Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vandals and Hoaxes on the Web.. CyberSafety@CIKM, page 2. ACM, (2016)Characterizing and Predicting Social Correction on Twitter., , , and . WebSci, page 86-95. ACM, (2023)Community Interaction and Conflict on the Web., , , and . WWW, page 933-943. ACM, (2018)A Survey on the Role of Crowds in Combating Online Misinformation: Annotators, Evaluators, and Creators., , , , , and . CoRR, (2023)Metric Logic Program Explanations for Complex Separator Functions., , , and . SUM, volume 9858 of Lecture Notes in Computer Science, page 199-213. Springer, (2016)Adversarial Robustness of Prompt-based Few-Shot Learning for Natural Language Understanding., , , and . ACL (Findings), page 2196-2208. Association for Computational Linguistics, (2023)Routing-aware resource allocation for mixture preparation in digital microfluidic biochips., , , , and . ISVLSI, page 165-170. IEEE Computer Socity, (2013)Empowering Interdisciplinary Insights with Dynamic Graph Embedding Trajectories., , , , , and . CoRR, (2024)MedHalu: Hallucinations in Responses to Healthcare Queries by Large Language Models., , , , , and . CoRR, (2024)Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack., , , and . IACR Cryptology ePrint Archive, (2015)