Soumajyoti Sarkar

Orcid: 0000-0002-4100-1160

According to our database1, Soumajyoti Sarkar authored at least 21 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Testing the Limits of Unified Sequence to Sequence LLM Pretraining on Diverse Table Data Tasks.
CoRR, 2023

An Algorithm For Adversary Aware Decentralized Networked MARL.
CoRR, 2023

HyTrel: Hypergraph-enhanced Tabular Data Representation Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Parameter and Data Efficient Continual Pre-training for Robustness to Dialectal Variance in Arabic.
CoRR, 2022

2021
Bandit based centralized matching in two-sided markets for peer to peer lending.
CoRR, 2021

Centralized Borrower and Lender Matching under Uncertainty for P2P Lending.
Proceedings of the Companion of The Web Conference 2021, 2021

2020
Bandits in Matching Markets: Ideas and Proposals for Peer Lending.
CoRR, 2020

Mitigating Bias in Online Microfinance Platforms: A Case Study on Kiva.org.
Proceedings of the ECML PKDD 2020 Workshops, 2020

A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

2019
Using network motifs to characterize temporal network evolution leading to diffusion inhibition.
Soc. Netw. Anal. Min., 2019

Mining user interaction patterns in the darkweb to predict enterprise cyber incidents.
Soc. Netw. Anal. Min., 2019

Understanding Information Flow in Cascades Using Network Motifs.
CoRR, 2019

Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Detection of Violent Extremists in Social Media.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Can social influence be exploited to compromise security: an online experimental evaluation.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Impact of social influence on adoption behavior: an online controlled experimental evaluation.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums.
Proceedings of the 2018 International Conference on Cyber Conflict, 2018

2017
Understanding and forecasting lifecycle events in information cascades.
Soc. Netw. Anal. Min., 2017

Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum.
Proceedings of the 8th International Conference on Social Media & Society, 2017

2015
A computationally efficient order statistics based outlier detection technique for EEG signals.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015


  Loading...