Sensitive information detection based on convolution neural network and bi-directional LSTM

Y Lin, G Xu, G Xu, Y Chen, D Sun - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Electronic documents can carry lots of information and are widely used in daily lives. It will
cause substantial economic losses to individual users, enterprises, and governments when …

Detecting sensitive information of unstructured text using convolutional neural network

G Xu, C Qi, H Yu, S Xu, C Zhao… - … Conference on Cyber …, 2019 - ieeexplore.ieee.org
With the use of a large number of electronic text documents, the disclosure of sensitive
information from unstructured text documents is a costly issue for individuals, businesses …

Detecting security breaches in personal data protection with machine learning

CH Lin, PK Yang, YC Lin - 2020 14th International Conference …, 2020 - ieeexplore.ieee.org
In the age of big data and the Internet of Things, large volume of information, such as
medical data, commercial data, or government service data, is generated every second. The …

A unified malicious documents detection model based on two layers of abstraction

M Yu, J Jiang, G Li, J Li, C Lou, C Liu… - 2019 IEEE 21st …, 2019 - ieeexplore.ieee.org
Due to the ever increasing attacks using malicious documents, the detection of such
documents has become a serious and urgent research issue. In the past decade, detection …

Malicious word document detection based on multi-view features learning

X Lu, F Wang, Z Shu - 2019 28th International Conference on …, 2019 - ieeexplore.ieee.org
As users become more cautious about executable programs, malicious document attacks
have become popular, and the proportion of malicious document attacks has become higher …

[HTML][HTML] Research on intelligent perception algorithm for sensitive information

L Huo, J Jiang - Applied Sciences, 2023 - mdpi.com
In the big data era, a tremendous volume of electronic documents is transmitted via the
network, many of which include sensitive information about the country and businesses …

CNN application in detection of privileged documents in legal document review

R Chhatwal, R Keeling, P Gronvall… - … conference on big …, 2020 - ieeexplore.ieee.org
Protecting privileged communications and data from disclosure is paramount for legal
teams. Legal advice, such as attorney-client communications or litigation strategy are …

Can pre-trained transformers be used in detecting complex sensitive sentences?-a monsanto case study

RC Timmer, D Liebowitz, S Nepal… - 2021 Third IEEE …, 2021 - ieeexplore.ieee.org
Each and every organisation releases information in a variety of forms ranging from annual
reports to legal proceedings. Such documents may contain sensitive information and …

Hiding security feature into text content for securing documents using generated font

VL Cu, JC Burie, JM Ogier… - … International conference on …, 2019 - ieeexplore.ieee.org
Motivated by increasing possibility of the tampering of genuine documents during a
transmission over digital channels, we focus on developing a watermarking framework for …

Deep learning for the detection of tabular information from electronic component datasheets

M Traquair, E Kara, B Kantarci… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
The global electronic components supply chain consists of tens of thousands of e-
component manufacturers who fabricate over a billion distinct components. These are …