Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shape recovery algorithms using level sets in 2-D/3-D medical imagery: a state-of-the-art review., , , , , and . IEEE Trans. Information Technology in Biomedicine, 6 (1): 8-28 (2002)An evaluation of contrast enhancement techniques for mammographic breast masses., and . IEEE Trans. Information Technology in Biomedicine, 9 (1): 109-119 (2005)Combining Symbolic and Function Evaluation Expressions In Neural Programs., , and . CoRR, (2018)Universal Adversarial Triggers for NLP., , , , and . CoRR, (2019)Generating Natural Adversarial Examples., , and . ICLR (Poster), OpenReview.net, (2018)Unsupervised Learning for Improving Efficiency of Dense Three-Dimensional Scene Recovery in Corridor Mapping., and . SCIA, volume 6688 of Lecture Notes in Computer Science, page 393-402. Springer, (2011)Optical Character Recognition: Neural Network Analysis of Hand-Printed Characters., and . SSPR/SPR, volume 1451 of Lecture Notes in Computer Science, page 492-499. Springer, (1998)ORB: An Open Reading Benchmark for Comprehensive Evaluation of Machine Reading Comprehension., , , , and . CoRR, (2019)Customizing Triggers with Concealed Data Poisoning., , , and . CoRR, (2020)"Why Should I Trust You?", , and . Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, (August 2016)Available at https://arxiv.org/pdf/1602.04938.pdf.