Skip to content

Commit

Permalink
Added Emily's reading for tmr.
Browse files Browse the repository at this point in the history
  • Loading branch information
andrei-rizoiu committed Jul 9, 2024
1 parent 5c68fea commit a0444be
Showing 1 changed file with 11 additions and 11 deletions.
22 changes: 11 additions & 11 deletions content/reading/reading_group_schedule.csv
Original file line number Diff line number Diff line change
Expand Up @@ -11,15 +11,15 @@ Date,Presenter,Paper,Why should we care,Appear in,Repo,Blogs
29/05/24,--,Research showcase dry run,,,,
12/06/24,[Lin Tian](../authors/lin-tian/),Adaptable Transfer Learning Models for Online Misinformation Detection,Summary of Lin’s PhD work.,,,
26/06/24,[Elaine Gong](../authors/xian-gong/),[Demystifying embedding spaces using large language models](https://arxiv.org/pdf/2310.04475),This paper introduces a novel framework to interpret and interact embedding vectors by leveraging the power of LLMs.,ICLR 2024,,
10/07/24,[Frankie Yuan](../authors/lanqin-yuan/),,,,,
10/07/24,[Emily Booth](../authors/emily-booth/),[SoK: A Framework for Unifying At-Risk User Research](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9833643),"Paper linked during the [Google Trust and Safety Awards](https://research.google/programs-and-events/trust-safety-research/) information session and strongly suggested everyone read. They really liked how it understood ‘at risk’ users, and also the human and technical considerations it made.",[IEEE Symposium on Security and Privacy’22](https://ieeexplore.ieee.org/document/9833643),,
24/07/24,[Marian-Andrei Rizoiu](../authors/ma-rizoiu/),Dry run of the CMT II Keynote presentation.,The dry-run will happen in the [UTS Data Arena facility](https:/dataarena.net/) – a 360° data visualisation facility designed for collaborative experiences.,CMT Information Integrity Forum,,
07/08/24,[Jooyoung Lee](../authors/jooyoung-lee/),,,,,
21/08/24,[Lin Tian](../authors/lin-tian/),,,,,
04/09/24,[Marian-Andrei Rizoiu](../authors/ma-rizoiu/),[Unmasking the Web of Deceit: Uncovering Coordinated Activity to Expose Information Operations on Twitter](https://arxiv.org/pdf/2310.09884),This paper delves into the detection of key players driving IOs by employing similarity graphs constructed from behavioral pattern data.,[WWW’24](https://dl.acm.org/doi/10.1145/3589334.3645529),,
18/09/24,[Elaine Gong](../authors/xian-gong/),,,,,
02/10/24,[Pio Calderon](../authors/pio-calderon/),,,,,
16/10/24,[Frankie Yuan](../authors/lanqin-yuan/),,,,,
30/10/24,[Jooyoung Lee](../authors/jooyoung-lee/),,,,,
13/11/24,[Lin Tian](../authors/lin-tian/),,,,,
27/11/24,[Elaine Gong](../authors/xian-gong/),,,,,
11/12/24,[Marian-Andrei Rizoiu](../authors/ma-rizoiu/),,,,,
07/08/24,[Frankie Yuan](../authors/lanqin-yuan/),,,,,
21/08/24,[Jooyoung Lee](../authors/jooyoung-lee/),,,,,
04/09/24,[Lin Tian](../authors/lin-tian/),,,,,
18/09/24,[Marian-Andrei Rizoiu](../authors/ma-rizoiu/),[Unmasking the Web of Deceit: Uncovering Coordinated Activity to Expose Information Operations on Twitter](https://arxiv.org/pdf/2310.09884),This paper delves into the detection of key players driving IOs by employing similarity graphs constructed from behavioral pattern data.,[WWW’24](https://dl.acm.org/doi/10.1145/3589334.3645529),,
02/10/24,[Elaine Gong](../authors/xian-gong/),,,,,
16/10/24,[Pio Calderon](../authors/pio-calderon/),,,,,
30/10/24,[Frankie Yuan](../authors/lanqin-yuan/),,,,,
13/11/24,[Jooyoung Lee](../authors/jooyoung-lee/),,,,,
27/11/24,[Lin Tian](../authors/lin-tian/),,,,,
11/12/24,[Elaine Gong](../authors/xian-gong/),,,,,

0 comments on commit a0444be

Please sign in to comment.