Author of the publication

An Explainable AI User Interface for Facilitating Collaboration between Domain Experts and AI Researchers.

, , , , , , and . xAI (Late-breaking Work, Demos, Doctoral Consortium), volume 3554 of CEUR Workshop Proceedings, page 112-116. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metal Surface Defect Detection Method Based on TE01 Mode Microwave., , , and . Sensors, 22 (13): 4848 (2022)Mirror Image Learning for Handwritten Numeral Recognition., , , and . MLDM, volume 2123 of Lecture Notes in Computer Science, page 239-248. Springer, (2001)License Plate Recognition Using Associative Matching Based on Clique-Finding., , , and . MVA, page 71-74. (2000)Handwritten Numeral Recognition using Gradient and Curvature of Gray Scale Image., , , and . ICDAR, page 277-280. IEEE Computer Society, (1999)Comparative Study on Mirror Image Learning (MIL) and GLVQ., , , and . ICPR (2), page 248-. IEEE Computer Society, (2002)An Intelligence-Based Approach for Prediction of Microscopic Pedestrian Walking Behavior., , , , and . IEEE Trans. Intell. Transp. Syst., 20 (10): 3964-3980 (2019)Estimating the Depth of Anesthesia from EEG Signals Based on a Deep Residual Shrinkage Network., , , , , and . Sensors, 23 (2): 1008 (January 2023)Human in the loop approaches in multi-modal conversational task guidance system development., , , , , , , , and . CoRR, (2022)Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs., , , , , , and . ASE, page 1403-1415. IEEE, (2023)SmartLite: A DBMS-based Serving System for DNN Inference in Resource-constrained Environments., , , , , , and . Proc. VLDB Endow., 17 (3): 278-291 (November 2023)