The pod people: Understanding manipulation of social media popularity via reciprocity abuse J Weerasinghe, B Flanigan, A Stein, D McCoy, R Greenstadt Proceedings of The Web Conference 2020, 1874-1884, 2020 | 27 | 2020 |
Feature vector difference based neural network and logistic regression models for authorship verification J Weerasinghe, R Greenstadt CEUR workshop proceedings 2695, 2020 | 23 | 2020 |
“Because... I was told... so much”: linguistic indicators of mental health status on Twitter J Weerasinghe, K Morales, R Greenstadt Proceedings on Privacy Enhancing Technologies, 2019 | 21 | 2019 |
Feature Vector Difference based Authorship Verification for Open-World Settings. J Weerasinghe, R Singh, R Greenstadt CLEF (Working Notes), 2201-2207, 2021 | 18 | 2021 |
Building helpful virtual agents using plan recognition and planning C Geib, J Weerasinghe, S Matskevich, P Kantharaju, B Craenen, ... Proceedings of the AAAI Conference on Artificial Intelligence and …, 2016 | 17 | 2016 |
Writing Style Change Detection on Multi-Author Documents. R Singh, J Weerasinghe, R Greenstadt CLEF (Working Notes), 2137-2145, 2021 | 13 | 2021 |
News article text classification and summary for authors and topics AJ Stein, J Weerasinghe, S Mancoridis, R Greenstadt Computer Science and Information Technology 10 (14), 2020 | 6 | 2020 |
Analyzing machine learning models that predict mental illnesses from social media text J Weerasinghe, K Morales, R Greenstadt 11th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2018 …, 2018 | 3 | 2018 |
Using Authorship Verification to Mitigate Abuse in Online Communities J Weerasinghe, R Singh, R Greenstadt Proceedings of the International AAAI Conference on Web and Social Media 16 …, 2022 | 2 | 2022 |
Planning using combinatory categorial grammars C Geib, J Weerasinghe HPlan 2020, 18, 2020 | 1 | 2020 |
Using Stylometry to Mitigate Abuse in Online Communities J Weerasinghe New York University Tandon School of Engineering, 2022 | | 2022 |
Exploring How Social Media Content Feeds Are Manipulated J Weerasinghe, C Gill, J Richards, D McCoy, R Greenstadt USENIX Security'18, 2018 | | 2018 |
Machine learning for understanding the contextual semantics of tabular web sources J Weerasinghe, S Weerasinghe, A Panditha, V Weerasinghe 2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013 | | 2013 |