A Almomani, M Alauthman, MT Shatnawi… - … Journal on Semantic …, 2022 - igi-global.com
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our …
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity. Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
GS Budhi, R Chiong, I Pranata, Z Hu - Archives of Computational Methods …, 2021 - Springer
Online reviews are becoming increasingly important for decision-making. Consumers often refer to online reviews for opinions before making a purchase. Marketers also acknowledge …
The majority of Internet of Things (IoT) devices are tiny embedded systems with a micro- controller unit (MCU) as its brain. The memory footprint (SRAM, Flash, and EEPROM) of …
Y He, X Yuan, S Chen, X Wu - Proceedings of the AAAI Conference on …, 2021 - ojs.aaai.org
This paper explores a new online learning problem where the input sequence lives in an over-time varying feature space and the ground-truth label of any input point is given only …
X Nie, Z Deng, M He, M Fan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In real-world applications, robotic systems collect vast amounts of new data from ever- changing environments over time. They need to continually interact and learn new …
Nowadays, social media is one widely used platform to access information. Fake news on social media and various other media is widely spreading. It is a matter of serious concern …
S Gupta, P Meel - Inventive Communication and Computational …, 2021 - Springer
People can get infected with fake news very quickly with misleading words and images and post them without any fact-checking. The social media life has been used to distribute …
Online active learning is a paradigm in machine learning that aims to select the most informative data points to label from a data stream. The problem of minimizing the cost …