-
1
-
-
78951478147
-
Computational red teaming: Past, present and future
-
H. Abbass, A. Bender, S. Gaidow, and P. Whitbread, "Computational red teaming: Past, present and future," IEEE Comput. Intell. Mag., vol. 6, no. 1, pp. 30-42, 2011.
-
(2011)
IEEE Comput. Intell. Mag.
, vol.6
, Issue.1
, pp. 30-42
-
-
Abbass, H.1
Bender, A.2
Gaidow, S.3
Whitbread, P.4
-
2
-
-
50649124885
-
Competitor mining with the web
-
S. Bao, R. Li, Y. Yu, and Y. Cao, "Competitor mining with the web," IEEE Trans. Knowl. Data Eng., vol. 20, no. 10, pp. 1297-1310, 2008.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.10
, pp. 1297-1310
-
-
Bao, S.1
Li, R.2
Yu, Y.3
Cao, Y.4
-
3
-
-
0141607824
-
Latent dirichlet allocation
-
Mar.
-
D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," J. Mach. Learn. Res., vol. 3, pp. 993-1022, Mar. 2003.
-
(2003)
J. Mach. Learn. Res.
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
4
-
-
84880219830
-
New avenues in opinion mining and sentiment analysis
-
E. Cambria, B. Schuller, Y. Xia, and C. Havasi, "New avenues in opinion mining and sentiment analysis," IEEE Intell. Syst., vol. 28, no. 2, pp. 15-21, 2013.
-
(2013)
IEEE Intell. Syst.
, vol.28
, Issue.2
, pp. 15-21
-
-
Cambria, E.1
Schuller, B.2
Xia, Y.3
Havasi, C.4
-
5
-
-
84876940246
-
Application of multi-dimensional scaling and artificial neural networks for biologically inspired opinion mining
-
Apr.
-
E. Cambria, T. Mazzocco, and A. Hussain, "Application of multi-dimensional scaling and artificial neural networks for biologically inspired opinion mining," Biol. Insp. Cogn. Arch., vol. 4, pp. 41-53, Apr. 2013.
-
(2013)
Biol. Insp. Cogn. Arch.
, vol.4
, pp. 41-53
-
-
Cambria, E.1
Mazzocco, T.2
Hussain, A.3
-
6
-
-
84924546926
-
Do not feel the trolls
-
Shanghai, China
-
E. Cambria, P. Chandra, A. Sharma, and A. Hussain, "Do not feel the trolls," in Proc. Int. Semantic Web Conf., Shanghai, China, 2010.
-
(2010)
Proc. Int. Semantic Web Conf.
-
-
Cambria, E.1
Chandra, P.2
Sharma, A.3
Hussain, A.4
-
7
-
-
84983569734
-
Common sense reasoning for detection, prevention, and mitigation of cyberbullying,"
-
ACM
-
K. Dinakar, B. Jones, C. Havasi, H. Lieberman, and R. Picard, "Common sense reasoning for detection, prevention, and mitigation of cyberbullying," ACM Trans. Interact. Intell. Syst., vol. 2, no. 3, pp. 29-31, 2012.
-
(2012)
Trans. Interact. Intell. Syst.
, vol.2
, Issue.3
, pp. 29-31
-
-
Dinakar, K.1
Jones, B.2
Havasi, C.3
Lieberman, H.4
Picard, R.5
-
8
-
-
77956297467
-
The profession of IT: Discussing cyber attack
-
P. J. Denning and D. E. Denning, "The profession of IT: Discussing cyber attack," Commun. ACM, vol. 53, no. 9, pp. 29-31, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.9
, pp. 29-31
-
-
Denning, P.J.1
Denning, D.E.2
-
9
-
-
79952396643
-
Discovering collaborative cyber attack patterns using social network analysis
-
H. Du and S. J. Yang, "Discovering collaborative cyber attack patterns using social network analysis," in Proc. 4th Int. Conf. Social Computing, Behavioral-Cultural Modeling Prediction, 2011, vol. 6589, pp. 129-136.
-
Proc. 4th Int. Conf. Social Computing, Behavioral-Cultural Modeling Prediction, 2011
, vol.6589
, pp. 129-136
-
-
Du, H.1
Yang, S.J.2
-
11
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
Alexandria, VA Oct. 28-31
-
J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An inquiry into the nature and causes of the wealth of internet miscreants," in Proc. ACM Conf. Computer Communications Security, Alexandria, VA, Oct. 28-31, 2007, pp. 375-388.
-
(2007)
Proc. ACM Conf. Computer Communications Security
, pp. 375-388
-
-
Franklin, J.1
Perrig, A.2
Paxson, V.3
Savage, S.4
-
12
-
-
0021518209
-
Stochastic relaxation, gibbs distributions, and the bayesian restoration of images
-
S. Geman and D. Geman, "Stochastic relaxation, Gibbs distributions, and the Bayesian relation of images," IEEE Trans. Pattern Anal. Mach. Intell., vol. 6, no. 6, pp. 721-741, 1984. (Pubitemid 15453722)
-
(1984)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.PAMI-6
, Issue.6
, pp. 721-741
-
-
Geman Stuart1
Geman Donald2
-
13
-
-
79961075052
-
Cyberwarfare: Connecting the dots in cyber intelligence
-
S. Goel, "Cyberwarfare: Connecting the dots in cyber intelligence," Commun. ACM, vol. 54, no. 8, pp. 132-140, 2011.
-
(2011)
Commun. ACM
, vol.54
, Issue.8
, pp. 132-140
-
-
Goel, S.1
-
15
-
-
0003562954
-
A simple generalisation of the area under the roc curve for multiple class classification problems
-
DOI 10.1023/A:1010920819831
-
D. J. Hand and R. J. Till, "A simple generalisation of the area under the ROC curve for multiple class classification problems," Mach. Learn., vol. 45, no. 2, pp. 171-186, 2001. (Pubitemid 33635984)
-
(2001)
Machine Learning
, vol.45
, Issue.2
, pp. 171-186
-
-
Hand, D.J.1
Till, R.J.2
-
16
-
-
63849171232
-
Identifying significant facilitators of dark network evolution
-
D. Hu, S. Kaza, and H. Chen, "Identifying significant facilitators of dark network evolution," J. Amer. Soc. Inform. Sci. Technol., vol. 60, no. 4, pp. 655-665, 2009.
-
(2009)
J. Amer. Soc. Inform. Sci. Technol.
, vol.60
, Issue.4
, pp. 655-665
-
-
Hu, D.1
Kaza, S.2
Chen, H.3
-
17
-
-
42049092041
-
Towards a belief revision based adaptive and context-sensitive information retrieval system
-
R. Y. K. Lau, P. Bruza, and D. Song, "Towards a belief revision based adaptive and context-sensitive information retrieval system," ACM Trans. Inform. Syst., vol. 26, no. 2, 2008.
-
(2008)
ACM Trans. Inform. Syst.
, vol.26
, Issue.2
-
-
Lau, R.Y.K.1
Bruza, P.2
Song, D.3
-
18
-
-
66149180701
-
Towards a fuzzy domain ontology extraction method for adaptive e-learning
-
R. Y. K. Lau, D. Song, Y. Li, C. H. Cheung, and J. X. Hao, "Towards a fuzzy domain ontology extraction method for adaptive e-learning," IEEE Trans. Knowl. Data Eng., vol. 21, no. 6, pp. 800-813, 2009.
-
(2009)
IEEE Trans. Knowl. Data Eng.
, vol.21
, Issue.6
, pp. 800-813
-
-
Lau, R.Y.K.1
Song, D.2
Li, Y.3
Cheung, C.H.4
Hao, J.X.5
-
19
-
-
33645313824
-
An evolutionary learning approach for adaptive negotiation agents
-
R. Y. K. Lau, M. Tang, O. Wong, S. Milliner, and Y. Chen, "An evolutionary learning approach for adaptive negotiation agents," Int. J. Intell. Syst., vol. 21, no. 1, pp. 41-72, 2006.
-
(2006)
Int. J. Intell. Syst.
, vol.21
, Issue.1
, pp. 41-72
-
-
Lau, R.Y.K.1
Tang, M.2
Wong, O.3
Milliner, S.4
Chen, Y.5
-
20
-
-
84878059044
-
Cominer: An effective algorithm for mining competitors from the Web data mining
-
R. Li, S. Bao, J. Wang, Y. Yu, and Y. Cao, "Cominer: An effective algorithm for mining competitors from the Web," Data Mining, in Proc. Int. Conf. Data Mining, 2006, pp. 948-952.
-
(2006)
Proc. Int. Conf. Data Mining
, pp. 948-952
-
-
Li, R.1
Bao, S.2
Wang, J.3
Yu, Y.4
Cao, Y.5
-
21
-
-
76349109072
-
Mining structured data
-
G. Martino and A. Sperduti, "Mining structured data," IEEE Comput. Intell. Mag., vol. 5, no. 1, pp. 42-49, 2010.
-
(2010)
IEEE Comput. Intell. Mag.
, vol.5
, Issue.1
, pp. 42-49
-
-
Martino, G.1
Sperduti, A.2
-
22
-
-
8344238020
-
Named entity recognition from diverse text types
-
D. Maynard, V. Tablan, C. Ursu, H. Cunningham, and Y. Wilks, "Named entity recognition from diverse text types," in Proc. Conf. Recent Advances Natural Language Processing, 2001.
-
(2001)
Proc. Conf. Recent Advances Natural Language Processing
-
-
Maynard, D.1
Tablan, V.2
Ursu, C.3
Cunningham, H.4
Wilks, Y.5
-
23
-
-
34147196588
-
Inferential language models for information retrieval
-
DOI 10.1145/1236181.1236183
-
J.-Y. Nie, G. Cao, and J. Bai, "Inferential language models for information retrieval," ACM Trans. Asian Lang. Inf. Process., vol. 5, no. 4, pp. 296-322, 2006. (Pubitemid 46580875)
-
(2006)
ACM Transactions on Asian Language Information Processing
, vol.5
, Issue.4
, pp. 296-322
-
-
Nie, J.-Y.1
Cao, G.2
Bai, J.3
-
24
-
-
0032268440
-
A language modeling approach to information retrieval
-
Melbourne, Australia
-
J. M. Ponte and W. B. Croft, "A language modeling approach to information retrieval," in Proc. 21st Annu. Int. ACM SIGIR Conf. Research Development Information Retrieval, Melbourne, Australia, 1998, pp. 275-281.
-
(1998)
Proc. 21st Annu. Int. ACM SIGIR Conf. Research Development Information Retrieval
, pp. 275-281
-
-
Ponte, J.M.1
Croft, W.B.2
-
25
-
-
84948481845
-
An algorithm for suffix stripping
-
M. Porter, "An algorithm for suffix stripping," Program, vol. 14, no. 3, pp. 130-137, 1980.
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.1
-
26
-
-
84890783137
-
Commonsense-based topic modeling
-
Chicago IL
-
D. Rajagopal, D. Olsher, E. Cambria, and K. Kwok, "Commonsense-based topic modeling," in Proc. ACM Int. Conf. Knowledge Discovery Data Mining, Chicago, IL, 2013.
-
(2013)
Proc. ACM Int. Conf. Knowledge Discovery Data Mining
-
-
Rajagopal, D.1
Olsher, D.2
Cambria, E.3
Kwok, K.4
-
27
-
-
80052690222
-
Partially labeled topic models for interpretable text mining
-
San Diego, CA
-
D. Ramage, C. D. Manning, and S. T. Dumais, "Partially labeled topic models for interpretable text mining," in Proc. 17th ACM SIGKDD Int. Conf. Knowledge Discovery Data Mining, San Diego, CA, 2011, pp. 457-465.
-
(2011)
Proc. 17th ACM SIGKDD Int. Conf. Knowledge Discovery Data Mining
, pp. 457-465
-
-
Ramage, D.1
Manning, C.D.2
Dumais, S.T.3
-
28
-
-
80051615661
-
Learning author-topic models from text corpora
-
Article 4
-
M. Rosen-Zvi, C. Chemudugunta, T. L. Griffiths, P. Smyth, and M. Steyvers, "Learning author-topic models from text corpora," ACM Trans. Inform. Syst., vol. 28, no. 1, pp. 1-38, Article 4, 2010.
-
(2010)
ACM Trans. Inform. Syst.
, vol.28
, Issue.1
, pp. 1-38
-
-
Rosen-Zvi, M.1
Chemudugunta, C.2
Griffiths, T.L.3
Smyth, P.4
Steyvers, M.5
-
29
-
-
84858038774
-
An aspect query language model based on query decomposition and high-order contextual term association
-
D. Song, Q. Huang, P. D. Bruza, and R. Y. K. Lau, "An aspect query language model based on query decomposition and high-order contextual term association," Comput. Intell., vol. 28, no. 1, pp. 1-23, 2012.
