Author of the publication

ECP: Evaluation Community Portal A Portal for Evaluation And Collaboration in User Modelling and Personalisation Research.

, , , and . UMAP (Extended Proceedings), volume 1618 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Evaluating the Impact of Anaphora Resolution on Text Summarisation from a Human Perspective., , , , , and . NLDB, volume 9612 of Lecture Notes in Computer Science, page 187-199. Springer, (2016)Slicepedia: providing customized reuse of open-web resources for adaptive hypermedia., , and . HT, page 23-32. ACM, (2012)Decision Conversations Decoded., , , , and . NAACL-HLT (Demonstrations), page 91-95. Association for Computational Linguistics, (2018)Slicepedia: Content-agnostic slicing resource production for adaptive hypermedia., , and . Comput. Sci. Inf. Syst., 11 (1): 393-417 (2014)ECP: Evaluation Community Portal A Portal for Evaluation And Collaboration in User Modelling and Personalisation Research., , , and . UMAP (Extended Proceedings), volume 1618 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)The Devil is in the GAN: Defending Deep Generative Models Against Backdoor Attacks., , and . CoRR, (2021)Examining Multimodal Characteristics of Video to Understand User Engagement., , , and . UMAP Workshops, volume 1388 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)Slicepedia: Automating the Production of Educational Resources from Open Corpus Content., , and . EC-TEL, volume 7563 of Lecture Notes in Computer Science, page 407-412. Springer, (2012)An Extensible De-Identification Framework for Privacy Protection of Unstructured Health Information: Creating Sustainable Privacy Infrastructures., , , and . MedInfo, volume 264 of Studies in Health Technology and Informatics, page 1140-1144. IOS Press, (2019)The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models., , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 776-783. Springer, (2022)