Results 31 to 40 of about 37,947 (280)

Task-specific Word Identification from Short Texts Using a Convolutional Neural Network

open access: yes, 2017
Task-specific word identification aims to choose the task-related words that best describe a short text. Existing approaches require well-defined seed words or lexical dictionaries (e.g., WordNet), which are often unavailable for many applications such ...
Wu, Xintao, Xiang, Yang, Yuan, Shuhan
core   +1 more source

Search Rank Fraud De-Anonymization in Online Systems

open access: yes, 2018
We introduce the fraud de-anonymization problem, that goes beyond fraud detection, to unmask the human masterminds responsible for posting search rank fraud in online systems.
Akoglu Leman   +6 more
core   +1 more source

In a World That Counts: Clustering and Detecting Fake Social Engagement at Scale

open access: yes, 2016
How can web services that depend on user generated content discern fake social engagement activities by spammers from legitimate ones? In this paper, we focus on the social site of YouTube and the problem of identifying bad actors posting inorganic ...
Chen, Xing   +4 more
core   +1 more source

Fake Review Detection Based on Residual Networks Fusion of Multi-relationship Review Features [PDF]

open access: yesJisuanji kexue
With the rise of e-commerce and short video community platforms,the emergence of fake reviews has seriously affected user experience.Even to combat platform detection,review camouflage makes it harder to distinguish between true and false.Current fake ...
LUO Zeyang, TIAN Hua, DOU Yingtong, LI Manwen, ZHANG Zehua
doaj   +1 more source

A review on missing tags detection approaches in RFID system [PDF]

open access: yes, 2018
Radio Frequency Identification (RFID) system can provides automatic detection on very large number of tagged objects within short time. With this advantage, it is been using in many areas especially in the supply chain management, manufacturing and many ...
Azmi, Mohd Sanusi   +5 more
core  

Automated Crowdturfing Attacks and Defenses in Online Review Systems

open access: yes, 2017
Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation online, but are limited by the costs of hiring and managing human workers.
Arisoy Ebru   +10 more
core   +1 more source

Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer

open access: yesFEBS Letters, EarlyView.
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani   +4 more
wiley   +1 more source

"Liar, Liar Pants on Fire": A New Benchmark Dataset for Fake News Detection

open access: yes, 2017
Automatic fake news detection is a challenging problem in deception detection, and it has tremendous real-world political and social impacts. However, statistical approaches to combating fake news has been dramatically limited by the lack of labeled ...
Wang, William Yang
core   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

A Robust Rating Prediction Model for Recommendation Systems Based on Fake User Detection and Multi-Layer Feature Fusion

open access: yesBig Data Mining and Analytics
The effectiveness of recommendation systems heavily relies on accurately predicting user ratings for items based on user preferences and item attributes derived from ratings and reviews. However, the increasing presence of fake user data in these ratings
Zhigeng Han   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy