1 code implementation • 22 Aug 2022 • Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer
The security literature sometimes also fails to disentangle the role of the various stakeholders, e. g., by providing explanations to model users and designers while also exposing them to adversaries.