Brainstorm - Precog's Reading Boulevard
Brainstorm is the group's reading session, which focuses on developing
a wholesome knowledge about various topics (Privacy and Security in
Online Social Media, Cyber crime, Privacy, and Usable Privacy and
Security) in which research is being conducted at Precog. It provides
an opportunity for focused discussions and exploring current state of
the art. We believe these sessions help in developing scientific
approach to problem articulation, sound research practices, and
fact-based learning through accepted publications and case studies.
The current reading group is comprised of vivacious graduate and
undergraduate students at IIIT-H, with common interest in improving and
contributing towards above mentioned areas of work.
Please join the mailing list to get
meet details, & reminders.
Proceedings
The group Brainstorm's every week during the regular semester (Fall / Spring). The sessions are preceded by
different members of the group; members volunteer to moderate the paper for the week. The moderator
leads the discussion with briefing about the paper, highlighting various strengths and weakness of the
paper. This is followed by other participants in roles like archeologist, industry practitioner etc. who
share findings from their perspective. Read more about role-playing paper-reading seminar here. This session concludes
with comments and constructive discussion on the work and attendees leave with some interesting takeaways
and conclusions reached from the exchange.
Fall 2024 Schedule
When: 2045-2145 hrs IST, Mondays
Date |
Presenters |
Publication / Paper |
17 August 2024 |
Vamshi Krishna
|
Wu, Zhaofeng, Linlu Qiu, Alexis Ross, Ekin Akyürek, Boyuan Chen,
Bailin Wang, Najoung Kim, Jacob Andreas, and Yoon Kim. (2023).
"Reasoning or reciting? exploring the capabilities and limitations of language models through counterfactual tasks."
PDF |
|
24 August 2024 |
Sreeram Vennam
| Malach, Eran. (2023).
"Auto-regressive next-token predictors are universal learners."
PDF |
Slides |
Contact |
|
31 August 2024 |
Akshit Sinha
|
Daigavane, Ameya, Balaraman Ravindran, and Gaurav Aggarwal. (2021).
"Understanding convolutions on graphs."
PDF |
Slides |
Contact |
|
9 September 2024 |
Monish Singhal
|
Dudzik, Andrew J., and Petar Veličković. (2022).
"Graph neural networks are dynamic programmers."
PDF |
|
TBD |
Debangan Mishra
|
Wang, Sinong, et al. (2020).
"Linformer: Self-attention with linear complexity."
PDF |
|
Summer 2024 Schedule
When: 1530-1630 hrs IST, Saturdays
Date |
Presenters |
Publication / Paper |
11 May 2024 |
Ameya Rathod, Ishan Kavathekar
|
Albert Gu, & Tri Dao. (2023). Mamba: Linear-Time
Sequence Modeling with Selective State Spaces.
PDF |
|
18 May 2024 |
Anish R Joishy, Varshita Kolipaka
| Takuya Akiba, Makoto Shing, Yujin Tang, Qi Sun, &
David Ha. (2024). Evolutionary Optimization of Model Merging Recipes.
PDF |
|
25 May 2024 |
Sumit Kumar, Shiven Sinha
|
Nicholas Carlini, Daniel Paleka, Krishnamurthy Dj
Dvijotham, Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski,
Milad Nasr, Arthur Conmy, Eric Wallace, David Rolnick, & Florian Tramèr. (2024). Stealing Part
of a Production Language Model.
PDF |
|
1 June 2024 |
Hari, Vamsi Krishna
|
Shuming Ma, Hongyu Wang, Lingxiao Ma, Lei Wang, Wenhui
Wang, Shaohan Huang, Li Dong, Ruiping Wang, Jilong Xue, & Furu Wei. (2024). The Era of 1-bit
LLMs: All Large Language Models are in 1.58 Bits.
PDF |
|
8 June 2024 |
Swarang Joshi, Prishanshul Govil
|
Collin Burns, Pavel Izmailov, Jan Hendrik Kirchner,
Bowen Baker, Leo Gao, Leopold Aschenbrenner, Yining Chen, Adrien Ecoffet, Manas Joglekar, Jan
Leike, Ilya Sutskever, & Jeff Wu. (2023). Weak-to-Strong Generalization: Eliciting Strong
Capabilities With Weak Supervision.
PDF |
|
Spring 2023 Schedule
When: 1530-1630 hrs IST, Saturdays
Date |
Presenters |
Publication / Paper |
20 January 2023 |
Vansh
Shreyansh, Pulak, Anmol G
|
Ilias Chalkidis, Tommaso Pasini, Sheng Zhang, Letizia
Tomada, Sebastian Schwemer, and Anders Søgaard. 2022. FairLex: A Multilingual Benchmark for
Evaluating Fairness in Legal Text Processing. In Proceedings of the 60th Annual Meeting of the
Association for Computational Linguistics (Volume 1: Long Papers), pages 4389–4406, Dublin,
Ireland. Association for Computational Linguistics
PDF |
|
28 January 2023 |
Kshitijaa Jaglan
Aravind N, Priyanshul, Abhijeeth
|
Park, S., Kim, S., & Cha, M. (2022). Knowledge Sharing
via Domain Adaptation in Customs Fraud Detection. Proceedings of the AAAI Conference on
Artificial Intelligence, 36(11), 12062-12070. https://doi.org/10.1609/aaai.v36i11.21465
PDF |
|
11 February, 2023 |
Shashwat Singh
Vamshi, Mann, Tejasvi
|
Kevin Meng, David Bau, Alex Andonian, and Yonatan
Belinkov. "Locating and Editing Factual Associations in GPT." Advances in Neural Information
Processing Systems 35 (2022).
PDF |
|
25 February 2023 |
Shashwat Goel
Rohan, Keyur, Hitkul
|
Shaily Bhatt, Sunipa Dev, Partha Talukdar, Shachi
Dave, and Vinodkumar Prabhakaran. 2022. Re-contextualizing Fairness in NLP: The Case of India.
