Author of the publication

Threat detection in online discussions.

, , , and . WASSA@NAACL-HLT, page 66-71. The Association for Computer Linguistics, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

THREAT: A Large Annotated Corpus for Detection of Violent Threats., , , and . CBMI, page 1-5. IEEE, (2019)On the classification of dynamical data streams using novel Änti-Bayesian" techniques., , and . Pattern Recognit., (2018)Improving classification of tweets using word-word co-occurrence information from a large external corpus., , , and . SAC, page 1174-1177. ACM, (2016)Solving Stochastic Point Location Problem in a Dynamic Environment with Weak Estimation., , and . RACS, page 30-35. ACM, (2017)On Enhancing the Label Propagation Algorithm for Sentiment Analysis Using Active Learning with an Artificial Oracle., , , and . ICAISC, volume 9120 of Lecture Notes in Computer Science, page 799-810. Springer, (2015)Equivalence Projective Simulation as a Framework for Modeling Formation of Stimulus Equivalence Classes., , , and . Neural Comput., 32 (5): 912-968 (2020)On solving the SPL problem using the concept of probability flux., , and . Appl. Intell., 49 (7): 2699-2722 (2019)Efficient Tracking of Statistical Properties of Data Streams with Rapid Changes., and . MED, page 284-289. IEEE, (2018)A Novel Incremental Quantile Estimator Using the Magnitude of the Observations., and . MED, page 290-295. IEEE, (2018)A Queue Model for Reliable Forecasting of Future CPU Consumption., , , , and . Mob. Networks Appl., 23 (4): 840-853 (2018)