Author of the publication

Interpretation of NLP models through input marginalization.

, , , and . EMNLP (1), page 3154-3167. Association for Computational Linguistics, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AnomiGAN: Generative adversarial networks for anonymizing private medical data., , and . CoRR, (2019)Boosted Categorical Restricted Boltzmann Machine for Computational Prediction of Splice Junctions., and . ICML, volume 37 of JMLR Workshop and Conference Proceedings, page 2483-2492. JMLR.org, (2015)Run-Time Adaptive Workload Estimation for Dynamic Voltage Scaling., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 28 (9): 1334-1347 (2009)Buffer Controller-Based Multiple Processing Element Utilization for Dataflow Synthesis., , and . IEEE Trans. Very Large Scale Integr. Syst., 19 (7): 1249-1262 (2011)CloudSocket: Fine-Grained Power Sensing System for Datacenters., , , , , and . IEEE Access, (2018)hc-OTU: A Fast and Accurate Method for Clustering Operational Taxonomic Units Based on Homopolymer Compaction., , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 15 (2): 441-451 (2018)Correction to: HiComet: a high-throughput comet analysis tool for large-scale DNA damage assessment., , , , , , , and . BMC Bioinform., 19 (1): 170:1 (2018)Architecture Exploration of High-Performance PCs with a Solid-State Disk., , , , and . IEEE Trans. Computers, 59 (7): 878-890 (2010)LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems., , , , and . CoRR, (2016)An Efficient Approach to Boosting Performance of Deep Spiking Network Training., , , and . CoRR, (2016)