Search for persons
X
?
Combating Online Hostile Posts in Regional Languages during Emergency Situation; Communications in Computer and Information Science ,
1
Transformer-Based Language Model Fine-Tuning Methods for CO..:
, In:
?
2019 International Conference on Data Mining Workshops (ICDMW) ,
2
Learning Theory and Algorithms for Revenue Maximization in ..:
, In:
?
Companion Proceedings of the The Web Conference 2018 ,
3
The Whole-Page Optimization via Dynamic Ad Allocation:
, In:
?
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management ,
4
Generative Graph Augmentation for Minority Class in Fraud D..:
, In:
?
2023 IEEE 5th International Conference on Cognitive Machine Intelligence (CogMI) ,
5
Location-Adaptive Generative Graph Augmentation for Fraud D..:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
6
Program Slice Based Vulnerable Code Clone Detection:
, In:
?
Lecture Notes in Computer Science; Artificial Intelligence and Security ,
7
KM $$^{3}$$ SVM: A Efficient Min-Max Modular Support Vector..:
, In:
?
2019 8th International Symposium on Next Generation Electronics (ISNE) ,
8
Electrical and viscoelastic measurement of cancer cells in ..:
, In:
?
Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics ,
9
A Machine Learning Approach for Uncovering N6-methyladenosi..:
, In:
?
Lecture Notes in Computer Science; Image and Graphics ,
10