Evaluating machine learning techniques for detecting offensive and hate speech in South African tweets O Oriola, E Kotzé IEEE Access 8, 21496-21509, 2020 | 124 | 2020 |
Distributed intrusion detection system using p2p agent mining scheme O Oriola, AB Adeyemo, ABC Robert IEEE African Journal of Computing & ICT 5 (2), 3-10, 2012 | 20 | 2012 |
Exploring N-gram, word embedding and topic models for content-based fake news detection in FakeNewsNet evaluation O Oriola Int J Comput Appl 975, 8887, 2021 | 16 | 2021 |
Convsegnet: automated polyp segmentation from colonoscopy using context feature refinement with multiple convolutional kernel sizes AO Ige, NK Tomar, FO Aranuwa, O Oriola, AO Akingbesote, MHM Noor, ... IEEE Access 11, 16142-16155, 2023 | 10 | 2023 |
A stacked generalization ensemble approach for improved intrusion detection O Oriola International Journal of Computer Science and Information Security (IJCSIS …, 2020 | 10 | 2020 |
Improved Electoral Fraud Prevention Mechanism for Efficient and Credible Elections in Nigeria‖ FO Aranuwa, O Oriola IEEE African Journal of Computing & ICT 5 (6), 68-75, 2012 | 9 | 2012 |
A collaborative approach for national cybersecurity incident management O Oriola, AB Adeyemo, M Papadaki, E Kotzé Information & Computer Security 29 (3), 457-484, 2021 | 7 | 2021 |
Improved semi-supervised learning technique for automatic detection of South African abusive language on Twitter O Oriola, E Kotzé South African Computer Journal 32 (2), 56-79, 2020 | 7 | 2020 |
Automatic detection of toxic south african tweets using support vector machines with n-gram features O Oriola, E Kotzé 2019 6th international conference on soft computing & machine intelligence …, 2019 | 7 | 2019 |
Personnel audit using a forensic mining technique AB Adeyemo, O Oriola International Journal of Computer Science Issues (IJCSI) 7 (6), 222, 2010 | 7 | 2010 |
An Integrated Service Model for Improved Automatic Teller Machine Operation in Nigeria Banking System O Oriola, FO Aranuwa Int J Appl Inf Syst 7 (7), 37-44, 2014 | 4 | 2014 |
Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique O Oriola, AB Adeyemo, O Osunade International Journal of Network Security & Its Applications 4 (6), 145, 2012 | 4 | 2012 |
Improving the Detection of Multilingual South African Abusive Language via Skip-gram using Joint Multilevel Domain Adaptation O Oriola, E Kotzé ACM Transactions on Asian and Low-Resource Language Information Processing, 1-30, 2023 | 3 | 2023 |
Exploring neural embeddings and transformers for isolation of offensive and hate speech in South African Social media space O Oriola, E Kotzé International Conference on Computational Science and Its Applications, 649-661, 2022 | 3 | 2022 |
A Feature Selection Method Based on Rough Set Attribute Reduction and Classical Filter-Based Feature Selection for Categorical Data Classification O Oriola, E Kotzé, O Atawodi 6th International Conference on Applied Informatics, 3-15, 2023 | 1 | 2023 |
Collaborative-Based Dynamic Trust Model for Bring-Your-Own-Device Access Control Management in Cloud Environment O Oriola British Journal of Computer, Networking and Information Technology 6 (1), 20-34, 2023 | | 2023 |
Rough Set-guided Feature Selection for Improved URL-based Phishing Website Detection O Oriola Science Research Annals 14 (1), 10-21, 2023 | | 2023 |
Automatic Classification of Computing Literatures via Article and Reference Correlation O Oriola, L Ojo, O Atawodi American Journal of Computer Science and Technology 5 (4), 204-209, 2022 | | 2022 |
Data Mining-based Real-Time User-centric Recommender System for Nigerian Tourism Industry OT Ogbeye, FO Aranuwa, O Oriola, AO Akingbesote, AO Ige International Journal of Engineering and Applied Computer Science, 2022 | | 2022 |
Modeling a Fault Tolerant Control Mechanism for Cloud e-marketplaces using Raft Consensus Protocol (RCP) AO Ige, AO Akingbesote, O Oriola, FO Aranuwa American Journal of Computer Sciences and Applications, 2019 | | 2019 |