[HTML][HTML] Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects
Over the past years, the emergence of intelligent networks empowered by machine learning
techniques has brought great facilitates to different aspects of human life. However, using …
techniques has brought great facilitates to different aspects of human life. However, using …
Rumor, misinformation among web: a contemporary review of rumor detection techniques during different web waves
Sometimes, unverified information is disseminated as if it is true information on social media
sites. Most of the times, it goes viral and affects the belief of people and their emotions …
sites. Most of the times, it goes viral and affects the belief of people and their emotions …
Prediction of chaotic time series using recurrent neural networks and reservoir computing techniques: A comparative study
In recent years, machine-learning techniques, particularly deep learning, have outperformed
traditional time-series forecasting approaches in many contexts, including univariate and …
traditional time-series forecasting approaches in many contexts, including univariate and …
[HTML][HTML] Detecting malicious activity in Twitter using deep learning techniques
L Ilias, I Roussaki - Applied Soft Computing, 2021 - Elsevier
Undoubtedly, social media, such as Facebook and Twitter, constitute a major part of our
everyday life due to the incredible possibilities they offer to their users. However, Twitter and …
everyday life due to the incredible possibilities they offer to their users. However, Twitter and …
RunPool: A dynamic pooling layer for convolution neural network
HJ Jie, P Wanda - International Journal of Computational Intelligence …, 2020 - Springer
Deep learning (DL) has achieved a significant performance in computer vision problems,
mainly in automatic feature extraction and representation. However, it is not easy to …
mainly in automatic feature extraction and representation. However, it is not easy to …
Mobile edge assisted literal multi-dimensional anomaly detection of in-vehicle network using LSTM
K Zhu, Z Chen, Y Peng, L Zhang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The development of Internet of Vehicles (IoVs) have introduced more intrusions to the
vulnerabilities of in-vehicle network. It is important to detect in-vehicle network anomaly for …
vulnerabilities of in-vehicle network. It is important to detect in-vehicle network anomaly for …
Classification of various attacks and their defence mechanism in online social networks: a survey
SR Sahoo, BB Gupta - Enterprise Information Systems, 2019 - Taylor & Francis
Due to the popularity and user friendliness of the Internet, numbers of users of online social
networks (OSNs) and social media have grown significantly. However, globally utilised …
networks (OSNs) and social media have grown significantly. However, globally utilised …
Detecting malicious reviews and users affecting social reviewing systems: A survey
The proliferation of attacks on On-line Social Networks (OSNs) has imposed particular
attention by providers and users. This has an even higher importance for Social Reviewing …
attention by providers and users. This has an even higher importance for Social Reviewing …
DatingSec: Detecting malicious accounts in dating apps using a content-based attention network
Dating apps have gained tremendous popularity during the past decade. Compared with
traditional offline dating means, dating apps ease the process of partner finding significantly …
traditional offline dating means, dating apps ease the process of partner finding significantly …
DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning
P Wanda, HJ Jie - Social Network Analysis and Mining, 2021 - Springer
Abstract Detection of Online Social Networks (OSN) anomalous nodes becomes
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …