Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering signature of social networks with application to community detection., , and . COMSNETS, page 1-7. IEEE, (2014)Man-O-Meter: Modeling and Assessing the Evolution of Language Usage of Individuals on Microblogs., , , and . APWeb (1), volume 9931 of Lecture Notes in Computer Science, page 342-355. Springer, (2016)TellTail: Fast Scoring and Detection of Dense Subgraphs., , , and . AAAI, page 4150-4157. AAAI Press, (2020)Driving the Last Mile: Characterizing and Understanding Distracted Driving Posts on Social Networks., , , , , and . ICWSM, page 393-404. AAAI Press, (2020)Incremental subclass discriminant analysis: A case study in face recognition., , , and . ICIP, page 593-596. IEEE, (2012)xStream: Outlier Detection in Feature-Evolving Data Streams., , and . KDD, page 1963-1972. ACM, (2018)Counterfactual Editing for Search Result Explanation., , , , and . CoRR, (2023)Machine learning for public policy: Do we need to sacrifice accuracy to make models fair?, , and . CoRR, (2020)Provably Robust Node Classification via Low-Pass Message Passing., , , , , , and . ICDM, page 621-630. IEEE, (2020)Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software., , , , , and . IWSPA@CODASPY, page 17-22. ACM, (2017)