default search action
Soumajyoti Sarkar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Chung-Yiu Yau, Hoi-To Wai, Parameswaran Raman, Soumajyoti Sarkar, Mingyi Hong:
EMC2: Efficient MCMC Negative Sampling for Contrastive Learning with Global Convergence. ICML 2024 - [i20]Chung-Yiu Yau, Hoi-To Wai, Parameswaran Raman, Soumajyoti Sarkar, Mingyi Hong:
EMC2: Efficient MCMC Negative Sampling for Contrastive Learning with Global Convergence. CoRR abs/2404.10575 (2024) - [i19]Soumajyoti Sarkar, Leonard Lausen, Volkan Cevher, Sheng Zha, Thomas Brox, George Karypis:
Revisiting SMoE Language Models by Evaluating Inefficiencies with Task Specific Expert Pruning. CoRR abs/2409.01483 (2024) - 2023
- [c12]Pei Chen, Soumajyoti Sarkar, Leonard Lausen, Balasubramaniam Srinivasan, Sheng Zha, Ruihong Huang, George Karypis:
HyTrel: Hypergraph-enhanced Tabular Data Representation Learning. NeurIPS 2023 - [i18]Soumajyoti Sarkar:
An Algorithm For Adversary Aware Decentralized Networked MARL. CoRR abs/2305.05573 (2023) - [i17]Pei Chen, Soumajyoti Sarkar, Leonard Lausen, Balasubramaniam Srinivasan, Sheng Zha, Ruihong Huang, George Karypis:
HYTREL: Hypergraph-enhanced Tabular Data Representation Learning. CoRR abs/2307.08623 (2023) - [i16]Soumajyoti Sarkar, Leonard Lausen:
Testing the Limits of Unified Sequence to Sequence LLM Pretraining on Diverse Table Data Tasks. CoRR abs/2310.00789 (2023) - 2022
- [i15]Soumajyoti Sarkar, Kaixiang Lin, Sailik Sengupta, Leonard Lausen, Sheng Zha, Saab Mansour:
Parameter and Data Efficient Continual Pre-training for Robustness to Dialectal Variance in Arabic. CoRR abs/2211.03966 (2022) - 2021
- [c11]Soumajyoti Sarkar:
Centralized Borrower and Lender Matching under Uncertainty for P2P Lending. WWW (Companion Volume) 2021: 269-273 - [i14]Soumajyoti Sarkar:
Bandit based centralized matching in two-sided markets for peer to peer lending. CoRR abs/2105.02589 (2021) - 2020
- [c10]Hamidreza Alvari, Ghazaleh Beigi, Soumajyoti Sarkar, Scott W. Ruston, Steven R. Corman, Hasan Davulcu, Paulo Shakarian:
A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts. ICDIS 2020: 26-33 - [c9]Soumajyoti Sarkar, Hamidreza Alvari:
Mitigating Bias in Online Microfinance Platforms: A Case Study on Kiva.org. PKDD/ECML Workshops 2020: 75-91 - [i13]Hamidreza Alvari, Ghazaleh Beigi, Soumajyoti Sarkar, Scott W. Ruston, Steven R. Corman, Hasan Davulcu, Paulo Shakarian:
A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts. CoRR abs/2001.04624 (2020) - [i12]Soumajyoti Sarkar, Hamidreza Alvari:
Mitigating Bias in Online Microfinance Platforms: A Case Study on Kiva.org. CoRR abs/2006.12995 (2020) - [i11]Soumajyoti Sarkar:
Bandits in Matching Markets: Ideas and Proposals for Peer Lending. CoRR abs/2011.04400 (2020)
2010 – 2019
- 2019
- [j3]Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian:
Using network motifs to characterize temporal network evolution leading to diffusion inhibition. Soc. Netw. Anal. Min. 9(1): 14:1-14:24 (2019) - [j2]Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian:
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents. Soc. Netw. Anal. Min. 9(1): 57:1-57:28 (2019) - [c8]Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Impact of social influence on adoption behavior: an online controlled experimental evaluation. ASONAM 2019: 226-233 - [c7]Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Can social influence be exploited to compromise security: an online experimental evaluation. ASONAM 2019: 593-596 - [c6]Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian:
Detection of Violent Extremists in Social Media. ICDIS 2019: 43-47 - [c5]Hamidreza Alvari, Elham Shaabani, Soumajyoti Sarkar, Ghazaleh Beigi, Paulo Shakarian:
Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media. WWW (Companion Volume) 2019: 154-161 - [c4]Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian:
Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks. WWW (Companion Volume) 2019: 1079-1086 - [i10]Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian:
Detection of Violent Extremists in Social Media. CoRR abs/1902.01577 (2019) - [i9]Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian:
Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks. CoRR abs/1902.10366 (2019) - [i8]Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian:
Using network motifs to characterize temporal network evolution leading to diffusion inhibition. CoRR abs/1903.00862 (2019) - [i7]Hamidreza Alvari, Elham Shaabani, Soumajyoti Sarkar, Ghazaleh Beigi, Paulo Shakarian:
Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media. CoRR abs/1903.01693 (2019) - [i6]Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian:
Understanding Information Flow in Cascades Using Network Motifs. CoRR abs/1904.05161 (2019) - [i5]Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Impact of Social Influence on Adoption Behavior: An Online Controlled Experimental Evaluation. CoRR abs/1909.01409 (2019) - [i4]Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju:
Can social influence be exploited to compromise security: An online experimental evaluation. CoRR abs/1909.02872 (2019) - [i3]Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian:
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents. CoRR abs/1909.11592 (2019) - 2018
- [c3]Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian:
Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums. CyCon U.S. 2018: 1-7 - [i2]Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian:
Understanding and forecasting lifecycle events in information cascades. CoRR abs/1809.06050 (2018) - [i1]Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian:
Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums. CoRR abs/1811.06537 (2018) - 2017
- [j1]Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian:
Understanding and forecasting lifecycle events in information cascades. Soc. Netw. Anal. Min. 7(1): 55:1-55:22 (2017) - [c2]Kyounghee Hazel Kwon, J. Hunter Priniski, Soumajyoti Sarkar, Jana Shakarian, Paulo Shakarian:
Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum. SMSociety 2017: 45:1-45:5 - 2015
- [c1]Bapun K. Giri, Soumajyoti Sarkar, Satyaki Mazumder, Koel Das:
A computationally efficient order statistics based outlier detection technique for EEG signals. EMBC 2015: 4765-4768
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint