Author of the publication

Unveiling public perception of AI ethics: an exploration on Wikipedia data.

, , , , , and . EPJ Data Sci., 13 (1): 26 (December 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward High Efficiency Polymer Solar Cells: Influence of Local Chemical Environment and Morphology, , , , , , , , , and 2 other author(s). Advanced Energy Materials, (2016)A Color Digital Watermarking in Nonsampled Contourlet Domain Using Generic Algorithm., , and . INCoS, page 673-676. IEEE, (2013)Research on Secondary Information Standardization Platform of Intelligent Substation Based on Configuration File., , , and . CSPS, volume 463 of Lecture Notes in Electrical Engineering, page 2340-2347. Springer, (2017)Multi-view Semantic Learning for Data Representation., , , and . ECML/PKDD (1), volume 9284 of Lecture Notes in Computer Science, page 367-382. Springer, (2015)Unbalanced Encoding in Synchronous Weight Quantization-Compression for Low-Bit Quantized Neural Network., , , , and . GCAIoT, page 105-111. IEEE, (2021)A Monolithic GaN Driver and GaN Power Switch with Power-rail Charging Saturation Bootstrap technique achieving gate rising and falling time ratio of 1.28., , , , , , , and . CICC, page 1-2. IEEE, (2023)Co-Located vs Distributed vs Semi-Distributed MIMO: Measurement-Based Evaluation., , , and . ACSSC, page 836-841. IEEE, (2020)Carbon emission causal discovery and multi-step forecasting using spatiotemporal information., , , and . Inf. Sci., (2024)Multi-view generalized support vector machine via mining the inherent relationship between views with applications to face and fire smoke recognition., , , , , and . Knowl. Based Syst., (2020)Differential Power Analysis on Dynamic Password Token Based on SM3 Algorithm, and Countermeasures., , , , and . CIS, page 354-357. IEEE Computer Society, (2015)