{
"id" : "ned50213b",
"class" : "Person",
"name" : "Caverlee, James",
"primaryEmail" : "caverlee@tamu.edu",
"phone" : "1 979 845 5534",
"preferredTitle" : "Professor - Term Appoint",
"positions" : [ {
"id" : "ncbcceb3b",
"label" : "Professor - Term Appoint",
"type" : "FacultyPosition",
"organizations" : [ {
"id" : "n3b8431fc",
"label" : "Computer Science and Engineering",
"parent" : [ {
"id" : "n8627320c",
"label" : "College of Engineering"
} ]
} ]
} ],
"overview" : "My research is generally in the areas of web-scale information management, distributed data-intensive
systems, and social computing. Fundamentally, my overall research goal is to develop algorithms and
systems to enable efficient and trustworthy information sharing and knowledge discovery over dynamic,
heterogeneous, and massive-scale networked information systems.",
"hrJobTitle" : "Professor",
"keywords" : [ "Behavioral And Social Science", "Temporal Effects", "Occasion", "Recommendation", "E-commerce", "14 Life Below Water", "Basic Behavioral And Social Science", "Behavioral And Social Science", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Web Algorithms", "Credibility", "Link Analysis", "Spam", "Pagerank", "Amazon Mechanical Turk", "Gold Standard Evaluation", "Peer Consistency Evaluation", "Crowdsourcing", "Multilinear Data Analysis", "Dynamic Data Analysis", "Tensor Completion", "Big Data Analytics", "Tensor", "Tensor Decomposition", "Tensor Factorization", "Self-attention", "User-generated Item Lists", "Recommender System", "4606 Distributed Computing And Systems Software", "4006 Communications Engineering", "46 Information And Computing Sciences", "40 Engineering", "Spatial Impact", "Spatio-temporal Analysis", "Social Media", "Networking And Information Technology R&d", "Location Prediction", "Spatial Data Mining", "Twitter", "4609 Information Systems", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Cancer", "Complementary Item", "Quality-aware", "Recommendation", "Health Services", "Clinical Research", "4 Quality Education", "Basic Behavioral And Social Science", "Behavioral And Social Science", "User Profile", "User Behavior", "Social Media", "I.2.7", "Cs.cl", "Stepwise Influence", "Interpretation", "Neural Network", "Probing", "Deep Web Database", "Biased Discovery", "Database Ranking", "Deep Web", "4609 Information Systems", "11 Sustainable Cities And Communities", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Behavioral And Social Science", "3 Good Health And Well Being", "Local Coherence", "Recommendation", "Neural Networks", "Networking And Information Technology R&d", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Mental Health", "Drug Abuse (nida Only)", "Substance Abuse", "3 Good Health And Well Being", "Clinical Research", "3605 Screen And Digital Media", "4701 Communication And Media Studies", "47 Language, Communication And Culture", "36 Creative Arts And Writing", "46 Information And Computing Sciences", "Behavioral And Social Science", "Cs.ir", "Social Bookmarking", "Temporal", "Community", "Model", "4604 Cybersecurity And Privacy", "46 Information And Computing Sciences", "Behavioral And Social Science", "Distribution Distortion", "Recommendation System", "Calibration", "Npov", "Language Bias", "Wikipedia Quality", "4609 Information Systems", "3605 Screen And Digital Media", "4701 Communication And Media Studies", "47 Language, Communication And Culture", "36 Creative Arts And Writing", "46 Information And Computing Sciences", "Cs.cl", "3 Good Health And Well Being", "Campaign Detection", "Experimentation", "Social Media", "Algorithms", "Design", "Web-based Services", "Information Technology And Systems", "DISTRIBUTED SYSTEMS", "Internet Search", "Systems And Software", "Information Storage And Retrieval", "Online Information Services", "Web Search", "Information Search And Retrieval", "General", "4611 Machine Learning", "46 Information And Computing Sciences", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Deceptive Review", "Crowdsourcing Site", "Review Site", "Crowdsourced Manipulation", "Amazon", "Social Media Analysis", "User Modeling", "Data-driven", "Human-robot Interaction", "Trust", "Popularity Bias", "Dynamic Recommendation", "Bioengineering", "Clinical Research", "Autoencoder", "Hinge-based Loss Function", "Recommender Systems", "Neural Network", "Collaborative Filtering", "Constructed Tree Comparison", "Playlist Continuation", "Recommender System", "11 Sustainable Cities And Communities", "Generic Health Relevance", "3 Good Health And Well Being", "Latent Representation", "Rating Distribution", "Recommendation System", "Polarization", "Basic Behavioral And Social Science", "Behavioral And Social Science", "Enterprise Information Network", "Host Assessment", "Entity Embedding", "Behavior Modeling", "Comparative Analysis", "Anomaly Detection", "Community Detection", "Recommendation Systems", "Meta-learning", "Cold-start", "Cs.cl", "Cs.lg", "Cold Start Recommendation", "Fairness", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Abusive Language", "Vitriol", "Personal Attacks", "Text Classification", "Social Media", "3605 Screen And Digital Media", "4701 Communication And Media Studies", "47 Language, Communication And Culture", "36 Creative Arts And Writing", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Disentangled Representation Learning", "Content-aware Recommendation", "Collaborative Filtering", "Code Generator", "Data Extraction", "Web Services", "Service Oriented Architecture", "4604 Cybersecurity And Privacy", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Cs.ir", "Behavioral And Social Science", "Clinical Research", "16 Peace, Justice And Strong Institutions", "Networking And Information Technology R&d", "Basic Behavioral And Social Science", "Behavioral And Social Science", "Networking And Information Technology R&d (nitrd)", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Bioengineering", "46 Information And Computing Sciences", "4005 Civil Engineering", "40 Engineering", "Cs.ir", "Cs.ir", "Fairness-aware", "Tensor Completion", "Recommender Systems", "4610 Library And Information Studies", "46 Information And Computing Sciences", "Recommendation Bias", "Equal Opportunity", "Statistical Parity", "Recommender Systems", "Campaign", "Social Spam", "Crowdturfing", "Misinformation", "Social Media", "Cyber Security", "Deep Web", "Geography", "Law Of War", "Cyberlaw", "Cyber War", "Internet", "National Security", "Law Of Armed Conflict", "Tor", "Silk Road", "Darknet", "Cyber Crime", "REGULATION", "Computer Crime", "Networking And Information Technology R&d", "Biotechnology", "Bert", "Machine Learning", "Natural Language Processing", "Review Fraud", "Synthetic Data Labeling", "Information Retrieval", "Lstm", "Review Hijacking", "Amazon Reviews", "Siamese Network", "Nlp", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Attentive Adversarialdel", "Recommendation", "Content Curation", "Relationship Quality", "Social Web", "Reputation", "Trust", "Real-time Web", "Crowd", "Community", "Monitoring", "46 Information And Computing Sciences", "4 Quality Education", "Basic Behavioral And Social Science", "Behavioral And Social Science", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Bloggers", "Instagrammers", "Fashion Recommendation", "Recurrent Neural Network", "4608 Human-centred Computing", "Health Services", "46 Information And Computing Sciences", "Clinical Research", "Filter Bubble", "Dynamic", "Recommender System", "Local Expert", "Expert Finding", "Social Tagging", "Twitter", "Crowdsourcing", "Attenuation Pattern", "Damage Assessment", "Social Media", "Cs.dl", "Cs.lg", "Cs.cl", "Cs.ai", "3 Good Health And Well Being", "Cs.dl", "Key Opinion Leaders", "Recommendation", "Graph Neural Networks", "Basic Behavioral And Social Science", "Behavioral And Social Science", "Clinical Research", "7 Affordable And Clean Energy", "Quality Analysis", "Pinterest", "Social Media", "Recommendation", "Diversification", "Distortion", "Distribution", "Bias", "Cs.ir", "Semantics", "Commerce", "Neural Networks, Computer", "Algorithms", "Genetics", "Behavioral And Social Science", "Clinical Research", "3704 Geoinformatics", "46 Information And Computing Sciences", "Pediatric", "37 Earth Sciences", "3 Good Health And Well Being", "Service Discovery", "Dynamic Web Data", "Web Crawling", "Deep