


default search action
25th WISE 2024: Doha, Qatar - Part II
- Mahmoud Barhamgi
, Hua Wang
, Xin Wang
:
Web Information Systems Engineering - WISE 2024 - 25th International Conference, Doha, Qatar, December 2-5, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15437, Springer 2025, ISBN 978-981-96-0566-8
Social Media and News Analysis
- Andrew Bartlett, Waheeb Yaqub, Basem Suleiman
, Manoranjan Mohanty:
Misinformation in Reels, Influence of Contextual Superimposed Texts in Short Videos. 3-14 - Ansar Iqbal, Waheeb Yaqub, Basem Suleiman
, Manoranjan Mohanty:
What Did The People Say? Evaluating the Effect of Comment Summarisation Tags on Perceived News Credibility Using Qualitative Approach. 15-29 - Hrishikesh Masurkar, Basem Suleiman
, Waheeb Yaqub, Muhammad Johan Alibasa:
Are Fact Checkers Effective in the Post Truth World? Assessing Impact of Fact Checkers Cross Medium and Platforms. 30-40 - Haoyuan Zeng, Xiang Zeng, Ye Wang, Bin Zhou:
Target-Specific Hate Trend Prediction on Social Network. 41-55 - Josemar Alves Caetano, Humberto Torres Marques-Neto
, Virgílio A. F. Almeida:
Characterizing Collective Attention on Online Chats: A Three-Pronged Approach. 56-66 - Noor Al-Ansari
, Dena Al-Thani
, Mariam A. Bahameish
:
The Influence of Social Networking Usage Experience and Activity on Preferences of Explainable Artificial Intelligence (XAI) Representation Methods in a Hate Speech Detection System. 67-77 - Sanaa Kaddoura
, Reem Nassar:
Language Model-Based Approach for Multiclass Cyberbullying Detection. 78-89 - Ruben Sinu Kurian, Chandramani Chaudhary, Abhay Unni Nambiar, Abhina Sunny:
MeTAN: Metaphoric Temporal Attention Network for Depression Detection on Social Media. 90-104 - Xiyu Qiao
, Xiangmin Zhou
, Changjun Zhou
, Hua Wang
, Yanchun Zhang
:
EBUD: Evolving Disaster Burst Detection over Social Streams. 105-115 - Sarah Condran
, Michael Bewong
, Selasi Kwashie
, Md Zahidul Islam
, Irfan Altas, Joshua Condran:
MAPX: An Explainable Model-Agnostic Framework for Detecting False Information on Social Media Networks. 116-127
Graph Machine Learning on Web and Social
- Yongyi Liu, Shanru Lin, Jiangtao Huang:
Knowledge Graph Relation Patterns Networks for Recommendations. 131-145 - Venus Haghighi, Nasrin Shabani, Behnaz Soltani, Lina Yao, Quan Z. Sheng, Jian Yang, Amin Beheshti:
Robust Graph Learning Against Camouflaged Malicious Actors. 146-161 - Ziye Fang
, Luyao Teng
, Zefeng Zheng
, Wei Zhang
, Shaohua Teng
:
Label-Enhanced Cross-Modal Hashing with Dual-Semantic Learning. 162-176 - Chang Gong
, Boyu Yang, Weiguo Zheng, Xing Huang, Weiyi Huang, Jie Wen, Shijie Sun, Bohua Yang:
Towards Building a Lightweight and Powerful Computation Graph for Scalable GNN. 177-192 - Md Jamil Ahmed
, Mahdis Saeedi
, Hossein Fani
:
Vector Representation Learning of Skills for Collaborative Team Recommendation: A Comparative Study. 193-207 - Mengqiu Cheng, Wanting Qiao, Junming Chen
, Xianfeng Li:
Learning to Ask About Text Content in an Image with Fine-Grained Features. 208-223
Trustworthy Machine Learning
- Yifeng Zheng
, Tianchen Xiong, Huajie Ouyang, Songlei Wang, Zhongyun Hua, Yansong Gao:
SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix Factorization. 227-242 - Yichen Zang
, Chengjun Cai
, Wentao Dong
, Cong Wang
:
VizardFL: Enabling Private Participation in Federated Learning Systems. 243-257 - Zeming Yao
, Lin Li
, Leo Yu Zhang
, Fusen Guo
, Chao Chen
, Jun Zhang
:
Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication. 258-272 - Ahmed Abusnaina, Afsah Anwar, Muhammad Saad, Abdulrahman Alabduljabbar, Rhongho Jang, Saeed Salem, David Mohaisen:
Exposing the Limitations of Machine Learning for Malware Detection Under Concept Drift. 273-289 - Sen Peng
, Yufei Chen
, Cong Wang, Xiaohua Jia:
Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process. 290-305 - Yousra Chahinez Hadj Azzem
, Fouzi Harrag
, Ladjel Bellatreche
:
Evaluating Contrastive and Non-contrastive Explanations for Language Models. 306-316 - Xinqian Wang, Xiaoning Liu, Xun Yi, Xuechao Yang, Iqbal Gondal:
Model Extraction Attacks on Privacy-Preserving Deep Learning Based Medical Services. 317-332 - Jan Aalmoes
, Vasisht Duddu
, Antoine Boutet
:
On the Alignment of Group Fairness with Attribute Privacy. 333-348
Graph Data Management
- Hui Wang, Xin Wang, Menglu Ma, Yiheng You:
RPQBench: A Benchmark for Regular Path Queries on Graph Data. 351-367 - Chengguo Li, Xin Wang, Yongqi Yin, Hui Wang:
Two Birds One Stone: Dual-Role Path Based Subgraph Matching Using Partial Evaluation. 368-383 - Mohamed Bouadi
, Arta Alavi
, Salima Benbernou
, Mourad Ouziri
:
KRAFT: Leveraging Knowledge Graphs for Interpretable Feature Generation. 384-399 - Faye Wang, Yu Liu, Lei Zou:
Neuralizing Graph Edit Distance Computation with Fine-Grained Matching Cost Prediction. 400-414 - Xiaoying Wu, Michael Lan, Md Rakibul Hasan, Dimitri Theodoratos:
Scalable Optimization of Graph Pattern Queries Using Summary Graphs. 415-426 - Riccardo Pozzi
, Valentina Barbera
, Renzo Arturo Alva Principe
, Davide Giardini
, Riccardo Rubini
, Matteo Palmonari
:
Combining Knowledge Graphs and NLP to Analyze Instant Messaging Data in Criminal Investigations. 427-442 - Lingzhi Xiang, Qing Li, Xiang Li, Xingchun Diao:
G-ETI: Incorporating Graph Information for Improved Unsupervised Event Type Induction. 443-455 - Tsuyoshi Hasegawa, Shiori Hironaka
, Kazuyuki Shudo
:
Estimation of Graph Features Based on Random Walks Using Neighbors' Properties. 456-466 - Hao Huang
, Maria-Esther Vidal
:
SemMatch: Semantics-Aware Matching for Causal Inference over Knowledge Graphs. 467-483

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.