Author of the publication

Influence-guided Data Augmentation for Neural Tensor Completion.

, , , and . CIKM, page 1386-1395. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vandals and Hoaxes on the Web.. CyberSafety@CIKM, page 2. ACM, (2016)A Survey on the Role of Crowds in Combating Online Misinformation: Annotators, Evaluators, and Creators., , , , , and . CoRR, (2023)Characterizing and Predicting Social Correction on Twitter., , , and . WebSci, page 86-95. ACM, (2023)Metric Logic Program Explanations for Complex Separator Functions., , , and . SUM, volume 9858 of Lecture Notes in Computer Science, page 199-213. Springer, (2016)Adversarial Robustness of Prompt-based Few-Shot Learning for Natural Language Understanding., , , and . ACL (Findings), page 2196-2208. Association for Computational Linguistics, (2023)Community Interaction and Conflict on the Web., , , and . WWW, page 933-943. ACM, (2018)Routing-aware resource allocation for mixture preparation in digital microfluidic biochips., , , , and . ISVLSI, page 165-170. IEEE Computer Socity, (2013)Empowering Interdisciplinary Insights with Dynamic Graph Embedding Trajectories., , , , , and . CoRR, (2024)Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack., , , and . IACR Cryptology ePrint Archive, (2015)Graph Vulnerability and Robustness: A Survey., , , , and . CoRR, (2021)