Hemank Lamba

Affiliations:
  • Carnegie Mellon University, School of Computer Science, Pittsburgh, PA, USA
  • IBM Research India, New Delhi, India
  • Indraprastha Institute of Information Technology, Delhi, India


According to our database1, Hemank Lamba authored at least 43 papers between 2011 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Co-WIN: Really Winning? Analysing Inequity in India's Vaccination Response.
CoRR, 2022

Glowing Experience or Bad Trip? A Quantitative Analysis of User Reported Drug Experiences on Erowid.org.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Effect of Popularity Shocks on User Behaviour.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

"This Is Damn Slick!" Estimating the Impact of Tweets on Open Source Project Popularity and New Contributors.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
An Empirical Comparison of Bias Reduction Methods on Real-World Problems in High-Stakes Policy Settings.
SIGKDD Explor., 2021

Empirical observation of negligible fairness-accuracy trade-offs in machine learning for public policy.
Nat. Mach. Intell., 2021

2020
Machine learning for public policy: Do we need to sacrifice accuracy to make models fair?
CoRR, 2020

Explainable Machine Learning for Public Policy: Use Cases, Gaps, and Research Directions.
CoRR, 2020

Heard it through the Gitvine: an empirical study of tool diffusion across the npm ecosystem.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Need for Tweet: How Open Source Developers Talk About Their GitHub Work on Twitter.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

Driving the Last Mile: Characterizing and Understanding Distracted Driving Posts on Social Networks.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Provably Robust Node Classification via Low-Pass Message Passing.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

TellTail: Fast Scoring and Detection of Dense Subgraphs.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
WebHound: a data-driven intrusion detection from real-world web access logs.
Soft Comput., 2019

Learning On-the-Job to Re-rank Anomalies from Top-1 Feedback.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Modeling Dwell Time Engagement on Visual Multimedia.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Characterizing and detecting livestreaming chatbots.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Stop the KillFies! Using Deep Learning Models to Identify Dangerous Selfies.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

xStream: Outlier Detection in Feature-Evolving Data Streams.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Modeling Topical Information Diffusion over Microblog Networks.
Proceedings of the Complex Networks and Their Applications VII, 2018

2017
OEC: Open-Ended Classification for Future-Proof Link-Fraud Detection.
CoRR, 2017

Item Recommendation with Evolving User Preferences and Experience.
CoRR, 2017

zooRank: Ranking Suspicious Entities in Time-Evolving Tensors.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

From Camera to Deathbed: Understanding Dangerous Selfies on Social Media.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

The Many Faces of Link Fraud.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

2016
Me, Myself and My Killfie: Characterizing and Preventing Selfie Deaths.
CoRR, 2016

Maximizing the Spread of Positive Influence by Deadline.
Proceedings of the 25th International Conference on World Wide Web, 2016

Incorporating Side Information in Tensor Completion.
Proceedings of the 25th International Conference on World Wide Web, 2016

A model-based approach to anomaly detection in software architectures.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Man-O-Meter: Modeling and Assessing the Evolution of Language Usage of Individuals on Microblogs.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
A model-independent approach for efficient influence maximization in social networks.
Soc. Netw. Anal. Min., 2015

Experience-Aware Item Recommendation in Evolving Review Communities.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Detecting insider threats in software systems using graph models of behavioral paths.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

A Tempest in a Teacup? Analyzing Firestorms on Twitter.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
SoLoMo analytics for telco Big Data monetization.
IBM J. Res. Dev., 2014

A Shapley Value-based Approach to Determine Gatekeepers in Social Networks with Applications.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

Discovering signature of social networks with application to community detection.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

2013
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy.
Proceedings of the 22nd International World Wide Web Conference, 2013

A Novel and Model Independent Approach for Efficient Influence Maximization in Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

2012
Incremental subclass discriminant analysis: A case study in face recognition.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Face recognition for look-alikes: A preliminary study.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011


  Loading...