Machine learning algorithms for social media analysis: A survey
Social Media (SM) are the most widespread and rapid data generation applications on the
Internet increase the study of these data. However, the efficient processing of such massive …
Internet increase the study of these data. However, the efficient processing of such massive …
Text mining in big data analytics
H Hassani, C Beneki, S Unger, MT Mazinani… - Big Data and Cognitive …, 2020 - mdpi.com
Text mining in big data analytics is emerging as a powerful tool for harnessing the power of
unstructured textual data by analyzing it to extract new knowledge and to identify significant …
unstructured textual data by analyzing it to extract new knowledge and to identify significant …
Phishing web site detection using diverse machine learning algorithms
Purpose This paper aims to present a framework to detect phishing websites using stacking
model. Phishing is a type of fraud to access users' credentials. The attackers access users' …
model. Phishing is a type of fraud to access users' credentials. The attackers access users' …
Phishing email detection using natural language processing techniques: a literature survey
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …
[HTML][HTML] A pipeline and comparative study of 12 machine learning models for text classification
Text-based communication is highly favoured as a communication mean, especially in
business environments. As a result, it is often abused by sending malicious messages, eg …
business environments. As a result, it is often abused by sending malicious messages, eg …
Spam emails detection based on distributed word embedding with deep learning
S Srinivasan, V Ravi, M Alazab, S Ketha… - … intelligence and big …, 2021 - Springer
In recent years, a rapid shift from general and random attacks to more sophisticated and
advanced ones can be noticed. Unsolicited email or spam is one of the sources of many …
advanced ones can be noticed. Unsolicited email or spam is one of the sources of many …
Mobile learning for English language acquisition: taxonomy, challenges, and recommendations
Mobile learning (m-learning) is increasingly becoming a popular global trend, especially
among English language learners. However, despite the growing interest in mobile English …
among English language learners. However, despite the growing interest in mobile English …
Resume classification system using natural language processing and machine learning techniques
The selection of a suitable job applicant from the pool of thousands applications is often
daunting job for an employer. The categorization of job applications submitted in form of …
daunting job for an employer. The categorization of job applications submitted in form of …
Sarcasm identification in textual data: systematic review, research challenges and open directions
Sarcasm is a form of sentiment whereby people express the implicit information, usually the
opposite of the message content in order to hurt someone emotionally or criticise something …
opposite of the message content in order to hurt someone emotionally or criticise something …
Decision-based evasion attacks on tree ensemble classifiers
Learning-based classifiers are found to be susceptible to adversarial examples. Recent
studies suggested that ensemble classifiers tend to be more robust than single classifiers …
studies suggested that ensemble classifiers tend to be more robust than single classifiers …