Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Network Fusion for Organizational Turnover Prediction., , , and . ACM Trans. Manag. Inf. Syst., 12 (2): 16:1-16:18 (2021)Addressing Exposure Bias in Uplift Modeling for Large-scale Online Advertising., , , , , and . ICDM, page 1156-1161. IEEE, (2021)Pairwise Constrained Clustering with Group Similarity-Based Patterns., , , , and . ICMLA, page 260-265. IEEE Computer Society, (2010)Representation Learning on Knowledge Graphs for Node Importance Estimation., , , , , and . KDD, page 646-655. ACM, (2021)Skeptical Deep Learning with Distribution Correction., , , , , , and . CoRR, (2018)Patent Litigation Prediction: A Convolutional Tensor Factorization Approach., , , , , and . IJCAI, page 5052-5059. ijcai.org, (2018)A Stochastic Model for Context-Aware Anomaly Detection in Indoor Location Traces., , , , and . ICDM, page 449-458. IEEE Computer Society, (2012)Catch Me If You Can: Detecting Pickpocket Suspects from Large-Scale Transit Records., , , , and . KDD, page 87-96. ACM, (2016)Finding Similar Exercises in Online Education Systems., , , , , , and . KDD, page 1821-1830. ACM, (2018)A Treatment Engine by Predicting Next-Period Prescriptions., , , , , and . KDD, page 1608-1616. ACM, (2018)