Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning for Adverse Event Detection From Web Search., , , , and . IEEE Trans. Knowl. Data Eng., 34 (6): 2681-2695 (2022)Bias A-head? Analyzing Bias in Transformer-Based Language Model Attention Heads., , , , and . CoRR, (2023)Data Science for Social Good., , and . CoRR, (2023)Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace., and . ACM Trans. Inf. Syst., 26 (2): 7:1-7:29 (2008)A Framework for Stylometric Similarity Detection in Online Settings., and . AMCIS, page 127. Association for Information Systems, (2007)Impact of anti-phishing tool performance on attack success rates., , and . ISI, page 12-17. IEEE, (2012)An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility., , , and . ISI, page 1-6. IEEE, (2020)Twitter Sentiment Analysis: A Bootstrap Ensemble Framework., , and . SocialCom, page 357-364. IEEE Computer Society, (2013)Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information., , , , , and . J. Manag. Inf. Syst., 31 (4): 109-157 (2015)Detecting Drug-Drug Interactions using Protein Sequence-Structure Similarity Networks., , , , , and . BIBM, page 3472-3477. IEEE, (2021)