Hemank Lamba

According to our database1, Hemank Lamba authored at least 26 papers between 2011 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Learning On-the-Job to Re-rank Anomalies from Top-1 Feedback.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Modeling Dwell Time Engagement on Visual Multimedia.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Stop the KillFies! Using Deep Learning Models to Identify Dangerous Selfies.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Extremely Fast Decision Tree.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Modeling Topical Information Diffusion over Microblog Networks.
Proceedings of the Complex Networks and Their Applications VII, 2018

OEC: Open-Ended Classification for Future-Proof Link-Fraud Detection.
CoRR, 2017

Item Recommendation with Evolving User Preferences and Experience.
CoRR, 2017

zooRank: Ranking Suspicious Entities in Time-Evolving Tensors.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

From Camera to Deathbed: Understanding Dangerous Selfies on Social Media.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

The Many Faces of Link Fraud.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

Me, Myself and My Killfie: Characterizing and Preventing Selfie Deaths.
CoRR, 2016

Maximizing the Spread of Positive Influence by Deadline.
Proceedings of the 25th International Conference on World Wide Web, 2016

Incorporating Side Information in Tensor Completion.
Proceedings of the 25th International Conference on World Wide Web, 2016

A model-based approach to anomaly detection in software architectures.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Man-O-Meter: Modeling and Assessing the Evolution of Language Usage of Individuals on Microblogs.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

A model-independent approach for efficient influence maximization in social networks.
Social Netw. Analys. Mining, 2015

Experience-Aware Item Recommendation in Evolving Review Communities.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Detecting insider threats in software systems using graph models of behavioral paths.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

A Tempest in a Teacup? Analyzing Firestorms on Twitter.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

A Shapley Value-based Approach to Determine Gatekeepers in Social Networks with Applications.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

Discovering signature of social networks with application to community detection.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy.
Proceedings of the 22nd International World Wide Web Conference, 2013

A Novel and Model Independent Approach for Efficient Influence Maximization in Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

Incremental subclass discriminant analysis: A case study in face recognition.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Face recognition for look-alikes: A preliminary study.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011