Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, weeks-long exchange with a spammer who offered to cut him in on a hot deal.
Y. Wang, L. Wang, Y. Li, D. He, and T. Liu. Proceedings of the 26th Annual Conference on Learning Theory
, volume 30 of Proceedings of Machine Learning Research, page 25--54. Princeton, NJ, USA, PMLR, (June 2013)
S. Wang, L. Hu, Y. Wang, X. He, Q. Sheng, M. Orgun, L. Cao, F. Ricci, and P. Yu. (2021)cite arxiv:2105.06339Comment: Accepted by IJCAI 2021 Survey Track, copyright is owned to IJCAI. The first systematic survey on graph learning based recommender systems. arXiv admin note: text overlap with arXiv:2004.11718.
M. Paris, and R. Jäschke. Proceedings of the 14th International Conference on Knowledge Science, Engineering and Management
, volume 12816 of Lecture Notes in Artificial Intelligence, page 1--14. Springer, (2021)