Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A privacy protection procedure for large scale individual level data., and . ISI, page 120-125. IEEE, (2015)An exploration of social identity: The structure of the BBC news-sharing community on Twitter., , , , and . Complexity, 19 (5): 55-63 (2014)Sanity Checks for Saliency Maps., , , , , and . NeurIPS, page 9525-9536. (2018)Iterative Orthogonal Feature Projection for Diagnosing Bias in Black-Box Models., and . CoRR, (2016)Explaining Explanations to Society., , , and . CoRR, (2019)The (Un)reliability of saliency methods., , , , , , , and . CoRR, (2017)Investigating Human + Machine Complementarity for Recidivism Predictions., , , and . CoRR, (2018)Bayesian modeling suggests that IL-12 (p40), IL-13 and MCP-1 drive murine cytokine networks in vivo., , , , , , , and . BMC Systems Biology, (2015)Understanding the role of mobile technologies for humanitarian relief., , , and . ISCRAM, ISCRAM Association, (2015)The (Un)reliability of Saliency Methods., , , , , , , and . Explainable AI, volume 11700 of Lecture Notes in Computer Science, Springer, (2019)