Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks., , , and . CoRR, (2015)A Safety Net: How Older Adults Build and Maintain Interpersonal Relationships., , , , , , and . CHI Extended Abstracts, ACM, (2018)Heterogeneous Edge Embedding for Friend Recommendation., , , and . ECIR (2), volume 11438 of Lecture Notes in Computer Science, page 172-179. Springer, (2019)Heterogeneous Edge Embeddings for Friend Recommendation., , , and . CoRR, (2019)Instagram of Rivers: Facilitating Distributed Collaboration in Hyperlocal Citizen Science., , , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW1): 97:1-97:22 (2022)IKDSumm: Incorporating Key-phrases into BERT for extractive Disaster Tweet Summarization., , , and . CoRR, (2023)Not in my Backyard!? Lessons from a Community Conflict., , and . C&T, page 234-244. ACM, (2021)Emerging threats abusing phone numbers exploiting cross-platform features.. ASONAM, page 1339-1341. IEEE Computer Society, (2016)The Safety Net of Aging in Place: Understanding How Older Adults Construct, Develop, and Maintain Their Social Circles., , , , , , and . PervasiveHealth, page 191-200. ACM, (2018)Empowering Community Water Data Stakeholders., , , , and . Interact. Comput., 31 (5): 492-506 (2019)