Spam review detection techniques: A systematic literature review

N Hussain, H Turab Mirza, G Rasool, I Hussain… - Applied Sciences, 2019 - mdpi.com
Online reviews about the purchase of products or services provided have become the main
source of users' opinions. In order to gain profit or fame, usually spam reviews are written to …

A systematic review of defensive and offensive cybersecurity with machine learning

ID Aiyanyo, H Samuel, H Lim - Applied Sciences, 2020 - mdpi.com
This is a systematic review of over one hundred research papers about machine learning
methods applied to defensive and offensive cybersecurity. In contrast to previous reviews …

Enhanced chaotic JAYA algorithm for parameter estimation of photovoltaic cell/modules

M Premkumar, P Jangir, R Sowmya, RM Elavarasan… - ISA transactions, 2021 - Elsevier
Parameters for defining photovoltaic models using measured voltage–current​
characteristics are essential for simulation, control, and evaluation of photovoltaic-based …

[HTML][HTML] Contextual Embeddings based on Fine-tuned Urdu-BERT for Urdu threatening content and target identification

MSI Malik, U Cheema, DI Ignatov - … of King Saud University-Computer and …, 2023 - Elsevier
Identification of threatening text on social media platforms is a challenging task. Contrary to
the high-resource languages, the Urdu language has very limited such approaches and the …

Breast and colon cancer classification from gene expression profiles using data mining techniques

MLR AbdElNabi, M Wajeeh Jasim, HM El-Bakry… - Symmetry, 2020 - mdpi.com
Early detection of cancer increases the probability of recovery. This paper presents an
intelligent decision support system (IDSS) for the early diagnosis of cancer based on gene …

A new approach for evaluating node importance in complex networks via deep learning methods

M Zhang, X Wang, L Jin, M Song, Z Li - Neurocomputing, 2022 - Elsevier
The evaluation of node importance is a critical research topic in network science, widely
applied in social networks, transport systems, and computer networks. Prior works …

Resilient multiscale coordination control against adversarial nodes

Y Shang - Energies, 2018 - mdpi.com
Multiscale consensus has been studied recently as a new concept in the field of multi-agent
systems, which is able to accommodate many complicated coordination control tasks where …

Sequential restorations of complex networks after cascading failures

Y Huang, J Wu, W Ren, KT Chi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cascading failure on complex networks has been extensively studied over the past decade.
However, restoration of networks from cascading failure is still relatively unexplored. In this …

Resilient control of multi-microgrids against false data injection attack

N Yassaie, M Hallajiyan, I Sharifi, HA Talebi - ISA transactions, 2021 - Elsevier
A multi-microgrid system, including several microgrids and distributed energy resources, is
always threatened by numbers of faults and attacks as a consequence of which …

Immunization strategies in networks with missing data

SF Rosenblatt, JA Smith, GR Gauthier… - PLoS computational …, 2020 - journals.plos.org
Network-based intervention strategies can be effective and cost-efficient approaches to
curtailing harmful contagions in myriad settings. As studied, these strategies are often …