Empowering vulnerability prioritization: a heterogeneous graph-driven framework for exploitability prediction

J Yin, G Chen, W Hong, H Wang, J Cao… - … conference on web …, 2023 - Springer
With the increasing number of software vulnerabilities being disclosed each year, prioritizing
them becomes essential as it is challenging to patch all of them promptly. Exploitability …

HpGraphNEI: A network entity identification model based on heterophilous graph learning

N Li, T Li, Z Ma, X Hu, S Zhang, F Liu, X Quan… - Information Processing …, 2024 - Elsevier
Network entities have important asset map**, vulnerability, and service delivery
applications. In cyberspace, where the network structure is complex and the number of …

Text classification models for personality disorders identification

D Jain, S Arora, CK Jha, G Malik - Social Network Analysis and Mining, 2024 - Springer
This research focuses on identifying personality disorders in individuals using their social
media text. We developed a unique collection of words (PD-Corpus) and a dataset (PD …

Surveying the landscape: compound methods for aspect-based sentiment analysis

M Alharbi, J Yin, H Wang - Australasian Database Conference, 2023 - Springer
Aspect-based sentiment Analysis (ABSA) has emerged as a critical research area in natural
language processing, facilitating a deeper understanding of user opinions and sentiments …

Avatars at risk: Exploring public response to sexual violence in immersive digital spaces

NK Singh, RK Ray, N Silayach, DP Dash… - Computers in Human …, 2025 - Elsevier
As the metaverse emerges as a new frontier of human interaction, understanding public
perceptions of crime in virtual spaces becomes crucial. This study delves into public …

Bilateral insider threat detection: Harnessing standalone and sequential activities with recurrent neural networks

P Manoharan, W Hong, J Yin, Y Zhang, W Ye… - … Conference on Web …, 2023 - Springer
Insider threats involving authorised individuals exploiting their access privileges within an
organisation can yield substantial damage compared to external threats. Conventional …

Multi-objective demand responsive transit scheduling in smart city: A multiple populations ant colony system approach

KJ Du, JQ Yang, L Wang, X Han… - 2024 16th …, 2024 - ieeexplore.ieee.org
The demand responsive transit (DRT) is a type of bus that does not have a fixed route and
provides flexible travel services within a certain area range based on passengers' needs …

A multi-source heterogeneous medical data enhancement framework based on lakehouse

M Sheng, S Wang, Y Zhang, R Hao, Y Liang… - … Information Science and …, 2024 - Springer
Obtaining high-quality data sets from raw data is a key step before data exploration and
analysis. Nowadays, in the medical domain, a large amount of data is in need of quality …

Enhancing health information systems security: An ontology model approach

R Nowrozy, K Ahmed - International Conference on Health Information …, 2023 - Springer
This study explores the implications of integrating Health Information System (HIS) on the
security and privacy of sensitive patient information. It identifies existing gaps in research …

A Review of Prediction Techniques used in Stock Market.

P Sadasivan, R Singh - EAI Endorsed Transactions on …, 2025 - search.ebscohost.com
The prediction of stock market movements is a critical task for investors, financial analysts,
and researchers. In recent years, significant advancements have been made in the field of …