":"Learning with rejection","author":"Cortes","year":"2016"},{"key":"10.1016\/j.eswa.2025.127318_b15","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Machine Learning"},{"key":"10.1016\/j.eswa.2025.127318_b16","series-title":"The impact of security alert overload","author":"CriticalStart.com","year":"2019"},{"key":"10.1016\/j.eswa.2025.127318_b17","first-page":"2611","article-title":"Regression under human assistance","volume":"vol. 34","author":"De","year":"2020"},{"issue":"2","key":"10.1016\/j.eswa.2025.127318_b18","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/s12369-019-00596-x","article-title":"Towards a theory of longitudinal trust calibration in human\u2013robot teams","volume":"12","author":"De Visser","year":"2020","journal-title":"International Journal of Social Robotics"},{"key":"10.1016\/j.eswa.2025.127318_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119898","article-title":"On generating trustworthy counterfactual explanations","volume":"655","author":"Del Ser","year":"2024","journal-title":"Information Sciences"},{"key":"10.1016\/j.eswa.2025.127318_b20","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11704-019-8208-z","article-title":"A survey on ensemble learning","volume":"14","author":"Dong","year":"2020","journal-title":"Frontiers of Computer Science"},{"key":"10.1016\/j.eswa.2025.127318_b21","series-title":"Proc. 1st antiPhishing shared pilot 4th ACM int. workshop secur. privacy anal.","first-page":"1","article-title":"Anti-phishing pilot at ACM IWSPA 2018","author":"El Aassal","year":"2018"},{"key":"10.1016\/j.eswa.2025.127318_b22","article-title":"Selective classification for deep neural networks","volume":"30","author":"Geifman","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.127318_b23","series-title":"International conference on machine learning","first-page":"2151","article-title":"Selectivenet: A deep neural network with an integrated reject option","author":"Geifman","year":"2019"},{"key":"10.1016\/j.eswa.2025.127318_b24","series-title":"International conference on learning representations","article-title":"Bias-reduced uncertainty estimation for deep neural classifiers","author":"Geifman","year":"2019"},{"key":"10.1016\/j.eswa.2025.127318_b25","doi-asserted-by":"crossref","unstructured":"Gong, D., Liu, L., Le, V., Saha, B., Mansour, M. R., Venkatesh, S., & Hengel, A. v. d. (2019). Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In Proceedings of the IEEE\/CVF international conference on computer vision (pp. 1705\u20131714).","DOI":"10.1109\/ICCV.2019.00179"},{"issue":"11","key":"10.1016\/j.eswa.2025.127318_b26","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.eswa.2025.127318_b27","series-title":"International conference on machine learning","first-page":"3711","article-title":"DROCC: Deep robust one-class classification","author":"Goyal","year":"2020"},{"issue":"1","key":"10.1016\/j.eswa.2025.127318_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-019-0206-3","article-title":"Uncertainty in big data analytics: survey, opportunities, and challenges","volume":"6","author":"Hariri","year":"2019","journal-title":"Journal of Big Data"},{"key":"10.1016\/j.eswa.2025.127318_b29","series-title":"Proceedings of the thirty-first international joint conference on artificial intelligence","first-page":"2478","article-title":"Forming effective human-AI teams: Building machine learning models that complement the capabilities of multiple experts","author":"Hemmer","year":"2022"},{"key":"10.1016\/j.eswa.2025.127318_b30","series-title":"Machine learning with a reject option: A survey","author":"Hendrickx","year":"2021"},{"issue":"5","key":"10.1016\/j.eswa.2025.127318_b31","doi-asserted-by":"crossref","first-page":"3073","DOI":"10.1007\/s10994-024-06534-x","article-title":"Machine learning with a reject option: A survey","volume":"113","author":"Hendrickx","year":"2024","journal-title":"Machine Learning"},{"issue":"2","key":"10.1016\/j.eswa.2025.127318_b32","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s40708-016-0042-6","article-title":"Interactive machine learning for health informatics: when do we need the human-in-the-loop?","volume":"3","author":"Holzinger","year":"2016","journal-title":"Brain Informatics"},{"key":"10.1016\/j.eswa.2025.127318_b33","doi-asserted-by":"crossref","first-page":"23732","DOI":"10.1109\/ACCESS.2022.3154776","article-title":"Personas for artificial intelligence (AI) an open source toolbox","volume":"10","author":"Holzinger","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.127318_b34","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.nbt.2024.12.003","article-title":"Is human oversight to AI systems still possible?","volume":"85","author":"Holzinger","year":"2025","journal-title":"New Biotechnology"},{"issue":"5","key":"10.1016\/j.eswa.2025.127318_b35","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","article-title":"Multilayer feedforward networks are universal approximators","volume":"2","author":"Hornik","year":"1989","journal-title":"Neural Networks"},{"key":"10.1016\/j.eswa.2025.127318_b36","series-title":"Towards a criteria-based approach to selecting human-AI interaction mode","author":"Irons","year":"2024"},{"issue":"1","key":"10.1016\/j.eswa.2025.127318_b37","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1162\/neco.1991.3.1.79","article-title":"Adaptive mixtures of local experts","volume":"3","author":"Jacobs","year":"1991","journal-title":"Neural Computation"},{"issue":"11","key":"10.1016\/j.eswa.2025.127318_b38","doi-asserted-by":"crossref","first-page":"5017","DOI":"10.1108\/K-04-2022-0548","article-title":"Effective human\u2013AI work design for collaborative decision-making","volume":"52","author":"Jain","year":"2022","journal-title":"Kybernetes"},{"key":"10.1016\/j.eswa.2025.127318_b39","doi-asserted-by":"crossref","unstructured":"Keswani, V., Lease, M., & Kenthapadi, K. (2021). Towards unbiased and accurate deferral to multiple experts. In Proceedings of the 2021 AAAI\/ACM conference on AI, ethics, and society (pp. 154\u2013165).","DOI":"10.1145\/3461702.3462516"},{"issue":"10s","key":"10.1016\/j.eswa.2025.127318_b40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3505244","article-title":"Transformers in vision: A survey","volume":"54","author":"Khan","year":"2022","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.eswa.2025.127318_b41","series-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"issue":"6","key":"10.1016\/j.eswa.2025.127318_b42","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/3065386","article-title":"ImageNet classification with deep convolutional neural networks","volume":"60","author":"Krizhevsky","year":"2017","journal-title":"Communications of the ACM"},{"issue":"11","key":"10.1016\/j.eswa.2025.127318_b43","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"LeCun","year":"1998","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/j.eswa.2025.127318_b44","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","volume":"31","author":"Lee","year":"2018","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.127318_b45","series-title":"Human-AI collaboration in decision-making: Beyond learning to defer","author":"Leit\u00e3o","year":"2022"},{"issue":"CSCW2","key":"10.1016\/j.eswa.2025.127318_b46","first-page":"1","article-title":"Understanding the effect of out-of-distribution examples and interactive explanations on human-ai decision making","volume":"5","author":"Liu","year":"2021","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"10.1016\/j.eswa.2025.127318_b47","series-title":"Explainable deep one-class classification","author":"Liznerski","year":"2020"},{"key":"10.1016\/j.eswa.2025.127318_b48","article-title":"Predict responsibly: improving fairness and accuracy by learning to defer","volume":"31","author":"Madras","year":"2018","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.127318_b49","first-page":"3578","article-title":"Two-stage learning to defer with multiple experts","volume":"36","author":"Mao","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.127318_b50","doi-asserted-by":"crossref","first-page":"99129","DOI":"10.1109\/ACCESS.2022.3207287","article-title":"A survey of ensemble learning: Concepts, algorithms, applications, and prospects","volume":"10","author":"Mienye","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.127318_b51","series-title":"International conference on machine learning","first-page":"7076","article-title":"Consistent estimators for learning to defer to an expert","author":"Mozannar","year":"2020"},{"key":"10.1016\/j.eswa.2025.127318_b52","series-title":"Advances in intelligent data analysis and applications: proceeding of the sixth euro-China conference on intelligent data analysis and applications, 15\u201318 October 2019, arad, Romania","first-page":"309","article-title":"Trends and future perspective challenges in big data","author":"Naeem","year":"2022"},{"key":"10.1016\/j.eswa.2025.127318_b53","series-title":"Human-AI teaming: State-of-the-art and