Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who Should Be Invited to My Party: A Size-Constrained k-Core Problem in Social Networks., , , , , and . J. Comput. Sci. Technol., 34 (1): 170-184 (2019)Toward Intention Discovery for Early Malice Detection in Bitcoin., , , and . CoRR, (2022)Emotion-aware Chat Machine: Automatic Emotional Response Generation for Human-like Emotional Interaction., , , , , , and . CoRR, (2021)AvatarVerse: High-quality & Stable 3D Avatar Creation from Text and Pose., , , , , , , , , and . CoRR, (2023)Data Pricing in Machine Learning Pipelines., , , , and . CoRR, (2021)The Role of Different Tie Strength in Disseminating Different Topics on a Microblog., , , and . ASONAM, page 203-207. ACM, (2017)Who am I on twitter?: a cross-country comparison., , and . WWW (Companion Volume), page 253-254. ACM, (2014)High Utility Episode Mining Made Practical and Fast., , , , , and . ADMA, volume 8933 of Lecture Notes in Computer Science, page 71-84. Springer, (2014)Personal Credit Profiling via Latent User Behavior Dimensions on Social Media., , , , , , and . PAKDD (2), volume 9652 of Lecture Notes in Computer Science, page 130-142. Springer, (2016)Social Stream Classification with Emerging New Labels., , , , and . PAKDD (1), volume 10937 of Lecture Notes in Computer Science, page 16-28. Springer, (2018)