Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contextual User Browsing Bandits for Large-Scale Online Mobile Recommendation., , , , , , and . RecSys, page 63-72. ACM, (2020)OASIS: A 28-nm 32-kb SRAM-Based Computing-in-Memory Design With Output Activation Sparsity Support., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 71 (4): 1899-1903 (April 2024)Exploring the Evolvement of Artwork Descriptions in Online Creative Community under the Surge of Generative AI: A Case Study of DeviantArt., , , , and . CHI Extended Abstracts, page 151:1-151:7. ACM, (2024)Integer-Only Neural Network Quantization Scheme Based on Shift-Batch-Normalization., , and . CoRR, (2021)Engage Wider Audience or Facilitate Quality Answers? a Mixed-methods Analysis of Questioning Strategies for Research Sensemaking on a Community Q&A Site., , , , , , and . CoRR, (2023)Effects of Support-Seekers' Community Knowledge on Their Expressed Satisfaction with the Received Comments in Mental Health Communities., , , , and . CHI, page 536:1-536:12. ACM, (2021)Exploring the Effects of Technological Writing Assistance for Support Providers in Online Mental Health Community., , , and . CHI, page 1-15. ACM, (2020)Optimal Interdiction of Illegal Network Flow., , , and . IJCAI, page 2507-2513. IJCAI/AAAI Press, (2016)Comparing Strategic Secrecy and Stackelberg Commitment in Security Games., , , and . IJCAI, page 3691-3699. ijcai.org, (2017)Securing the Deep Fraud Detector in Large-Scale E-Commerce Platform via Adversarial Machine Learning Approach., , , , , , and . WWW, page 616-626. ACM, (2019)