In Proceedings of the 2nd Conference of the Asia-Pacific Chapter of the Association for
Computational Linguistics and the 12th International Joint Conference on Natural Language
Processing (Volume 1: Long Papers), pages 727–740, Online only. Association for Computational
Linguistics.
PDF |
|
4 March 2023 |
Priyanshul Govil
Saurav, Aditya, Geetika
|
Lund, H. N., Hannibal, N., Mainz, J., MacDonald, R., &
Nygaard Pedersen, I. (2022). Music, sleep, and depression: An interview study. Psychology of
Music, 50(3), 830–848. https://doi.org/10.1177/03057356211024350
PDF |
|
11 March 2023 |
Arvindh A and Aakash A
Nidhi, Vamshi, Shrey
|
Jiaxuan You, Tianyu Du, and Jure Leskovec. 2022.
ROLAND: Graph Learning Framework for Dynamic Graphs. In Proceedings of the 28th ACM SIGKDD
Conference on Knowledge Discovery and Data Mining (KDD '22). Association for Computing
Machinery, New York, NY, USA, 2358–2366. https://doi.org/10.1145/3534678.3539300
PDF |
|
25 March 2023 |
Harsha Vardhan
Pooja, Srijan, Pratyush
|
Darshan Singh S, Anchit Gupta, C.V. Jawahar and
Makarand Tapaswi
Unsupervised Audio-Visual Lecture Segmentation, WACV, 2023.
PDF |
|
1 April 2023 |
Vamshi Krishna
Anmol A, Mehul, Aryamann
|
Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song,
Changlong Sun, Xiaofeng Wang, Wei Lu, and Xiaozhong Liu. 2022. Order-Disorder: Imitation
Adversarial Attacks for Black-box Neural Ranking Models. In Proceedings of the 2022 ACM SIGSAC
Conference on Computer and Communications Security (CCS '22). Association for Computing
Machinery, New York, NY, USA, 2025–2039. https://doi.org/10.1145/3548606.3560683
PDF |
|
8 April 2023 |
Anmol G
Shivangi, Aakash, Bhavyajeet
|
Josef Valvoda, Tiago Pimentel, Niklas Stoehr, Ryan
Cotterell, and Simone Teufel. 2021. What About the Precedent: An Information-Theoretic Analysis
of Common Law. In Proceedings of the 2021 Conference of the North American Chapter of the
Association for Computational Linguistics: Human Language Technologies, pages 2275–2288, Online.
Association for Computational Linguistics.
PDF |
|
15 April 2023 |
Tejasvi C
Aravind, Anirudh, Amul
|
Ramaravind Kommiya Mothilal, Dibyendu Mishra, Sachita
Nishal, Faisal M. Lalani, and Joyojeet Pal. 2022. Voting with the Stars: Analyzing Partisan
Engagement between Celebrities and Politicians in India. Proc. ACM Hum.-Comput. Interact. 6,
CSCW1, Article 134 (April 2022), 29 pages. https://doi.org/10.1145/3512981
PDF |
|
[Cancelled] 24 April 2023 |
Ritwik
Swetha, Tanmay, Ansh
|
Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong,
Linhai Song, and Gang Wang. 2022. Beyond Bot Detection: Combating Fraudulent Online Survey
Takers✱. In Proceedings of the ACM Web Conference 2022 (WWW '22). Association for Computing
Machinery, New York, NY, USA, 699–709. https://doi.org/10.1145/3485447.3512230
PDF |
|
Fall 2022 Schedule
When: 1530-1630 hrs IST, Saturdays
Date |
Moderator |
Publication / Paper |
13 August 2022 |
Kshitijaa Jaglan, IIIT H |
Nadeem, M., Bethke, A. and Reddy, S., 2020. Stereoset:
Measuring stereotypical bias in pretrained language models. arXiv preprint arXiv:2004.09456.
PDF |
|
20 August 2022 |
Soumyasis Gun, IIIT H |
Bhuiyan, M.M., Bautista Isaza, C.A., Mitra, T. and
Lee, S.W., 2022, April. OtherTube: Facilitating Content Discovery and Reflection by Exchanging
YouTube Recommendations with Strangers. In CHI Conference on Human Factors in Computing Systems
(pp. 1-17).
PDF |
OpenToAll |
Register to attend
|
03 September 2022 |
Shashwat Goel, IIIT H |
Birhane, A., Kalluri, P., Card, D., Agnew, W., Dotan,
R. and Bao, M., 2022, June. The values encoded in machine learning research. In 2022 ACM
Conference on Fairness, Accountability, and Transparency (pp. 173-184).
PDF |
|
10 September 2022 |
Arvindh A, IIIT H |
Fabbri, F., Wang, Y., Bonchi, F., Castillo, C. and
Mathioudakis, M., 2022, April. Rewiring What-to-Watch-Next Recommendations to Reduce
Radicalization Pathways. In Proceedings of the ACM Web Conference 2022 (pp. 2719-2728).
PDF |
|
17 September 2022 |
N Harsha Vardhan, IIIT H |
Li, H., Hecht, B. and Chancellor, S., 2022, May.
Measuring the Monetary Value of Online Volunteer Work. In Proceedings of the International AAAI
Conference on Web and Social Media (Vol. 16, pp. 596-606).
PDF
|
OpenToAll |
Register to attend
|
24 September 2022 |
Shashwat Singh, IIIT H |
Park, C., Arian, M., Liu, X., Sasson, L., Kahn, J.,
Patel, S., Mariakakis, A. and Althoff, T., 2021, April. Online mobile app usage as an indicator
of sleep behavior and job performance. In Proceedings of the Web Conference 2021 (pp.
2488-2500).
PDF |
|
1 October 2022 |
Vanshpreet Singh Kohli, IIIT H |
Lahnala, A., Welch, C., Neuendorf, B. and Flek, L.,
2022. Mitigating toxic degeneration with empathetic data: Exploring the relationship between
toxicity and empathy. arXiv preprint arXiv:2205.07233.
PDF |
|
8 October 2022 |
Vamshi, IIIT H |
Mooseder, A., Malik, M.M., Lamba, H., Erowid, E.,
Thyssen, S. and Pfeffer, J., 2022, May. Glowing Experience or Bad Trip? A Quantitative Analysis
of User Reported Drug Experiences on Erowid. org. In Proceedings of the International AAAI
Conference on Web and Social Media (Vol. 16, pp. 675-686).
PDF |
OpenToAll |
Register to attend
|
5 November 2022 |
Aditya Kadam, IIIT H |
Coutrot, A., Manley, E., Goodroe, S., Gahnstrom, C.,
Filomena, G., Yesiltepe, D., Dalton, R.C., Wiener, J.M., Hölscher, C., Hornberger, M. and
Spiers, H.J., 2022. Entropy of city street networks linked to future spatial navigation ability.
Nature, 604(7904), pp.104-110.
PDF |
OpenToAll |
Register to attend
|
12 November 2022 |
Priyanshul, IIIT H |
Weld, G., West, P., Glenski, M., Arbour, D., Rossi,
R.A. and Althoff, T., 2022, May. Adjusting for confounders with text: Challenges and an
empirical evaluation framework for causal inference. In Proceedings of the International AAAI
Conference on Web and Social Media (Vol. 16, pp. 1109-1120).
PDF
|
|
Spring 2022 Schedule
When: 1715 to 1815 hrs IST, Tuesdays
Date |
Moderator |
Publication / Paper |
4 January |
Hitkul Jangra, IIITD |
Burke, M. and Kraut, R.E., 2014, April. Growing closer
on Facebook: Changes in tie strength through social network site use. In Proceedings of the
SIGCHI conference on human factors in computing systems (pp. 4187-4196).
PDF
|
11 January |
Saksham Mrig, IIITD |
Ansolabehere, S. en Hersh, E. (2012) “Validation: What
Big Data Reveal About Survey Misreporting and the Real Electorate”, Political Analysis.
PDF |
OpenToAll |
Register to attend
|
18 January |
Akshay Goindani, IIITH |
Lintott, C. J. et al. (09 2008) “Galaxy Zoo:
morphologies derived from visual inspection of galaxies from the Sloan Digital Sky Survey*”,
Monthly Notices of the Royal Astronomical Society, 389(3), bll 1179–1189. doi:
10.1111/j.1365-2966.2008.13689.x.
PDF
|
25 January |
Ritwik Mishra IIITD |
Benoit, K., Conway, D., Lauderdale, B.E., Laver, M., &
Jankin, S.M. (2016). Crowd-sourced Text Analysis: Reproducible and Agile Production of Political
Data. American Political Science Review, 110, 278 - 295.
PDF
|
8 February |
Jivitesh Jain, IIITH |
Kelling, S., Fink, D., La Sorte, F.A. et al. Taking a
‘Big Data’ approach to data quality in a citizen science project. Ambio 44, 601–611 (2015).
https://doi.org/10.1007/s13280-015-0710-4
PDF
|
15 February |
Mehul Mathur & Pooja Desur, IIITH |
Burnett, S. en Feamster, N. (2015a) “Encore:
Lightweight Measurement of Web Censorship with Cross-Origin Requests”, SIGCOMM Comput. Commun.
Rev. New York, NY, USA: Association for Computing Machinery, 45(4), bll 653–667. doi:
10.1145/2829988.2787485.
PDF |
OpenToAll
|
22 February |
Vibhu Agrawal, IIITD |
Jonas, E. en Kording, K. P. (01 2017) “Could a
Neuroscientist Understand a Microprocessor?”, PLOS Computational Biology. Public Library of
Science, 13(1), bll 1–24. doi: 10.1371/journal.pcbi.1005268.
PDF
|
8 March |
Ashwin Singh, IIITH |
Garimella, A. et al. (2021) “He is very intelligent,
she is very beautiful? On Mitigating Social Biases in Language Modelling and Generation”, in
Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021. Online: Association
for Computational Linguistics, bll 4534–4545. doi: 10.18653/v1/2021.findings-acl.397.
PDF
|
15 March |
Ayushi Jain, IIITD |
Leskovec, J., Huttenlocher, D. en Kleinberg, J. (2010)
“Predicting Positive and Negative Links in Online Social Networks”, in Proceedings of the 19th
International Conference on World Wide Web. New York, NY, USA: Association for Computing
Machinery (WWW ’10), bll 641–650. doi: 10.1145/1772690.1772756.
PDF |
OpenToAll
|
22 March |
TBD |
TBD
|
5 April |
TBD |
TBD
|
12 April |
TBD |
TBD
OpenToAll
|
Fall 2021 Schedule
When: 1715 to 1815 hrs IST, Tuesdays
Date |
Moderator |
Publication / Paper |
17 August |
Nidhi Goyal, IIITD |
Mislove, A., Viswanath, B., Gummadi, K. P., &
Druschel, P. (2010, February). You are who you know: inferring user profiles in online social
networks. In Proceedings of the third ACM international conference on Web search and data mining
(pp. 251-260).
PDF
|
24 August |
Kumari Neha, IIITD |
Leskovec, J., Backstrom, L. and Kleinberg, J., 2009,
June. Meme-tracking and the dynamics of the news cycle. In Proceedings of the 15th ACM SIGKDD
international conference on Knowledge discovery and data mining (pp. 497-506).
PDF |
OpenToAll
|
31 August |
Aditya Kadam & Anmol Agarwal, IIITH |
Cho, Eunjoon & Myers, Seth & Leskovec, Jure. (2011).
Friendship and Mobility: User Movement In Location-Based Social Networks. Proceedings of the ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining. 1082-1090.
10.1145/2020408.2020579.
PDF
|
14 September |
Anmol Goel, IIIT H |
Faloutsos, M., Faloutsos, P. and Faloutsos, C., 2011.
On power-law relationships of the internet topology. In The Structure and Dynamics of Networks
(pp. 195-206). Princeton University Press.