research needs","author":"National Academies of Sciences, Engineering, and Medicine","year":"2021"},{"key":"10.1016\/j.eswa.2025.127318_b54","series-title":"Companion proceedings of the ACM web conference 2025","first-page":"5","article-title":"Towards effective identification of attack techniques in cyber threat intelligence reports using large language models","author":"Nguyen","year":"2025"},{"key":"10.1016\/j.eswa.2025.127318_b55","series-title":"ChatGPT: A large language model trained by openai","author":"OpenAI","year":"2021"},{"key":"10.1016\/j.eswa.2025.127318_b56","series-title":"The conversation on work","first-page":"177","article-title":"What\u2019s the secret to making sure AI does not steal your job? Work with it, not against it","author":"Paris","year":"2024"},{"key":"10.1016\/j.eswa.2025.127318_b57","series-title":"Generative agents: Interactive simulacra of human behavior","author":"Park","year":"2023"},{"issue":"5","key":"10.1016\/j.eswa.2025.127318_b58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3234150","article-title":"A survey on deep learning: Algorithms, techniques, and applications","volume":"51","author":"Pouyanfar","year":"2018","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.eswa.2025.127318_b59","first-page":"525","article-title":"Preferential mixture-of-experts: Interpretable models that rely on human expertise as much as possible","volume":"2021","author":"Pradier","year":"2021","journal-title":"AMIA Summits on Translational Science Proceedings"},{"key":"10.1016\/j.eswa.2025.127318_b60","series-title":"The algorithmic automation problem: Prediction, triage, and human effort","author":"Raghu","year":"2019"},{"key":"10.1016\/j.eswa.2025.127318_b61","doi-asserted-by":"crossref","unstructured":"Reiss, T., Cohen, N., Bergman, L., & Hoshen, Y. (2021). Panda: Adapting pretrained features for anomaly detection and segmentation. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 2806\u20132814).","DOI":"10.1109\/CVPR46437.2021.00283"},{"key":"10.1016\/j.eswa.2025.127318_b62","series-title":"International conference on machine learning","first-page":"4393","article-title":"Deep one-class classification","author":"Ruff","year":"2018"},{"key":"10.1016\/j.eswa.2025.127318_b63","doi-asserted-by":"crossref","unstructured":"Salehi, M., Sadjadi, N., Baselizadeh, S., Rohban, M. H., & Rabiee, H. R. (2021). Multiresolution knowledge distillation for anomaly detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 14902\u201314912).","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"10.1016\/j.eswa.2025.127318_b64","article-title":"Collaborative intelligence: A scoping review of current applications","author":"Schleiger","year":"2023","journal-title":"Qeios"},{"issue":"7","key":"10.1016\/j.eswa.2025.127318_b65","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","article-title":"Estimating the support of a high-dimensional distribution","volume":"13","author":"Sch\u00f6lkopf","year":"2001","journal-title":"Neural Computation"},{"key":"10.1016\/j.eswa.2025.127318_b66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-021-00514-x","article-title":"A literature review on one-class classification and its potential applications in big data","volume":"8","author":"Seliya","year":"2021","journal-title":"Journal of Big Data"},{"key":"10.1016\/j.eswa.2025.127318_b67","series-title":"Outrageously large neural networks: The sparsely-gated mixture-of-experts layer","author":"Shazeer","year":"2017"},{"key":"10.1016\/j.eswa.2025.127318_b68","unstructured":"Singh, S., Jain, S., & Jha, S. S. (2023). On Subset Selection of Multiple Humans To Improve Human-AI Team Accuracy. In Proceedings of the 2023 international conference on autonomous agents and multiagent systems (pp. 317\u2013325)."},{"key":"10.1016\/j.eswa.2025.127318_b69","series-title":"International conference on neural information processing","first-page":"359","article-title":"Multi-class anomaly detection","author":"Singh","year":"2022"},{"issue":"11","key":"10.1016\/j.eswa.2025.127318_b70","doi-asserted-by":"crossref","DOI":"10.1073\/pnas.2111547119","article-title":"Bayesian modeling of human\u2013AI complementarity","volume":"119","author":"Steyvers","year":"2022","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"10.1016\/j.eswa.2025.127318_b71","series-title":"KDD Cup 1999 Data","author":"Stolfo","year":"1999"},{"key":"10.1016\/j.eswa.2025.127318_b72","doi-asserted-by":"crossref","DOI":"10.1016\/j.bdr.2021.100289","article-title":"Big data in forecasting