no code implementations • 18 Aug 2023 • Yi Cai, Gerhard Wunder
Attribution methods shed light on the explainability of data-driven approaches such as deep learning models by uncovering the most influential features in a to-be-explained decision.
no code implementations • 22 Apr 2023 • Benedikt Groß, Gerhard Wunder
It is often overlooked though that generative models are prone to memorising many details of individual training records and often generate synthetic data that too closely resembles the underlying sensitive training data, hence violating strong privacy regulations as, e. g., encountered in health care.
no code implementations • 11 Feb 2023 • Yi Cai, Arthur Zimek, Eirini Ntoutsi, Gerhard Wunder
The importance of neighborhood construction in local explanation methods has been already highlighted in the literature.
1 code implementation • 7 Sep 2022 • Yi Cai, Arthur Zimek, Gerhard Wunder, Eirini Ntoutsi
Hate speech detection is a common downstream application of natural language processing (NLP) in the real world.
no code implementations • 11 Jun 2022 • Richard Schoeffauer, Gerhard Wunder
We present an algorithm for the numerical evaluation of the state-space distribution of an Age-of-Information network.
no code implementations • 12 Nov 2021 • Gerhard Wunder, Benedikt Groß, Rick Fritschek, Rafael F. Schaefer
The Jensen inequality is a widely used tool in a multitude of fields, such as for example information theory and machine learning.
no code implementations • 12 Oct 2021 • Benedikt Groß, Rana Ahmed Salem, Thorsten Wild, Gerhard Wunder
Explicit channel state information at the transmitter side is helpful to improve downlink precoding performance for multi-user MIMO systems.
no code implementations • 1 Jun 2021 • Rick Fritschek, Rafael F. Schaefer, Gerhard Wunder
The use of deep learning-based techniques for approximating secure encoding functions has attracted considerable interest in wireless communications due to impressive results obtained for general coding and decoding tasks for wireless communication systems.
no code implementations • 11 Mar 2021 • Khan Reaz, Gerhard Wunder
Secure and scalable device provisioning is a notorious challenge in Wi-Fi.
Cryptography and Security
no code implementations • 9 Mar 2021 • Jannik Hahn, Richard Schoeffauer, Gerhard Wunder, Olaf Stursberg
By contrast, the present approachestablishes a robust distributed model-predictive controlscheme, in which the local subsystem controllers oper-ate under the assumption of a variable communicationschedule that is predicted by a network controller.
Systems and Control Systems and Control
1 code implementation • 7 Mar 2019 • Rick Fritschek, Rafael F. Schaefer, Gerhard Wunder
However, one of the drawbacks of current learning approaches is that a differentiable channel model is needed for the training of the underlying neural networks.
no code implementations • 9 May 2017 • Mahdi Barzegar Khalilsarai, Saeid Haghighatshoar, Giuseppe Caire, Gerhard Wunder
To design such a blind predictor, we use the random spectral representation of a stationary Gaussian process.