Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Carbon-nanotube-based passively mode-locked erbium-doped fiber laser for broadband supercontinuum generation., , and . ICICS, page 1-4. IEEE, (2015)Traffic grooming in WDM SONET UPSR rings with multiple line speeds., and . INFOCOM, page 718-729. IEEE, (2005)#suicidal - A Multipronged Approach to Identify and Explore Suicidal Ideation in Twitter., , , , , and . CIKM, page 941-950. ACM, (2019)Towards privacy preserving social recommendation under personalized privacy settings., , , , , , and . World Wide Web, 22 (6): 2853-2881 (2019)Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning., , , , , and . CoRR, (2019)Debunking Rumors in Social Networks: A Timely Approach., and . WebSci, page 323-331. ACM, (2019)A Distributed Hierarchical Clustering System for Web Mining., , , and . WAIM, volume 2118 of Lecture Notes in Computer Science, page 103-113. Springer, (2001)Modelling Classification Performance for Large Data Sets., , and . WAIM, volume 2118 of Lecture Notes in Computer Science, page 317-328. Springer, (2001)Exploiting Emojis for Sarcasm Detection., , , and . SBP-BRiMS, volume 11549 of Lecture Notes in Computer Science, page 70-80. Springer, (2019)Hierarchical Propagation Networks for Fake News Detection: Investigation and Exploitation., , , and . CoRR, (2019)