1. S. Smith, J. W. Choi, J. Li, R. Vuduc, J. Park, X. Liu, and G. Karypis, "FROSTT: The Formidable Repository of Open Sparse Tensors and Tools," 2017. [Online]. Available: http://frostt.io/
2. H.-H. Mao, C.-J. Wu, E. E. Papalexakis, C. Faloutsos, K.-C. Lee, and T.-C. Kao, "MalSpot: Multi2 Malicious Network Behavior Patterns Analysis," in Advances in Knowledge Discovery and Data Mining, ser. Lecture Notes in Computer Science, V. S. Tseng, T. B. Ho, Z.-H. Zhou, A. L. P. Chen, and H.-Y. Kao, Eds. Cham: Springer International Publishing, 2014, pp. 1--14.
3. TuckER: Tensor Factorization for Knowledge Graph Completion," in Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Hong Kong, China;Balazevic I.;Association for Computational Linguistics,2019
4. Sparse non-negative matrix factorizations via alternating non-negativity-constrained least squares for microarray data analysis
5. Generalized Canonical Polyadic Tensor Decomposition