Author of the publication

DGL-KE: Training Knowledge Graph Embeddings at Scale.

, , , , , , , , and . Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Single-Supply Buffer-Embedding SAR ADC with Skip-Reset having Inherent Chopping Capability., , , , , , , , , and . A-SSCC, page 189-192. IEEE, (2019)Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum., , , , , , , , , and . NDSS, The Internet Society, (2024)Towards Understanding Cryptocurrency Derivatives: A Case Study of BitMEX., , , , , and . WWW, page 45-57. ACM / IW3C2, (2021)Cube Padding for Weakly-Supervised Saliency Prediction in 360° Videos., , , , , and . CVPR, page 1420-1429. Computer Vision Foundation / IEEE Computer Society, (2018)PPP-Net: Platform-aware Progressive Search for Pareto-optimal Neural Architectures., , , , and . ICLR (Workshop), OpenReview.net, (2018)Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?, , , , , , , , and . CCS, page 3399-3401. ACM, (2022)On recruiting and retaining users for security-sensitive longitudinal measurement panels., , , , , , and . SOUPS @ USENIX Security Symposium, page 347-366. USENIX Association, (2022)Secure control systems with application to cyber-physical systems., , , and . CISR, page 9-12. ACM, (2014)Preference Learning with Extreme Examples., , , , , and . IJCAI, page 1285-1290. (2009)An Ideal Fine-Grained GAC Algorithm for Table Constraints., , , , , and . ICSI (1), volume 9712 of Lecture Notes in Computer Science, page 86-94. Springer, (2016)