-
1
-
-
69349090197
-
Learning deep architectures for AI
-
Bengio, Y., Learning deep architectures for AI. Found Trends Mach Learn 2:1 (2009), 1–127.
-
(2009)
Found Trends Mach Learn
, vol.2
, Issue.1
, pp. 1-127
-
-
Bengio, Y.1
-
2
-
-
84885432067
-
Exploring high-level features for detecting cyberpedophilia
-
Bogdanova, D., Rosso, P., Solorio, T., Exploring high-level features for detecting cyberpedophilia. Comput Speech Lang 28:1 (2014), 108–120.
-
(2014)
Comput Speech Lang
, vol.28
, Issue.1
, pp. 108-120
-
-
Bogdanova, D.1
Rosso, P.2
Solorio, T.3
-
3
-
-
84914145770
-
Detecting child grooming behaviour patterns on social media
-
L. Aiello D. McFarland Springer International Publishing
-
Cano, A., Fernandez, M., Alani, H., Detecting child grooming behaviour patterns on social media. Aiello, L., McFarland, D., (eds.) Social informatics, 8851, 2014, Springer International Publishing, 412–427.
-
(2014)
Social informatics
, vol.8851
, pp. 412-427
-
-
Cano, A.1
Fernandez, M.2
Alani, H.3
-
4
-
-
79955702502
-
LIBSVM: a library for support vector machines
-
27:1–27:27
-
Chang, C.-C., Lin, C.-J., LIBSVM: a library for support vector machines. ACM Trans Intelligent Syst Technol, 2(3), 2011 27:1–27:27.
-
(2011)
ACM Trans Intelligent Syst Technol
, vol.2
, Issue.3
-
-
Chang, C.-C.1
Lin, C.-J.2
-
5
-
-
80053558787
-
Natural language processing (almost) from scratch
-
Collobert, R., Weston, J., Bottou, L., Karlen, M., Kavukcuoglu, K., Kuksa, P.P., Natural language processing (almost) from scratch. JMLR 12 (2011), 2493–2537.
-
(2011)
JMLR
, vol.12
, pp. 2493-2537
-
-
Collobert, R.1
Weston, J.2
Bottou, L.3
Karlen, M.4
Kavukcuoglu, K.5
Kuksa, P.P.6
-
6
-
-
84978265136
-
Recognizing predatory chat documents using semi-supervised anomaly detection
-
Ebrahimi, M., Suen, C.Y., Ormandjieva, O., Krzyzak, A., Recognizing predatory chat documents using semi-supervised anomaly detection. Presented at the document recognition and Retrieval XXIII, San Francisco, CA, USA: electronics and imaging 2016, 2016, 1–9.
-
(2016)
Presented at the document recognition and Retrieval XXIII, San Francisco, CA, USA: electronics and imaging 2016
, pp. 1-9
-
-
Ebrahimi, M.1
Suen, C.Y.2
Ormandjieva, O.3
Krzyzak, A.4
-
7
-
-
85014203103
-
Features for modelling characteristics of conversations
-
Eriksson, G., Karlgren, J., Features for modelling characteristics of conversations. Presented at the notebook for PAN at CLEF 2012, Rome, Italy: CLEF 2012, 2012.
-
(2012)
Presented at the notebook for PAN at CLEF 2012, Rome, Italy: CLEF 2012
-
-
Eriksson, G.1
Karlgren, J.2
-
8
-
-
85008405047
-
Sexual predator detection in chats with chained classifiers
-
Association for Computational Linguistics Atlanta, Georgia
-
Escalante, H.J., Villatoro-Tello, E., Juárez, A., Montes-y-Gómez, M., Villaseñor, L., Sexual predator detection in chats with chained classifiers. Proceedings of the 4th workshop on computational approaches to subjectivity, sentiment and social media analysis, 2013, Association for Computational Linguistics, Atlanta, Georgia, 46–54.
-
(2013)
Proceedings of the 4th workshop on computational approaches to subjectivity, sentiment and social media analysis
, pp. 46-54
-
-
Escalante, H.J.1
Villatoro-Tello, E.2
Juárez, A.3
Montes-y-Gómez, M.4
Villaseñor, L.5
-
9
-
-
84944735469
-
Deep learning
-
Book in preparation for MIT Press
-
Goodfellow, I., Yoshua, B., Courville, A., Deep learning. 2016 Book in preparation for MIT Press.
