From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Assessing AI vs Human-Authored Spear Phishing SMS Attacks: An Empirical Study Using the TRAPD Method., , , , , и . CoRR, (2024)Normalizing Flows for Knockoff-free Controlled Feature Selection., , и . NeurIPS, (2022)Normalizing Flows for Knockoff-free Controlled Feature Selection., , и . CoRR, (2021)Learning Physical Models that Can Respect Conservation Laws., , , , и . ICML, том 202 из Proceedings of Machine Learning Research, стр. 12469-12510. PMLR, (2023)Supporting content curation communities: The case of the Encyclopedia of Life, , , , и . Journal of the American Society for Information Science and Technology, 63 (6): 1092--1107 (2012)Visualizing Cybersecurity Diagrams: An Empirical Analysis of Common Weakness Enumeration Images., , , , и . HCI (45), том 14728 из Lecture Notes in Computer Science, стр. 296-317. Springer, (2024)Social Network Analysis in HCI., и . Ways of Knowing in HCI, Springer, (2014)Overhearing the crowd: an empirical examination of conversation reuse in a technical support community.. C&T, стр. 155-164. ACM, (2009)Design tactics for authentic interactive fiction: insights from alternate reality game designers., , , , , и . CHI, стр. 947-950. ACM, (2014)Alternate Reality Games: Platforms for Collaborative Learning., , , , , , и . ICLS, International Society of the Learning Sciences, (2012)