From a0444be35283065e342b61e8b9132c0fa3d3c1f3 Mon Sep 17 00:00:00 2001 From: "Marian-Andrei RIZOIU (poseidon)" Date: Tue, 9 Jul 2024 10:39:44 +1000 Subject: [PATCH] Added Emily's reading for tmr. --- content/reading/reading_group_schedule.csv | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/content/reading/reading_group_schedule.csv b/content/reading/reading_group_schedule.csv index a086da2b..179b4c2a 100644 --- a/content/reading/reading_group_schedule.csv +++ b/content/reading/reading_group_schedule.csv @@ -11,15 +11,15 @@ Date,Presenter,Paper,Why should we care,Appear in,Repo,Blogs 29/05/24,--,Research showcase dry run,,,, 12/06/24,[Lin Tian](../authors/lin-tian/),Adaptable Transfer Learning Models for Online Misinformation Detection,Summary of Lin’s PhD work.,,, 26/06/24,[Elaine Gong](../authors/xian-gong/),[Demystifying embedding spaces using large language models](https://arxiv.org/pdf/2310.04475),This paper introduces a novel framework to interpret and interact embedding vectors by leveraging the power of LLMs.,ICLR 2024,, -10/07/24,[Frankie Yuan](../authors/lanqin-yuan/),,,,, +10/07/24,[Emily Booth](../authors/emily-booth/),[SoK: A Framework for Unifying At-Risk User Research](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9833643),"Paper linked during the [Google Trust and Safety Awards](https://research.google/programs-and-events/trust-safety-research/) information session and strongly suggested everyone read. They really liked how it understood ‘at risk’ users, and also the human and technical considerations it made.",[IEEE Symposium on Security and Privacy’22](https://ieeexplore.ieee.org/document/9833643),, 24/07/24,[Marian-Andrei Rizoiu](../authors/ma-rizoiu/),Dry run of the CMT II Keynote presentation.,The dry-run will happen in the [UTS Data Arena facility](https:/dataarena.net/) – a 360° data visualisation facility designed for collaborative experiences.,CMT Information Integrity Forum,, -07/08/24,[Jooyoung Lee](../authors/jooyoung-lee/),,,,, -21/08/24,[Lin Tian](../authors/lin-tian/),,,,, -04/09/24,[Marian-Andrei Rizoiu](../authors/ma-rizoiu/),[Unmasking the Web of Deceit: Uncovering Coordinated Activity to Expose Information Operations on Twitter](https://arxiv.org/pdf/2310.09884),This paper delves into the detection of key players driving IOs by employing similarity graphs constructed from behavioral pattern data.,[WWW’24](https://dl.acm.org/doi/10.1145/3589334.3645529),, -18/09/24,[Elaine Gong](../authors/xian-gong/),,,,, -02/10/24,[Pio Calderon](../authors/pio-calderon/),,,,, -16/10/24,[Frankie Yuan](../authors/lanqin-yuan/),,,,, -30/10/24,[Jooyoung Lee](../authors/jooyoung-lee/),,,,, -13/11/24,[Lin Tian](../authors/lin-tian/),,,,, -27/11/24,[Elaine Gong](../authors/xian-gong/),,,,, -11/12/24,[Marian-Andrei Rizoiu](../authors/ma-rizoiu/),,,,, +07/08/24,[Frankie Yuan](../authors/lanqin-yuan/),,,,, +21/08/24,[Jooyoung Lee](../authors/jooyoung-lee/),,,,, +04/09/24,[Lin Tian](../authors/lin-tian/),,,,, +18/09/24,[Marian-Andrei Rizoiu](../authors/ma-rizoiu/),[Unmasking the Web of Deceit: Uncovering Coordinated Activity to Expose Information Operations on Twitter](https://arxiv.org/pdf/2310.09884),This paper delves into the detection of key players driving IOs by employing similarity graphs constructed from behavioral pattern data.,[WWW’24](https://dl.acm.org/doi/10.1145/3589334.3645529),, +02/10/24,[Elaine Gong](../authors/xian-gong/),,,,, +16/10/24,[Pio Calderon](../authors/pio-calderon/),,,,, +30/10/24,[Frankie Yuan](../authors/lanqin-yuan/),,,,, +13/11/24,[Jooyoung Lee](../authors/jooyoung-lee/),,,,, +27/11/24,[Lin Tian](../authors/lin-tian/),,,,, +11/12/24,[Elaine Gong](../authors/xian-gong/),,,,,