Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable MCMC Sampling for Nonsymmetric Determinantal Point Processes., , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 8213-8229. PMLR, (2022)q-Anon: Rethinking Anonymity for Social Networks., , and . SocialCom/PASSAT, page 185-192. IEEE Computer Society, (2010)Social-K: Real-time K-anonymity guarantees for social network applications., , and . PerCom Workshops, page 600-606. IEEE Computer Society, (2010)Tensorized Determinantal Point Processes for Recommendation., , and . KDD, page 1605-1615. ACM, (2019)Adversarial Training of Word2Vec for Basket Completion., , and . CoRR, (2018)Understanding Group Event Scheduling via the OutWithFriendz Mobile Application., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (4): 175:1-175:19 (2017)Combining Reward and Rank Signals for Slate Recommendation., , , , , , and . CoRR, (2021)Learning from Multiple Sources for Data-to-Text and Text-to-Data., , , and . AISTATS, volume 206 of Proceedings of Machine Learning Research, page 3733-3753. PMLR, (2023)Enhancing group recommendation by incorporating social relationship interactions., , , , , , and . GROUP, page 97-106. ACM, (2010)Solutions to Security and Privacy Issues in Mobile Social Networking., , and . CSE (4), page 1036-1042. IEEE Computer Society, (2009)