Web", "Cs.ir", "Social Honeypots", "Spam", "Social Media", "3 Good Health And Well Being", "Cs.lg", "Cs.cl", "Cs.ir", "Cs.ai", "Networking And Information Technology R&d", "Basic Behavioral And Social Science", "Behavioral And Social Science", "Cs.lg", "4701 Communication And Media Studies", "47 Language, Communication And Culture", "Basic Behavioral And Social Science", "Behavioral And Social Science", "App Reviews", "User Behavior", "Manipulation", "Crowdsourcing", "Geo-spatial", "Local Expert Discovery", "Twitter List", "Local Expert", "Expert Finding", "Social Tagging", "Twitter", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Data Sparsity", "Implicit Feedback", "Recommender Systems", "Random Walk", "Collaborative Filtering", "Behavioral And Social Science", "Microblog", "Location-based Estimation", "Spatial Data Mining", "Text Mining", "Twitter", "Experimentation", "Algorithms", "Business Process", "Process Mining", "Similarity", "Clinical Research", "Mixture-of-experts", "Randomized Training", "Cold Start Recommendation", "Collaborative Filtering", "Generic Health Relevance", "3 Good Health And Well Being", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Clinical Research", "Networking And Information Technology R&d", "Clinical Research", "Deep Web", "Data Preparation", "Pagelets", "Data Extraction", "Clustering", "Cs.cl", "Cs.ir", "Clinical Research", "4603 Computer Vision And Multimedia Computation", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "40 Engineering", "Basic Behavioral And Social Science", "Behavioral And Social Science", "Automatic Lists Continuation", "Consistency-aware Recommendation", "User-generated Item Lists", "Attention Mechanism" ],
"educationAndTraining" : [ {
"id" : "ned50213b_b6316138-b399-11e9-adb7-00155d9b610c_add0f983",
"label" : "EducationalProcess",
"name" : "B.A. Bachelor of Arts",
"organization" : {
"id" : "nb6316138-b399-11e9-adb7-00155d9b610c",
"label" : "Duke University - (Durham, North Carolina, United States)"
},
"field" : "Economics",
"abbreviation" : "B.A.",
"endDate" : "1996-01-01T00:00:00",
"isDateSuppressed" : "display_education_year"
}, {
"id" : "ned50213b_33c31efe-b399-11e9-adb7-00155d9b610c_7cf8eee1",
"label" : "EducationalProcess",
"name" : "M.S. Master of Science",
"organization" : {
"id" : "n33c31efe-b399-11e9-adb7-00155d9b610c",
"label" : "Stanford University - (Stanford, California, United States)"
},
"field" : "Engineering-Economic Systems and Operations Research",
"abbreviation" : "M.S.",
"endDate" : "2001-01-01T00:00:00",
"isDateSuppressed" : "display_education_year"
}, {
"id" : "ned50213b_53a881e7-b399-11e9-adb7-00155d9b610c_730827c3",
"label" : "EducationalProcess",
"name" : "Ph.D. Doctor of Philosophy",
"organization" : {
"id" : "n53a881e7-b399-11e9-adb7-00155d9b610c",
"label" : "Georgia Institute of Technology - (Atlanta, Georgia, United States)"
},
"field" : "Computer Science",
"abbreviation" : "Ph.D.",
"endDate" : "2007-01-01T00:00:00",
"isDateSuppressed" : "display_education_year"
} ],
"awardsAndHonors" : [ {
"id" : "n17f1df4e-282f-11eb-b9dc-005056bb4fb7",
"label" : "Presidential Impact Fellows"
}, {
"id" : "naef1858e-a837-11e9-bf6d-00155d562649",
"label" : "Faculty Early Career Development (CAREER) Program"
}, {
"id" : "n9f6a3f96-6a01-11ea-96a9-005056bb4fb7",
"label" : "CSE Graduate Faculty Teaching Excellence Award"
}, {
"id" : "nf2fefcb2-6a00-11ea-96a9-005056bb4fb7",
"label" : "CSE Graduate Faculty Teaching Excellence Award"
}, {
"id" : "n8dbd8e93-6a02-11ea-96a9-005056bb4fb7",
"label" : "Faculty Research Award"
}, {
"id" : "n896651f2-6a01-11ea-96a9-005056bb4fb7",
"label" : "Faculty Research Award"
}, {
"id" : "n11d96ecc-69fe-11ea-96a9-005056bb4fb7",
"label" : "Montague Center for Teaching Excellence (CTE) Scholar"
}, {
"id" : "nc219fac5-6a00-11ea-96a9-005056bb4fb7",
"label" : "Young Faculty Award"
} ],
"publications" : [ {
"id" : "n559384SE",
"label" : "Fairness-aware Personalized Ranking Recommendation via Adversarial Learning",
"type" : "GreyLiterature",
"publicationDate" : "2021-03-01T00:00:00"
}, {
"id" : "n324556SE",
"label" : "Detecting Spam URLs in Social Media via Behavioral Analysis",
"type" : "ConferencePaper",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n324510SE",
"label" : "Ranking Comments on the Social Web",
"type" : "ConferencePaper",
"publicationDate" : "2009-01-01T11:11:11",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"tags" : "14 Life Below Water"
}, {
"id" : "n324499SE",
"label" : "Probe, cluster, and discover: Focused extraction of QA-Pagelets from the Deep Web",
"type" : "ConferencePaper",
"publicationDate" : "2004-01-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n178972SE",
"label" : "Countering Web Spam with Credibility-Based Link Analysis",
"type" : "ConferencePaper",
"publicationDate" : "2007-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324504SE",
"label" : "Editorial for CollaborateCom 2011 Special Issue",
"type" : "AcademicArticle",
"publicationDate" : "2013-04-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n328729SE",
"label" : "Tensor Completion Algorithms in Big Data Analytics",
"type" : "AcademicArticle",
"publicationDate" : "2019-02-28T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"venue" : { }
}, {
"id" : "n324527SE",
"label" : "Spatio-Temporal Meme Prediction: Learning What Hashtags Will Be Popular Where",
"type" : "ConferencePaper",
"publicationDate" : "2013-10-27T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324533SE",
"label" : "Predicting semantic annotations on the real-time web",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n181569SE",
"label" : "Location Prediction in Social Media Based on Tie Strength",
"type" : "ConferencePaper",
"publicationDate" : "2013-10-27T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324562SE",
"label" : "A Categorical Model for Discovering Latent Structure in Social Annotations",
"type" : "ConferencePaper",
"publicationDate" : "2009-01-01T11:11:11",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n324585SE",
"label" : "Creating Diverse Product Review Summaries: A Graph Approach",
"type" : "ConferencePaper",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n559390SE",
"label" : "Pseudo-Implicit Feedback for Alleviating Data Sparsity in Top-K Recommendation",
"type" : "GreyLiterature",
"publicationDate" : "2019-01-02T00:00:00"
}, {
"id" : "n162121SE",
"label" : "Toward traffic-driven location-based web search",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324591SE",
"label" : "DUBMMSM'12",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "4 Quality Education"
}, {
"id" : "n324580SE",
"label" : "Report on the WebQuality 2014 Workshop",
"type" : "AcademicArticle",
"publicationDate" : "2014-12-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"venue" : { }
}, {
"id" : "n162099SE",
"label" : "Combating Threats to Collective Attention in Social Media: An Evaluation",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n500252SE",
"label" : "Towards an Automated Writing Assistant for Online Reviews.",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T11:11:11",
"publisher" : "CEUR-WS.org"
}, {
"id" : "n324521SE",
"label" : "Temporal dynamics of communities in social bookmarking systems",
"type" : "AcademicArticle",
"publicationDate" : "2012-12-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n324567SE",
"label" : "Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities",
"type" : "Chapter",
"publicationDate" : "2012-11-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n438822SE",
"label" : "Time to Shop for Valentine's Day",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324573SE",
"label" : "Plurality: a context-aware personalized tagging system",
"type" : "ConferencePaper",
"publicationDate" : "2008-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324539SE",
"label" : "Discovering and ranking web services with BASIL: a personalized approach with biased focus",
"type" : "ConferencePaper",
"publicationDate" : "2004-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n423148SE",
"label" : "Addressing the Target Customer Distortion Problem in Recommender Systems",
"type" : "ConferencePaper",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n539017SE",
"label" : "Towards Ongoing Detection of Linguistic Bias on Wikipedia",
"type" : "ConferencePaper",