-
(2016)
-
-
Goodfellow, I.1
Yoshua, B.2
Courville, A.3
-
10
-
-
0031573117
-
Long short-term memory
-
Hochreiter, S., Schmidhuber, J., Long short-term memory. Neural Comput 9:8 (1997), 1735–1780.
-
(1997)
Neural Comput
, vol.9
, Issue.8
, pp. 1735-1780
-
-
Hochreiter, S.1
Schmidhuber, J.2
-
11
-
-
84893572520
-
Overview of the international sexual predator identification competition at PAN-2012
-
[CLEF (working notes)]
-
Inches, G., Crestani, F., Overview of the international sexual predator identification competition at PAN-2012. 2012 [CLEF (working notes)].
-
(2012)
-
-
Inches, G.1
Crestani, F.2
-
12
-
-
84926052014
-
Opinion mining with deep recurrent neural networks
-
[Doha, Qatar]
-
İrsoy, O., Cardie, C., Opinion mining with deep recurrent neural networks. Proceedings of the conference on empirical methods in natural language processing, 2014, 720–728 [Doha, Qatar].
-
(2014)
Proceedings of the conference on empirical methods in natural language processing
, pp. 720-728
-
-
İrsoy, O.1
Cardie, C.2
-
13
-
-
84978196853
-
ConText v2
-
Retrieved May 22, 2016, from
-
Johnson, R., ConText v2. Retrieved May 22, 2016, from, 2016, May 15 http://riejohnson.com/cnn_download.html.
-
(2016)
-
-
Johnson, R.1
-
15
-
-
84965096153
-
Semi-supervised convolutional neural networks for text categorization via region embedding
-
Johnson, R., Zhang, T., Semi-supervised convolutional neural networks for text categorization via region embedding. Presented at the NIPS, Montreal, 2015.
-
(2015)
Presented at the NIPS, Montreal
-
-
Johnson, R.1
Zhang, T.2
-
16
-
-
84906922163
-
A convolutional neural network for modelling sentences
-
Kalchbrenner, N., Grefenstette, E., Blunsom, P., A convolutional neural network for modelling sentences. ACL, 2014, 2014.
-
(2014)
ACL
, vol.2014
-
-
Kalchbrenner, N.1
Grefenstette, E.2
Blunsom, P.3
-
17
-
-
85041507420
-
IR-based k-nearest neighbor approach for identifying abnormal chat users
-
Kang, I.-S., Kim, C.-K., Kang, S.-J., Na, S.-H., IR-based k-nearest neighbor approach for identifying abnormal chat users. Presented at the notebook for PAN at CLEF 2012, Rome, Italy: CLEF 2012, 2012.
-
(2012)
Presented at the notebook for PAN at CLEF 2012, Rome, Italy: CLEF 2012
-
-
Kang, I.-S.1
Kim, C.-K.2
Kang, S.-J.3
Na, S.-H.4
-
20
-
-
79955622469
-
Text mining and cybercrime
-
John Wiley & Sons, Ltd
-
Kontostathis, A., Edwards, L., Leatherman, A., Text mining and cybercrime. Text mining, 2010, John Wiley & Sons, Ltd, 149–164.
-
(2010)
Text mining
, pp. 149-164
-
-
Kontostathis, A.1
Edwards, L.2
Leatherman, A.3
-
21
-
-
84919829999
-
Distributed representations of sentences and documents
-
Le, Q.V., Mikolov, T., Distributed representations of sentences and documents. Proceedings of the 31th international conference on machine learning, ICML 2014, Beijing, China, 21–26 June 2014, 2014, 1188–1196.
-
(2014)
Proceedings of the 31th international conference on machine learning, ICML 2014, Beijing, China, 21–26 June 2014
, pp. 1188-1196
-
-
Le, Q.V.1
Mikolov, T.2
-
22
-
-
77955998889
-
Convolutional networks and applications in vision
-
LeCun, Y., Kavukcuoglu, K., Farabet, C., Convolutional networks and applications in vision. Circuits and systems (ISCAS), proceedings of 2010 IEEE international symposium on, 2010, 253–256.
