Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Why Should I Trust You?", , and . Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, (August 2016)Available at https://arxiv.org/pdf/1602.04938.pdf.Head Network Distillation: Splitting Distilled Deep Neural Networks for Resource-Constrained Edge Computing Systems., , , , and . IEEE Access, (2020)Generating Natural Adversarial Examples., , and . ICLR (Poster), OpenReview.net, (2018)Optical Character Recognition: Neural Network Analysis of Hand-Printed Characters., and . SSPR/SPR, volume 1451 of Lecture Notes in Computer Science, page 492-499. Springer, (1998)Combining Symbolic and Function Evaluation Expressions In Neural Programs., , and . CoRR, (2018)Unsupervised Learning for Improving Efficiency of Dense Three-Dimensional Scene Recovery in Corridor Mapping., and . SCIA, volume 6688 of Lecture Notes in Computer Science, page 393-402. Springer, (2011)Transfer of Learning for Complex Task Domains: a Demonstration using Multiple Robots., and . ICRA, page 3332-3337. IEEE, (2006)Shape recovery algorithms using level sets in 2-D/3-D medical imagery: a state-of-the-art review., , , , , and . IEEE Trans. Information Technology in Biomedicine, 6 (1): 8-28 (2002)An evaluation of contrast enhancement techniques for mammographic breast masses., and . IEEE Trans. Information Technology in Biomedicine, 9 (1): 109-119 (2005)Revisiting Evaluation of Knowledge Base Completion Models., , and . AKBC, (2020)