Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tensorized Determinantal Point Processes for Recommendation., , and . KDD, page 1605-1615. ACM, (2019)Scalable MCMC Sampling for Nonsymmetric Determinantal Point Processes., , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 8213-8229. PMLR, (2022)q-Anon: Rethinking Anonymity for Social Networks., , and . SocialCom/PASSAT, page 185-192. IEEE Computer Society, (2010)Social-K: Real-time K-anonymity guarantees for social network applications., , and . PerCom Workshops, page 600-606. IEEE Computer Society, (2010)Adversarial Training of Word2Vec for Basket Completion., , and . CoRR, (2018)Combining Reward and Rank Signals for Slate Recommendation., , , , , , and . CoRR, (2021)Understanding Group Event Scheduling via the OutWithFriendz Mobile Application., , , , , and . CoRR, (2017)Differentially Private Gradient Flow based on the Sliced Wasserstein Distance for Non-Parametric Generative Modeling., , , , , , and . CoRR, (2023)Learning from Multiple Sources for Data-to-Text and Text-to-Data., , , and . AISTATS, volume 206 of Proceedings of Machine Learning Research, page 3733-3753. PMLR, (2023)AnchorMF: towards effective event context identification., , , , and . CIKM, page 629-638. ACM, (2013)