-
(2010)
Circuits and systems (ISCAS), proceedings of 2010 IEEE international symposium on
, pp. 253-256
-
-
LeCun, Y.1
Kavukcuoglu, K.2
Farabet, C.3
-
23
-
-
84872543023
-
Efficient backprop
-
Springer Berlin Heidelberg
-
LeCun, Y., Bottou, L., Orr, G., Müller, K.-R., Efficient backprop. Neural networks: tricks of the trade, 2012, Springer Berlin Heidelberg, 9–48.
-
(2012)
Neural networks: tricks of the trade
, pp. 9-48
-
-
LeCun, Y.1
Bottou, L.2
Orr, G.3
Müller, K.-R.4
-
24
-
-
79955571188
-
Learning to identify internet sexual predation
-
Mcghee, I., Bayzick, J., Kontostathis, A., Edwards, L., Mcbride, A., Jakubowski, E., Learning to identify internet sexual predation. Int J Electron Commer 15:3 (2011), 103–122.
-
(2011)
Int J Electron Commer
, vol.15
, Issue.3
, pp. 103-122
-
-
Mcghee, I.1
Bayzick, J.2
Kontostathis, A.3
Edwards, L.4
Mcbride, A.5
Jakubowski, E.6
-
25
-
-
79959829092
-
Recurrent neural network based language model
-
Mikolov, T., Karafiát, M., Burget, L., Cernocký, J., Khudanpur, S., Recurrent neural network based language model. INTERSPEECH 2010, 11th annual conference of the international speech communication association, Makuhari, Chiba, Japan, September 26–30, 2010, 2010, 1045–1048.
-
(2010)
INTERSPEECH 2010, 11th annual conference of the international speech communication association, Makuhari, Chiba, Japan, September 26–30, 2010
, pp. 1045-1048
-
-
Mikolov, T.1
Karafiát, M.2
Burget, L.3
Cernocký, J.4
Khudanpur, S.5
-
26
-
-
84898956512
-
Distributed representations of words and phrases and their compositionality
-
Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J., Distributed representations of words and phrases and their compositionality. Presented at the advances in neural information processing systems 26: 27th annual conference on neural information processing systems 2013, 2013, 3111–3119.
-
(2013)
Presented at the advances in neural information processing systems 26: 27th annual conference on neural information processing systems 2013
, pp. 3111-3119
-
-
Mikolov, T.1
Sutskever, I.2
Chen, K.3
Corrado, G.S.4
Dean, J.5
-
27
-
-
84945366982
-
Identifying online sexual predators by SVM classification with lexical and behavioral features
-
(Master of Science Thesis) University Of Toronto Canada Retrieved from
-
Morris, C., Identifying online sexual predators by SVM classification with lexical and behavioral features. (Master of Science Thesis), 2013, January 30, University Of Toronto, Canada Retrieved from ftp.cs.toronto.edu/pub/gh/Morris,Colin-MSc-thesis-2013.pdf.
-
(2013)
-
-
Morris, C.1
-
28
-
-
14344249889
-
Feature selection, L1 vs. L2 regularization, and rotational invariance
-
ACM New York, NY, USA
-
Ng, A.Y., Feature selection, L1 vs. L2 regularization, and rotational invariance. Proceedings of the twenty-first international conference on machine learning, 2004, ACM, New York, NY, USA, 78.
-
(2004)
Proceedings of the twenty-first international conference on machine learning
, pp. 78
-
-
Ng, A.Y.1
-
29
-
-
47749131589
-
Toward spotting the pedophile telling victim from predator in text chats
-
Washington, USA IEEE
-
Pendar, N., Toward spotting the pedophile telling victim from predator in text chats. 2007, IEEE, Washington, USA, 235–241.
-
(2007)
, pp. 235-241
-
-
Pendar, N.1
-
30
-
-
84961289992
-
GloVe: global vectors for word representation
-
Pennington, J., Socher, R., Manning, C.D., GloVe: global vectors for word representation. Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP 2014), 2014, 1532–1543.
-
(2014)
Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP 2014)
, pp. 1532-1543
-
-
Pennington, J.1
Socher, R.2
Manning, C.D.3
-
31
-
-
84978196840
-
GloVe
-
Retrieved May 20, 2016, from
-
Pennington, J., Socher, R., Manning, C.D., GloVe. Retrieved May 20, 2016, from, 2016, May 10 http://nlp.stanford.edu/projects/glove/.