-
(2012)
Comput. Intell.
, vol.28
, Issue.1
, pp. 1-23
-
-
Song, D.1
Huang, Q.2
Bruza, P.D.3
Lau, R.Y.K.4
-
30
-
-
74549195580
-
Topic and keyword re-ranking for LDA-based topic modeling
-
Y. Song, S. Pan, S. Liu, M. X. Zhou, and W. Qian, "Topic and keyword re-ranking for LDA-based topic modeling," in Proc. 18th ACM Conf. Information Knowledge Management, 2009, pp. 1757-1760.
-
(2009)
Proc. 18th ACM Conf. Information Knowledge Management
, pp. 1757-1760
-
-
Song, Y.1
Pan, S.2
Liu, S.3
Zhou, M.X.4
Qian, W.5
-
31
-
-
12244288622
-
Probabilistic author-topic models for information discovery
-
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
M. Steyvers, P. Smyth, M. Rosen-Zvi, and T. L. Griffiths, "Probabilistic author-topic models for information discovery," in Proc. 10th ACM SIGKDD Int. Conf. Knowledge Discovery Data Mining, Seattle, Washington, 2004, pp. 306-315. (Pubitemid 40114940)
-
(2004)
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 306-315
-
-
Steyvers, M.1
Smyth, P.2
Rosen-Zvi, M.3
Griffiths, T.4
-
32
-
-
76349105090
-
Linkage discovery through data mining [research frontier]
-
C.-K. Ting, W.-M. Zeng, and T.-C. Lin, "Linkage discovery through data mining [research frontier]," IEEE Comput. Intell. Mag., vol. 5, no. 1, pp. 10-13, 2010.
-
(2010)
IEEE Comput. Intell. Mag.
, vol.5
, Issue.1
, pp. 10-13
-
-
Ting, C.-K.1
Zeng, W.-M.2
Lin, T.-C.3
-
33
-
-
84867345977
-
Detecting cyber security threats in weblogs using probabilistic models
-
Proc. Pacific Asia Workshop Intelligence Security Informatics
-
F. S. Tsai and K. L. Chan, "Detecting cyber security threats in weblogs using probabilistic models," in Proc. Pacific Asia Workshop Intelligence Security Informatics (Lecture Notes in Computer Science), 2007, vol. 4430, pp. 46-57.
-
(2007)
Lecture Notes in Computer Science
, vol.4430
, pp. 46-57
-
-
Tsai, F.S.1
Chan, K.L.2
-
34
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Appl. Soft Comput., vol. 10, no. 1, pp. 1-35, 2010.
-
(2010)
Appl. Soft Comput.
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
35
-
-
84882590488
-
Discovering latent commercial networks from online financial news articles
-
Y. Xia, W. Su, R. Y. K. Lau, and Y. Liu, "Discovering latent commercial networks from online financial news articles," Enterprise Inform. Syst., vol. 7, no. 3, pp. 303-331, 2013.
-
(2013)
Enterprise Inform. Syst.
, vol.7
, Issue.3
, pp. 303-331
-
-
Xia, Y.1
Su, W.2
Lau, R.Y.K.3
Liu, Y.4
-
36
-
-
84884134119
-
Feature ensemble plus sample selection: A comprehensive approach to domain adaptation for sentiment classification
-
R. Xia, C. Zong, X. Hu, and E. Cambria, "Feature ensemble plus sample selection: A comprehensive approach to domain adaptation for sentiment classification," IEEE Intell. Syst., vol. 28, no. 3, pp. 10-18, 2013.
-
(2013)
IEEE Intell. Syst.
, vol.28
, Issue.3
, pp. 10-18
-
-
Xia, R.1
Zong, C.2
Hu, X.3
Cambria, E.4
-
37
-
-
3042824043
-
A study of smoothing methods for language models applied to information retrieval
-
ACM
-
C. Zhai and J. Lafferty, "A study of smoothing methods for language models applied to information retrieval," ACM Trans. Inform. Syst., vol. 22, no. 2, pp. 179-214, 2004.
-
(2004)
Trans. Inform. Syst.
, vol.22
, Issue.2
, pp. 179-214
-
-
Zhai, C.1
Lafferty, J.2
|