HTTP/2 200
x-powered-by: PHP/5.6.40
set-cookie: exp_last_visit=1451670593; expires=Tue, 29-Dec-2026 17:49:53 GMT; Max-Age=31536000; path=/; httponly; secure
set-cookie: exp_last_activity=1767030593; expires=Tue, 29-Dec-2026 17:49:53 GMT; Max-Age=31536000; path=/; httponly; secure
set-cookie: exp_tracker=%7B%220%22%3A%22explorations%22%2C%22token%22%3A%22696a25d375ccdcc7b88bd05a621d2c2a%22%7D; path=/; httponly; secure
set-cookie: exp_csrf_token=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; httponly; secure
set-cookie: exp_csrf_token=771b6fdbb1f97e6d58eee2ed07d42ca28632477c; expires=Mon, 29-Dec-2025 19:49:53 GMT; Max-Age=7200; path=/; httponly; secure
expires: Mon, 26 Jul 1997 05:00:00 GMT
last-modified: Mon, 29 Dec 2025 17:49:53 GMT
pragma: no-cache
content-type: text/html; charset=UTF-8
content-encoding: gzip
vary: Accept-Encoding
date: Mon, 29 Dec 2025 17:49:53 GMT
server: LiteSpeed
strict-transport-security: max-age=63072000; includeSubDomains
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
SIGKDD Explorations
SIGKDD Explorations
- Home
- Explorations
Explorations Archive
- DBR: Divergence-Based Regularization for Debiasing Natural Language Understanding Models [1]
- AttackEval: How to Evaluate the Effectiveness of Jailbreak Attacking on Large Language Models [10]
- Is Less Really More? Fake News Detection with Limited Information [20]
- The b2biers System: A Content-Based Perspective on Maximizing Influence and Subscription in Social Networks [32]
- Dual-Target Disjointed Cross-Domain Recommendation Mediated via Latent User Preferences [52]
- MoralBench: Moral Evaluation of LLMs [62]
- Frugal AI: Introduction, Concepts, Development and Open Questions [72]
- Advancing Table Understanding of Large Language Models via Feature Re-ordering [112]
- Neural-Symbolic Reasoning over Knowledge Graphs: A Survey from a Query Perspective [124]
- Span-Oriented Information Extraction: A Unified Framework. [137]
Read More
- Blockchain for Large Language Model Security and Safety: A Holistic Survey [1]
- Authorship Attribution in the Era of LLMs: Problems, Methodologies, and Challenges [21]
- Exploring Large Language Models for Feature Selection: A Data-centric Perspective [44]
- Causal inference under limited outcome observability: A case study with Pinterest Conversion Lift [54]
- DiffusionShield: A Watermark for Data Copyright Protection against Generative Diffusion Models [60]
- FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models [76]
- Graph Fairness via Authentic Counterfactuals: Tackling Structural and Causal Challenges. [89]
- FG-SMOTE: Towards Fair Node Classification with Graph Neural Network. [99]
- Time Series Forecasting with LLMs: Understanding and Enhancing Model Capabilities [109]
Read More
- Higher-Order Networks Representation and Learning: A Survey [1]
- Synthetic data for learning-based knowledge discovery [19]
- The Case for Hybrid Multi-Objective Optimisation in High-Stakes Machine Learning Applications [24]
- Fairness in Large Language Models: A Taxonomic Survey [34]
- Analyzing and explaining privacy risks on time series data: ongoing work and challenges [49]
Read More
- An interview with Dr. Jure Lesvek, Winner of ACM SIGKDD 2023 Innovation Award [1]
- Marginal Nodes Matter: Towards Structure Fairness in Graphs [4]
- Fighting Fire with Fire: Can ChatGPT Detect AI-generated Text? [14]
- Storage Systems: Organization, Performance, Coding, Reliability, and Their Data Processing, 1st Edition, October 13, 2021 [22]
- Report on the 3rd International Workshop on Learning to Quantify (LQ 2023) [25]
- Anomaly Detection using Generative Adversarial Networks [29]
- Exploring the Potential of Large Language Models (LLMs) in Learning on Graphs [42]
Read More
- Attribution and Obfuscation of Neural Text Authorship: A Data Mining Perspective [1]
- The Need for Unsupervised Outlier Model Selection: A Review and Evaluation of Internal Evaluation Strategies. [19]
- Stop Using the Elbow Criterion for k-means, and How to Choose the Number of Clusters Instead. [36]
- Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking. [43]
- Privacy-Preserving Graph Machine Learning from Data to Computation: A Survey. [54]
- Adaptive Risk-Aware Bidding with Budget Constraint in Display Advertising. [73]
Read More