Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering signature of social networks with application to community detection., , and . COMSNETS, page 1-7. IEEE, (2014)Man-O-Meter: Modeling and Assessing the Evolution of Language Usage of Individuals on Microblogs., , , and . APWeb (1), volume 9931 of Lecture Notes in Computer Science, page 342-355. Springer, (2016)WebHound: a data-driven intrusion detection from real-world web access logs., , , , and . Soft Comput., 23 (22): 11947-11965 (2019)Driving the Last Mile: Characterizing and Understanding Distracted Driving Posts on Social Networks., , , , , and . ICWSM, page 393-404. AAAI Press, (2020)TellTail: Fast Scoring and Detection of Dense Subgraphs., , , and . AAAI, page 4150-4157. AAAI Press, (2020)Me, Myself and My Killfie: Characterizing and Preventing Selfie Deaths., , , , , and . CoRR, (2016)OEC: Open-Ended Classification for Future-Proof Link-Fraud Detection., , , and . CoRR, (2017)xStream: Outlier Detection in Feature-Evolving Data Streams., , and . KDD, page 1963-1972. ACM, (2018)A Novel and Model Independent Approach for Efficient Influence Maximization in Social Networks., and . WISE (2), volume 8181 of Lecture Notes in Computer Science, page 73-87. Springer, (2013)Incremental subclass discriminant analysis: A case study in face recognition., , , and . ICIP, page 593-596. IEEE, (2012)