Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CISC: clustered image search by conceptualization., , , , and . EDBT, page 749-752. ACM, (2013)Efficient Similar Region Search with Deep Metric Learning., , and . KDD, page 1850-1859. ACM, (2018)Cover Trees Revisited: Exploiting Unused Distance and Direction Information., , , , and . IEEE Trans. Knowl. Data Eng., 35 (11): 11231-11245 (November 2023)Intriguing Usage of Applicability Domain: Lessons from Cheminformatics Applied to Adversarial Learning., , , , , , and . CoRR, (2021)WISK: A Workload-aware Learned Index for Spatial Keyword Queries., , , , , , and . CoRR, (2023)KnowledgeNet: Disaggregated and Distributed Training and Serving of Deep Neural Networks., , , and . OpML, page 47-49. USENIX Association, (2019)RSGNN: A Model-agnostic Approach for Enhancing the Robustness of Signed Graph Neural Networks., , , , , , , and . WWW, page 60-70. ACM, (2023)Representing Verbs as Argument Concepts., , and . AAAI, page 2615-2621. AAAI Press, (2016)Graph-Based Log Anomaly Detection via Adversarial Training., , , , and . SETTA, volume 14464 of Lecture Notes in Computer Science, page 55-71. Springer, (2023)Querying and mining geo-textual data for exploration: Challenges and opportunities., , and . ICDE Workshops, page 165-168. IEEE Computer Society, (2016)