"publicationDate" : "2021-04-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n668593SE",
"label" : "Closed-book Question Generation via Contrastive Learning",
"type" : "GreyLiterature",
"publicationDate" : "2022-10-13T00:00:00"
}, {
"id" : "n162103SE",
"label" : "Campaign Extraction from Social Media",
"type" : "AcademicArticle",
"publicationDate" : "2013-12-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"venue" : { }
}, {
"id" : "n417566SE",
"label" : "Consistency-Aware Recommendation for User-Generated Item List Continuation.",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n324493SE",
"label" : "CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection",
"type" : "ConferencePaper",
"publicationDate" : "2016-10-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n669916SE",
"label" : "Empowering Long-tail Item Recommendation through Cross Decoupling Network (CDN)",
"type" : "GreyLiterature",
"publicationDate" : "2022-10-25T00:00:00"
}, {
"id" : "n545855SE",
"label" : "Sequential Recommendation for Cold-start Users with Meta Transitional Learning.",
"type" : "ConferencePaper",
"publicationDate" : "2021-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n384964SE",
"label" : "ACM Transactions on Interactive Intelligent Systems (TiiS) Special Issue on Trust and Influence in Intelligent Human-Machine Interaction",
"type" : "AcademicArticle",
"publicationDate" : "2018-12-31T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"venue" : { }
}, {
"id" : "n555255SE",
"label" : "Popularity Bias in Dynamic Recommendation",
"type" : "ConferencePaper",
"publicationDate" : "2021-08-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324522SE",
"label" : "Exploring Feedback Models in Interactive Tagging",
"type" : "ConferencePaper",
"publicationDate" : "2008-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n652281SE",
"label" : "Quantifying and Mitigating Popularity Bias in Conversational Recommender Systems",
"type" : "GreyLiterature",
"publicationDate" : "2022-08-05T00:00:00"
}, {
"id" : "n324578SE",
"label" : "Proceedings of the 2012 workshop on Data-driven User Behavioral Modelling and Mining from Social Media, DUBMMSM 2012, October 29, 2012, Maui, Hawaii, USA",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n383965SE",
"label" : "TrailMix: An Ensemble Recommender System for Playlist Curation and Continuation",
"type" : "ConferencePaper",
"publicationDate" : "2018-10-02T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n162116SE",
"label" : "SocialTrust++: Building community-based trust in Social Information Systems",
"type" : "ConferencePaper",
"publicationDate" : "2010-01-01T00:00:00",
"publisher" : "European Alliance for Innovation n.o.",
"tags" : "11 Sustainable Cities and Communities"
}, {
"id" : "n179018SE",
"label" : "Towards robust trust establishment in web-based social networks with socialtrust",
"type" : "ConferencePaper",
"publicationDate" : "2008-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n324555SE",
"label" : "Discovering What You're Known For: A Contextual Poisson Factorization Approach",
"type" : "ConferencePaper",
"publicationDate" : "2016-09-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324498SE",
"label" : "Online deception detection refueled by real world data collection",
"type" : "AcademicArticle",
"publicationDate" : "2017-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n385710SE",
"label" : "Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks",
"type" : "ConferencePaper",
"publicationDate" : "2018-10-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324505SE",
"label" : "Identity, Privacy, and Deception in Social Networks Introduction",
"type" : "AcademicArticle",
"publicationDate" : "2014-03-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n324561SE",
"label" : "A Large-Scale Study of MySpace: Observations and Implications for Online Social Networks",
"type" : "ConferencePaper",
"publicationDate" : "2008-12-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n559389SE",
"label" : "A Hierarchical Self-Attentive Model for Recommending User-Generated Item Lists",
"type" : "GreyLiterature",
"publicationDate" : "2019-12-30T00:00:00"
}, {
"id" : "n415092SE",
"label" : "ACM Transactions on Interactive Intelligent Systems (TiiS) Special Issue on Trust and Influence in Intelligent Human-Machine Interaction.",
"type" : "AcademicArticle",
"publicationDate" : "2018-01-01T11:11:11"
}, {
"id" : "n324586SE",
"label" : "DSphere: A Source-Centric Approach to Crawling, Indexing and Searching the World Wide Web",
"type" : "ConferencePaper",
"publicationDate" : "2007-01-01T11:11:11",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n490292SE",
"label" : "Content-Collaborative Disentanglement Representation Learning for Enhanced Recommendation",
"type" : "ConferencePaper",
"publicationDate" : "2020-09-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n526952SE",
"label" : "Fairness-aware Personalized Ranking Recommendation via Adversarial Learning",
"type" : "AcademicArticle",
"publicationDate" : "2021-03-01T00:00:00"
}, {
"id" : "n549448SE",
"label" : "Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities",
"type" : "Chapter",
"publicationDate" : "2021-08-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n559395SE",
"label" : "The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box",
"type" : "GreyLiterature",
"publicationDate" : "2015-01-01T00:00:00"
}, {
"id" : "n324592SE",
"label" : "Identifying hotspots on the real-time web",
"type" : "ConferencePaper",
"publicationDate" : "2010-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n481461SE",
"label" : "Next-item Recommendation with Sequential Hypergraphs",
"type" : "ConferencePaper",
"publicationDate" : "2020-07-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324516SE",
"label" : "Data Dictionary",
"type" : "Chapter",
"publicationDate" : "2009-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n162082SE",
"label" : "Organic or Organized?",
"type" : "ConferencePaper",
"publicationDate" : "2015-10-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n351867SE",
"label" : "Location-Sensitive User Profiling Using Crowdsourced Labels",
"type" : "ConferencePaper",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)",
"venue" : { }
}, {
"id" : "n181571SE",
"label" : "How big is the crowd?",
"type" : "ConferencePaper",
"publicationDate" : "2013-05-10T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n162077SE",
"label" : "Social Spam, Campaigns, Misinformation and Crowdturfing",
"type" : "ConferencePaper",
"publicationDate" : "2014-04-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n559388SE",
"label" : "Consistency-Aware Recommendation for User-Generated ItemList Continuation",
"type" : "GreyLiterature",
"publicationDate" : "2019-12-30T00:00:00"
}, {
"id" : "n516869SE",
"label" : "The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box",
"type" : "AcademicArticle",
"publicationDate" : "2015-10-01T00:00:00"
}, {
"id" : "n162105SE",
"label" : "Devils, Angels, and Robots: Tempting Destructive Users in Social Media",
"type" : "ConferencePaper",
"publicationDate" : "2010-12-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n417564SE",
"label" : "User Recommendation in Content Curation Platforms",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-20T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n179006SE",
"label" : "The SocialTrust framework for trusted social information management: Architecture and algorithms",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T00:00:00",
"publisher" : "Elsevier"
}, {
"id" : "n438823SE",
"label" : "Key Opinion Leaders in Recommendation Systems",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n182464SE",
"label" : "CrowdTracker: Enabling Community-Based Real-Time Web Monitoring",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n415099SE",
"label" : "Instagrammers, Fashionistas, and Me: Recurrent Fashion Recommendation with Implicit Visual Influence",
"type" : "ConferencePaper",
"publicationDate" : "2019-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n324517SE",
"label" : "Exploring Millions of Footprints in Location Sharing Services",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n162114SE",
"label" : "Detecting collective attention spam",
"type" : "ConferencePaper",
