Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification., , , and . CW, page 316-323. IEEE, (2019)Reducing Knowledge Noise for Improved Semantic Analysis in Biomedical Natural Language Processing Applications., , , , , and . ClinicalNLP@ACL, page 272-277. Association for Computational Linguistics, (2023)Analyzing Emergent Users' Text Messages Data and Exploring Its Benefits., , , and . IEEE Access, (2019)Data analysis and call prediction on dyadic data from an understudied population., , , , and . Pervasive Mob. Comput., (2017)Are we always in strife? A longitudinal study of the echo chamber effect in the Australian Twittersphere., , , , , , and . CoRR, (2022)Real-time Detection of Content Polluters in Partially Observable Twitter Networks., , , , and . WWW (Companion Volume), page 1331-1339. ACM, (2018)RUHate-MM: Identification of Hate Speech and Targets using Multimodal Data from Russia-Ukraine Crisis., , , , and . WWW (Companion Volume), page 1854-1863. ACM, (2024)On Temporal Regularity in Social Interactions: Predicting Mobile Phone Calls., , , and . CoRR, (2015)Digital Information Seeking and Sharing Behavior During the First Wave of the COVID-19 Pandemic., , , and . CoRR, (2022)On commenting behavior of Facebook users., , , and . HT, page 179-183. ACM, (2013)