Author of the publication

Explaining Explanations: An Overview of Interpretability of Machine Learning.

, , , , , and . DSAA, page 80-89. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explaining Explanations: An Approach to Evaluating Interpretability of Machine Learning, , , , , and . (2018)cite arxiv:1806.00069Comment: Edited author email.A Systematization of Voter Registration Security., , , and . IACR Cryptol. ePrint Arch., (2022)SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol., , , , , , , , , and 1 other author(s). CoRR, (2020)Security Analysis of the Democracy Live Online Voting System., and . USENIX Security Symposium, page 3077-3092. USENIX Association, (2021)Keys under doormats., , , , , , , , , and 5 other author(s). Commun. ACM, 58 (10): 24-26 (2015)Security Research for the Public Good: A Principled Approach.. Massachusetts Institute of Technology, USA, (2021)KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures., , and . CoRR, (2019)KeyForge: Non-Attributable Email from Forward-Forgeable Signatures., , and . USENIX Security Symposium, page 1755-1773. USENIX Association, (2021)The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections., , and . USENIX Security Symposium, page 1535-1553. USENIX Association, (2020)Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries., , and . AsiaCCS, ACM, (2024)