PDF |
OpenToAll
|
21 September |
Shivangi Singhal, IIITD |
R. Girshick, J. Donahue, T. Darrell and J. Malik,
"Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation," 2014 IEEE
Conference on Computer Vision and Pattern Recognition, 2014, pp. 580-587, doi:
10.1109/CVPR.2014.81.
PDF
|
28 September |
Ashwin Singh, IIITH |
Gross, R., Acquisti, A. & Heinz, H.J., 2005.
Information revelation and privacy in online social networks. Proceedings of the 2005 ACM
workshop on Privacy in the electronic society - WPES '05.
PDF |
OpenToAll
|
5 October |
Hitkul Jangra, IIITD |
Cranshaw, J., Schwartz, R., Hong, J. and Sadeh, N.,
2012, May. The livehoods project: Utilizing social media to understand the dynamics of a city.
In Proceedings of the International AAAI Conference on Web and Social Media (Vol. 6, No. 1).
PDF
|
12 October |
Mehul Mathur & Pulak Malhotra, IIITH |
I/S: A Journal of Law and Policy for the Information
Society, vol. 4, no. 3 (2008), 543-568.
PDF |
OpenToAll
|
26 October |
Shashwat Goel, IIITH |
Dwork C. (2006) Differential Privacy. In: Bugliesi M.,
Preneel B., Sassone V., Wegener I. (eds) Automata, Languages and Programming. ICALP 2006.
Lecture Notes in Computer Science, vol 4052. Springer, Berlin, Heidelberg.
https://doi.org/10.1007/11787006_1
PDF
|
2 November |
Arvindh, IIITH |
Adamic, L. and Adar, E., 2003. Friends and neighbors
on the Web. Social Networks, 25(3), pp.211-230.
PDF |
OpenToAll
|
9 November |
Jushaan Singh Kalra, NSUT |
Shan, S., Wenger, E., Zhang, J., Li, H., Zheng, H. and
Zhao, B.Y., 2020. Fawkes: Protecting privacy against unauthorized deep learning models. In 29th
{USENIX} Security Symposium ({USENIX} Security 20) (pp. 1589-1604).
PDF
|
16 Nov 2021 |
Ritwik Mishra, IIITH |
Bender, E.M., Gebru, T., McMillan-Major, A. and
Shmitchell, S., 2021, March. On the Dangers of Stochastic Parrots: Can Language Models Be Too
Big?🦜. In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency
(pp. 610-623).
PDF |
OpenToAll |
Register to attend
|
Summer 2021 Schedule
When: 1715 to 1815 hrs IST, Tuesdays
Date |
Moderator |
Publication / Paper |
4 May |
Nidhi Goyal, IIITD |
Xu, D. et al. (2020) “Product knowledge graph
embedding for E-commerce,” in Proceedings of the 13th International Conference on Web Search and
Data Mining. New York, NY, USA: ACM.
PDF
|
11 May |
Prashant Kodali, IIITH |
Turing, A. M. (1950) “I.—computing machinery and
intelligence,” Mind; a quarterly review of psychology and philosophy, LIX(236), pp. 433–460.
PDF |
OpenToAll
|
18 May |
Vibhu Aggarwal, IIITD |
Marwick, A. E. and Boyd, D. (2011) “I tweet honestly,
I tweet passionately: Twitter users, context collapse, and the imagined audience,” New media &
society, 13(1), pp. 114–133.
PDF
|
25 May |
Shashwat Goel. IIIT H |
Meurisch, C. and Mühlhäuser, M. (2021) “Data
protection in AI services: A survey,” ACM computing surveys, 54(2), pp. 1–38.
PDF |
OpenToAll
|
1 June |
Rupanshu Yadav, IIITD |
Alharbi, A. et al. (2021) “Social media identity
deception detection: A survey,” ACM computing surveys, 54(3), pp. 1–35.
PDF
|
8 June |
Rishi Raj Jain, IIITD |
Granovetter, M. S. (1977) “The strength of weak ties,”
in Social Networks. Elsevier, pp. 347–367.
PDF
|
15 June |
Pulak Malhotra, IIITH |
Das, N. et al. (2018) “SHIELD: Fast, practical defense
and vaccination for deep learning using JPEG compression,” in Proceedings of the 24th ACM SIGKDD
International Conference on Knowledge Discovery & Data Mining. New York, NY, USA: ACM.
PDF |
OpenToAll
|
22 June |
TH Arjun, IIITH |
Silva, L., Mondal, M., Correa, D., Benevenuto, F. and
Weber, I. (2016) “Analyzing the Targets of Hate in Online Social Media”, Proceedings of the
International AAAI Conference on Web and Social Media, 10(1).
PDF |
OpenToAll
|
29 June |
Jivitesh Jain, IIITH |
Cha, M. et al. (2007). "I tube, you tube, everybody
tubes: analyzing the world's largest user generated content video system." Proceedings of the
7th ACM SIGCOMM conference on Internet measurement - IMC '07. New York, New York, USA: ACM
Press, pp. 1-14.
PDF
|
6 July |
Shradha Sehgal, IIITH |
Mosleh, M., Pennycook, G., Arechar, A. A., & Rand, D.
G. (2021). Cognitive reflection correlates with behavior on Twitter. Nature Communications,
12(1), 921.
PDF |
OpenToAll |
Register to attend
|
13 July |
Shivangi Singhal, IIITD |
De Choudhury, M., Gamon, M., Counts, S. and Horvitz,
E. (2013) “Predicting Depression via Social Media”, Proceedings of the International AAAI
Conference on Web and Social Media, 7(1).
PDF
|
20 July |
Tanvi Karandikar, IIITH |
Mota, N. et al. (2020) “On the desiderata for online
altruism: Nudging for equitable donations,” Proceedings of the ACM on human-computer
interaction, 4(CSCW2), pp. 1–21.
PDF |
OpenToAll
|
27 July |
Mallika Subramanian, IIITH |
Yang, K.-C., Varol, O., Hui, P.-M. and Menczer, F.