"publicationDate" : "2012-04-16T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n181559SE",
"label" : "Who is the Barbecue King of Texas?: A Geo-Spatial Approach to Finding Local Experts on Twitter",
"type" : "ConferencePaper",
"publicationDate" : "2014-07-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n531774SE",
"label" : "Predicting the Reproducibility of Social and Behavioral Science Papers Using Supervised Learning Models",
"type" : "AcademicArticle",
"publicationDate" : "2021-04-01T00:00:00"
}, {
"id" : "n638582SE",
"label" : "Meta Propagation Networks for Graph Few-shot Semi-supervised Learning",
"type" : "AcademicArticle",
"publicationDate" : "2022-06-28T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n194253SE",
"label" : "PageRank for Ranking Authors in Co-citation Networks",
"type" : "AcademicArticle",
"publicationDate" : "2009-07-01T00:00:00",
"publisher" : "Wiley"
}, {
"id" : "n345542SE",
"label" : "Neural Personalized Ranking for Image Recommendation",
"type" : "ConferencePaper",
"publicationDate" : "2018-02-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n559383SE",
"label" : "Predicting the Reproducibility of Social and Behavioral Science Papers Using Supervised Learning Models",
"type" : "GreyLiterature",
"publicationDate" : "2021-04-01T00:00:00"
}, {
"id" : "n324557SE",
"label" : "A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media",
"type" : "ConferencePaper",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n324511SE",
"label" : "Social honeypots: Making friends with a spammer near you",
"type" : "ConferencePaper",
"publicationDate" : "2008-01-01T00:00:00"
}, {
"id" : "n417624SE",
"label" : "A Context-Aware Click Model for Web Search.",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n324492SE",
"label" : "XWRAPComposer: A multi-page data extraction service for bio-computing applications",
"type" : "ConferencePaper",
"publicationDate" : "2005-01-01T11:11:11",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"tags" : "7 Affordable and Clean Energy"
}, {
"id" : "n324563SE",
"label" : "Identity, Privacy, and Deception in Social Networks",
"type" : "AcademicArticle",
"publicationDate" : "2014-03-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n415094SE",
"label" : "Tensor Completion Algorithms in Big Data Analytics.",
"type" : "AcademicArticle",
"publicationDate" : "2019-01-01T11:11:11"
}, {
"id" : "n324606SE",
"label" : "DUBMMSM 2012 chairs' welcome",
"type" : "ConferencePaper",
"publicationDate" : "2012-12-01T00:00:00"
}, {
"id" : "n324584SE",
"label" : "Board Coherence in Pinterest: Non-visual Aspects of a Visual Site",
"type" : "ConferencePaper",
"publicationDate" : "2013-05-13T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n698854SE",
"label" : "Enhancing User Personalization in Conversational Recommenders",
"type" : "GreyLiterature",
"publicationDate" : "2023-02-13T00:00:00"
}, {
"id" : "n162120SE",
"label" : "Content-driven detection of campaigns in social media",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n525858SE",
"label" : "Item Relationship Graph Neural Networks for E-Commerce.",
"type" : "AcademicArticle",
"publicationDate" : "2022-09-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n652282SE",
"label" : "Towards Fair Conversational Recommender Systems",
"type" : "GreyLiterature",
"publicationDate" : "2022-08-07T00:00:00"
}, {
"id" : "n324500SE",
"label" : "Domain-specific web service discovery with service class descriptions",
"type" : "ConferencePaper",
"publicationDate" : "2005-01-01T11:11:11",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n324497SE",
"label" : "SIGIR 2015 Workshop on Temporal, Social and Spatially-aware Information Access (#TAIA2015)",
"type" : "ConferencePaper",
"publicationDate" : "2015-08-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n543144SE",
"label" : "Identifying Hijacked Reviews",
"type" : "AcademicArticle",
"publicationDate" : "2021-01-01T00:00:00",
"publisher" : "Association for Computational Linguistics (ACL)"
}, {
"id" : "n324529SE",
"label" : "Content-based crowd retrieval on the real-time web",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324506SE",
"label" : "DSphere: A source-centric approach to crawling, indexing and searching the world wide web",
"type" : "ConferencePaper",
"publicationDate" : "2007-01-01T11:11:11",
"venue" : { }
}, {
"id" : "n324512SE",
"label" : "Characterizing web spam using content and HTTP session analysis",
"type" : "ConferencePaper",
"publicationDate" : "2007-01-01T00:00:00"
}, {
"id" : "n415093SE",
"label" : "Pseudo-Implicit Feedback for Alleviating Data Sparsity in Top-K Recommendation.",
"type" : "AcademicArticle",
"publicationDate" : "2019-01-01T11:11:11"
}, {
"id" : "n324605SE",
"label" : "DUBMOD 2013 chairs' welcome",
"type" : "ConferencePaper",
"publicationDate" : "2013-12-01T00:00:00"
}, {
"id" : "n539986SE",
"label" : "Robust Graph Meta-learning for Weakly-supervised Few-shot Node Classification",
"type" : "AcademicArticle",
"publicationDate" : "2021-06-01T00:00:00"
}, {
"id" : "n405981SE",
"label" : "A Large-Scale Study of ISIS Social Media Strategy: Community Size, Collective Influence, and Behavioral Impact",
"type" : "ConferencePaper",
"publicationDate" : "2019-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n324568SE",
"label" : "Weaponized Crowdsourcing: An Emerging Threat and Potential Countermeasures",
"type" : "Chapter",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n324545SE",
"label" : "Crowdsourced App Review Manipulation",
"type" : "ConferencePaper",
"publicationDate" : "2017-08-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n181553SE",
"label" : "Finding Local Experts on Twitter",
"type" : "ConferencePaper",
"publicationDate" : "2014-04-07T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324574SE",
"label" : "Workflow management for enterprise transformation.",
"type" : "AcademicArticle",
"publicationDate" : "2007-01-01T11:11:11"
}, {
"id" : "n504455SE",
"label" : "Infusing Disease Knowledge into BERT for Health Question Answering, Medical Inference and Disease Name Recognition",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Association for Computational Linguistics"
}, {
"id" : "n638565SE",
"label" : "Evolution of Popularity Bias: Empirical Study and Debiasing",
"type" : "GreyLiterature",
"publicationDate" : "2022-07-07T00:00:00"
}, {
"id" : "n481459SE",
"label" : "Recommendation for New Users and New Items via Randomized Training and Mixture-of-Experts Transformation",
"type" : "ConferencePaper",
"publicationDate" : "2020-07-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n300254SE",
"label" : "LExL: A Learning Approach for Local Expert Discovery on Twitter",
"type" : "ConferencePaper",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n324534SE",
"label" : "Transient crowd discovery on the real-time social web",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n417565SE",
"label" : "WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining, Houston, TX, USA, February 3-7, 2020",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "ACM"
}, {
"id" : "n418228SE",
"label" : "Understanding Car-Speak: Replacing Humans in Dealerships",
"type" : "AcademicArticle",
"publicationDate" : "2020-02-01T00:00:00"
}, {
"id" : "n324523SE",
"label" : "Expert-Driven Topical Classification of Short Message Streams",
"type" : "ConferencePaper",
"publicationDate" : "2011-10-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n384963SE",
"label" : "DisTenC: A Distributed Algorithm for Scalable Tensor Completion on Spark",
"type" : "ConferencePaper",
"publicationDate" : "2018-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n324540SE",
"label" : "Hierarchical comments-based clustering",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n438824SE",
"label" : "Instagrammers, Fashionistas, and Me",
"type" : "ConferencePaper",
"publicationDate" : "2019-11-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324579SE",
"label" : "Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities",
"type" : "Chapter",
"publicationDate" : "2009-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n345541SE",
"label" : "Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach",
"type" : "ConferencePaper",
"publicationDate" : "2018-02-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n417568SE",
