Machine learning in digital forensics: a systematic literature review

T Nayerifard, H Amintoosi, AG Bafghi… - arxiv preprint arxiv …, 2023 - arxiv.org
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …

Threats on machine learning technique by data poisoning attack: A survey

IM Ahmed, MY Kashmoola - … , ACeS 2021, Penang, Malaysia, August 24 …, 2021 - Springer
With the huge services provided by machine learning systems in our daily life, the attacks on
these services are increasing every day. The attackers are trying to distort the functionality of …

Automatic authorship attribution in Albanian texts

A Misini, E Canhasi, A Kadriu, E Fetahi - Plos one, 2024 - journals.plos.org
Automatic authorship identification is a challenging task that has been the focus of extensive
research in natural language processing. Regardless of the progress made in attributing …

Digital authorship attribution in russian-language fanfiction and classical literature

A Fedotova, A Romanov, A Kurtukova, A Shelupanov - Algorithms, 2022 - mdpi.com
This article is the third paper in a series aimed at the establishment of the authorship of
Russian-language texts. This paper considers methods for determining the authorship of …

A Transformer-Based Approach to Authorship Attribution in Classical Arabic Texts

FM AlZahrani, M Al-Yahya - Applied Sciences, 2023 - mdpi.com
Authorship attribution (AA) is a field of natural language processing that aims to attribute text
to its author. Although the literature includes several studies on Arabic AA in general …

Exploring the effectiveness of word embedding based deep learning model for improving email classification

DS Asudani, NK Nagwani, P Singh - Data Technologies and …, 2022 - emerald.com
Purpose Classifying emails as ham or spam based on their content is essential. Determining
the semantic and syntactic meaning of words and putting them in a high-dimensional feature …

DPCF: A framework for imputing missing values and clustering data in drug discovery process

HV Bhagat, M Singh - Chemometrics and Intelligent Laboratory Systems, 2022 - Elsevier
The advent of modern Internet of Things (IoT) architectures has led to ease in data collection
and availability. The data generated from such architectures are of large volume and …

Unifying lexical, syntactic, and structural representations of written language for authorship attribution

F Jafariakinabad, KA Hua - SN Computer Science, 2021 - Springer
Writing style in written language is a combination of consistent decisions associated with a
specific author at different levels of language production, including lexical, syntactic, and …

UPTON: Preventing Authorship Leakage from Public Text Release via Data Poisoning

Z Wang, T Le, D Lee - arxiv preprint arxiv:2211.09717, 2022 - arxiv.org
Consider a scenario where an author-eg, activist, whistle-blower, with many public writings
wishes to write" anonymously" when attackers may have already built an authorship …

Human activity recognition in WBAN using ensemble model

J Boga - International Journal of Pervasive Computing and …, 2022 - emerald.com
Purpose For achieving the profitable human activity recognition (HAR) method, this paper
solves the HAR problem under wireless body area network (WBAN) using a developed …