(2020) “Scalable and Generalizable Social Bot Detection through Data Selection”, Proceedings of
the AAAI Conference on Artificial Intelligence, 34(01), pp. 1096-1103.
PDF
|
Spring 2021 Schedule
When: 1715 to 1815 hrs IST, Tuesdays
Date |
Moderator |
Publication / Paper |
4 January |
Akhila, NIT Calicut |
Liu, N. et al. (2019) “Is a single vector enough?:
Exploring node polysemy for network embedding,” in Proceedings of the 25th ACM SIGKDD
International Conference on Knowledge Discovery & Data Mining - KDD ’19. New York, New York,
USA: ACM Press.
PDF |
OpenToAll
|
19 January |
Amandeep Kaur & Srinidhi Ayyagari, IGDTUW |
Ziems, C., Vigfusson, Y. and Morstatter, F. (2020)
“Aggressive, Repetitive, Intentional, Visible, and Imbalanced: Refining Representations for
Cyberbullying Classification”, Proceedings of the International AAAI Conference on Web and
Social Media, 14(1), pp. 808-819.
PDF |
OpenToAll
|
2 February |
Hitkul Jangra, IIITD |
Lu, J. et al. (2019) “Investigate transitions into
drug addiction through text mining of reddit data,” in Proceedings of the 25th ACM SIGKDD
International Conference on Knowledge Discovery & Data Mining - KDD ’19. New York, New York,
USA: ACM Press.
PDF |
OpenToAll
|
9 February |
Ritwik Mishra, IIITD |
Rogers, A., Kovaleva, O. and Rumshisky, A. (2020) “A
primer in BERTology: What we know about how BERT works,” Transactions of the Association for
Computational Linguistics, 8, pp. 842–866.
PDF
|
16 February |
Mohit Chandra, IIITH |
Papadimitriou, I. and Jurafsky, D. (2020) “Learning
music helps you read: Using transfer to study linguistic structure in language models,” in
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP).
Stroudsburg, PA, USA: Association for Computational Linguistics.
PDF |
OpenToAll
|
23 February |
Anmol Goel, GGSIPU |
Pimentel, T. et al. (2020) “Speakers fill lexical
semantic gaps with context,” in Proceedings of the 2020 Conference on Empirical Methods in
Natural Language Processing (EMNLP). Stroudsburg, PA, USA: Association for Computational
Linguistics.
PDF
|
2 March |
Avinash Tulasi, IIITD |
Almerekhi, H. et al. (2020) “Are these comments
triggering? Predicting triggers of toxicity in online discussions,” in Proceedings of The Web
Conference 2020. New York, NY, USA: ACM.
PDF |
OpenToAll
|
16 March |
Shivangi Singhal, IIITD |
Panda, A. et al. (2020) “Topical Focus of Political
Campaigns and its Impact: Findings from Politicians’ Hashtag Use during the 2019 Indian
Elections,” Proceedings of the ACM on human-computer interaction, 4(CSCW1), pp. 1–14.
PDF |
OpenToAll
|
23 March |
Pragya Sethi, IIITD |
Huang, X. et al. (2019) “Knowledge graph embedding
based question answering,” in Proceedings of the Twelfth ACM International Conference on Web
Search and Data Mining - WSDM ’19. New York, New York, USA: ACM Press.
PDF
|
30 March |
Omkar Gurjar, IIITH |
Agarwal, P., Garimella, K., Joglekar, S., Sastry, N.
and Tyson, G. (2020) “Characterising User Content on a Multi-Lingual Social Network”,
Proceedings of the International AAAI Conference on Web and Social Media, 14(1), pp. 2-11.
PDF |
OpenToAll
|
6 April |
Arnav Kapoor, IIITH |
Mathew, B., Saha, P., Tharad, H., Rajgaria, S.,
Singhania, P., Maity, S. K., Goyal, P. and Mukherjee, A. (2019) “Thou Shalt Not Hate: Countering
Online Hate Speech”, Proceedings of the International AAAI Conference on Web and Social Media,
13(01), pp. 369-380.
PDF
|
13 April |
Shivangi Singhal, IIITD |
Sims, M. and Bamman, D. (2020) “Measuring information
propagation in literary social networks,” in Proceedings of the 2020 Conference on Empirical
Methods in Natural Language Processing (EMNLP). Stroudsburg, PA, USA: Association for
Computational Linguistics, pp. 642–652.
PDF |
OpenToAll
|
Fall 2020 Schedule
When: 1530 to 1630 hrs IST, Mondays
Date |
Moderator |
Publication / Paper |
28 September |
Neha |
Janith Weerasinghe, et al. “The Pod People: Understanding Manipulation of Social
Media Popularity via Reciprocity Abuse”, In Proceedings of The Web Conference 2020 (WWW '20).
Association for Computing Machinery, New York, NY, USA, 1874–1884.
PDF
|
5 October |
Avinash |
Aditya Pal, et al. "PinnerSage: Multi-Modal User Embedding Framework for
Recommendations at Pinterest", In Proceedings of the 26th ACM SIGKDD International Conference on
Knowledge Discovery & Data Mining, 2020.
PDF
|
12 October |
Prashant |
Kashyap Popat, et al. "STANCY: Stance Classification Based on Consistency Cues", In
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the
9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP).
PDF
|
19 October |
Saurabh |
Cristian-Alexandru Staicu, et al. “Leaky Images: Targeted Privacy Attacks in the
Web”, In Usenix Security, pp. 923–39. 2019.
PDF
|
26 October |
Prof. PK |
Lia Bozarth, et al. "Higher Ground? How Groundtruth Labeling Impacts Our
Understanding of Fake News About the 2016 US Presidential Nominees", In Proceedings of the
International AAAI Conference on Web and Social Media (Vol. 14, pp. 48-59) (2020, May).
PDF |
OpenToAll |
Register to attend
|
2 November |
Ritwik |
Divyanshu Kakwani, et al. "IndicNLPSuite: Monolingual Corpora, Evaluation
Benchmarks and Pre-trained Multilingual Language Models for Indian Languages", Findings of
EMNLP, 2020.
PDF
|
9 November |
Hitkul |
Justin Cheng, et al. "How Community Feedback Shapes User Behavior", In Proceedings
of the 8th International Conference on Weblogs and Social Media, ICWSM 2014.
PDF |
OpenToAll |
Register to attend
|
23 November |
Shivangi |
Shan Jiang, et al. "Factoring Fact-Checks: Structured Information Extraction from
Fact-Checking Articles", In Proceedings of The Web Conference 2020 (WWW '20). Association for
Computing Machinery, New York, NY, USA, pp. 1592–1603.
PDF |
OpenToAll |
Register to attend
|
30 November |
Nidhi |
Xunxian Wu, et al. "Trend-Aware Tensor Factorization for Job Skill Demand
Analysis", In International Joint Conferences on Artificial Intelligence (IJCAI), pp. 3891-3897.
2019.
PDF
|
7 December |
Biswesh Mohapatra, IIIT BLR |
Marco Tulio Ribeiro, et al. "Beyond Accuracy: Behavioral Testing of NLP models with
CheckList", In Proceedings of the 58th Annual Meeting of the Association for Computational
Linguistics, 2020.
PDF |
OpenToAll
|
14 December |
Anmol Goel |
Bohan Li, et al. "On the Sentence Embeddings from Pre-trained Language Models", In
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP).
PDF
|
21 December, 1715 to 1815 hrs IST |
Nishtha Ahuja, DTU |
Van-Hoang Nguyen, et al. "FANG: Leveraging Social Context for Fake News Detection
Using Graph Representation", In Proceedings of the 29th ACM International Conference on
Information & Knowledge Management (CIKM '20), October 2020, pp. 1165–1174.
PDF |
OpenToAll
|
Winter 2017
Where: Board Room, Fifth Floor, Academic Building, IIIT-D
Schedule 2017
Date |
Moderator |
Publication / Paper |
25 January |
Anupama Aggarwal |
Ribeiro, Marco Tulio, Sameer Singh, and Carlos Guestrin. "Why Should I Trust You?:
Explaining the Predictions of Any Classifier." Proceedings of the 22nd ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining. ACM, 2016. PDF
|
30 January |
Srishti Gupta |
Nicholas Jing Yuan, Yuan Zhong, Fuzheng Zhang, Xing Xie, Chin-Yew Lin, and Yong Rui. 2016. Who
Will Reply to/Retweet This Tweet?: The Dynamics of Intimacy from Online Social Interactions. In
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining (WSDM '16).
ACM, New York, NY, USA. ACM
download link
|
16 February |
TBD |
Ma, Jing, et al. "Detecting rumors from microblogs with recurrent neural networks." Proceedings
of IJCAI. 2016.
PDF
|
March 2 |
TBD |
Bian, Jiang, et al. "Learning to recognize reliable users and content in social media with
coupled mutual reinforcement." Proceedings of the 18th international conference on World wide
web. ACM, 2009.
PDF
|
Monsoon 2016
Where: Board Room, Fifth Floor, Academic Building, IIIT-D
When: 1300 to 1430 hrs IST, Tuesdays
Schedule 2016
Date |
Moderator |
Publication / Paper |
23 August |
Srishti Chandok & Mansi Goel |
Zheleva, E., & Getoor., L.To join or not to join: the illusion of privacy in
social networks with mixed public and private user profiles, WWW, 2009
PDF
|
30 August |
Indira Sen & Kushagra Singh |
Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., &Chang, Y.Abusive Language
Detection in Online User Content, WWW, 2016
PDF
|
6 September |
Ayush Shah |
Cao, Q., Sirivianos, M., Yang, X., & Pregueiro, T.Aiding the Detection of Fake
Accounts in Large Scale Social Online Service, NSDI, 2012
PDF
|
13 September |
Vrinda Malhotra & Amod Agrawal |
Doerr, B., Fouz, M., & Friedrich, T.Why Rumors Spread Fast in Social
Networks, CACM, 2012
PDF
|
18 October |
Shrey Bagroy |
Choudhury, M., Jhaver, S., Sugar, B., & Weber, I.Social Media Participation in
an Activist Movement for Racial Equality, ICWSM, 2016
PDF
|
Summer 2016
Where: A Wing, Fourth Floor, Academic Building, IIIT-D
When: 1630 to 1800hrs IST, Fridays
Schedule 2016
Date |
Moderator |
Publication / Paper |
03 June |
Anupama Aggrawal |
Jessica Su, Aneesh Sharma & Sharad Goel,The Effect of Recommendations on
Network Structure, WWW, 2016
PDF
|
10 June |
Varun Bharadhwaj |
Quanzeng You, Jiebo Luo, Hailin Jin & Jianchao Yang, Robust Image Sentiment
Analysis Using Progressively Trained and Domain Transferred Deep Networks , 2015
PDF
|
17 June |
Srishti Bhargava |
Takaaki Hasegawa, Satoshi Sekine and Ralph Grishman, Discovering Relations
among Named Entities from Large Corpora , ACL, 2004
PDF
|
24 June |
Divam Gupta |
C´ıcero Nogueira dos Santos & Maira Gatti, Deep Convolutional Neural Networks
for Sentiment Analysis of Short Texts, COLING, 2015
PDF
|
1 July |
Bhavna Nagpal |
Jamie Mahoney, Tom Feltwell, Obinna Ajuruchi & Shaun Lawson, Constructing the
Visual Online Political Self: An Analysis of Instagram Use by the Scottish Electorate,
CHI, 2016
PDF
|
8 July |
Anshuman Suri |
Kurt Thomas, Frank Li, Chris Grier & Vern Paxson, Consequences of Connectivity:
Characterizing Account Hijacking on Twitter, CCS, 2014
PDF
|
Winter 2014
Where: A Wing, Fourth Floor, Research Building, IIIT-D
When: 12:30 to 13:30 IST, Tuesday
Schedule 2014
Date |
Moderator |
Publication / Paper |
04 Feb |
Aditi |
Morstatter, F., Pfeffer, J., Liu, H., & Carley, K. M. (2013). Is the sample good
enough? Comparing data from Twitter's streaming API with Twitter's firehose. Proceedings of
ICWSM.
PDF
|
11 Feb
| Sudip
| Abisheva, A., Garimella, V. R. K., Garcia, D., & Weber, I. (2013). Who Watches
(and Shares) What on YouTube? And When? Using Twitter to Understand YouTube Viewership. arXiv
preprint arXiv:1312.4511.
PDF
|
25 Feb
| Abhishek
| Cohen, R., & Ruths, D. (2013, June). Classifying Political Orientation on Twitter:
It's Not Easy!. In Proceedings of the 7th International Conference on Weblogs and Social Media.
PDF
|
04 Mar
| Anupama
| Ribeiro, B. Modeling and Predicting the Growth and Death of Membership-based
Websites. WWW 2014. PDF
|
11 Mar
| Niharika
| Grevet, C., Terveen, L., & Gilbert, E. Managing Political Differences in Social
Media. CSCW 2014.
PDF
|
18 Mar
| Neha
| Nikiforakis, N., Maggi, F., Stringhini, G., Rafique, M. Z., Joosen, W., Kruegel,
C., ... & Zanero, S. Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening
Services. WWW 2014.
PDF
|
25 Mar
| Srishti
| User Profiling in an Ego Network: Co-profiling Attributes and Relationships. R.
Li, C. Wang, and K. C.-C. Chang. In WWW, 2014.
PDF
|
01 Apr
| Paridhi
| Yuan, N. J., Zhang, F., Lian, D., Zheng, K., Yu, S., & Xie, X. (2013, October). We
know how you live: exploring the spectrum of urban lifestyles. In Proceedings of the first ACM
conference on Online social networks (pp. 3-14). ACM.
PDF
|
08 Apr
| Mayank
| TBD
|
15 Apr
| Hemank
| TBD
|
22 Apr
| TBD
| TBD
|
29 Apr
| TBD
| TBD
|
Monsoon 2013
Where: A Wing, Fourth Floor, Research Building, IIIT-D
When: 15:30 to 16:30 IST, Wednesday
Schedule 2013
Date |
Moderator |
Publication / Paper |
21 Aug |
Aditi |
Denef, S., Bayerl, P. S., & Kaptein, N. A. (2013, April). Social media and the
police: tweeting practices of british police forces during the August 2011 riots. In Proceedings
of the SIGCHI Conference on Human Factors in Computing Systems (pp. 3471-3480). ACM.
PDF
|
27 Aug
| Anupama
| Akhawe, D., & Felt, A. P. Alice in Warningland: A Large-Scale Field Study of
Browser Security Warning Effectiveness.
PDF
|
4 Sept
| Neha
| Amleshwaram, A. A., Reddy, N., Yadav, S., Gu, G., & Yang, C. (2013, January). CATS:
Characterizing automation of Twitter spammers. In Communication Systems and Networks (COMSNETS),
2013 Fifth International Conference on (pp. 1-10). IEEE.
PDF
|
11 Sept
| Abhishek
| Patil, A., Liu, J., & Gao, J. (2013, May). Predicting group stability in online
social networks. In Proceedings of the 22nd international conference on World Wide Web (pp.
1021-1030). International World Wide Web Conferences Steering Committee. PDF
|
18 Sept
| Niharika
| Jung, Y., Gray, R., Lampe, C., & Ellison, N. (2013, April). Favors from facebook
friends: unpacking dimensions of social capital. In Proceedings of the SIGCHI Conference on
Human Factors in Computing Systems (pp. 11-20). ACM.
PDF
|
25 Sept
| Paridhi
| Zafarani, R., & Liu, H. Connecting Users across Social Media Sites: A
Behavioral-Modeling Approach.
PDF
|
2 Oct
| Megha
| Schulz, A., Hadjakos, A., Paulheim, H., Nachtwey, J., & Muhlhäuser, M. (2013,
June). A Multi-Indicator Approach for Geolocalization of Tweets. In Seventh International AAAI
Conference on Weblogs and Social Media. PDF
|
TBD
| Prateek
| Cohen, R., & Ruths, D. (2013, June). Classifying Political Orientation on Twitter:
It’s Not Easy!. In Seventh International AAAI Conference on Weblogs and Social Media.
PDF
|
TBD
| Prachi
| Morstatter, F., Pfeffer, J., Liu, H., & Carley, K. M. (2013). Is the sample good
enough? comparing data from twitter’s streaming api with twitter’s firehose. Proceedings of
ICWSM.
PDF
|
TBD
| Hemank
| Anderson, A., Huttenlocher, D., Kleinberg, J., & Leskovec, J. (2013, May). Steering
user behavior with badges. In Proceedings of the 22nd international conference on World Wide Web
(pp. 95-106). International World Wide Web Conferences Steering Committee. PDF
|
TBD
| PK
| Wang, G., Gill, K., Mohanlal, M., Zheng, H., & Zhao, B. Y. (2013, May). Wisdom in
the social crowd: an analysis of quora. In Proceedings of the 22nd international conference on
World Wide Web (pp. 1341-1352). International World Wide Web Conferences Steering Committee.
PDF
|
TBD
| Shristi
| Lee, K., Tamilarasan, P., & Caverlee, J. (2013). Crowdturfers, Campaigns, and
Social Media: Tracking and Revealing Crowdsourced Manipulation of Social Media. PDF
|
TBD
| Sudip
| Thomas, K., Grier, C., Song, D., & Paxson, V. (2011, November). Suspended accounts
in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on
Internet measurement conference (pp. 243-258). ACM.PDF
|
TBD
| Soumya
| Huang, T. K., Rahman, M. S., Madhyastha, H. V., & Faloutsos, M. (2013, May). An
analysis of socware cascades in online social networks. In Proceedings of the 22nd international
conference on World Wide Web (pp. 619-630). International World Wide Web Conferences Steering
Committee.
