Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerable to Misinformation? Verifi!, , , , , , , and . CoRR, (2018)Natural Language Generation Using Reinforcement Learning with External Rewards., , and . CoRR, (2019)Detecting Asks in Social Engineering Attacks: Impact of Linguistic and Structural Knowledge., , , , , , , , , and . AAAI, page 7675-7682. AAAI Press, (2020)Active Defense Against Social Engineering: The Case for Human Language Technology., , , , , , , , , and 8 other author(s). STOC@LREC, page 1-8. European Language Resources Association, (2020)Adaptation of a Lexical Organization for Social Engineering Detection and Response Generation., , , , , , , and . STOC@LREC, page 9-14. European Language Resources Association, (2020)Local Knowledge Powered Conversational Agents., , , , , and . CoRR, (2020)I Stand With You: Using Emojis to Study Solidarity in Crisis Events., , , and . CoRR, (2019)The GEM Benchmark: Natural Language Generation, its Evaluation and Metrics., , , , , , , , , and 45 other author(s). CoRR, (2021)Rome was built in 1776: A Case Study on Factual Correctness in Knowledge-Grounded Response Generation., , , , , , and . CoRR, (2021)Vulnerable to misinformation?: Verifi!, , , , , , , and . IUI, page 312-323. ACM, (2019)