"label" : "Time to Shop for Valentine's Day: Shopping Occasions and Sequential Recommendation in E-commerce",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n415100SE",
"label" : "A Hierarchical Self-Attentive Model for Recommending User-Generated Item Lists",
"type" : "ConferencePaper",
"publicationDate" : "2019-11-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n367476SE",
"label" : "CrowdEval: A Cost-Efficient Strategy to Evaluate Crowdsourced Worker's Reliability",
"type" : "ConferencePaper",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM",
"venue" : { }
}, {
"id" : "n416821SE",
"label" : "A Hierarchical Self-Attentive Model for Recommending User-Generated Item Lists.",
"type" : "AcademicArticle",
"publicationDate" : "2019-01-01T11:11:11"
}, {
"id" : "n314934SE",
"label" : "Multi-Aspect Streaming Tensor Completion",
"type" : "ConferencePaper",
"publicationDate" : "2017-08-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324491SE",
"label" : "Link-based ranking of the web with source-centric collaboration",
"type" : "ConferencePaper",
"publicationDate" : "2006-11-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n381379SE",
"label" : "Quality-Aware Neural Complementary Item Recommendation",
"type" : "ConferencePaper",
"publicationDate" : "2018-09-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324547SE",
"label" : "What Are You Known For? Learning User Topical Profiles with Implicit and Explicit Footprints",
"type" : "ConferencePaper",
"publicationDate" : "2017-08-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "12 Responsible Consumption and Production"
}, {
"id" : "n492482SE",
"label" : "PARADE: A New Dataset for Paraphrase Identification Requiring Computer Science Domain Knowledge",
"type" : "AcademicArticle",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Association for Computational Linguistics (ACL)"
}, {
"id" : "n415095SE",
"label" : "Data Dictionary",
"type" : "Chapter",
"publicationDate" : "2018-12-07T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n398105SE",
"label" : "An Interpretable Neural Model with Interactive Stepwise Influence",
"type" : "ConferencePaper",
"publicationDate" : "2019-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n324524SE",
"label" : "Spam-Resilient Web Rankings via Influence Throttling",
"type" : "ConferencePaper",
"publicationDate" : "2007-03-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n324576SE",
"label" : "Proceedings of the 3rd Workshop on Data-Driven User Behavioral Modeling and Mining from Social Media, DUBMOD@CIKM 2014, Shanghai, China, November 3, 2014",
"type" : "ConferencePaper",
"publicationDate" : "2014-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n324501SE",
"label" : "Discovering interesting relationships among deep web databases: A source-biased approach",
"type" : "ConferencePaper",
"publicationDate" : "2006-12-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n179016SE",
"label" : "Socialtrust: tamper-resilient trust establishment in online communities",
"type" : "ConferencePaper",
"publicationDate" : "2008-06-16T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "11 Sustainable Cities and Communities"
}, {
"id" : "n324559SE",
"label" : "XPack: A high-performance Web document encoding",
"type" : "ConferencePaper",
"publicationDate" : "2005-12-01T00:00:00",
"publisher" : "INSTICC Press"
}, {
"id" : "n390154SE",
"label" : "Recurrent Recommendation with Local Coherence",
"type" : "ConferencePaper",
"publicationDate" : "2019-01-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324507SE",
"label" : "Process mining, discovery, and integration using distance measures",
"type" : "ConferencePaper",
"publicationDate" : "2006-09-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n420653SE",
"label" : "Recommending Music Curators: A Neural Style-Aware Approach",
"type" : "ConferencePaper",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { },
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n324496SE",
"label" : "Community-Based Geospatial Tag Estimation",
"type" : "ConferencePaper",
"publicationDate" : "2016-08-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n324553SE",
"label" : "TAPER: A Contextual Tensor-Based Approach for Personalized Expert Recommendation",
"type" : "ConferencePaper",
"publicationDate" : "2016-09-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n324536SE",
"label" : "Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n596155SE",
"label" : "Session-based Recommendation with Hypergraph Attention Networks",
"type" : "GreyLiterature",
"publicationDate" : "2021-12-28T00:00:00"
}, {
"id" : "n162106SE",
"label" : "Spatio-temporal dynamics of online memes: a study of geo-tagged tweets",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n181573SE",
"label" : "Spatial influence vs. community influence",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324518SE",
"label" : "Towards Geo-Social Intelligence: Mining, Analyzing, and Leveraging Geospatial Footprints in Social Media.",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T11:11:11"
}, {
"id" : "n438910SE",
"label" : "Geography and Web Communities",
"type" : "Chapter",
"publicationDate" : "2014-10-05T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n324558SE",
"label" : "A Summary of Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities",
"type" : "ConferencePaper",
"publicationDate" : "2010-08-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n324535SE",
"label" : "Summarizing User-Contributed Comments",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n559386SE",
"label" : "PARADE: A New Dataset for Paraphrase Identification Requiring Computer Science Domain Knowledge",
"type" : "GreyLiterature",
"publicationDate" : "2020-10-01T00:00:00"
}, {
"id" : "n324564SE",
"label" : "Exploiting Geo-Spatial Preference for Personalized Expert Recommendation",
"type" : "ConferencePaper",
"publicationDate" : "2015-09-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n179004SE",
"label" : "A Parameterized Approach to Spam-Resilient Link Analysis of the Web",
"type" : "AcademicArticle",
"publicationDate" : "2009-10-23T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n324519SE",
"label" : "Exploitation in Human Computation Systems",
"type" : "Chapter",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n162085SE",
"label" : "Uncovering Crowdsourced Manipulation of Online Reviews",
"type" : "ConferencePaper",
"publicationDate" : "2015-08-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324570SE",
"label" : "DUBMOD ''13-International Workshop on Data-driven User Behavioral Modelling and Mining from Social Media",
"type" : "ConferencePaper",
"publicationDate" : "2013-10-27T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "4 Quality Education"
}, {
"id" : "n438825SE",
"label" : "Wide-Ranging Review Manipulation Attacks",
"type" : "ConferencePaper",
"publicationDate" : "2019-11-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324541SE",
"label" : "Distributed query sampling",
"type" : "ConferencePaper",
"publicationDate" : "2006-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n401824SE",
"label" : "Improving Top-K Recommendation via Joint Collaborative Autoencoders",
"type" : "ConferencePaper",
"publicationDate" : "2019-05-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n417569SE",
"label" : "Improving the Estimation of Tail Ratings in Recommender System with Multi-Latent Representations",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-20T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n543550SE",
"label" : "Sequential Recommendation for Cold-start Users with Meta Transitional Learning",
"type" : "AcademicArticle",
"publicationDate" : "2021-07-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n594602SE",
"label" : "Meta Propagation Networks for Graph Few-shot Semi-supervised Learning",
"type" : "GreyLiterature",
"publicationDate" : "2021-12-17T00:00:00"
}, {
"id" : "n543980SE",
"label" : "Fairness among New Items in Cold Start Recommender Systems",
"type" : "ConferencePaper",
"publicationDate" : "2021-07-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324530SE",
"label" : "A methodical approach to extracting interesting objects from dynamic web pages",
"type" : "AcademicArticle",
"publicationDate" : "2005-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n415101SE",
"label" : "Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures",
