Multistructure graph classification method with attention-based pooling

Y Xu, J Wang, M Guang, C Yan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Graph neural networks (GNNs) have achieved effective performance in many graph-related
tasks involving recommendation systems, social networks, and bioinformatics. Recent …

Influencers with physical disabilities on Instagram: Features, visibility and business collaboration

M Bonilla-del-Río… - Profesional de …, 2022 - revista.profesionaldelainformacion …
In the digital world, social media have become important for people with disabilities in terms
of communication and visibility. They have also become the ideal place for activism, as they …

Engagement y evolución de instagramers hispanohablantes de moda

EL González-Carrión… - Revista latina de …, 2020 - nuevaepoca.revistalatinacs.org
Introducción: Con el auge tecnológico y el despliegue de dispositivos digitales, el fenómeno
instagramer se convierte en una revolución global, produciendo un cambio del paradigma …

Improved phishing detection algorithms using adversarial autoencoder synthesized data

H Shirazi, SR Muramudalige, I Ray… - 2020 ieee 45th …, 2020 - ieeexplore.ieee.org
Malicious actors often use phishing attacks to compromise legitimate users' credentials.
Machine learning is a promising approach for phishing detection. While the accuracy of …

Adversarial autoencoder data synthesis for enhancing machine learning-based phishing detection algorithms

H Shirazi, SR Muramudalige, I Ray… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Supervised machine learning is often used to detect phishing websites. However, the
scarcity of phishing data for training purposes limits the classifier's performance. Further …

Generating an industrial process graph from 3d pipe routing information

S Sierla, M Azangoo, V Vyatkin - 2020 25th IEEE International …, 2020 - ieeexplore.ieee.org
The automatic generation of digital twins of industrial processes requires the integration of
several sources of information. If the twin is expected to accurately capture thermo-hydraulic …

Recognizing radicalization indicators in text documents using human-in-the-loop information extraction and nlp techniques

BWK Hung, SR Muramudalige… - … on technologies for …, 2019 - ieeexplore.ieee.org
Among the operational shortfalls that hinder law enforcement from achieving greater
success in preventing terrorist attacks is the difficulty in dynamically assessing individualized …

Investigative graph search using graph databases

SR Muramudalige, BWK Hung… - … conference on graph …, 2019 - ieeexplore.ieee.org
Identification and tracking of individuals or groups perpetrating latent or emergent behaviors
are significant in home-land security, cyber security, behavioral health, and consumer …

A Feature Mapping Technique for Complex Data Object Generation With Likelihood and Deep Generative Approaches

SR Muramudalige, AP Jayasumana, H Wang - IEEE Access, 2023 - ieeexplore.ieee.org
When a sufficient amount of training data is available, Machine Learning (ML) models show
great promise for solving problems involving complex and dynamic patterns. Social and …

Automating investigative pattern detection using machine learning & graph pattern matching techniques

SR Muramudalige - 2022 - search.proquest.com
Identification and analysis of latent and emergent behavioral patterns are core tasks in
investigative domains such as homeland security, counterterrorism, and crime prevention …