Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Early detection of malicious behavior in JavaScript code., , , and . AISec, page 15-24. ACM, (2012)SchNet: A continuous-filter convolutional neural network for modeling quantum interactions., , , , , and . NIPS, page 991-1001. (2017)Symmetry-adapted generation of 3d point sets for the targeted discovery of molecules., , and . NeurIPS, page 7564-7576. (2019)Learning Representations of Atomistic Systems with Deep Neural Networks.. Ausgezeichnete Informatikdissertationen, volume D-19 of LNI, GI, (2018)Investigating the influence of noise and distractors on the interpretation of neural networks., , , and . CoRR, (2016)An Empirical Study on The Properties of Random Bases for Kernel Methods., , , , and . NIPS, page 2763-2774. (2017)iNNvestigate neural networks!, , , , , , , , , and . CoRR, (2018)Quantum-Chemical Insights from Interpretable Atomistic Neural Networks., , , and . Explainable AI, volume 11700 of Lecture Notes in Computer Science, Springer, (2019)Generating equilibrium molecules with deep neural networks., , and . CoRR, (2018)The (Un)reliability of Saliency Methods., , , , , , , and . Explainable AI, volume 11700 of Lecture Notes in Computer Science, Springer, (2019)