Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"To Target or Not to Target": Identification and Analysis of Abusive Text Using Ensemble of Classifiers., , and . CoRR, (2020)On opportunistic use of location of licensed users in improving the throughput of cognitive radio., and . Telecommun. Syst., 66 (3): 523-531 (2017)Stuck? No worries!: Task-aware Command Recommendation and Proactive Help for Analysts., , , , , and . CoRR, (2019)A survey of SRAM-based in-memory computing techniques and applications., , , and . J. Syst. Archit., (2021)Characterizing, Detecting, and Predicting Online Ban Evasion., , and . WWW, page 2614-2623. ACM, (2022)MM-Soc: Benchmarking Multimodal Large Language Models in Social Media Platforms., , , , and . CoRR, (2024)Incorporating Stylistic Lexical Preferences in Generative Language Models., , and . EMNLP (Findings), volume EMNLP 2020 of Findings of ACL, page 1074-1079. Association for Computational Linguistics, (2020)Overcoming Language Disparity in Online Content Classification with Multimodal Learning., , , , and . ICWSM, page 1040-1051. AAAI Press, (2022)An Efficient Image Morphing Technique for Camera Phones., , and . CISST, page 8-12. CSREA Press, (2005)FM Receiver Design Using Programmable PLL., , and . Wirel. Pers. Commun., 97 (1): 773-787 (2017)