Alert button
Picture for Wiebke Günther

Wiebke Günther

Alert button

Conditional Independence Testing with Heteroskedastic Data and Applications to Causal Discovery

Add code
Bookmark button
Alert button
Jun 20, 2023
Wiebke Günther, Urmi Ninad, jonas Wahl, Jakob Runge

Figure 1 for Conditional Independence Testing with Heteroskedastic Data and Applications to Causal Discovery
Figure 2 for Conditional Independence Testing with Heteroskedastic Data and Applications to Causal Discovery
Figure 3 for Conditional Independence Testing with Heteroskedastic Data and Applications to Causal Discovery
Figure 4 for Conditional Independence Testing with Heteroskedastic Data and Applications to Causal Discovery
Viaarxiv icon

Risk Assessment for Machine Learning Models

Add code
Bookmark button
Alert button
Nov 09, 2020
Paul Schwerdtner, Florens Greßner, Nikhil Kapoor, Felix Assion, René Sass, Wiebke Günther, Fabian Hüger, Peter Schlicht

Figure 1 for Risk Assessment for Machine Learning Models
Figure 2 for Risk Assessment for Machine Learning Models
Figure 3 for Risk Assessment for Machine Learning Models
Figure 4 for Risk Assessment for Machine Learning Models
Viaarxiv icon

Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study

Add code
Bookmark button
Alert button
Feb 05, 2020
David Mickisch, Felix Assion, Florens Greßner, Wiebke Günther, Mariele Motta

Figure 1 for Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
Figure 2 for Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
Figure 3 for Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
Figure 4 for Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
Viaarxiv icon

The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks

Add code
Bookmark button
Alert button
Jun 17, 2019
Felix Assion, Peter Schlicht, Florens Greßner, Wiebke Günther, Fabian Hüger, Nico Schmidt, Umair Rasheed

Figure 1 for The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
Figure 2 for The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
Figure 3 for The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
Viaarxiv icon