Yu Zhao
2022
A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin
Kai Wang
|
Jun Pang
|
Dingjie Chen
|
Yu Zhao
|
Dapeng Huang
|
Chen Chen
|
Weili Han
2022 Volume 16 Issue 2
Fake news detection via knowledgeable prompt learning
Gongyao Jiang
|
Shuang Liu
|
Yu Zhao
|
Yueheng Sun
|
Meishan Zhang
2022 Volume 59 Issue 5
2021
Leveraging Semantic Information to Facilitate the Discovery of Underserved Podcasts
Maryam Aziz
|
Alice Wang
|
Aasish Pappu
|
Hugues Bouchard
|
Yu Zhao
|
Benjamin A. Carterette
|
Mounia Lalmas
CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021
2019
The effects of perceived chronic pressure and time constraint on information search behaviors and experience
Chang Liu
|
Ying-Hsang Liu
|
Tom Gedeon
|
Yu Zhao
|
Yiming Wei
|
Fan Yang
2019 Volume 56 Issue 5
Style Change Detection with Feed-forward Neural Networks
Chaoyuan Zuo
|
Yu Zhao
|
Ritwik Banerjee
Working Notes of CLEF 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019
2014
What does time constraint mean to information searchers?
Chang Liu
|
Fan Yang
|
Yu Zhao
|
Qin Jiang
|
Lu Zhang
Fifth Information Interaction in Context Symposium, IIiX '14, Regensburg, Germany, August 26-29, 2014
Co-authors
- Chang Liu 2
- Fan Yang 2
- Chaoyuan Zuo 1
- Ritwik Banerjee 1
- Qin Jiang 1
- show all...
- Lu Zhang 1
- Aasish Pappu 1
- Mounia Lalmas 1
- Maryam Aziz 1
- Hugues Bouchard 1
- Benjamin A. Carterette 1
- Alice Wang 1
- Yiming Wei 1
- Tom Gedeon 1
- Ying-Hsang Liu 1
- Gongyao Jiang 1
- Meishan Zhang 1
- Shuang Liu 1
- Yueheng Sun 1
- Kai Wang 1
- Dapeng Huang 1
- Chen Chen 1
- Weili Han 1
- Dingjie Chen 1
- Jun Pang 1
Venues
- IPM2
- CLEF1
- CHIIR/HCIR1
- CIKM1
- TWEB1