Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Quality Assurance for Data Labels through Crowdsourcing and Domain Expert Collaboration., , , , , , and . EDBT, page 646-649. OpenProceedings.org, (2018)Automatic Speaker Recognition with Limited Data., , , , and . WSDM, page 340-348. ACM, (2020)Interpretable Attribute-based Action-aware Bandits for Within-Session Personalization in E-commerce., , , , , , and . IEEE Data Eng. Bull., 44 (2): 65-80 (2021)A Short-Term Bookmarking System for Collecting User-Interest Data., , and . PAKDD Workshops, volume 8643 of Lecture Notes in Computer Science, page 247-254. Springer, (2014)Toward Pareto Efficient Fairness-Utility Trade-off in Recommendation through Reinforcement Learning., , , , , , and . WSDM, page 316-324. ACM, (2022)Isa: Intuit Smart Agent, A Neural-Based Agent-Assist Chatbot., , , , and . ICDM Workshops, page 1423-1428. IEEE, (2018)Recommendation Strategies Based on User-Generated Data.. University of California, Los Angeles, USA, (2013)Speaker Identification for Household Scenarios with Self-Attention and Adversarial Training., , , , and . INTERSPEECH, page 2272-2276. ISCA, (2020)Detecting Unknown Malicious Executables Using Portable Executable Headers., , and . NCM, page 278-284. IEEE Computer Society, (2009)Efficient approximate thompson sampling for search query recommendation., , , and . SAC, page 740-746. ACM, (2015)