With an aging population and an increase in chronic sickness, healthcare systems are under increasing pressure. Internet of Things (IoT) technology has recently garnered a lot of interest for its ability to alleviate ...
详细信息
Hacking is one of the most widespread issues that the general public faces today. Hackers essentially use some social engineering techniques, combined with the publicly available information, to crack open the social ...
详细信息
An amino acid change in the hemoglobin protein causes sickle cell disease (SCD), a prevalent hereditary illness that causes red blood cells to take on a sickle shape. These malformed cells cause severe health complica...
详细信息
The Subset Feedback Vertex Set problem (SFVS) is to delete k vertices from a given graph such that in the remaining graph, any vertex in a subset T of vertices (called a terminal set) is not in a cycle. The famous Fee...
详细信息
Recent years have witnessed the increasing popularity of mobile and networking devices,as well as social networking sites,where users engage in a variety of activities in the cyberspace on a daily and real-time *** su...
详细信息
Recent years have witnessed the increasing popularity of mobile and networking devices,as well as social networking sites,where users engage in a variety of activities in the cyberspace on a daily and real-time *** such systems provide tremendous convenience and enjoyment for users,malicious usages,such as bullying,cruelty,extremism,and toxicity behaviors,also grow noticeably,and impose significant threats to individuals and *** this paper,we review computational approaches for cyberbullying and cyberviolence detection,in order to understand two major factors:1)What are the defining features of online bullying users,and 2)How to detect cyberbullying and *** achieve the goal,we propose a user-activities-content(UAC)triangular view,which defines that users in the cyberspace are centered around the UAC triangle to carry out activities and generate ***,we categorize cyberbully features into three main categories:1)User centered features,2)Content centered features,and 3)Activity centered *** that,we review methods for cyberbully detection,by taking supervised,unsupervised,transfer learning,and deep learning,etc.,into *** UAC centered view provides a coherent and complete summary about features and characteristics of online users(their activities),approaches to detect bullying users(and malicious content),and helps defend cyberspace from bullying and toxicity.
Streaming applications like smart monitoring and real-time data processing are characterized by long data-collecting duration and delay stringent computation. Mobile edge computing can enable mobile devices to execute...
详细信息
In the human sensing system, information is transmitted, received, and processed in the form of action voltages or electrical pulses. The birth of Spiking Neural Networks (SNNs) has brought neural networks closer to t...
详细信息
Encryption method for IPv6 networks provides new features and security concepts with a lot of profoundness likely Authentication Header and Encapsulating Security Payload Header (ESP). This paper shows the method of p...
详细信息
Decomposition structure learning algorithms are widely adopted to recover Bayesian network structures. In the recursive process of separation phase, the network partition is obtained through recursively two steps: con...
详细信息
Value Numbering is a fundamental technique used in optimizer compilers and model checking tools to detect equivalence between different expressions and eliminate the redundant computations. This survey reviews the evo...
详细信息
暂无评论