Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emerald: An Automated Modeling and Verification Tool for Component-Based Real-Time Systems., , and . QSIC, page 120-123. IEEE, (2012)DANE: Domain Adaptive Network Embedding., , , , and . IJCAI, page 4362-4368. ijcai.org, (2019)FNSim: A Device-Circuit-Algorithm Codesigned Simulator for Flash based Neural Network., , , , , , , and . ASICON, page 1-4. IEEE, (2019)Counterfactual Neural Temporal Point Process for Estimating Causal Influence of Misinformation on Social Media., , and . NeurIPS, (2022)Identifying Coordinated Accounts on Social Media through Hidden Influence and Group Behaviours., , , and . KDD, page 1441-1451. ACM, (2021)Demo: Using Smartphone and Optical Mouse to Enhance Web Interaction., , , , , and . PerCom Workshops, page 392-394. IEEE, (2021)Accepting blame for safe tunneled exceptions., , , , and . PLDI, page 281-295. ACM, (2016)Capturing Cross-Platform Interaction for Identifying Coordinated Accounts of Misinformation Campaigns., , and . ECIR (2), volume 13981 of Lecture Notes in Computer Science, page 694-702. Springer, (2023)Prompting Large Language Models with Divide-and-Conquer Program for Discerning Problem Solving., , , , and . CoRR, (2024)Compiling Probabilistic Programs for Variable Elimination with Information Flow., , and . Proc. ACM Program. Lang., 8 (PLDI): 1755-1780 (2024)