


default search action
25th WISE 2024: Doha, Qatar - Part II
- Mahmoud Barhamgi

, Hua Wang
, Xin Wang
:
Web Information Systems Engineering - WISE 2024 - 25th International Conference, Doha, Qatar, December 2-5, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15437, Springer 2025, ISBN 978-981-96-0566-8
Social Media and News Analysis
- Andrew Bartlett, Waheeb Yaqub, Basem Suleiman

, Manoranjan Mohanty:
Misinformation in Reels, Influence of Contextual Superimposed Texts in Short Videos. 3-14 - Ansar Iqbal, Waheeb Yaqub, Basem Suleiman

, Manoranjan Mohanty:
What Did The People Say? Evaluating the Effect of Comment Summarisation Tags on Perceived News Credibility Using Qualitative Approach. 15-29 - Hrishikesh Masurkar, Basem Suleiman

, Waheeb Yaqub, Muhammad Johan Alibasa:
Are Fact Checkers Effective in the Post Truth World? Assessing Impact of Fact Checkers Cross Medium and Platforms. 30-40 - Haoyuan Zeng, Xiang Zeng, Ye Wang, Bin Zhou:

Target-Specific Hate Trend Prediction on Social Network. 41-55 - Josemar Alves Caetano, Humberto Torres Marques-Neto

, Virgílio A. F. Almeida:
Characterizing Collective Attention on Online Chats: A Three-Pronged Approach. 56-66 - Noor Al-Ansari

, Dena Al-Thani
, Mariam A. Bahameish
:
The Influence of Social Networking Usage Experience and Activity on Preferences of Explainable Artificial Intelligence (XAI) Representation Methods in a Hate Speech Detection System. 67-77 - Sanaa Kaddoura

, Reem Nassar:
Language Model-Based Approach for Multiclass Cyberbullying Detection. 78-89 - Ruben Sinu Kurian, Chandramani Chaudhary, Abhay Unni Nambiar, Abhina Sunny:

MeTAN: Metaphoric Temporal Attention Network for Depression Detection on Social Media. 90-104 - Xiyu Qiao

, Xiangmin Zhou
, Changjun Zhou
, Hua Wang
, Yanchun Zhang
:
EBUD: Evolving Disaster Burst Detection over Social Streams. 105-115 - Sarah Condran

, Michael Bewong
, Selasi Kwashie
, Md Zahidul Islam
, Irfan Altas, Joshua Condran:
MAPX: An Explainable Model-Agnostic Framework for Detecting False Information on Social Media Networks. 116-127
Graph Machine Learning on Web and Social
- Yongyi Liu, Shanru Lin

, Jiangtao Huang:
Knowledge Graph Relation Patterns Networks for Recommendations. 131-145 - Venus Haghighi, Nasrin Shabani, Behnaz Soltani, Lina Yao, Quan Z. Sheng

, Jian Yang
, Amin Beheshti
:
Robust Graph Learning Against Camouflaged Malicious Actors. 146-161 - Ziye Fang

, Luyao Teng
, Zefeng Zheng
, Wei Zhang
, Shaohua Teng
:
Label-Enhanced Cross-Modal Hashing with Dual-Semantic Learning. 162-176 - Chang Gong

, Boyu Yang, Weiguo Zheng, Xing Huang, Weiyi Huang, Jie Wen, Shijie Sun, Bohua Yang:
Towards Building a Lightweight and Powerful Computation Graph for Scalable GNN. 177-192 - Md Jamil Ahmed

, Mahdis Saeedi
, Hossein Fani
:
Vector Representation Learning of Skills for Collaborative Team Recommendation: A Comparative Study. 193-207 - Mengqiu Cheng

, Wanting Qiao, Junming Chen
, Xianfeng Li:
Learning to Ask About Text Content in an Image with Fine-Grained Features. 208-223
Trustworthy Machine Learning
- Yifeng Zheng

, Tianchen Xiong, Huajie Ouyang, Songlei Wang, Zhongyun Hua, Yansong Gao:
SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix Factorization. 227-242 - Yichen Zang

, Chengjun Cai
, Wentao Dong
, Cong Wang
:
VizardFL: Enabling Private Participation in Federated Learning Systems. 243-257 - Zeming Yao

, Lin Li
, Leo Yu Zhang
, Fusen Guo
, Chao Chen
, Jun Zhang
:
Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication. 258-272 - Ahmed Abusnaina, Afsah Anwar, Muhammad Saad, Abdulrahman Alabduljabbar, Rhongho Jang, Saeed Salem, David Mohaisen:

Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift. 273-289 - Sen Peng

, Yufei Chen
, Cong Wang, Xiaohua Jia:
Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process. 290-305 - Yousra Chahinez Hadj Azzem

, Fouzi Harrag
, Ladjel Bellatreche
:
Evaluating Contrastive and Non-contrastive Explanations for Language Models. 306-316 - Xinqian Wang, Xiaoning Liu, Xun Yi, Xuechao Yang

, Iqbal Gondal:
Model Extraction Attacks on Privacy-Preserving Deep Learning Based Medical Services. 317-332 - Jan Aalmoes

, Vasisht Duddu
, Antoine Boutet
:
On the Alignment of Group Fairness with Attribute Privacy. 333-348
Graph Data Management
- Hui Wang, Xin Wang, Menglu Ma, Yiheng You:

RPQBench: A Benchmark for Regular Path Queries on Graph Data. 351-367 - Chengguo Li, Xin Wang, Yongqi Yin, Hui Wang:

Two Birds One Stone: Dual-Role Path Based Subgraph Matching Using Partial Evaluation. 368-383 - Mohamed Bouadi

, Arta Alavi
, Salima Benbernou
, Mourad Ouziri
:
KRAFT: Leveraging Knowledge Graphs for Interpretable Feature Generation. 384-399 - Faye Wang, Yu Liu, Lei Zou:

Neuralizing Graph Edit Distance Computation with Fine-Grained Matching Cost Prediction. 400-414 - Xiaoying Wu, Michael Lan, Md Rakibul Hasan, Dimitri Theodoratos:

Scalable Optimization of Graph Pattern Queries Using Summary Graphs. 415-426 - Riccardo Pozzi

, Valentina Barbera
, Renzo Arturo Alva Principe
, Davide Giardini
, Riccardo Rubini
, Matteo Palmonari
:
Combining Knowledge Graphs and NLP to Analyze Instant Messaging Data in Criminal Investigations. 427-442 - Lingzhi Xiang, Qing Li, Xiang Li, Xingchun Diao:

G-ETI: Incorporating Graph Information for Improved Unsupervised Event Type Induction. 443-455 - Tsuyoshi Hasegawa, Shiori Hironaka

, Kazuyuki Shudo
:
Estimation of Graph Features Based on Random Walks Using Neighbors' Properties. 456-466 - Hao Huang

, Maria-Esther Vidal
:
SemMatch: Semantics-Aware Matching for Causal Inference over Knowledge Graphs. 467-483

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














