Machine learning in digital forensics: a systematic literature review
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …
complexity of digital crimes. On the other hand, the growing volume of data and …
Threats on machine learning technique by data poisoning attack: A survey
With the huge services provided by machine learning systems in our daily life, the attacks on
these services are increasing every day. The attackers are trying to distort the functionality of …
these services are increasing every day. The attackers are trying to distort the functionality of …
Automatic authorship attribution in Albanian texts
Automatic authorship identification is a challenging task that has been the focus of extensive
research in natural language processing. Regardless of the progress made in attributing …
research in natural language processing. Regardless of the progress made in attributing …
Digital authorship attribution in russian-language fanfiction and classical literature
This article is the third paper in a series aimed at the establishment of the authorship of
Russian-language texts. This paper considers methods for determining the authorship of …
Russian-language texts. This paper considers methods for determining the authorship of …
A Transformer-Based Approach to Authorship Attribution in Classical Arabic Texts
Authorship attribution (AA) is a field of natural language processing that aims to attribute text
to its author. Although the literature includes several studies on Arabic AA in general …
to its author. Although the literature includes several studies on Arabic AA in general …
Exploring the effectiveness of word embedding based deep learning model for improving email classification
Purpose Classifying emails as ham or spam based on their content is essential. Determining
the semantic and syntactic meaning of words and putting them in a high-dimensional feature …
the semantic and syntactic meaning of words and putting them in a high-dimensional feature …
DPCF: A framework for imputing missing values and clustering data in drug discovery process
The advent of modern Internet of Things (IoT) architectures has led to ease in data collection
and availability. The data generated from such architectures are of large volume and …
and availability. The data generated from such architectures are of large volume and …
Unifying lexical, syntactic, and structural representations of written language for authorship attribution
F Jafariakinabad, KA Hua - SN Computer Science, 2021 - Springer
Writing style in written language is a combination of consistent decisions associated with a
specific author at different levels of language production, including lexical, syntactic, and …
specific author at different levels of language production, including lexical, syntactic, and …
UPTON: Preventing Authorship Leakage from Public Text Release via Data Poisoning
Consider a scenario where an author-eg, activist, whistle-blower, with many public writings
wishes to write" anonymously" when attackers may have already built an authorship …
wishes to write" anonymously" when attackers may have already built an authorship …
Human activity recognition in WBAN using ensemble model
J Boga - International Journal of Pervasive Computing and …, 2022 - emerald.com
Purpose For achieving the profitable human activity recognition (HAR) method, this paper
solves the HAR problem under wireless body area network (WBAN) using a developed …
solves the HAR problem under wireless body area network (WBAN) using a developed …