2023 | Americas Conference on Information Systems | Citations: 0
Authors: Aleroud, Ahmed; Melhem, Abdullah Bani; Alhussien, Nour; Albert, Craig
Abstract: Social Cyber-attacks such as propaganda, conspiracy theories, anger, and hate d ... Expand
Semantic filters: cross entropy
Topics: Twitter IT security threat social media armed conflict misinformation
Methods: language model experiment deep learning PyTorch literature study
2023 | European Conference On Information Systems | Citations: 0
Authors: Behfar, Stefan
Abstract: Industries are now struggling with high level of security-risk vulnerabilities ... Expand
Semantic filters: cross entropy
Topics: artificial intelligence new product development source code open source software metric
Methods: machine learning artificial neural network
2023 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Chai, Yidong; Liu, Hongyan; Xu, Jie; Samtani, Sagar; Jiang, Yuanchun; Liu, Haoxin
Abstract: Medical image annotation aims to automatically describe the content of medical i ... Expand
Semantic filters: cross entropy
Topics: workstation
Methods: data transformation autoencoder experiment deep learning literature study
2023 | International Conference on Information Systems | Citations: 0
Authors: Chen, Zihan; Sun, Jingyi; Liu, Rong Emily; Mai, Feng
Abstract: Although pervasive spread of misinformation on social media platforms has becom ... Expand
Semantic filters: cross entropy
Topics: misinformation Twitter filter bubble social media social influence
Methods: machine learning RoBERTa experiment deep learning graph neural network
2023 | Information Systems Frontiers | Citations: 0
Authors: Chung, Wingyan; Zhang, Yinqiang; Pan, Jia
Abstract: The spreading of disinformation in social media threatens cybersecurity and unde ... Expand
Semantic filters: cross entropy
Topics: disinformation social media Twitter fake news usability
Methods: machine learning experiment design artifact deep learning recurrent neural network
Theories: psychological theory
2023 | Information Systems Research | Citations: 0
Authors: Chen, Chen; Walker, Dylan
Abstract: Online health question-and-answer (Q&A) platforms (OHQPs), where patients post h ... Expand
Semantic filters: cross entropy
Topics: decision making local interpretable model agnostic explanation digital platform health information system pandemic
Methods: artificial neural network psychometrics survey deep learning natural language processing
Theories: lemon market theory
2023 | HICSS | Citations: 0
Authors: Jiang, Yiqun; Wang, Shaodong; Li, Qing; Zhang, Wenli
Abstract: Intensive care units (ICUs) serve patients with life-threatening conditions. The ... Expand
Semantic filters: cross entropy
Topics: local interpretable model agnostic explanation database system missing data societal evaluation criteria healthcare data
Methods: machine learning longitudinal research time series analysis deep learning electrocardiography
2023 | Decision Support Systems | Citations: 0
Authors: Jin, Sol; Lian, Xu; Jung, Hanearl; Park, Jinsoo; Suh, Jihae
Abstract: A man-made machine-reading comprehension (MRC) dataset is necessary to train the ... Expand
Semantic filters: cross entropy
Topics: privacy decision making online community IT productivity Google+
Methods: BERT chatGPT computational algorithm experiment natural language processing
2023 | Decision Support Systems | Citations: 0
Authors: Kayhan, Varol O.; Agrawal, Manish; Shivendu, Shivendu
Abstract: The cyber security industry is rapidly adopting threat hunting as a proactive to ... Expand
Semantic filters: cross entropy
Topics: IT security artificial intelligence Python decision support system email phishing
Methods: autoencoder data transformation DBSCAN anomaly detection machine learning
2023 | International Conference on Information Systems | Citations: 0
Authors: Kayhan, Varol; Shivendu, Shivendu; Behnia, Rouzbeh; Daniel, Clinton; Agrawal, Manish
Abstract: Threat hunting is sifting through system logs to detect malicious activities th ... Expand
Semantic filters: cross entropy
Topics: IT security application programming interface Hadoop Distributed File System website web analytics
Methods: natural language processing artificial neural network support vector machine term frequency–inverse document frequency DBSCAN