"type" : "ConferencePaper",
"publicationDate" : "2019-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n379826SE",
"label" : "Vitriol on Social Media: Curation and Investigation",
"type" : "ConferencePaper",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n324513SE",
"label" : "Dublin Core",
"type" : "Chapter",
"publicationDate" : "2009-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n162100SE",
"label" : "Crowdturfers, Campaigns, and Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n405980SE",
"label" : "TOmCAT: Target-Oriented Crowd Review Attacks and Countermeasures",
"type" : "ConferencePaper",
"publicationDate" : "2019-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n324490SE",
"label" : "XWRAPComposer: A multi-page data extraction service",
"type" : "AcademicArticle",
"publicationDate" : "2006-04-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n162125SE",
"label" : "You are where you tweet",
"type" : "ConferencePaper",
"publicationDate" : "2010-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324604SE",
"label" : "XWRAPComposer",
"type" : "Chapter",
"publicationDate" : "2008-12-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n504456SE",
"label" : "PARADE: A New Dataset for Paraphrase Identification Requiring Computer Science Domain Knowledge",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Association for Computational Linguistics"
}, {
"id" : "n324575SE",
"label" : "Exploiting the deep web with DynaBot: matching, probing, and ranking",
"type" : "ConferencePaper",
"publicationDate" : "2005-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324502SE",
"label" : "Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control",
"type" : "ConferencePaper",
"publicationDate" : "2017-06-05T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n559381SE",
"label" : "Robust Graph Meta-learning for Weakly-supervised Few-shot Node Classification",
"type" : "GreyLiterature",
"publicationDate" : "2021-06-01T00:00:00"
}, {
"id" : "n377552SE",
"label" : "Fairness-Aware Recommendation of Information Curators",
"type" : "AcademicArticle",
"publicationDate" : "2018-09-01T00:00:00"
}, {
"id" : "n695533SE",
"label" : "Evolution of Filter Bubbles and Polarization in News Recommendation",
"type" : "GreyLiterature",
"publicationDate" : "2023-01-25T00:00:00"
}, {
"id" : "n324581SE",
"label" : "PageRank for ranking authors in co-citation networks",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T11:11:11"
}, {
"id" : "n194250SE",
"label" : "Profiling Social Networks: A Social Tagging Perspective",
"type" : "AcademicArticle",
"publicationDate" : "2009-12-01T00:00:00",
"publisher" : "CNRI Acct",
"venue" : { }
}, {
"id" : "n385711SE",
"label" : "Fairness-Aware Tensor-Based Recommendation",
"type" : "ConferencePaper",
"publicationDate" : "2018-10-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n525904SE",
"label" : "Popularity-Opportunity Bias in Collaborative Filtering",
"type" : "ConferencePaper",
"publicationDate" : "2021-03-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324508SE",
"label" : "Process mining by measuring process block similarity",
"type" : "ConferencePaper",
"publicationDate" : "2006-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n324514SE",
"label" : "Introducing the Webb Spam Corpus: Using email spam to identify Web spam automatically",
"type" : "ConferencePaper",
"publicationDate" : "2006-01-01T00:00:00"
}, {
"id" : "n490291SE",
"label" : "Unbiased Implicit Recommendation and Propensity Estimation via Combinational Joint Learning",
"type" : "ConferencePaper",
"publicationDate" : "2020-09-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n577585SE",
"label" : "Identifying Hijacked Reviews",
"type" : "ConferencePaper",
"publicationDate" : "2021-04-23T00:00:00"
}, {
"id" : "n324495SE",
"label" : "Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information",
"type" : "ConferencePaper",
"publicationDate" : "2016-10-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324520SE",
"label" : "Predicting community preference of comments on the Social Web",
"type" : "AcademicArticle",
"publicationDate" : "2012-12-01T00:00:00",
"publisher" : "IOS Press",
"venue" : { }
}, {
"id" : "n324566SE",
"label" : "BiasWatch",
"type" : "ConferencePaper",
"publicationDate" : "2015-10-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324572SE",
"label" : "DUBMOD14 - International Workshop on Data-driven User Behavioral Modeling and Mining from Social Media",
"type" : "ConferencePaper",
"publicationDate" : "2014-11-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "4 Quality Education"
}, {
"id" : "n324543SE",
"label" : "Behavioral Analysis of Review Fraud: Linking Malicious Crowdsourcing to Amazon and Beyond",
"type" : "ConferencePaper",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n707377SE",
"label" : "Evolution of Filter Bubbles and Polarization in News Recommendation",
"type" : "Chapter",
"publicationDate" : "2023-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n559380SE",
"label" : "Identifying Hijacked Reviews",
"type" : "GreyLiterature",
"publicationDate" : "2021-07-01T00:00:00"
}, {
"id" : "n285370SE",
"label" : "Text vs. Images: On the Viability of Social Media to Assess Earthquake Damage",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n556015SE",
"label" : "Session-based Recommendation with Hypergraph Attention Networks",
"type" : "ConferencePaper",
"publicationDate" : "2021-01-01T00:00:00",
"publisher" : "Society for Industrial and Applied Mathematics"
}, {
"id" : "n324532SE",
"label" : "Community-based ranking of the social web",
"type" : "ConferencePaper",
"publicationDate" : "2010-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n417567SE",
"label" : "Key Opinion Leaders in Recommendation Systems: Opinion Elicitation and Diffusion",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n423149SE",
"label" : "Adaptive Hierarchical Translation-based Sequential Recommendation",
"type" : "ConferencePaper",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n339423SE",
"label" : "Editorial",
"type" : "AcademicArticle",
"publicationDate" : "2018-01-01T11:11:11",
"venue" : { }
}, {
"id" : "n539018SE",
"label" : "Rabbit Holes and Taste Distortion: Distribution-Aware Recommendation with Evolving Interests",
"type" : "ConferencePaper",
"publicationDate" : "2021-04-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n325625SE",
"label" : "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, San Francisco, CA, USA, August 18-21, 2016",
"type" : "ConferencePaper",
"publicationDate" : "2016-01-01T11:11:11",
"publisher" : "IEEE Computer Society"
}, {
"id" : "n181577SE",
"label" : "A geographic study of tie strength in social media",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n438826SE",
"label" : "Dublin Core",
"type" : "Chapter",
"publicationDate" : "2018-12-07T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n492483SE",
"label" : "Infusing Disease Knowledge into BERT for Health Question Answering, Medical Inference and Disease Name Recognition",
"type" : "AcademicArticle",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Association for Computational Linguistics (ACL)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n324525SE",
"label" : "College Towns, Vacation Spots, and Tech Hubs: Using Geo-Social Media to Model and Compare Locations",
"type" : "ConferencePaper",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)",
"venue" : { }
}, {
"id" : "n324489SE",
"label" : "Service class driven dynamic data source discovery with DynaBot",
"type" : "AcademicArticle",
"publicationDate" : "2007-07-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n324577SE",
"label" : "Proceedings of the 2013 Workshop on Data-Driven User Behavioral Modelling and Mining from Social Media, DUBMOD@CIKM 2013 San Francisco, CA, USA, October 28, 2013",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T11:11:11",
"publisher" : "ACM"
}, {
"id" : "n162134SE",
"label" : "Uncovering Social Spammers: Social Honeypots plus Machine Learning",
"type" : "ConferencePaper",
"publicationDate" : "2010-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324560SE",
"label" : "Welcome from the ASONAM 2016 program chairs",
"type" : "ConferencePaper",
"publicationDate" : "2016-01-01T11:11:11",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n324531SE",
