Author of the publication

RuDi: Explaining Behavior Sequence Models by Automatic Statistics Generation and Rule Distillation.

, , , , , , and . CIKM, page 2651-2660. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An ICE aggregation method based on optimal rally points in fuzzy environment., , , and . J. Intell. Fuzzy Syst., 44 (1): 1001-1015 (2023)Study on Psychophysical Experiment of Image Quality for Ink-Jet Paper., , , and . CSSE (6), page 121-124. IEEE Computer Society, (2008)978-0-7695-3336-0.Vulnerability aware graphs for RFID protocol security benchmarking., , , , and . J. Comput. Syst. Sci., 81 (6): 1027-1041 (2015)Analysis and Modeling of Lane-Changing Game Strategy for Autonomous Driving Vehicles., , , , and . IEEE Access, (2022)ECSD-Net: A joint optic disc and cup segmentation and glaucoma classification network based on unsupervised domain adaptation., , , and . Comput. Methods Programs Biomed., (2022)Approximations of EESM Effective SNR Distribution., , and . IEEE Trans. Commun., 59 (2): 603-612 (2011)A Knee Point Driven Particle Swarm Optimization Algorithm for Sparse Reconstruction., , , , , and . SEAL, volume 10593 of Lecture Notes in Computer Science, page 911-919. Springer, (2017)Towards Agile Management of Containerised Software at the Edge., and . ICPS, page 263-268. IEEE, (2020)Using Microservices to Customize Multi-tenant Software-as-a-Service., , and . Microservices, Science and Engineering, Springer, (2020)Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks., , , and . MobiHoc, page 378-389. ACM, (2005)