Taxonomy and Survey of Interpretable Machine Learning Method
暂无分享,去创建一个
Frederick T. Sheldon | Deepak Venugopal | Saikat Das | Sajjan Shiva | Namita Agarwal | S. Shiva | D. Venugopal | Saikat Das, Ph.D. | Namita Agarwal
[1] Emil Pitkin,et al. Peeking Inside the Black Box: Visualizing Statistical Learning With Plots of Individual Conditional Expectation , 2013, 1309.6392.
[2] Scott Lundberg,et al. A Unified Approach to Interpreting Model Predictions , 2017, NIPS.
[3] Carlos Guestrin,et al. "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.
[4] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[5] Amit Dhurandhar,et al. Explanations based on the Missing: Towards Contrastive Explanations with Pertinent Negatives , 2018, NeurIPS.
[6] Alexander Binder,et al. On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.
[7] Daniel L. Marino,et al. An Adversarial Approach for Explainable AI in Intrusion Detection Systems , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[8] Jie Chen,et al. Explainable Neural Networks based on Additive Index Models , 2018, ArXiv.
[9] Cynthia Rudin,et al. Supersparse linear integer models for optimized medical scoring systems , 2015, Machine Learning.
[10] Saikat Das,et al. CoRuM: Collaborative Runtime Monitor Framework for Application Security , 2018, 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion).
[11] Klaus-Robert Müller,et al. Interpreting and Explaining Deep Neural Networks for Classification of Audio Signals , 2018, ArXiv.
[12] Frederick T. Sheldon,et al. Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack , 2020, 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom).
[13] Fabio Roli,et al. Explaining Black-box Android Malware Detection , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[14] Sajjan G. Shiva,et al. A Stealth Migration Approach to Moving Target Defense in Cloud Computing , 2019 .
[15] Alessandro Rinaldo,et al. Distribution-Free Predictive Inference for Regression , 2016, Journal of the American Statistical Association.
[16] Tat-Seng Chua,et al. TEM: Tree-enhanced Embedding Model for Explainable Recommendation , 2018, WWW.
[17] Carlos Guestrin,et al. Anchors: High-Precision Model-Agnostic Explanations , 2018, AAAI.
[18] Scott M. Lundberg,et al. Consistent Individualized Feature Attribution for Tree Ensembles , 2018, ArXiv.
[19] Cynthia Rudin,et al. Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead , 2018, Nature Machine Intelligence.
[20] Jimeng Sun,et al. Explainable Prediction of Medical Codes from Clinical Text , 2018, NAACL.
[21] Avanti Shrikumar,et al. Learning Important Features Through Propagating Activation Differences , 2017, ICML.
[22] Daniel W. Apley,et al. Visualizing the effects of predictor variables in black box supervised learning models , 2016, Journal of the Royal Statistical Society: Series B (Statistical Methodology).
[23] Alison Smith-Renner,et al. Towards an Explainable Threat Detection Tool , 2019, IUI Workshops.
[24] Sajjan G. Shiva,et al. A Holistic Approach for Detecting DDoS Attacks by Using Ensemble Unsupervised Machine Learning , 2020, Advances in Intelligent Systems and Computing.
[25] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[26] Deepak Venugopal,et al. DDoS Intrusion Detection Through Machine Learning Ensemble , 2019, 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C).