-
(2016)
-
-
Pennington, J.1
Socher, R.2
Manning, C.D.3
-
32
-
-
84978229339
-
-
Retrieved from
-
Perverted Justice, Retrieved from http://www.perverted-justice.com, 2016, May 21.
-
(2016)
-
-
Perverted Justice1
-
33
-
-
84978199894
-
-
Retrieved January 20, 2016, from
-
Calcul Quebec, Retrieved January 20, 2016, from http://www.calculquebec.ca/en/, 2016, May 24.
-
(2016)
-
-
Calcul Quebec1
-
34
-
-
0022471098
-
Learning representations by back-propagating errors
-
Rumelhart, D.E., Hinton, G.E., Williams, R.J., Learning representations by back-propagating errors. Nature 323:6088 (1986), 533–536.
-
(1986)
Nature
, vol.323
, Issue.6088
, pp. 533-536
-
-
Rumelhart, D.E.1
Hinton, G.E.2
Williams, R.J.3
-
35
-
-
84910651844
-
Deep learning in neural networks: an overview
-
Schmidhuber, J., Deep learning in neural networks: an overview. Neural Netw 61 (2015), 85–117.
-
(2015)
Neural Netw
, vol.61
, pp. 85-117
-
-
Schmidhuber, J.1
-
36
-
-
80053438267
-
Parsing natural scenes and natural language with recursive neural networks
-
L. Getoor T. Scheffer Omnipress
-
Socher, R., Lin, C.C.-Y., Ng, A.Y., Manning, C.D., Parsing natural scenes and natural language with recursive neural networks. Getoor, L., Scheffer, T., (eds.) ICML, 2011, Omnipress, 129–136.
-
(2011)
ICML
, pp. 129-136
-
-
Socher, R.1
Lin, C.C.-Y.2
Ng, A.Y.3
Manning, C.D.4
-
37
-
-
84926358845
-
Recursive deep models for semantic compositionality over a sentiment treebank
-
Association for Computational Linguistics Seattle, Washington, USA
-
Socher, R., Perelygin, A., Wu, J., Chuang, J., Manning, C.D., Ng, A., et al. Recursive deep models for semantic compositionality over a sentiment treebank. Proceedings of the 2013 conference on empirical methods in natural language processing, 2013, Association for Computational Linguistics, Seattle, Washington, USA, 1631–1642.
-
(2013)
Proceedings of the 2013 conference on empirical methods in natural language processing
, pp. 1631-1642
-
-
Socher, R.1
Perelygin, A.2
Wu, J.3
Chuang, J.4
Manning, C.D.5
Ng, A.6
-
38
-
-
84907885737
-
A two-step approach for effective detection of misbehaving users in chats
-
CLEF’12 Rome, Italy
-
Villatoro-Tello, E., Juárez-González, A., Escalante, H.J., Montes-y-Gómez, M., Villaseñor-Pineda, L., A two-step approach for effective detection of misbehaving users in chats. Presented at the notebook for PAN at CLEF’12, 2012, CLEF’12, Rome, Italy.
-
(2012)
Presented at the notebook for PAN at CLEF’12
-
-
Villatoro-Tello, E.1
Juárez-González, A.2
Escalante, H.J.3
Montes-y-Gómez, M.4
Villaseñor-Pineda, L.5
-
39
-
-
84978206618
-
-
Retrieved May 20, 2016, from
-
word2vec, Retrieved May 20, 2016, from https://code.google.com/archieve/p/word2vec, 2016, May 10.
-
(2016)
-
-
word2vec1
-
40
-
-
84971255558
-
A sensitivity analysis of (and practitioners' guide to) convolutional neural networks for sentence classification
-
CoRR, abs/1510.03820. Retrieved from
-
Zhang, Y., Wallace, B., A sensitivity analysis of (and practitioners' guide to) convolutional neural networks for sentence classification. CoRR, abs/1510.03820. Retrieved from, 2015 http://arxiv.org/abs/1510.03820.
-
(2015)
-
-
Zhang, Y.1
Wallace, B.2
|