Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Artificial Intelligence for Source Code: A Dialogue Systems Perspective., and . CoRR, (2022)Vulnerable to Misinformation? Verifi!, , , , , , , and . CoRR, (2018)Natural Language Generation Using Reinforcement Learning with External Rewards., , and . CoRR, (2019)EVIL: Exploiting Software via Natural Language., , , , , , and . ISSRE, page 321-332. IEEE, (2021)Detecting Asks in Social Engineering Attacks: Impact of Linguistic and Structural Knowledge., , , , , , , , , and . AAAI, page 7675-7682. AAAI Press, (2020)Emojis and Words Work Together in the Service of Communication., , , and . ICWSM Workshops, (2021)EmoVis - An Interactive Visualization Tool to Track Emotional Trends During Crisis Events., , , , , , and . AHFE (14), volume 965 of Advances in Intelligent Systems and Computing, page 14-24. Springer, (2019)Active Defense Against Social Engineering: The Case for Human Language Technology., , , , , , , , , and 8 other author(s). STOC@LREC, page 1-8. European Language Resources Association, (2020)Influence and Power in Group Interactions., , , , , , , , and . SBP, volume 7812 of Lecture Notes in Computer Science, page 19-27. Springer, (2013)Detecting Asks in SE attacks: Impact of Linguistic and Structural Knowledge., , , , , , , , , and . CoRR, (2020)