PDF
|
Spring 2013
Where: A Wing, Fourth Floor, Research Building, IIIT-D
When: 12:00 - 13:00 IST, Monday
Schedule 2013
Date |
Moderator |
Publication / Paper |
10 Jan |
Anupama |
Chao Yang,Robert Harkreader,Jialong Zhang,Seungwon Shin, Guofei Gu, Analyzing
Spammer's Social Networks for Fun and Profit. WWW'12.
PDF
|
14 Jan
| Paridhi
| Mohamed Shehab, Mohamed Ali Kaafar, Arik Friedman, Roksana Boreli, Is more always
merrier?: a deep dive into online social footprints. WOSN '12.
PDF
|
21 Jan
| Niharika
| Jialiu Lin,Shahriyar Amini,Jason I. Hong,Norman Sadeh,Janne Lindqvist,Joy Zhang
,Understanding Users' Mental Models of Mobile App Privacy through Crowdsourcing. In Proceedings
of the 14th ACM International Conference on
Ubiquitous Computing, Sep 2012.
PDF
|
28 Jan
| Srishti
| Eytan Bakshy,Itamar Rosenn,Cameron Marlow,Lada Adamic, The Role of Social Networks
in Information Diffusion. WWW'12
PDF
|
04 Feb
| Prachi
| Farshad Kooti, Winter A. Mason, Krishna P. Gummadi, and Meeyoung Cha., Predicting
Emerging Social Conventions in Online Social Networks. Proceedings of the 21st International
Conference on Information and Knowledge Management (CIKM'12), Hawaii, USA 2012.
PDF
|
18 Feb
| Sudip
| Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, and
Stefan Savage, Taster's Choice: A Comparative Analysis of Spam Feeds. IMC'12 PDF
|
04 March
| Neha
| Ratan Dey , Cong Tang , Keith Ross, Nitesh Saxena, Estimating Age Privacy Leakage
in Online Social Networks. International Conference on Computer Communications (IEEE INFOCOM)
PDF
|
11 March
| Sumit
| G. Magno, G. Comarela, D. Trumper, M. Cha, and V. Almeida. New Kid on the Block:
Exploring the Google+ Social Graph.In Proc IMC'2012 PDF
|
18 March
| Nikita
| Ceren Budak, Rakesh Agrawal, On Participation in Group Chats on Twitter. To Appear
at Proceedings of the 22nd international conference on World Wide Web, 2013 (WWW'13) PDF
|
8 April
| Vani
| Gabriela Marcu, Anind K. Dey, Sara Kiesler, Parent-driven use of wearable cameras
for autism support: a field study with families. Ubicomp'12PDF
|
15 April
| PK
| Saptarshi Ghosh, Naveen Sharma, Fabricio Benevenuto, Niloy Ganguly, and Krishna
Gummadi, Cognos: Crowdsourcing Search for Topic Experts in Microblogs. In Proceedings of the
Annual Int'l SIGIR Conference (SIGIR'12)
PDF
|
22 April
| Prateek
| Gonzalez, Roberto, et al. Google+ or google-?. dissecting the evolution of the new
osn in its first year. WWW'13 PDF
|
Fall 2012
Where: A Wing, Fourth Floor, Research Building, IIIT-D
When: 12.30 - 13.30 IST, Wednesdays
Schedule 2012
Date |
Moderator |
Publication / Paper |
22 Aug |
Niharika |
Y. Xu, G. Reynaga, S. Chiasson, J.M Frahm, F. Monrose, P.C. van Oorchot, Security
and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion, USENIX
Security, 2012. PDF |
5 Sept |
Anupama |
J. Cranshaw, R. Schwartz, J. Hong, N. Sadeh, The Livehoods Project: Utilizing
Social Media to Understand the Dynamics of City, in Proc. of the 6th International AAAI
Conference on Weblogs and Social Media, ICWSM, 2012. PDF
|
12 Sept |
Paridhi |
A. Narayanan and V. Shmatiko, De-annonymizing Social Networks, Oakland, 2009. PDF |
19 Sept |
Srishti |
I. Martinovic‚ D. Davies‚ M. Frank‚ D. Perito‚ T. Ros and D. Song, On the
Feasibility of Side-Channel Attacks with Brain-Computer Interfaces, USENIX Security, 2012.
PDF
|
26 Sept |
Aditi |
Eduardo J. Ruiz, Vagelis Hristidis, Carlos Castillo, Aristides Gionis, and
Alejandro Jaimes. 2012. Correlating financial time series with micro-blogging activity. In
Proceedings of the fifth ACM international conference on Web search and data mining (WSDM
'12). PDF |
3 Oct |
Prachi |
C. Wagner , V. Liaoy, P. Pirolliz, L. Nelsonz and M. Strohmaier, It’s not in their
tweets: Modeling topical expertise of Twitter users, SocialCom, 2012. PDF |
10 Oct |
Tatiana |
C. Davis Jr., G. Pappa, D. Oliveira, and F. Arcanjo, Inferring the Location of
Twitter Messages Based on User Relationships. Transactions in GIS, 15(6):735–751, 2011. PDF |
26 Oct |
PK |
V. Dave, S. Guha, Y. Zhang, Measuring and Fingerprinting Click-Spam in Ad
Networks. SIGCOMM, 2012. PDF |
2 Nov |
Neha |
M Srivatsa, M Hicks, Deanonymizing Mobility Traces: Using Social Networks as a
Side-Channel. CCS 2012 PDF |
9 Nov |
Vani |
M. Sato, I. Poupyrev, C. Harrison, Touché: Enhancing Touch Interaction on Humans,
Screens, Liquids, and Everyday Objects. CHI 2012.
PDF |
For any feedback / suggestions, please write to
pk[at]iiitd[dot]ac[dot]in.
|