No abstract available.
Front Matter
Front Matter
Ensemble Learning Model for Medical Text Classification
Automatic text classification, in which textual data is categorized into specified categories based on its content, is a classic issue in the science of Natural Language Processing (NLP). These models have proven useful when applied to data with ...
Fuzzy Based Text Quality Assessment for Sentiment Analysis
Practitioners have emphasized the importance of employing sentiment analysis techniques in decision-making. The data utilized in this process is typically gathered from social media, making it somewhat unreliable for decision-making. To address ...
Prompt-Learning for Semi-supervised Text Classification
In the Semi-Supervised Text Classification (SSTC) task, the performance of the SSTC-based models heavily rely on the accuracy of the pseudo-labels for unlabeled data, which is not practical in real-world scenarios. Prompt-learning has recently ...
Label-Dependent Hypergraph Neural Network for Enhanced Multi-label Text Classification
Multi-label text classification (MLTC) is a challenging task in natural language processing. Improving the performance of MLTC through building label dependencies remains a focus of current research. Previous researches used label tree structure ...
Fast Text Comparison Based on ElasticSearch and Dynamic Programming
Text comparison is a process of comparing and matching two or more texts to determine their similarities or differences. By calculating the similarity between two texts, tasks such as classification, clustering, retrieval, and comparison can be ...
Front Matter
User Context-Aware Attention Networks for Answer Selection
Answer selection aims to find the most appropriate answer from a set of candidate answers, playing an increasingly important role in Community-based Question Answering. However, existing studies overlook the correlation among historical answers of ...
Towards Robust Token Embeddings for Extractive Question Answering
Extractive Question Answering (EQA) tasks have gained intensive attention in recent years, while Pre-trained Language Models (PLMs) have been widely adopted for encoding purposes. Yet, PLMs typically take as initial input token embeddings and rely ...
Math Information Retrieval with Contrastive Learning of Formula Embeddings
The core and hard part of Mathematical Information Retrieval (MathIR) is formula retrieval. The datasets used for formula retrieval are usually scientific documents containing formulas. However, there is a lack of labeled datasets specifically for ...
Front Matter
Influence Embedding from Incomplete Observations in Sina Weibo
Online Social Networks (OSNs) such as Twitter, Sina Weibo, and Facebook play an important role in our daily life recently. The influence diffusion between users is a common phenomenon on OSNs, which has been applied in numerous applications such ...
Dissemination of Fact-Checked News Does Not Combat False News: Empirical Analysis
This paper examines the impact of true news on the propagation of false news in social media networks. Due to the unavailability of real-world data, we present our methodological approach for collecting Twitter data using the Twitter API. Our ...
Highly Applicable Linear Event Detection Algorithm on Social Media with Graph Stream
In this paper, we model social media with graph stream and propose an efficient event detection algorithm that costs only linear time and space. Different from existing work, we propose an LIS (longest increasing subsequence)-based edge weight to ...
Leveraging Social Networks for Mergers and Acquisitions Forecasting
Mergers and acquisitions are pivotal strategies employed by companies to maintain competitiveness, leading to enhanced production efficiency, scale, and market dominance. Due to their significant financial implications, predicting these operations ...
Enhancing Trust Prediction in Attributed Social Networks with Self-Supervised Learning
Predicting trust in Online Social Networks (OSNs) is essential for a range of applications including online marketing and decision-making. Traditional methods, while effective in some scenarios, encounter difficulties when attempting to handle the ...
Front Matter
Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks
Insider threats involving authorised individuals exploiting their access privileges within an organisation can yield substantial damage compared to external threats. Conventional detection approaches analyse user behaviours from logs, using binary ...
ATDG: An Automatic Cyber Threat Intelligence Extraction Model of DPCNN and BIGRU Combined with Attention Mechanism
With the situation of cyber security becoming more and more complex, the mining and analysis of Cyber Threat Intelligence (CTI) have become a prominent focus in the field of cyber security. Social media platforms like Twitter, due to their ...
Blockchain-Empowered Resource Allocation and Data Security for Efficient Vehicular Edge Computing
Vehicular networking technology is advancing rapidly, and one promising area of research is blockchain-based vehicular edge computing to enhance resource allocation and data security. This paper aims to optimize resource allocation and data ...
Priv-S: Privacy-Sensitive Data Identification in Online Social Networks
Privacy inference imposes a serious threat to user privacy in Online Social Networks (OSNs) as the vast amount of personal data and relationships in OSNs can be used not only to infer user privacy but also to enrich the training set of inference ...
TLEF: Two-Layer Evolutionary Framework for t-Closeness Anonymization
Data anonymization is a fundamental and practical privacy-preserving data publication (PPDP) method, while searching for the optimal anonymization scheme using traditional methods has been proven to be NP-hard. Some recent studies have introduced ...
A Dual-Layer Privacy-Preserving Federated Learning Framework
With the exponential growth of personal data use for machine learning models, significant privacy challenges arise. Anonymisation and federated learning can protect privacy-sensitive data at the cost of accuracy but there is lack of research on ...
A Privacy-Preserving Evolutionary Computation Framework for Feature Selection
Feature selection is a crucial process in data science that involves selecting the most effective subset of features. Evolutionary computation (EC) is one of the most commonly-used feature selection techniques and has demonstrated good performance,...
Local Difference-Based Federated Learning Against Preference Profiling Attacks
The recommendation system based on federated learning has become one of the most popular distributed machine learning technologies, which to some extent protects the privacy and security of users. However, personal privacy information can still be ...
Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction
With the increasing number of software vulnerabilities being disclosed each year, prioritizing them becomes essential as it is challenging to patch all of them promptly. Exploitability prediction plays a crucial role in assessing the severity of ...
ICAD: An Intelligent Framework for Real-Time Criminal Analytics and Detection
Criminal investigation plays a vital role nowadays where the law enforcement agencies (LEAs) carry out this critical mission thoroughly and competently. However, such complicated mission involves a broad spectrum of tasks including collecting ...