Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vandals and Hoaxes on the Web.. CyberSafety@CIKM, page 2. ACM, (2016)A Survey on the Role of Crowds in Combating Online Misinformation: Annotators, Evaluators, and Creators., , , , , and . CoRR, (2023)FINEST: Stabilizing Recommendations by Rank-Preserving Fine-Tuning., , , and . CoRR, (2024)Robustness of Deep Recommendation Systems to Untargeted Interaction Perturbations., and . CoRR, (2022)Characterizing and Predicting Social Correction on Twitter., , , and . WebSci, page 86-95. ACM, (2023)Community Interaction and Conflict on the Web., , , and . WWW, page 933-943. ACM, (2018)Routing-aware resource allocation for mixture preparation in digital microfluidic biochips., , , , and . ISVLSI, page 165-170. IEEE Computer Socity, (2013)Metric Logic Program Explanations for Complex Separator Functions., , , and . SUM, volume 9858 of Lecture Notes in Computer Science, page 199-213. Springer, (2016)Adversarial Robustness of Prompt-based Few-Shot Learning for Natural Language Understanding., , , and . ACL (Findings), page 2196-2208. Association for Computational Linguistics, (2023)Image-based walkthroughs from incremental and partial scene reconstructions., , , and . BMVC, page 1-11. British Machine Vision Association, (2010)