Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Scaling External Feedback for Early-Stage Researchers: A Survey Study., , and . CoopIS, volume 14353 of Lecture Notes in Computer Science, page 329-346. Springer, (2023)Societal Versus Encoded Stereotypes in Text Encoders., , , and . ICTAI, page 46-53. IEEE, (2023)API Topic Issues Indexing, Exploration and Discovery for API Community Knowledge., , and . CLEI, page 178-185. IEEE, (2020)Masked Language Models as Stereotype Detectors?, , , and . EDBT, page 2:383-2:387. OpenProceedings.org, (2022)Automatic Canonical Utterance Generation for Task-Oriented Bots from API Specifications., , and . EDBT, page 1-12. OpenProceedings.org, (2020)Targeting the Source: Selective Data Curation for Debiasing NLP Models., , , and . ECML/PKDD (2), volume 14170 of Lecture Notes in Computer Science, page 276-294. Springer, (2023)Identification and Generation of Actions Using Pre-trained Language Models., , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 674-683. Springer, (2023)A Comprehensive Survey of Explainable Artificial Intelligence (XAI) Methods: Exploring Transparency and Interpretability., , , , , , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 915-925. Springer, (2023)Automatic Malicious Worker Detection in Crowdsourced Paraphrases., and . WISE (1), volume 13080 of Lecture Notes in Computer Science, page 46-58. Springer, (2021)iCOP: IoT-Enabled Policing Processes., , , , , , , , and . ICSOC Workshops, volume 11434 of Lecture Notes in Computer Science, page 447-452. Springer, (2018)