[HTML][HTML] Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects
Over the past years, the emergence of intelligent networks empowered by machine learning
techniques has brought great facilitates to different aspects of human life. However, using …
techniques has brought great facilitates to different aspects of human life. However, using …
Rumor, misinformation among web: a contemporary review of rumor detection techniques during different web waves
Sometimes, unverified information is disseminated as if it is true information on social media
sites. Most of the times, it goes viral and affects the belief of people and their emotions …
sites. Most of the times, it goes viral and affects the belief of people and their emotions …
Prediction of chaotic time series using recurrent neural networks and reservoir computing techniques: A comparative study
In recent years, machine-learning techniques, particularly deep learning, have outperformed
traditional time-series forecasting approaches in many contexts, including univariate and …
traditional time-series forecasting approaches in many contexts, including univariate and …
[HTML][HTML] Detecting malicious activity in Twitter using deep learning techniques
Undoubtedly, social media, such as Facebook and Twitter, constitute a major part of our
everyday life due to the incredible possibilities they offer to their users. However, Twitter and …
everyday life due to the incredible possibilities they offer to their users. However, Twitter and …
RunPool: A dynamic pooling layer for convolution neural network
Deep learning (DL) has achieved a significant performance in computer vision problems,
mainly in automatic feature extraction and representation. However, it is not easy to …
mainly in automatic feature extraction and representation. However, it is not easy to …
Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM
The development of Internet of Vehicles (IoVs) have introduced more intrusions to the
vulnerabilities of in-vehicle network. It is important to detect in-vehicle network anomaly for …
vulnerabilities of in-vehicle network. It is important to detect in-vehicle network anomaly for …
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges
Over the past few years, online social networks (OSNs) have become an inseparable part of
people's daily lives. Instead of being passive readers, people are now enjoying their role as …
people's daily lives. Instead of being passive readers, people are now enjoying their role as …
Classification of various attacks and their defence mechanism in online social networks: a survey
Due to the popularity and user friendliness of the Internet, numbers of users of online social
networks (OSNs) and social media have grown significantly. However, globally utilised …
networks (OSNs) and social media have grown significantly. However, globally utilised …
DatingSec: Detecting malicious accounts in dating apps using a content-based attention network
Dating apps have gained tremendous popularity during the past decade. Compared with
traditional offline dating means, dating apps ease the process of partner finding significantly …
traditional offline dating means, dating apps ease the process of partner finding significantly …
DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning
Abstract Detection of Online Social Networks (OSN) anomalous nodes becomes
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …