Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A privacy protection procedure for large scale individual level data., and . ISI, page 120-125. IEEE, (2015)An exploration of social identity: The structure of the BBC news-sharing community on Twitter., , , , and . Complex., 19 (5): 55-63 (2014)Sanity Checks for Saliency Maps., , , , , and . NeurIPS, page 9525-9536. (2018)Iterative Orthogonal Feature Projection for Diagnosing Bias in Black-Box Models., and . CoRR, (2016)Post hoc Explanations may be Ineffective for Detecting Unknown Spurious Correlation., , , and . ICLR, OpenReview.net, (2022)Local Explanation Methods for Deep Neural Networks Lack Sensitivity to Parameter Values., , , and . ICLR (Workshop), OpenReview.net, (2018)The (Un)reliability of Saliency Methods., , , , , , , and . Explainable AI, volume 11700 of Lecture Notes in Computer Science, Springer, (2019)Bayesian modeling suggests that IL-12 (p40), IL-13 and MCP-1 drive murine cytokine networks in vivo., , , , , , , and . BMC Syst. Biol., (2015)Assessing the (Un)Trustworthiness of Saliency Maps for Localizing Abnormalities in Medical Imaging., , , , , , , , , and 3 other author(s). CoRR, (2020)The (Un)reliability of saliency methods., , , , , , , and . CoRR, (2017)