research: a literature review","volume":"27","author":"Tang","year":"2022","journal-title":"Big Data Research"},{"issue":"9","key":"10.1016\/j.eswa.2025.127318_b73","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3723158","article-title":"Alert fatigue in security operations centres: Research challenges and opportunities","volume":"57","author":"Tariq","year":"2025","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.eswa.2025.127318_b74","series-title":"Llama 2: Open foundation and fine-tuned chat models","author":"Touvron","year":"2023"},{"issue":"11","key":"10.1016\/j.eswa.2025.127318_b75","doi-asserted-by":"crossref","DOI":"10.1029\/2024EA003997","article-title":"Deep autoencoders for unsupervised anomaly detection in wildfire prediction","volume":"11","author":"\u00dcstek","year":"2024","journal-title":"Earth and Space Science"},{"issue":"2","key":"10.1016\/j.eswa.2025.127318_b76","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSMC.2016.2557479","article-title":"Learning from uncertainty for big data: future analytical challenges and strategies","volume":"2","author":"Wang","year":"2016","journal-title":"IEEE Systems, Man, and Cybernetics Magazine"},{"key":"10.1016\/j.eswa.2025.127318_b77","series-title":"Deep learning for identifying metastatic breast cancer","author":"Wang","year":"2016"},{"key":"10.1016\/j.eswa.2025.127318_b78","doi-asserted-by":"crossref","unstructured":"Wilder, B., Horvitz, E., & Kamar, E. (2021). Learning to complement humans. In Proceedings of the twenty-ninth international joint conference on artificial intelligence. IJCAI \u201920, ISBN: 9780999241165.","DOI":"10.24963\/ijcai.2020\/212"},{"key":"10.1016\/j.eswa.2025.127318_b79","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.future.2022.05.014","article-title":"A survey of human-in-the-loop for machine learning","volume":"135","author":"Wu","year":"2022","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.eswa.2025.127318_b80","series-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"issue":"6","key":"10.1016\/j.eswa.2025.127318_b81","doi-asserted-by":"crossref","first-page":"5545","DOI":"10.1007\/s10462-022-10283-5","article-title":"A survey on ensemble learning under the era of deep learning","volume":"56","author":"Yang","year":"2023","journal-title":"Artificial Intelligence Review"},{"key":"10.1016\/j.eswa.2025.127318_b82","series-title":"A unified model for multi-class anomaly detection","author":"You","year":"2022"},{"key":"10.1016\/j.eswa.2025.127318_b83","unstructured":"Zaheer, M. Z., Lee, J. h., Astrid, M., & Lee, S. I. (2020). Old is gold: Redefining the adversarially learned one-class classifier training paradigm. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 14183\u201314193)."},{"key":"10.1016\/j.eswa.2025.127318_b84","series-title":"European conference on computer vision","first-page":"144","article-title":"Learning to complement and to defer to multiple users","author":"Zhang","year":"2024"},{"issue":"2","key":"10.1016\/j.eswa.2025.127318_b85","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/JPROC.2023.3238024","article-title":"A survey on learning to reject","volume":"111","author":"Zhang","year":"2023","journal-title":"Proceedings of the IEEE"},{"issue":"17","key":"10.1016\/j.eswa.2025.127318_b86","doi-asserted-by":"crossref","first-page":"18405","DOI":"10.1007\/s11227-022-04594-1","article-title":"A systematic survey of data mining and big data analysis in internet of things","volume":"78","author":"Zhong","year":"2022","journal-title":"Journal of Supercomputing"},{"key":"10.1016\/j.eswa.2025.127318_b87","unstructured":"Zong, B., Song, Q., Min, M. R., Cheng, W., Lumezanu, C., Cho, D., & Chen, H. (2018). Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International conference on learning representations."}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425009406?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425009406?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T22:47:20Z","timestamp":1747867640000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425009406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":87,"alternative-id":["S0957417425009406"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2025.127318","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"AC: A modular multi-stage collaborative decision framework for human\u2013AI teams","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2025.127318","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"127318"}}