Author of the publication

A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR).

, , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying Unrooted Gaussian Trees under Privacy Constraints., , , and . CoRR, (2015)Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism., , and . ACM Trans. Priv. Secur., 26 (4): 47:1-47:31 (November 2023)An Extended Survey on Vehicle Security., , , and . CoRR, (2019)The Economics of Privacy and Utility: Investment Strategies., , and . IEEE Trans. Inf. Forensics Secur., (2024)Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism., , and . ICC, page 1-7. IEEE, (2021)ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications., , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 3636-3652 (September 2023)MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW., , , , and . TrustCom, page 425-433. IEEE, (2020)An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol., , and . WISEC, page 144-153. ACM, (2018)Successive synthesis of latent Gaussian trees., , , and . MILCOM, page 315-320. IEEE, (2017)An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID., , and . RFIDSec, volume 7055 of Lecture Notes in Computer Science, page 108-126. Springer, (2011)