Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network IEEE BASE PAPER ABSTRACT: Malicious social bots generate fake tweets and automate their social relationships either by pretending like a follower or by creating multiple fake …
What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text IEEE BASE PAPER ABSTRACT: Twitter has become one of the most popular sources of real-time information about events happening in the world. Because of the overwhelming amount …
TAQE: Tweet Retrieval Based Infrastructure Damage Assessment During Disasters IEEE BASE PAPER ABSTRACT: Twitter is an active communication channel for the spreading of updated information in emergency situations. Retrieving specific information related to infrastructure damage offers the situational views to …
Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios IEEE BASE PAPER ABSTRACT: Recommendation technology is an important part of the Internet of Things (IoT) services, which can provide better service for users and help users get information anytime, …
Movie Recommendation System Using Sentiment Analysis From Microblogging Data IEEE BASE PAPER ABSTRACT: Recommendation systems (RSs) have garnered immense interest for applications in e-commerce and digital media. Traditional approaches in RSs include such as collaborative filtering (CF) and content-based filtering …
Emotion Detection in Online Social Networks: A Multi-label Learning Approach IEEE BASE PAPER ABSTRACT: Emotion detection in online social networks (OSNs) can benefit kinds of applications such as personalized advertisement services, recommendation systems, etc. Conventionally, emotion analysis mainly focuses on …
Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering IEEE BASE PAPER ABSTRACT: Existing shilling attack detection approaches focus mainly on identifying individual attackers in online recommender systems and rarely address the detection of group shilling …
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data IEEE BASE PAPER ABSTRACT: Frequent itemset mining, which is the essential operation in association rule mining, is one of the most widely used data mining techniques on massive datasets nowadays. …
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing IEEE BASE PAPER ABSTRACT: The emergence of cloud infrastructure has significantly reduced the costs of hardware and software resources in computing infrastructure. To ensure security, the data is usually encrypted …
Optimizing Information Leakage in Multicloud Storage Services IEEE BASE PAPER ABSTRACT: Many schemes have been recently advanced for storing data on multiple clouds. Distributing data over different cloud storage providers (CSPs) automatically provides users with a certain degree of information …