"label" : "Discovering trending phrases on information streams",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n361926SE",
"label" : "Learning Geo-Social User Topical Profiles with Bayesian Hierarchical User Factorization",
"type" : "ConferencePaper",
"publicationDate" : "2018-06-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324602SE",
"label" : "Predicting web spam with HTTP session information",
"type" : "ConferencePaper",
"publicationDate" : "2008-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n325624SE",
"label" : "On Local Expert Discovery via Geo-Located Crowds, Queries, and Candidates",
"type" : "AcademicArticle",
"publicationDate" : "2016-11-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"venue" : { }
}, {
"id" : "n181572SE",
"label" : "Public checkins versus private queries: measuring and evaluating spatial preference",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n570676SE",
"label" : "XWRAPComposer",
"type" : "Chapter",
"publicationDate" : "2008-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n324515SE",
"label" : "Topic Maps",
"type" : "Chapter",
"publicationDate" : "2009-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n162081SE",
"label" : "Crowds, Gigs, and Super Sellers: A Measurement Study of a Supply-Driven Crowdsourcing Marketplace",
"type" : "ConferencePaper",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n386684SE",
"label" : "Pseudo-Implicit Feedback for Alleviating Data Sparsity in Top-K Recommendation",
"type" : "AcademicArticle",
"publicationDate" : "2018-11-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n324503SE",
"label" : "Behavioral Detection of Spam URL Sharing: Posting Patterns versus Click Patterns",
"type" : "ConferencePaper",
"publicationDate" : "2014-08-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n162135SE",
"label" : "The social honeypot project: protecting online communities from spammers",
"type" : "ConferencePaper",
"publicationDate" : "2010-01-01T11:11:11",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324488SE",
"label" : "Development of distance measures for process mining, discovery, and integration",
"type" : "AcademicArticle",
"publicationDate" : "2007-10-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n165948SE",
"label" : "A Content-Driven Framework for Geolocating Microblog Users",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"venue" : { }
}, {
"id" : "n559385SE",
"label" : "Infusing Disease Knowledge into BERT for Health Question Answering, Medical Inference and Disease Name Recognition",
"type" : "GreyLiterature",
"publicationDate" : "2020-10-01T00:00:00",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n324582SE",
"label" : "Board recommendation in Pinterest",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "CEUR-WS.org",
"venue" : { }
}, {
"id" : "n559379SE",
"label" : "Sequential Recommendation for Cold-start Users with Meta Transitional Learning",
"type" : "GreyLiterature",
"publicationDate" : "2021-07-01T00:00:00"
}, {
"id" : "n324509SE",
"label" : "Probabilistic Generative Models of the Social Annotation Process",
"type" : "ConferencePaper",
"publicationDate" : "2009-01-01T11:11:11",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n324565SE",
"label" : "Mining potential domain expertise in Pinterest",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "CEUR-WS.org",
"venue" : { }
}, {
"id" : "n559391SE",
"label" : "PageRank for ranking authors in co-citation networks",
"type" : "GreyLiterature",
"publicationDate" : "2010-12-21T00:00:00"
}, {
"id" : "n324494SE",
"label" : "QA-Pagelet: Data preparation techniques for large-scale data analysis of the Deep Web",
"type" : "ConferencePaper",
"publicationDate" : "2005-09-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n668621SE",
"label" : "Quantifying and Mitigating Popularity Bias in Conversational Recommender Systems",
"type" : "ConferencePaper",
"publicationDate" : "2022-10-17T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n324571SE",
"label" : "DUBMOD 2014 Chairs' welcome",
"type" : "ConferencePaper",
"publicationDate" : "2014-01-01T00:00:00"
}, {
"id" : "n324537SE",
"label" : "Analyzing and Predicting Community Preference of Socially Generated Metadata: A Case Study on Comments in the Digg Community",
"type" : "ConferencePaper",
"publicationDate" : "2009-01-01T11:11:11",
"publisher" : "Association for the Advancement of Artificial Intelligence (AAAI)"
}, {
"id" : "n345566SE",
"label" : "Online Deception Detection Refueled by RealWorld Data Collection",
"type" : "ConferencePaper",
"publicationDate" : "2017-11-01T00:00:00",
"publisher" : "Assoc. for Computational Linguistics Bulgaria"
}, {
"id" : "n415679SE",
"label" : "Consistency-Aware Recommendation for User-Generated Item List Continuation",
"type" : "AcademicArticle",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
} ],
"creativeWorks" : [ {
"id" : "n64168fd4",
"label" : "CSCE691 Research"
}, {
"id" : "n4ba78af1",
"label" : "CSCE489 Sptp: Recsys"
}, {
"id" : "nd28aeb54",
"label" : "CSCE684 Professional Internship:in-ab"
}, {
"id" : "nd28aeb54",
"label" : "CSCE684 Professional Internship: In-ab"
}, {
"id" : "ne0b55021",
"label" : "CSCE485 Directed Studies"
}, {
"id" : "n1ba6a77b",
"label" : "CSCE685 Directed Studies"
}, {
"id" : "n1ba6a77b",
"label" : "CSCE685 Directed Studies: In - Ab"
}, {
"id" : "ne6d0e856",
"label" : "CSCE670 Info Storage & Retrieval"
}, {
"id" : "n5c1e92ba",
"label" : "CSCE320 Principles Of Data Science"
}, {
"id" : "n5e18ee85",
"label" : "CSCE684 Professional Internship: In-ab"
}, {
"id" : "n55f236ef",
"label" : "CSCE489 Sptp:data Science & Analytics"
}, {
"id" : "nc5a0c7dd",
"label" : "CSCE470 Info Storage & Retrieval"
}, {
"id" : "nb2109700",
"label" : "CSCE491 Hnr-research"
}, {
"id" : "nb2109700",
"label" : "CSCE491 Research"
}, {
"id" : "n8430871b",
"label" : "CSCE676 Data Mining & Analysis"
}, {
"id" : "nba42ca56",
"label" : "CSCE684 Professional Internship:in Ab"
}, {
"id" : "nba42ca56",
"label" : "CSCE684 Professional Internship"
}, {
"id" : "nba42ca56",
"label" : "CSCE684 Professional Internship:in-ab"
}, {
"id" : "nba42ca56",
"label" : "CSCE684 Professional Internship: In-ab"
} ],
"researcherOn" : [ {
"id" : "n11405f6e-e866-11ea-a81a-005056bb4fb7",
"label" : "HELIOS: Accelerated Recovery of Evolving Spatial-Temporal Dynamics",
"awardedBy" : {
"id" : "ndaa24100-b39f-11e9-adb7-00155d9b610c",
"label" : "United States Department of Defense - (Washington D.C., District of Columbia, United States)",
"preferredLabel" : "DOD-Advanced Research Projects Agency"
},
"role" : "PrincipalInvestigatorRole",
"startDate" : "2016-01-01T00:00:00",
"endDate" : "2020-01-01T00:00:00"
}, {
"id" : "n17a70fda-e866-11ea-a81a-005056bb4fb7",
"label" : "YIP12: Detecting, Analyzing, Modeling, and Predicting Strategic Manipulation and Adversarial Propaganda in Social Media",
"awardedBy" : {
"id" : "na1da1621-b3b9-11e9-adb7-00155d9b610c",
"label" : "United States Air Force - (Arlington, Virginia, United States)",
"preferredLabel" : "DOD-Air Force-Office of Scientific Research"
},
"role" : "PrincipalInvestigatorRole",
"startDate" : "2012-01-01T00:00:00",
"endDate" : "2015-01-01T00:00:00"
}, {
"id" : "n622eb777-e866-11ea-a81a-005056bb4fb7",
"label" : "FAI: Towards Fairness in Deep Neural Networks with Learning Interpretation",
"awardedBy" : {
"id" : "n18593cda-a812-11e9-bf6d-00155d562649",
"label" : "National Science Foundation - (Arlington, Virginia, United States)",
"preferredLabel" : "National Science Foundation"
},
"role" : "CoPrincipalInvestigatorRole",
"startDate" : "2020-01-01T00:00:00",
"endDate" : "2023-01-01T00:00:00"
}, {
"id" : "ne2f1a29a-e875-11ea-a81a-005056bb4fb7",
"label" : "III: Small: Collaborative Research: Modeling and Managing Extremist Group Influence in Massive Social Media Networks",
"awardedBy" : {
"id" : "n18593cda-a812-11e9-bf6d-00155d562649",
"label" : "National Science Foundation - (Arlington, Virginia, United States)",
"preferredLabel" : "National Science Foundation"
},
"role" : "PrincipalInvestigatorRole",
"startDate" : "2019-01-01T00:00:00",
"endDate" : "2022-01-01T00:00:00"
}, {
"id" : "nd2afe463-e875-11ea-a81a-005056bb4fb7",
"label" : "SaTC: CORE: Small: Adversarial Learning via Modeling Interpretation",
"awardedBy" : {
"id" : "n18593cda-a812-11e9-bf6d-00155d562649",
