Author of the publication

Citation recommendation without author supervision

, , , , and . Proceedings of the fourth ACM International Conference on Web Search and Data Mining, page 755--764. New York, NY, USA, ACM, (2011)
DOI: 10.1145/1935826.1935926

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dualminer: A dual-pruning algorithm for itemsets with constraints, , , and . Data Mining and Knowledge Discovery, 7 (3): 241--272 (2003)DualMiner: A Dual-Pruning Algorithm for Itemsets with Constraints., , , and . Data Min. Knowl. Discov., 7 (3): 241-272 (2003)Unifying Adversarial Training Algorithms with Flexible Deep Data Gradient Regularization., , and . CoRR, (2016)$\ell$-Diversity: Privacy Beyond $\kappa$-Anonymity, , , and . ICDE '06: Proceedings of the 22nd International Conference on Data Engineering, page 24. Washington, DC, USA, IEEE Computer Society, (2006)A New Class of Private Chi-Square Tests, and . (2016)cite arxiv:1610.07662.Maximum Likelihood Postprocessing for Differential Privacy under Consistency Constraints., , and . KDD, page 635-644. ACM, (2015)On Estimating the Swapping Rate for Categorical Data.. KDD, page 557-566. ACM, (2015)Free Gap Estimates from the Exponential Mechanism, Sparse Vector, Noisy Max and Related Algorithms., , , , , and . CoRR, (2020)The Permute-and-Flip Mechanism is Identical to Report-Noisy-Max with Exponential Noise., , , , , , and . CoRR, (2021)Reconstruction Attacks on Aggressive Relaxations of Differential Privacy., , , , and . CoRR, (2022)