[HTML][HTML] Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects

C Wang, J Chen, Y Yang, X Ma, J Liu - Digital Communications and …, 2022 - Elsevier
Over the past years, the emergence of intelligent networks empowered by machine learning
techniques has brought great facilitates to different aspects of human life. However, using …

Rumor, misinformation among web: a contemporary review of rumor detection techniques during different web waves

N Rani, P Das, AK Bhardwaj - Concurrency and Computation …, 2022 - Wiley Online Library
Sometimes, unverified information is disseminated as if it is true information on social media
sites. Most of the times, it goes viral and affects the belief of people and their emotions …

Prediction of chaotic time series using recurrent neural networks and reservoir computing techniques: A comparative study

S Shahi, FH Fenton, EM Cherry - Machine learning with applications, 2022 - Elsevier
In recent years, machine-learning techniques, particularly deep learning, have outperformed
traditional time-series forecasting approaches in many contexts, including univariate and …

[HTML][HTML] Detecting malicious activity in Twitter using deep learning techniques

L Ilias, I Roussaki - Applied Soft Computing, 2021 - Elsevier
Undoubtedly, social media, such as Facebook and Twitter, constitute a major part of our
everyday life due to the incredible possibilities they offer to their users. However, Twitter and …

RunPool: A dynamic pooling layer for convolution neural network

HJ Jie, P Wanda - International Journal of Computational Intelligence …, 2020 - Springer
Deep learning (DL) has achieved a significant performance in computer vision problems,
mainly in automatic feature extraction and representation. However, it is not easy to …

Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM

K Zhu, Z Chen, Y Peng, L Zhang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The development of Internet of Vehicles (IoVs) have introduced more intrusions to the
vulnerabilities of in-vehicle network. It is important to detect in-vehicle network anomaly for …

Classification of various attacks and their defence mechanism in online social networks: a survey

SR Sahoo, BB Gupta - Enterprise Information Systems, 2019 - Taylor & Francis
Due to the popularity and user friendliness of the Internet, numbers of users of online social
networks (OSNs) and social media have grown significantly. However, globally utilised …

Detecting malicious reviews and users affecting social reviewing systems: A survey

C Esposito, V Moscato, G Sperlì - Computers & Security, 2023 - Elsevier
The proliferation of attacks on On-line Social Networks (OSNs) has imposed particular
attention by providers and users. This has an even higher importance for Social Reviewing …

DatingSec: Detecting malicious accounts in dating apps using a content-based attention network

X He, Q Gong, Y Chen, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Dating apps have gained tremendous popularity during the past decade. Compared with
traditional offline dating means, dating apps ease the process of partner finding significantly …

DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning

P Wanda, HJ Jie - Social Network Analysis and Mining, 2021 - Springer
Abstract Detection of Online Social Networks (OSN) anomalous nodes becomes
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …