A review of semi-supervised learning for text classification

JM Duarte, L Berton - Artificial Intelligence Review, 2023 - Springer
A huge amount of data is generated daily leading to big data challenges. One of them is
related to text mining, especially text classification. To perform this task we usually need a …

Twenty years of machine-learning-based text classification: A systematic review

A Palanivinayagam, CZ El-Bayeh, R Damaševičius - Algorithms, 2023 - mdpi.com
Machine-learning-based text classification is one of the leading research areas and has a
wide range of applications, which include spam detection, hate speech identification …

CREATING PROACTIVE CYBER THREAT INTELLIGENCE WITH HACKER EXPLOIT LABELS: A DEEP TRANSFER LEARNING APPROACH.

BM Ampel, S Samtani, H Zhu, H Chen - MIS Quarterly, 2024 - search.ebscohost.com
The rapid proliferation of complex information systems has been met by an ever-increasing
quantity of exploits that can cause irreparable cyber breaches. To mitigate these cyber …

[PDF][PDF] Detection of hate speech spreaders using convolutional neural networks.

M Siino, E Di Nuovo, I Tinnirello… - CLEF (Working Notes …, 2021 - academia.edu
In this paper we describe a deep learning model based on a Convolutional Neural Network
(CNN). The model was developed for the Profiling Hate Speech Spreaders (HSSs) task …

Social welfare in the light of topic modelling

M Baranowski, P Cichocki, J McKinley - Sociology Compass, 2023 - Wiley Online Library
With an increased focus on social well‐being in response to a burgeoning global economy
exposing the weaknesses of social welfare policies, research output in the field has grown …

用于文本聚类的新型差分进化粒子群算法.

胡晓敏, 王明丰, 张首荣, 李敏 - Journal of Computer …, 2021 - search.ebscohost.com
针对粒子群优化(Particle Swarm Optimization, PSO) 算法在维度高, 特征稀疏的文本聚类过程
中, 随着算法迭代次数增加在后期陷入局部最优的问题, 提出采用多样性更好的差分进化 …

Linking common vulnerabilities and exposures to the mitre att&ck framework: A self-distillation approach

B Ampel, S Samtani, S Ullman, H Chen - arXiv preprint arXiv:2108.01696, 2021 - arxiv.org
Due to the ever-increasing threat of cyber-attacks to critical cyber infrastructure,
organizations are focusing on building their cybersecurity knowledge base. A salient list of …

[HTML][HTML] Toxicity detection in online Georgian discussions

N Lashkarashvili, M Tsintsadze - International Journal of Information …, 2022 - Elsevier
Online social platforms have become omnipresent. While these environments are beneficial
for sharing messages, ideas, or information of any kind, they also expose cyber-bullying …

Research on text classification techniques based on improved TF-IDF algorithm and LSTM inputs

M Liang, T Niu - Procedia Computer Science, 2022 - Elsevier
Text classification is a technique that automatically classifies and labels text according to
certain rules, and is widely used in sentiment analysis, intelligent recommendation systems …

Cyberbullying Detection in Social Networks: A Comparison Between Machine Learning and Transfer Learning Approaches

TH Teng, KD Varathan - IEEE Access, 2023 - ieeexplore.ieee.org
Information and Communication Technologies fueled social networking and facilitated
communication. However, cyberbullying on the platform had detrimental ramifications. The …