Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Data Sentiment Analysis in Smart Environments - Extending Dual Polarities for Crowd Pulse Capturing., , , and . DATA, page 175-182. SciTePress, (2013)Domain-Aligned Data Augmentation for Low-Resource and Imbalanced Text Classification., , , , and . ECIR (2), volume 13981 of Lecture Notes in Computer Science, page 172-187. Springer, (2023)Community Detection in Social Media by Leveraging Interactions and Intensities., , and . WISE (2), volume 8181 of Lecture Notes in Computer Science, page 57-72. Springer, (2013)Towards a User-Aware Virtual Museum., , , , , , and . VS-GAMES, page 228-235. IEEE Computer Society, (2011)User behavior analysis on social web with knowledge discovery techniques. Aristotle University Of Thessaloniki, Greece, (2017)National Archive of PhD Theses: oai:10442/42319.A Unified Deep Learning Architecture for Abuse Detection., , , , , and . WebSci, page 105-114. ACM, (2019)A Streaming Machine Learning Framework for Online Aggression Detection on Twitter., , and . IEEE BigData, page 5056-5067. IEEE, (2020)Leveraging Transformer Self Attention Encoder for Crisis Event Detection in Short Texts., , , , and . ECIR (2), volume 13186 of Lecture Notes in Computer Science, page 163-171. Springer, (2022)Invited keynote on IOT4SAFE 2020: Semantic Web Technologies in Fighting Crime and Terrorism: The CONNEXIONs Approach., , , , , and . IOT4SAFE@ESWC, volume 2686 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)Retweeting Activity on Twitter: Signs of Deception., , , , and . PAKDD (1), volume 9077 of Lecture Notes in Computer Science, page 122-134. Springer, (2015)