Recent advances and applications of machine learning in solid-state materials science

J Schmidt, MRG Marques, S Botti… - npj computational …, 2019 - nature.com
One of the most exciting tools that have entered the material science toolbox in recent years
is machine learning. This collection of statistical methods has already proved to be capable …

Machine learning for email spam filtering: review, approaches and open research problems

EG Dada, JS Bassi, H Chiroma, AO Adetunmbi… - Heliyon, 2019 - cell.com
The upsurge in the volume of unwanted emails called spam has created an intense need for
the development of more dependable and robust antispam filters. Machine learning …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

The technostress trifecta‐techno eustress, techno distress and design: Theoretical directions and an agenda for research

M Tarafdar, CL Cooper, JF Stich - Information Systems Journal, 2019 - Wiley Online Library
Technostress—defined as stress that individuals experience due to their use of Information
Systems—represents an emerging phenomenon of scholarly investigation. It examines how …

[HTML][HTML] A recent overview of the state-of-the-art elements of text classification

MM Mirończuk, J Protasiewicz - Expert Systems with Applications, 2018 - Elsevier
The aim of this study is to provide an overview the state-of-the-art elements of text
classification. For this purpose, we first select and investigate the primary and recent studies …

Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey

SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …

Quantum machine learning for chemistry and physics

M Sajjan, J Li, R Selvarajan, SH Sureshbabu… - Chemical Society …, 2022 - pubs.rsc.org
Machine learning (ML) has emerged as a formidable force for identifying hidden but
pertinent patterns within a given data set with the objective of subsequent generation of …

De novo composite design based on machine learning algorithm

GX Gu, CT Chen, MJ Buehler - Extreme Mechanics Letters, 2018 - Elsevier
Composites are widely used to create tunable materials to achieve superior mechanical
properties. Brittle materials fail catastrophically in the presence of cracks. Incorporating …

An intelligent system for spam detection and identification of the most relevant features based on evolutionary random weight networks

H Faris, AZ Ala'M, AA Heidari, I Aljarah, M Mafarja… - Information …, 2019 - Elsevier
With the incremental use of emails as an essential and popular communication mean over
the Internet, there comes a serious threat that impacts the Internet and the society. This …

Turn the combination lock: Learnable textual backdoor attacks via word substitution

F Qi, Y Yao, S Xu, Z Liu, M Sun - arXiv preprint arXiv:2106.06361, 2021 - arxiv.org
Recent studies show that neural natural language processing (NLP) models are vulnerable
to backdoor attacks. Injected with backdoors, models perform normally on benign examples …