Author of the publication

Gaussian Process Bandits for Online Influence Maximization.

, , and . ICDM (Workshops), page 106-113. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Refined Hardness Estimation of LWE in Two-Step Mode., , , , and . Public Key Cryptography (3), volume 14603 of Lecture Notes in Computer Science, page 3-35. Springer, (2024)Efficient Navigation for Constrained Shortest Path with Adaptive Expansion Control., , , and . ICDM, page 588-597. IEEE, (2022)On the Submodularity of Diffusion Models: Equivalent Conditions and Applications., , and . CoRR, (2020)Enhancing Sequential Recommendation via LLM-based Semantic Embedding Learning., , , , , , , , and . WWW (Companion Volume), page 103-111. ACM, (2024)Forecasting Interaction Order on Temporal Graphs., , , and . KDD, page 1884-1893. ACM, (2021)Graph Neural Point Process for Temporal Interaction Prediction., , and . IEEE Trans. Knowl. Data Eng., 35 (5): 4867-4879 (May 2023)Explaining Temporal Graph Models through an Explorer-Navigator Framework., , , , , , and . ICLR, OpenReview.net, (2023)Gaussian Process Bandits for Online Influence Maximization., , and . ICDM (Workshops), page 106-113. IEEE, (2020)On the Submodularity of Diffusion Models: Equivalent Conditions and Applications, , and . (2019)cite arxiv:2002.00845Comment: Conference pre-print.DeepIS: Susceptibility Estimation on Social Networks., , , and . WSDM, page 761-769. ACM, (2021)