"label" : "National Science Foundation - (Arlington, Virginia, United States)",
"preferredLabel" : "National Science Foundation"
},
"role" : "CoPrincipalInvestigatorRole",
"startDate" : "2018-01-01T00:00:00",
"endDate" : "2021-01-01T00:00:00"
}, {
"id" : "n17935868-e866-11ea-a81a-005056bb4fb7",
"label" : "Collective Attention Threats: Models and Deterrence",
"awardedBy" : {
"id" : "na1da1621-b3b9-11e9-adb7-00155d9b610c",
"label" : "United States Air Force - (Arlington, Virginia, United States)",
"preferredLabel" : "DOD-Air Force-Office of Scientific Research"
},
"role" : "PrincipalInvestigatorRole",
"startDate" : "2015-01-01T00:00:00",
"endDate" : "2018-01-01T00:00:00"
}, {
"id" : "nee8d1bbf-e875-11ea-a81a-005056bb4fb7",
"label" : "EAGER: Fairness-Aware Personalized Recommendation",
"awardedBy" : {
"id" : "n18593cda-a812-11e9-bf6d-00155d562649",
"label" : "National Science Foundation - (Arlington, Virginia, United States)",
"preferredLabel" : "National Science Foundation"
},
"role" : "PrincipalInvestigatorRole",
"startDate" : "2018-01-01T00:00:00",
"endDate" : "2020-01-01T00:00:00"
}, {
"id" : "nda02d526-e866-11ea-a81a-005056bb4fb7",
"label" : "FFATA: CAREER: Real-Time Crowd-Oriented Search and Computation Systems",
"awardedBy" : {
"id" : "n18593cda-a812-11e9-bf6d-00155d562649",
"label" : "National Science Foundation - (Arlington, Virginia, United States)",
"preferredLabel" : "National Science Foundation"
},
"role" : "PrincipalInvestigatorRole",
"startDate" : "2012-01-01T00:00:00",
"endDate" : "2018-01-01T00:00:00"
} ],
"teachingActivities" : [ {
"id" : "n64168fd4",
"label" : "CSCE691 Research",
"role" : "Instructor"
}, {
"id" : "n4ba78af1",
"label" : "CSCE489 Sptp: Recsys",
"role" : "Instructor"
}, {
"id" : "nd28aeb54",
"label" : "CSCE684 Professional Internship:in-ab",
"role" : "Instructor"
}, {
"id" : "nd28aeb54",
"label" : "CSCE684 Professional Internship: In-ab",
"role" : "Instructor"
}, {
"id" : "ne0b55021",
"label" : "CSCE485 Directed Studies",
"role" : "Instructor"
}, {
"id" : "n1ba6a77b",
"label" : "CSCE685 Directed Studies",
"role" : "Instructor"
}, {
"id" : "n1ba6a77b",
"label" : "CSCE685 Directed Studies: In - Ab",
"role" : "Instructor"
}, {
"id" : "ne6d0e856",
"label" : "CSCE670 Info Storage & Retrieval",
"role" : "Instructor"
}, {
"id" : "n5c1e92ba",
"label" : "CSCE320 Principles Of Data Science",
"role" : "Instructor"
}, {
"id" : "n5e18ee85",
"label" : "CSCE684 Professional Internship: In-ab",
"role" : "Instructor"
}, {
"id" : "n55f236ef",
"label" : "CSCE489 Sptp:data Science & Analytics",
"role" : "Instructor"
}, {
"id" : "nc5a0c7dd",
"label" : "CSCE470 Info Storage & Retrieval",
"role" : "Instructor"
}, {
"id" : "nb2109700",
"label" : "CSCE491 Hnr-research",
"role" : "Instructor"
}, {
"id" : "nb2109700",
"label" : "CSCE491 Research",
"role" : "Instructor"
}, {
"id" : "n8430871b",
"label" : "CSCE676 Data Mining & Analysis",
"role" : "Instructor"
}, {
"id" : "nba42ca56",
"label" : "CSCE684 Professional Internship:in Ab",
"role" : "Instructor"
}, {
"id" : "nba42ca56",
"label" : "CSCE684 Professional Internship",
"role" : "Instructor"
}, {
"id" : "nba42ca56",
"label" : "CSCE684 Professional Internship:in-ab",
"role" : "Instructor"
}, {
"id" : "nba42ca56",
"label" : "CSCE684 Professional Internship: In-ab",
"role" : "Instructor"
} ],
"email" : "caverlee@tamu.edu",
"firstName" : "James",
"lastName" : "Caverlee",
"streetAddress" : "Texas A&M University; Computer Science & Engineering; 3112 TAMU",
"locality" : "College Station",
"region" : "TX",
"postalCode" : "77843-3112",
"country" : "USA",
"organizations" : [ "Computer Science and Engineering" ],
"schools" : [ "College of Engineering" ],
"netid" : "caverlee",
"uid" : "2f196ca9b0982313ccb2e18ea11b456f",
"etdChairOf" : [ {
"id" : "ne2d553f6",
"label" : "McGee, Jeffrey A (2013-05). Location Prediction in Social Media Based on Tie Strength. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/149395",
"publicationDate" : "2013-05-01T00:00:00"
}, {
"id" : "ndeb83318",
"label" : "Liang, Yuan (2013-07). Event Modeling in Social Media with Application to Disaster Damage Assessment. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/151178",
"publicationDate" : "2013-08-01T00:00:00"
}, {
"id" : "n03e09bb6",
"label" : "Aggarwal, Anupam (2009-12). User Importance Modelling in Social Information Systems An Interaction Based Approach. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7442",
"publicationDate" : "2009-12-01T00:00:00"
}, {
"id" : "n26c4ba9a",
"label" : "Bachani, Vandana (2013-12). Local Experts in Social Media. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/151760",
"publicationDate" : "2013-12-01T00:00:00"
}, {
"id" : "nd1fbca4c",
"label" : "Cheng, Zhiyuan (2014-01). Toward Geo-social Information Systems: Methods and Algorithms. Doctoral Dissertation.",
"url" : "http://hdl.handle.net/1969.1/152497",
"publicationDate" : "2014-05-01T00:00:00"
}, {
"id" : "n651b6ee5",
"label" : "Kamath, Krishna Y (2013-05). Mining, Modeling, and Analyzing Real-Time Social Trails. Doctoral Dissertation.",
"url" : "http://hdl.handle.net/1969.1/150975",
"publicationDate" : "2013-08-01T00:00:00"
}, {
"id" : "n31457878",
"label" : "Venkatesh, Sindhuja (2014-12). Analysis of Local Experts in Social Media. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/154100",
"publicationDate" : "2014-12-01T00:00:00"
}, {
"id" : "ncf0803f2",
"label" : "Lakshminarasimhan, Vardharaj (2014-12). A Latent Factor Model for Board Recommendations in Pinterest. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/154006",
"publicationDate" : "2014-12-01T00:00:00"
}, {
"id" : "n3b50eba2",
"label" : "Hsu, Chiao-Fang (2009-12). Predicting Community Preference of Comments on the Social Web. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7354",
"publicationDate" : "2009-12-01T00:00:00"
}, {
"id" : "n2c051b28",
"label" : "Tamilarasan, Prithivi (2013-08). Combating Crowdsourced Manipulation of Social Media. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/151253",
"publicationDate" : "2013-08-01T00:00:00"
}, {
"id" : "n5b00cc70",
"label" : "Liu, Zhijiao (2015-12). A Learning Approach for Local Expert Discovery. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/156496",
"publicationDate" : "2015-12-01T00:00:00"
}, {
"id" : "n25650fc8",
"label" : "Khabiri, Elham (2013-05). Ranking, Labeling, and Summarizing Short Text in Social Media. Doctoral Dissertation.",
"url" : "http://hdl.handle.net/1969.1/149337",
"publicationDate" : "2013-05-01T00:00:00"
}, {
"id" : "n8d23111b",
"label" : "Lee, Kyumin (2013-06). Combating Threats to the Quality of Information in Social Systems. Doctoral Dissertation.",
"url" : "http://hdl.handle.net/1969.1/151004",
"publicationDate" : "2013-08-01T00:00:00"
}, {
"id" : "n3bd926e9",
"label" : "Ibrahim Abdelhalim, Ashraf A. (2016-01). Analysis of Twitter Hashtags' Geographic Propagation. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/156300",
"publicationDate" : "2016-01-01T00:00:00"
}, {
"id" : "nd3a55b06",
"label" : "Kashoob, Said Masoud Ali (2011-05). Community-Oriented Models and Applications for the Social Web. Doctoral Dissertation.",
"url" : "http://hdl.handle.net/1969.1/ETD-TAMU-2011-05-9061",
"publicationDate" : "2011-05-01T00:00:00"
}, {
"id" : "n45b39340",
"label" : "Barthwal, Himanshu (2015-07). Location Sharing Behavior: Analysis and Models. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/155426",
"publicationDate" : "2015-08-01T00:00:00"
}, {
"id" : "na4a10250",
"label" : "Fayazi, Amir A (2013-11). Detecting Crowdsourced Spam Reviews in Social Media. Master's Thesis.",
"url" : "http://hdl.handle.net/1969.1/151744",
"publicationDate" : "2013-12-01T00:00:00"
} ],
"featuredProfileDisplay" : "true",
"publicationToInterfolio" : "true",
"image" : "https://vivo.library.tamu.edu/vivo/file/n4687/caverlee.jpg",
"thumbnail" : "https://vivo.library.tamu.edu/vivo/file/n5686/thumbnail_caverlee.jpg",
"websites" : [ {
"id" : "nc34c0d2c_url",
"label" : "InfoLab",
"url" : "http://infolab.tamu.edu/"
}, {
"id" : "nae833dcd_url",
"label" : "Personal Webpage",
"url" : "http://faculty.cse.tamu.edu/caverlee/"
} ],
"modTime" : "Mon Mar 25 01:15:12 UTC 2024",
"type" : [ "FacultyMember" ],
"_links" : {
"self" : {
"href" : "https://api.library.tamu.edu/scholars-discovery/individual/ned50213b"
},
"individual" : {
"href" : "https://api.library.tamu.edu/scholars-discovery/individual/ned50213b"
}
}
}