S Cresci - Communications of the ACM, 2020 - dl.acm.org
A decade of social bot detection Page 1 72 COMMUNICATIONS OF THE ACM | OCTOBER 2020 | VOL. 63 | NO. 10 review articles ON THE MORNING of November 9, 2016, the world …
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
The question of how methods from the field of artificial intelligence can help improve the conventional frameworks for topology optimisation has received increasing attention over …
Abstract Machine learning algorithms are powerful tools for data-driven tasks such as image classification and feature detection. However, their vulnerability to adversarial examples …
Banking is a popular topic for empirical and methodological research that applies operational research (OR) and artificial intelligence (AI) methods. This article provides a …
U Urooj, BAS Al-rimy, A Zainal, FA Ghaleb… - Applied Sciences, 2021 - mdpi.com
Ransomware is an ill-famed malware that has received recognition because of its lethal and irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …
The advancement in technology has fostered the prevalence of the Internet of Things (IoT), which enhances healthcare business quality, offers a seamless customer experience, and …
Abstract Machine learning (ML) models are nowadays used in complex applications in various domains, such as medicine, bioinformatics, and other sciences. Due to their black …
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse …