Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing user navigation and interactions in online social networks., , , and . Inf. Sci., (2012)Inferring who-is-who in the Twitter social network., , , , and . Comput. Commun. Rev., 42 (4): 533-538 (2012)Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems., , , , , and . IEEE Trans. Syst. Man Cybern. Part B, 42 (3): 688-701 (2012)Contextual Lexicon-Based Approach for Hate Speech and Offensive Language Detection., , , , and . CoRR, (2021)Analyzing YouTube Videos Shared on WhatsApp and Telegram Political Public Groups., , , , , and . WebMedia, page 28-37. ACM, (2022)Extracting Academic Genealogy Trees from the Networked Digital Library of Theses and Dissertations., , and . JCDL, page 163-166. ACM, (2016)Characterizing usage of explicit hate expressions in social media., , , and . New Rev. Hypermedia Multim., 24 (2): 110-130 (2018)The H-index Paradox: Your Coauthors Have a Higher H-index than You Do., , and . CoRR, (2015)Performance Models for Virtualized Applications., , , , , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 427-439. Springer, (2006)Explainable Machine Learning for Fake News Detection., , , , and . WebSci, page 17-26. ACM, (2019)