\n \n \n
\n
\n\n \n \n \n \n \n \n Overlapping Target Event and Story Line Detection of Online Newspaper Articles.\n \n \n \n \n\n\n \n Wei, Y.; Singh, L.; Gallagher, B.; and Buttler, D.\n\n\n \n\n\n\n In
IEEE International Conference on Data Science and Advanced Analytics (DSAA), pages 222–232, Montreal, QC, Canada, October 2016. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dsaa/WeiSGB16,\n author = {Yifang Wei and\n Lisa Singh and\n Brian Gallagher and\n David Buttler},\n title = {Overlapping Target Event and Story Line Detection of Online Newspaper\n Articles},\n booktitle = {{IEEE} International Conference on Data Science and Advanced\n Analytics (DSAA)},\n pages = {222--232},\n address = {Montreal, QC, Canada},\n month = {October},\n year = {2016},\n crossref = {DBLP:conf/dsaa/2016},\n url = {https://doi.org/10.1109/DSAA.2016.30},\n doi = {10.1109/DSAA.2016.30},\n biburl = {https://dblp.org/rec/bib/conf/dsaa/WeiSGB16},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Using Visual Storytelling to Give Insight Into Inconsistent US Flu Policies [POSTER].\n \n \n \n \n\n\n \n Hockett, J.; Singh, L.; and Bansal, S.\n\n\n \n\n\n\n In
IEEE Conference on Visual Analytics Science and Technology (VAST), Baltimore, Maryland, USA, October 2016. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{LS:poster/vast/Hockett2016,\n author = {Julia Hockett and Lisa Singh and Shweta Bansal},\n title = {Using Visual Storytelling to Give Insight Into Inconsistent US Flu Policies [POSTER]},\n booktitle = {IEEE Conference on Visual Analytics Science and Technology (VAST)}, \n address = {Baltimore, Maryland, USA},\n month = {October},\n year = {2016},\n url = {}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Integrating Visual Exploration Into Traditional Scientific Research Methodology [POSTER].\n \n \n \n \n\n\n \n Barba, E.; Wei, Y.; Singh, L.; and Mann, J.\n\n\n \n\n\n\n In
IEEE Conference on Visual Analytics Science and Technology (VAST), Baltimore, Maryland, USA, October 2016. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{LS:poster/vast/Barba2016,\n author = {Evan Barba and Yifang Wei and Lisa Singh and Janet Mann},\n title = {Integrating Visual Exploration Into Traditional Scientific Research Methodology [POSTER]},\n booktitle = {IEEE Conference on Visual Analytics Science and Technology (VAST)}, \n address = {Baltimore, Maryland, USA},\n month = {October},\n year = {2016},\n url = {}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Safelog: Supporting Web Search and Mining by Differentially-Private Query Logs.\n \n \n \n \n\n\n \n Zhang, S.; Yang, G. H.; Singh, L.; and Xiong, L.\n\n\n \n\n\n\n In
AAAI Fall Symposium on Privacy and Language Technologies, Washington, DC, USA, September 2016. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{LS:conf/ss/Zhang16,\n author = {Sicong Zhang and Grace Hui Yang and Lisa Singh and Li Xiong},\n title = {Safelog: Supporting Web Search and Mining by Differentially-Private Query Logs},\n booktitle = {AAAI Fall Symposium on Privacy and Language Technologies},\n month = {September},\n year = {2016},\n address = {Washington, DC, USA},\n url = {https://www.aaai.org/ocs/index.php/FSS/FSS16/paper/view/14133/13703},\n biburl = {https://www.aaai.org/ocs/index.php/FSS/FSS16/paper/viewPaper/14133}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Generating Risk Reduction Recommendations to Decrease Vulnerability of Public Online Profiles.\n \n \n \n \n\n\n \n Zhu, J.; Zhang, S.; Singh, L.; Yang, G. H.; and Sherr, M.\n\n\n \n\n\n\n In
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 411–416, San Francisco, CA, USA, August 2016. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/asunam/ZhuZSYS16,\n author = {Janet Zhu and\n Sicong Zhang and\n Lisa Singh and\n Grace Hui Yang and\n Micah Sherr},\n title = {Generating Risk Reduction Recommendations to Decrease Vulnerability\n of Public Online Profiles},\n booktitle = {{IEEE/ACM} International Conference on Advances in Social Networks\n Analysis and Mining (ASONAM)},\n month = {August},\n year = {2016},\n address = {San Francisco, CA, USA},\n pages = {411--416},\n crossref = {DBLP:conf/asunam/2016},\n url = {https://doi.org/10.1109/ASONAM.2016.7752267},\n doi = {10.1109/ASONAM.2016.7752267},\n biburl = {https://dblp.org/rec/bib/conf/asunam/ZhuZSYS16},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n \n\n\n
\n
\n\n \n \n \n \n \n \n Anonymizing Query Logs by Differential Privacy.\n \n \n \n \n\n\n \n Zhang, S.; Yang, G. H.; and Singh, L.\n\n\n \n\n\n\n In
ACM International Conference on Research and Development in Information Retrieval (SIGIR), pages 753–756, Pisa, Italy, July 2016. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigir/ZhangYS16,\n author = {Sicong Zhang and\n Grace Hui Yang and\n Lisa Singh},\n title = {Anonymizing Query Logs by Differential Privacy},\n booktitle = {{ACM} International Conference on\n Research and Development in Information Retrieval (SIGIR)},\n pages = {753--756},\n address = {Pisa, Italy},\n month = {July},\n year = {2016},\n crossref = {DBLP:conf/sigir/2016},\n url = {http://doi.acm.org/10.1145/2911451.2914732},\n doi = {10.1145/2911451.2914732},\n biburl = {https://dblp.org/rec/bib/conf/sigir/ZhangYS16},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Data Ethics - Attaining Personal Privacy on the Web.\n \n \n \n \n\n\n \n Singh, L.\n\n\n \n\n\n\n In Collmann, J.; and Matei, S., editor(s),
Ethical Reasoning in Big Data - An Exploratory Analysis, pages 81–90. Springer, 2016.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@incollection{DBLP:books/sp/16/Singh16,\n author = {Lisa Singh},\n title = {Data Ethics - Attaining Personal Privacy on the Web},\n booktitle = {Ethical Reasoning in Big Data - An Exploratory Analysis},\n pages = {81--90},\n year = {2016},\n editor = {Jeff Collmann and Sorin Matei},\n publisher = {Springer},\n crossref = {DBLP:books/sp/CM2016},\n url = {https://doi.org/10.1007/978-3-319-28422-4_7},\n doi = {10.1007/978-3-319-28422-4_7},\n biburl = {https://dblp.org/rec/bib/books/sp/16/Singh16},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n\n\n\n