Author of the publication

Girls Rule, Boys Drool: Extracting Semantic and Affective Stereotypes from Twitter.

, , and . CSCW, page 1362-1374. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Its All in a Name: Detecting and Labeling Bots by Their Name., and . CoRR, (2018)Estimating the Near-Term Changes of an Organization with Simulations., and . AAAI Fall Symposium: Interaction and Emergent Phenomena in Societies of Agents, volume FS-06-05 of AAAI Technical Report, page 111-118. AAAI Press, (2006)An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time., , and . SBP, volume 7812 of Lecture Notes in Computer Science, page 65-74. Springer, (2013)Complex Networks for Terrorist Target Prediction., , and . SBP-BRiMS, volume 10899 of Lecture Notes in Computer Science, page 348-353. Springer, (2018)Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption., , and . J. Artificial Societies and Social Simulation, (2013)Graph-Hist: Graph Classification from Latent Feature Histograms With Application to Bot Detection., , and . CoRR, (2019)Characterizing Bot Networks on Twitter: An Empirical Analysis of Contentious Issues in the Asia-Pacific., and . SBP-BRiMS, volume 11549 of Lecture Notes in Computer Science, page 153-162. Springer, (2019)ORA: A Toolkit for Dynamic Network Analysis and Visualization.. Encyclopedia of Social Network Analysis and Mining, (2014)DDoS cyber-attacks network: Who's attacking whom., and . ISI, page 218. IEEE, (2016)A Socio-Computational Approach to Predicting Bioweapon Proliferation., , , and . IEEE Trans. Comput. Social Systems, 5 (2): 458-467 (2018)