Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Label Dependency for Hierarchical Multi-label Classification., , and . PAKDD (1), volume 7301 of Lecture Notes in Computer Science, page 294-305. Springer, (2012)An Attentive Spatio-Temporal Neural Model for Successive Point of Interest Recommendation., , and . PAKDD (3), volume 11441 of Lecture Notes in Computer Science, page 346-358. Springer, (2019)Early-Stage Event Prediction for Longitudinal Data., , and . PAKDD (1), volume 9651 of Lecture Notes in Computer Science, page 139-151. Springer, (2016)Transfer learning for class imbalance problems with inadequate data., and . Knowl. Inf. Syst., 48 (1): 201-228 (2016)Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models., , , , and . EuroS&P, page 139-157. IEEE, (2020)Self-Supervised Learning of Contextual Embeddings for Link Prediction in Heterogeneous Networks., , , , and . WWW, page 2946-2957. ACM / IW3C2, (2021)Multi-Task Clustering using Constrained Symmetric Non-Negative Matrix Factorization., and . SDM, page 785-793. SIAM, (2014)T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification., , , , , , , and . USENIX Security Symposium, page 2255-2272. USENIX Association, (2021)Multilingual Code Snippets Training for Program Translation., , and . AAAI, page 11783-11790. AAAI Press, (2022)Identifying Information-Rich Subspace Trends in High-Dimensional Data., and . SDM, page 557-568. SIAM, (2009)